Question
a.
magnetic tape, magnetic tapes
b.
tape, tapes
c.
disk, disks
d.
all of the mentioned
Posted under Operating System
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. The direct access method is based on a ______ model of a file, as _____ allow random access to any file block.
Similar Questions
Discover Related MCQs
Q. For a direct access file :
View solution
Q. A relative block number is an index relative to :
View solution
Q. The index contains :
View solution
Q. For large files, when the index itself becomes too large to be kept in memory :
View solution
Q. _______ tend to represent a major bottleneck in system performance.
View solution
Q. In UNIX, even an ’empty’ disk has a percentage of its space lost to ______
View solution
Q. By preallocating the inodes and spreading them across the volume, we ___________ the system performance.
View solution
Q. ____________ writes occur in the order in which the disk subsystem receives them, and the writes are not buffered.
View solution
Q. In ___________ writes, the data is stored in the cache.
View solution
Q. A file being read or written sequentially should not have its pages replaced in LRU order, because _____________
View solution
Q. In the optimized technique for sequential access ___________ removes a page from the buffer as soon as the next page is requested.
View solution
Q. With _______ a requested page and several subsequent pages are read and cached.
View solution
Q. Some directory information is kept in main memory or cache to ___________
View solution
Q. A systems program such as fsck in ______ is a consistency checker.
View solution
Q. A consistency checker __________________ and tries to fix any inconsistencies it finds.
View solution
Q. Each set of operations for performing a specific task is a _________
View solution
Q. Once the changes are written to the log, they are considered to be ________
View solution
Q. When an entire committed transaction is completed, ___________
View solution
Q. A circular buffer :
View solution
Q. All the changes that were done from a transaction that did not commit before the system crashed, have to be _________
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Operating System? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!