adplus-dvertising
frame-decoration

Question

In a multilevel directory structure :

a.

the same previous techniques will be used as in the other structures

b.

a mechanism for directory protection will have to applied

c.

the subdirectories do not need protection once the directory is protected

d.

none of the mentioned

Posted under Operating System

Answer: (b).a mechanism for directory protection will have to applied

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. In a multilevel directory structure :

Similar Questions

Discover Related MCQs

Q. In UNIX, the directory protection is handled _________ to the file protection.

Q. Disks are segmented into one or more partitions, each containing a file system or ______

Q. The three major methods of allocating disk space that are in wide use are :

Q. In contiguous allocation :

Q. In linked allocation :

Q. In indexed allocation :

Q. On systems where there are multiple operating system, the decision to load a particular one is done by :

Q. The VFS (virtual file system) activates file system specific operations to handle local requests according to their _______

Q. The real disadvantage of a linear list of directory entries is the :

Q. Contiguous allocation of a file is defined by :

Q. One difficulty of contiguous allocation is :

Q. _______ and ________ are the most common strategies used to select a free hole from the set of available holes.

Q. The first fit and best fit algorithms suffer from :

Q. To solve the problem of external fragmentation, ________ needs to be done periodically.

Q. If too little space is allocated to a file

Q. A device driver can be thought of as a translator. Its input consists of _____ commands and output consists of _______ instructions.

Q. The file organization module knows about :

Q. Metadata includes :

Q. For each file their exists a ___________ that contains information about the file, including ownership, permissions and location of the file contents.

Q. For processes to request access to file contents, they need to :