1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
krek1111 [17]
4 years ago
7

In the two-level directory, if a user refers to a particular file then__________________ Select one: a. only his/her own UFD (us

er file directory) is searched b. first UFD (user file directory) is searched, then MFD (master file directory) c. first MFD (master file directory) is searched, then UFD (user file directory) d. only MFD (master file directory) is searched
Computers and Technology
1 answer:
Bingel [31]4 years ago
4 0

Answer:

c. first MFD (master file directory) is searched, then UFD (user file directory)

Explanation:

The location on a disk where computers stores data is generally known as a directory. The file information contained in a directory are namely; type, name, protection, mounting, position, location, size and usage. Also, a user may decide to perform one of these operations in a directory;

1. Create a file.

2. Delete a file.

3. Search for a file.

4. Rename a file.

5. List and traverse a directory.

The two-level directory structure, ensures that individual user has his or her own user file directory (UFD). The user file directories (UFD) are unique and have the same structures, and as such lists only the files of each user.

Please note that in the two-level directory, if a user refers to a particular file first MFD (master file directory) is searched, then UFD (user file directory) because the MFD is the highest level in the directory or it is at the top of the directory.

However, in the two-level directory, if a user refers to a particular file by its name only his or her own UFD (user file directory) is searched.

For instance, in the computer operating system, when a user enters his or her username only his or her own user file directory (UFD) is searched.

<em>Hence, the two-level directory is more reliable than a single-level directory as it is used to solve the problem associated with name-collisions. </em>

You might be interested in
If you wish to include a header or footer on all pages in a publication, you will need to insert this by navigating to the _____
Marina86 [1]
If you wish to include a header or footer on all pages in a publication, you will need to insert this by navigation to the master page.
7 0
4 years ago
Read 2 more answers
Swapping two numbers
Tju [1.3M]

Answer:

Swapping two numbers means exchange the values of two variables with each other.

8 0
3 years ago
A computer on a network that is not the server​
katrin [286]

Answer:

A peer-to-peer network is one in which two or more PCs share files and access to devices such as printers without requiring a separate server computer or server software. ... A P2P network can be an ad hoc connection—a couple of computers connected via a Universal Serial Bus to transfer files.

5 0
3 years ago
Technical skills are also called soft skills.<br> Question 9 options:<br> True<br> False
mestny [16]

The statement is false, technical skills are those that serve to perform a specific function and are also called hard skills.

Technical skills are skills that include knowledge in the mechanical, computer, mathematical or scientific area that will allow a good performance of specific tasks.

  • A person with technical or hard skills is able to apply specific methods, procedures and techniques in a specialized field.

  • Soft skills refers to the characteristics and personal competencies that show how a person copes with others, it is related to emotional intelligence.

Therefore, we can conclude that technical or hard skills are the practical knowledge necessary to perform specific tasks, while soft skills are those skills associated with the ability to interact effectively on a personal level.

Learn more about technical skills here: brainly.com/question/10976877

8 0
2 years ago
Which security testing activity uses tools that scan for services running on systems? reconnaissance penetration testing network
Fiesta28 [93]

Answer:

Network mapping.

Explanation:

Network mapping seems to be the method of mapping the server visibly and rationally in order to determine the relations at mid of the network as well as the not same nodes.

  • Network mapping is the practice of security checking using software to search against services running on networks.
  • Network performance applications and software contains certain network mapping functions that customize the network
7 0
3 years ago
Other questions:
  • Explain how buyers and sellers factor into setting the stock price for a company’s shares.
    13·1 answer
  • The measure of the maximum amount of data that can travel through a computer’s communications path in a given amount of time is
    9·1 answer
  • ………………….. is the process of causing a system variable to conform to some desired value. Options Control feedback Design none of
    9·1 answer
  • You can install several printers on your machine, but at least one must be the _______ printer.
    6·1 answer
  • Which of the following is a step in paraphrasing? Skim the original information to get a sense of what it is about. Select a few
    15·2 answers
  • When an application contains just one version of a method, you can call the method using a(n) ____ of the correct data type.
    6·1 answer
  • What is the top 3 cloud provider in the world with statics or data including the example and reason(s).
    11·1 answer
  • Do you think JNK should be more ethical?
    6·1 answer
  • What is the main circuit board inside the computer called?CD-ROMY
    12·1 answer
  • What company was affected by the cloudbleed vulnerability?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!