Explore topic-wise MCQs in Technical Programming.

This section includes 1690 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.

951.

When two users keep a subdirectory in their own directories, the structure being referred to is :

A. tree structure
B. cyclic graph directory structure
C. two level directory structure
D. acyclic graph directory
Answer» E.
952.

A relative path name begins at the :

A. leaf
B. stem
C. current directory
D. root
Answer» D. root
953.

An absolute path name begins at the :

A. leaf
B. stem
C. current directory
D. root
Answer» E.
954.

Path names can be of two types :

A. absolute & relative
B. local & global
C. global & relative
D. relative & local
Answer» B. local & global
955.

The current directory contains, most of the files that are :

A. of current interest to the user
B. stored currently in the system
C. not used in the system
D. not of current interest to the system
Answer» B. stored currently in the system
956.

In the tree structured directories,

A. the tree has the stem directory
B. the tree has the leaf directory
C. the tree has the leaf directory
D. all of the mentioned
Answer» D. all of the mentioned
957.

The disadvantage of the two level directory structure is that :

A. it does not solve the name collision problem
B. it solves the name collision problem
C. it does not isolate users from one another
D. it isolates users from one another
Answer» E.
958.

When a user refers to particular file :

A. system MFD is searched
B. his own UFD is not searched
C. both MFD and UFD are searched
D. every directory is searched
Answer» D. every directory is searched
959.

When a user job starts in a two level directory system, or a user logs in :

A. the users user file directory is searched
B. the system’s master file directory is not searched
C. the master file directory is indexed by user name or account number, and each entry points to the UFD for that user
D. all of the mentioned
Answer» D. all of the mentioned
960.

In the two level directory structure :

A. each user has his/her own user file directory
B. the system doesn’t its own master file directory
C. all of the mentioned
D. none of the mentioned
Answer» B. the system doesn’t its own master file directory
961.

In the single level directory :

A. All files are contained in different directories all at the same level
B. All files are contained in the same directory
C. Depends on the operating system
D. None of the mentioned
Answer» C. Depends on the operating system
962.

The directory can be viewed as a _________ that translates file names into their directory entries.

A. symbol table
B. partition
C. swap space
D. cache
Answer» B. partition
963.

To organise file systems on disk, :

A. they are split into one or more partitions
B. information about files is added to each partition
C. they are made on different storage spaces
D. all of the mentioned
Answer» C. they are made on different storage spaces
964.

For large files, when the index itself becomes too large to be kept in memory :

A. index is called
B. an index is created for the index file
C. secondary index files are created
D. all of the mentioned
Answer» C. secondary index files are created
965.

The index contains :

A. names of all contents of file
B. pointers to each page
C. pointers to the various blocks
D. All of the mentioned.
Answer» D. All of the mentioned.
966.

A relative block number is an index relative to :

A. the beginning of the file
B. the end of the file
C. the last written position in file
D. none of the mentioned
Answer» B. the end of the file
967.

For a direct access file :

A. there are restrictions on the order of reading and writing
B. there are no restrictions on the order of reading and writing
C. access is restricted permission wise
D. access is not restricted permission wise
Answer» C. access is restricted permission wise
968.

The direct access method is based on a ______ model of a file, as _____ allow random access to any file block.

A. magnetic tape, magnetic tapes
B. tape, tapes
C. disk, disks
D. all of the mentioned
Answer» D. all of the mentioned
969.

Sequential access method ______ on random access devices.

A. works well
B. doesnt work well
C. maybe works well and doesnt work well
D. none of the mentioned
Answer» B. doesnt work well
970.

In the sequential access method, information in the file is processed :

A. one disk after the other, record access doesnt matter
B. one record after the other
C. one text document after the other
D. none of the mentioned
Answer» C. one text document after the other
971.

The larger the block size, the ______ the internal fragmentation.

A. greater
B. lesser
C. same
D. none of the mentioned
Answer» B. lesser
972.

The UNIX sytem uses a/an ________ stored at the beginning of a some files to indicate roughly the type of file.

A. identifier
B. extension
C. virtual number
D. magic number
Answer» E.
973.

The file name is generally split into two parts :

A. name & identifier
B. identifier & type
C. extension & name
D. type & extension
Answer» D. type & extension
974.

The open file table has a/an _______ associated with each file.

