MCQOPTIONS
Saved Bookmarks
This section includes 1690 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
| 951. |
When two users keep a subdirectory in their own directories, the structure being referred to is : |
| A. | tree structure |
| B. | cyclic graph directory structure |
| C. | two level directory structure |
| D. | acyclic graph directory |
| Answer» E. | |
| 952. |
A relative path name begins at the : |
| A. | leaf |
| B. | stem |
| C. | current directory |
| D. | root |
| Answer» D. root | |
| 953. |
An absolute path name begins at the : |
| A. | leaf |
| B. | stem |
| C. | current directory |
| D. | root |
| Answer» E. | |
| 954. |
Path names can be of two types : |
| A. | absolute & relative |
| B. | local & global |
| C. | global & relative |
| D. | relative & local |
| Answer» B. local & global | |
| 955. |
The current directory contains, most of the files that are : |
| A. | of current interest to the user |
| B. | stored currently in the system |
| C. | not used in the system |
| D. | not of current interest to the system |
| Answer» B. stored currently in the system | |
| 956. |
In the tree structured directories, |
| A. | the tree has the stem directory |
| B. | the tree has the leaf directory |
| C. | the tree has the leaf directory |
| D. | all of the mentioned |
| Answer» D. all of the mentioned | |
| 957. |
The disadvantage of the two level directory structure is that : |
| A. | it does not solve the name collision problem |
| B. | it solves the name collision problem |
| C. | it does not isolate users from one another |
| D. | it isolates users from one another |
| Answer» E. | |
| 958. |
When a user refers to particular file : |
| A. | system MFD is searched |
| B. | his own UFD is not searched |
| C. | both MFD and UFD are searched |
| D. | every directory is searched |
| Answer» D. every directory is searched | |
| 959. |
When a user job starts in a two level directory system, or a user logs in : |
| A. | the users user file directory is searched |
| B. | the system’s master file directory is not searched |
| C. | the master file directory is indexed by user name or account number, and each entry points to the UFD for that user |
| D. | all of the mentioned |
| Answer» D. all of the mentioned | |
| 960. |
In the two level directory structure : |
| A. | each user has his/her own user file directory |
| B. | the system doesn’t its own master file directory |
| C. | all of the mentioned |
| D. | none of the mentioned |
| Answer» B. the system doesn’t its own master file directory | |
| 961. |
In the single level directory : |
| A. | All files are contained in different directories all at the same level |
| B. | All files are contained in the same directory |
| C. | Depends on the operating system |
| D. | None of the mentioned |
| Answer» C. Depends on the operating system | |
| 962. |
The directory can be viewed as a _________ that translates file names into their directory entries. |
| A. | symbol table |
| B. | partition |
| C. | swap space |
| D. | cache |
| Answer» B. partition | |
| 963. |
To organise file systems on disk, : |
| A. | they are split into one or more partitions |
| B. | information about files is added to each partition |
| C. | they are made on different storage spaces |
| D. | all of the mentioned |
| Answer» C. they are made on different storage spaces | |
| 964. |
For large files, when the index itself becomes too large to be kept in memory : |
| A. | index is called |
| B. | an index is created for the index file |
| C. | secondary index files are created |
| D. | all of the mentioned |
| Answer» C. secondary index files are created | |
| 965. |
The index contains : |
| A. | names of all contents of file |
| B. | pointers to each page |
| C. | pointers to the various blocks |
| D. | All of the mentioned. |
| Answer» D. All of the mentioned. | |
| 966. |
A relative block number is an index relative to : |
| A. | the beginning of the file |
| B. | the end of the file |
| C. | the last written position in file |
| D. | none of the mentioned |
| Answer» B. the end of the file | |
| 967. |
For a direct access file : |
| A. | there are restrictions on the order of reading and writing |
| B. | there are no restrictions on the order of reading and writing |
| C. | access is restricted permission wise |
| D. | access is not restricted permission wise |
| Answer» C. access is restricted permission wise | |
| 968. |
The direct access method is based on a ______ model of a file, as _____ allow random access to any file block. |
| A. | magnetic tape, magnetic tapes |
| B. | tape, tapes |
| C. | disk, disks |
| D. | all of the mentioned |
| Answer» D. all of the mentioned | |
| 969. |
Sequential access method ______ on random access devices. |
| A. | works well |
| B. | doesnt work well |
| C. | maybe works well and doesnt work well |
| D. | none of the mentioned |
| Answer» B. doesnt work well | |
| 970. |
In the sequential access method, information in the file is processed : |
| A. | one disk after the other, record access doesnt matter |
| B. | one record after the other |
| C. | one text document after the other |
| D. | none of the mentioned |
| Answer» C. one text document after the other | |
| 971. |
The larger the block size, the ______ the internal fragmentation. |
| A. | greater |
| B. | lesser |
| C. | same |
| D. | none of the mentioned |
| Answer» B. lesser | |
| 972. |
The UNIX sytem uses a/an ________ stored at the beginning of a some files to indicate roughly the type of file. |
| A. | identifier |
| B. | extension |
| C. | virtual number |
| D. | magic number |
| Answer» E. | |
| 973. |
The file name is generally split into two parts : |
| A. | name & identifier |
| B. | identifier & type |
| C. | extension & name |
| D. | type & extension |
| Answer» D. type & extension | |
| 974. |
