Exam 13: File-System Interface
Exam 1: Introduction57 Questions
Exam 2: Operating-System Structures42 Questions
Exam 3: Processes55 Questions
Exam 4: Threads Concurrency59 Questions
Exam 5: Cpu Scheduling57 Questions
Exam 6: Synchronization Tools61 Questions
Exam 7: Synchronization Examples57 Questions
Exam 8: Deadlocks40 Questions
Exam 9: Main Memory58 Questions
Exam 10: Virtual Memory54 Questions
Exam 11: Mass-Storage Structure46 Questions
Exam 12: Io Systems30 Questions
Exam 13: File-System Interface50 Questions
Exam 14: File-System Implementation36 Questions
Exam 15: File-System Internals25 Questions
Exam 16: Security32 Questions
Exam 17: Protection32 Questions
Select questions type
What is the reason to design an operating system which recognizes the type of a file?
Free
(Essay)
4.7/5
(39)
Correct Answer:
Because it can then operate on the file in reasonable ways, i.e., the system uses the type of the file and the type of operations that can be done on that file.
UNIX rm command can delete non-empty directory
Free
(True/False)
4.8/5
(27)
Correct Answer:
False
Manipulating files through memory rather than using the read() and write() system calls_________________
Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
B
The following information is presented for the prog.c -rwxr-xr-- 1 Jim staff 130 May 25 22:13 prog.c
Users Jim, Sara and Mike are the members of the group staff
(Multiple Choice)
4.7/5
(44)
Truncating a file operation resets values of all its attributes and releases its file space.
(True/False)
4.8/5
(35)
close() operation _____ an open count associated with a given file.
(Multiple Choice)
4.8/5
(32)
What are the main disadvantages of associating a password with each file?
(Essay)
4.7/5
(28)
Is it possible that read_next() operation is used in direct access method?
(Essay)
4.8/5
(33)
In two-level directory structure, the system's master file directory (MFD) is searched when a user logs in.
(True/False)
4.9/5
(39)
A relative path name defines a path from_________________________
(Multiple Choice)
4.9/5
(40)
With _______ locking, once a process acquires an exclusive lock, the operating system will prevent any other process from accessing the locked file.
(Multiple Choice)
4.8/5
(28)
What does it mean internal fragmentation associated with the internal file structure?
(Essay)
4.9/5
(36)
Some binary files can include a magic number. This mechanism is used by __________.
(Multiple Choice)
4.9/5
(35)
The length of a logical record is fixed for a given operating system.
(True/False)
5.0/5
(38)
When the exclusive lock is applied to a file then _____________
(Multiple Choice)
4.8/5
(36)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)