Operating System MCQ Set 1
1. _______ tend to represent a major bottleneck in system performance.
a) CPUs
b) Disks
c) Programs
d) I/O
Answer
Answer: b [Reason:] None.
2. In UNIX, even an ’empty’ disk has a percentage of its space lost to ______
a) programs
b) inodes
c) virtual memory
d) stacks
Answer
Answer: b [Reason:] None.
3. By preallocating the inodes and spreading them across the volume, we _____ the system performance.
a) improve
b) decrease
c) maintain
d) do not affect
Answer
Answer: a [Reason:] None.
4. ______ writes occur in the order in which the disk subsystem receives them, and the writes are not buffered.
a) Asynchronous
b) Regular
c) Synchronous
d) Irregular
Answer
Answer: c [Reason:] None.
5. In _____ writes, the data is stored in the cache.
a) Asynchronous
b) Regular
c) Synchronous
d) Irregular
Answer
Answer: a [Reason:] None.
6. A file being read or written sequentially should not have its pages replaced in LRU order, because _______
a) it is very costly
b) the most recently used page will be used last
c) it is not efficient
d) all of the mentioned
Answer
Answer: b [Reason:] None.
7. In the optimized technique for sequential access _____ removes a page from the buffer as soon as the next page is requested.
a) write ahead
b) read ahead
c) free-behind
d) add-front
Answer
Answer: c [Reason:] None.
8. With _______ a requested page and several subsequent pages are read and cached.
a) write ahead
b) read ahead
c) free-behind
d) add-front
Answer
Answer: b [Reason:] None.
Operating System MCQ Set 2
1. Data cannot be written to secondary storage unless written within a ______
a) file
b) swap space
c) directory
d) text format
Answer
Answer: a [Reason:] None.
2. File attributes consist of :
a) name
b) type
c) identifier
d) all of the mentioned
Answer
Answer: d [Reason:] None.
3. The information about all files is kept in :
a) swap space
b) operating system
c) seperate directory structure
d) none of the mentioned
Answer
Answer: c [Reason:] None.
4. A file is a/an _______ data type.
a) abstract
b) primitive
c) public
d) private
Answer
Answer: a [Reason:] None.
5. The operating system keeps a small table containing information about all open files called :
a) system table
b) open-file table
c) file table
d) directory table
Answer
Answer: b [Reason:] None.
6. In UNIX, the open system call returns :
a) pointer to the entry in the open file table
b) pointer to the entry in the system wide table
c) a file to the process calling it
d) none of the mentioned
Answer
Answer: a [Reason:] None.
7. System wide table in UNIX contains process independent information such as :
a) location of file on disk
b) access dates
c) file size
d) all of the mentioned
Answer
Answer: d [Reason:] None.
8. The open file table has a/an _______ associated with each file.
a) file content
b) file permission
c) open count
d) close count
Answer
Answer: c [Reason:] open count indicates the number of processes that have the file open.
9. The file name is generally split into two parts :
a) name & identifier
b) identifier & type
c) extension & name
d) type & extension
Answer
Answer: c [Reason:] None.
Operating System MCQ Set 3
1. The UNIX sytem uses a/an ________ stored at the beginning of a some files to indicate roughly the type of file.
a) identifier
b) extension
c) virtual number
d) magic number
Answer
Answer: d [Reason:] None.
2. The larger the block size, the ______ the internal fragmentation.
a) greater
b) lesser
c) same
d) none of the mentioned
Answer
Answer: a [Reason:] None.
3. In the sequential access method, information in the file is processed :
a) one disk after the other, record access doesnt matter
b) one record after the other
c) one text document after the other
d) none of the mentioned
Answer
Answer: b [Reason:] None.
4. Sequential access method ______ on random access devices.
a) works well
b) doesnt work well
c) maybe works well and doesnt work well
d) none of the mentioned
Answer
Answer: a [Reason:] None.
5. The direct access method is based on a ______ model of a file, as _____ allow random access to any file block.
a) magnetic tape, magnetic tapes
b) tape, tapes
c) disk, disks
d) all of the mentioned
Answer
Answer: c [Reason:] None.
6. For a direct access file :
a) there are restrictions on the order of reading and writing
b) there are no restrictions on the order of reading and writing
c) access is restricted permission wise
d) access is not restricted permission wise
Answer
Answer: b [Reason:] None.
7. A relative block number is an index relative to :
a) the beginning of the file
b) the end of the file
c) the last written position in file
d) none of the mentioned
Answer
Answer: a [Reason:] None.
8. The index contains :
a) names of all contents of file
b) pointers to each page
c) pointers to the various blocks
d) all of the mentioned
Answer
Answer: c [Reason:] None.
9. For large files, when the index itself becomes too large to be kept in memory :
a) index is called
b) an index is created for the index file
c) secondary index files are created
d) all of the mentioned
Answer
Answer: b [Reason:] None.
