MCQOPTIONS
Saved Bookmarks
This section includes 713 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 401. |
Which command is used to change permissions of files and directories? |
| A. | mv |
| B. | chgrp |
| C. | chmod |
| D. | set |
| Answer» D. set | |
| 402. |
Creation of hardlinks that point across partitions |
| A. | is allowed only to root user |
| B. | can be done by all users |
| C. | he effects are unspecified |
| D. | is not allowed |
| Answer» E. | |
| 403. |
Deleting a soft-link |
| A. | deletes the destination file |
| B. | deletes both the softlink and the destination file |
| C. | deletes just the softlink |
| D. | backup of the destination is automatically created |
| Answer» D. backup of the destination is automatically created | |
| 404. |
If two files on same partition point to the same inode structure they are called |
| A. | soft links |
| B. | hard links |
| C. | alias |
| D. | special files |
| Answer» C. alias | |
| 405. |
A user creates a link to a file file1 using the following command “ln file1 file2â€. Which of the following is not true? |
| A. | file1 and file2 have the same inode numbers |
| B. | the number of links for file1 is displayed as 1 |
| C. | the number of links for file1 is displayed as 2 |
| D. | the number of links for file2 is displayed as 2 |
| Answer» C. the number of links for file1 is displayed as 2 | |
| 406. |
How many links are created when we creat a directory file? |
| A. | 1 |
| B. | 2 |
| C. | 3 |
| D. | 4 |
| Answer» C. 3 | |
| 407. |
Which of these is not a command of Unix related with DOS |
| A. | dosdir a:proj |
| B. | doscopy trial a:/ |
| C. | doscp/home/pro j/prg a:/ |
| D. | dosls |
| Answer» C. doscp/home/pro j/prg a:/ | |
| 408. |
here are two hard links to the “file1″ say hl and h2 and a softlink sl. What happens if we deleted the “file1″? |
| A. | we will still be able to access the file with hl and h2 but not with sl |
| B. | we will not be able to access the file with hl and h2 but with sl |
| C. | we will be able to access the file with any of hl, h2 and sl |
| D. | we will not be able to access the file with any of hl, h2 and sl |
| Answer» B. we will not be able to access the file with hl and h2 but with sl | |
| 409. |
To ascertain what are the contents of the file in your the system the best way would be |
| A. | do a cat command on each file and find its contents |
| B. | use the command cat* |
| C. | use the command file* |
| D. | none of the above |
| Answer» D. none of the above | |
| 410. |
To see the last access time of various files in a file system the command is |
| A. | is-iu |
| B. | is-i |
| C. | is-acc |
| D. | is-mt |
| Answer» B. is-i | |
| 411. |
The command cal j 1997 would give the output as |
| A. | the calendar of jan,june and july 1997 |
| B. | only calendar of jan 1997 |
| C. | an error |
| D. | none of the above |
| Answer» D. none of the above | |
| 412. |
Which file gets executed when we use the passwd command |
| A. | /etc/passwd |
| B. | /etc/pwd |
| C. | /bin/passwd |
| D. | /passwd |
| Answer» D. /passwd | |
| 413. |
The state of the file system is contained in |
| A. | boot block |
| B. | a special block created by book block |
| C. | super block |
| D. | none of the above |
| Answer» D. none of the above | |
| 414. |
The program contained in boot block, that loads kernel into memory is called |
| A. | disk bootstrap program |
| B. | master boot program |
| C. | shell program |
| D. | none of the above |
| Answer» B. master boot program | |
| 415. |
Each entry in inode table is of size |
| A. | 64 kb |
| B. | 32kb |
| C. | 32 bytes |
| D. | 64 bytes |
| Answer» E. | |
| 416. |
To find the block size on your file system the command is |
| A. | blksz |
| B. | szblk |
| C. | chksz |
| D. | cmchk |
| Answer» E. | |
| 417. |
The size of any block in the unix file system is |
| A. | 512 bytes |
| B. | 1024 bytes |
| C. | 2048 bytes |
| D. | any of the above |
| Answer» E. | |
| 418. |
Which of the following tools can be used to keep track of evolving version of a file? |
| A. | make |
| B. | yacc |
| C. | sccs |
| D. | dv |
| Answer» D. dv | |
| 419. |
The first thing that is searched when a command references a file is its |
| A. | i node |
| B. | i node number |
| C. | permission |
| D. | none of the above |
| Answer» C. permission | |
| 420. |
Which of the following files contains information related to password aging? |
| A. | shadow |
| B. | profile |
| C. | password |
| D. | all of these |
| Answer» D. all of these | |
| 421. |
Which of the following sections of an executable binary file has all uninitialized data items? |
| A. | bss |
| B. | data |
| C. | header |
| D. | symbol |
| Answer» B. data | |
| 422. |
Which of the following are character special files? |
| A. | terminal |
| B. | printer |
| C. | modem |
| D. | tape drive |
| Answer» D. tape drive | |
| 423. |
To allow only one user to work with a particular file at a particular time ,one has to ….. |
| A. | semaphore |
| B. | critical region |
| C. | locking |
| D. | dedicated mode |
| Answer» D. dedicated mode | |
| 424. |
An attempt to read from locked file,results in |
| A. | prematured termination |
| B. | a deadlock |
| C. | an indefinite wait |
| D. | none of the above |
| Answer» E. | |
| 425. |
Mounting a file system results in the loading of |
