

MCQOPTIONS
Saved Bookmarks
This section includes 60 Mcqs, each offering curated multiple-choice questions to sharpen your Operating System knowledge and support exam preparation. Choose a topic below to get started.
1. |
NTFS stands for __________ and it was developed by ________. |
A. | New Technology File System; Apple |
B. | Network Technology File System; Apple |
C. | New Technology File System; Microsoft |
D. | Network Technology File System; Intel |
Answer» D. Network Technology File System; Intel | |
2. |
In MS-Word, you can use ______ to navigate a long document through small pictures of each page. |
A. | Document-map |
B. | Thumbnails |
C. | Outline |
D. | Draft |
Answer» C. Outline | |
3. |
Consider a system where each file is associated with a 16-bit number. For each file, each user should have the read and write capability. How much memory is needed to store each user’s access data? |
A. | 16 KB |
B. | 32 KB |
C. | 64 KB |
D. | 128 KB |
Answer» B. 32 KB | |
4. |
On computers where there are multiple operating system, the decision to load a particular one is done by _____. |
A. | PCB |
B. | Inode |
C. | File Control Block |
D. | Boot Loader |
Answer» E. | |
5. |
Consider the Unix i-node which uses 12 direct DBAs, 1 single indirect, 1 double indirect, 1 triple indirect. The disk block address requires 32 bits and disk block size is 1 KB. What is the maximum file size? |
A. | 16 GB |
B. | 32 GB |
C. | 64 GB |
D. | 8 GB |
Answer» B. 32 GB | |
6. |
In a file allocation system, which of the following allocation scheme(s) can be used if no external fragmentation is allowed?I. ContiguousII. LinkedIII. Indexed |
A. | I and III only |
B. | II only |
C. | III only |
D. | II and III only |
Answer» E. | |
7. |
Consider the following statements :(a) UNIX provides three types of permissions* Read* Write* Execute(b) UNIX provides three sets of permissions* permission for owner* permission for group* permission for othersWhich of the above statement/s is/are true ? |
A. | Only (a) |
B. | Only (b) |
C. | Both (a) and (b) |
D. | Neither (a) nor (b) |
Answer» D. Neither (a) nor (b) | |
8. |
Consider the following programmain(){fork() ;fork() ;fork( ) ;}How many new processes will be created ? |
A. | 9 |
B. | 6 |
C. | 7 |
D. | 5 |
Answer» D. 5 | |
9. |
Consider a linear list based implementation in a file system. Each directory is a list of nodes, where each node contains the file name along with the file metadata, such as the list of pointers to the data blocks. Consider a given directory foo.Which of the following operations will necessarily require a full scan of foo for successful completion? |
A. | Renaming of an existing file in foo |
B. | Opening of an existing file in foo |
C. | Deletion of an existing file from foo |
D. | Creation of a new file in foo |
Answer» B. Opening of an existing file in foo | |
10. |
File operations that manipulate the ‘open-count’ maintained for each entry in open file table include: |
A. | open, write |
B. | read, write |
C. | write, close |
D. | open, close |
Answer» E. | |
11. |
Match the following WINDOWS system calls and UNIX system calls with reference to process control and File manipulation.WindowsUNIXA. Create-process( )I. Open( )B. WaitForSingleObject( )II. Close( )C. CreateFile( )III. Fork( )D. CloseHandle( )IV. Wait( ) |
A. | A - III, B - IV, C - I, D - II |
B. | A - IV, B - III, C - I, D - II |
C. | A - IV, B - III, C - II, D - I |
D. | A - III, B - IV, C - II, D - I |
Answer» B. A - IV, B - III, C - I, D - II | |
12. |
Cortana is a Microsoft's, _______ |
A. | Hybrid laptop-tablet device |
B. | Browser introduced with Windows - 10 |
C. | Touch support Office App |
D. | Voice controlled digital assistant |
Answer» E. | |
13. |
The operating system reserves space on disk for storing virtual-memory pages that are not currently in main memory; this space is called |
A. | Latches |
B. | Swap Space |
C. | Dirty Block |
D. | None of the mentioned |
Answer» C. Dirty Block | |
14. |
