Deck 8: File Management
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 8: File Management
1
Files cannot be converted from sequential to direct or vice versa.
False
2
A record is a group of related bytes that can be identified by the user with a name, type, and size.
False
3
Sequential record organization is by far the easiest to implement because records are stored and retrieved serially, one after the other.
True
4
When someone creates a folder, the system creates a subdirectory in the current directory or folder.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
It is easy to calculate the location of a variable-length record.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
In newer operating systems, a subdirectory is created when a user opens an account to access the computer system.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
An indexed sequential file does not have overflow areas.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
The computer system defines a file by activating the appropriate secondary storage device and loading the file into memory while updating its records of who is using what file.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
When a user gives a command to modify the contents of a file, it's actually a command to access folders within the file.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
The relative filename is the name that is selected by the File Manager when the file is created.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Each volume can only contain a single file.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Directories are special files with listings of filenames and their attributes.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Tree structures are inefficient for searching because there are fewer entries in each directory.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
A file descriptor usually contains only a file name and the directory name in which the file is located.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
An extension is usually two or three characters long and is separated from the relative name by a period.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
The File Manager is in charge of the system's physical components, its information resources, and the policies used to store and distribute the files.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Without the File Manager, every program would need to include instructions to operate all of the different types of devices, and all of the different models within each type.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Examples of batch commands are CREATE, DELETE, RENAME, and COPY.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Although noncontiguous allocation schemes eliminate external storage fragmentation and the need for compaction, they don't support direct access because there's no easy way to determine the exact location of a specific record.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
The File Manager keeps track of the empty storage areas by treating them as files.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
A ____ is created when a user opens an account to access the computer system.
A) directory
B) volume
C) subdirectory
D) MFD
A) directory
B) volume
C) subdirectory
D) MFD
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
For every file request, the ____ is the point of entry.
A) file location
B) volume location
C) subdirectory
D) MFD
A) file location
B) volume location
C) subdirectory
D) MFD
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
On magnetic disks, files can be organized in one of three ways; ____.
A) indexed direct, indexed indirect, or random
B) sequential, indirect, or direct
C) sequential, random, or indirect
D) sequential, direct, or indexed sequential
A) indexed direct, indexed indirect, or random
B) sequential, indirect, or direct
C) sequential, random, or indirect
D) sequential, direct, or indexed sequential
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
A ____ is a group of related records that contains information to be used by specific application programs to generate reports.
A) field
B) record group
C) file
D) directory
A) field
B) record group
C) file
D) directory
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Access methods are dictated by a file's organization; the most flexibility is allowed with indexed sequential files and the least with sequential.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
____ is a specialized WRITE command for existing data files that allows for appending records or for rewriting selected records in their original place in the file.
A) APPEND
B) UPDATE
C) REWRITE
D) MODIFY
A) APPEND
B) UPDATE
C) REWRITE
D) MODIFY
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Data in a fixed-length field might include a short name followed by many blank characters; it can be replaced with a variable-length field and a special code to indicate how many blanks were truncated.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
When data is stored in fixed length fields, data that extends beyond the fixed size ____.
A) generates an operating system error
B) is truncated
C) is broken up and stored in more than one field
D) combines multiple fields to accommodate the data
A) generates an operating system error
B) is truncated
C) is broken up and stored in more than one field
D) combines multiple fields to accommodate the data
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
____ are special files with listings of filenames and their attributes.
A) Databases
B) Directories
C) Programs
D) Data files
A) Databases
B) Directories
C) Programs
D) Data files
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
The purpose of an extension is to ____.
A) identify the directory in which the file is stored
B) identify the type of file
C) identify the file size
D) identify the file owner
A) identify the directory in which the file is stored
B) identify the type of file
C) identify the file size
D) identify the file owner
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
The File Manager writes the volume name and other descriptive information on an easy-to-access place on each unit: ____ of the CD or DVD.
A) the outermost part
B) the innermost part
C) immediately following the master file directory
D) stored at the beginning of the volume
A) the outermost part
B) the innermost part
C) immediately following the master file directory
D) stored at the beginning of the volume
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
In a networked environment using the OpenVMS Alpha operating system, a file might be named VAX2::USR3:[IMFST.FLYNN]INVENTORY_COST.DOC;7. ____ is the volume where the file is stored?
