Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

2) What type of data file consists of a mixture of alphanumeric ASCII characters

ID: 3685142 • Letter: 2

Question

2) What type of data file consists of a mixture of alphanumeric ASCII characters and special binary formatting codes that are used in a word processor or spreadsheet?
a) Text
b) Video
c) Database
d) Numerical input

Section 17.1 The Logical and Physical View of Files


3) What type of data file consists of alphanumeric text that will serve as the input to a complier? a) Video
b) Database
c) Directory d) Source code

Section 17.1 The Logical and Physical View of Files


4) What type of data file consists of information about other files?
a) Video
b) Database
c) Directory d) Source code


Section 17.1 The Logical and Physical View of Files

5) The _______view of the file is the way in which the data is actually stored on a disk.
a) real view
b) image view
c) logical view
d) physical view

Section 17.1 The Logical and Physical View of Files


6) Data files whose records are always retrieved in sequence from the beginning of the file are known as _________________.
a) serial files
b) logical files
c) sequential files
d) random access files

Section 17.1 The Logical and Physical View of Files


7) Some applications require that records be retrievable from anywhere in the file in an arbitrary sequence. These files are known as ___________.
a) serial files
b) logical files
c) sequential files
d) random access files

Section 17.1 The Logical and Physical View of Files


8) One common method for retrieving records randomly from a file uses one field, known as the __________ field, as an index to identify the proper record.
a) key
b) main
c) target
d) critical

Section 17.1 The Logical and Physical View of Files


9) The __________________ is part of the filename and is used to identify the file type.
a) file prefix
b) file location
c) file argument
d) file extension

Section 17.1 The Logical and Physical View of Files


10) Some systems allow a data file to specify the program it is to be used with. This property is called a(n)
a) association.
b) attachment.
c) relationship.
d) membership.

Section 17.1 The Logical and Physical View of Files


11) The _______________ is the smallest unit that the file management system can store or retrieve in a single read or write operation.
a) sector
b) chunk
c) cluster
d) byte

Section 17.1 The Logical and Physical View of Files


12) If the allocation unit size is too small,
a) file access is slower.
b) there is less overhead to track each allocation unit.
c) there is more unused space at the end of most allocation units.
d) All of the above

Section 17.1 The Logical and Physical View of Files


13) Most user commands to the operating system are actually requests to the ________ manager.
a) I/O
b) file
c) memory
d) processor

Section 17.2 The Role of the File Management System


14) Which of the following are functions that are performed by a program rather than by a user?
a) Open a file and create a file pointer
b) Read a number of bytes from a file
c) Move the file pointer a number of bytes a distance forward or backward
d) All of the above

Section 17.2 The Role of the File Management System


15) Which of the following is NOT an example of a record-based file operation? a) Rename a file
b) Add a record to a file
c) Read (retrieve) a record
d) Delete a record from a file

Section 17.2 The Role of the File Management System


16) Which of the following is an example of a file operation that manipulates the file directory, rather than the file itself? a) Delete a file
b) Rename a file
c) Append one file to another
d) All of the above

Section 17.2 The Role of the File Management System


17) Typing command DIR PROG?.TXT in a Windows directory will return which files? a) PROG.DAT
b) PROG1.TXT
c) PROG3.TXT
d) All of the above

Section 17.2 The Role of the File Management System


18) When new I/O devices are added, or the device is changed, it is necessary only to replace the
a) configuration file.
b) I/O driver for that device.
c) File Management System.
d) shell program responsible for that device.

Section 17.2 The Role of the File Management System


19) Files that are accessed _____________ represent the great majority of all files.
a) randomly
b) as records
c) in parallel
d) sequentially

Section 17.3 Logical File Access Methods


20) _______________ access is fast, since no seek time is required to find each succeeding record assuming that the file is stored contiguously.
a) Random
b) Parallel
c) Sequential
d) Record-based

Section 17.3 Logical File Access Methods


21) A ____________ occurs when two different records calculate to the same hash number (logical record number).
a) crash
b) impact
c) conflict
d) collision

Section 17.3 Logical File Access Methods


22) Fragmentation of a disk occurs when
a) files are deleted.
b) files are moved.
c) files grow too large for their anticipated storage and must be moved.
d) All of the above

Section 17.4 Physical File Storage


23) The use of noncontiguous space requires that the file system maintain a detailed, ordered list of assigned blocks for each file in the system. One method of maintaining the lists of blocks allocated to each file is to use the block numbers stored as a linked list, using pointers from one block to the next. This method is known as a(n)
a) joined blocking.
b) linked allocation.
c) connected blocking.
d) associated allocation.

Section 17.4 Physical File Storage


24) One method of maintaining a free space list is to provide a table with one bit for each block on the disk. The bit for a particular block is set to 1 if the block is in use and to 0 if the block is free. This table is called the
a) Bitmap Table.
b) File Map Table.
c) Status Map Table.
d) File Allocation Table.

Section 17.4 Physical File Storage


25) The Universal Data Format (UDF) supports High Definition and Blu-Ray DVD formats. UDF directory format is ______________, consistent with other file directory systems.
a) flat
b) ad hoc
c) matrix
d) hierarchical

Section 17.4 Physical File Storage


26) Many systems provide a means for dividing physical devices, particularly disks, into independent sections called
a) disks.
b) RAIDs.
c) partitions.
d) Storage Pools.

Section 17.5 File Systems, Volumes, Disks, Partitions, and Storage Pools


27) The file system must maintain a directory structure for each device. In most cases, the directory for each device is stored on the device itself. In many computer systems, each file system is called a
a) disk.
b) volume.
c) directory.
d) partition.

Section 17.5 File Systems, Volumes, Disks, Partitions, and Storage Pools


28) The UNIX system does not attempt to avoid cycles. Instead, it restricts access to the linking capability of the system. Normal users may only create hard links to files, but not to ___________. This prevents normal users from inadvertently creating cycles.
a) files in use
b) directories
c) root folders
d) working folders

Section 17.6 The Directory Structure


29) What protocol is designed for accessing and maintaining distributed network directory information services?
a) UDP
b) FTP
c) LDAP
d) DHCP

Section 17.7 Network File Access


30) An alternative to the client-server based approaches to file access in an enterprise is to have storage devices located together in a separate network that is accessible from all servers. This method is known as
a) disk networking.
b) fabric area storage.
c) storage area network.
d) multi-storage networking.

Section 17.8 Storage Area Networks


31) Which is NOT true about Access Control Lists (ACL)?
a) ACLs are not very granular
b) Storage space is needed for the ACL
c) ACLs are an ideal file protection service
d) Mechanisms are needed to check the ACL whenever a file is accessed

Section 17.9 File Protection


32) In contrast to ACLs, a file system can define three groups: an owner, a group associated with the file, and a universe that consists of everyone else. These groups are then assigned read, write, and __________ privileges.
a) open
b) share
c) print
d) execute

Section 17.9 File Protection


33) The first line of defense against file system failure is a well-defined set of proper system ________________________ procedures.
a) backup
b) network storage
c) file maintenance
d) backup and file maintenance

Section 17.10 Journaling File Systems


34) _______________ systems extend file system failure protection to include automated file recovery procedures in the event of a disk crash or system failure during file access operations.
a) Buffer file
b) Memory file
c) Application file
d) Journaling file

Section 17.10 Journaling File Systems


35) What is the main disadvantage of having automated file recovery procedures in the event of a disk crash or system failure during file access operations? a) Performance is degraded.
b) Operating system is more complex.
c) Only the metadata is guaranteed to be recovered.
d) System administrators have to configure the log files.

Explanation / Answer

2) a) Text
3) d) Source code
4) c) Directory
5) d) Physical view
6) a) Serial files
7) c) Sequential files
8) a) key
9) d) File extension
10) b) Attachment
11) d) Byte
12) a) File access is slower.
13) b) File
14) b) Read a number of bytes form a file
15) c) Read (retrieve) a record
16) a) Delete a file
17) d) All of the above
18) b) I/O drive for that device
19) a) Randomly
20) c) Sequential
21) d) Collision
22) d) All of the above
23) b) Linked allocation.
24) d) File Allocation Table.
25) a) Flat
26) b) RAIDs.
27) c) Directory.
28) c) Root folders
29) c) LDAP
30) c) Storage area network
31) b) ACLs are an ideal file protection service
32) d) Execute
33) d) Backup and file maintenance
34) d) Journaling file
35) b) Operating system is more complex.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote