C4 file system_key

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 15

1. ______ is a unique tag, usually a number identifies the file within the file system.

a) File identifier
b) File name
c) File type
d) None of the mentioned
View Answer
Answer: a
Explanation: None.
2. To create a file ____________
a) allocate the space in file system
b) make an entry for new file in directory
c) allocate the space in file system & make an entry for new file in directory
d) none of the mentioned
View Answer
Answer: c
Explanation: None.
3. By using the specific system call, we can ____________
a) open the file
b) read the file
c) write into the file
d) all of the mentioned
View Answer
Answer: d
Explanation: None.
4. File type can be represented by ____________
a) file name
b) file extension
c) file identifier
d) none of the mentioned
View Answer
Answer: b
Explanation: None.
5. Which file is a sequence of bytes organized into blocks understandable by the
system’s linker?
a) object file
b) source file
c) executable file
d) text file
View Answer
Answer: a
Explanation: None.
6. What is the mounting of file system?
a) crating of a filesystem
b) deleting a filesystem
c) attaching portion of the file system into a directory structure
d) removing the portion of the file system into a directory structure
View Answer
Answer: c
Explanation: None.
7. Mapping of file is managed by ____________
a) file metadata
b) page table
c) virtual memory
d) file system
View Answer
Answer: a
Explanation: None.
8. Mapping of network file system protocol to local file system is done by ____________
a) network file system
b) local file system
c) volume manager
d) remote mirror
View Answer
Answer: a
Explanation: None.
9. Which one of the following explains the sequential file access method?
a) random access according to the given byte number
b) read bytes one at a time, in order
c) read/write sequentially by record
d) read/write randomly by record
View Answer
Answer: b
Explanation: None.
10. When will file system fragmentation occur?
a) unused space or single file are not contiguous
b) used space is not contiguous
c) unused space is non-contiguous
d) multiple files are non-contiguous
View Answer
Answer: a
Explanation: None.

1. A file is a sequence of?


A. bits
B. bytes
C. lines
D. All of the above
View Answer
Ans : D

Explanation: A file is a sequence of bits, bytes, lines or records whose meaning is


defined by the files creator and user.

2. __________ is a sequence of bytes organized into blocks that are understandable by


the machine.

A. object file
B. source file
C. text file
D. None of the above
View Answer
Ans : A

Explanation: An object file is a sequence of bytes organized into blocks that are
understandable by the machine.

3. _________ is a sequence of procedures and functions.

A. object file
B. source file
C. text file
D. None of the above
View Answer
Ans : B

Explanation: A source file is a sequence of procedures and functions.

4. What is true about Ordinary files?

A. These are the files that contain user information.


B. These files contain list of file names and other information related to these files.
C. These files represent physical device like disks, terminals, printers, networks, tape
drive etc.
D. All of the above
View Answer
Ans : A

Explanation: Ordinary files : These are the files that contain user information.

5. What is true about Directory files?

A. These files represent physical device like disks, terminals, printers, networks, tape
drive etc.
B. These may have text, databases or executable program.
C. These files contain list of file names and other information related to these files.
D. All of the above
View Answer
Ans : C

Explanation: Directory files :These files contain list of file names and other information
related to these files.

6. Special files : These files are also known as?

A. Character special files


B. Block special files
C. device files
D. Data files
View Answer
Ans : C

Explanation: Special files : These files are also known as device files.

7. In Space Allocation, Which of the following ways are correct to allocate disk space to
files?

A. Contiguous Allocation
B. Linked Allocation
C. Indexed Allocation
D. All of the above
View Answer
Ans : D

Explanation: Operating systems deploy following three main ways to allocate disk space
to files :Contiguous Allocation, Linked Allocation, Indexed Allocation.
8. What is the real disadvantage of a linear list of directory entries?

A. size of the linear list in memory


B. linear search to find a file
C. it is not reliable
D. All of the above
View Answer
Ans : B

Explanation: linear search to find a file is the real disadvantage of a linear list of
directory entries.

9. What is raw disk?

A. disk without file system


B. empty disk
C. disk lacking logical file system
D. disk having file system
View Answer
Ans : A

Explanation: raw disk is disk without file system

10. In ___________ writes, the data is stored in the cache.

A. Asynchronous
B. Regular
C. Synchronous
D. Irregular
View Answer
Ans : A

Explanation: Asynchronous writes, the data is stored in the cache.

1. Management of metadata information is done by


____________
a) file-organisation module
b) logical file system
c) basic file system
d) application programs
Answer: b
Clarification: None.
2. A file control block contains the information about
____________
a) file ownership
b) file permissions
c) location of file contents
d) all of the mentioned
Answer: d
Clarification: None.
3. Which table contains the information about each mounted
volume?
a) mount table
b) system-wide open-file table
c) per-process open-file table
d) all of the mentioned
Answer: d
Clarification: None.
4. To create a new file application program calls ____________
a) basic file system
b) logical file system
c) file-organisation module
d) none of the mentioned
Answer: b

