File System Questions
File System Questions
1. ______ is
This section of our 1000+ Operating System MCQs focuses on file system concepts of Operating
System.
1. ______ is a unique tag, usually a number, identifies the file within the file system.
a) File identifier
b) File name
c) File type
View Answer
Answer:a
Explanation:None.
2. To create a file
View Answer
Answer:c
Explanation:None.
View Answer
Answer:d
Explanation:None.
a) file name
b) file extension
c) file identifier
View Answer
Answer:b
Explanation:None.
5. Which file is a sequence of bytes organized into blocks understandable by the system’s linker?
a) object file
b) source file
c) executable file
d) text file
View Answer
Answer:a
Explanation:None.
a) crating of a filesystem
b) deleting a filesystem
View Answer
Answer:c
Explanation:None.
a) file metadata
b) page table
c) virtual memory
d) file system
View Answer
Answer:a
Explanation:None.
8. Mapping of network file system protocol to local file system is done by
c) volume manager
d) remote mirror
View Answer
Answer:a
Explanation:None.
advertisements
9. Which one of the following explains the sequential file access method?
View Answer
Answer:b
Explanation:None.
View Answer
Answer:a
Explanation:None.
1) The three major methods of allocating disk space that are in wide use are :
a) contiguous
b) linked
c) indexed
d) hashed
View Answer
Answer : a, b and c
Explanation: None.
2) In contiguous allocation :
a) each file must occupy a set of contiguous blocks on the disk
b) each file is a linked list of disk blocks
c) all the pointers to scattered blocks are placed together in one location
d) None of these
View Answer
Answer : a
Explanation: None.
3) In linked allocation :
a) each file must occupy a set of contiguous blocks on the disk
b) each file is a linked list of disk blocks
c) all the pointers to scattered blocks are placed together in one location
d) None of these
View Answer
Answer : b
Explanation: None.
4) In indexed allocation :
a) each file must occupy a set of contiguous blocks on the disk
b) each file is a linked list of disk blocks
c) all the pointers to scattered blocks are placed together in one location
d) None of these
View Answer
Answer : c
Explanation: None.
1) A device driver can be thought of as a translator. Its input consists of _____ commands and
output consists of _______ instructions.
a) high level, low level
b) low level, high level
c) complex, simple
d) Both a and c
View Answer
Answer : a
Explanation: None.
Answer : d
Explanation: None.
3) Metadata includes :
a) all of the file system structure
b) contents of files
c) Both a and b
d) None of these
View Answer
Answer : c
Explanation: None.
4) For each file their exists a ___________, that contains information about the file, including
ownership, permissions and location of the file contents.
a) metadata
b) file control block
c) process control block
d) All of these
View Answer
Answer : b
Explanation: None.
Answer : c
Explanation: None.
advertisements
6) During compaction time, other normal system operations _______ be permitted.
a) can
b) cannot
c) is
d) None of these
View Answer
Answer : b
Explanation: None.
a) I only
b) II only
c) Both I and II
d) Neither I nor II
View Answer
Answer : c
Explanation: None.
Answer : b
Explanation: None.
Answer : d
Explanation: None.
advertisements
11) If a pointer is lost or damaged in a linked allocation :
a) the entire file could get damaged
b) only a part of the file would be affected
c) there would not be any problems
d) None of these
View Answer
Answer : a
Explanation: None.
12) FAT stands for :
a) File Attribute Transport
b) File Allocation Table
c) Fork At Time
d) None of these
View Answer
Answer : b
Explanation: None.
Answer : c
Explanation: None.
Answer : a
Explanation: None.
2) If the extents are too large, then the problem that comes in is :
a) internal fragmentation
b) external fragmentation
c) starvation
d) All of these
View Answer
Answer : a
Explanation: None.
Answer : b
Explanation: None.
advertisements
4) A section of disk at the beginning of each partition is set aside to contain the table in :
a) FAT
b) linked allocation
c) Hashed allocation
d) indexed allocation
View Answer
Answer : a
Explanation: None.
5) Contiguous allocation has two problems _________ and _________ that linked allocation
solves.
a) external – fragmentation
b) internal – fragmentation
c) size – declaration
d) memory – allocation
View Answer
Answer : a and c
Explanation: None.
Answer : c
Explanation: None.
Answer : a
Explanation: None.
8) The pointer overhead of indexed allocation is generally _________ the pointer overhead of
linked allocation.
a) less than
b) equal to
c) greater than
d) keeps varying with
View Answer
Answer : c
Explanation: None.
advertisements
9) For any type of access, contiguous allocation requires ______ access to get a disk block.
a) only one
b) atleast two
c) exactly two
d) None of these
View Answer
Answer : a
Explanation: We can easily keep the initial address of the file in memory and calculate
immediately the disk address of the ith block and read it directly.
10) Consider a disk where blocks 2,3,4,5,8,9,10,11,12,13,17,18,25,26 and 27 are free and the rest
of the blocks are allocated. Then the free space bit map would be :
a) 10000110000001110011111100011111…
b) 110000110000001110011111100011111…
c) 01111001111110001100000011100000…
d) 001111001111110001100000011100000…
View Answer
Answer : d
Explanation: None.
Answer: a
Explanation: None.
Answer: a, b, c, e
Explanation: None.
Answer: c
Explanation: None.
advertisements
4) A file is a/an _______ data type.
a) abstract
b) primitive
c) public
d) private
View Answer
Answer: a
Explanation: None.
5) The operating system keeps a small table containing information about all open files called :
a) system table
b) open-file table
c) file table
d) directory table
View Answer
Answer: b
Explanation: None.
Answer: a
Explanation: None.
Answer: a, b, c
Explanation: None.
advertisements
8) The open file table has a/an _______ associated with each file.
a) file content
b) file permission
c) open count
d) close count
View Answer
Answer: c
Explanation: open count indicates the number of processes that have the file open.
Answer: a and c
Explanation: None.
1) The UNIX sytem uses a/an ________, stored at the beginning of a some files to indicate
roughly the type of file.
a) identifier
b) extension
c) virtual number
d) magic number
View Answer
Answer: d
Explanation: None.
2) The larger the block size, the ______ the internal fragmentation.
a) greater
b) lesser
c) same
d) None of these
View Answer
Answer: a
Explanation: None.
Answer: b
Explanation: None.
advertisements
4) Sequential access method ______ , on random access devices.
a) works well
b) doesnt work well
c) Both a and b
d) None of these
View Answer
Answer: a
Explanation: None.
5) The direct access method is based on a ______ model of a file, as _____ allow random access
to any file block.
a) magnetic tape, magnetic tapes
b) tape, tapes
c) disk, disks
d) All of these
View Answer
Answer: c
Explanation: None.
Answer: b
Explanation: None.
Answer: a
Explanation: None.
advertisements
8) The index contains :
a) names of all contents of file
b) pointers to each page
c) pointers to the various blocks
d) All of these
View Answer
Answer: c
Explanation: None.
9) For large files, when the index itself becomes too large to be kept in memory :
a) index is called
b) an index is created for the index file
c) secondary index files are created
d) All of these
View Answer
Answer: b
Explanation: None.
Operating System Questions & Answers – File System Implementation
This section of our 1000+ Operating System MCQs focuses on file system implementation of
Operating System.
a) file-organisation module
d) application programs
View Answer
Answer:b
Explanation:None.
a) file ownership
b) file permissions
View Answer
Answer:d
Explanation:None.
View Answer
Answer:d
Explanation:None.
c) file-organisation module
View Answer
Answer:b
Explanation:None.
advertisements
Answer:c
Explanation:None.
b) empty disk
View Answer
Answer:a
Explanation:None.
a) mount table
b) hash table
c) file table
d) process table
View Answer
Answer:b
Explanation:None.
8. In which type of allocation method each file occupy a set of contiguous block on the disk?
a) contiguous allocation
b) dynamic-storage allocation
c) linked allocation
d) indexed allocation
View Answer
Answer:a
Explanation:None.
advertisements
a) 1
b) 0
c) Any of 0 or 1
View Answer
Answer:a
Explanation:None.
10. Which protocol establishes the initial logical connection between a server and a client?
c) mount protocol
Answer:c
Explanation:None.
Answer: a and b
Explanation: None.
