FAT stands for
1) File Accomdation Table
2) File Access Tape
3) File Allocation Table
4) File Activity Table

1 Answer

Answer :

3) File Allocation Table

Related questions

Description : FAT stands for 1 File Accomdation Table 2 File Access Tape 3 File Allocation Table 4 File Activity Table

Last Answer : 3 File Allocation Table

Description : The ability to find an individual item in a file immediately _____ is used. 1) File allocation table 2) Directory 3) Sequential access 4) Direct access 4 5) None of these

Last Answer : Answer :1

Description : The ability to find an individual item in a file immediately _____ is used: a) file allocation table b) directory c) sequential access d) direct access e) None of The Above

Last Answer : a) file allocation table

Description : DMA stands for ________ 1) Direct Memory Access 2) Distinct Memory Access 3) Direct Module Access 4) Direct Memory Allocation

Last Answer : 1) Direct Memory Access

Description : DMA stands for ________ 1 Direct Memory Access 2 Distinct Memory Access 3 Direct Module Access 4 Direct Memory Allocation

Last Answer : 1 Direct Memory Access

Description : DMA stands for: a. Direct memory access b. Direct memory allocation c. Data memory access d. Data memory allocation

Last Answer : a. Direct memory access

Description : Which of the following information not included in memory table? A) The allocation of main memory to process. B) The allocation of secondary memory to process C) Any information needed to manage virtual memory D) Any information about the existence of file

Last Answer : D) Any information about the existence of file

Description : ................. maintains the list of free disk blocks in the Unix file system. (A) I-node (B) Boot block (C) Super block (D) File allocation table

Last Answer : (C) Super blockĀ 

Description : What does DMA stand for? A) Distinct Memory Access B) Direct Memory Access C) Direct Module Access D) Direct Memory Allocation

Last Answer : Answer : B

Description : Which is not a benefit of virtualization? a) Flexible and efficient allocation of resources b) Lowers the cost of IT infrastructure c) Remote access and rapid scalability d) Run on single operating system

Last Answer : Run on single operating system

Description : The magnetic storage chip used to provide non-volatile direct access storage of data and that have no moving parts are known as A) Magnetic core memory B) Magnetic tape memory C) Magnetic disk memory D) Magnetic bubble memory

Last Answer : Answer : D

Description : Which access method is used to access cassette tape? A) Direct B) Sequential C) Both of the above D) None of the above

Last Answer : Answer : B

Description : Which of the following is not true for a magnetic disk? A) It is expensive relative to magnetic tape B) It provides only sequential access to stored data C) Users can easily update records by writing over the old data D) All of above

Last Answer : Answer : B

Description : The magnetic storage chips used to provide non-volatile direct access storage of data and that have no moving parts are known as________ A. Magnetic core memory B. Magnetic tape memory C. Magnetic disk memory D. Magnetic bubble memory

Last Answer : D. Magnetic bubble memory

Description : Which of the following statements is not true about disk-arm scheduling algorithms ? (A) SSTF (shortest seek time first) algorithm increases performance of FCFS. (B) The number of requests for disk ... arm movements. (D) SCAN and C-SCAN algorithms are less likely to have a starvation problem.

Last Answer : (B) The number of requests for disk service are not influenced by file allocation method.

Description : In ............ allocation method for disk block allocation in a file system, insertion and deletion of blocks in a file is easy. (A) Index (B) Linked (C) Contiguous (D) Bit Map

Last Answer : (B) Linked

Description : Enlist different file allocation methods? Explain contiguous allocation method in detail.

Last Answer : From the user's point of view, a file is an abstract data type. It can be created, opened, written, read, closed and deleted without any real concern for its implementation. The implementation of a ... a times is difficult to estimate. 4. Compaction may be required and it can be very expensive.

Description : Which one of the following a file? 1) Floppy disk 2) Magnetic drum 3) magnetic tape 4) None of these

Last Answer : 4) None of these

Description : How does Space allocation table place within a block ?

Last Answer : Each block contains entries as follows Fixed block header Variable block header Row Header,row date (multiple rows may exists) PCTEREE (% of free space for row updation in future)

Description : NAT stands for: a) Network Address Translator b) Network Access Translator c) Network Acquired Translator d) None of These

Last Answer : a) Network Address Translator

Description : NAP stands for: a) Network Access Point b) Naptive Area Protocol c) Node for Assessing Patteern d) None of These

Last Answer : b) Network Access Point

Description : DMA stands for: a) Dial - Up Multiplier Access b) Digital Media Access c) Direct Memory Access d) None of These

Last Answer : c) Direct Memory Access

Description : PAN stands for: a) Permanent Area Network b) Personal Access Network c) Personal Area Network d) None of These

Last Answer : c) Personal Area Network

Description : BASIC stands for: a) Basic Access towards Skills in Computer b) Beginner's All Purpose Symbolic Instruction Code c) Binary And Specific Instruction Code d) None of These

