File System & Security, Unix

File System & Security, Unix

University

16 Qs

quiz-placeholder

Similar activities

LECTURE QUIZ IM

LECTURE QUIZ IM

University

20 Qs

Operating System Quiz

Operating System Quiz

University

15 Qs

Quiz on Access Control Models

Quiz on Access Control Models

University

20 Qs

OS quiz

OS quiz

University

20 Qs

quiz for operating system,Iot,Data science

quiz for operating system,Iot,Data science

University

20 Qs

Linux Essentials

Linux Essentials

University

15 Qs

AOS Quiz

AOS Quiz

University

20 Qs

LINUX OPERATING SYSTEM

LINUX OPERATING SYSTEM

University

15 Qs

File System & Security, Unix

File System & Security, Unix

Assessment

Quiz

Computers

University

Hard

Created by

Jenny Ragay

FREE Resource

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

It is a sequence of characters organized into lines.

object file

text file

source file

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

The records are accessed in some sequence, i.e., the information in the file is processed in order, one record after the other. This access method is the most primitive one.

Sequential access

Indexed sequential access

Direct/Random access

3.

FILL IN THE BLANK QUESTION

1 min • 9 pts

Files are allocated disk spaces by operating system. Operating systems deploy three main ways to allocate disk space to files. What are these?

4.

FILL IN THE BLANK QUESTION

1 min • 5 pts

In this one, an index block is created having all pointers to files. Each file has its own index block which stores the addresses of disk space occupied by the file. What method of space allocation is used here?

5.

FILL IN THE BLANK QUESTION

1 min • 5 pts

It refers to identifying each user of the system and associating the executing programs with those users.

6.

FILL IN THE BLANK QUESTION

1 min • 5 pts

In this system, a unique password is required every time user tries to login into the system. Once this password is used, then it cannot be used again.

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

It can replicate itself on the computer system. It is highly dangerous and can modify/delete user files, crash systems. It is generally a small code embedded in a program.

Logic Bomb

Trojan Horse

Virus

Trap Door

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?