MCQOPTIONS
Saved Bookmarks
This section includes 60 Mcqs, each offering curated multiple-choice questions to sharpen your Operating System knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
NTFS stands for __________ and it was developed by ________. |
| A. | New Technology File System; Apple |
| B. | Network Technology File System; Apple |
| C. | New Technology File System; Microsoft |
| D. | Network Technology File System; Intel |
| Answer» D. Network Technology File System; Intel | |
| 2. |
In MS-Word, you can use ______ to navigate a long document through small pictures of each page. |
| A. | Document-map |
| B. | Thumbnails |
| C. | Outline |
| D. | Draft |
| Answer» C. Outline | |
| 3. |
Consider a system where each file is associated with a 16-bit number. For each file, each user should have the read and write capability. How much memory is needed to store each user’s access data? |
| A. | 16 KB |
| B. | 32 KB |
| C. | 64 KB |
| D. | 128 KB |
| Answer» B. 32 KB | |
| 4. |
On computers where there are multiple operating system, the decision to load a particular one is done by _____. |
| A. | PCB |
| B. | Inode |
| C. | File Control Block |
| D. | Boot Loader |
| Answer» E. | |
| 5. |
Consider the Unix i-node which uses 12 direct DBAs, 1 single indirect, 1 double indirect, 1 triple indirect. The disk block address requires 32 bits and disk block size is 1 KB. What is the maximum file size? |
| A. | 16 GB |
| B. | 32 GB |
| C. | 64 GB |
| D. | 8 GB |
| Answer» B. 32 GB | |
| 6. |
In a file allocation system, which of the following allocation scheme(s) can be used if no external fragmentation is allowed?I. ContiguousII. LinkedIII. Indexed |
| A. | I and III only |
| B. | II only |
| C. | III only |
| D. | II and III only |
| Answer» E. | |
| 7. |
Consider the following statements :(a) UNIX provides three types of permissions* Read* Write* Execute(b) UNIX provides three sets of permissions* permission for owner* permission for group* permission for othersWhich of the above statement/s is/are true ? |
| A. | Only (a) |
| B. | Only (b) |
| C. | Both (a) and (b) |
| D. | Neither (a) nor (b) |
| Answer» D. Neither (a) nor (b) | |
| 8. |
Consider the following programmain(){fork() ;fork() ;fork( ) ;}How many new processes will be created ? |
| A. | 9 |
| B. | 6 |
| C. | 7 |
| D. | 5 |
| Answer» D. 5 | |
| 9. |
Consider a linear list based implementation in a file system. Each directory is a list of nodes, where each node contains the file name along with the file metadata, such as the list of pointers to the data blocks. Consider a given directory foo.Which of the following operations will necessarily require a full scan of foo for successful completion? |
| A. | Renaming of an existing file in foo |
| B. | Opening of an existing file in foo |
| C. | Deletion of an existing file from foo |
| D. | Creation of a new file in foo |
| Answer» B. Opening of an existing file in foo | |
| 10. |
File operations that manipulate the ‘open-count’ maintained for each entry in open file table include: |
| A. | open, write |
| B. | read, write |
| C. | write, close |
| D. | open, close |
| Answer» E. | |
| 11. |
Match the following WINDOWS system calls and UNIX system calls with reference to process control and File manipulation.WindowsUNIXA. Create-process( )I. Open( )B. WaitForSingleObject( )II. Close( )C. CreateFile( )III. Fork( )D. CloseHandle( )IV. Wait( ) |
| A. | A - III, B - IV, C - I, D - II |
| B. | A - IV, B - III, C - I, D - II |
| C. | A - IV, B - III, C - II, D - I |
| D. | A - III, B - IV, C - II, D - I |
| Answer» B. A - IV, B - III, C - I, D - II | |
| 12. |
Cortana is a Microsoft's, _______ |
| A. | Hybrid laptop-tablet device |
| B. | Browser introduced with Windows - 10 |
| C. | Touch support Office App |
| D. | Voice controlled digital assistant |
| Answer» E. | |
| 13. |
The operating system reserves space on disk for storing virtual-memory pages that are not currently in main memory; this space is called |
| A. | Latches |
| B. | Swap Space |
| C. | Dirty Block |
| D. | None of the mentioned |
| Answer» C. Dirty Block | |
| 14. |
Locks on buffer blocks are unrelated to locks used for concurrency-control of transactions, and releasing them in a non-two-phase manner does not have any implications on transaction serializability. This is |
| A. | Latches |
| B. | Swap Space |
| C. | Dirty Block |
| D. | None of the mentioned |
| Answer» B. Swap Space | |
| 15. |
A transaction commits as soon as its commit log record is written to stable storage at the primary site. This is |
| A. | One Safe |
| B. | Two Safe |
| C. | Two-very Safe |
| D. | Very Safe |
| Answer» B. Two Safe | |
| 16. |
_________ dump schemes have been developed that allow transactions to be active while the dump is in progress. |
| A. | Archival |
| B. | Fuzzy |
| C. | SQL |
| D. | All of the mentioned |
| Answer» C. SQL | |
| 17. |
If a failure has occurred in the midst of a transfer, it is called as _________ |
| A. | Successful completion |
| B. | Partial failure |
| C. | Total failure |
| D. | None of the mentioned |
| Answer» C. Total failure | |
| 18. |
For correct behavior during recovery, undo and redo operation must be |
| A. | Commutative |
| B. | Associative |
| C. | Idempotent |
| D. | Distributive |
| Answer» D. Distributive | |
| 19. |
A __________ checkpoint is a checkpoint where transactions are allowed to perform updates even while buffer blocks are being written out. |
| A. | Temporary |
| B. | Fuzzy |
| C. | Permanent |
| D. | Recovery |
| Answer» C. Permanent | |
| 20. |
The log is a sequence of _________ recording all the update activities in the database. |
| A. | Log records |
| B. | Records |
| C. | Entries |
| D. | Redo |
| Answer» B. Records | |
| 21. |
Which is not a desirable property of a transaction ? |
| A. | Isolation |
| B. | Atomicity |
| C. | Durability |
| D. | All are desirable |
| Answer» E. | |
| 22. |
Which of the following can cause a transaction failure |
| A. | Logical error |
| B. | System error |
| C. | More than one of the mentioned |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 23. |
If ___________ are not obtained in undo operation it will cause problem in undo-phase. |
| A. | Higher-level lock |
| B. | Lower-level lock |
| C. | Read only lock |
| D. | Read write |
| Answer» C. Read only lock | |
| 24. |
State true or false: Using checkpoints reduces overhead |
| A. | True |
| B. | False |
| C. | May be |
| D. | Can't say |
| Answer» B. False | |
| 25. |
A directed graph which represents the deadlock is called : |
| A. | cycle graph |
| B. | deadlock graph |
| C. | wait-for graph |
| D. | none of the above |
| Answer» D. none of the above | |
| 26. |
The ___________ policy, allows the system to write modified blocks to disk even if the transactions thatmade those modifications have not all committed. |
| A. | Force |
| B. | No-force |
| C. | Steal |
| D. | No-steal |
| Answer» D. No-steal | |
| 27. |
__________ starts from a position determined during analysis, and performs a redo, repeating history, to bring the database to a state it was in before the crash. |
| A. | Analysis pass |
| B. | Redo pass |
| C. | Undo pass |
| D. | None of the mentioned |
| Answer» C. Undo pass | |
| 28. |
A transaction commits as soon as its commit log record is written to stable storage at the primary and the backup site.This is |
| A. | One Safe |
| B. | Two Safe |
| C. | Two-very Safe |
| D. | Very Safe |
| Answer» D. Very Safe | |
| 29. |
If only the primary is active, the transaction is allowed to commit as soon as its commit log record is written to stable storage at the primary site. This is |
| A. | One Safe |
| B. | Two Safe |
| C. | Two-very Safe |
| D. | Very Safe |
| Answer» C. Two-very Safe | |
| 30. |
If a transaction does not modify the database until it has committed it is said to use a _______ modification technique |
| A. | Deferred |
| B. | Immediate |
| C. | More than one of the mentioned |
| D. | None of the mentioned |
| Answer» B. Immediate | |
| 31. |
________ dump, writes out SQL DDL statements and SQL insert statements to a file, which can then be reexecuted to re-create the database. |
| A. | Archival |
| B. | Fuzzy |
| C. | SQL |
| D. | All of the mentioned |
| Answer» D. All of the mentioned | |
| 32. |
Rollback of transactions is normally used to : |
| A. | recover from transaction failure |
| B. | update the transaction |
| C. | retrieve old records |
| D. | repeat a transaction |
| Answer» B. update the transaction | |
| 33. |
The partitions of the database into fixed length storage units are called as __________ |
| A. | Blocks |
| B. | Tuples |
| C. | Relations |
| D. | None of the mentioned |
| Answer» B. Tuples | |
| 34. |
The blocks residing on the disk are referred to as ___________ |
| A. | Physical blocks |
| B. | Buffer blocks |
| C. | Disk blocks |
| D. | Disk buffer |
| Answer» B. Buffer blocks | |
| 35. |
If the transaction can no longer continue with its normal execution because of some internal condition, it is called as a _________ |
| A. | Logical error |
| B. | System error |
| C. | System crash |
| D. | None of the mentioned |
| Answer» B. System error | |
| 36. |
State true or false: The destination block has incorrect information in case of a total failure |
| A. | True |
| B. | False |
| C. | May be |
| D. | Can't say |
| Answer» C. May be | |
| 37. |
If a system has entered and undesirable state due to which it is unable to continue with normal execution, it is called as _________ |
| A. | Logical error |
| B. | System error |
| C. | System crash |
| D. | None of the mentioned |
| Answer» C. System crash | |
| 38. |
If there is a hardware malfunction or a bug in the database that causes the loss of content of volatile storage, it is called as ________ |
| A. | Logical error |
| B. | System error |
| C. | System crash |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 39. |
A transaction performs on the isolation level of the Read Uncommitted if : |
| A. | A dirty read occurs |
| B. | Non-repeatable read occurs |
| C. | Phantom reads occurs |
| D. | All of the above |
| Answer» E. | |
| 40. |
....... deals with soft errors, such as power failures. |
| A. | system recovery |
| B. | media recovery |
| C. | database recovery |
| D. | failure recovery |
| Answer» E. | |
| 41. |
The __________________ contains a list of blocks that have been updated in the database buffer. |
| A. | Latches |
| B. | Swap Space |
| C. | Dirty Block |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 42. |
___________ determines which transactions to undo,which pages were dirty at the time of the crash, and the LSN from which the redo pass should start. |
| A. | Analysis pass |
| B. | Redo pass |
| C. | Undo pass |
| D. | None of the mentioned |
| Answer» B. Redo pass | |
| 43. |
Transaction Throughput is : |
| A. | Elapsed Time between submitting a transaction and receiving a transaction. |
| B. | Average no. of transaction processed per second. |
| C. | No. of resources used by a transaction. |
| D. | None of the above |
| Answer» C. No. of resources used by a transaction. | |
| 44. |
A dump of the database contents is also referred to as an _____________ dump. |
| A. | Archival |
| B. | Fuzzy |
| C. | SQL |
| D. | All of the mentioned |
| Answer» B. Fuzzy | |
| 45. |
A special redo-only log record is written to the log, where V1 is the value being restored to data item Xj during the rollback. These log records are sometimes called |
| A. | Log records |
| B. | Records |
| C. | Compensation log records |
| D. | Compensation redo records |
| Answer» D. Compensation redo records | |
| 46. |
Which of the following is not a classification of storage |
| A. | Volatile storage |
| B. | Nonvolatile storage |
| C. | Stable storage |
| D. | None of the mentioned |
| Answer» E. | |
| 47. |
The area of memory where blocks temporarily reside is called as ________ |
| A. | Block buffer |
| B. | Disk buffer |
| C. | Physical buffer |
| D. | None of the mentioned |
| Answer» C. Physical buffer | |
| 48. |
______________ rolls back all transactions that were incomplete at the time of crash. |
| A. | Analysis pass |
| B. | Redo pass |
| C. | Undo pass |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 49. |
Which of the following is not a recovery technique? |
| A. | Deferred update |
| B. | Immediate update |
| C. | Two-phase commit |
| D. | Recovery management |
| Answer» D. Recovery management | |
| 50. |
Which commands are used to control which users have which privilege over which objects ? |
| A. | QUE and QUIST |
| B. | GRANT and REVOKE |
| C. | CASECADE and MVD |
| D. | None of the above |
| Answer» C. CASECADE and MVD | |