adplus-dvertising
frame-decoration

Question

When a cycle exists, the reference count maybe non zero, even when it is no longer possible to refer to a directory or file, due to _______

a.

the possibility of one hidden reference

b.

the possibility of two hidden references

c.

the possibility of self referencing

d.

none of the mentioned

Posted under Operating System

Answer: (c).the possibility of self referencing

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. When a cycle exists, the reference count maybe non zero, even when it is no longer possible to refer to a directory or file, due to _______

Similar Questions

Discover Related MCQs

Q. A mount point is :

Q. When a file system is mounted over a directory that is not empty :

Q. In UNIX, exactly which operations can be executed by group members and other users is definable by :

Q. A process _____ lower the priority of another process, if both are owned by the same owner.

Q. In distributed file system, ______ directories are visible from the local machine.

Q. In the world wide web, a ____ is needed to gain access to the remote files, and seperate operations are used to transfer files.

Q. Anonymous access allows a user to transfer files :

Q. The machine containing the files is the _______ and the machine wanting to access the files is the ______

Q. Distributed naming services/Distributed information systems have been devised to :

Q. Domain name system provides :

Q. To recover from failures in the network operations, ______ information maybe maintained.

Q. The series of accesses between the open and close operations is a :

Q. Reliability of files can be increased by :

Q. Protection is only provided at the _____ level.

Q. The main problem with access control lists is :

Q. Many systems recognize three classifications of users in connection with each file (to condense the access control list) :

Q. All users in a group get _______ access to a file.

Q. Universe consists of :

Q. In UNIX, groups can be created and modified by :

Q. To control access the three bits used in UNIX are represented by :