0% found this document useful (0 votes)
22 views34 pages

File System Questions

This document contains a series of multiple-choice questions and answers related to file system concepts, implementation, and access methods in operating systems. It covers topics such as file allocation methods, metadata management, and file organization. Each question is followed by the correct answer and a brief explanation.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views34 pages

File System Questions

This document contains a series of multiple-choice questions and answers related to file system concepts, implementation, and access methods in operating systems. It covers topics such as file allocation methods, metadata management, and file organization. Each question is followed by the correct answer and a brief explanation.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 34

Operating System Questions & Answers –

File System Concepts


This section of our 1000+ Operating System MCQs focuses on file system concepts of Operating
System.

1. ______ is

Operating System Questions & Answers – File System Concepts

This section of our 1000+ Operating System MCQs focuses on file system concepts of Operating
System.

1. ______ is a unique tag, usually a number, identifies the file within the file system.

a) File identifier

b) File name

c) File type

d) none of the mentioned

View Answer

Answer:a

Explanation:None.

2. To create a file

a) allocate the space in file system

b) make an entry for new file in directory

c) both (a) and (b)

d) none of the mentioned

View Answer
Answer:c

Explanation:None.

3. By using the specific system call, we can

a) open the file

b) read the file

c) write into the file

d) all of the mentioned

View Answer

Answer:d

Explanation:None.

4. File type can be represented by

a) file name

b) file extension

c) file identifier

d) none of the mentioned

View Answer

Answer:b

Explanation:None.

5. Which file is a sequence of bytes organized into blocks understandable by the system’s linker?

a) object file

b) source file
c) executable file

d) text file

View Answer

Answer:a

Explanation:None.

6. What is the mounting of file system?

a) crating of a filesystem

b) deleting a filesystem

c) attaching portion of the file system into a directory structure

d) removing portion of the file system into a directory structure

View Answer

Answer:c

Explanation:None.

7. Mapping of file is managed by

a) file metadata

b) page table

c) virtual memory

d) file system

View Answer

Answer:a

Explanation:None.
8. Mapping of network file system protocol to local file system is done by

a) network file system

b) local file system

c) volume manager

d) remote mirror

View Answer

Answer:a

Explanation:None.

advertisements

9. Which one of the following explains the sequential file access method?

a) random access according to the given byte number

b) read bytes one at a time, in order

c) read/write sequentially by record

d) read/write randomly by record

View Answer

Answer:b

Explanation:None.

10. file system fragmentation occurs when

a) unused space or single file are not contiguous

b) used space is not contiguous


c) unused space is non-contiguous

d) multiple files are non-contiguous

View Answer

Answer:a

Explanation:None.

Operating System Questions & Answers –


File System Implementation – Allocation
Methods – 1
This set of 1000+ Operating System MCQs focuses on “File System Implementation –
Allocation Methods”

1) The three major methods of allocating disk space that are in wide use are :
a) contiguous
b) linked
c) indexed
d) hashed
View Answer

Answer : a, b and c
Explanation: None.

2) In contiguous allocation :
a) each file must occupy a set of contiguous blocks on the disk
b) each file is a linked list of disk blocks
c) all the pointers to scattered blocks are placed together in one location
d) None of these
View Answer

Answer : a
Explanation: None.

3) In linked allocation :
a) each file must occupy a set of contiguous blocks on the disk
b) each file is a linked list of disk blocks
c) all the pointers to scattered blocks are placed together in one location
d) None of these
View Answer
Answer : b
Explanation: None.

4) In indexed allocation :
a) each file must occupy a set of contiguous blocks on the disk
b) each file is a linked list of disk blocks
c) all the pointers to scattered blocks are placed together in one location
d) None of these
View Answer

Answer : c
Explanation: None.