A. file content
B. file permission
C. open count
D. close count
Answer» D. close count
975.

System wide table in UNIX contains process independent information such as :

A. location of file on disk
B. access dates
C. file size
D. all of the mentioned
Answer» E.
976.

In UNIX, the open system call returns :

A. pointer to the entry in the open file table
B. pointer to the entry in the system wide table
C. a file to the process calling it
D. none of the mentioned
Answer» B. pointer to the entry in the system wide table
977.

The operating system keeps a small table containing information about all open files called :

A. system table
B. open-file table
C. file table
D. directory table
Answer» C. file table
978.

A file is a/an _______ data type.

A. abstract
B. primitive
C. public
D. private
Answer» B. primitive
979.

The information about all files is kept in :

A. swap space
B. operating system
C. seperate directory structure
D. none of the mentioned
Answer» D. none of the mentioned
980.

File attributes consist of :

A. name
B. type
C. identifier
D. All of the mentioned
Answer» E.
981.

Data cannot be written to secondary storage unless written within a ______

A. file
B. swap space
C. directory
D. text format
Answer» B. swap space
982.

Which protocol establishes the initial logical connection between a server and a client?

A. transmission control protocol
B. user datagram protocol
C. mount protocol
D. datagram congestion control protocol
Answer» D. datagram congestion control protocol
983.

If the block of free-space list is free then bit will

A. 1
B. 0
C. any of 0 or 1
D. none of the mentioned
Answer» B. 0
984.

In which type of allocation method each file occupy a set of contiguous block on the disk?

A. contiguous allocation
B. dynamic-storage allocation
C. linked allocation
D. indexed allocation
Answer» B. dynamic-storage allocation
985.

The data structure used for file directory is called

A. mount table
B. hash table
C. file table
D. process table
Answer» C. file table
986.

What is raw disk?

A. disk without file system
B. empty disk
C. disk lacking logical file system
D. disk having file system
Answer» B. empty disk
987.

When a process closes the file

A. per-process table entry is not removed
B. system wide entry’s open count is decremented
C. all of the mentioned
D. none of the mentioned
Answer» C. all of the mentioned
988.

To create a new file application program calls

A. basic file system
B. logical file system
C. file-organisation module
D. none of the mentioned
Answer» C. file-organisation module
989.

Which table contains the information about each mounted volume?

A. mount table
B. system-wide open-file table
C. per-process open-file table
D. all of the mentioned
Answer» E.
990.

A file control block contains the information about

A. file ownership
B. file permissions
C. location of file contents
D. all of the mentioned
Answer» E.
991.

Management of metadata information is done by

A. file-organisation module
B. logical file system
C. basic file system
D. application programs
Answer» C. basic file system
992.

file system fragmentation occurs when

A. unused space or single file are not contiguous
B. used space is not contiguous
C. unused space is non-contiguous
D. multiple files are non-contiguous
Answer» B. used space is not contiguous
993.

Which one of the following explains the sequential file access method?

A. random access according to the given byte number
B. read bytes one at a time, in order
C. read/write sequentially by record
D. read/write randomly by record
Answer» C. read/write sequentially by record
994.

Mapping of network file system protocol to local file system is done by

A. network file system
B. local file system
C. volume manager
D. remote mirror
Answer» B. local file system
995.

Mapping of file is managed by

A. file metadata
B. page table
C. virtual memory
D. file system
Answer» B. page table
996.

What is the mounting of file system?

A. crating of a filesystem
B. deleting a filesystem
C. attaching portion of the file system into a directory structure
D. removing portion of the file system into a directory structure
Answer» D. removing portion of the file system into a directory structure
997.

Which file is a sequence of bytes organized into blocks understandable by the system’s linker?

A. object file
B. source file
C. executable file
D. text file
Answer» B. source file
998.

File type can be represented by

A. file name
B. file extension
C. file identifier
D. none of the mentioned
Answer» C. file identifier
999.

By using the specific system call, we can

A. open the file
B. read the file
C. write into the file
D. all of the mentioned
Answer» E.
1000.

To create a file

A. allocate the space in file system
B. make an entry for new file in directory
C. allocate the space in file system & make an entry for new file in directory
D. none of the mentioned
Answer» D. none of the mentioned