File System & Security, Unix

File System & Security, Unix

University

16 Qs

quiz-placeholder

Similar activities

APLIKASI KOMPUTER

APLIKASI KOMPUTER

University

15 Qs

True-False

True-False

University

20 Qs

Operating System

Operating System

University

15 Qs

INTRODUCTION TO WINDOWS

INTRODUCTION TO WINDOWS

University

13 Qs

ข้อสอบระบบปฏิบัติการคอมพิวเตอร์ 1

ข้อสอบระบบปฏิบัติการคอมพิวเตอร์ 1

University

20 Qs

Operating System

Operating System

University

16 Qs

LESSON 1 OS

LESSON 1 OS

University

20 Qs

Operating systems

Operating systems

10th Grade - University

20 Qs

File System & Security, Unix

File System & Security, Unix

Assessment

Quiz

Computers

University

Hard

Created by

Jenny Ragay

FREE Resource

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

It is a sequence of characters organized into lines.

object file

text file

source file

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

The records are accessed in some sequence, i.e., the information in the file is processed in order, one record after the other. This access method is the most primitive one.

Sequential access

Indexed sequential access

Direct/Random access

3.

FILL IN THE BLANK QUESTION

1 min • 9 pts

Files are allocated disk spaces by operating system. Operating systems deploy three main ways to allocate disk space to files. What are these?

4.

FILL IN THE BLANK QUESTION

1 min • 5 pts

In this one, an index block is created having all pointers to files. Each file has its own index block which stores the addresses of disk space occupied by the file. What method of space allocation is used here?

5.

FILL IN THE BLANK QUESTION

1 min • 5 pts

It refers to identifying each user of the system and associating the executing programs with those users.

6.

FILL IN THE BLANK QUESTION

1 min • 5 pts

In this system, a unique password is required every time user tries to login into the system. Once this password is used, then it cannot be used again.

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

It can replicate itself on the computer system. It is highly dangerous and can modify/delete user files, crash systems. It is generally a small code embedded in a program.

Logic Bomb

Trojan Horse

Virus

Trap Door

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?