2) The directory can be viewed as a _________, that translates file names into their directory
entries.
a) symbol table
b) partition
c) swap space
d) cache
View Answer
Answer: a
Explanation: None.
Answer: b
Explanation: None.
4) In the single level directory :
a) all directories must have unique names
b) all files must have unique names
c) all files must have unique owners
d) All of these
View Answer
Answer: b
Explanation: None.
advertisements
5) In the two level directory structure :
a) each user has his/her own user file directory
b) the system has its own master file directory
c) both a and b
d) None of these
View Answer
Answer: c
Explanation: None.
6) When a user job starts in a two level directory system, or a user logs in :
a) the users user file directory is searched
b) the system’s master file directory is searched
c) the master file directory is indexed by user name or account number, and each entry points to
the UFD for that user
d) All of these
View Answer
Answer: b and c
Explanation: None.
Answer: b and c
Explanation: None.
Answer : c
Explanation: None.
advertisements
10) The current directory contains, most of the files that are :
a) of current interest to the user
b) stored currently in the system
c) not used in the system
d) not of current interest to the system
View Answer
Answer : a
Explanation: None.
Answer : a and d
Explanation: None.
Answer : c
Explanation: None.
Answer : b
Explanation: None.
4) When two users keep a subdirectory in their own directories, the structure being referred to is :
a) tree structure
b) cyclic graph directory structure
c) two level directory structure
d) acyclic graph directory
View Answer
Answer : d
Explanation: None.
advertisements
5) A tree structure ______ the sharing of files and directories.
a) allows
b) may restrict
c) restricts
d) None of these
View Answer
Answer : c
Explanation: None.
Answer : a and d
Explanation: None.
Answer : b, c and d
Explanation: None.
8) The operating system _______ the links when traversing directory trees, to preserve the
acyclic structure of the system.
a) considers
b) ignores
c) deletes
d) None of these
View Answer
Answer : b
Explanation: None.
Answer : c
Explanation: None.
advertisements
10) When keeping a list of all the links/references to a file, and the list is empty, implies that :
a) the file has no copies
b) the file is deleted
c) the file is hidden
d) None of these
View Answer
Answer : b
Explanation: None.
11) When a cycle exists, the reference count maybe non zero, even when it is no longer possible
to refer to a directory or file, due to _______.
a) the possibility of one hidden reference
b) the possibility of two hidden references
c) the possibility of self referencing
d) None of these
View Answer
Answer : c
Explanation: None.
1) A mount point is :
a) an empty directory at which the mounted file system will be attached
b) a location where everytime file systems are mounted
c) is the time when the mounting is done
d) None of these
View Answer
Answer: a
Explanation: None.
2) When a file system is mounted over a directory that is not empty : (choose all that apply)
a) the system may disallow the mount
b) the system must allow the mount
c) the system may allow the mount and the directory’s existing files will then be made obscure
d) All of these
View Answer
Answer: a and c
Explanation: None.
3) In UNIX, exactly which operations can be executed by group members and other users is
definable by :
a) the group’s head
b) the file’s owner
c) the file’s permissions
d) All of these
View Answer
Answer: b
Explanation: None.
4) A process _____ lower the priority of another process, if both are owned by the same owner.
a) must
b) can
c) cannot
d) None of these
View Answer
Answer: b
Explanation: None.
advertisements
5) In distributed file system, ______ directories are visible from the local machine.
a) protected
b) local
c) private
d) remote
View Answer
Answer: d
Explanation: None.
6) In the world wide web, a ____ is needed to gain access to the remote files, and seperate
operations are used to transfer files.
a) laptop
b) plugin
c) browser
d) player
View Answer
Answer: c
Explanation: None.
Answer: a
Explanation: The world wide web uses anonymous file exchange almost exclusively.
8) The machine containing the files is the _______, and the machine wanting to access the files
is the ______.
a) master, slave
b) memory, user
c) server, client
d) None of these
View Answer
Answer: c
Explanation: None.
Answer: b
Explanation: None.
advertisements
10) Domain name system provides :
a) host-name-to-network-address translations for the entire internet
b) network-address-to-host-name translations for the entire internet
c) binary to hex translations for the entire internet
d) All of these
View Answer
Answer: a
Explanation: None.
11) To recover from failures in the network operations, ______ information maybe maintained.
a) ip address
b) state
c) stateless
d) operating system
View Answer
Answer: b
Explanation: None.
12) The series of accesses between the open and close operations is a :
a) transaction
b) procedure
c) program
d) file session
View Answer
Answer: d
Explanation: None.
Operating System Questions & Answers –
File System Interface Protection
This set of 1000+ Operating System MCQs focuses on “File System Interface Protection”
Answer: d
Explanation: None.
Answer: a
Explanation: None.
Answer: b
Explanation: None.
4) Many systems recognize three classifications of users in connection with each file (to
condense the access control list) :
a) Owner
b) Group
c) Sub-owner
d) Universe
View Answer
Answer: a, b and d
Explanation: None.
advertisements
5) All users in a group get _______ access to a file.
a) different
b) similar
c) None of these
View Answer
Answer: b
Explanation: None.
6) Universe consists of :
a) all users that arent included in the group or owners
b) all users that are not owners
c) all users in the system
d) None of these
View Answer
Answer: c
Explanation: None.
Answer: a
Explanation: None.
Answer: a, b, d
Explanation: None.
Answer: a
Explanation: None.
advertisements
10) In a multilevel directory structure :
a) the same previous techniques will be used as in the other structures
b) a mechanism for directory protection will have to applied
c) the subdirectories do not need protection once the directory is protected
d) None of these
View Answer
Answer: b
Explanation: None.
11) In UNIX, the directory protection is handled _________ to the file protection.
a) different
b) similar
c) it is not handled at all
d) None of these
View Answer
Answer: b
Explanation: None.
12) Disks are segmented into one or more partitions, each containing a file system or ______.
a) left ‘raw’
b) made into swap space
c) made into backup space
d) left ‘ripe’
View Answer
Answer: a
Explanation: None.
Answer : b
Explanation: None.
2) In UNIX, even an ’empty’ disk has a percentage of its space lost to ______.
a) programs
b) inodes
c) virtual memory
d) stacks
View Answer
Answer : b
Explanation: None.
3) By preallocating the inodes and spreading them across the volume, we ___________ the
system performance.
a) improve
b) decrease
c) maintain
d) do not affect
View Answer
Answer : a
Explanation: None.
advertisements
4) ____________ writes occur in the order in which the disk subsystem receives them, and the
writes are not buffered.
a) Asynchronous
b) Regular
c) Synchronous
d) Irregular
View Answer
Answer : c
Explanation: None.
6) A file being read or written sequentially should not have its pages replaced in LRU order,
because ___________________.
a) it is very costly
b) the most recently used page will be used last
c) it is not efficient
d) All of these
View Answer
Answer : b
Explanation: None.
7) In the optimized technique for sequential access ___________ removes a page from the buffer
as soon as the next page is requested.
a) write ahead
b) read ahead
c) free-behind
d) add-front
View Answer
Answer : c
Explanation: None.
advertisements
8) With _______, a requested page and several subsequent pages are read and cached.
a) write ahead
b) read ahead
c) free-behind
d) add-front
View Answer
Answer : b
Explanation: None.
Answer : d
Explanation: None.
Answer : a
Explanation: None.
Answer : b
Explanation: None.
advertisements
4) Each set of operations for performing a specific task is a _________.
a) program
b) code
c) transaction
d) All of these
View Answer
Answer : c
Explanation: None.
5) Once the changes are written to the log, they are considered to be ________.
a) committed
b) aborted
c) completed
d) None of these
View Answer
Answer : a
Explanation: None.
6) When an entire committed transaction is completed, ___________.
a) it is stored in the memory
b) it is removed from the log file
c) it is redone
d) None of these
View Answer
Answer : b
Explanation: None.
7) A circular buffer :
a) writes to the end of its space and then continues at the beginning
b) overwrites older values as it goes
c) both a and b
d) neither a nor b
View Answer
Answer : c
Explanation: None.
advertisements
8) All the changes that were done from a transaction that did not commit before the system
crashed, have to be _________.
a) saved
b) saved and the transaction redone
c) undone
d) None of these
View Answer
Answer : c
Explanation: None.