adplus-dvertising
frame-decoration

Question

When a file system is mounted over a directory that is not empty :

a.

the system may not allow the mount

b.

the system must allow the mount

c.

the system may allow the mount and the directory’s existing files will then be made obscure

d.

all of the mentioned

Answer: (c).the system may allow the mount and the directory’s existing files will then be made obscure

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. When a file system is mounted over a directory that is not empty :

Similar Questions

Discover Related MCQs

Q. In UNIX, exactly which operations can be executed by group members and other users is definable by :

Q. A process _____ lower the priority of another process, if both are owned by the same owner.

Q. In distributed file system, ______ directories are visible from the local machine.

Q. In the world wide web, a ____ is needed to gain access to the remote files, and seperate operations are used to transfer files.

Q. Anonymous access allows a user to transfer files :

Q. The machine containing the files is the _______ and the machine wanting to access the files is the ______

Q. Distributed naming services/Distributed information systems have been devised to :

Q. Domain name system provides :

Q. To recover from failures in the network operations, ______ information maybe maintained.

Q. The series of accesses between the open and close operations is a :

Q. Reliability of files can be increased by :

Q. Protection is only provided at the _____ level.

Q. The main problem with access control lists is :

Q. Many systems recognize three classifications of users in connection with each file (to condense the access control list) :

Q. All users in a group get _______ access to a file.

Q. Universe consists of :

Q. In UNIX, groups can be created and modified by :

Q. To control access the three bits used in UNIX are represented by :

Q. If each access to a file is controlled by a password, then the disadvantage is that :

Q. In a multilevel directory structure :