How does Linux avoid using bad blocks?
What will be an ideal response?
Bad blocks are allocated to a special file whose only purpose is to keep them from being accessible
to any other regular file.
Computer Science & Information Technology
You might also like to view...
The switchport port-security violation command has several options that alter the default switch behavior. Which one of these options is the most restrictive?
A) Protect B) Shutdown C) Restrict D) Off
Computer Science & Information Technology
After technicians validate calls as actual incidents, they begin the process of logging them
Indicate whether the statement is true or false
Computer Science & Information Technology