Question
a.
it does not solve the name collision problem
b.
it solves the name collision problem
c.
it does not isolate users from one another
d.
it isolates users from one another
Posted under Operating System
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. The disadvantage of the two level directory structure is that :
Similar Questions
Discover Related MCQs
Q. In the tree structured directories,
View solution
Q. The current directory contains, most of the files that are :
View solution
Q. Path names can be of two types :
View solution
Q. An absolute path name begins at the :
View solution
Q. A relative path name begins at the :
View solution
Q. In tree structure, when deleting a directory that is not empty :
View solution
Q. When two users keep a subdirectory in their own directories, the structure being referred to is :
View solution
Q. A tree structure ______ the sharing of files and directories.
View solution
Q. With a shared file :
View solution
Q. In UNIX, a link is :
View solution
Q. The operating system _______ the links when traversing directory trees, to preserve the acyclic structure of the system.
View solution
Q. The deletion of a link, ________ the original file.
View solution
Q. When keeping a list of all the links/references to a file, and the list is empty, implies that :
View solution
Q. When a cycle exists, the reference count maybe non zero, even when it is no longer possible to refer to a directory or file, due to _______
View solution
Q. A mount point is :
View solution
Q. When a file system is mounted over a directory that is not empty :
View solution
Q. In UNIX, exactly which operations can be executed by group members and other users is definable by :
View solution
Q. A process _____ lower the priority of another process, if both are owned by the same owner.
View solution
Q. In distributed file system, ______ directories are visible from the local machine.
View solution
Q. In the world wide web, a ____ is needed to gain access to the remote files, and seperate operations are used to transfer files.
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Operating System? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!