16) Which of the following is an example of a file operation that manipulates th
ID: 3686023 • Letter: 1
Question
16) Which of the following is an example of a file operation that manipulates the file directory, rather than the file itself?
a) Delete a file
b) Rename a file
c) Append one file to another
d) All of the above
Section 17.2 The Role of the File Management System
17) Typing command DIR PROG?.TXT in a Windows directory will return which files?
a) PROG.DAT
b) PROG1.TXT
c) PROG3.TXT
d) All of the above
Section 17.2 The Role of the File Management System
18) When new I/O devices are added, or the device is changed, it is necessary only to replace the
a) configuration file.
b) I/O driver for that device.
c) File Management System.
d) shell program responsible for that device.
Section 17.2 The Role of the File Management System
19) Files that are accessed _____________ represent the great majority of all files.
a) randomly
b) as records
c) in parallel
d) sequentially
Section 17.3 Logical File Access Methods
20) _______________ access is fast, since no seek time is required to find each succeeding record assuming that the file is stored contiguously.
a) Random
b) Parallel
c) Sequential
d) Record-based
Section 17.3 Logical File Access Methods
21) A ____________ occurs when two different records calculate to the same hash number (logical record number).
a) crash
b) impact
c) conflict
d) collision
Section 17.3 Logical File Access Methods
22) Fragmentation of a disk occurs when
a) files are deleted.
b) files are moved.
c) files grow too large for their anticipated storage and must be moved.
d) All of the above
Section 17.4 Physical File Storage
23) The use of noncontiguous space requires that the file system maintain a detailed, ordered list of assigned blocks for each file in the system. One method of maintaining the lists of blocks allocated to each file is to use the block numbers stored as a linked list, using pointers from one block to the next. This method is known as a(n)
a) joined blocking.
b) linked allocation.
c) connected blocking.
d) associated allocation.
Section 17.4 Physical File Storage
24) One method of maintaining a free space list is to provide a table with one bit for each block on the disk. The bit for a particular block is set to 1 if the block is in use and to 0 if the block is free. This table is called the
a) Bitmap Table.
b) File Map Table.
c) Status Map Table.
d) File Allocation Table.
Section 17.4 Physical File Storage
25) The Universal Data Format (UDF) supports High Definition and Blu-Ray DVD formats. UDF directory format is ______________, consistent with other file directory systems.
a) flat
b) ad hoc
c) matrix
d) hierarchical
Section 17.4 Physical File Storage
26) Many systems provide a means for dividing physical devices, particularly disks, into independent sections called
a) disks.
b) RAIDs.
c) partitions.
d) Storage Pools.
Section 17.5 File Systems, Volumes, Disks, Partitions, and Storage Pools
27) The file system must maintain a directory structure for each device. In most cases, the directory for each device is stored on the device itself. In many computer systems, each file system is called a
a) disk.
b) volume.
c) directory.
d) partition.
Section 17.5 File Systems, Volumes, Disks, Partitions, and Storage Pools
28) The UNIX system does not attempt to avoid cycles. Instead, it restricts access to the linking capability of the system. Normal users may only create hard links to files, but not to ___________. This prevents normal users from inadvertently creating cycles.
a) files in use
b) directories
c) root folders
d) working folders
Section 17.6 The Directory Structure
29) What protocol is designed for accessing and maintaining distributed network directory information services?
a) UDP
b) FTP
c) LDAP
d) DHCP
Section 17.7 Network File Access
30) An alternative to the client-server based approaches to file access in an enterprise is to have storage devices located together in a separate network that is accessible from all servers. This method is known as
a) disk networking.
b) fabric area storage.
c) storage area network.
d) multi-storage networking.
Section 17.8 Storage Area Networks
31) Which is NOT true about Access Control Lists (ACL)?
a) ACLs are not very granular
b) Storage space is needed for the ACL
c) ACLs are an ideal file protection service
d) Mechanisms are needed to check the ACL whenever a file is accessed
Section 17.9 File Protection
32) In contrast to ACLs, a file system can define three groups: an owner, a group associated with the file, and a universe that consists of everyone else. These groups are then assigned read, write, and __________ privileges.
a) open
b) share
c) print
d) execute
Section 17.9 File Protection
33) The first line of defense against file system failure is a well-defined set of proper system ________________________ procedures.
a) backup
b) network storage
c) file maintenance
d) backup and file maintenance
Section 17.10 Journaling File Systems
34) _______________ systems extend file system failure protection to include automated file recovery procedures in the event of a disk crash or system failure during file access operations.
a) Buffer file
b) Memory file
c) Application file
d) Journaling file
Section 17.10 Journaling File Systems
35) What is the main disadvantage of having automated file recovery procedures in the event of a disk crash or system failure during file access operations?
*a) Performance is degraded.
b) Operating system is more complex.
c) Only the metadata is guaranteed to be recovered.
d) System administrators have to configure the log files.
Section 17.10 Journaling File Systems
Explanation / Answer
16)Which of the following is an example of a file operation that manipulates the file directory, rather than the file itself?D
a) Delete a file
b) Rename a file
c) Append one file to another
d) All of the above
Section 17.2 The Role of the File Management System
17) Typing command DIR PROG?.TXT in a Windows directory will return which files? B and C
a) PROG.DAT
b) PROG1.TXT
c) PROG3.TXT
d) All of the above
Section 17.2 The Role of the File Management System
18) When new I/O devices are added, or the device is changed, it is necessary only to replace the B
a) configuration file.
b) I/O driver for that device.
c) File Management System.
d) shell program responsible for that device.
Section 17.2 The Role of the File Management System
19) Files that are accessed _____________ represent the great majority of all files. B
a) randomly
b) as records
c) in parallel
d) sequentially
Section 17.3 Logical File Access Methods
20) _______________ access is fast, since no seek time is required to find each succeeding record assuming that the file is stored contiguously. C
a) Random
b) Parallel
c) Sequential
d) Record-based
Section 17.3 Logical File Access Methods
21) A ____________ occurs when two different records calculate to the same hash number (logical record number). D
a) crash
b) impact
c) conflict
d) collision
Section 17.3 Logical File Access Methods
22) Fragmentation of a disk occurs when D
a) files are deleted.
b) files are moved.
c) files grow too large for their anticipated storage and must be moved.
d) All of the above
Section 17.4 Physical File Storage
23) The use of noncontiguous space requires that the file system maintain a detailed, ordered list of assigned blocks for each file in the system. One method of maintaining the lists of blocks allocated to each file is to use the block numbers stored as a linked list, using pointers from one block to the next. This method is known as a(n) B
a) joined blocking.
b) linked allocation.
c) connected blocking.
d) associated allocation.
Section 17.4 Physical File Storage
24) One method of maintaining a free space list is to provide a table with one bit for each block on the disk. The bit for a particular block is set to 1 if the block is in use and to 0 if the block is free. This table is called the
a) Bitmap Table.
b) File Map Table.
c) Status Map Table.
d) File Allocation Table.
Section 17.4 Physical File Storage
25) The Universal Data Format (UDF) supports High Definition and Blu-Ray DVD formats. UDF directory format is ______________, consistent with other file directory systems. A
a) flat
b) ad hoc
c) matrix
d) hierarchical
Section 17.4 Physical File Storage
26) Many systems provide a means for dividing physical devices, particularly disks, into independent sections called C
a) disks.
b) RAIDs.
c) partitions.
d) Storage Pools.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.