Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

16) Which of the following is an example of a file operation that manipulates th

ID: 3686023 • Letter: 1

Question

16) Which of the following is an example of a file operation that manipulates the file directory, rather than the file itself?
a) Delete a file

b) Rename a file

c) Append one file to another

d) All of the above

Section 17.2 The Role of the File Management System

17) Typing command DIR PROG?.TXT in a Windows directory will return which files?
a) PROG.DAT

b) PROG1.TXT

c) PROG3.TXT

d) All of the above

Section 17.2 The Role of the File Management System

18) When new I/O devices are added, or the device is changed, it is necessary only to replace the

a) configuration file.

b) I/O driver for that device.

c) File Management System.

d) shell program responsible for that device.

Section 17.2 The Role of the File Management System

19) Files that are accessed _____________ represent the great majority of all files.

a) randomly

b) as records

c) in parallel

d) sequentially

Section 17.3 Logical File Access Methods

20) _______________ access is fast, since no seek time is required to find each succeeding record assuming that the file is stored contiguously.

a) Random

b) Parallel

c) Sequential

d) Record-based

Section 17.3 Logical File Access Methods

21) A ____________ occurs when two different records calculate to the same hash number (logical record number).

a) crash

b) impact

c) conflict

d) collision

Section 17.3 Logical File Access Methods

22) Fragmentation of a disk occurs when

a) files are deleted.

b) files are moved.

c) files grow too large for their anticipated storage and must be moved.

d) All of the above

Section 17.4 Physical File Storage

23) The use of noncontiguous space requires that the file system maintain a detailed, ordered list of assigned blocks for each file in the system. One method of maintaining the lists of blocks allocated to each file is to use the block numbers stored as a linked list, using pointers from one block to the next. This method is known as a(n)

a) joined blocking.

b) linked allocation.

c) connected blocking.

d) associated allocation.

Section 17.4 Physical File Storage

24) One method of maintaining a free space list is to provide a table with one bit for each block on the disk. The bit for a particular block is set to 1 if the block is in use and to 0 if the block is free. This table is called the

a) Bitmap Table.

b) File Map Table.

c) Status Map Table.

d) File Allocation Table.

Section 17.4 Physical File Storage

25) The Universal Data Format (UDF) supports High Definition and Blu-Ray DVD formats. UDF directory format is ______________, consistent with other file directory systems.

a) flat

b) ad hoc

c) matrix

d) hierarchical

Section 17.4 Physical File Storage

26) Many systems provide a means for dividing physical devices, particularly disks, into independent sections called

a) disks.

b) RAIDs.

c) partitions.

d) Storage Pools.

Section 17.5 File Systems, Volumes, Disks, Partitions, and Storage Pools

27) The file system must maintain a directory structure for each device. In most cases, the directory for each device is stored on the device itself. In many computer systems, each file system is called a

a) disk.

b) volume.

c) directory.

d) partition.

Section 17.5 File Systems, Volumes, Disks, Partitions, and Storage Pools

28) The UNIX system does not attempt to avoid cycles. Instead, it restricts access to the linking capability of the system. Normal users may only create hard links to files, but not to ___________. This prevents normal users from inadvertently creating cycles.

a) files in use

b) directories

c) root folders

d) working folders

Section 17.6 The Directory Structure

29) What protocol is designed for accessing and maintaining distributed network directory information services?

a) UDP

b) FTP

c) LDAP

d) DHCP

Section 17.7 Network File Access

30) An alternative to the client-server based approaches to file access in an enterprise is to have storage devices located together in a separate network that is accessible from all servers. This method is known as

a) disk networking.

b) fabric area storage.

c) storage area network.

d) multi-storage networking.

Section 17.8 Storage Area Networks

31) Which is NOT true about Access Control Lists (ACL)?

a) ACLs are not very granular

b) Storage space is needed for the ACL

c) ACLs are an ideal file protection service

d) Mechanisms are needed to check the ACL whenever a file is accessed

Section 17.9 File Protection

32) In contrast to ACLs, a file system can define three groups: an owner, a group associated with the file, and a universe that consists of everyone else. These groups are then assigned read, write, and __________ privileges.

a) open

b) share

c) print

d) execute

Section 17.9 File Protection

33) The first line of defense against file system failure is a well-defined set of proper system ________________________ procedures.

a) backup

b) network storage

c) file maintenance

d) backup and file maintenance

Section 17.10 Journaling File Systems

34) _______________ systems extend file system failure protection to include automated file recovery procedures in the event of a disk crash or system failure during file access operations.

a) Buffer file

b) Memory file

c) Application file

d) Journaling file

Section 17.10 Journaling File Systems

35) What is the main disadvantage of having automated file recovery procedures in the event of a disk crash or system failure during file access operations?
*a) Performance is degraded.

b) Operating system is more complex.

c) Only the metadata is guaranteed to be recovered.

d) System administrators have to configure the log files.

Section 17.10 Journaling File Systems

Explanation / Answer

16)Which of the following is an example of a file operation that manipulates the file directory, rather than the file itself?D
a) Delete a file

b) Rename a file

c) Append one file to another

d) All of the above

Section 17.2 The Role of the File Management System

17) Typing command DIR PROG?.TXT in a Windows directory will return which files? B and C
a) PROG.DAT

b) PROG1.TXT

c) PROG3.TXT

d) All of the above

Section 17.2 The Role of the File Management System

18) When new I/O devices are added, or the device is changed, it is necessary only to replace the B

a) configuration file.

b) I/O driver for that device.

c) File Management System.

d) shell program responsible for that device.

Section 17.2 The Role of the File Management System

19) Files that are accessed _____________ represent the great majority of all files. B

a) randomly

b) as records

c) in parallel

d) sequentially

Section 17.3 Logical File Access Methods

20) _______________ access is fast, since no seek time is required to find each succeeding record assuming that the file is stored contiguously. C

a) Random

b) Parallel

c) Sequential

d) Record-based

Section 17.3 Logical File Access Methods

21) A ____________ occurs when two different records calculate to the same hash number (logical record number). D

a) crash

b) impact

c) conflict

d) collision

Section 17.3 Logical File Access Methods

22) Fragmentation of a disk occurs when D

a) files are deleted.

b) files are moved.

c) files grow too large for their anticipated storage and must be moved.

d) All of the above

Section 17.4 Physical File Storage

23) The use of noncontiguous space requires that the file system maintain a detailed, ordered list of assigned blocks for each file in the system. One method of maintaining the lists of blocks allocated to each file is to use the block numbers stored as a linked list, using pointers from one block to the next. This method is known as a(n) B

a) joined blocking.

b) linked allocation.

c) connected blocking.

d) associated allocation.

Section 17.4 Physical File Storage

24) One method of maintaining a free space list is to provide a table with one bit for each block on the disk. The bit for a particular block is set to 1 if the block is in use and to 0 if the block is free. This table is called the

a) Bitmap Table.

b) File Map Table.

c) Status Map Table.

d) File Allocation Table.

Section 17.4 Physical File Storage

25) The Universal Data Format (UDF) supports High Definition and Blu-Ray DVD formats. UDF directory format is ______________, consistent with other file directory systems. A

a) flat

b) ad hoc

c) matrix

d) hierarchical

Section 17.4 Physical File Storage

26) Many systems provide a means for dividing physical devices, particularly disks, into independent sections called C

a) disks.

b) RAIDs.

c) partitions.

d) Storage Pools.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote