Operating System MCQ Number 01276

Operating System MCQ Set 1

1. _______ tend to represent a major bottleneck in system performance.
a) CPUs
b) Disks
c) Programs
d) I/O

Answer

Answer: b [Reason:] None.

2. In UNIX, even an ’empty’ disk has a percentage of its space lost to ______
a) programs
b) inodes
c) virtual memory
d) stacks

Answer

Answer: b [Reason:] None.

3. By preallocating the inodes and spreading them across the volume, we _____ the system performance.
a) improve
b) decrease
c) maintain
d) do not affect

Answer

Answer: a [Reason:] None.

4. ______ writes occur in the order in which the disk subsystem receives them, and the writes are not buffered.
a) Asynchronous
b) Regular
c) Synchronous
d) Irregular

Answer

Answer: c [Reason:] None.

5. In _____ writes, the data is stored in the cache.
a) Asynchronous
b) Regular
c) Synchronous
d) Irregular

Answer

Answer: a [Reason:] None.

6. A file being read or written sequentially should not have its pages replaced in LRU order, because _______
a) it is very costly
b) the most recently used page will be used last
c) it is not efficient
d) all of the mentioned

Answer

Answer: b [Reason:] None.

7. In the optimized technique for sequential access _____ removes a page from the buffer as soon as the next page is requested.
a) write ahead
b) read ahead
c) free-behind
d) add-front

Answer

Answer: c [Reason:] None.

8. With _______ a requested page and several subsequent pages are read and cached.
a) write ahead
b) read ahead
c) free-behind
d) add-front

Answer

Answer: b [Reason:] None.

Operating System MCQ Set 2

1. Data cannot be written to secondary storage unless written within a ______
a) file
b) swap space
c) directory
d) text format

Answer

Answer: a [Reason:] None.

2. File attributes consist of :
a) name
b) type
c) identifier
d) all of the mentioned

Answer

Answer: d [Reason:] None.

3. The information about all files is kept in :
a) swap space
b) operating system
c) seperate directory structure
d) none of the mentioned

Answer

Answer: c [Reason:] None.

4. A file is a/an _______ data type.
a) abstract
b) primitive
c) public
d) private

Answer

Answer: a [Reason:] None.

5. The operating system keeps a small table containing information about all open files called :
a) system table
b) open-file table
c) file table
d) directory table

Answer

Answer: b [Reason:] None.

6. In UNIX, the open system call returns :
a) pointer to the entry in the open file table
b) pointer to the entry in the system wide table
c) a file to the process calling it
d) none of the mentioned

Answer

Answer: a [Reason:] None.

7. System wide table in UNIX contains process independent information such as :
a) location of file on disk
b) access dates
c) file size
d) all of the mentioned

Answer

Answer: d [Reason:] None.

8. The open file table has a/an _______ associated with each file.
a) file content
b) file permission
c) open count
d) close count

Answer

Answer: c [Reason:] open count indicates the number of processes that have the file open.

9. The file name is generally split into two parts :
a) name & identifier
b) identifier & type
c) extension & name
d) type & extension

Answer

Answer: c [Reason:] None.

Operating System MCQ Set 3

1. The UNIX sytem uses a/an ________ stored at the beginning of a some files to indicate roughly the type of file.
a) identifier
b) extension
c) virtual number
d) magic number

Answer

Answer: d [Reason:] None.

2. The larger the block size, the ______ the internal fragmentation.
a) greater
b) lesser
c) same
d) none of the mentioned

Answer

Answer: a [Reason:] None.

3. In the sequential access method, information in the file is processed :
a) one disk after the other, record access doesnt matter
b) one record after the other
c) one text document after the other
d) none of the mentioned

Answer

Answer: b [Reason:] None.

4. Sequential access method ______ on random access devices.
a) works well
b) doesnt work well
c) maybe works well and doesnt work well
d) none of the mentioned

Answer

Answer: a [Reason:] None.

5. The direct access method is based on a ______ model of a file, as _____ allow random access to any file block.
a) magnetic tape, magnetic tapes
b) tape, tapes
c) disk, disks
d) all of the mentioned

Answer

Answer: c [Reason:] None.

6. For a direct access file :
a) there are restrictions on the order of reading and writing
b) there are no restrictions on the order of reading and writing
c) access is restricted permission wise
d) access is not restricted permission wise

Answer

Answer: b [Reason:] None.

7. A relative block number is an index relative to :
a) the beginning of the file
b) the end of the file
c) the last written position in file
d) none of the mentioned

Answer

Answer: a [Reason:] None.

8. The index contains :
a) names of all contents of file
b) pointers to each page
c) pointers to the various blocks
d) all of the mentioned

Answer

Answer: c [Reason:] None.

9. For large files, when the index itself becomes too large to be kept in memory :
a) index is called
b) an index is created for the index file
c) secondary index files are created
d) all of the mentioned

Answer

Answer: b [Reason:] None.

