Que- The information about all files is kept in :
a. swap space
b. operating system
c. seperate directory structure
d. none of the mentioned
Answer- seperate directory structure
Que- A file is a/an _______ data type.
a. abstract
b. primitive
c. public
d. private
Answer- abstract
Que- The operating system keeps a small table containing information about all open files called :
a. system table
b. open-file table
c. file table
d. directory table
Answer- open-file table
Que- In UNIX, the open system call returns :
a. pointer to the entry in the open file table
b. pointer to the entry in the system wide table
c. a file to the process calling it
d. none of the mentioned
Answer- pointer to the entry in the open file table
Que- System wide table in UNIX contains process independent information such as :
a. location of file on disk
b. access dates
c. file size
d. all of the mentioned
Answer- all of the mentioned
Que- The open file table has a/an _______ associated with each file.
a. file content
b. file permission
c. open count
d. close count
Answer- open count
Que- The file name is generally split into two parts :
a. name & identifier
b. identifier & type
c. extension & name
d. type & extension
Answer- extension & name
Que- To organise file systems on disk, :
a. they are split into one or more partitions
b. information about files is added to each partition
c. they are made on different storage spaces
d. all of the mentioned
Answer- information about files is added to each partition
Que- The directory can be viewed as a _________ that translates file names into their directory entries.
a. symbol table
b. partition
c. swap space
d. cache
Answer- symbol table
Que- In the single level directory :
a. All files are contained in different directories all at the same level
b. All files are contained in the same directory
c. Depends on the operating system
d. None of the mentioned
Answer- All files are contained in the same directory
Que- In the single level directory :
a. all directories must have unique names
b. all files must have unique names
c. all files must have unique owners
d. all of the mentioned
Answer- all files must have unique names
Que- In the two level directory structure :
a. each user has his/her own user file directory
b. the system doesn't its own master file directory
c. all of the mentioned
d. none of the mentioned
Answer- each user has his/her own user file directory
Que- When a user job starts in a two level directory system, or a user logs in :
a. the users user file directory is searched
b. the system's master file directory is not searched
c. the master file directory is indexed by user name or account number, and each entry points to the UFD for that user
d. all of the mentioned
Answer- the master file directory is indexed by user name or account number, and each entry points to the UFD for that user
Que- When a user refers to particular file :
a. system MFD is searched
b. his own UFD is not searched
c. both MFD and UFD are searched
d. every directory is searched
Answer- both MFD and UFD are searched
Que- The disadvantage of the two level directory structure is that :
a. it does not solve the name collision problem
b. it solves the name collision problem
c. it does not isolate users from one another
d. it isolates users from one another
Answer- it isolates users from one another
Que- In the tree structured directories,
a. the tree has the stem directory
b. the tree has the leaf directory
c. the tree has the root directory
d. all of the mentioned
Answer- the tree has the root directory
Que- The current directory contains, most of the files that are :
a. of current interest to the user
b. stored currently in the system
c. not used in the system
d. not of current interest to the system
Answer- of current interest to the user
Que- An absolute path name begins at the :
a. leaf
b. stem
c. current directory
d. root
Answer- root
Que- A relative path name begins at the :
a. leaf
b. stem
c. current directory
d. root
Answer- current directory
Que- In tree structure, when deleting a directory that is not empty :
a. The contents of the directory are safe
b. The contents of the directory are also deleted
c. contents of the directory are not deleted
d. none of the mentioned
Answer- The contents of the directory are also deleted
Que- When two users keep a subdirectory in their own directories, the structure being referred to is :
a. tree structure
b. cyclic graph directory structure
c. two level directory structure
d. acyclic graph directory
Answer- acyclic graph directory
Que- A tree structure ______ the sharing of files and directories.
a. allows
b. may restrict
c. restricts
d. none of the mentioned
Answer- restricts
Que- With a shared file :
a. actual file exists
b. there are two copies of the file
c. the changes made by one person are not reflected to the other
d. the changes made by one person are reflected to the other
Answer- the changes made by one person are reflected to the other
Que- In UNIX, a link is :
a. a directory entry
b. a pointer to another file or subdirectory
c. implemented as an absolute or relative path name
d. all of the mentioned
Answer- all of the mentioned
Que- The operating system _______ the links when traversing directory trees, to preserve the acyclic structure of the system.
