Deck 8: File Management

ملء الشاشة (f)
exit full mode
سؤال
Files cannot be converted from sequential to direct or vice versa.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A record is a group of related bytes that can be identified by the user with a name, type, and size.
سؤال
Sequential record organization is by far the easiest to implement because records are stored and retrieved serially, one after the other.
سؤال
When someone creates a folder, the system creates a subdirectory in the current directory or folder.
سؤال
It is easy to calculate the location of a variable-length record.
سؤال
In newer operating systems, a subdirectory is created when a user opens an account to access the computer system.
سؤال
An indexed sequential file does not have overflow areas.
سؤال
The computer system defines a file by activating the appropriate secondary storage device and loading the file into memory while updating its records of who is using what file.
سؤال
When a user gives a command to modify the contents of a file, it's actually a command to access folders within the file.
سؤال
The relative filename is the name that is selected by the File Manager when the file is created.
سؤال
Each volume can only contain a single file.
سؤال
Directories are special files with listings of filenames and their attributes.
سؤال
Tree structures are inefficient for searching because there are fewer entries in each directory.
سؤال
A file descriptor usually contains only a file name and the directory name in which the file is located.
سؤال
An extension is usually two or three characters long and is separated from the relative name by a period.
سؤال
The File Manager is in charge of the system's physical components, its information resources, and the policies used to store and distribute the files.
سؤال
Without the File Manager, every program would need to include instructions to operate all of the different types of devices, and all of the different models within each type.
سؤال
Examples of batch commands are CREATE, DELETE, RENAME, and COPY.
سؤال
Although noncontiguous allocation schemes eliminate external storage fragmentation and the need for compaction, they don't support direct access because there's no easy way to determine the exact location of a specific record.
سؤال
The File Manager keeps track of the empty storage areas by treating them as files.
سؤال
A ____ is created when a user opens an account to access the computer system.

A) directory
B) volume
C) subdirectory
D) MFD
سؤال
For every file request, the ____ is the point of entry.

A) file location
B) volume location
C) subdirectory
D) MFD
سؤال
On magnetic disks, files can be organized in one of three ways; ____.

A) indexed direct, indexed indirect, or random
B) sequential, indirect, or direct
C) sequential, random, or indirect
D) sequential, direct, or indexed sequential
سؤال
A ____ is a group of related records that contains information to be used by specific application programs to generate reports.

A) field
B) record group
C) file
D) directory
سؤال
Access methods are dictated by a file's organization; the most flexibility is allowed with indexed sequential files and the least with sequential.
سؤال
____ is a specialized WRITE command for existing data files that allows for appending records or for rewriting selected records in their original place in the file.

A) APPEND
B) UPDATE
C) REWRITE
D) MODIFY
سؤال
Data in a fixed-length field might include a short name followed by many blank characters; it can be replaced with a variable-length field and a special code to indicate how many blanks were truncated.
سؤال
When data is stored in fixed length fields, data that extends beyond the fixed size ____.

A) generates an operating system error
B) is truncated
C) is broken up and stored in more than one field
D) combines multiple fields to accommodate the data
سؤال
____ are special files with listings of filenames and their attributes.

A) Databases
B) Directories
C) Programs
D) Data files
سؤال
The purpose of an extension is to ____.

A) identify the directory in which the file is stored
B) identify the type of file
C) identify the file size
D) identify the file owner
سؤال
The File Manager writes the volume name and other descriptive information on an easy-to-access place on each unit: ____ of the CD or DVD.

A) the outermost part
B) the innermost part
C) immediately following the master file directory
D) stored at the beginning of the volume
سؤال
In a networked environment using the OpenVMS Alpha operating system, a file might be named VAX2::USR3:[IMFST.FLYNN]INVENTORY_COST.DOC;7. ____ is the volume where the file is stored?

A) VAX2
B) USR3
C) IMFST
D) FLYNN
سؤال
Many computer users and some operating systems call subdirectories ____.

A) folders
B) files
C) volumes
D) databases
سؤال
As long as users refer to files in the ____ directory, they can access their files without entering the complete name from the highest level to the lowest.

A) root
B) working
C) home
D) default
سؤال
When using random access files, the program used to store the data follows a set of instructions, called a ____ algorithm, that transforms each key into a number, the record's logical address.

A) hashing
B) grouping
C) translation
D) lookup
سؤال
To achieve its goals, the File Manager must be able to accommodate a variety of file organizations, physical storage allocation schemes, record types, and access methods.
سؤال
Many systems force users to have their files organized for fixed-length records if the records are to be accessed directly.
سؤال
A UNIX or Linux system might identify a file as: /usr/imfst/flynn/inventory.doc. What represents the root directory is ____.

A) /
B) usr
C) imfst
D) flynn
سؤال
The File Manager is in charge of the system's ____ components.

A) data
B) software
C) electronic
D) physical
سؤال
In a file management system, information is passed from the Device Manager at the top of the hierarchy to the File Manager at the bottom.
سؤال
In noncontiguous storage, linking can take place at the ____ level where each part of the file points to the next one in the sequence.

A) subdirectory
B) file
C) directory
D) storage
سؤال
In indexed storage, when a file is created, the pointers in the index block are all set to ____.

A) the end of the volume
B) the beginning of the volume
C) null
D) zero
سؤال
____ formula computes the byte address for a direct access file with fixed record length.

A) CBA = (RN - 1) * RL
B) CBA = RN * RL
C) CBA = RN / RL
D) CBA = (RN + 1) * RL
سؤال
The primary disadvantage of contiguous storage is that ____.

A) it is hard to implement and manage
B) it is difficult to find information in files
C) file can't be expanded unless there is empty space available immediately following it
D) it is an inefficient use of space
سؤال
The most commonly used access control scheme is the ____.

A) access control matrix
B) access control list
C) capability list
D) capability matrix
سؤال
____ compression is a technique used to save space in files.

A) Text
B) Space
C) Data
D) Character
سؤال
When using indexed sequential record organization, each entry in the index file contains the ____ and the physical location of the data block where this record, and the records with smaller keys, are stored.

A) last record name
B) highest record key
C) lowest record key
D) first record name
سؤال
____ might be an encoded version of ADAMSbbbbbbbbbb?

A) ADAMSx10
B) ASbb
C) AD2MSb10
D) ADAMSb10
سؤال
____ allocation allows files to use any storage space available on the disk.

A) Contiguous storage
B) Noncontiguous storage
C) Fragmented storage
D) Add-on storage
سؤال
The File Manager uses the address of the ____ to access the next sequential record.

A) first byte read
B) last byte read
C) first byte in the file
D) index record
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 8: File Management
1
Files cannot be converted from sequential to direct or vice versa.
False
2
A record is a group of related bytes that can be identified by the user with a name, type, and size.
False
3
Sequential record organization is by far the easiest to implement because records are stored and retrieved serially, one after the other.
True
4
When someone creates a folder, the system creates a subdirectory in the current directory or folder.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
It is easy to calculate the location of a variable-length record.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
In newer operating systems, a subdirectory is created when a user opens an account to access the computer system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
An indexed sequential file does not have overflow areas.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
The computer system defines a file by activating the appropriate secondary storage device and loading the file into memory while updating its records of who is using what file.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
When a user gives a command to modify the contents of a file, it's actually a command to access folders within the file.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
The relative filename is the name that is selected by the File Manager when the file is created.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
Each volume can only contain a single file.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
Directories are special files with listings of filenames and their attributes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
Tree structures are inefficient for searching because there are fewer entries in each directory.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
A file descriptor usually contains only a file name and the directory name in which the file is located.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
An extension is usually two or three characters long and is separated from the relative name by a period.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
The File Manager is in charge of the system's physical components, its information resources, and the policies used to store and distribute the files.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
Without the File Manager, every program would need to include instructions to operate all of the different types of devices, and all of the different models within each type.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
Examples of batch commands are CREATE, DELETE, RENAME, and COPY.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
Although noncontiguous allocation schemes eliminate external storage fragmentation and the need for compaction, they don't support direct access because there's no easy way to determine the exact location of a specific record.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
The File Manager keeps track of the empty storage areas by treating them as files.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
A ____ is created when a user opens an account to access the computer system.

A) directory
B) volume
C) subdirectory
D) MFD
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
For every file request, the ____ is the point of entry.

A) file location
B) volume location
C) subdirectory
D) MFD
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
On magnetic disks, files can be organized in one of three ways; ____.