Operating System MCQ Set 4
1. To organise file systems on disk, :
a) they are split into one or more partitions
b) information about files is added to each partition
c) they are made on different storage spaces
d) all of the mentioned
Answer
Answer: b [Reason:] None.
2. The directory can be viewed as a ___ that translates file names into their directory entries.
a) symbol table
b) partition
c) swap space
d) cache
Answer
Answer: a [Reason:] None.
3. In the single level directory :
a) All files are contained in different directories all at the same level
b) All files are contained in the same directory
c) Depends on the operating system
d) None of the mentioned
Answer
Answer: b [Reason:] None.
4. In the single level directory :
a) all directories must have unique names
b) all files must have unique names
c) all files must have unique owners
d) all of the mentioned
Answer
Answer: b [Reason:] None.
5. In the two level directory structure :
a) each user has his/her own user file directory
b) the system doesn’t its own master file directory
c) all of the mentioned
d) none of the mentioned
Answer
Answer: a [Reason:] None.
6. When a user job starts in a two level directory system, or a user logs in :
a) the users user file directory is searched
b) the system’s master file directory is not searched
c) the master file directory is indexed by user name or account number, and each entry points to the UFD for that user
d) all of the mentioned
Answer
Answer: c [Reason:] None.
7. When a user refers to particular file :
a) system MFD is searched
b) his own UFD is not searched
c) both MFD and UFD are searched
d) every directory is searched
Answer
Answer: c [Reason:] None.
8. The disadvantage of the two level directory structure is that :
a) it does not solve the name collision problem
b) it solves the name collision problem
c) it does not isolate users from one another
d) it isolates users from one another
Answer
Answer : d [Reason:] None.
9. In the tree structured directories,
a) the tree has the stem directory
b) the tree has the leaf directory
c) the tree has the root directory
d) all of the mentioned
Answer
Answer : c [Reason:] None.
10. The current directory contains, most of the files that are :
a) of current interest to the user
b) stored currently in the system
c) not used in the system
d) not of current interest to the system
Answer
Answer : a [Reason:] None.
11. Path names can be of two types :
a) absolute & relative
b) local & global
c) global & relative
d) relative & local
Answer
Answer : a [Reason:] None.
Operating System MCQ Set 5
1. A mount point is :
a) an empty directory at which the mounted file system will be attached
b) a location where everytime file systems are mounted
c) is the time when the mounting is done
d) none of the mentioned
Answer
Answer: a [Reason:] None.
2. When a file system is mounted over a directory that is not empty :
a) the system may not allow the mount
b) the system must allow the mount
c) the system may allow the mount and the directory’s existing files will then be made obscure
d) all of the mentioned
Answer
Answer: c [Reason:] None.
3. In UNIX, exactly which operations can be executed by group members and other users is definable by :
a) the group’s head
b) the file’s owner
c) the file’s permissions
d) all of the mentioned
Answer
Answer: b [Reason:] None.
4. A process _____ lower the priority of another process, if both are owned by the same owner.
a) must
b) can
c) cannot
d) none of the mentioned
Answer
Answer: b [Reason:] None.
5. In distributed file system, ______ directories are visible from the local machine.
a) protected
b) local
c) private
d) remote
Answer
Answer: d [Reason:] None.
6. In the world wide web, a ____ is needed to gain access to the remote files, and seperate operations are used to transfer files.
a) laptop
b) plugin
c) browser
d) player
Answer
Answer: c [Reason:] None.
7. Anonymous access allows a user to transfer files :
a) without having an account on the remote system
b) only if he accesses the system with a guest account
c) only if he has an account on the remote system
d) none of the mentioned
Answer
Answer: a [Reason:] The world wide web uses anonymous file exchange almost exclusively.
8. The machine containing the files is the _______ and the machine wanting to access the files is the ______
a) master, slave
b) memory, user
c) server, client
d) none of the mentioned
Answer
Answer: c [Reason:] None.
9. Distributed naming services/Distributed information systems have been devised to :
a) provide information about all the systems
b) provide unified access to the information needed for remote computing
c) provide unique names to all systems in a network
d) all of the mentioned
Answer
Answer: b [Reason:] None.
10. Domain name system provides :
a) host-name-to-network-address translations for the entire internet
b) network-address-to-host-name translations for the entire internet
c) binary to hex translations for the entire internet
d) all of the mentioned
Answer
Answer: a [Reason:] None.
11. To recover from failures in the network operations, ______ information maybe maintained.
a) ip address
b) state
c) stateless
d) operating system
Answer
Answer: b [Reason:] None.
12. The series of accesses between the open and close operations is a :
a) transaction
b) procedure
c) program
d) file session
Answer
Answer: d [Reason:] None.