The open file table has a/an _______ associated with each file. |
| A. | file content |
| B. | file permission |
| C. | open count |
| D. | close count |
| Answer» D. close count | |
| 975. |
System wide table in UNIX contains process independent information such as : |
| A. | location of file on disk |
| B. | access dates |
| C. | file size |
| D. | all of the mentioned |
| Answer» E. | |
| 976. |
In UNIX, the open system call returns : |
| A. | pointer to the entry in the open file table |
| B. | pointer to the entry in the system wide table |
| C. | a file to the process calling it |
| D. | none of the mentioned |
| Answer» B. pointer to the entry in the system wide table | |
| 977. |
The operating system keeps a small table containing information about all open files called : |
| A. | system table |
| B. | open-file table |
| C. | file table |
| D. | directory table |
| Answer» C. file table | |
| 978. |
A file is a/an _______ data type. |
| A. | abstract |
| B. | primitive |
| C. | public |
| D. | private |
| Answer» B. primitive | |
| 979. |
The information about all files is kept in : |
| A. | swap space |
| B. | operating system |
| C. | seperate directory structure |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 980. |
File attributes consist of : |
| A. | name |
| B. | type |
| C. | identifier |
| D. | All of the mentioned |
| Answer» E. | |
| 981. |
Data cannot be written to secondary storage unless written within a ______ |
| A. | file |
| B. | swap space |
| C. | directory |
| D. | text format |
| Answer» B. swap space | |
| 982. |
Which protocol establishes the initial logical connection between a server and a client? |
| A. | transmission control protocol |
| B. | user datagram protocol |
| C. | mount protocol |
| D. | datagram congestion control protocol |
| Answer» D. datagram congestion control protocol | |
| 983. |
If the block of free-space list is free then bit will |
| A. | 1 |
| B. | 0 |
| C. | any of 0 or 1 |
| D. | none of the mentioned |
| Answer» B. 0 | |
| 984. |
In which type of allocation method each file occupy a set of contiguous block on the disk? |
| A. | contiguous allocation |
| B. | dynamic-storage allocation |
| C. | linked allocation |
| D. | indexed allocation |
| Answer» B. dynamic-storage allocation | |
| 985. |
The data structure used for file directory is called |
| A. | mount table |
| B. | hash table |
| C. | file table |
| D. | process table |
| Answer» C. file table | |
| 986. |
What is raw disk? |
| A. | disk without file system |
| B. | empty disk |
| C. | disk lacking logical file system |
| D. | disk having file system |
| Answer» B. empty disk | |
| 987. |
When a process closes the file |
| A. | per-process table entry is not removed |
| B. | system wide entry’s open count is decremented |
| C. | all of the mentioned |
| D. | none of the mentioned |
| Answer» C. all of the mentioned | |
| 988. |
To create a new file application program calls |
| A. | basic file system |
| B. | logical file system |
| C. | file-organisation module |
| D. | none of the mentioned |
| Answer» C. file-organisation module | |
| 989. |
Which table contains the information about each mounted volume? |
| A. | mount table |
| B. | system-wide open-file table |
| C. | per-process open-file table |
| D. | all of the mentioned |
| Answer» E. | |
| 990. |
A file control block contains the information about |
| A. | file ownership |
| B. | file permissions |
| C. | location of file contents |
| D. | all of the mentioned |
| Answer» E. | |
| 991. |
Management of metadata information is done by |
| A. | file-organisation module |
| B. | logical file system |
| C. | basic file system |
| D. | application programs |
| Answer» C. basic file system | |
| 992. |
file system fragmentation occurs when |
| A. | unused space or single file are not contiguous |
| B. | used space is not contiguous |
| C. | unused space is non-contiguous |
| D. | multiple files are non-contiguous |
| Answer» B. used space is not contiguous | |
| 993. |
Which one of the following explains the sequential file access method? |
| A. | random access according to the given byte number |
| B. | read bytes one at a time, in order |
| C. | read/write sequentially by record |
| D. | read/write randomly by record |
| Answer» C. read/write sequentially by record | |
| 994. |
Mapping of network file system protocol to local file system is done by |
| A. | network file system |
| B. | local file system |
| C. | volume manager |
| D. | remote mirror |
| Answer» B. local file system | |
| 995. |
Mapping of file is managed by |
| A. | file metadata |
| B. | page table |
| C. | virtual memory |
| D. | file system |
| Answer» B. page table | |
| 996. |
What is the mounting of file system? |
| A. | crating of a filesystem |
| B. | deleting a filesystem |
| C. | attaching portion of the file system into a directory structure |
| D. | removing portion of the file system into a directory structure |
| Answer» D. removing portion of the file system into a directory structure | |
| 997. |
Which file is a sequence of bytes organized into blocks understandable by the system’s linker? |
| A. | object file |
| B. | source file |
| C. | executable file |
| D. | text file |
| Answer» B. source file | |
| 998. |
File type can be represented by |
| A. | file name |
| B. | file extension |
| C. | file identifier |
| D. | none of the mentioned |
| Answer» C. file identifier | |
| 999. |
By using the specific system call, we can |
| A. | open the file |
| B. | read the file |
| C. | write into the file |
| D. | all of the mentioned |
| Answer» E. | |
| 1000. |
To create a file |
| A. | allocate the space in file system |
| B. | make an entry for new file in directory |
| C. | allocate the space in file system & make an entry for new file in directory |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |