 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 60 Mcqs, each offering curated multiple-choice questions to sharpen your Operating System knowledge and support exam preparation. Choose a topic below to get started.
| 1. | NTFS stands for __________ and it was developed by ________. | 
| A. | New Technology File System; Apple | 
| B. | Network Technology File System; Apple | 
| C. | New Technology File System; Microsoft | 
| D. | Network Technology File System; Intel | 
| Answer» D. Network Technology File System; Intel | |
| 2. | In MS-Word, you can use ______ to navigate a long document through small pictures of each page. | 
| A. | Document-map | 
| B. | Thumbnails | 
| C. | Outline | 
| D. | Draft | 
| Answer» C. Outline | |
| 3. | Consider a system where each file is associated with a 16-bit number. For each file, each user should have the read and write capability. How much memory is needed to store each user’s access data? | 
| A. | 16 KB | 
| B. | 32 KB | 
| C. | 64 KB | 
| D. | 128 KB | 
| Answer» B. 32 KB | |
| 4. | On computers where there are multiple operating system, the decision to load a particular one is done by _____. | 
| A. | PCB | 
| B. | Inode | 
| C. | File Control Block | 
| D. | Boot Loader | 
| Answer» E. | |
| 5. | Consider the Unix i-node which uses 12 direct DBAs, 1 single indirect, 1 double indirect, 1 triple indirect. The disk block address requires 32 bits and disk block size is 1 KB. What is the maximum file size? | 
| A. | 16 GB | 
| B. | 32 GB | 
| C. | 64 GB | 
| D. | 8 GB | 
| Answer» B. 32 GB | |
| 6. | In a file allocation system, which of the following allocation scheme(s) can be used if no external fragmentation is allowed?I. ContiguousII. LinkedIII. Indexed | 
| A. | I and III only | 
| B. | II only | 
| C. | III only | 
| D. | II and III only | 
| Answer» E. | |
| 7. | Consider the following statements :(a) UNIX provides three types of permissions* Read* Write* Execute(b) UNIX provides three sets of permissions* permission for owner* permission for group* permission for othersWhich of the above statement/s is/are true ? | 
| A. | Only (a) | 
| B. | Only (b) | 
| C. | Both (a) and (b) | 
| D. | Neither (a) nor (b) | 
| Answer» D. Neither (a) nor (b) | |
| 8. | Consider the following programmain(){fork() ;fork() ;fork( ) ;}How many new processes will be created ? | 
| A. | 9 | 
| B. | 6 | 
| C. | 7 | 
| D. | 5 | 
| Answer» D. 5 | |
| 9. | Consider a linear list based implementation in a file system. Each directory is a list of nodes, where each node contains the file name along with the file metadata, such as the list of pointers to the data blocks. Consider a given directory foo.Which of the following operations will necessarily require a full scan of foo for successful completion? | 
| A. | Renaming of an existing file in foo | 
| B. | Opening of an existing file in foo | 
| C. | Deletion of an existing file from foo | 
| D. | Creation of a new file in foo | 
| Answer» B. Opening of an existing file in foo | |
| 10. | File operations that manipulate the ‘open-count’ maintained for each entry in open file table include: | 
| A. | open, write | 
| B. | read, write | 
| C. | write, close | 
| D. | open, close | 
| Answer» E. | |
| 11. | Match the following WINDOWS system calls and UNIX system calls with reference to process control and File manipulation.WindowsUNIXA. Create-process( )I. Open( )B. WaitForSingleObject( )II. Close( )C. CreateFile( )III. Fork( )D. CloseHandle( )IV. Wait( ) | 
| A. | A - III, B - IV, C - I, D - II | 
| B. | A - IV, B - III, C - I, D - II | 
| C. | A - IV, B - III, C - II, D - I | 
| D. | A - III, B - IV, C - II, D - I | 
| Answer» B. A - IV, B - III, C - I, D - II | |
| 12. | Cortana is a Microsoft's, _______ | 
| A. | Hybrid laptop-tablet device | 
| B. | Browser introduced with Windows - 10 | 
| C. | Touch support Office App | 
| D. | Voice controlled digital assistant | 
| Answer» E. | |
| 13. | The operating system reserves space on disk for storing virtual-memory pages that are not currently in main memory; this space is called | 
| A. | Latches | 
| B. | Swap Space | 
| C. | Dirty Block | 
| D. | None of the mentioned | 
| Answer» C. Dirty Block | |
| 14. | Locks on buffer blocks are unrelated to locks used for concurrency-control of transactions, and releasing them in a non-two-phase manner does not have any implications on transaction serializability. This is | 
| A. | Latches | 
| B. | Swap Space | 
| C. | Dirty Block | 
| D. | None of the mentioned | 
| Answer» B. Swap Space | |
| 15. | A transaction commits as soon as its commit log record is written to stable storage at the primary site. This is | 
| A. | One Safe | 
| B. | Two Safe | 
| C. | Two-very Safe | 
| D. | Very Safe | 
| Answer» B. Two Safe | |
| 16. | _________ dump schemes have been developed that allow transactions to be active while the dump is in progress. | 
| A. | Archival | 
| B. | Fuzzy | 
| C. | SQL | 
| D. | All of the mentioned | 
| Answer» C. SQL | |
| 17. | If a failure has occurred in the midst of a transfer, it is called as _________ | 
| A. | Successful completion | 
| B. | Partial failure | 
| C. | Total failure | 
| D. | None of the mentioned | 
| Answer» C. Total failure | |
| 18. | For correct behavior during recovery, undo and redo operation must be | 
| A. | Commutative | 
| B. | Associative | 
| C. | Idempotent | 
| D. | Distributive | 
| Answer» D. Distributive | |
| 19. | A __________ checkpoint is a checkpoint where transactions are allowed to perform updates even while buffer blocks are being written out. | 
| A. | Temporary | 
| B. | Fuzzy | 
| C. | Permanent | 
| D. | Recovery | 
| Answer» C. Permanent | |
| 20. | The log is a sequence of _________ recording all the update activities in the database. | 
| A. | Log records | 
| B. | Records | 
| C. | Entries | 
| D. | Redo | 
| Answer» B. Records | |
| 21. | Which is not a desirable property of a transaction ? | 
| A. | Isolation | 
| B. | Atomicity | 
| C. | Durability | 
| D. | All are desirable | 
| Answer» E. | |
| 22. | Which of the following can cause a transaction failure | 
| A. | Logical error | 
| B. | System error | 
| C. | More than one of the mentioned | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 23. | If ___________ are not obtained in undo operation it will cause problem in undo-phase. | 
| A. | Higher-level lock | 
| B. | Lower-level lock | 
| C. | Read only lock | 
| D. | Read write | 
| Answer» C. Read only lock | |
| 24. | State true or false: Using checkpoints reduces overhead | 
| A. | True | 
| B. | False | 
| C. | May be | 
| D. | Can't say | 
| Answer» B. False | |
| 25. | A directed graph which represents the deadlock is called : | 
| A. | cycle graph | 
| B. | deadlock graph | 
| C. | wait-for graph | 
| D. | none of the above | 
| Answer» D. none of the above | |
| 26. | The ___________ policy, allows the system to write modified blocks to disk even if the transactions thatmade those modifications have not all committed. | 
| A. | Force | 
| B. | No-force | 
| C. | Steal | 
| D. | No-steal | 
| Answer» D. No-steal | |
| 27. | __________ starts from a position determined during analysis, and performs a redo, repeating history, to bring the database to a state it was in before the crash. | 
| A. | Analysis pass | 
| B. | Redo pass | 
| C. | Undo pass | 
| D. | None of the mentioned | 
| Answer» C. Undo pass | |
| 28. | A transaction commits as soon as its commit log record is written to stable storage at the primary and the backup site.This is | 
| A. | One Safe | 
| B. | Two Safe | 
| C. | Two-very Safe | 
| D. | Very Safe | 
| Answer» D. Very Safe | |
| 29. | If only the primary is active, the transaction is allowed to commit as soon as its commit log record is written to stable storage at the primary site. This is | 
| A. | One Safe | 
| B. | Two Safe | 
| C. | Two-very Safe | 
| D. | Very Safe | 
| Answer» C. Two-very Safe | |
| 30. | If a transaction does not modify the database until it has committed it is said to use a _______ modification technique | 
| A. | Deferred | 
| B. | Immediate | 
| C. | More than one of the mentioned | 
| D. | None of the mentioned | 
| Answer» B. Immediate | |
| 31. | ________ dump, writes out SQL DDL statements and SQL insert statements to a file, which can then be reexecuted to re-create the database. | 
| A. | Archival | 
| B. | Fuzzy | 
| C. | SQL | 
| D. | All of the mentioned | 
| Answer» D. All of the mentioned | |
| 32. | Rollback of transactions is normally used to : | 
| A. | recover from transaction failure | 
| B. | update the transaction | 
| C. | retrieve old records | 
| D. | repeat a transaction | 
| Answer» B. update the transaction | |
| 33. | The partitions of the database into fixed length storage units are called as __________ | 
| A. | Blocks | 
| B. | Tuples | 
| C. | Relations | 
| D. | None of the mentioned | 
| Answer» B. Tuples | |
| 34. | The blocks residing on the disk are referred to as ___________ | 
| A. | Physical blocks | 
| B. | Buffer blocks | 
| C. | Disk blocks | 
| D. | Disk buffer | 
| Answer» B. Buffer blocks | |
| 35. | If the transaction can no longer continue with its normal execution because of some internal condition, it is called as a _________ | 
| A. | Logical error | 
| B. | System error | 
| C. | System crash | 
| D. | None of the mentioned | 
| Answer» B. System error | |
| 36. | State true or false: The destination block has incorrect information in case of a total failure | 
| A. | True | 
| B. | False | 
| C. | May be | 
| D. | Can't say | 
| Answer» C. May be | |
| 37. | If a system has entered and undesirable state due to which it is unable to continue with normal execution, it is called as _________ | 
| A. | Logical error | 
| B. | System error | 
| C. | System crash | 
| D. | None of the mentioned | 
| Answer» C. System crash | |
| 38. | If there is a hardware malfunction or a bug in the database that causes the loss of content of volatile storage, it is called as ________ | 
| A. | Logical error | 
| B. | System error | 
| C. | System crash | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 39. | A transaction performs on the isolation level of the Read Uncommitted if : | 
| A. | A dirty read occurs | 
| B. | Non-repeatable read occurs | 
| C. | Phantom reads occurs | 
| D. | All of the above | 
| Answer» E. | |
| 40. | ....... deals with soft errors, such as power failures. | 
| A. | system recovery | 
| B. | media recovery | 
| C. | database recovery | 
| D. | failure recovery | 
| Answer» E. | |
| 41. | The __________________ contains a list of blocks that have been updated in the database buffer. | 
| A. | Latches | 
| B. | Swap Space | 
| C. | Dirty Block | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 42. | ___________ determines which transactions to undo,which pages were dirty at the time of the crash, and the LSN from which the redo pass should start. | 
| A. | Analysis pass | 
| B. | Redo pass | 
| C. | Undo pass | 
| D. | None of the mentioned | 
| Answer» B. Redo pass | |
| 43. | Transaction Throughput is : | 
| A. | Elapsed Time between submitting a transaction and receiving a transaction. | 
| B. | Average no. of transaction processed per second. | 
| C. | No. of resources used by a transaction. | 
| D. | None of the above | 
| Answer» C. No. of resources used by a transaction. | |
| 44. | A dump of the database contents is also referred to as an _____________ dump. | 
| A. | Archival | 
| B. | Fuzzy | 
| C. | SQL | 
| D. | All of the mentioned | 
| Answer» B. Fuzzy | |
| 45. | A special redo-only log record is written to the log, where V1 is the value being restored to data item Xj during the rollback. These log records are sometimes called | 
| A. | Log records | 
| B. | Records | 
| C. | Compensation log records | 
| D. | Compensation redo records | 
| Answer» D. Compensation redo records | |
| 46. | Which of the following is not a classification of storage | 
| A. | Volatile storage | 
| B. | Nonvolatile storage | 
| C. | Stable storage | 
| D. | None of the mentioned | 
| Answer» E. | |
| 47. | The area of memory where blocks temporarily reside is called as ________ | 
| A. | Block buffer | 
| B. | Disk buffer | 
| C. | Physical buffer | 
| D. | None of the mentioned | 
| Answer» C. Physical buffer | |
| 48. | ______________ rolls back all transactions that were incomplete at the time of crash. | 
| A. | Analysis pass | 
| B. | Redo pass | 
| C. | Undo pass | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 49. | Which of the following is not a recovery technique? | 
| A. | Deferred update | 
| B. | Immediate update | 
| C. | Two-phase commit | 
| D. | Recovery management | 
| Answer» D. Recovery management | |
| 50. | Which commands are used to control which users have which privilege over which objects ? | 
| A. | QUE and QUIST | 
| B. | GRANT and REVOKE | 
| C. | CASECADE and MVD | 
| D. | None of the above | 
| Answer» C. CASECADE and MVD | |