adplus-dvertising
frame-decoration

Question

In tree structure, when deleting a directory that is not empty :

a.

The contents of the directory are safe

b.

The contents of the directory are also deleted

c.

contents of the directory are not deleted

d.

none of the mentioned

Posted under Operating System

Answer: (b).The contents of the directory are also deleted

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. In tree structure, when deleting a directory that is not empty :

Similar Questions

Discover Related MCQs

Q. When two users keep a subdirectory in their own directories, the structure being referred to is :

Q. A tree structure ______ the sharing of files and directories.

Q. With a shared file :

Q. In UNIX, a link is :

Q. The operating system _______ the links when traversing directory trees, to preserve the acyclic structure of the system.

Q. The deletion of a link, ________ the original file.

Q. When keeping a list of all the links/references to a file, and the list is empty, implies that :

Q. When a cycle exists, the reference count maybe non zero, even when it is no longer possible to refer to a directory or file, due to _______

Q. A mount point is :

Q. When a file system is mounted over a directory that is not empty :

Q. In UNIX, exactly which operations can be executed by group members and other users is definable by :

Q. A process _____ lower the priority of another process, if both are owned by the same owner.

Q. In distributed file system, ______ directories are visible from the local machine.

Q. In the world wide web, a ____ is needed to gain access to the remote files, and seperate operations are used to transfer files.

Q. Anonymous access allows a user to transfer files :

Q. The machine containing the files is the _______ and the machine wanting to access the files is the ______

Q. Distributed naming services/Distributed information systems have been devised to :

Q. Domain name system provides :

Q. To recover from failures in the network operations, ______ information maybe maintained.

Q. The series of accesses between the open and close operations is a :