Fragmentation, in the context of a hard disk, is a condition in which
the contents of a single file are stored in different locations on the
disk rather than in a contiguous space. This results in inefficient use
of storage space as well as occasional performance degradation. Users
frequently create, modify, delete and save files. Back-end operating
systems (OS) continuously store these files on hard drives, which
inevitably creates scattered files. When fragmentation occurs, the OS
needs to consolidate stored files to enhance processing efficiency.
Sunday, March 16, 2014
Metadata
Metadata is "data about data".
That is the metadata can be used to identify the information about the data file whetre it is image, webpage , song or any other file system.
Metadata (metacontent) are defined as the data providing information about one or more aspects of the data, such as:
Means of creation of the data
Purpose of the data
Time and date of creation
Creator or author of the data
Location on a computer network where the data were created
Standards used
That is the metadata can be used to identify the information about the data file whetre it is image, webpage , song or any other file system.
Metadata (metacontent) are defined as the data providing information about one or more aspects of the data, such as:
Means of creation of the data
Purpose of the data
Time and date of creation
Creator or author of the data
Location on a computer network where the data were created
Standards used
Network operating system
Abbreviated as NOS, an operating system that includes special functions for connecting computers and devices into a local-area network (LAN). Some operating systems, such as UNIX and the Mac OS, have networking functions built in. The term network operating system, however, is generally reserved for software that enhances a basic operating system by adding networking features. Novell Netware, Artisoft's LANtastic, Microsoft Windows Server, and Windows NT are examples of an NOS.
Operating System
While living in the today tech world we are more acquainted with the word OS - operating system. But when we asked about it? we simply
say it is windows , Linux , UNIX , MAC os or android.
Operating System is a collection of software programs that manages hardware resources and provides an application interface towards user to interact with system.
The components of an operating system:--------
say it is windows , Linux , UNIX , MAC os or android.
Operating System is a collection of software programs that manages hardware resources and provides an application interface towards user to interact with system.
The components of an operating system:--------
- Kernel
- Modes
- Program execution
- Interrupts
- Modes
- Memory management
- Virtual memory
- Multitasking
- Disk access and file systems
- Device drivers
- Networking
- Security
- User interface
Monday, March 10, 2014
Access control list (ACL)
An access control list (ACL), with respect to a computer file system, is a list of permissions attached to an object. An ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects. Each entry in a typical ACL specifies a subject and an operation. For instance, if a file has an ACL that contains (Alice, delete), this would give Alice permission to delete the file.
RAID
RAID (Redundant array of independent Disks)
>>>allows information to access several disks.
RAID uses techniques such as disk striping (RAID Level 0), disk mirroring (RAID Level 1), and disk striping with parity (RAID Level 5) to achieve redundancy, lower latency, increased bandwidth, and maximized ability to recover from hard disk crashes.
RAID consistently distributes data across each drive in the array. RAID then breaks down the data into consistently-sized chunks (commonly 32K or 64k, although other values are acceptable). Each chunk is then written to a hard drive in the RAID array according to the RAID level employed. When the data is read, the process is reversed, giving the illusion that the multiple drives in the array are actually one large drive.
>>>allows information to access several disks.
RAID uses techniques such as disk striping (RAID Level 0), disk mirroring (RAID Level 1), and disk striping with parity (RAID Level 5) to achieve redundancy, lower latency, increased bandwidth, and maximized ability to recover from hard disk crashes.
RAID consistently distributes data across each drive in the array. RAID then breaks down the data into consistently-sized chunks (commonly 32K or 64k, although other values are acceptable). Each chunk is then written to a hard drive in the RAID array according to the RAID level employed. When the data is read, the process is reversed, giving the illusion that the multiple drives in the array are actually one large drive.
Who Should Use RAID?
System Administrators and others who manage large amounts of data would benefit from using RAID technology. Primary reasons to deploy RAID include:-
Enhances speed
-
Increases storage capacity using a single virtual disk
-
Minimizes disk failure
Subscribe to:
Posts (Atom)