Last Answer : b) Beginner's All Purpose Symbolic Instruction Code

Description : CAD stands for: a) Computer And Development b) Computer Aided Design c) Computer Access Design d) Computer Access Development e) None of These

Last Answer : b) Computer Aided Design

Description : MAN stands for: a) Metropolitan Arranged Network b) Metropolitan Area Network c) Metropolitan Access Network d) Modem and Nexus e) None of These

Last Answer : b) Metropolitan Area Network

Description : WAN stands for: a) WAP Access Network b) Wireless Area Network c) Wide Area Network d) None of These

Last Answer : c) Wide Area Network

Description : SATA stands for: a) Super Advanced Technology Attachment b) Serial Advanced Technology Attachment c) Special Access Technology Attachment d) None of These

Last Answer : b) Serial Advanced Technology Attachment

Description : RAM stands for: a) Read Access Memory b) Random Access Memory c) Rewritable Access Memory d) None of These

Last Answer : b) Random Access Memory

Description : NAT stands for: a) Network Address Translation (Translation or translator same meaning) b) Network Address Transformation c) Network Access Translation d) None of These

Last Answer : a) Network Address Translation (Translation or translator same meaning)

Description : DMA stands for: a) Direct Memory Access b) Direct Module Access c) Direct Memory Access d) None of The Above

Last Answer : a) Direct Memory Access

Description : NAT stands for: a) Network Address Translator b) Network Access Translator c) Network Acquired Translator d) None of These

Last Answer : a) Network Address Translator

Description : ACL stands for. a. Application Control Language b. Application Control list c. Access control List d. Access Command List

Last Answer : d. Access Command List

Description : WIMAX stands for (1) Wireless Interoperability for Microwave Access (2) Wired Interoperability for Microwave Access (3) Worldwide Interoperability for Microwave Access (4) Worldwide Infrastructure for Microwave Access

Last Answer : Worldwide Interoperability for Microwave Access

Description : LAN stands for (1) Land Area Network (2) Local Area Network (3) Local Access Network (4) Local Area Netware

Last Answer : Local Area Network

Description : FLOPS stands for______ (A) Floating Point Operation Per Second (B) File Processing Operation Per Second (C) Floating Processing Operation Per Second (D) File Loading Operation Per Second

Last Answer : (A) Floating Point Operation Per Second

Description : PDF stands for: a) Portable Document File b) Portable Document Format c) Paired Drive Format d) None of These

Last Answer : b) Portable Document Format

Description : Why would a hacker use a proxy server? a. To create a stronger connection with the target. b. To create a ghost server on the network. c. To obtain a remote access connection. d. To hide malicious activity on the network.

Last Answer : d. To hide malicious activity on the network.

Description : Necessary conditions for deadlock are: a) Non preemptive and circular wait b) Mutual exclusion and partial allocation c) Both of The Above d) None of The Above

Last Answer : b) are privileged calls that are used to perform resource management functions, which are controlled by the operating system

Description : Allocation of a resources in a time dependent fashion to several program simultaneously called 1) multi tasking 2) multi user 3) time sharing 4) None

Last Answer : 3) time sharing

Description : Allocation of a resources in a time dependent fashion to several program simultaneously called 1 multi tasking 2 multi user 3 time sharing 4 None

Last Answer : 3 time sharing

Description : Which of the following is not a mechanism that DHCP supports for IP address allocation? A) Automatic allocation B) Static allocation C) Dynamic allocation D) Manual allocation

Last Answer : B) Static allocation

Description : Which of the following is not a mechanism that DHCP supports for IP address allocation? A) Automatic allocation B) Static allocation C) Dynamic allocation D) Manual allocation

Last Answer : B) Static allocation

Description : In operationg system, Round Robin Scheduling means : (1) A kind of scheduling (2) Repetition policy (3) A memory allocation policy (4) A process allocation policy

Last Answer : A kind of scheduling

Description : A computer checks the _____ of user names and passwords for 9 a match before granting access. 1) Website 2) Network 3) Backup file 4) Data base 5) None of these

Last Answer : Answer :4

Description : A transaction file is a type of: a) Master File b) Data File c) Access Method d) None of The Above

Last Answer : b) Data File

Description : The Method of file organisation in which data records in a file are arranged in a specified order according to a key field is known as the1 Direct access method 2) Queuing method 3) Predetermined method 4) Sequential method

Last Answer : 4) Sequential method

Description : The principle of time sharing is 1) large numbers of users direct access to the computer for problem solving 2) large number of user for file sharing 3) both of above 4) none

Last Answer : large numbers of users direct access to the computer for problem solving

Description : The principle of time sharing is 1) large numbers of users direct access to the computer for problem solving 2) large number of user for file sharing 3) both of above 4) none

Last Answer : 1) large numbers of users direct access to the computer for problem solving

Description : A System in which a transaction access and updates a file quickly enough to affect the original decision making is called 1) Real time system 2) time sharing system 3) both of above 4) None of above

Last Answer : 1) Real time system