Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 713 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

401.

Which command is used to change permissions of files and directories?

A. mv
B. chgrp
C. chmod
D. set
Answer» D. set
402.

Creation of hardlinks that point across partitions

A. is allowed only to root user
B. can be done by all users
C. he effects are unspecified
D. is not allowed
Answer» E.
403.

Deleting a soft-link

A. deletes the destination file
B. deletes both the softlink and the destination file
C. deletes just the softlink
D. backup of the destination is automatically created
Answer» D. backup of the destination is automatically created
404.

If two files on same partition point to the same inode structure they are called

A. soft links
B. hard links
C. alias
D. special files
Answer» C. alias
405.

A user creates a link to a file file1 using the following command “ln file1 file2”. Which of the following is not true?

A. file1 and file2 have the same inode numbers
B. the number of links for file1 is displayed as 1
C. the number of links for file1 is displayed as 2
D. the number of links for file2 is displayed as 2
Answer» C. the number of links for file1 is displayed as 2
406.

How many links are created when we creat a directory file?

A. 1
B. 2
C. 3
D. 4
Answer» C. 3
407.

Which of these is not a command of Unix related with DOS

A. dosdir a:proj
B. doscopy trial a:/
C. doscp/home/pro j/prg a:/
D. dosls
Answer» C. doscp/home/pro j/prg a:/
408.

here are two hard links to the “file1″ say hl and h2 and a softlink sl. What happens if we deleted the “file1″?

A. we will still be able to access the file with hl and h2 but not with sl
B. we will not be able to access the file with hl and h2 but with sl
C. we will be able to access the file with any of hl, h2 and sl
D. we will not be able to access the file with any of hl, h2 and sl
Answer» B. we will not be able to access the file with hl and h2 but with sl
409.

To ascertain what are the contents of the file in your the system the best way would be

A. do a cat command on each file and find its contents
B. use the command cat*
C. use the command file*
D. none of the above
Answer» D. none of the above
410.

To see the last access time of various files in a file system the command is

A. is-iu
B. is-i
C. is-acc
D. is-mt
Answer» B. is-i
411.

The command cal j 1997 would give the output as

A. the calendar of jan,june and july 1997
B. only calendar of jan 1997
C. an error
D. none of the above
Answer» D. none of the above
412.

Which file gets executed when we use the passwd command

A. /etc/passwd
B. /etc/pwd
C. /bin/passwd
D. /passwd
Answer» D. /passwd
413.

The state of the file system is contained in

A. boot block
B. a special block created by book block
C. super block
D. none of the above
Answer» D. none of the above
414.

The program contained in boot block, that loads kernel into memory is called

A. disk bootstrap program
B. master boot program
C. shell program
D. none of the above
Answer» B. master boot program
415.

Each entry in inode table is of size

A. 64 kb
B. 32kb
C. 32 bytes
D. 64 bytes
Answer» E.
416.

To find the block size on your file system the command is

A. blksz
B. szblk
C. chksz
D. cmchk
Answer» E.
417.

The size of any block in the unix file system is

A. 512 bytes
B. 1024 bytes
C. 2048 bytes
D. any of the above
Answer» E.
418.

Which of the following tools can be used to keep track of evolving version of a file?

A. make
B. yacc
C. sccs
D. dv
Answer» D. dv
419.

The first thing that is searched when a command references a file is its

A. i node
B. i node number
C. permission
D. none of the above
Answer» C. permission
420.

Which of the following files contains information related to password aging?

A. shadow
B. profile
C. password
D. all of these
Answer» D. all of these
421.

Which of the following sections of an executable binary file has all uninitialized data items?

A. bss
B. data
C. header
D. symbol
Answer» B. data
422.

Which of the following are character special files?

A. terminal
B. printer
C. modem
D. tape drive
Answer» D. tape drive
423.

To allow only one user to work with a particular file at a particular time ,one has to …..

A. semaphore
B. critical region
C. locking
D. dedicated mode
Answer» D. dedicated mode
424.

An attempt to read from locked file,results in

A. prematured termination
B. a deadlock
C. an indefinite wait
D. none of the above
Answer» E.
425.

Mounting a file system results in the loading of

A. boot block
B. super block
C. i-node table
D. all of these
Answer» C. i-node table
426.

Which of the following is not A system calls?

