1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
krek1111 [17]
3 years ago
7

In the two-level directory, if a user refers to a particular file then__________________ Select one: a. only his/her own UFD (us

er file directory) is searched b. first UFD (user file directory) is searched, then MFD (master file directory) c. first MFD (master file directory) is searched, then UFD (user file directory) d. only MFD (master file directory) is searched
Computers and Technology
1 answer:
Bingel [31]3 years ago
4 0

Answer:

c. first MFD (master file directory) is searched, then UFD (user file directory)

Explanation:

The location on a disk where computers stores data is generally known as a directory. The file information contained in a directory are namely; type, name, protection, mounting, position, location, size and usage. Also, a user may decide to perform one of these operations in a directory;

1. Create a file.

2. Delete a file.

3. Search for a file.

4. Rename a file.

5. List and traverse a directory.

The two-level directory structure, ensures that individual user has his or her own user file directory (UFD). The user file directories (UFD) are unique and have the same structures, and as such lists only the files of each user.

Please note that in the two-level directory, if a user refers to a particular file first MFD (master file directory) is searched, then UFD (user file directory) because the MFD is the highest level in the directory or it is at the top of the directory.

However, in the two-level directory, if a user refers to a particular file by its name only his or her own UFD (user file directory) is searched.

For instance, in the computer operating system, when a user enters his or her username only his or her own user file directory (UFD) is searched.

<em>Hence, the two-level directory is more reliable than a single-level directory as it is used to solve the problem associated with name-collisions. </em>

You might be interested in
You are starting a small web hosting business and
Studentka2010 [4]

Answer:

otp

Explanation:

don't know bro ask to your teacher

7 0
2 years ago
Rows within a spreadsheet are identified by:
EleoNora [17]

Answer:

Option C: Numbers.

Explanation:

By default, rows within a spreadsheet are identified by Numbers i.e. 1,2,3,............

Total rows are 1048575 in one spreadsheet.

7 0
3 years ago
Gini is a manager at a website design firm. She has a timeline prepared for the product to be delivered to the client. She needs
Grace [21]

Answer:

The correct answer is letter "A": controlling.

Explanation:

There are four (4) basic management skills: <em>Planning, Controlling, Organizing, </em>and <em>Leading.  </em>

Controlling implies reviewing the objectives the firm has established to evaluate the progress. It also involves measuring the resources the firm has available for reaching its goals and verifying if they will be enough to get to the finish line, otherwise, the company should find more efficient forms of allocating resources and funding its operations.

In other words, <em>the controlling skill of management sets the standards of performance within the institution.</em>

7 0
2 years ago
Read 2 more answers
How do the World Wide Web and the Internet work together?
Firlakuza [10]

Answer:

Explanation:

The relationship between the World Wide Web and the Internet is that the Internet is a collection of connected computers through gateways by which the information that is stored in databases and on servers is transferred from one computer to another and the World Wide Web is the software that is used to retrieve the information requested by the users.  The World Wide Web (which we call the Web because we’re lazy typists) lives “on top of” the Internet. The Internet’s network is at the core of the Web, and the Web is like an attractive parasite that requires the Net for survival (dummies.com, 2010).  The Web page that are accessible on the web usually contain hypertext links and are sometimes called links. These links connect to other pages that are store on the same or even a different server; these servers can be in any location throughout the World.  This system of interlinked documents is known as hypertext (Dummies.com, 2010).

Links can create connections that let you go directly to related information. These invisible connections between pages are like the threads of a spider web — as you click from Web page to Web page, you can envision the Web created by the links. What’s so remarkable about the Web is that it connects pieces of information from all around the planet, on different computers and in different databases (Dummies.com, 2010).  Every Web page has a name attached to it so that browsers, and you, can find it. The name of this naming convention: URL, or Uniform Resource Locator. Every Web page has a URL, a series of characters that begins with http://. (Pronounce each letter, “U-R-L” — no one says “earl.”), (Dummies.com, 2010).  The Internet is a world wide network of computers that are connected (networked) and are using the communication method called TCP/IP. The Internet was named ARPANET in 1969 by the Advanced Research Projects Agency of the U.S. Department of Defence with just four computers connected together (Comentum.com, 2010).  The Internet, sometimes called simply “the Net,” is a worldwide system of computer networks – a network of networks in which users at any one computer can, if they have permission, get information from any other computer (SearchWinDevelopment.com, 2010).  Computers are connected to the Internet via modems and gateways. Some computers are used as servers which are continuously connected to the Internet and used to store web pages; these computers are usually referred to as servers. A house hold computer is primarily used by ordinary people to search for information on the web is usually known as a client. The request for information or search result is passed by the browser on the client to the server that contains the pages which have the relevant information in them via the net. The request passes through the modem then along the net to the correct server, the server then serves up the correct page, which is then sent back to client computer and presented to the user through the browser.

5 0
3 years ago
3. In a 32-bit CPU, the largest integer that we can store is 2147483647. Verify this with a
Semenov [28]

Answer:

No, it can't be verified with a pseudocode.

Explanation:

We can not verify this with a pseudocode because the largest integer that we can store in 32-bit integer goes by the formula 2^32 - 1 = 4, 294, 967,295 and this means that it has 32 ones. Or it may be 2^31 - 1 = 2, 147, 483,647 which is a two complement signed integer.

Despite the fact that it can not be verified by using pseudocode, we can do the Verification by writting programs Through some programming language or in plain English code.

In a 32-bit CPU, the largest integer that we can store is 2147483647 because we can store integer as 2^31 and - (2^31 + 1).

5 0
2 years ago
Other questions:
  • "2. what are the advantages and disadvantages of using the serial console connection compared to the usb console connection to a
    15·1 answer
  • The _____ dialog box lets you specify which files are to be merged.
    14·1 answer
  • If you're unsure of what chart to use for a set of data, what feature does Excel include that will help you to decide?
    7·1 answer
  • Jack used primarily web sources for his informative speech about gun control. however, his over-reliance on the web site sponsor
    11·1 answer
  • highlight the possible risks and problems that should be address during the implementation of information system process
    5·1 answer
  • The graph shows households in the world with internet access from 2003 to 2019. A graph titled Percentage of Households with Int
    6·2 answers
  • Which of the following tools enables a production mixer to sync audio and video?
    7·1 answer
  • Is orange named after the fruit or of the color?
    9·1 answer
  • I like the impact that the increasing number of social grants may have on the things mothers​
    14·1 answer
  • What makes a source credible?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!