| File System 1 | Cpu Scheduling Algorithms 2 |
| Network Structure Topology | Robustness |
| Types Resource Sharing | File System 2 |
| Distributed File System |
A. Login transparency and access transparency
B. Files need not contain information about their physical location
C. No multiplicity of users
D. No multiplicity if files
A. Fault tolerance
B. Scalability
C. Heterogeneity of the system
D. Upgradation
A. Sequential access
B. Direct access
C. Indexed sequential access
D. All of the mentioned
A. Directory service
B. Authorization service
C. Shadow service
D. System service
A. Boot mounting
B. Auto mounting
C. Explicit mounting
D. All of the mentioned
A. Reduced network traffic by retaining recently accessed disk blocks
B. Faster network access
C. Copies of data creates backup automatically
D. None of the mentioned
A. Caching
B. Segmentation
C. Ram disk
D. None of the mentioned
A. Opened files and their clients
B. File descriptors and file handles
C. Current file position pointers
D. All of the mentioned
A. Mounting information
B. Description of hdd space
C. Session keys
D. Lock status