Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

linked lists and RAM

Posted on 2003-10-28
1
Medium Priority
?
191 Views
Last Modified: 2010-04-15
I'm dealing with folder management. I should have clients which will have folders in tree structure which will in turn have list of records. Now, i should have 2 fields of the records in the RAM as interlinked pointers and do all my operations on them and this will correspondingly change the data in the secondary memory which it is pointing to. Once I power off my system, I will lose my pointers. But if i lose my pointers, that means I have lost my sorted list of reference also, as data in secondary memory won't be sorted and it is only the pointers which will undergo every operation. What should I do to get back my list of pointers with the latest modified status with the above mentioned requirements?
0
Comment
Question by:motian
1 Comment
 
LVL 46

Accepted Solution

by:
Kent Olsen earned 520 total points
ID: 9633550

Hi motian,

Are you writing an operating system where the process that you mention will be THE definitive entity that manages the folders, or are you writing a program that will run underneath another operating system to manage these folders?

If you are writing your own operating system, this data will have to be flushed back to disk on a regular basis to keep the "real" copy and your table synchronized.  I refer to the disk copy as "real" since it is the only thing that is preserved across boots.


In either case, whenever your program starts up, it needs to scan the directory and build your tables.

Kent
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Windows programmers of the C/C++ variety, how many of you realise that since Window 9x Microsoft has been lying to you about what constitutes Unicode (http://en.wikipedia.org/wiki/Unicode)? They will have you believe that Unicode requires you to use…
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
The goal of this video is to provide viewers with basic examples to understand how to use strings and some functions related to them in the C programming language.
The goal of this video is to provide viewers with basic examples to understand how to create, access, and change arrays in the C programming language.
Suggested Courses

824 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question