Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Directories can be implemented either as "special files"
that can only be accessed in limited ways, or as ordinary
data files. What are the advantages and disadvantages of
each approach?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More Operating Systems AllOther Interview Questions

Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?

0 Answers  


Virtual memory size depends on [a] address lines [b] data bus [c] disc space [d] a & c [e] none

15 Answers   Infosys, SafeNet, Satyam, TCS, VIT Infotech, Wipro,


Which of following is used for back-up files? (a) compress (b) Tar (c) make (d) all the above

1 Answers   Cadence,


How To Convert A Normal Vg To Big & Scalable Vg And Also Big To Scalable Vg?

0 Answers   IBM,


Explain about memory management in operating system.

0 Answers   Aditi Placement Service,


Is 4 cores enough for streaming?

0 Answers  


How does the scheduler know the time how it should be scheduled.

1 Answers   Motorola,


Do cores matter for gaming?

0 Answers  


How do I run a curl command?

0 Answers  


The flushing policy is described in the subsection on process migration strategies: a) From the perspective of the source, which other strategy does flushing resembles? b) From the perspective of the target, which other strategy does flushing resemble?

0 Answers  


Hi, This question may sound stupid. But I want to know that if the secondary storage device is used to store data on computer, then what is the use of the primary storage in the first place? Why cant we use only one?

2 Answers  


What is deadlock? How do you avoid it?

9 Answers   HCL, Motorola,


Categories