11.5 What are the advantages and disadvantages of recording the name of the program that creates a file with the file's attributes (as is done in the Macintosh operating system)?
11.9 Give an example of an application in which data in a file should be accessed in the following order:
11.12 Consider a system that supports 5000 users. Suppose that you want to allow 4990 of these users to be able to access one file.
a. How would you specify this protection scheme in Unix?
b. Could you suggest another protection scheme that can be used more effectively for this purpose than the scheme provided by Unix?
12.9 How do caches help improve performance? Why do systems not use more or larger caches if they are so useful?
12.10 In what situations would using memory as a RAM disk be more useful than using it as a disk cache?