Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

For every pair of component and directory vnode after path name translation :

A. a single NFS lookup call is used sequentially
B. a single NFS lookup call is used beginning from the last component
C. at least two NFS lookup calls per component are performed
D. a separate NFS lookup call is performed
Answer» E.
2.

_______________ in NFS involves the parsing of a path name into separate directory entries – or components.

A. Path parse
B. Path name parse
C. Path name translation
D. Path name parsing
Answer» D. Path name parsing
3.

The NFS protocol, __________ concurrency control mechanisms.

A. provides
B. does not provide
C. may provide
D. none of the mentioned
Answer» C. may provide
4.

A single NFS write procedure :

A. can be atomic
B. is atomic
C. is non atomic
D. none of the mentioned
Answer» C. is non atomic
5.

The server must write all NFS data ___________

A. synchronously
B. asynchronously
C. index-wise
D. none of the mentioned
Answer» B. asynchronously
6.

A server crash and recovery will __________ to a client.

A. be visible
B. affect
C. be invisible
D. harm
Answer» D. harm
7.

Every NFS request has a _________ allowing the server to determine if a request is duplicated or if any are missing.

A. name
B. transaction
C. sequence number
D. all of the mentioned
Answer» D. all of the mentioned
8.

The NFS servers :

A. are stateless
B. save the current state of the request
C. maybe stateless
D. none of the mentioned
Answer» B. save the current state of the request
9.

In UNIX, the file handle consists of a __________ and __________

A. file-system identifier & an inode number
B. an inode number & FAT
C. a FAT & an inode number
D. a file pointer & FAT
Answer» B. an inode number & FAT
10.

The server maintains a/an ________ that specifies local file systems that it exports for mounting, along with names of machines that are permitted to mount them.

A. export list
B. import list
C. sending list
D. receiving list
Answer» B. import list
11.

The mount request is mapped to the corresponding _____ and is forwarded to the mount server running on the specific server machine.

A. IPC
B. System
C. CPU
D. RPC
Answer» C. CPU
12.

A mount operation includes the :

A. name of the network
B. name of the remote directory to be mounted
C. name of the server machine storing it
D. all of the mentioned
Answer» C. name of the server machine storing it
13.

The mount mechanism ________ a transitive property.

A. exhibits
B. does not exhibit
C. may exhibit
D. none of the mentioned
Answer» C. may exhibit
14.

___________ mounts, is when a file system can be mounted over another file system, that is remotely mounted, not local.

A. recursive
B. cascading
C. trivial
D. none of the mentioned
Answer» C. trivial
15.

The _________ becomes the name of the root of the newly mounted directory.

A. root of the previous directory
B. local directory
C. remote directory itself
D. none of the mentioned
Answer» C. remote directory itself
16.

A _________ directory is mounted over a directory of a _______ file system.

A. local, remote
B. remote, local
C. local, local
D. none of the mentioned
Answer» E.
17.

A machine in Network file system (NFS) can be ________

A. client
B. server
C. both client and server
D. neither client nor server
Answer» D. neither client nor server
18.

All the changes that were done from a transaction that did not commit before the system crashed, have to be _________

A. saved
B. saved and the transaction redone
C. undone
D. none of the mentioned
Answer» D. none of the mentioned
19.

A circular buffer :

A. writes to the end of its space and then continues at the beginning
B. overwrites older values as it goes
C. all of the mentioned
D. none of the mentioned
Answer» B. overwrites older values as it goes
20.

When an entire committed transaction is completed, ___________

A. it is stored in the memory
B. it is removed from the log file
C. it is redone
D. none of the mentioned
Answer» C. it is redone
21.

Once the changes are written to the log, they are considered to be ________

A. committed
B. aborted
C. completed
D. none of the mentioned
Answer» B. aborted
22.

Each set of operations for performing a specific task is a _________

A. program
B. code
C. transaction
D. all of the mentioned
Answer» D. all of the mentioned
23.

A consistency checker __________________ and tries to fix any inconsistencies it finds.

A. compares the data in the secondary storage with the data in the cache
B. compares the data in the directory structure with the data blocks on disk
C. compares the system generated output and user required output
D. all of the mentioned
Answer» C. compares the system generated output and user required output
24.

A systems program such as fsck in ______ is a consistency checker.

A. UNIX
B. Windows
C. Macintosh
D. Solaris
Answer» B. Windows
25.

Some directory information is kept in main memory or cache to ___________

A. fill up the cache
B. increase free space in secondary storage
C. decrease free space in secondary storage
D. speed up access
Answer» E.
26.

With _______ a requested page and several subsequent pages are read and cached.

A. write ahead
B. read ahead
C. free-behind
D. add-front
Answer» C. free-behind
27.

In the optimized technique for sequential access ___________ removes a page from the buffer as soon as the next page is requested.

A. write ahead
B. read ahead
C. free-behind
D. add-front
Answer» D. add-front
28.

A file being read or written sequentially should not have its pages replaced in LRU order, because _____________

A. it is very costly
B. the most recently used page will be used last
C. it is not efficient
D. all of the mentioned
Answer» C. it is not efficient
29.

In ___________ writes, the data is stored in the cache.

A. Asynchronous
B. Regular
C. Synchronous
D. Irregular
Answer» B. Regular
30.

____________ writes occur in the order in which the disk subsystem receives them, and the writes are not buffered.

A. Asynchronous
B. Regular
C. Synchronous
D. Irregular
Answer» D. Irregular
31.

By preallocating the inodes and spreading them across the volume, we ___________ the system performance.

A. improve
B. decrease
C. maintain
D. do not affect
Answer» B. decrease
32.

In UNIX, even an ’empty’ disk has a percentage of its space lost to ______

A. programs
B. inodes
C. virtual memory
D. stacks
Answer» C. virtual memory
33.

_______ tend to represent a major bottleneck in system performance.

A. CPUs
B. Disks
C. Programs
D. I/O
Answer» C. Programs
34.

Consider a disk where blocks 2,3,4,5,8,9,10,11,12,13,17,18,25,26 and 27 are free and the rest of the blocks are allocated. Then the free space bitmap would be :

A. 10000110000001110011111100011111...
B. 110000110000001110011111100011111…
C. 01111001111110001100000011100000…
D. 001111001111110001100000011100000…
Answer» E.
35.

For any type of access, contiguous allocation requires ______ access to get a disk block.

A. only one
B. at least two
C. exactly two
D. none of the mentioned
Answer» B. at least two
36.

The pointer overhead of indexed allocation is generally _________ the pointer overhead of linked allocation.

A. less than
B. equal to
C. greater than
D. keeps varying with
Answer» D. keeps varying with
37.

Indexed allocation _________ direct access.

A. supports
B. does not support
C. is not related to
D. none of the mentioned
Answer» B. does not support
38.

Each _______ has its own index block.

A. partition
B. address
C. file
D. all of the mentioned
Answer» D. all of the mentioned
39.

Contiguous allocation has two problems _________ and _________ that linked allocation solves.

A. external – fragmentation & size – declaration
B. internal – fragmentation & external – fragmentation
C. size – declaration & internal – fragmentation
D. memory – allocation & size – declaration
Answer» B. internal – fragmentation & external – fragmentation
40.

A section of disk at the beginning of each partition is set aside to contain the table in :

A. fat
B. linked allocation
C. hashed allocation
D. indexed allocation
Answer» B. linked allocation
41.

The FAT is used much as a _________

A. stack
B. linked list
C. data
D. pointer
Answer» C. data
42.

If the extents are too large, then the problem that comes in is :

A. internal fragmentation
B. external fragmentation
C. starvation
D. all of the mentioned
Answer» B. external fragmentation
43.

A better way of contiguous allocation to extend the file size is :

A. adding an extent (another chunk of contiguous space)
B. adding an index table to the first contiguous block
C. adding pointers into the first contiguous block
D. none of the mentioned
Answer» B. adding an index table to the first contiguous block
44.

By using FAT, random access time is __________

A. the same
B. increased
C. decreased
D. not affected
Answer» D. not affected
45.

FAT stands for :

A. File Attribute Transport
B. File Allocation Table
C. Fork At Time
D. None of the mentioned
Answer» C. Fork At Time
46.

If a pointer is lost or damaged in a linked allocation :

A. the entire file could get damaged
B. only a part of the file would be affected
C. there would not be any problems
D. none of the mentioned
Answer» B. only a part of the file would be affected
47.

The major disadvantage with linked allocation is that :

A. internal fragmentation
B. external fragmentation
C. there is no sequential access
D. there is only sequential access
Answer» E.
48.

There is no __________ with linked allocation.

A. internal fragmentation
B. external fragmentation
C. starvation
D. all of the mentioned
Answer» C. starvation
49.

In the linked allocation, the directory contains a pointer to the : I. first block II. last block

A. I only
B. II only
C. Both I and II
D. Neither I nor II
Answer» D. Neither I nor II
50.

When in contiguous allocation the space cannot be extended easily :

A. the contents of the file have to be copied to a new space, a larger hole
B. the file gets destroyed
C. the file will get formatted and lost all its data
D. none of the mentioned
Answer» B. the file gets destroyed