a. considers
b. ignores
c. deletes
d. none of the mentioned
Answer- ignores
Que- The deletion of a link, ________ the original file.
a. deletes
b. affects
c. does not affect
d. none of the mentioned
Answer- does not affect
Que- When keeping a list of all the links/references to a file, and the list is empty, implies that :
a. the file has no copies
b. the file is deleted
c. the file is hidden
d. none of the mentioned
Answer- the file is deleted
Que- When a cycle exists, the reference count maybe non zero, even when it is no longer possible to refer to a directory or file, due to _______
a. the possibility of one hidden reference
b. the possibility of two hidden references
c. the possibility of self referencing
d. none of the mentioned
Answer- the possibility of self referencing
Que- A mount point is :
a. an empty directory at which the mounted file system will be attached
b. a location where every time file systems are mounted
c. is the time when the mounting is done
d. none of the mentioned
Answer- an empty directory at which the mounted file system will be attached
Que- When a file system is mounted over a directory that is not empty :
a. the system may not allow the mount
b. the system must allow the mount
c. the system may allow the mount and the directory's existing files will then be made obscure
d. all of the mentioned
Answer- the system may allow the mount and the directory's existing files will then be made obscure
Que- In UNIX, exactly which operations can be executed by group members and other users is definable by :
a. the group's head
b. the file's owner
c. the file's permissions
d. all of the mentioned
Answer- the file's owner
Que- A process _____ lower the priority of another process, if both are owned by the same owner.
a. must
b. can
c. cannot
d. none of the mentioned
Answer- can
Que- In distributed file system, ______ directories are visible from the local machine.
a. protected
b. local
c. private
d. remote
Answer- remote
Que- In the world wide web, a ____ is needed to gain access to the remote files, and separate operations are used to transfer files.
a. laptop
b. plugin
c. browser
d. player
Answer- browser
Que- Anonymous access allows a user to transfer files :
a. without having an account on the remote system
b. only if he accesses the system with a guest account
c. only if he has an account on the remote system
d. none of the mentioned
Answer- without having an account on the remote system
Que- The machine containing the files is the _______ and the machine wanting to access the files is the ______
a. master, slave
b. memory, user
c. server, client
d. none of the mentioned
Answer- server, client
Que- Distributed naming services/Distributed information systems have been devised to :
a. provide information about all the systems
b. provide unified access to the information needed for remote computing
c. provide unique names to all systems in a network
d. all of the mentioned
Answer- provide unified access to the information needed for remote computing
Que- Domain name system provides :
a. host-name-to-network-address translations for the entire internet
b. network-address-to-host-name translations for the entire internet
c. binary to hex translations for the entire internet
d. all of the mentioned
Answer- host-name-to-network-address translations for the entire internet
Que- To recover from failures in the network operations, ______ information may be maintained.
a. ip address
b. state
c. stateless
d. operating system
Answer- state
Que- The series of accesses between the open and close operations is a :
a. transaction
b. procedure
c. program
d. file session
Answer- file session
Que- Reliability of files can be increased by :
a. keeping the files safely in the memory
b. making a different partition for the files
c. by keeping them in external storage
d. by keeping duplicate copies of the file
Answer- by keeping duplicate copies of the file
Que- Protection is only provided at the _____ level.
a. lower
b. central
c. higher
d. none of the mentioned
Answer- lower
Que- The main problem with access control lists is :
a. their maintenance
b. their length
c. their permissions
d. all of the mentioned
Answer- their length
Que- Many systems recognize three classifications of users in connection with each file (to condense the access control list) :
a. Owner
b. Group
c. Universe
d. All of the mentioned
Answer- All of the mentioned
Que- All users in a group get _______ access to a file.
