Question
a.
the possibility of one hidden reference
b.
the possibility of two hidden references
c.
the possibility of self referencing
d.
none of the mentioned
Posted under Operating System
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. When a cycle exists, the reference count maybe non zero, even when it is no longer possible to refer to a directory or file, due to _______
Similar Questions
Discover Related MCQs
Q. A mount point is :
View solution
Q. When a file system is mounted over a directory that is not empty :
View solution
Q. In UNIX, exactly which operations can be executed by group members and other users is definable by :
View solution
Q. A process _____ lower the priority of another process, if both are owned by the same owner.
View solution
Q. In distributed file system, ______ directories are visible from the local machine.
View solution
Q. In the world wide web, a ____ is needed to gain access to the remote files, and seperate operations are used to transfer files.
View solution
Q. Anonymous access allows a user to transfer files :
View solution
Q. The machine containing the files is the _______ and the machine wanting to access the files is the ______
View solution
Q. Distributed naming services/Distributed information systems have been devised to :
View solution
Q. Domain name system provides :
View solution
Q. To recover from failures in the network operations, ______ information maybe maintained.
View solution
Q. The series of accesses between the open and close operations is a :
View solution
Q. Reliability of files can be increased by :
View solution
Q. Protection is only provided at the _____ level.
View solution
Q. The main problem with access control lists is :
View solution
Q. Many systems recognize three classifications of users in connection with each file (to condense the access control list) :
View solution
Q. All users in a group get _______ access to a file.
View solution
Q. Universe consists of :
View solution
Q. In UNIX, groups can be created and modified by :
View solution
Q. To control access the three bits used in UNIX are represented by :
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Operating System? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!