Header Ads Widget

File Management

1. To organise file systems on disk _______________
a) they are split into one or more partitions
b) information about files is added to each partition
c) they are made on different storage spaces
d) all of the mentioned
Answer: b

Explanation: None..

2. The directory can be viewed as a _________ that translates file names into their directory entries.
a) symbol table
b) partition
c) swap space
d) cache
Answer: a
Explanation: None.

3. What will happen in the single level directory?
a) All files are contained in different directories all at the same level
b) All files are contained in the same directory
c) Depends on the operating system
d) None of the mentioned
Answer: b
Explanation: None.

4. What will happen in the single level directory?
a) all directories must have unique names
b) all files must have unique names
c) all files must have unique owners
d) all of the mentioned
Answer: b
Explanation: None.

5. What will happen in the two level directory structure?
a) each user has his/her own user file directory
b) the system doesn’t its own master file directory
c) all of the mentioned
d) none of the mentioned
Answer: a
Explanation: None.

6. When a user job starts in a two level directory system, or a user logs in _____________
a) the users user file directory is searched
b) the system’s master file directory is not searched
c) the master file directory is indexed by user name or account number, and each entry points to the UFD for that user
d) all of the mentioned
Answer: c
Explanation: None.

7. When a user refers to a particular file?
a) system MFD is searched
b) his own UFD is not searched
c) both MFD and UFD are searched
d) every directory is searched
Answer: c
Explanation: None.

8. What is the disadvantage of the two level directory structure?
a) it does not solve the name collision problem
b) it solves the name collision problem
c) it does not isolate users from one another
d) it isolates users from one another
Answer: d
Explanation: None.

9. In the tree structured directories _____________
a) the tree has the stem directory
b) the tree has the leaf directory
c) the tree has the root directory
d) all of the mentioned
Answer: c
Explanation: None.

10. The current directory contains, most of the files that are _____________
a) of current interest to the user
b) stored currently in the system
c) not used in the system
d) not of current interest to the system
Answer: a
Explanation: None.

11. Which of the following are the types of Path names?
a) absolute & relative
b) local & global
c) global & relative
d) relative & local
Answer: a
Explanation: None.

12. An absolute path name begins at the _____________
a) leaf
b) stem
c) current directory
d) root
Answer: d
Explanation: None.

13. A relative path name begins at the _____________
a) leaf
b) stem
c) current directory
d) root
Answer: c
Explanation: None.

14. In a tree structure, when deleting a directory that is not empty?
a) The contents of the directory are safe
b) The contents of the directory are also deleted
c) contents of the directory are not deleted
d) none of the mentioned
Answer: b
Explanation: None.

15. When two users keep a subdirectory in their own directories, the structure being referred to is _____________
a) tree structure
b) cyclic graph directory structure
c) two level directory structure
d) acyclic graph directory
Answer: d
Explanation: None.

16. A tree structure ______ the sharing of files and directories.
a) allows
b) may restrict
c) restricts
d) none of the mentioned
Answer: c
Explanation: None.

17. With a shared file _____________
a) actual file exists
b) there are two copies of the file
c) the changes made by one person are not reflected to the other
d) the changes made by one person are reflected to the other
Answer: d
Explanation: None.

18. In UNIX, what is a link?
a) a directory entry
b) a pointer to another file or subdirectory
c) implemented as an absolute or relative path name
d) all of the mentioned
Answer: d
Explanation: None.

19. The operating system _______ the links when traversing directory trees, to preserve the acyclic structure of the system.
a) considers
b) ignores
c) deletes
d) none of the mentioned
Answer: b
Explanation: None.

20. The deletion of a link ________ the original file.
a) deletes
b) affects
c) does not affect
d) none of the mentioned
Answer: c
Explanation: None.

21. When keeping a list of all the links/references to a file, and the list is empty, implies that _____________
a) the file has no copies
b) the file is deleted
c) the file is hidden
d) none of the mentioned
Answer: b
Explanation: None.

22. When a cycle exists, the reference count maybe non zero, even when it is no longer possible to refer to a directory or file, due to _______
a) the possibility of one hidden reference
b) the possibility of two hidden references
c) the possibility of self referencing
d) none of the mentioned
Answer: c
Explanation: None.