a. different
b. similar
c. same
d. none of the mentioned
Answer- similar
Que- Universe consists of :
a. all users that aren't included in the group or owners
b. all users that are not owners
c. all users in the system
d. none of the mentioned
Answer- all users in the system
Que- In UNIX, groups can be created and modified by :
a. superuser
b. any user
c. a programmer only
d. the people in the group only
Answer- superuser
Que- To control access the three bits used in UNIX are represented by :
a. r
b. w
c. x
d. all of the mentioned
Answer- all of the mentioned
Que- If each access to a file is controlled by a password, then the disadvantage is that :
a. user will need to remember a lot of passwords
b. it is not reliable
c. it is not efficient
d. all of the mentioned
Answer- user will need to remember a lot of passwords
Que- In a multi level directory structure :
a. the same previous techniques will be used as in the other structures
b. a mechanism for directory protection will have to applied
c. the subdirectories do not need protection once the directory is protected
d. none of the mentioned
Answer- a mechanism for directory protection will have to applied
Que- In UNIX, the directory protection is handled _________ to the file protection.
a. different
b. similar
c. it is not handled at all
d. none of the mentioned
Answer- similar
Que- Disks are segmented into one or more partitions, each containing a file system or ______
a. left 'raw'
b. made into swap space
c. made into backup space
d. left 'ripe'
Answer- left 'raw'
Que- The three major methods of allocating disk space that are in wide use are :
a. contiguous
b. linked
c. indexed
d. all of the mentioned
Answer- all of the mentioned
Que- In contiguous allocation :
a. each file must occupy a set of contiguous blocks on the disk
b. each file is a linked list of disk blocks
c. all the pointers to scattered blocks are placed together in one location
d. none of the mentioned
Answer- each file must occupy a set of contiguous blocks on the disk
Que- In linked allocation :
a. each file must occupy a set of contiguous blocks on the disk
b. each file is a linked list of disk blocks
c. all the pointers to scattered blocks are placed together in one location
d. none of the mentioned
Answer- each file is a linked list of disk blocks
Que- In indexed allocation :
a. each file must occupy a set of contiguous blocks on the disk
b. each file is a linked list of disk blocks
c. all the pointers to scattered blocks are placed together in one location
d. none of the mentioned
Answer- all the pointers to scattered blocks are placed together in one location
Que- On systems where there are multiple operating system, the decision to load a particular one is done by :
a. boot loader
b. bootstrap
c. process control block
d. file control block
Answer- boot loader
Que- The VFS (virtual file system) activates file system specific operations to handle local requests according to their _______
a. size
b. commands
c. timings
d. file system types
Answer- file system types
Que- The real disadvantage of a linear list of directory entries is the :
a. size of the linear list in memory
b. linear search to find a file
c. it is not reliable
d. all of the mentioned
Answer- linear search to find a file
Que- Contiguous allocation of a file is defined by :
a. disk address of the first block & length
b. length & size of the block
c. size of the block
d. total size of the file
Answer- disk address of the first block & length
Que- One difficulty of contiguous allocation is :
a. finding space for a new file
b. inefficient
c. costly
d. time taking
Answer- finding space for a new file
Que- _______ and ________ are the most common strategies used to select a free hole from the set of available holes.
a. First fit, Best fit
b. Worst fit, First fit
c. Best fit, Worst fit
d. None of the mentioned
Answer- First fit, Best fit
Que- The first fit and best fit algorithms suffer from :
a. internal fragmentation
b. external fragmentation
c. starvation
d. all of the mentioned
Answer- external fragmentation
Que- To solve the problem of external fragmentation, ________ needs to be done periodically.
a. compaction
b. check
c. formatting
d. replacing memory
Answer- compaction
Que- If too little space is allocated to a file
a. the file will not work
b. there will not be any space for the data, as the FCB takes it all
c. the file cannot be extended
d. the file cannot be opened
Answer- the file cannot be extended
Que- A device driver can be thought of as a translator. Its input consists of _____ commands and output consists of _______ instructions.
a. high level, low level
b. low level, high level
c. complex, simple
d. low level, complex
Answer- high level, low level
Que- The file organization module knows about :
a. files
b. logical blocks of files
c. physical blocks of files
d. all of the mentioned
Answer- all of the mentioned
Que- Metadata includes :
a. all of the file system structure
b. contents of files
c. both file system structure and contents of files
d. none of the mentioned
Answer- both file system structure and contents of files
Que- For each file there exists a ___________ that contains information about the file, including ownership, permissions and location of the file contents.
a. metadata
b. file control block
c. process control block
d. all of the mentioned
Answer- file control block
Que- For processes to request access to file contents, they need to :
a. they need to run a seperate program
b. they need special interrupts
c. implement the open and close system calls
d. none of the mentioned
Answer- implement the open and close system calls
Que- During compaction time, other normal system operations _______ be permitted.
a. can
b. cannot
c. is
d. none of the mentioned
Answer- cannot
Que- When in contiguous allocation the space cannot be extended easily :
a. the contents of the file have to be copied to a new space, a larger hole
b. the file gets destroyed
c. the file will get formatted and lost all its data
d. none of the mentioned
Answer- the contents of the file have to be copied to a new space, a larger hole
Que- In the linked allocation, the directory contains a pointer to the :I. first blockII. last block
a. I only
b. II only
c. Both I and II
d. Neither I nor II
Answer- Both I and II
Que- There is no __________ with linked allocation.
a. internal fragmentation
b. external fragmentation
c. starvation
d. all of the mentioned
Answer- external fragmentation
Que- The major disadvantage with linked allocation is that :
a. internal fragmentation
b. external fragmentation
c. there is no sequential access
d. there is only sequential access
Answer- there is only sequential access
Que- If a pointer is lost or damaged in a linked allocation :
a. the entire file could get damaged
b. only a part of the file would be affected
c. there would not be any problems
d. none of the mentioned
Answer- the entire file could get damaged
Que- FAT stands for :
a. File Attribute Transport
b. File Allocation Table
c. Fork At Time
d. None of the mentioned
Answer- File Allocation Table
Que- By using FAT, random access time is __________
a. the same
b. increased
c. decreased
d. not affected
Answer- decreased
Que- A better way of contiguous allocation to extend the file size is :
a. adding an extent (another chunk of contiguous space)
b. adding an index table to the first contiguous block
c. adding pointers into the first contiguous block
d. none of the mentioned
Answer- adding an extent (another chunk of contiguous space)
Que- If the extents are too large, then the problem that comes in is :
a. internal fragmentation
b. external fragmentation
c. starvation
d. all of the mentioned
Answer- internal fragmentation
Que- The FAT is used much as a _________
a. stack
b. linked list
c. data
d. pointer
Answer- linked list
Que- A section of disk at the beginning of each partition is set aside to contain the table in :
a. fat
b. linked allocation
c. hashed allocation
d. indexed allocation
Answer- fat
Que- Contiguous allocation has two problems _________ and _________ that linked allocation solves.
a. external - fragmentation & size - declaration
b. internal - fragmentation & external - fragmentation
c. size - declaration & internal - fragmentation
d. memory - allocation & size - declaration
Answer- external - fragmentation & size - declaration
Que- Each _______ has its own index block.
a. partition
b. address
c. file
d. all of the mentioned
Answer- file
Que- Indexed allocation _________ direct access.
a. supports
b. does not support
c. is not related to
d. none of the mentioned
Answer- supports
Que- The pointer overhead of indexed allocation is generally _________ the pointer overhead of linked allocation.
a. less than
b. equal to
c. greater than
d. keeps varying with
Answer- greater than
Que- For any type of access, contiguous allocation requires ______ access to get a disk block.
a. only one
b. at least two
c. exactly two
d. none of the mentioned
Answer- only one
Que- _______ tend to represent a major bottleneck in system performance.
a. CPUs
b. Disks
c. Programs
d. I/O
Answer- Disks
Que- In UNIX, even an 'empty' disk has a percentage of its space lost to ______
a. programs
b. inodes
c. virtual memory
d. stacks
Answer- inodes
Que- By preallocating the inodes and spreading them across the volume, we ___________ the system performance.
a. improve
b. decrease
c. maintain
d. do not affect
Answer- improve
Que- ____________ writes occur in the order in which the disk subsystem receives them, and the writes are not buffered.
a. Asynchronous
b. Regular
c. Synchronous
d. Irregular
Answer- Synchronous
Que- In ___________ writes, the data is stored in the cache.
a. Asynchronous
b. Regular
c. Synchronous
d. Irregular
Answer- Asynchronous