Operating System Questions & Answers –


File System Implementation – Allocation
Methods – 2
This set of 1000+ Basic Operating System Questions and Answers focuses on “File System
Implementation – Allocation Methods”

1) A device driver can be thought of as a translator. Its input consists of _____ commands and
output consists of _______ instructions.
a) high level, low level
b) low level, high level
c) complex, simple
d) Both a and c
View Answer

Answer : a
Explanation: None.

2) The file organization module knows about :


a) files
b) logical blocks of files
c) physical blocks of files
d) All of these
View Answer

Answer : d
Explanation: None.
3) Metadata includes :
a) all of the file system structure
b) contents of files
c) Both a and b
d) None of these
View Answer

Answer : c
Explanation: None.

4) For each file their exists a ___________, that contains information about the file, including
ownership, permissions and location of the file contents.
a) metadata
b) file control block
c) process control block
d) All of these
View Answer

Answer : b
Explanation: None.

5) For processes to request access to file contents, they need to :


a) they need to run a seperate program
b) they need special interrupts
c) implement the open and close system calls
d) None of these
View Answer

Answer : c
Explanation: None.
advertisements
6) During compaction time, other normal system operations _______ be permitted.
a) can
b) cannot
c) is
d) None of these
View Answer
Answer : b
Explanation: None.

7) When in contiguous allocation the space cannot be extended easily :


a) the contents of the file have to be copied to a new space, a larger hole
b) the file gets destroyed
c) the file will get formatted and loose all its data
d) None of these
View Answer
Answer : a
Explanation: None.

8) In the linked allocation, the directory contains a pointer to the :


I. first block
II. last block

a) I only
b) II only
c) Both I and II
d) Neither I nor II
View Answer

Answer : c
Explanation: None.

9) There is no __________ with linked allocation.


a) internal fragmentation
b) external fragmentation
c) starvation
d) All of these
View Answer

Answer : b
Explanation: None.

10) The major disadvantage with linked allocation is that :


a) internal fragmentation
b) external fragmentation
c) there is no sequential access
d) there is only sequential access
View Answer

Answer : d
Explanation: None.
advertisements
11) If a pointer is lost or damaged in a linked allocation :
a) the entire file could get damaged
b) only a part of the file would be affected
c) there would not be any problems
d) None of these
View Answer
Answer : a
Explanation: None.
12) FAT stands for :
a) File Attribute Transport
b) File Allocation Table
c) Fork At Time
d) None of these
View Answer

Answer : b
Explanation: None.

13) By using FAT, random access time is __________.


a) the same
b) increased
c) decreased
d) not affected
View Answer

Answer : c
Explanation: None.

Operating System Questions & Answers –


File System Implementation – Allocation
Methods – 3
This set of 1000+ Operating System Puzzles focuses on “File System Implementation –
Allocation Methods”

1) A better way of contiguous allocation to extend the file size is :


a) adding an extent (another chunk of contiguous space)
b) adding an index table to the first contiguous block
c) adding pointers into the first contiguous block
d) None of these
View Answer

Answer : a
Explanation: None.

2) If the extents are too large, then the problem that comes in is :
a) internal fragmentation
b) external fragmentation
c) starvation
d) All of these
View Answer
Answer : a
Explanation: None.

3) The FAT is used much as a _________.


a) stack
b) linked list
c) data
d) pointer
View Answer

Answer : b
Explanation: None.
advertisements
4) A section of disk at the beginning of each partition is set aside to contain the table in :
a) FAT
b) linked allocation
c) Hashed allocation
d) indexed allocation
View Answer
Answer : a
Explanation: None.

5) Contiguous allocation has two problems _________ and _________ that linked allocation
solves.
a) external – fragmentation
b) internal – fragmentation
c) size – declaration
d) memory – allocation
View Answer

Answer : a and c
Explanation: None.

6) Each _______ has its own index block.


a) partition
b) address
c) file
d) All of these
View Answer

Answer : c
Explanation: None.

7) Indexed allocation _________ direct access.


a) supports
b) does not support
c) is not related to
d) None of these
View Answer

Answer : a
Explanation: None.

8) The pointer overhead of indexed allocation is generally _________ the pointer overhead of
linked allocation.
a) less than
b) equal to
c) greater than
d) keeps varying with
View Answer

Answer : c
Explanation: None.
advertisements
9) For any type of access, contiguous allocation requires ______ access to get a disk block.
a) only one
b) atleast two
c) exactly two
d) None of these
View Answer
Answer : a
Explanation: We can easily keep the initial address of the file in memory and calculate
immediately the disk address of the ith block and read it directly.

10) Consider a disk where blocks 2,3,4,5,8,9,10,11,12,13,17,18,25,26 and 27 are free and the rest
of the blocks are allocated. Then the free space bit map would be :
a) 10000110000001110011111100011111…
b) 110000110000001110011111100011111…
c) 01111001111110001100000011100000…
d) 001111001111110001100000011100000…
View Answer

Answer : d
Explanation: None.

Operating System Questions & Answers –


File System Interface Access Methods – 1
This set of 1000+ Operating System MCQs focuses on “File System Interface Access Methods”
1) Data cannot be written to secondary storage unless written within a ______.
a) file
b) swap space
c) directory
d) text format
View Answer

Answer: a
Explanation: None.

2) File attributes consist of :


a) name
b) type
c) identifier
d) content
e) size
View Answer

Answer: a, b, c, e
Explanation: None.

3) The information about all files is kept in :


a) swap space
b) operating system
c) seperate directory structure
d) None of these
View Answer

Answer: c
Explanation: None.
advertisements
4) A file is a/an _______ data type.
a) abstract
b) primitive
c) public
d) private
View Answer
Answer: a
Explanation: None.

5) The operating system keeps a small table containing information about all open files called :
a) system table
b) open-file table
c) file table
d) directory table
View Answer
Answer: b
Explanation: None.

6) In UNIX, the open system call returns :


a) pointer to the entry in the open file table
b) pointer to the entry in the system wide table
c) a file to the process calling it
d) None of these
View Answer

Answer: a
Explanation: None.

7) System wide table in UNIX contains process independent information such as :


a) location of file on disk
b) access dates
c) file size
d) file contents
View Answer

Answer: a, b, c
Explanation: None.
advertisements
8) The open file table has a/an _______ associated with each file.
a) file content
b) file permission
c) open count
d) close count
View Answer
Answer: c
Explanation: open count indicates the number of processes that have the file open.

9) The file name is generally split into two parts :


a) name
b) identifier
c) extension
d) type
View Answer

Answer: a and c
Explanation: None.

Operating System Questions & Answers –


File System Interface Access Methods – 2
This set of 1000+ Operating System Online Test focuses on “File System Interface Access
Methods”

1) The UNIX sytem uses a/an ________, stored at the beginning of a some files to indicate
roughly the type of file.
a) identifier
b) extension
c) virtual number
d) magic number
View Answer

Answer: d
Explanation: None.

2) The larger the block size, the ______ the internal fragmentation.
a) greater
b) lesser
c) same
d) None of these
View Answer

Answer: a
Explanation: None.

3) In the sequential access method, information in the file is processed :


a) one disk after the other, record access doesnt matter
b) one record after the other
c) one text document after the other
d) None of these
View Answer

Answer: b
Explanation: None.
advertisements
4) Sequential access method ______ , on random access devices.
a) works well
b) doesnt work well
c) Both a and b
d) None of these
View Answer
Answer: a
Explanation: None.

5) The direct access method is based on a ______ model of a file, as _____ allow random access
to any file block.
a) magnetic tape, magnetic tapes
b) tape, tapes
c) disk, disks
d) All of these
View Answer

Answer: c
Explanation: None.

6) For a direct access file :


a) there are restrictions on the order of reading and writing
b) there are no restrictions on the order of reading and writing
c) access is restricted permission wise
d) access is not restricted permission wise
View Answer

Answer: b
Explanation: None.

7) A relative block number is an index relative to :


a) the beginning of the file
b) the end of the file
c) the last written position in file
d) None of these
View Answer

Answer: a
Explanation: None.
advertisements
8) The index contains :
a) names of all contents of file
b) pointers to each page
c) pointers to the various blocks
d) All of these
View Answer
Answer: c
Explanation: None.

9) For large files, when the index itself becomes too large to be kept in memory :
a) index is called
b) an index is created for the index file
c) secondary index files are created
d) All of these
View Answer

Answer: b
Explanation: None.
Operating System Questions & Answers – File System Implementation

This section of our 1000+ Operating System MCQs focuses on file system implementation of
Operating System.

1. Management of metadata information is done by

a) file-organisation module

b) logical file system

c) basic file system

d) application programs

View Answer

Answer:b

Explanation:None.

2. A file control block contains the information about

a) file ownership

b) file permissions

c) location of file contents

d) all of the mentioned

View Answer

Answer:d

Explanation:None.

3. Which table contains the information about each mounted volume?


a) mount table

b) system-wide open-file table

c) per-process open-file table

d) all of the mentioned

View Answer

Answer:d

Explanation:None.

4. To create a new file application program calls

a) basic file system

b) logical file system

c) file-organisation module

d) none of the mentioned

View Answer

Answer:b

Explanation:None.

advertisements

5. When a process closes the file

a) per-process table entry is removed

b) system wide entry’s open count is decremented

c) both (a) and (b)

d) none of the mentioned


View Answer

Answer:c

Explanation:None.

6. What is raw disk?

a) disk without file system

b) empty disk

c) disk lacking logical file system

d) disk having file system

View Answer

Answer:a

Explanation:None.

7. The data structure used for file directory is called

a) mount table

b) hash table

c) file table

d) process table

View Answer

Answer:b

Explanation:None.

8. In which type of allocation method each file occupy a set of contiguous block on the disk?
a) contiguous allocation

b) dynamic-storage allocation

c) linked allocation

d) indexed allocation

View Answer

Answer:a

Explanation:None.

advertisements

9. If the block of free-space list is free then bit will

a) 1

b) 0

c) Any of 0 or 1

d) none of the mentioned

View Answer

Answer:a

Explanation:None.

10. Which protocol establishes the initial logical connection between a server and a client?

a) transmission control protocol

b) user datagram protocol

c) mount protocol

d) datagram congestion control protocol


View Answer

Answer:c

Explanation:None.

Operating System Questions & Answers –


File System Interface Directory Structure – 1
This set of 1000+ Operating System MCQs focuses on “File System Interface Directory
Structure”

1) To organise file systems on disk, :


a) they are split into one or more partitions
b) information about files is added to each partition
c) they are made on different storage spaces
d) All of these
View Answer

Answer: a and b
Explanation: None.

2) The directory can be viewed as a _________, that translates file names into their directory
entries.
a) symbol table
b) partition
c) swap space
d) cache
View Answer

Answer: a
Explanation: None.

3) In the single level directory :


a) All files are contained in different directories all at the same level
b) All files are contained in the same directory
c) Depends on the operating system
d) None of these
View Answer

Answer: b
Explanation: None.
4) In the single level directory :
a) all directories must have unique names
b) all files must have unique names
c) all files must have unique owners
d) All of these
View Answer

Answer: b
Explanation: None.
advertisements
5) In the two level directory structure :
a) each user has his/her own user file directory
b) the system has its own master file directory
c) both a and b
d) None of these
View Answer
Answer: c
Explanation: None.

6) When a user job starts in a two level directory system, or a user logs in :
a) the users user file directory is searched
b) the system’s master file directory is searched
c) the master file directory is indexed by user name or account number, and each entry points to
the UFD for that user
d) All of these
View Answer

Answer: b and c
Explanation: None.

7) When a user refers to particular file, :


a) system MFD is searched
b) his own UFD is searched
c) both MFD and UFD are searched
d) every directory is searched
View Answer

Answer: b and c
Explanation: None.

8) The disadvantage of the two level directory structure is that :


a) it does not solve the name collision problem
b) it solves the name collision problem
c) it does not isolate users from one another
d) it isolates users from one another
View Answer
Answer : d
Explanation: None.

9) In the tree structured directories,


a) the tree has the stem directory
b) the tree has the leaf directory
c) the tree has the root directory
d) All of these
View Answer

Answer : c
Explanation: None.
advertisements
10) The current directory contains, most of the files that are :
a) of current interest to the user
b) stored currently in the system
c) not used in the system
d) not of current interest to the system
View Answer
Answer : a
Explanation: None.

11) Path names can be of two types : (choose two)


a) absolute
b) local
c) global
d) relative
View Answer

Answer : a and d
Explanation: None.

Operating System Questions & Answers –


File System Interface Directory Structure – 2
This set of 1000+ Operating System Problems focuses on “File System Interface Directory
Structure”

1) An absolute path name begins at the :


a) leaf
b) stem
c) current directory
d) root
View Answer
Answer : d
Explanation: None.

2) A relative path name begins at the :


a) leaf
b) stem
c) current directory
d) root
View Answer

Answer : c
Explanation: None.

3) In tree structure, when deleting a directory that is not empty :


a) The contents of the directory are safe
b) The contents of the directory are also deleted
c) None of these
View Answer

Answer : b
Explanation: None.

4) When two users keep a subdirectory in their own directories, the structure being referred to is :
a) tree structure
b) cyclic graph directory structure
c) two level directory structure
d) acyclic graph directory
View Answer

Answer : d
Explanation: None.
advertisements
5) A tree structure ______ the sharing of files and directories.
a) allows
b) may restrict
c) restricts
d) None of these
View Answer
Answer : c
Explanation: None.

6) With a shared file : (choose two)


a) only one actual file exists
b) there are two copies of the file
c) the changes made by one person are not reflected to the other
d) the changes made by one person are reflected to the other
View Answer

Answer : a and d
Explanation: None.

7) In UNIX, a link is : (choose all that apply)


a) a connection between two files
b) a pointer to another file or subdirectory
c) implemented as an absolute or relative path name
d) a directory entry
View Answer

Answer : b, c and d
Explanation: None.

8) The operating system _______ the links when traversing directory trees, to preserve the
acyclic structure of the system.
a) considers
b) ignores
c) deletes
d) None of these
View Answer

Answer : b
Explanation: None.

9) The deletion of a link, ________ the original file.


a) deletes
b) affects
c) does not affect
d) None of these
View Answer

Answer : c
Explanation: None.
advertisements
10) When keeping a list of all the links/references to a file, and the list is empty, implies that :
a) the file has no copies
b) the file is deleted
c) the file is hidden
d) None of these
View Answer
Answer : b
Explanation: None.
11) When a cycle exists, the reference count maybe non zero, even when it is no longer possible
to refer to a directory or file, due to _______.
a) the possibility of one hidden reference
b) the possibility of two hidden references
c) the possibility of self referencing
d) None of these
View Answer

Answer : c
Explanation: None.

Operating System Questions & Answers –


File System Interface Mounting and Sharing
This set of 1000+ Operating System MCQs focuses on “File System Interface Mounting and
Sharing”

1) A mount point is :
a) an empty directory at which the mounted file system will be attached
b) a location where everytime file systems are mounted
c) is the time when the mounting is done
d) None of these
View Answer

Answer: a
Explanation: None.

2) When a file system is mounted over a directory that is not empty : (choose all that apply)
a) the system may disallow the mount
b) the system must allow the mount
c) the system may allow the mount and the directory’s existing files will then be made obscure
d) All of these
View Answer

Answer: a and c
Explanation: None.

3) In UNIX, exactly which operations can be executed by group members and other users is
definable by :
a) the group’s head
b) the file’s owner
c) the file’s permissions
d) All of these
View Answer
Answer: b
Explanation: None.

4) A process _____ lower the priority of another process, if both are owned by the same owner.
a) must
b) can
c) cannot
d) None of these
View Answer

Answer: b
Explanation: None.
advertisements
5) In distributed file system, ______ directories are visible from the local machine.
a) protected
b) local
c) private
d) remote
View Answer
Answer: d
Explanation: None.

6) In the world wide web, a ____ is needed to gain access to the remote files, and seperate
operations are used to transfer files.
a) laptop
b) plugin
c) browser
d) player
View Answer

Answer: c
Explanation: None.

7) Anonymous access allows a user to transfer files :


a) without having an account on the remote system
b) only if he accesses the system with a guest account
c) only if he has an account on the remote system
d) None of these
View Answer

Answer: a
Explanation: The world wide web uses anonymous file exchange almost exclusively.

8) The machine containing the files is the _______, and the machine wanting to access the files
is the ______.
a) master, slave
b) memory, user
c) server, client
d) None of these
View Answer

Answer: c
Explanation: None.

9) Distributed naming services/Distributed information systems have been devised to :


a) provide information about all the systems
b) provide unified access to the information needed for remote computing
c) provide unique names to all systems in a network
d) All of these
View Answer

Answer: b
Explanation: None.
advertisements
10) Domain name system provides :
a) host-name-to-network-address translations for the entire internet
b) network-address-to-host-name translations for the entire internet
c) binary to hex translations for the entire internet
d) All of these
View Answer
Answer: a
Explanation: None.

11) To recover from failures in the network operations, ______ information maybe maintained.
a) ip address
b) state
c) stateless
d) operating system
View Answer

Answer: b
Explanation: None.

12) The series of accesses between the open and close operations is a :
a) transaction
b) procedure
c) program
d) file session
View Answer

Answer: d
Explanation: None.
Operating System Questions & Answers –
File System Interface Protection
This set of 1000+ Operating System MCQs focuses on “File System Interface Protection”

1) Reliability of files can be increased by :


a) keeping the files safely in the memory
b) making a different partition for the files
c) by keeping them in external storage
d) by keeping duplicate copies of the file
View Answer

Answer: d
Explanation: None.

2) Protection is only provided at the _____ level.


a) lower
b) central
c) higher
d) None of these
View Answer

Answer: a
Explanation: None.

3) The main problem with access control lists is :


a) their maintenance
b) their length
c) their permissions
d) All of these
View Answer

Answer: b
Explanation: None.

4) Many systems recognize three classifications of users in connection with each file (to
condense the access control list) :
a) Owner
b) Group
c) Sub-owner
d) Universe
View Answer
Answer: a, b and d
Explanation: None.
advertisements
5) All users in a group get _______ access to a file.
a) different
b) similar
c) None of these
View Answer
Answer: b
Explanation: None.

6) Universe consists of :
a) all users that arent included in the group or owners
b) all users that are not owners
c) all users in the system
d) None of these
View Answer

Answer: c
Explanation: None.

7) In UNIX, groups can be created and modified by :


a) superuser
b) any user
c) a programmer only
d) the people in the group only
View Answer

Answer: a
Explanation: None.

8) To control access the three bits used in UNIX are represented by :


a) r
b) w
c) ex
d) x
View Answer

Answer: a, b, d
Explanation: None.

9) If each access to a file is controlled by a password, then the disadvantage is that :


a) user will need to remember a lot of passwords
b) it is not reliable
c) it is not efficient
d) All of these
View Answer

Answer: a
Explanation: None.
advertisements
10) In a multilevel directory structure :
a) the same previous techniques will be used as in the other structures
b) a mechanism for directory protection will have to applied
c) the subdirectories do not need protection once the directory is protected
d) None of these
View Answer
Answer: b
Explanation: None.

11) In UNIX, the directory protection is handled _________ to the file protection.
a) different
b) similar
c) it is not handled at all
d) None of these
View Answer

Answer: b
Explanation: None.

12) Disks are segmented into one or more partitions, each containing a file system or ______.
a) left ‘raw’
b) made into swap space
c) made into backup space
d) left ‘ripe’
View Answer

Answer: a
Explanation: None.

Operating System Questions & Answers –


File System Implementation – Performance
This set of 1000+ Operating System MCQs focuses on “File System Implementation –
Performance”

1) _______ tend to represent a major bottleneck in system performance.


a) CPUs
b) Disks
c) Programs
d) I/O
View Answer

Answer : b
Explanation: None.

2) In UNIX, even an ’empty’ disk has a percentage of its space lost to ______.
a) programs
b) inodes
c) virtual memory
d) stacks
View Answer

Answer : b
Explanation: None.

3) By preallocating the inodes and spreading them across the volume, we ___________ the
system performance.
a) improve
b) decrease
c) maintain
d) do not affect
View Answer

Answer : a
Explanation: None.
advertisements
4) ____________ writes occur in the order in which the disk subsystem receives them, and the
writes are not buffered.
a) Asynchronous
b) Regular
c) Synchronous
d) Irregular
View Answer
Answer : c
Explanation: None.

5) In ___________ writes, the data is stored in the cache.


a) Asynchronous
b) Regular
c) Synchronous
d) Irregular
View Answer
Answer : a
Explanation: None.

6) A file being read or written sequentially should not have its pages replaced in LRU order,
because ___________________.
a) it is very costly
b) the most recently used page will be used last
c) it is not efficient
d) All of these
View Answer

Answer : b
Explanation: None.

7) In the optimized technique for sequential access ___________ removes a page from the buffer
as soon as the next page is requested.
a) write ahead
b) read ahead
c) free-behind
d) add-front
View Answer

Answer : c
Explanation: None.
advertisements
8) With _______, a requested page and several subsequent pages are read and cached.
a) write ahead
b) read ahead
c) free-behind
d) add-front
View Answer
Answer : b
Explanation: None.

Operating System Questions & Answers –


File System Implementation – Recovery
This set of 1000+ Operating System MCQs focuses on “File System Implementation –
Recovery”

1) Some directory information is kept in main memory or cache to ___________.


a) fill up the cache
b) increase free space in secondary storage
c) decrease free space in secondary storage
d) speed up access
View Answer

Answer : d
Explanation: None.

2) A systems program such as fsck in ______ is a consistency checker.


a) UNIX
b) Windows
c) Macintosh
d) Solaris
View Answer

Answer : a
Explanation: None.

3) A consistency checker __________________ and tries to fix any inconsistencies it finds.


a) compares the data in the secondary storage with the data in the cache
b) compares the data in the directory structure with the data blocks on disk
c) compares the system generated output and user required output
d) All of these
View Answer

Answer : b
Explanation: None.
advertisements
4) Each set of operations for performing a specific task is a _________.
a) program
b) code
c) transaction
d) All of these
View Answer
Answer : c
Explanation: None.

5) Once the changes are written to the log, they are considered to be ________.
a) committed
b) aborted
c) completed
d) None of these
View Answer

Answer : a
Explanation: None.
6) When an entire committed transaction is completed, ___________.
a) it is stored in the memory
b) it is removed from the log file
c) it is redone
d) None of these
View Answer

Answer : b
Explanation: None.

7) A circular buffer :
a) writes to the end of its space and then continues at the beginning
b) overwrites older values as it goes
c) both a and b
d) neither a nor b
View Answer

Answer : c
Explanation: None.
advertisements
8) All the changes that were done from a transaction that did not commit before the system
crashed, have to be _________.
a) saved
b) saved and the transaction redone
c) undone
d) None of these
View Answer
Answer : c
Explanation: None.

You might also like