Clarification: None.
5. What will happens when a process closes the file?
a) per-process table entry is not defined
b) system wide entry’s open count is decremented
c) all of the mentioned
d) none of the mentioned
Answer: b
Clarification: None.
6. What is raw disk?
a) disk without file system
b) empty disk
c) disk lacking logical file system
d) disk having file system
Answer: a
Clarification: None.
7. The data structure used for file directory is called
____________
a) mount table
b) hash table
c) file table
d) process table
Answer: b
Clarification: None.
8. In which type of allocation method each file occupy a set of
contiguous block on the disk?
a) contiguous allocation
b) dynamic-storage allocation
c) linked allocation
d) indexed allocation
Answer: a
Clarification: None.
9. If the block of free-space list is free then bit will ____________
a) 1
b) 0
c) any of 0 or 1
d) none of the mentioned
Answer: a
Clarification: None.
10. Which protocol establishes the initial logical connection between
a server and a client?
a) transmission control protocol
b) user datagram protocol
c) mount protocol
d) datagram congestion control protocol
Answer: c
1. Reliability of files can be enhanced by :
a)by keeping duplicate copies of the file
b) making a different partition for the files
c) by keeping them in external storage
d) keeping the files safely in the memory
Answer A

2. security is only provided at the _____ level.


a) none of the mentioned
b) high
c) central
d) lower
Answer D
3. The major issue with access control lists is :
a) their maintenance
b) all of the mentioned
c) their permissions
d) their length
Answer D
4. Many systems recognize three classifications of users in connection with each file (to
condense the access control list) :
a) ) Universe
b) Group
c) owner
d) All of the mentioned
Answer D

SET 2: File system Interface MCQs


5.in a group, All users get _______ access to a file.
a) different
b)same
c) similar
d) none of the mentioned
Answer C
6. The universe consists of :
a) all users in the system
b) all users that are not owners
c)all users that aren’t included in the group or owners
d) none of the mentioned
Answer A
7. groups can be modified and created In UNIX by :
a) any user
b)superuser
c) the people in the group only
d) a programmer only
Answer B
8. three bits used To control access the in UNIX are represented by :
a) r
b) all of the mentioned
c) x
d) w
Answer B
SET 3: File system Interface MCQs
9. by a password If each access to a file is controlled, then the disadvantage is that :
a) it is not reliable
b) all of the mentioned
c) it is not efficient
d) ) user will need to remember a lot of passwords
Answer D
10. In a different level directory structure :
a) the subdirectories do not need protection once the directory is protected
b) the same previous techniques will be used as in the other structure
c) a mechanism for directory protection will have to apply
d) none of the mentioned
Answer C
11. the directory protection is handled in Unix _________ to the file protection.
a) none of the mentioned
b) it is not handled at all
c) similar
d) different
Answer C
12. , each containing a file system or ______, Disks are segmented into one or more
partitions.
a) left ‘ripe’
b) made into swap space
c) made into backup space
d) left ‘raw’
Answer D
13. such as access by fraudulent people , Destruction of files for malicious reasons is
classified as being
a)unauthorized access
b)accessed
c)destroyed
d)modified
Answer D
14. if the order of operation on two or more files are similar in files, then the operation
will be
a)sequential
b)combinational
c)complex
d)simple
Answer D
15.in which records are accessed from and inserted into file Access is classified as;
a)random access
b)duplicate access
c)direct access
d)sequential access
Answer D

1. A directory file is a_________


(A). the directory that contains data
(B). the directory that contains data and files
(C). the directory that contains files
(D). the directory that contains the details of files and subdirectories of it
(E). None of these
Multiple Choice Question Answer: d

2. What is the name of Each entry of the directory file that has component(s)?
(A). filename and inode number
(B). inode number
(C). filename
(D). file size
(E). None of these
Multiple Choice Question Answer: a

3. Which of the following can’t be used in a filename?


(A). ., %
(B). $,^
(C). /, NULL
(D). NULL, $
(E). None of these
Multiple Choice Question Answer: c
4. In the UNIX the filename isn’t case-sensitive.
(A). True
(B). False
(E). None of these
Multiple Choice Question Answer: b

5. Filenames starting with a –, we do avoid.


(A). True
(B). False
(E). None of these
Multiple Choice Question Answer: a

6. The file itself store the file name and file size, in the UNIX.
(A). False
(B). True
(E). None of these
Multiple Choice Question Answer: a

7. What is the most common file type?


(A). device file
(B). directory file
(C). ordinary file
(D). ordinary file and directory file
(E). None of these
Multiple Choice Question Answer: c

8. To operate the device the kernel uses the device files.


(A). True
(B). False
(E). None of these
Multiple Choice Question Answer: a
9. What is the directory called when we log in, the UNIX places us in?
(A). parent
(B). main
(C). home
(D). current
(E). None of these
Multiple Choice Question Answer: c

10. Everything is treated as a file by UNIX.


(A). False
(B). True
(E). None of these
Multiple Choice Question Answer: b

11. What represents the root directory?


(A). \
(B). $
(C). *
(D). /
(E). None of these
Multiple Choice Question Answer: d

12. To store information, a file is called a container.


(A). True
(B). False
(E). None of these
Multiple Choice Question Answer: a
13. Files are divided into UNIX, in how many broad categories?
(A). 2
(B). 3
(C). 5
(D). 4
(E). None of these
Multiple Choice Question Answer: b

14. To frame filename extensions no role is imposed by Unix.


(A). True
(B). False
(E). None of these
Multiple Choice Question Answer: a

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy