Multiple Choice
1. A source file is a sequence of functions, each of which is further organized as declarations followed by executable statements.
What does the "as" mean here?
And an executable file is a series of code sections that the loader can bring into memory and execute.
2. An object file is a sequence of bytes organized into blocks understandable by the system's linker.
3. The OS uses two internal tables to keep track of open files.
System-wide and pre-process open table.
6. A shared lock behaves like a reader lock. An exclusive lock behaves like a writer lock; only one process at a time can acquire such a lock. For a shared lock, several processes can acquire the lock concurrently.
So the locks are like some sort of interface to the processes?
8. Information in a sequential access file is processed in order, one record after the other.
9. The UNIX system uses a crude magic number to indicate roughly the type of the file.
11. Tree-structured directory structure usually has a current directory.
Users can create their own subdirectories.
Users can acquire permission to access the files of other users.
Directories cannot share subdirectories and files.
14. Consistency semantics represent an important criterion for evaluating any file system that supports file sharing.
15. Once an immutable shared file is declared, it cannot be modified. Its name may not be reused, and its contents may not be altered.
16. The systems recognize three classifications of users in connection with each file: Owner, group and universe.
17. Distributed information systems provide unified access to the information needed for remote computing.
Most major operating systems include lightweight directory-access protocol(LDAP), it's a secure, distributed naming mechanism.
20. Reliability is not considered a difficulty when considering file sharing, but why?
23. The server specifies which resource is available to a client. The client-server model means a computer mounting one or more file systems from one or more remote machines.
24. The six basic file operations.
25. The attributes of a file: The name, the identifier, the type, the location, the file's size, the file's protection information, and time, date and user identification.
27. Mandatory locking requires that the operating system not allow access to any file that is locked until it is released.
29. Extended file attributes refer to additional file attributes such as character encoding, security features, and application associated with opening the file.
30. Disk space is always allocated in fixed sized blocks.
31. Remote file-sharing有三種方法:
1. Manually transferring file,像是ftp
2. Distributed file system,遠端的directories對本地來說是可見的,這需要兩邊機器更緊密的integration
3. 使用browser瀏覽WWW並且執行特定操作(通常是透過ftp來實現)
32. NFS假設來自client端的read或write不會發生,除非file system已經remotely mounted且file已經被打開了。他也不會記錄哪個client mounted哪個system,他假設所有request都是legitimate的。NFS protocol記錄所有資訊來locate file並且perform the requested operation。
33. Space management also becomes more complicated because the directory size needs to be of variable size.
34. Mandatory locking and advisory locking.
45. Relative block number
1. A source file is a sequence of functions, each of which is further organized as declarations followed by executable statements.
What does the "as" mean here?
And an executable file is a series of code sections that the loader can bring into memory and execute.
2. An object file is a sequence of bytes organized into blocks understandable by the system's linker.
3. The OS uses two internal tables to keep track of open files.
System-wide and pre-process open table.
6. A shared lock behaves like a reader lock. An exclusive lock behaves like a writer lock; only one process at a time can acquire such a lock. For a shared lock, several processes can acquire the lock concurrently.
So the locks are like some sort of interface to the processes?
8. Information in a sequential access file is processed in order, one record after the other.
9. The UNIX system uses a crude magic number to indicate roughly the type of the file.
11. Tree-structured directory structure usually has a current directory.
Users can create their own subdirectories.
Users can acquire permission to access the files of other users.
Directories cannot share subdirectories and files.
14. Consistency semantics represent an important criterion for evaluating any file system that supports file sharing.
15. Once an immutable shared file is declared, it cannot be modified. Its name may not be reused, and its contents may not be altered.
16. The systems recognize three classifications of users in connection with each file: Owner, group and universe.
17. Distributed information systems provide unified access to the information needed for remote computing.
Most major operating systems include lightweight directory-access protocol(LDAP), it's a secure, distributed naming mechanism.
20. Reliability is not considered a difficulty when considering file sharing, but why?
23. The server specifies which resource is available to a client. The client-server model means a computer mounting one or more file systems from one or more remote machines.
24. The six basic file operations.
25. The attributes of a file: The name, the identifier, the type, the location, the file's size, the file's protection information, and time, date and user identification.
27. Mandatory locking requires that the operating system not allow access to any file that is locked until it is released.
29. Extended file attributes refer to additional file attributes such as character encoding, security features, and application associated with opening the file.
30. Disk space is always allocated in fixed sized blocks.
31. Remote file-sharing有三種方法:
1. Manually transferring file,像是ftp
2. Distributed file system,遠端的directories對本地來說是可見的,這需要兩邊機器更緊密的integration
3. 使用browser瀏覽WWW並且執行特定操作(通常是透過ftp來實現)
32. NFS假設來自client端的read或write不會發生,除非file system已經remotely mounted且file已經被打開了。他也不會記錄哪個client mounted哪個system,他假設所有request都是legitimate的。NFS protocol記錄所有資訊來locate file並且perform the requested operation。
33. Space management also becomes more complicated because the directory size needs to be of variable size.
34. Mandatory locking and advisory locking.
45. Relative block number
留言
張貼留言