Operating System MCQ Set 4

1. To organise file systems on disk, :
a) they are split into one or more partitions
b) information about files is added to each partition
c) they are made on different storage spaces
d) all of the mentioned

Answer

Answer: b [Reason:] None.

2. The directory can be viewed as a ___ that translates file names into their directory entries.
a) symbol table
b) partition
c) swap space
d) cache

Answer

Answer: a [Reason:] None.

3. In the single level directory :
a) All files are contained in different directories all at the same level
b) All files are contained in the same directory
c) Depends on the operating system
d) None of the mentioned

Answer

Answer: b [Reason:] None.

4. In the single level directory :
a) all directories must have unique names
b) all files must have unique names
c) all files must have unique owners
d) all of the mentioned

Answer

Answer: b [Reason:] None.

5. In the two level directory structure :
a) each user has his/her own user file directory
b) the system doesn’t its own master file directory
c) all of the mentioned
d) none of the mentioned

Answer

Answer: a [Reason:] None.

6. When a user job starts in a two level directory system, or a user logs in :
a) the users user file directory is searched
b) the system’s master file directory is not searched
c) the master file directory is indexed by user name or account number, and each entry points to the UFD for that user
d) all of the mentioned

Answer

Answer: c [Reason:] None.

7. When a user refers to particular file :
a) system MFD is searched
b) his own UFD is not searched
c) both MFD and UFD are searched
d) every directory is searched

Answer

Answer: c [Reason:] None.

8. The disadvantage of the two level directory structure is that :
a) it does not solve the name collision problem
b) it solves the name collision problem
c) it does not isolate users from one another
d) it isolates users from one another

Answer

Answer : d [Reason:] None.

9. In the tree structured directories,
a) the tree has the stem directory
b) the tree has the leaf directory
c) the tree has the root directory
d) all of the mentioned

Answer

Answer : c [Reason:] None.

10. The current directory contains, most of the files that are :
a) of current interest to the user
b) stored currently in the system
c) not used in the system
d) not of current interest to the system

Answer

Answer : a [Reason:] None.

11. Path names can be of two types :
a) absolute & relative
b) local & global
c) global & relative
d) relative & local

Answer

Answer : a [Reason:] None.

Operating System MCQ Set 5

1. A mount point is :
a) an empty directory at which the mounted file system will be attached
b) a location where everytime file systems are mounted
c) is the time when the mounting is done
d) none of the mentioned

Answer

Answer: a [Reason:] None.

2. When a file system is mounted over a directory that is not empty :
a) the system may not allow the mount
b) the system must allow the mount
c) the system may allow the mount and the directory’s existing files will then be made obscure
d) all of the mentioned

Answer

Answer: c [Reason:] None.

3. In UNIX, exactly which operations can be executed by group members and other users is definable by :
a) the group’s head
b) the file’s owner
c) the file’s permissions
d) all of the mentioned

Answer

Answer: b [Reason:] None.

4. A process _____ lower the priority of another process, if both are owned by the same owner.
a) must
b) can
c) cannot
d) none of the mentioned

Answer

Answer: b [Reason:] None.

5. In distributed file system, ______ directories are visible from the local machine.
a) protected
b) local
c) private
d) remote

Answer

Answer: d [Reason:] None.

6. In the world wide web, a ____ is needed to gain access to the remote files, and seperate operations are used to transfer files.
a) laptop
b) plugin
c) browser
d) player

Answer

Answer: c [Reason:] None.

7. Anonymous access allows a user to transfer files :
a) without having an account on the remote system
b) only if he accesses the system with a guest account
c) only if he has an account on the remote system
d) none of the mentioned

Answer

Answer: a [Reason:] The world wide web uses anonymous file exchange almost exclusively.

8. The machine containing the files is the _______ and the machine wanting to access the files is the ______
a) master, slave
b) memory, user
c) server, client
d) none of the mentioned

Answer

Answer: c [Reason:] None.

9. Distributed naming services/Distributed information systems have been devised to :
a) provide information about all the systems
b) provide unified access to the information needed for remote computing
c) provide unique names to all systems in a network
d) all of the mentioned

Answer

Answer: b [Reason:] None.

10. Domain name system provides :
a) host-name-to-network-address translations for the entire internet
b) network-address-to-host-name translations for the entire internet
c) binary to hex translations for the entire internet
d) all of the mentioned

Answer

Answer: a [Reason:] None.

11. To recover from failures in the network operations, ______ information maybe maintained.
a) ip address
b) state
c) stateless
d) operating system

Answer

Answer: b [Reason:] None.

12. The series of accesses between the open and close operations is a :
a) transaction
b) procedure
c) program
d) file session

Answer

Answer: d [Reason:] None.

ed010d383e1f191bdb025d5985cc03fc?s=120&d=mm&r=g

DistPub Team

Distance Publisher (DistPub.com) provide project writing help from year 2007 and provide writing and editing help to hundreds student every year.