MCQOPTIONS
Saved Bookmarks
This section includes 1690 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
| 901. |
During compaction time, other normal system operations _______ be permitted. |
| A. | Can |
| B. | Cannot |
| C. | is |
| D. | none of the mentioned |
| Answer» C. is | |
| 902. |
For processes to request access to file contents, they need to : |
| A. | they need to run a seperate program |
| B. | they need special interrupts |
| C. | implement the open and close system calls |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 903. |
For each file there exists a ___________ that contains information about the file, including ownership, permissions and location of the file contents. |
| A. | metadata |
| B. | file control block |
| C. | process control block |
| D. | All of the mentioned |
| Answer» C. process control block | |
| 904. |
Metadata includes : |
| A. | all of the file system structure |
| B. | contents of files |
| C. | both file system structure and contents of files |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 905. |
The file organization module knows about : |
| A. | files |
| B. | logical blocks of files |
| C. | physical blocks of files |
| D. | all of the mentioned |
| Answer» E. | |
| 906. |
A device driver can be thought of as a translator. Its input consists of _____ commands and output consists of _______ instructions. |
| A. | high level, low level |
| B. | low level, high level |
| C. | complex, simple |
| D. | low level, complex |
| Answer» B. low level, high level | |
| 907. |
If too little space is allocated to a file |
| A. | the file will not work |
| B. | there will not be any space for the data, as the FCB takes it all |
| C. | the file cannot be extended |
| D. | the file cannot be opened |
| Answer» D. the file cannot be opened | |
| 908. |
To solve the problem of external fragmentation, ________ needs to be done periodically. |
| A. | compaction |
| B. | check |
| C. | formatting |
| D. | replacing memory |
| Answer» B. check | |
| 909. |
The first fit and best fit algorithms suffer from : |
| A. | internal fragmentation |
| B. | external fragmentation |
| C. | starvation |
| D. | all of the mentioned |
| Answer» C. starvation | |
| 910. |
_______ and ________ are the most common strategies used to select a free hole from the set of available holes. |
| A. | First fit, Best fit |
| B. | Worst fit, First fit |
| C. | Best fit, Worst fit |
| D. | None of the mentioned |
| Answer» B. Worst fit, First fit | |
| 911. |
One difficulty of contiguous allocation is : |
| A. | finding space for a new file |
| B. | inefficient |
| C. | costly |
| D. | time taking |
| Answer» B. inefficient | |
| 912. |
Contiguous allocation of a file is defined by : |
| A. | disk address of the first block & length |
| B. | length & size of the block |
| C. | size of the block |
| D. | total size of the file |
| Answer» B. length & size of the block | |
| 913. |
The real disadvantage of a linear list of directory entries is the : |
| A. | size of the linear list in memory |
| B. | linear search to find a file |
| C. | it is not reliable |
| D. | all of the mentioned |
| Answer» C. it is not reliable | |
| 914. |
The VFS (virtual file system) activates file system specific operations to handle local requests according to their _______ |
| A. | size |
| B. | commands |
| C. | timings |
| D. | file system types |
| Answer» E. | |
| 915. |
On systems where there are multiple operating system, the decision to load a particular one is done by : |
| A. | boot loader |
| B. | bootstrap |
| C. | process control block |
| D. | file control block |
| Answer» B. bootstrap | |
| 916. |
In indexed allocation : |
| A. | each file must occupy a set of contiguous blocks on the disk |
| B. | each file is a linked list of disk blocks |
| C. | all the pointers to scattered blocks are placed together in one location |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 917. |
In linked allocation : |
| A. | each file must occupy a set of contiguous blocks on the disk |
| B. | each file is a linked list of disk blocks |
| C. | all the pointers to scattered blocks are placed together in one location |
| D. | none of the mentioned |
| Answer» C. all the pointers to scattered blocks are placed together in one location | |
| 918. |
In contiguous allocation : |
| A. | each file must occupy a set of contiguous blocks on the disk |
| B. | each file is a linked list of disk blocks |
| C. | all the pointers to scattered blocks are placed together in one location |
| D. | none of the mentioned |
| Answer» B. each file is a linked list of disk blocks | |
| 919. |
The three major methods of allocating disk space that are in wide use are : |
| A. | contiguous |
| B. | linked |
| C. | indexed |
| D. | all of the mentioned |
| Answer» E. | |
| 920. |
Disks are segmented into one or more partitions, each containing a file system or ______ |
| A. | left ‘raw’ |
| B. | made into swap space |
| C. | made into backup space |
| D. | left ‘ripe’ |
| Answer» B. made into swap space | |
| 921. |
In UNIX, the directory protection is handled _________ to the file protection. |
| A. | different |
| B. | similar |
| C. | it is not handled at all |
| D. | none of the mentioned |
| Answer» C. it is not handled at all | |
| 922. |
In a multi level directory structure : |
| A. | the same previous techniques will be used as in the other structures |
| B. | a mechanism for directory protection will have to applied |
| C. | the subdirectories do not need protection once the directory is protected |
| D. | none of the mentioned |
| Answer» C. the subdirectories do not need protection once the directory is protected | |
| 923. |
If each access to a file is controlled by a password, then the disadvantage is that : |
| A. | user will need to remember a lot of passwords |
| B. | it is not reliable |
| C. | it is not efficient |
| D. | all of the mentioned |
| Answer» B. it is not reliable | |
| 924. |
To control access the three bits used in UNIX are represented by : |
| A. | r |
| B. | w |
| C. | x |
| D. | all of the mentioned |
| Answer» E. | |
| 925. |
In UNIX, groups can be created and modified by : |
| A. | superuser |
| B. | any user |
