adplus-dvertising
frame-decoration

Question

The direct access method is based on a ______ model of a file, as _____ allow random access to any file block.

a.

magnetic tape, magnetic tapes

b.

tape, tapes

c.

disk, disks

d.

all of the mentioned

Posted under Operating System

Answer: (c).disk, disks

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. The direct access method is based on a ______ model of a file, as _____ allow random access to any file block.

Similar Questions

Discover Related MCQs

Q. For a direct access file :

Q. A relative block number is an index relative to :

Q. The index contains :

Q. For large files, when the index itself becomes too large to be kept in memory :

Q. _______ tend to represent a major bottleneck in system performance.

Q. In UNIX, even an ’empty’ disk has a percentage of its space lost to ______

Q. By preallocating the inodes and spreading them across the volume, we ___________ the system performance.

Q. ____________ writes occur in the order in which the disk subsystem receives them, and the writes are not buffered.

Q. In ___________ writes, the data is stored in the cache.

Q. A file being read or written sequentially should not have its pages replaced in LRU order, because _____________

Q. In the optimized technique for sequential access ___________ removes a page from the buffer as soon as the next page is requested.

Q. With _______ a requested page and several subsequent pages are read and cached.

Q. Some directory information is kept in main memory or cache to ___________

Q. A systems program such as fsck in ______ is a consistency checker.

Q. A consistency checker __________________ and tries to fix any inconsistencies it finds.

Q. Each set of operations for performing a specific task is a _________

Q. Once the changes are written to the log, they are considered to be ________

Q. When an entire committed transaction is completed, ___________

Q. A circular buffer :

Q. All the changes that were done from a transaction that did not commit before the system crashed, have to be _________