How does Linux avoid using bad blocks?

What will be an ideal response?

Bad blocks are allocated to a special file whose only purpose is to keep them from being accessible
to any other regular file.

Computer Science & Information Technology

You might also like to view...

The switchport port-security violation command has several options that alter the default switch behavior. Which one of these options is the most restrictive?

A) Protect B) Shutdown C) Restrict D) Off

Computer Science & Information Technology

After technicians validate calls as actual incidents, they begin the process of logging them

Indicate whether the statement is true or false

Computer Science & Information Technology