1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Goryan [66]
4 years ago
12

Consider a file system in which a file can be deleted and its disk space reclaimed while links to that file still exist. What pr

oblems may occur if a new file is created in the same storage area or with the same absolute path name? How can these problems be avoided?
Computers and Technology
1 answer:
goldfiish [28.3K]4 years ago
8 0

Answer:

By keeping track of file links and deleting them along with the files

Explanation:

when different users create different files with the same name, and one tries to open one of the files, the first file that is found on the VTOC of the disk will be opened. These problems can be avoided by  tracking of all links to a file, and whenever there is a need to delete a file,  the link to the file as well should be deleted.

You might be interested in
Which security measure provides protection from IP spoofing?
anyanavicka [17]

Answer:

An SSL also provides protection from IP spoofing.

8 0
3 years ago
_______ data updates in your destination document if there are changes to the source data.
Lynna [10]
Linked or integrated
5 0
3 years ago
In a three-tier architecture, the component that runs the program code and enforces the business processes is the:_______.
madam [21]

Answer:

Application Server

Explanation:

The Application Server is a component in computer engineering that presents the application logic layer in a three-tier architecture.

This functionality allows client components to connect with data resources and legacy applications.

In this process of interaction, the Application Server runs the program code from Tier 1 - Presentation, through Tier 2 - Business Logic to Tier 3 - Resources, by forcing through the business processes.

8 0
3 years ago
Por que se dice que las TIC´S son las integracion de las TI y las TC?
Katena32 [7]

La respuesta correcta para esta pregunta abierta es la siguiente.

A pesar de que no se anexan opciones o incisos para responder, podemos comentar lo siguiente.

Se dice que las TIC´S son las integración de las TI y las TC porque ambas actividades se han integrado o fusionado en una solo concepto al momento de juntar las herramientas tecnológicas para almacenar, procesar y mandar información a través de los recursos tecnológicos utilizando los canales o recursos de los medios masivas de comunicación como lo son las redes satelitales o las comunicaciones vía microondas.

Al fusionarse las TI (Tecnologías de la Información) con las TC (Tecnologías de Comunicación), se maximiza la capacidad de enviar una mayor cantidad de información al momento a diferentes lugares del planeta.

4 0
3 years ago
How does a push system differ from a pull system?
sergeinik [125]
Well if were talking about computer cooling, push system is like it seems pushing air into the computer, pull system is taking out air!! the best systems have both to get the optimal cooling possible!!!
3 0
3 years ago
Other questions:
  • Consider the following scenario and prescribe a solution. Situation: Tenisha is moving to Ohio to attend college. It is very hum
    15·1 answer
  • A*+(B+c|3) how do you figure out the coding for this
    14·1 answer
  • Are the advantages of a climate control in a vehicle
    10·2 answers
  • The _____ lets you see what styles have been applied to specific parts of a document, such as headings.
    9·1 answer
  • IN JAVA Write a program with total change amount as an integer input that outputs the change using the fewest coins, one coin ty
    15·1 answer
  • Why are peripherals added to computers?
    12·1 answer
  • The following program calculates yearly and monthly salary given an hourly wage. The program assumes a work-hours-per-week of 40
    8·1 answer
  • Where are the values the computer is directly working with at a particular moment in time stored?
    8·1 answer
  • Why is it essential for every person living in the 21st century to have a computer​
    9·1 answer
  • Choose 2 statements that correctly describe the time complexity of data structures with N data.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!