| C. | a programmer only |
| D. | the people in the group only |
| Answer» B. any user | |
| 926. |
Universe consists of : |
| A. | all users that aren’t included in the group or owners |
| B. | all users that are not owners |
| C. | all users in the system |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 927. |
All users in a group get _______ access to a file. |
| A. | different |
| B. | similar |
| C. | same |
| D. | none of the mentioned |
| Answer» C. same | |
| 928. |
Many systems recognize three classifications of users in connection with each file (to condense the access control list) : |
| A. | Owner |
| B. | Group |
| C. | Universe |
| D. | All of the mentioned |
| Answer» E. | |
| 929. |
The main problem with access control lists is : |
| A. | their maintenance |
| B. | their length |
| C. | their permissions |
| D. | All of the mentioned |
| Answer» C. their permissions | |
| 930. |
Protection is only provided at the _____ level. |
| A. | lower |
| B. | central |
| C. | higher |
| D. | none of the mentioned |
| Answer» B. central | |
| 931. |
Reliability of files can be increased by : |
| A. | keeping the files safely in the memory |
| B. | making a different partition for the files |
| C. | by keeping them in external storage |
| D. | by keeping duplicate copies of the file |
| Answer» E. | |
| 932. |
The series of accesses between the open and close operations is a : |
| A. | transaction |
| B. | procedure |
| C. | program |
| D. | file session |
| Answer» E. | |
| 933. |
To recover from failures in the network operations, ______ information may be maintained. |
| A. | ip address |
| B. | state |
| C. | stateless |
| D. | operating system |
| Answer» C. stateless | |
| 934. |
Domain name system provides : |
| A. | host-name-to-network-address translations for the entire internet |
| B. | network-address-to-host-name translations for the entire internet |
| C. | binary to hex translations for the entire internet |
| D. | all of the mentioned |
| Answer» B. network-address-to-host-name translations for the entire internet | |
| 935. |
Distributed naming services/Distributed information systems have been devised to : |
| A. | provide information about all the systems |
| B. | provide unified access to the information needed for remote computing |
| C. | provide unique names to all systems in a network |
| D. | all of the mentioned |
| Answer» C. provide unique names to all systems in a network | |
| 936. |
The machine containing the files is the _______ and the machine wanting to access the files is the ______ |
| A. | master, slave |
| B. | memory, user |
| C. | server, client |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 937. |
Anonymous access allows a user to transfer files : |
| A. | without having an account on the remote system |
| B. | only if he accesses the system with a guest account |
| C. | only if he has an account on the remote system |
| D. | none of the mentioned |
| Answer» B. only if he accesses the system with a guest account | |
| 938. |
In the world wide web, a ____ is needed to gain access to the remote files, and separate operations are used to transfer files. |
| A. | laptop |
| B. | plugin |
| C. | browser |
| D. | player |
| Answer» D. player | |
| 939. |
In distributed file system, ______ directories are visible from the local machine. |
| A. | protected |
| B. | local |
| C. | private |
| D. | remote |
| Answer» E. | |
| 940. |
A process _____ lower the priority of another process, if both are owned by the same owner. |
| A. | must |
| B. | can |
| C. | cannot |
| D. | none of the mentioned |
| Answer» C. cannot | |
| 941. |
In UNIX, exactly which operations can be executed by group members and other users is definable by : |
| A. | the group’s head |
| B. | the file’s owner |
| C. | the file’s permissions |
| D. | all of the mentioned |
| Answer» C. the file’s permissions | |
| 942. |
When a file system is mounted over a directory that is not empty : |
| A. | the system may not allow the mount |
| B. | the system must allow the mount |
| C. | the system may allow the mount and the directory’s existing files will then be made obscure |
| D. | all of the mentioned |
| Answer» D. all of the mentioned | |
| 943. |
A mount point is : |
| A. | an empty directory at which the mounted file system will be attached |
| B. | a location where every time file systems are mounted |
| C. | is the time when the mounting is done |
| D. | none of the mentioned |
| Answer» B. a location where every time file systems are mounted | |
| 944. |
When a cycle exists, the reference count maybe non zero, even when it is no longer possible to refer to a directory or file, due to _______ |
| A. | the possibility of one hidden reference |
| B. | the possibility of two hidden references |
| C. | the possibility of self referencing |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 945. |
When keeping a list of all the links/references to a file, and the list is empty, implies that : |
| A. | the file has no copies |
| B. | the file is deleted |
| C. | the file is hidden |
| D. | none of the mentioned |
| Answer» C. the file is hidden | |
| 946. |
The deletion of a link, ________ the original file. |
| A. | deletes |
| B. | affects |
| C. | does not affect |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 947. |
The operating system _______ the links when traversing directory trees, to preserve the acyclic structure of the system. |
| A. | considers |
| B. | ignores |
| C. | deletes |
| D. | none of the mentioned |
| Answer» C. deletes | |
| 948. |
In UNIX, a link is : |
| A. | a directory entry |
| B. | a pointer to another file or subdirectory |
| C. | implemented as an absolute or relative path name |
| D. | all of the mentioned |
| Answer» E. | |
| 949. |
With a shared file : |
| A. | actual file exists |
| B. | there are two copies of the file |
| C. | the changes made by one person are not reflected to the other |
| D. | the changes made by one person are reflected to the other |
| Answer» E. | |
| 950. |
A tree structure ______ the sharing of files and directories. |
| A. | allows |
| B. | may restrict |
| C. | restricts |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |