1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
krek1111 [17]
4 years ago
7

In the two-level directory, if a user refers to a particular file then__________________ Select one: a. only his/her own UFD (us

er file directory) is searched b. first UFD (user file directory) is searched, then MFD (master file directory) c. first MFD (master file directory) is searched, then UFD (user file directory) d. only MFD (master file directory) is searched
Computers and Technology
1 answer:
Bingel [31]4 years ago
4 0

Answer:

c. first MFD (master file directory) is searched, then UFD (user file directory)

Explanation:

The location on a disk where computers stores data is generally known as a directory. The file information contained in a directory are namely; type, name, protection, mounting, position, location, size and usage. Also, a user may decide to perform one of these operations in a directory;

1. Create a file.

2. Delete a file.

3. Search for a file.

4. Rename a file.

5. List and traverse a directory.

The two-level directory structure, ensures that individual user has his or her own user file directory (UFD). The user file directories (UFD) are unique and have the same structures, and as such lists only the files of each user.

Please note that in the two-level directory, if a user refers to a particular file first MFD (master file directory) is searched, then UFD (user file directory) because the MFD is the highest level in the directory or it is at the top of the directory.

However, in the two-level directory, if a user refers to a particular file by its name only his or her own UFD (user file directory) is searched.

For instance, in the computer operating system, when a user enters his or her username only his or her own user file directory (UFD) is searched.

<em>Hence, the two-level directory is more reliable than a single-level directory as it is used to solve the problem associated with name-collisions. </em>

You might be interested in
When you take action independent of direct instruction, you are showing _____.
ozzi

Answer:

Option A, initiative

Explanation:

Initiation is an art of performing an act or task by self motivation rather on command or instruction from anyone.

Insubordination is incorrect as here there is no mentioning of disobeying seniors or authority

Also, courage and power means having strength to perform any task. Here action is performed without any instruction and it in no sense signifies a brave deed.

Hence, option A is correct

8 0
3 years ago
The Internet has made it possible for most people to order all of their clothing online. While this may be a preference for some
suter [353]

Answer:

Explanation:

Based on the information provided in this scenario it can be said that this is likely due to there being a cultural lag between having the Internet and using the technology to its full capacity. Cultural lag refers to the notion that culture takes time to catch up with technological innovations, mainly due to not everyone has access to the new technology. As years pass a specific technological advancement becomes more readily accessible to the wider public as is thus more widely adopted.

3 0
3 years ago
"If a program attempts to modify (or, sometimes, even to read) the contents of memory locations that do not belong to it, the op
Monica [59]

The operating system's memory protection routine intervenes and (usually) terminates the program if a program attempts to modify (or, sometimes, even to read) the contents of memory locations that do not belong to it.

Further Explanation

The memory protection routine is most commonly used in multi-programmed systems to prevent one process from affecting the availability of another. When a user opens up multiple processes, by default, they usually reside at the same time in the main memory. Sometimes, a program may attempt to access, modify, or read memory locations allocated to other processes. When this happens, the memory protection program jumps in. Keep in mind that the memory manager somehow works hand in hand with the memory protection routine. It protects the OS from being accessed by other processes and these processes from accessing one another. In addition, it helps save memory by allocating the same amount of memory to all running processes. The memory protection program, on the other hand, should be able to allow controlled sharing of memory among different processes and will usually terminate a program that tries to modify content of memory locations of that does not belong to it.

Learn More about Memory management

brainly.com/question/14241634

#LearnWithBrainly

3 0
3 years ago
Which of the following websites can help you learn about general career trends?
Ber [7]
The answer is vocational information center as this area or website provides a person or a student to explore careers that could be suitable to his or her liking and to show careers or professions' role as they work. This website is a way of educating an individual of having to provide informations regarding about careers.
8 0
3 years ago
Dr. Joon asks her students how to insert a table in an Excel workbook. The students record the steps a chart. Which students lis
Leona [35]

Answer:

C

Explanation:

Both Table and Format as Table can be used to create a table

4 0
3 years ago
Other questions:
  • What is the name of the contextual or specific tab that appears in page layout view when adding a header
    15·1 answer
  • (15 POINTS) When an error is made in HTML code, the browser does what?
    11·1 answer
  • An image that has been saved in Tagged Image File Format (or .TIF) is A. readable only by Windows personal computers. B. a recto
    6·1 answer
  • Remote wiping is a device security control that allows an organization to remotely erase data or email in the event of loss or t
    10·2 answers
  • Does Buzz or APEX shows all your due assignments on the left of the main home screen?
    11·1 answer
  • What is ana absolute adress
    11·1 answer
  • Java code?????
    12·1 answer
  • Check My Work Sherri is considering replacing a processor on her laptop. The laptop is running slower than she would like. What
    9·1 answer
  • What constructs break or bend the normal Syntax patterns of scheme?
    15·1 answer
  • Im learning about AI in my class and I'm confused about these two questions
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!