Locks on buffer blocks are unrelated to locks used for concurrency-control of transactions, and releasing them in a non-two-phase manner does not have any implications on transaction serializability. This is |
A. | Latches |
B. | Swap Space |
C. | Dirty Block |
D. | None of the mentioned |
Answer» B. Swap Space | |
15. |
A transaction commits as soon as its commit log record is written to stable storage at the primary site. This is |
A. | One Safe |
B. | Two Safe |
C. | Two-very Safe |
D. | Very Safe |
Answer» B. Two Safe | |
16. |
_________ dump schemes have been developed that allow transactions to be active while the dump is in progress. |
A. | Archival |
B. | Fuzzy |
C. | SQL |
D. | All of the mentioned |
Answer» C. SQL | |
17. |
If a failure has occurred in the midst of a transfer, it is called as _________ |
A. | Successful completion |
B. | Partial failure |
C. | Total failure |
D. | None of the mentioned |
Answer» C. Total failure | |
18. |
For correct behavior during recovery, undo and redo operation must be |
A. | Commutative |
B. | Associative |
C. | Idempotent |
D. | Distributive |
Answer» D. Distributive | |
19. |
A __________ checkpoint is a checkpoint where transactions are allowed to perform updates even while buffer blocks are being written out. |
A. | Temporary |
B. | Fuzzy |
C. | Permanent |
D. | Recovery |
Answer» C. Permanent | |
20. |
The log is a sequence of _________ recording all the update activities in the database. |
A. | Log records |
B. | Records |
C. | Entries |
D. | Redo |
Answer» B. Records | |
21. |
Which is not a desirable property of a transaction ? |
A. | Isolation |
B. | Atomicity |
C. | Durability |
D. | All are desirable |
Answer» E. | |
22. |
Which of the following can cause a transaction failure |
A. | Logical error |
B. | System error |
C. | More than one of the mentioned |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
23. |
If ___________ are not obtained in undo operation it will cause problem in undo-phase. |
A. | Higher-level lock |
B. | Lower-level lock |
C. | Read only lock |
D. | Read write |
Answer» C. Read only lock | |
24. |
State true or false: Using checkpoints reduces overhead |
A. | True |
B. | False |
C. | May be |
D. | Can't say |
Answer» B. False | |
25. |
A directed graph which represents the deadlock is called : |
A. | cycle graph |
B. | deadlock graph |
C. | wait-for graph |
D. | none of the above |
Answer» D. none of the above | |
26. |
The ___________ policy, allows the system to write modified blocks to disk even if the transactions thatmade those modifications have not all committed. |
A. | Force |
B. | No-force |
C. | Steal |
D. | No-steal |
Answer» D. No-steal | |
27. |
__________ starts from a position determined during analysis, and performs a redo, repeating history, to bring the database to a state it was in before the crash. |
A. | Analysis pass |
B. | Redo pass |
C. | Undo pass |
D. | None of the mentioned |
Answer» C. Undo pass | |
28. |
A transaction commits as soon as its commit log record is written to stable storage at the primary and the backup site.This is |
A. | One Safe |
B. | Two Safe |
C. | Two-very Safe |
D. | Very Safe |
Answer» D. Very Safe | |
29. |
If only the primary is active, the transaction is allowed to commit as soon as its commit log record is written to stable storage at the primary site. This is |
A. | One Safe |
B. | Two Safe |
C. | Two-very Safe |
D. | Very Safe |
Answer» C. Two-very Safe | |
30. |
If a transaction does not modify the database until it has committed it is said to use a _______ modification technique |
A. | Deferred |
B. | Immediate |
C. | More than one of the mentioned |
D. | None of the mentioned |
Answer» B. Immediate | |
31. |
________ dump, writes out SQL DDL statements and SQL insert statements to a file, which can then be reexecuted to re-create the database. |
A. | Archival |
B. | Fuzzy |
C. | SQL |
D. | All of the mentioned |
Answer» D. All of the mentioned | |
32. |
Rollback of transactions is normally used to : |
A. | recover from transaction failure |
B. | update the transaction |
C. | retrieve old records |
D. | repeat a transaction |
Answer» B. update the transaction | |
33. |
The partitions of the database into fixed length storage units are called as __________ |
A. | Blocks |
B. | Tuples |
C. | Relations |
D. | None of the mentioned |
Answer» B. Tuples | |
34. |
The blocks residing on the disk are referred to as ___________ |
A. | Physical blocks |
B. | Buffer blocks |
C. | Disk blocks |
D. | Disk buffer |
Answer» B. Buffer blocks | |
35. |
If the transaction can no longer continue with its normal execution because of some internal condition, it is called as a _________ |
A. | Logical error |
B. | System error |
C. | System crash |
D. | None of the mentioned |
Answer» B. System error | |
36. |
State true or false: The destination block has incorrect information in case of a total failure |
A. | True |
B. | False |
C. | May be |
D. | Can't say |
Answer» C. May be | |
37. |
If a system has entered and undesirable state due to which it is unable to continue with normal execution, it is called as _________ |
A. | Logical error |
B. | System error |
C. | System crash |
D. | None of the mentioned |
Answer» C. System crash | |
38. |
If there is a hardware malfunction or a bug in the database that causes the loss of content of volatile storage, it is called as ________ |
A. | Logical error |
B. | System error |
C. | System crash |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
39. |
A transaction performs on the isolation level of the Read Uncommitted if : |
A. | A dirty read occurs |
B. | Non-repeatable read occurs |
C. | Phantom reads occurs |
D. | All of the above |
Answer» E. | |
40. |
....... deals with soft errors, such as power failures. |
A. | system recovery |
B. | media recovery |
C. | database recovery |
D. | failure recovery |
Answer» E. | |
41. |
The __________________ contains a list of blocks that have been updated in the database buffer. |
A. | Latches |
B. | Swap Space |
C. | Dirty Block |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
42. |
___________ determines which transactions to undo,which pages were dirty at the time of the crash, and the LSN from which the redo pass should start. |
A. | Analysis pass |
B. | Redo pass |
C. | Undo pass |
D. | None of the mentioned |
Answer» B. Redo pass | |
43. |
Transaction Throughput is : |
A. | Elapsed Time between submitting a transaction and receiving a transaction. |
B. | Average no. of transaction processed per second. |
C. | No. of resources used by a transaction. |
D. | None of the above |
Answer» C. No. of resources used by a transaction. | |
44. |
A dump of the database contents is also referred to as an _____________ dump. |
A. | Archival |
B. | Fuzzy |
C. | SQL |
D. | All of the mentioned |
Answer» B. Fuzzy | |
45. |
A special redo-only log record
|
A. | Log records |
B. | Records |
C. | Compensation log records |
D. | Compensation redo records |
Answer» D. Compensation redo records | |
46. |
Which of the following is not a classification of storage |
A. | Volatile storage |
B. | Nonvolatile storage |
C. | Stable storage |
D. | None of the mentioned |
Answer» E. | |
47. |
The area of memory where blocks temporarily reside is called as ________ |
A. | Block buffer |
B. | Disk buffer |
C. | Physical buffer |
D. | None of the mentioned |
Answer» C. Physical buffer | |
48. |
______________ rolls back all transactions that were incomplete at the time of crash. |
A. | Analysis pass |
B. | Redo pass |
C. | Undo pass |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
49. |
Which of the following is not a recovery technique? |
A. | Deferred update |
B. | Immediate update |
C. | Two-phase commit |
D. | Recovery management |
Answer» D. Recovery management | |
50. |
Which commands are used to control which users have which privilege over which objects ? |
A. | QUE and QUIST |
B. | GRANT and REVOKE |
C. | CASECADE and MVD |
D. | None of the above |
Answer» C. CASECADE and MVD | |