Chapter 8

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Although a user directory is treated as a file, it is flagged to indicate to the File Manager that this file is really a ____ whose records are filenames that point to files.

subdirectory

As long as users refer to files in the ____ directory, they can access the files without entering the absolute filename.

working

A compressed image file can be reconstructed if a lossy compression algorithm is used because the compression process is reversible.

False

A relative filename is a name that is selected by the File Manager when the file is created.

False

An indexed sequential file does not have overflow areas.

False

Files cannot be converted from sequential to direct or vice versa.

False

In a file directory tree structure, the "leaves" of the tree are subdirectories created by the user.

False

In a file management system, information is passed from the Device Manager at the top of the hierarchy to the File Manager at the bottom.

False

The File Manager responds to the CREATE command by creating a new file.

False

When a user gives a command to modify the contents of a file, it's actually a command to access folders within the file.

False

Within a file, variable-length records are easier to access directly than fixed-length records.

False

A file extension is usually two to four characters in length and is separated from the relative name by a period.

True

A subdirectory is created when a user opens an account to access the computer system.

True

Although noncontiguous allocation schemes eliminate external storage fragmentation and the need for compaction, they don't support direct access because there's no easy way to determine the exact location of a specific record.

True

Directories are special files that contain listings of filenames and their attributes.

True

If the File Manager is required to provide detailed instructions for each system device (how to start it, get it to move to the correct place where the desired record is located, and when to stop), then the program is considered device dependent.

True

Many systems force users to have their files organized for fixed-length records if the records are to be accessed directly.

True

Sequential record organization is by far the easiest to implement because records are stored and retrieved serially, one after the other.

True

To support text compression, data in a fixed-length field that includes a short name followed by many blank characters can be replaced with a variable-length field and a special code to indicate how many blanks were truncated.

True

The primary disadvantage of contiguous storage is that ____.

a file can't be expanded unless there is empty space available immediately following it

Many computer users and some operating systems call subdirectories ____.

folders

In a direct record organization scheme, the program used to store the data follows a set of instructions, called a ____ algorithm, that transforms each key into a number, the record's logical address.

hashing

When using indexed sequential record organization, each entry in the index file contains the ____ and the physical location of the data block where this record, and the records with smaller keys, are stored.

highest record key

Each volume in a system has a volume descriptor followed by a ____ that lists the names and characteristics of every file contained in that volume.

master file directory

In noncontiguous storage, one way to link file extents is at the storage level where each extent points to the ____.

next extent in the sequence

A(n) ____ filename is the name that differentiates a file from other files in the same directory.

relative

A UNIX or Linux system might identify a file as: /usr/imfst/flynn/inventory.doc. The first entry is a forward slash ( / ) representing the master directory, called the ____ directory.

root

A file's ____ filename includes all path information for that file.

absolute

A(n) ____ contains a list of files, each of which is associated with the names of users who are allowed to access it and the type of access each user is permitted.

access control list

The computer system ____ a file by activating the appropriate secondary storage device and loading the file into memory while updating its records of who is using that file.

allocates


Set pelajaran terkait

ECON 1203 CHAPTER 11 MARKETS FOR FACTORS OF PRODUCTION

View Set

Interpersonal Relationships chapter 10

View Set

chapter 15 Bio: evolution on a small scale

View Set

Module 7 Social Inequalities Exam

View Set

US History 5-5, Teddy Roosevelt's Square Deal

View Set

ATI nurse logic 2.0 Advanced knowledge and clinical judgments

View Set

Chapter 11: Differential Analysis: The Key to Decision Making

View Set