File System & Security, Unix

File System & Security, Unix

University

16 Qs

quiz-placeholder

Similar activities

Week 5: Test your understanding part 1

Week 5: Test your understanding part 1

University

20 Qs

Operating System

Operating System

University

15 Qs

Operating System Quiz

Operating System Quiz

University

20 Qs

Operating System structure

Operating System structure

University

12 Qs

Sistemas de Archivos

Sistemas de Archivos

University

20 Qs

sistem operasi

sistem operasi

11th Grade - Professional Development

21 Qs

Chapter 14 - File System Implementation

Chapter 14 - File System Implementation

University

20 Qs

True-False

True-False

University

20 Qs

File System & Security, Unix

File System & Security, Unix

Assessment

Quiz

Computers

University

Hard

Created by

Jenny Ragay

FREE Resource

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

It is a sequence of characters organized into lines.

object file

text file

source file

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

The records are accessed in some sequence, i.e., the information in the file is processed in order, one record after the other. This access method is the most primitive one.

Sequential access

Indexed sequential access

Direct/Random access

3.

FILL IN THE BLANK QUESTION

1 min • 9 pts

Files are allocated disk spaces by operating system. Operating systems deploy three main ways to allocate disk space to files. What are these?

4.

FILL IN THE BLANK QUESTION

1 min • 5 pts

In this one, an index block is created having all pointers to files. Each file has its own index block which stores the addresses of disk space occupied by the file. What method of space allocation is used here?

5.

FILL IN THE BLANK QUESTION

1 min • 5 pts

It refers to identifying each user of the system and associating the executing programs with those users.

6.

FILL IN THE BLANK QUESTION

1 min • 5 pts

In this system, a unique password is required every time user tries to login into the system. Once this password is used, then it cannot be used again.

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

It can replicate itself on the computer system. It is highly dangerous and can modify/delete user files, crash systems. It is generally a small code embedded in a program.

Logic Bomb

Trojan Horse

Virus

Trap Door

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?