Explore topic-wise MCQs in Technical Programming.

This section includes 1690 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.

901.

During compaction time, other normal system operations _______ be permitted.

A. Can
B. Cannot
C. is
D. none of the mentioned
Answer» C. is
902.

For processes to request access to file contents, they need to :

A. they need to run a seperate program
B. they need special interrupts
C. implement the open and close system calls
D. none of the mentioned
Answer» D. none of the mentioned
903.

For each file there exists a ___________ that contains information about the file, including ownership, permissions and location of the file contents.

A. metadata
B. file control block
C. process control block
D. All of the mentioned
Answer» C. process control block
904.

Metadata includes :

A. all of the file system structure
B. contents of files
C. both file system structure and contents of files
D. none of the mentioned
Answer» D. none of the mentioned
905.

The file organization module knows about :

A. files
B. logical blocks of files
C. physical blocks of files
D. all of the mentioned
Answer» E.
906.

A device driver can be thought of as a translator. Its input consists of _____ commands and output consists of _______ instructions.

A. high level, low level
B. low level, high level
C. complex, simple
D. low level, complex
Answer» B. low level, high level
907.

If too little space is allocated to a file

A. the file will not work
B. there will not be any space for the data, as the FCB takes it all
C. the file cannot be extended
D. the file cannot be opened
Answer» D. the file cannot be opened
908.

To solve the problem of external fragmentation, ________ needs to be done periodically.

A. compaction
B. check
C. formatting
D. replacing memory
Answer» B. check
909.

The first fit and best fit algorithms suffer from :

A. internal fragmentation
B. external fragmentation
C. starvation
D. all of the mentioned
Answer» C. starvation
910.

_______ and ________ are the most common strategies used to select a free hole from the set of available holes.

A. First fit, Best fit
B. Worst fit, First fit
C. Best fit, Worst fit
D. None of the mentioned
Answer» B. Worst fit, First fit
911.

One difficulty of contiguous allocation is :

A. finding space for a new file
B. inefficient
C. costly
D. time taking
Answer» B. inefficient
912.

Contiguous allocation of a file is defined by :

A. disk address of the first block & length
B. length & size of the block
C. size of the block
D. total size of the file
Answer» B. length & size of the block
913.

The real disadvantage of a linear list of directory entries is the :

A. size of the linear list in memory
B. linear search to find a file
C. it is not reliable
D. all of the mentioned
Answer» C. it is not reliable
914.

The VFS (virtual file system) activates file system specific operations to handle local requests according to their _______

A. size
B. commands
C. timings
D. file system types
Answer» E.
915.

On systems where there are multiple operating system, the decision to load a particular one is done by :

A. boot loader
B. bootstrap
C. process control block
D. file control block
Answer» B. bootstrap
916.

In indexed allocation :

A. each file must occupy a set of contiguous blocks on the disk
B. each file is a linked list of disk blocks
C. all the pointers to scattered blocks are placed together in one location
D. none of the mentioned
Answer» D. none of the mentioned
917.

In linked allocation :

A. each file must occupy a set of contiguous blocks on the disk
B. each file is a linked list of disk blocks
C. all the pointers to scattered blocks are placed together in one location
D. none of the mentioned
Answer» C. all the pointers to scattered blocks are placed together in one location
918.

In contiguous allocation :

A. each file must occupy a set of contiguous blocks on the disk
B. each file is a linked list of disk blocks
C. all the pointers to scattered blocks are placed together in one location
D. none of the mentioned
Answer» B. each file is a linked list of disk blocks
919.

The three major methods of allocating disk space that are in wide use are :

A. contiguous
B. linked
C. indexed
D. all of the mentioned
Answer» E.
920.

Disks are segmented into one or more partitions, each containing a file system or ______

A. left ‘raw’
B. made into swap space
C. made into backup space
D. left ‘ripe’
Answer» B. made into swap space
921.

In UNIX, the directory protection is handled _________ to the file protection.

A. different
B. similar
C. it is not handled at all
D. none of the mentioned
Answer» C. it is not handled at all
922.

In a multi level directory structure :

A. the same previous techniques will be used as in the other structures
B. a mechanism for directory protection will have to applied
C. the subdirectories do not need protection once the directory is protected
D. none of the mentioned
Answer» C. the subdirectories do not need protection once the directory is protected
923.

If each access to a file is controlled by a password, then the disadvantage is that :

A. user will need to remember a lot of passwords
B. it is not reliable
C. it is not efficient
D. all of the mentioned
Answer» B. it is not reliable
924.

To control access the three bits used in UNIX are represented by :

A. r
B. w
C. x
D. all of the mentioned
Answer» E.
925.

In UNIX, groups can be created and modified by :

A. superuser
B. any user
C. a programmer only
D. the people in the group only
Answer» B. any user
926.

Universe consists of :

A. all users that aren’t included in the group or owners
B. all users that are not owners
C. all users in the system
D. none of the mentioned
Answer» D. none of the mentioned
927.

All users in a group get _______ access to a file.

A. different
B. similar
C. same
D. none of the mentioned
Answer» C. same
928.

Many systems recognize three classifications of users in connection with each file (to condense the access control list) :

A. Owner
B. Group
C. Universe
D. All of the mentioned
Answer» E.
929.

The main problem with access control lists is :

A. their maintenance
B. their length
C. their permissions
D. All of the mentioned
Answer» C. their permissions
930.

Protection is only provided at the _____ level.

A. lower
B. central
C. higher
D. none of the mentioned
Answer» B. central
931.

Reliability of files can be increased by :

A. keeping the files safely in the memory
B. making a different partition for the files
C. by keeping them in external storage
D. by keeping duplicate copies of the file
Answer» E.
932.

The series of accesses between the open and close operations is a :

A. transaction
B. procedure
C. program
D. file session
Answer» E.
933.

To recover from failures in the network operations, ______ information may be maintained.

A. ip address
B. state
C. stateless
D. operating system
Answer» C. stateless
934.

Domain name system provides :

A. host-name-to-network-address translations for the entire internet
B. network-address-to-host-name translations for the entire internet
C. binary to hex translations for the entire internet
D. all of the mentioned
Answer» B. network-address-to-host-name translations for the entire internet
935.

Distributed naming services/Distributed information systems have been devised to :

A. provide information about all the systems
B. provide unified access to the information needed for remote computing
C. provide unique names to all systems in a network
D. all of the mentioned
Answer» C. provide unique names to all systems in a network
936.

The machine containing the files is the _______ and the machine wanting to access the files is the ______

A. master, slave
B. memory, user
C. server, client
D. none of the mentioned
Answer» D. none of the mentioned
937.

Anonymous access allows a user to transfer files :

A. without having an account on the remote system
B. only if he accesses the system with a guest account
C. only if he has an account on the remote system
D. none of the mentioned
Answer» B. only if he accesses the system with a guest account
938.

In the world wide web, a ____ is needed to gain access to the remote files, and separate operations are used to transfer files.

A. laptop
B. plugin
C. browser
D. player
Answer» D. player
939.

In distributed file system, ______ directories are visible from the local machine.

A. protected
B. local
C. private
D. remote
Answer» E.
940.

A process _____ lower the priority of another process, if both are owned by the same owner.

A. must
B. can
C. cannot
D. none of the mentioned
Answer» C. cannot
941.

In UNIX, exactly which operations can be executed by group members and other users is definable by :

A. the group’s head
B. the file’s owner
C. the file’s permissions
D. all of the mentioned
Answer» C. the file’s permissions
942.

When a file system is mounted over a directory that is not empty :

A. the system may not allow the mount
B. the system must allow the mount
C. the system may allow the mount and the directory’s existing files will then be made obscure
D. all of the mentioned
Answer» D. all of the mentioned
943.

A mount point is :

A. an empty directory at which the mounted file system will be attached
B. a location where every time file systems are mounted
C. is the time when the mounting is done
D. none of the mentioned
Answer» B. a location where every time file systems are mounted
944.

When a cycle exists, the reference count maybe non zero, even when it is no longer possible to refer to a directory or file, due to _______

A. the possibility of one hidden reference
B. the possibility of two hidden references
C. the possibility of self referencing
D. none of the mentioned
Answer» D. none of the mentioned
945.

When keeping a list of all the links/references to a file, and the list is empty, implies that :

A. the file has no copies
B. the file is deleted
C. the file is hidden
D. none of the mentioned
Answer» C. the file is hidden
946.

The deletion of a link, ________ the original file.

A. deletes
B. affects
C. does not affect
D. none of the mentioned
Answer» D. none of the mentioned
947.

The operating system _______ the links when traversing directory trees, to preserve the acyclic structure of the system.

A. considers
B. ignores
C. deletes
D. none of the mentioned
Answer» C. deletes
948.

In UNIX, a link is :

A. a directory entry
B. a pointer to another file or subdirectory
C. implemented as an absolute or relative path name
D. all of the mentioned
Answer» E.
949.

With a shared file :

A. actual file exists
B. there are two copies of the file
C. the changes made by one person are not reflected to the other
D. the changes made by one person are reflected to the other
Answer» E.
950.

A tree structure ______ the sharing of files and directories.

A. allows
B. may restrict
C. restricts
D. none of the mentioned
Answer» D. none of the mentioned