A) indexed direct, indexed indirect, or random
B) sequential, indirect, or direct
C) sequential, random, or indirect
D) sequential, direct, or indexed sequential
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
A ____ is a group of related records that contains information to be used by specific application programs to generate reports.

A) field
B) record group
C) file
D) directory
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
Access methods are dictated by a file's organization; the most flexibility is allowed with indexed sequential files and the least with sequential.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
____ is a specialized WRITE command for existing data files that allows for appending records or for rewriting selected records in their original place in the file.

A) APPEND
B) UPDATE
C) REWRITE
D) MODIFY
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
Data in a fixed-length field might include a short name followed by many blank characters; it can be replaced with a variable-length field and a special code to indicate how many blanks were truncated.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
When data is stored in fixed length fields, data that extends beyond the fixed size ____.

A) generates an operating system error
B) is truncated
C) is broken up and stored in more than one field
D) combines multiple fields to accommodate the data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
____ are special files with listings of filenames and their attributes.

A) Databases
B) Directories
C) Programs
D) Data files
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
The purpose of an extension is to ____.

A) identify the directory in which the file is stored
B) identify the type of file
C) identify the file size
D) identify the file owner
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
The File Manager writes the volume name and other descriptive information on an easy-to-access place on each unit: ____ of the CD or DVD.

A) the outermost part
B) the innermost part
C) immediately following the master file directory
D) stored at the beginning of the volume
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
In a networked environment using the OpenVMS Alpha operating system, a file might be named VAX2::USR3:[IMFST.FLYNN]INVENTORY_COST.DOC;7. ____ is the volume where the file is stored?

A) VAX2
B) USR3
C) IMFST
D) FLYNN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
Many computer users and some operating systems call subdirectories ____.

A) folders
B) files
C) volumes
D) databases
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
As long as users refer to files in the ____ directory, they can access their files without entering the complete name from the highest level to the lowest.

A) root
B) working
C) home
D) default
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
When using random access files, the program used to store the data follows a set of instructions, called a ____ algorithm, that transforms each key into a number, the record's logical address.

A) hashing
B) grouping
C) translation
D) lookup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
To achieve its goals, the File Manager must be able to accommodate a variety of file organizations, physical storage allocation schemes, record types, and access methods.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
Many systems force users to have their files organized for fixed-length records if the records are to be accessed directly.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
A UNIX or Linux system might identify a file as: /usr/imfst/flynn/inventory.doc. What represents the root directory is ____.

A) /
B) usr
C) imfst
D) flynn
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
The File Manager is in charge of the system's ____ components.

A) data
B) software
C) electronic
D) physical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
In a file management system, information is passed from the Device Manager at the top of the hierarchy to the File Manager at the bottom.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
In noncontiguous storage, linking can take place at the ____ level where each part of the file points to the next one in the sequence.

A) subdirectory
B) file
C) directory
D) storage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
In indexed storage, when a file is created, the pointers in the index block are all set to ____.

A) the end of the volume
B) the beginning of the volume
C) null
D) zero
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
____ formula computes the byte address for a direct access file with fixed record length.

A) CBA = (RN - 1) * RL
B) CBA = RN * RL
C) CBA = RN / RL
D) CBA = (RN + 1) * RL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
The primary disadvantage of contiguous storage is that ____.

A) it is hard to implement and manage
B) it is difficult to find information in files
C) file can't be expanded unless there is empty space available immediately following it
D) it is an inefficient use of space
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
The most commonly used access control scheme is the ____.

A) access control matrix
B) access control list
C) capability list
D) capability matrix
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
____ compression is a technique used to save space in files.

A) Text
B) Space
C) Data
D) Character
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
When using indexed sequential record organization, each entry in the index file contains the ____ and the physical location of the data block where this record, and the records with smaller keys, are stored.

A) last record name
B) highest record key
C) lowest record key
D) first record name
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
____ might be an encoded version of ADAMSbbbbbbbbbb?

A) ADAMSx10
B) ASbb
C) AD2MSb10
D) ADAMSb10
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
____ allocation allows files to use any storage space available on the disk.

A) Contiguous storage
B) Noncontiguous storage
C) Fragmented storage
D) Add-on storage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
The File Manager uses the address of the ____ to access the next sequential record.

A) first byte read
B) last byte read
C) first byte in the file
D) index record
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.