{ "q1": { "type": "blank", "question": "\n
On a typical Unix system, we are presented with two key storage\nabstractions. The first is the (1) ____, which is just a linear\narray of bytes that you can (2) ____ or (3) ____. Associated\nwith each of these is an (4) ____ number, which is its low-level\nname.
\n\nThe second abstraction is the (5) ____, which is a list of pairs\ncontaining the user-readable name of the data, and its assocated low-level\nidentifier.
\n" }, "q3": { "type": "blank", "question": "\nIdentify the key system call you should use to implement the\nfollowing Unix command-line utility:
\n\n\n
Identify the system call you should use to accomplish the\nfollowing tasks:
\n\n\n