Competencies. 1. Defend the need for protection and security, and the role of ethical considerations in computer use. 2. Summarize the features and limitations of an operating system used to provide protection and security. 3. Explain the mechanisms available in an OS to control access to resources. 4. Carry out simple sysadmin tasks according to a security policy, for example creating accounts, setting permissions, applying 1. Files: data, metadata, operations, organization, buffering, sequential, nonsequential 2. Directories: contents and structure 3. File systems: partitioning, mount/unmount, virtual file systems 4. Standard implementation techniques 5. Memory-mapped files
Appears in 3 contracts
Sources: Program to Program Articulation Agreement, Program to Program Articulation Agreement, Articulation Agreement