adplus-dvertising
frame-decoration

Question

With a shared file :

a.

actual file exists

b.

there are two copies of the file

c.

the changes made by one person are not reflected to the other

d.

the changes made by one person are reflected to the other

Answer: (d).the changes made by one person are reflected to the other

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. With a shared file :

Similar Questions

Discover Related MCQs

Q. In UNIX, a link is :

Q. The operating system _______ the links when traversing directory trees, to preserve the acyclic structure of the system.

Q. The deletion of a link, ________ the original file.

Q. When keeping a list of all the links/references to a file, and the list is empty, implies that :

Q. When a cycle exists, the reference count maybe non zero, even when it is no longer possible to refer to a directory or file, due to _______

Q. A mount point is :

Q. When a file system is mounted over a directory that is not empty :

Q. In UNIX, exactly which operations can be executed by group members and other users is definable by :

Q. A process _____ lower the priority of another process, if both are owned by the same owner.

Q. In distributed file system, ______ directories are visible from the local machine.

Q. In the world wide web, a ____ is needed to gain access to the remote files, and seperate operations are used to transfer files.

Q. Anonymous access allows a user to transfer files :

Q. The machine containing the files is the _______ and the machine wanting to access the files is the ______

Q. Distributed naming services/Distributed information systems have been devised to :

Q. Domain name system provides :

Q. To recover from failures in the network operations, ______ information maybe maintained.

Q. The series of accesses between the open and close operations is a :

Q. Reliability of files can be increased by :

Q. Protection is only provided at the _____ level.

Q. The main problem with access control lists is :