23. ______ is a unique tag, usually a number identifies the file within the file system.
a) File identifier
b) File name
c) File type
d) None of the mentioned
Answer: a
Explanation: None.

24. To create a file ____________
a) allocate the space in file system
b) make an entry for new file in directory
c) allocate the space in file system & make an entry for new file in directory
d) none of the mentioned
Answer: c
Explanation: None.

25. By using the specific system call, we can ____________
a) open the file
b) read the file
c) write into the file
d) all of the mentioned
Answer: d
Explanation: None.

26. File type can be represented by ____________
a) file name
b) file extension
c) file identifier
d) none of the mentioned
Answer: b
Explanation: None.

27. Which file is a sequence of bytes organized into blocks understandable by the system’s linker?
a) object file
b) source file
c) executable file
d) text file
Answer: a
Explanation: None.

28. What is the mounting of file system?
a) crating of a filesystem
b) deleting a filesystem
c) attaching portion of the file system into a directory structure
d) removing the portion of the file system into a directory structure
Answer: c
Explanation: None.

29. Mapping of file is managed by ____________
a) file metadata
b) page table
c) virtual memory
d) file system
Answer: a
Explanation: None.

30. Mapping of network file system protocol to local file system is done by ____________
a) network file system
b) local file system
c) volume manager
d) remote mirror
Answer: a
Explanation: None.

31. Which one of the following explains the sequential file access method?
a) random access according to the given byte number
b) read bytes one at a time, in order
c) read/write sequentially by record
d) read/write randomly by record
Answer: b
Explanation: None.

32. When will file system fragmentation occur?
a) unused space or single file are not contiguous
b) used space is not contiguous
c) unused space is non-contiguous
d) multiple files are non-contiguous
Answer: a
Explanation: None.

33. What is the mount point?
a) an empty directory at which the mounted file system will be attached
b) a location where every time file systems are mounted
c) is the time when the mounting is done
d) none of the mentioned
Answer: a
Explanation: None.

34. When a file system is mounted over a directory that is not empty then _____________
a) the system may not allow the mount
b) the system must allow the mount
c) the system may allow the mount and the directory’s existing files will then be made obscure
d) all of the mentioned
Answer: c
Explanation: None.

35. In UNIX, exactly which operations can be executed by group members and other users is definable by _____________
a) the group’s head
b) the file’s owner
c) the file’s permissions
d) all of the mentioned
Answer: b
Explanation: None.

36. A process _____ lower the priority of another process if both are owned by the same owner.
a) must
b) can
c) cannot
d) none of the mentioned
Answer: b
Explanation: None.

37. In distributed file system ________________ directories are visible from the local machine.
a) protected
b) local
c) private
d) remote
Answer: d
Explanation: None.

38. In the world wide web, a ____ is needed to gain access to the remote files, and separate operations are used to transfer files.
a) laptop
b) plugin
c) browser
d) player
Answer: c
Explanation: None.

39. Anonymous access allows a user to transfer files _____________
a) without having an account on the remote system
b) only if he accesses the system with a guest account
c) only if he has an account on the remote system
d) none of the mentioned
Answer: a
Explanation: The world wide web uses anonymous file exchange almost exclusively.

40. The machine containing the files is the _______ and the machine wanting to access the files is the ______
a) master, slave
b) memory, user
c) server, client
d) none of the mentioned
Answer: c
Explanation: None.

41. Distributed naming services/Distributed information systems have been devised to _____________
a) provide information about all the systems
b) provide unified access to the information needed for remote computing
c) provide unique names to all systems in a network
d) all of the mentioned
Answer: b
Explanation: None.

42. Domain name system provides _____________
a) host-name-to-network-address translations for the entire internet
b) network-address-to-host-name translations for the entire internet
c) binary to hex translations for the entire internet
d) all of the mentioned
Answer: a
Explanation: None.

43. To recover from failures in the network operations _____________ information may be maintained.
a) ip address
b) state
c) stateless
d) operating system
Answer: b
Explanation: None.

44. The series of accesses between the open and close operations is a _____________
a) transaction
b) procedure
c) program
d) file session
Answer: d
Explanation: None.

Post a Comment

0 Comments