File System & Security, Unix

File System & Security, Unix

University

16 Qs

quiz-placeholder

Similar activities

User Interface Design

User Interface Design

University

16 Qs

Quiziz Debian 2

Quiziz Debian 2

University

20 Qs

KSK1024 SERVER INTRO

KSK1024 SERVER INTRO

KG - University

20 Qs

bcs303-1

bcs303-1

University

16 Qs

Operating Systems

Operating Systems

University

15 Qs

TIA Ch. 5 Lecture Quiz

TIA Ch. 5 Lecture Quiz

University

13 Qs

QUIS-2 SOK

QUIS-2 SOK

University

16 Qs

OPERATING SYSTEM

OPERATING SYSTEM

University

18 Qs

File System & Security, Unix

File System & Security, Unix

Assessment

Quiz

Computers

University

Hard

Created by

Jenny Ragay

FREE Resource

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

It is a sequence of characters organized into lines.

object file

text file

source file

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

The records are accessed in some sequence, i.e., the information in the file is processed in order, one record after the other. This access method is the most primitive one.

Sequential access

Indexed sequential access

Direct/Random access

3.

FILL IN THE BLANK QUESTION

1 min • 9 pts

Files are allocated disk spaces by operating system. Operating systems deploy three main ways to allocate disk space to files. What are these?

4.

FILL IN THE BLANK QUESTION

1 min • 5 pts

In this one, an index block is created having all pointers to files. Each file has its own index block which stores the addresses of disk space occupied by the file. What method of space allocation is used here?

5.

FILL IN THE BLANK QUESTION

1 min • 5 pts

It refers to identifying each user of the system and associating the executing programs with those users.

6.

FILL IN THE BLANK QUESTION

1 min • 5 pts

In this system, a unique password is required every time user tries to login into the system. Once this password is used, then it cannot be used again.

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

It can replicate itself on the computer system. It is highly dangerous and can modify/delete user files, crash systems. It is generally a small code embedded in a program.

Logic Bomb

Trojan Horse

Virus

Trap Door

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?