A. chmod
B. open
C. lseek
D. getc
Answer» E.
427.

If cat x ,prints garbage ,then x is probably a

A. data file
B. binary file
C. text file
D. source file
Answer» C. text file
428.

With inode, the kernel contains two data structures………….

A. file table and user file descriptor table
B. file system and kernel
C. file and semaphore
D. none
Answer» B. file system and kernel
429.

When a process creates a new file, the kernel assigns it an ……...

A. used inode
B. unused inode
C. integer number
D. file number
Answer» C. integer number
430.

Every file in unix has …..

A. two inode
B. one inode
C. no inode
D. none
Answer» C. no inode
431.

inode name is also called……

A. file
B. link
C. file
D. file descriptors
Answer» C. file
432.

The internal representation of a file is given by ……..

A. an inode
B. semaphore
C. pipes
D. none
Answer» B. semaphore
433.

The file subsystem accesses file data using a buffering mechanism that regulates ….

A. data flow between the kernel and secondary storage devices.
B. data flow between secondary storage devices to kernel
C. data flow of kernel
D. none
Answer» B. data flow between secondary storage devices to kernel
434.

Schedular module allocate …..

A. processes to cpu
B. cpu to processes
C. processes to kernel
D. none
Answer» C. processes to kernel
435.

Two policies for managing memory are……………

A. swaping and demand paging
B. semaphore and deadlock
C. scheduling and wait
D. none
Answer» B. semaphore and deadlock
436.

brk system call…………

A. synchronize process execution with exit of previously forked process
B. control the size of memory allocated to a process
C. finish executing a process
D. overlay image of a program onto the running process
Answer» C. finish executing a process
437.

wait system call…………

A. finish executing a process
B. control the size of memory allocated to a process
C. synchronize process execution with exit of previously forked process
D. overlay image of a program onto the running process
Answer» D. overlay image of a program onto the running process
438.

signal system call…………

A. control process response to extraordinary events
B. control the size of memory allocated to a process
C. synchronize process execution with exit of previously forked process
D. overlay image of a program onto the running process
Answer» B. control the size of memory allocated to a process
439.

exec system call……..

A. create a new process
B. finish executing a process
C. control the size of memory allocated to a process
D. overlay image of a program onto the running process
Answer» E.
440.

fork system call…..

A. control the size of memory allocated to a process
B. create a new process
C. overlay image of a program onto the running process
D. finish executing a process
Answer» C. overlay image of a program onto the running process
441.

Which one is best in action between fork() and vfork()?

A. fork()
B. vfork()
C. both
D. none
Answer» C. both
442.

What is stand for IPC?

A. inter procedure communication
B. inter process communication
C. inter part compare
D. none
Answer» C. inter part compare
443.

Which commaand is use for the copy in unix?

A. copy
B. cp
C. cpy
D. none
Answer» C. cpy
444.

Which command is used to terminate the process?

A. wait
B. sleep
C. kill
D. none
Answer» D. none
445.

What is ‘ps’ command for?

A. prints the status
B. prints the process status
C. prints the execution status
D. none
Answer» C. prints the execution status
446.

Which of the following initiates the sequence of events that ultimately allows a user to login?

A. clri
B. sync
C. login
D. init
Answer» E.
447.

Which of the following file names cannot be displayed if la ls* is run?

A. .x
B. ?x
C. both (a) & (b)
D. hidden
Answer» D. hidden
448.

The state of signals are

A. preserved across a fork call
B. not preserved across an exec call
C. preserved across an exec call
D. both (a) & (b)
Answer» E.
449.

The disadvantage of a pipe is that

A. it is a one way communication channel
B. it dies along with the process that created it
C. it can\t he shared by unrelated processes
D. all of these
Answer» E.
450.

No shell script can take input from

A. stdin
B. the output of the previously executed command redirected to it
C. the shell holds the script
D. none of the above
Answer» E.