A. Considers
B. Ignores
C. Deletes
D. None of the mentioned
A. Leaf
B. Stem
C. Current directory
D. Root
A. Leaf
B. Stem
C. Current directory
D. Root
A. The contents of the directory are safe
B. The contents of the directory are also deleted
C. Contents of the directory are not deleted
D. None of the mentioned
A. Tree structure
B. Cyclic graph directory structure
C. Two level directory structure
D. Acyclic graph directory
A. Allows
B. May restrict
C. Restricts
D. None of the mentioned
A. Actual file exists
B. There are two copies of the file
C. The changes made by one person are not reflected to the other
D. The changes made by one person are reflected to the other
A. A directory entry
B. A pointer to another file or subdirectory
C. Implemented as an absolute or relative path name
D. All of the mentioned
A. Deletes
B. Affects
C. Does not affect
D. None of the mentioned
A. The file has no copies
B. The file is deleted
C. The file is hidden
D. None of the mentioned