| A. | boot block |
| B. | super block |
| C. | i-node table |
| D. | all of these |
| Answer» C. i-node table | |
| 426. |
Which of the following is not A system calls? |
| A. | chmod |
| B. | open |
| C. | lseek |
| D. | getc |
| Answer» E. | |
| 427. |
If cat x ,prints garbage ,then x is probably a |
| A. | data file |
| B. | binary file |
| C. | text file |
| D. | source file |
| Answer» C. text file | |
| 428. |
With inode, the kernel contains two data structures…………. |
| A. | file table and user file descriptor table |
| B. | file system and kernel |
| C. | file and semaphore |
| D. | none |
| Answer» B. file system and kernel | |
| 429. |
When a process creates a new file, the kernel assigns it an ……... |
| A. | used inode |
| B. | unused inode |
| C. | integer number |
| D. | file number |
| Answer» C. integer number | |
| 430. |
Every file in unix has ….. |
| A. | two inode |
| B. | one inode |
| C. | no inode |
| D. | none |
| Answer» C. no inode | |
| 431. |
inode name is also called…… |
| A. | file |
| B. | link |
| C. | file |
| D. | file descriptors |
| Answer» C. file | |
| 432. |
The internal representation of a file is given by …….. |
| A. | an inode |
| B. | semaphore |
| C. | pipes |
| D. | none |
| Answer» B. semaphore | |
| 433. |
The file subsystem accesses file data using a buffering mechanism that regulates …. |
| A. | data flow between the kernel and secondary storage devices. |
| B. | data flow between secondary storage devices to kernel |
| C. | data flow of kernel |
| D. | none |
| Answer» B. data flow between secondary storage devices to kernel | |
| 434. |
Schedular module allocate ….. |
| A. | processes to cpu |
| B. | cpu to processes |
| C. | processes to kernel |
| D. | none |
| Answer» C. processes to kernel | |
| 435. |
Two policies for managing memory are…………… |
| A. | swaping and demand paging |
| B. | semaphore and deadlock |
| C. | scheduling and wait |
| D. | none |
| Answer» B. semaphore and deadlock | |
| 436. |
brk system call………… |
| A. | synchronize process execution with exit of previously forked process |
| B. | control the size of memory allocated to a process |
| C. | finish executing a process |
| D. | overlay image of a program onto the running process |
| Answer» C. finish executing a process | |
| 437. |
wait system call………… |
| A. | finish executing a process |
| B. | control the size of memory allocated to a process |
| C. | synchronize process execution with exit of previously forked process |
| D. | overlay image of a program onto the running process |
| Answer» D. overlay image of a program onto the running process | |
| 438. |
signal system call………… |
| A. | control process response to extraordinary events |
| B. | control the size of memory allocated to a process |
| C. | synchronize process execution with exit of previously forked process |
| D. | overlay image of a program onto the running process |
| Answer» B. control the size of memory allocated to a process | |
| 439. |
exec system call…….. |
| A. | create a new process |
| B. | finish executing a process |
| C. | control the size of memory allocated to a process |
| D. | overlay image of a program onto the running process |
| Answer» E. | |
| 440. |
fork system call….. |
| A. | control the size of memory allocated to a process |
| B. | create a new process |
| C. | overlay image of a program onto the running process |
| D. | finish executing a process |
| Answer» C. overlay image of a program onto the running process | |
| 441. |
Which one is best in action between fork() and vfork()? |
| A. | fork() |
| B. | vfork() |
| C. | both |
| D. | none |
| Answer» C. both | |
| 442. |
What is stand for IPC? |
| A. | inter procedure communication |
| B. | inter process communication |
| C. | inter part compare |
| D. | none |
| Answer» C. inter part compare | |
| 443. |
Which commaand is use for the copy in unix? |
| A. | copy |
| B. | cp |
| C. | cpy |
| D. | none |
| Answer» C. cpy | |
| 444. |
Which command is used to terminate the process? |
| A. | wait |
| B. | sleep |
| C. | kill |
| D. | none |
| Answer» D. none | |
| 445. |
What is ‘ps’ command for? |
| A. | prints the status |
| B. | prints the process status |
| C. | prints the execution status |
| D. | none |
| Answer» C. prints the execution status | |
| 446. |
Which of the following initiates the sequence of events that ultimately allows a user to login? |
| A. | clri |
| B. | sync |
| C. | login |
| D. | init |
| Answer» E. | |
| 447. |
Which of the following file names cannot be displayed if la ls* is run? |
| A. | .x |
| B. | ?x |
| C. | both (a) & (b) |
| D. | hidden |
| Answer» D. hidden | |
| 448. |
The state of signals are |
| A. | preserved across a fork call |
| B. | not preserved across an exec call |
| C. | preserved across an exec call |
| D. | both (a) & (b) |
| Answer» E. | |
| 449. |
The disadvantage of a pipe is that |
| A. | it is a one way communication channel |
| B. | it dies along with the process that created it |
| C. | it can\t he shared by unrelated processes |
| D. | all of these |
| Answer» E. | |
| 450. |
No shell script can take input from |
| A. | stdin |
| B. | the output of the previously executed command redirected to it |
| C. | the shell holds the script |
| D. | none of the above |
| Answer» E. | |