Question
a.
actual file exists
b.
there are two copies of the file
c.
the changes made by one person are not reflected to the other
d.
the changes made by one person are reflected to the other
Posted under Operating System
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. With a shared file :
Similar Questions
Discover Related MCQs
Q. In UNIX, a link is :
View solution
Q. The operating system _______ the links when traversing directory trees, to preserve the acyclic structure of the system.
View solution
Q. The deletion of a link, ________ the original file.
View solution
Q. When keeping a list of all the links/references to a file, and the list is empty, implies that :
View solution
Q. When a cycle exists, the reference count maybe non zero, even when it is no longer possible to refer to a directory or file, due to _______
View solution
Q. A mount point is :
View solution
Q. When a file system is mounted over a directory that is not empty :
View solution
Q. In UNIX, exactly which operations can be executed by group members and other users is definable by :
View solution
Q. A process _____ lower the priority of another process, if both are owned by the same owner.
View solution
Q. In distributed file system, ______ directories are visible from the local machine.
View solution
Q. In the world wide web, a ____ is needed to gain access to the remote files, and seperate operations are used to transfer files.
View solution
Q. Anonymous access allows a user to transfer files :
View solution
Q. The machine containing the files is the _______ and the machine wanting to access the files is the ______
View solution
Q. Distributed naming services/Distributed information systems have been devised to :
View solution
Q. Domain name system provides :
View solution
Q. To recover from failures in the network operations, ______ information maybe maintained.
View solution
Q. The series of accesses between the open and close operations is a :
View solution
Q. Reliability of files can be increased by :
View solution
Q. Protection is only provided at the _____ level.
View solution
Q. The main problem with access control lists is :
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Operating System? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!