adplus-dvertising
frame-decoration

Question

In the sequential access method, information in the file is processed :

a.

one disk after the other, record access doesnt matter

b.

one record after the other

c.

one text document after the other

d.

none of the mentioned

Answer: (b).one record after the other

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. In the sequential access method, information in the file is processed :

Similar Questions

Discover Related MCQs

Q. Sequential access method ______ on random access devices.

Q. The direct access method is based on a ______ model of a file, as _____ allow random access to any file block.

Q. For a direct access file :

Q. A relative block number is an index relative to :

Q. The index contains :

Q. For large files, when the index itself becomes too large to be kept in memory :

Q. _______ tend to represent a major bottleneck in system performance.

Q. In UNIX, even an ’empty’ disk has a percentage of its space lost to ______

Q. By preallocating the inodes and spreading them across the volume, we ___________ the system performance.

Q. ____________ writes occur in the order in which the disk subsystem receives them, and the writes are not buffered.

Q. In ___________ writes, the data is stored in the cache.

Q. A file being read or written sequentially should not have its pages replaced in LRU order, because _____________

Q. In the optimized technique for sequential access ___________ removes a page from the buffer as soon as the next page is requested.

Q. With _______ a requested page and several subsequent pages are read and cached.

Q. Some directory information is kept in main memory or cache to ___________

Q. A systems program such as fsck in ______ is a consistency checker.

Q. A consistency checker __________________ and tries to fix any inconsistencies it finds.

Q. Each set of operations for performing a specific task is a _________

Q. Once the changes are written to the log, they are considered to be ________

Q. When an entire committed transaction is completed, ___________