A) VAX2
B) USR3
C) IMFST
D) FLYNN
A) VAX2
B) USR3
C) IMFST
D) FLYNN
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Many computer users and some operating systems call subdirectories ____.
A) folders
B) files
C) volumes
D) databases
A) folders
B) files
C) volumes
D) databases
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
As long as users refer to files in the ____ directory, they can access their files without entering the complete name from the highest level to the lowest.
A) root
B) working
C) home
D) default
A) root
B) working
C) home
D) default
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
When using random access files, the program used to store the data follows a set of instructions, called a ____ algorithm, that transforms each key into a number, the record's logical address.
A) hashing
B) grouping
C) translation
D) lookup
A) hashing
B) grouping
C) translation
D) lookup
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
To achieve its goals, the File Manager must be able to accommodate a variety of file organizations, physical storage allocation schemes, record types, and access methods.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Many systems force users to have their files organized for fixed-length records if the records are to be accessed directly.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
A UNIX or Linux system might identify a file as: /usr/imfst/flynn/inventory.doc. What represents the root directory is ____.
A) /
B) usr
C) imfst
D) flynn
A) /
B) usr
C) imfst
D) flynn
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
The File Manager is in charge of the system's ____ components.
A) data
B) software
C) electronic
D) physical
A) data
B) software
C) electronic
D) physical
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
In a file management system, information is passed from the Device Manager at the top of the hierarchy to the File Manager at the bottom.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
In noncontiguous storage, linking can take place at the ____ level where each part of the file points to the next one in the sequence.
A) subdirectory
B) file
C) directory
D) storage
A) subdirectory
B) file
C) directory
D) storage
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
In indexed storage, when a file is created, the pointers in the index block are all set to ____.
A) the end of the volume
B) the beginning of the volume
C) null
D) zero
A) the end of the volume
B) the beginning of the volume
C) null
D) zero
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
____ formula computes the byte address for a direct access file with fixed record length.
A) CBA = (RN - 1) * RL
B) CBA = RN * RL
C) CBA = RN / RL
D) CBA = (RN + 1) * RL
A) CBA = (RN - 1) * RL
B) CBA = RN * RL
C) CBA = RN / RL
D) CBA = (RN + 1) * RL
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
The primary disadvantage of contiguous storage is that ____.
A) it is hard to implement and manage
B) it is difficult to find information in files
C) file can't be expanded unless there is empty space available immediately following it
D) it is an inefficient use of space
A) it is hard to implement and manage
B) it is difficult to find information in files
C) file can't be expanded unless there is empty space available immediately following it
D) it is an inefficient use of space
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
The most commonly used access control scheme is the ____.
A) access control matrix
B) access control list
C) capability list
D) capability matrix
A) access control matrix
B) access control list
C) capability list
D) capability matrix
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
____ compression is a technique used to save space in files.
A) Text
B) Space
C) Data
D) Character
A) Text
B) Space
C) Data
D) Character
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
When using indexed sequential record organization, each entry in the index file contains the ____ and the physical location of the data block where this record, and the records with smaller keys, are stored.
A) last record name
B) highest record key
C) lowest record key
D) first record name
A) last record name
B) highest record key
C) lowest record key
D) first record name
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
____ might be an encoded version of ADAMSbbbbbbbbbb?
A) ADAMSx10
B) ASbb
C) AD2MSb10
D) ADAMSb10
A) ADAMSx10
B) ASbb
C) AD2MSb10
D) ADAMSb10
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
____ allocation allows files to use any storage space available on the disk.
A) Contiguous storage
B) Noncontiguous storage
C) Fragmented storage
D) Add-on storage
A) Contiguous storage
B) Noncontiguous storage
C) Fragmented storage
D) Add-on storage
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
The File Manager uses the address of the ____ to access the next sequential record.
A) first byte read
B) last byte read
C) first byte in the file
D) index record
A) first byte read
B) last byte read
C) first byte in the file
D) index record
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck