

MCQOPTIONS
Saved Bookmarks
This section includes 713 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
51. |
Non leaf node of the file system structure is………….. |
A. | leaf node of file |
B. | directory of file |
C. | regular file |
D. | path name |
Answer» C. regular file | |
52. |
Choose the correct answers if the command ls -l /dev/mt0 display'sbrw_rw_ _ _ _ 1 root 3, 0 Apr18 1:05 mt0 |
A. | the \b\ indicates that it is a special file |
B. | mt0 indicates that it is a tape drive |
C. | the \ b\ indicates that data transfer is done in blocks |
D. | all of these |
Answer» E. | |
53. |
Operating System is also called as ………. |
A. | system kernel |
B. | kernel |
C. | both a and b |
D. | none of these |
Answer» D. none of these | |
54. |
Out of 64 system calls in system V how many are frequently used… |
A. | 64 |
B. | 32 |
C. | 16 |
D. | 128 |
Answer» C. 16 | |
55. |
exec system call…….. |
A. | create a new process |
B. | finish executing a process |
C. | control the size of memory allocated to a process |
D. | overlay image of a program onto the running process |
Answer» E. | |
56. |
At run level the system is complelety shut down. |
A. | 4 |
B. | 3 |
C. | 1 |
Answer» E. | |
57. |
When a process creates a new file, the kernel assigns it an ……... |
A. | used inode |
B. | unused inode |
C. | integer number |
D. | file number |
Answer» C. integer number | |
58. |
Permission mode 0666(octal) means………… |
A. | allowing all users acess to file for writing |
B. | allowing all users acess to file for reading |
C. | restrict to read and write |
D. | allowing all users access to file for reading writing |
Answer» E. | |
59. |
What is the output of the following program?b =[ -n $b ]echo $? [ -z $b ]echo $? |
A. | 1 1 |
B. | 2 2 |
C. | 0 0 |
D. | 0 1 |
Answer» D. 0 1 | |
60. |
Schedular module allocate ….. |
A. | processes to cpu |
B. | cpu to processes |
C. | processes to kernel |
D. | none |
Answer» C. processes to kernel | |
61. |
What is the command to set the execute permissions to all the files and subdirectories within the directory/home/user1/direct |
A. | chmod –r +x/home/user1/direct |
B. | chmod –r +x/home/user1/direct |
C. | chmod –f –r +x/home/user1/direct |
D. | chmod –f +x/home/user1/dire ct |
Answer» C. chmod –f –r +x/home/user1/direct | |
62. |
System accounting program acctcom find………. |
A. | variable length record |
B. | fixed length record |
C. | no record |
D. | none of these |
Answer» C. no record | |
63. |
brk system call………… |
A. | synchronize process execution with exit of previously forked process |
B. | control the size of memory allocated to a process |
C. | finish executing a process |
D. | overlay image of a program onto the running process |
Answer» C. finish executing a process | |
64. |
With inode, the kernel contains two data structures…………. |
A. | file table and user file descriptor table |
B. | file system and kernel |
C. | file and semaphore |
D. | none |
Answer» B. file system and kernel | |
65. |
System treats the data in a directory as a…………….. |
A. | byte stream |
B. | bit stream |
C. | stream |
D. | none of these |
Answer» B. bit stream | |
66. |
Permission mode on newly created file will be…… |
A. | 0666(octal) |
B. | 0666(hexadecimal) |
C. | 0999(octal) |
D. | 0798(hex) |
Answer» B. 0666(hexadecimal) | |
67. |
When the read system call encounters EOF,it returns |
A. | some positive integer |
B. | some negative integer |
C. | -1 |
Answer» D. | |
68. |
For the below mentioned codeint main() { int fd;fd = open(“logfile”, O_CREAT|O_RDWR, 0600);lseek(fd, 5, SEEK_CUR);write(fd, “Hello”, 5);return 0;}, |
A. | 5 |
B. | 1024 |
C. | 1029 |
D. | 1034 |
Answer» C. 1029 | |
69. |
interacts with inner part of kernel |
A. | interface |
B. | shell |
C. | terminal |
D. | compiler |
Answer» C. terminal | |
70. |
wait system call………… |
A. | finish executing a process |
B. | control the size of memory allocated to a process |
C. | synchronize process execution with exit of previously forked process |
D. | overlay image of a program onto the running process |
Answer» D. overlay image of a program onto the running process | |
71. |
You want there to be 3 grace days after a password expires before an account becomes disabled. How would you do this? |
A. | use the useradd command with the -f switch |
B. | check the delay option in user admin |
C. | edit the user\s user.config file |
D. | use the useradd command with the -d switch |
Answer» B. check the delay option in user admin | |
72. |
What is the return value ($?) of this code:os = Unix[$osName = UnixName] && exit 2 [${os}Name = UnixName] && exit 3 |
A. | 0 |
B. | 1 |
C. | 2 |
D. | 3 |
Answer» E. | |
73. |
Directories are ……. |
A. | fixed files |
B. | regular files |
C. | variable files |
D. | none of these |
Answer» C. variable files | |
74. |
init’s job after basic system initialization is |
A. | is to take over the system start-up procedure |
B. | complete the system bootstrap process |
C. | both a and b |
D. | none |
Answer» D. none | |
75. |
Services provided by kernel are……… |
A. | controlling execution of process |
B. | scheduling processes |
C. | allocating main memory for an executing process |
D. | all of these |
Answer» E. | |
76. |
Which is the carrect command to list files& folders in unix |
A. | list |
B. | ls |
C. | dir |
D. | list files |
Answer» C. dir | |
77. |
The kernel itself is a program that usually lives in the root partition of the UNIX filesystem. Most Linux distributions call it and it often a symbolic link to the real kernel file which lives in “/boot”. |
A. | /vmlinuz |
B. | /kernel |
C. | /root |
D. | none |
Answer» B. /kernel | |
78. |
Every file in unix has ….. |
A. | two inode |
B. | one inode |
C. | no inode |
D. | none |
Answer» C. no inode | |
79. |
What is the output of the following program? x = 3; y = 5; z = 10;if [( $x -eq 3 ) -a ( $y -eq 5 -o $z -eq 10 )] thenecho $x elseecho $yfi |
A. | 1 |
B. | 3 |
C. | 5 |
D. | error |
Answer» C. 5 | |
80. |
The Newly created files are ………….. of the file system directory structure. |
A. | main nodes |
B. | root nodes |
C. | leaf nodes |
D. | middle nodes |
Answer» D. middle nodes | |
81. |
The following commands gives the output like this #cat file1 file2#cat: file1: No such file or directory helloIf we execute the command “cat file1 file2 1>2 2>&1” the output would be |
A. | cat: file1: no such file or directory hello |
B. | no output is displayed |
C. | cat: 1>2: no such file or directory |
D. | hello |
Answer» C. cat: 1>2: no such file or directory | |
82. |
File discriptor programs uses………………... |
A. | to delete file |
B. | to save file |
C. | for subsequent references for file |
D. | none of these |
Answer» D. none of these | |
83. |
fork system call….. |
A. | control the size of memory allocated to a process |
B. | create a new process |
C. | overlay image of a program onto the running process |
D. | finish executing a process |
Answer» C. overlay image of a program onto the running process | |
84. |
Program such as Shell and editors interact with kernel by invoking ………. |
A. | process |
B. | thread |
C. | system calls |
D. | none of these |
Answer» D. none of these | |
85. |
ode snippets str1=”45678\n” str2=”123\n”f1 = fopen(file1,RDWR,RWX) f2 = fopen(file1,RDWR,RWX) write(f1,str1,len_str1) write(f2,str2,len_str2)o/p: |
A. | 12378 |
B. | 123(newline)8(new line) |
C. | 123(newline)78(ne wline) |
D. | 45678(newline)1 23(newline) |
Answer» C. 123(newline)78(ne wline) | |
86. |
LILO can be installed to either ……..of Linux root partition. |
A. | mbr |
B. | to the boot record |
C. | both a and b |
D. | none |
Answer» D. none | |
87. |
Access permission can be set to ………… |
A. | the file owner |
B. | a file group |
C. | everyone else |
D. | all of these |
Answer» E. | |
88. |
The file subsystem accesses file data using a buffering mechanism that regulates …. |
A. | data flow between the kernel and secondary storage devices. |
B. | data flow between secondary storage devices to kernel |
C. | data flow of kernel |
D. | none |
Answer» B. data flow between secondary storage devices to kernel | |
89. |
script is run for successful login |
A. | /etc/profile |
B. | /etc/str |
C. | /etc/strtms |
D. | /etc/.conf |
Answer» B. /etc/str | |
90. |
The commonly used UNIX commands like date, ls, cat, etc. are stored in……….. |
A. | /dev directory |
B. | /bin and /usr/bin directories |
C. | /tmp directory |
D. | /unix directory |
Answer» C. /tmp directory | |
91. |
The shell acts as an interface between the……….. |
A. | user and kernel |
B. | user and operating system |
C. | kernel and operating system |
D. | none of these |
Answer» B. user and operating system | |
92. |
when the kernel services an intrrupt, it blocks out low priority interrupts but……….. |
A. | services middle priority interrupt |
B. | services higher priority interrupts |
C. | both a and b |
D. | none of these |
Answer» C. both a and b | |
93. |
All system calls return ……..if open or create call fails |
A. | -2 |
B. | 0 |
C. | 1 |
D. | -1 |
Answer» E. | |
94. |
When a process executes a system call, the execution mode of the process changes from ……….. |
A. | kernel mode to user mode |
B. | user mode to kernel mode |
C. | user mode to operating system mode |
D. | none of these |
Answer» C. user mode to operating system mode | |
95. |
The Hardware at centre of UNIX system provides…………. |
A. | basic services |
B. | operating system with basic services |
C. | kernel service |
D. | none of these |
Answer» C. kernel service | |
96. |
Unix system treats devices as a …….. |
A. | hardware |
B. | file |
C. | byte |
D. | none of these |
Answer» C. byte | |
97. |
After the kernel is brought in from disk into main memory, it begins execution and one of the first things it does is ………… |
A. | initialize the system\s kernel |
B. | initialize the system’s hardware. |
C. | initialize the system\s ram |
D. | none |
Answer» C. initialize the system\s ram | |
98. |
Which command is used to locate all the.profile files in the system? |
A. | ls profile |
B. | find /-name profile print |
C. | cd /.profile |
D. | l -u .profile |
Answer» C. cd /.profile | |
99. |
Consider the program main ( ){printf("He arose a victor from\n"); system ("date") ;printf("the dark domain");}If a.out is the executable code corresponding to the above source code, then the command a.out > out f |
A. | redirects the output of date to file out f |
B. | displays the output of date on the screen |
C. | prints everything on the screen |
D. | prints the two messages on the screen |
Answer» B. displays the output of date on the screen | |
100. |
The child process invoke …….to execute program copy . |
A. | fork |
B. | execl |
C. | wait |
D. | printf |
Answer» C. wait | |