In the tree structured directories ________
1.the tree has the stem directory
2. the tree has the leaf directory
3. the tree has the root directory
4.All of the Mentioned
Posted Date:-2022-03-29 07:34:02
In UNIX, what will the open system call return?
1.pointer to the entry in the open file table
2.pointer to the entry in the system wide table
3.a file to the process calling it
4.None of the mentioned
Posted Date:-2022-03-29 07:24:15
The index contains ________
1.names of all contents of file
2.pointers to each page
3.pointers to the various blocks
4.All of the Mentioned
Posted Date:-2022-03-29 07:28:52
What is raw disk?
1.disk without file system
2.empty disk
3. disk lacking logical file system
4.disk having file system
Posted Date:-2022-03-29 07:20:07
When a user job starts in a two level directory system, or a user logs in ______
1. the users user file directory is searched
2. the system’s master file directory is not searched
3.the master file directory is indexed by user name or account number, and each entry points to the UFD for that user
4. All of the mentioned
Posted Date:-2022-03-29 07:31:24
With a shared file ______
1.actual file exists
2. there are two copies of the file
3.the changes made by one person are not reflected to the other
4.the changes made by one person are reflected to the other
Posted Date:-2022-03-29 07:37:29
A file is a/an _______ data type.
1. abstract
2. primitive
3.public
4.Private
Posted Date:-2022-03-29 07:23:29
A process _____ lower the priority of another process if both are owned by the same owner.
1.must
2.can
3.cannot
4.None of the mentioned
Posted Date:-2022-03-29 07:41:13
A relative block number is an index relative to ______
1. the beginning of the file
2.the end of the file
3.the last written position in file
4.None of the mentioned
Posted Date:-2022-03-29 07:28:28
A relative path name begins at the _______
1.leaf
2.stem
3.current directory
4. root
Posted Date:-2022-03-29 07:35:43
A tree structure ______ the sharing of files and directories.
1.allows
2.may restrict
3.restricts
4.None of the mentioned
Posted Date:-2022-03-29 07:36:57
An absolute path name begins at the _____
1. leaf
2.stem
3.current directory
4.root
Posted Date:-2022-03-29 07:35:19
Anonymous access allows a user to transfer files ________
1.without having an account on the remote system
2.only if he accesses the system with a guest account
3. only if he has an account on the remote system
4.None of the mentioned
Posted Date:-2022-03-29 07:42:45
Data cannot be written to secondary storage unless written within a ______
1. file
2.swap space
3.directory
4.text format
Posted Date:-2022-03-29 07:22:04
File attributes consist of _____
1. name
2. type
3. identifier
4.All of the Mentioned
Posted Date:-2022-03-29 07:22:34
For a direct access file ________
1.there are restrictions on the order of reading and writing
2. there are no restrictions on the order of reading and writing
3.access is restricted permission wise
4.access is not restricted permission wise
Posted Date:-2022-03-29 07:28:09
For large files, when the index itself becomes too large to be kept in memory?
1. index is called
2.an index is created for the index file
3. secondary index files are created
4.All of the Mentioned
Posted Date:-2022-03-29 07:29:14
If the block of free-space list is free then bit will _____
1. 1
2. 0
3. any of 0 or 1
4. none of the mentioned
Posted Date:-2022-03-29 07:21:15
In a tree structure, when deleting a directory that is not empty?
1.The contents of the directory are safe
2.The contents of the directory are also deleted
3.contents of the directory are not deleted
4.None of the mentioned
Posted Date:-2022-03-29 07:36:04
In distributed file system ________________ directories are visible from the local machine.
1.protected
2.local
3.private
4. remote
Posted Date:-2022-03-29 07:41:38
In the sequential access method, information in the file is processed ______
1.one disk after the other, record access doesnt matter
2.one record after the other
3.one text document after the other
4.None of the mentioned
Posted Date:-2022-03-29 07:27:00
In the world wide web, a ____ is needed to gain access to the remote files, and separate operations are used to transfer files.
1.laptop
2. plugin
3. browser
4.player
Posted Date:-2022-03-29 07:42:13
In UNIX, exactly which operations can be executed by group members and other users is definable by _____
1.the group’s head
2. the file’s owner
3. the file’s permissions
4.All of the Mentioned
Posted Date:-2022-03-29 07:40:38
In UNIX, what is a link?
1.a directory entry
2. a pointer to another file or subdirectory
3.implemented as an absolute or relative path name
4. All of the mentioned
Posted Date:-2022-03-29 07:37:52
In which type of allocation method each file occupy a set of contiguous block on the disk?
1.contiguous allocation
2.dynamic-storage allocation
3.linked allocation
4.indexed allocation
Posted Date:-2022-03-29 07:20:51
Sequential access method ______ on random access devices.
1. works well
2.doesnt work well
3.maybe works well and doesnt work well
4. none of the mentioned
Posted Date:-2022-03-29 07:27:25
System wide table in UNIX contains process independent information such as _______
1. location of file on disk
2.access dates
3. file size
4.All of the Mentioned
Posted Date:-2022-03-29 07:24:50
The current directory contains, most of the files that are _____
1. of current interest to the user
2.stored currently in the system
3. not used in the system
4.not of current interest to the system
Posted Date:-2022-03-29 07:34:26
The data structure used for file directory is called _______
1.mount table
2.hash table
3. file table
4. process table
Posted Date:-2022-03-29 07:20:28
The deletion of a link ________ the original file.
1. deletes
2.affects
3.does not affect
4. none of the mentioned
Posted Date:-2022-03-29 07:38:21
The direct access method is based on a ______ model of a file, as _____ allow random access to any file block.
1.magnetic tape, magnetic tapes
2.tape, tapes
3.disk, disks
4.All of the Mentioned
Posted Date:-2022-03-29 07:27:45
The directory can be viewed as a _________ that translates file names into their directory entries.
1. symbol table
2. partition
3.swap space
4.Cache
Posted Date:-2022-03-29 07:30:17
The information about all files is kept in _______
1.swap space
2.operating system
3. seperate directory structure
4. none of the mentioned
Posted Date:-2022-03-29 07:23:05
The larger the block size, the ______ the internal fragmentation.
1.greater
2.lesser
3.same
4.None of the mentioned
Posted Date:-2022-03-29 07:26:36
The machine containing the files is the _______ and the machine wanting to access the files is the ______
1.master, slave
2.memory, user
3.server, client
4.None of the mentioned
Posted Date:-2022-03-29 07:43:13
The open file table has a/an _______ associated with each file.
1.file content
2.file permission
3.open count
4.close count
Posted Date:-2022-03-29 07:25:22
The operating system keeps a small table containing information about all open files called ________
1.system table
2.open-file table
3. file table
4.directory table
Posted Date:-2022-03-29 07:23:52
The UNIX sytem uses a/an ________ stored at the beginning of a some files to indicate roughly the type of file.
1. identifier
2. extension
3.virtual number
4.magic number
Posted Date:-2022-03-29 07:26:13
To organise file systems on disk _________
1.they are split into one or more partitions
2. information about files is added to each partition
3.they are made on different storage spaces
4.All of the Mentioned
Posted Date:-2022-03-29 07:29:57
What is the disadvantage of the two level directory structure?
1. it does not solve the name collision problem
2.it solves the name collision problem
3. it does not isolate users from one another
4.it isolates users from one another
Posted Date:-2022-03-29 07:32:19
What is the mount point?
1.an empty directory at which the mounted file system will be attached
2.a location where every time file systems are mounted
3.s the time when the mounting is done
4. none of the mentioned
Posted Date:-2022-03-29 07:39:36
What will happen in the two level directory structure?
1.each user has his/her own user file directory
2.the system doesn’t its own master file directory
3. all of the mentioned
4.None of the mentioned
Posted Date:-2022-03-29 07:30:54
When a cycle exists, the reference count maybe non zero, even when it is no longer possible to refer to a directory or file, due to _______
1. the possibility of one hidden reference
2. the possibility of two hidden references
3. the possibility of self referencing
4.None of the mentioned
Posted Date:-2022-03-29 07:39:05
When a file system is mounted over a directory that is not empty then ____
1. the system may not allow the mount
2.the system must allow the mount
3. the system may allow the mount and the directory’s existing files will then be made obscure
4.All of the Mentioned
Posted Date:-2022-03-29 07:40:05
When a user refers to a particular file?
1.system MFD is searched
2. his own UFD is not searched
3.both MFD and UFD are searched
4.every directory is searched
Posted Date:-2022-03-29 07:31:47
When keeping a list of all the links/references to a file, and the list is empty, implies that ________
1.the file has no copies
2.the file is deleted
3.the file is hidden
4.None of the mentioned
Posted Date:-2022-03-29 07:38:44
When two users keep a subdirectory in their own directories, the structure being referred to is ______
1.tree structure
2.cyclic graph directory structure
3.two level directory structure
4.acyclic graph directory
Posted Date:-2022-03-29 07:36:33
Which of the following are the two parts of the file name?
1.name & identifier
2.identifier & type
3.extension & name
4.type & extension
Posted Date:-2022-03-29 07:25:41
Which of the following are the types of Path names?
1.absolute & relative
2. local & global
3.global & relative
4.relative & local
Posted Date:-2022-03-29 07:34:45
Which protocol establishes the initial logical connection between a server and a client?
1. transmission control protocol
2.user datagram protocol
3.mount protocol
4.datagram congestion control protocol
Posted Date:-2022-03-29 07:21:35