adplus-dvertising
frame-decoration

Question

In tree structure, when deleting a directory that is not empty :

a.

The contents of the directory are safe

b.

The contents of the directory are also deleted

c.

contents of the directory are not deleted

d.

none of the mentioned

Answer: (b).The contents of the directory are also deleted

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. In tree structure, when deleting a directory that is not empty :

Similar Questions

Discover Related MCQs

Q. When two users keep a subdirectory in their own directories, the structure being referred to is :

Q. A tree structure ______ the sharing of files and directories.

Q. With a shared file :

Q. In UNIX, a link is :

Q. The operating system _______ the links when traversing directory trees, to preserve the acyclic structure of the system.

Q. The deletion of a link, ________ the original file.

Q. When keeping a list of all the links/references to a file, and the list is empty, implies that :

Q. When a cycle exists, the reference count maybe non zero, even when it is no longer possible to refer to a directory or file, due to _______

Q. A mount point is :

Q. When a file system is mounted over a directory that is not empty :

Q. In UNIX, exactly which operations can be executed by group members and other users is definable by :

Q. A process _____ lower the priority of another process, if both are owned by the same owner.

Q. In distributed file system, ______ directories are visible from the local machine.

Q. In the world wide web, a ____ is needed to gain access to the remote files, and seperate operations are used to transfer files.

Q. Anonymous access allows a user to transfer files :

Q. The machine containing the files is the _______ and the machine wanting to access the files is the ______

Q. Distributed naming services/Distributed information systems have been devised to :

Q. Domain name system provides :

Q. To recover from failures in the network operations, ______ information maybe maintained.

Q. The series of accesses between the open and close operations is a :