Exam 13: File-System Interface

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is the reason to design an operating system which recognizes the type of a file?

Free
(Essay)
4.7/5
(39)
Correct Answer:
Verified

Because it can then operate on the file in reasonable ways, i.e., the system uses the type of the file and the type of operations that can be done on that file.

UNIX rm command can delete non-empty directory

Free
(True/False)
4.8/5
(27)
Correct Answer:
Verified

False

Manipulating files through memory rather than using the read() and write() system calls_________________

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

B

The following information is presented for the prog.c -rwxr-xr-- 1 Jim staff 130 May 25 22:13 prog.c Users Jim, Sara and Mike are the members of the group staff

(Multiple Choice)
4.7/5
(44)

Truncating a file operation resets values of all its attributes and releases its file space.

(True/False)
4.8/5
(35)

The garbage collection is necessary _____

(Multiple Choice)
4.8/5
(43)

close() operation _____ an open count associated with a given file.

(Multiple Choice)
4.8/5
(32)

What are the main disadvantages of associating a password with each file?

(Essay)
4.7/5
(28)

Is it possible that read_next() operation is used in direct access method?

(Essay)
4.8/5
(33)

Why is open() call implemented?

(Essay)
4.9/5
(25)

In two-level directory structure, the system's master file directory (MFD) is searched when a user logs in.

(True/False)
4.9/5
(39)

A relative path name defines a path from_________________________

(Multiple Choice)
4.9/5
(40)

With _______ locking, once a process acquires an exclusive lock, the operating system will prevent any other process from accessing the locked file.

(Multiple Choice)
4.8/5
(28)

What does it mean internal fragmentation associated with the internal file structure?

(Essay)
4.9/5
(36)

Is an extension a part of a file name?

(True/False)
4.8/5
(30)

Some binary files can include a magic number. This mechanism is used by __________.

(Multiple Choice)
4.9/5
(35)

Sequential access to a file is based on a disk model of a file.

(True/False)
4.9/5
(27)

What steps are necessary to create a file?

(Multiple Choice)
5.0/5
(34)

The length of a logical record is fixed for a given operating system.

(True/False)
5.0/5
(38)

When the exclusive lock is applied to a file then _____________

(Multiple Choice)
4.8/5
(36)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)