1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
krek1111 [17]
4 years ago
7

In the two-level directory, if a user refers to a particular file then__________________ Select one: a. only his/her own UFD (us

er file directory) is searched b. first UFD (user file directory) is searched, then MFD (master file directory) c. first MFD (master file directory) is searched, then UFD (user file directory) d. only MFD (master file directory) is searched
Computers and Technology
1 answer:
Bingel [31]4 years ago
4 0

Answer:

c. first MFD (master file directory) is searched, then UFD (user file directory)

Explanation:

The location on a disk where computers stores data is generally known as a directory. The file information contained in a directory are namely; type, name, protection, mounting, position, location, size and usage. Also, a user may decide to perform one of these operations in a directory;

1. Create a file.

2. Delete a file.

3. Search for a file.

4. Rename a file.

5. List and traverse a directory.

The two-level directory structure, ensures that individual user has his or her own user file directory (UFD). The user file directories (UFD) are unique and have the same structures, and as such lists only the files of each user.

Please note that in the two-level directory, if a user refers to a particular file first MFD (master file directory) is searched, then UFD (user file directory) because the MFD is the highest level in the directory or it is at the top of the directory.

However, in the two-level directory, if a user refers to a particular file by its name only his or her own UFD (user file directory) is searched.

For instance, in the computer operating system, when a user enters his or her username only his or her own user file directory (UFD) is searched.

<em>Hence, the two-level directory is more reliable than a single-level directory as it is used to solve the problem associated with name-collisions. </em>

You might be interested in
What do you think of the FNAF plus trailer? if you have seen it tell me who looks better
Drupady [299]

Answer:

Explanation:

bonnie looks the best, freddy looks better, and chica looks awsome, in my opinion this looks better than the original fnaf

4 0
3 years ago
Write a flowchart and C code for a program that does the following: Uses a do...while loop. Prints the numbers from 1 to 10 with
emmasim [6.3K]

Answer:

create the integer variable and initialize it to one, with the do statement, increment the variable by one and print it, then the while statement checks if the variable is less than or equal to 10.

#include <iostream>

using namespace std;

int main(){

   int i = 1;

   do {

       cout<< i << "\n";

       i++;

   }

   while (i <= 10);

}

Explanation:

The C++ source code initializes the integer variable i to one and increments and print the value if the value is less than or equal to ten. The do-while statement executes a block of code before the condition is implemented.

4 0
3 years ago
Which city is the largest within the Andean and midlatitude countries? A. Buenos Aires, Argentina B. La Paz, Bolivia C. Santiago
Westkost [7]
My best guess would be either B. or C. 
Hope I helped:)
8 0
3 years ago
Read 2 more answers
What role do career pathways play?
Dvinal [7]
Career pathways lay out the academic courses, skills, and knowledge required for a postion
3 0
3 years ago
Read 2 more answers
When you use the ip address of the web server, the correct site is displayed?
jekas [21]
No. Using the address will get you either the default site, or the first site declared. Web servers can host VirtualHosts, and rely on the site name to know which VirtualHost to serve. TMI, it's called name based virtual host, as opposed to the machine having many addresses then address based virtual hosts can be created.
6 0
4 years ago
Other questions:
  • An Open Authorization (OAuth) access token would have a _____ that tells what the third party app has access to
    5·1 answer
  • What three components should be included in a computer that is used to create TV commercials and music videos? (Choose three.
    15·2 answers
  • Victor has been murdered, and Art, Bob, and Carl are suspects. Art says he did not do it. He says that Bob was the victim's frie
    14·1 answer
  • In which two ways do extras function in a drama
    11·1 answer
  • Who was the founder of the location-sharing site Whrrl
    6·1 answer
  • Tricia is managing tasks that have been assigned to her. She needs to enter mileage information in relation to a project. Which
    5·1 answer
  • The type code for an int array is 'b'. What line of code creates an array of int data values?
    8·1 answer
  • Among the aforementioned parts, the FLASH DRIVE is the most common. Why do you think a flash drive will be essential for you as
    5·1 answer
  • Do you want to install the updates how?
    8·1 answer
  • What is the most popular gaming computer brand rn, 2022
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!