If each access to a file is controlled by a password, then what is the disadvantage?
1. user will need to remember a lot of passwords
2.it is not reliable
3. it is not efficient
4.All of the Mentioned
Answer:1
Posted Date:-2022-03-29 07:49:52
1.the same
2. increased
3.decreased
4.not affected
Answer 31. user will need to remember a lot of passwords
2.it is not reliable
3. it is not efficient
4.All of the Mentioned
Answer 11.internal fragmentation
2.external fragmentation
3. starvation
4.All of the Mentioned
Answer 11.each file must occupy a set of contiguous blocks on the disk
2. each file is a linked list of disk blocks
3. all the pointers to scattered blocks are placed together in one location
4.None of the mentioned
Answer 11. superuser
2.any user
3.a programmer only
4.the people in the group only
Answer 11.adding an extent (another chunk of contiguous space)
2.adding an index table to the first contiguous block
3. adding pointers into the first contiguous block
4. none of the mentioned
Answer 11.high level, low level
2.low level, high level
3.complex, simple
4.low level, complex
Answer 11.fat
2. linked allocation
3. hashed allocation
4.indexed allocation
Answer 11. different
2. similar
3. same
4.None of the mentioned
Answer 21. 10000110000001110011111100011111…
2.110000110000001110011111100011111…
3. 01111001111110001100000011100000…
4.001111001111110001100000011100000…
Answer 41.external – fragmentation & size – declaration
2.internal – fragmentation & external – fragmentation
3. size – declaration & internal – fragmentation
4.memory – allocation & size – declaration
Answer 11.disk address of the first block & length
2. length & size of the block
3. size of the block
4.total size of the file
Answer 11.left ‘raw’
2.made into swap space
3. made into backup space
4.left ‘ripe’
Answer 11.provide information about all the systems
2.provide unified access to the information needed for remote computing
3.provide unique names to all systems in a network
4.All of the Mentioned
Answer 21. host-name-to-network-address translations for the entire internet
2.network-address-to-host-name translations for the entire internet
3. binary to hex translations for the entire internet
4.All of the Mentioned
Answer 11.can
2.cannot
3.is
4.None of the mentioned
Answer 21.partition
2.address
3.file
4. All of the mentioned
Answer 31.File Attribute Transport
2. File Allocation Table
3. Fork At Time
4.None of the mentioned
Answer 21.only one
2. at least two
3. exactly two
4.none of the mentioned
Answer 21.metadata
2.file control block
3.process control block
4.All of the Mentioned
Answer 21.to run a seperate program
2.special interrupts
3.to implement the open and close system calls
4. none of the mentioned
Answer 31. the file will not work
2.there will not be any space for the data, as the FCB takes it all
3. the file cannot be extended
4.the file cannot be opened
Answer 31.each file must occupy a set of contiguous blocks on the disk
2.each file is a linked list of disk blocks
3. all the pointers to scattered blocks are placed together in one location
4.None of the mentioned
Answer 31.each file must occupy a set of contiguous blocks on the disk
2.each file is a linked list of disk blocks
3.all the pointers to scattered blocks are placed together in one location
4.None of the mentioned
Answer 21.I only
2. II only
3. Both I and II
4.Neither I nor II
Answer 31. different
2. similar
3. it is not handled at all
4.None of the mentioned
Answer 21.supports
2.does not support
3.is not related to
4.none of the mentioned
Answer 11.Owner
2.Group
3. Universe
4.All of the Mentioned
Answer 41.all of the file system structure
2.contents of files
3. both file system structure and contents of files
4.none of the mentioned
Answer 31. finding space for a new file
2.inefficient
3.costly
4.time taking
Answer 11.lower
2.central
3.higher
4.None of the mentioned
Answer 11.keeping the files safely in the memory
2.making a different partition for the files
3.by keeping them in external storage
4.by keeping duplicate copies of the file
Answer 41.stack
2. linked list
3. data
4.pointer
Answer 21.files
2. logical blocks of files
3.physical blocks of files
4.All of the Mentioned
Answer 41.internal fragmentation
2.external fragmentation
3.starvation
4.All of the Mentioned
Answer 21. less than
2.equal to
3.greater than
4.keeps varying with
Answer 31. transaction
2.procedure
3. program
4. file session
Answer 41. contiguous
2. linked
3.indexed
4.All of the Mentioned
Answer 41.size
2.commands
3. timings
4.file system types
Answer 41. internal fragmentation
2.external fragmentation
3. starvation
4.All of the Mentioned
Answer 21.r
2.w
3. x
4. All of the mentioned
Answer 41. compaction
2.check
3. formatting
4.replacing memory
Answer 11. all users that aren’t included in the group or owners
2.all users that are not owners
3.all users in the system
4.None of the mentioned
Answer 31.the entire file could get damaged
2.only a part of the file would be affected
3.there would not be any problems
4.None of the mentioned
Answer 11.their maintenance
2.their length
3. their permissions
4.All of the Mentioned
Answer 21.internal fragmentation
2. external fragmentation
3. there is no sequential access
4.there is only sequential access
Answer 41.size of the linear list in memory
2.linear search to find a file
3. it is not reliable
4.All of the Mentioned
Answer 21. the same previous techniques will be used as in the other structures
2. the same previous techniques will be used as in the other structures
3. the subdirectories do not need protection once the directory is protected
4.None of the mentioned
Answer 21.the contents of the file have to be copied to a new space, a larger hole
2. the file gets destroyed
3.the file will get formatted and lost all its data
4.none of the mentioned
Answer 11. First fit, Best fit
2.Worst fit, First fit
3.Best fit, Worst fit
4.None of the mentioned
Answer 1