1)Consider a file system in which a file can be deleted and itsdisk space reclaimed while links to that file still exist. Whatproblems may occur if a new file is created in the same storagearea or with the same absolute path name? How can these problems beavoided?
2)Consider a file systemthat uses a modifiedcontiguous-allocation scheme with support for extents.A file is acollection of extents, with each extent corresponding to acontiguous set of blocks. A key issue in such systems is the degreeof variability in the size of the extents. What are the advantagesand disadvantages of the following schemes? a. All extents are ofthe same size, and the size is predetermined. b. Extents can be ofany size and are allocated dynamically. c. Extents can be of a fewfixed sizes, and these sizes are predetermined.
3)If all the access rights to an object are deleted, the objectcan no longer be accessed. At this point the object should also bedeleted, and the space it occupies should be returned to thesystem. Suggest an efficient implementation of this scheme
4)What commonly used computer programs are prone toman-in-the-middle attacks? Discuss solutions for preventing thisform of attack.
5)Discuss the following with neat diagrama.
Virtualization and its types
b.Hypervisor
(Operating system ,Computer Science)