File System Implementation
File System Implementation
A ___________ contains information about the file, including ownership, permissions, and location of the file
contents.
b. File
c. Device drivers
d. File system
2. Which of the following is crucial time while accessing data on the disk?
a. Seek time
b. Rotational time
c. Transmission time
d. Waiting time
Answer: (a).Seek time
3. The time taken by the disk arm to locate the specific address of a sector for getting information is called
__________.
a. Rotational Latency
b. Seek Time
c. Search Time
d. Response Time
a. FAT16
b. FAT32
c. NTFS
d. LMFS
Answer: (b).FAT32
a. SCAN
b. SSTF
c. FCFS
d. LIFO
Answer: (b).SSTF
6. In the ___________ method of data transfer, the participation of the processor is eliminated during data transfer.
a. Buffering
b. Caching
7. Data reside in file on disk under DOS environment, which of the following file name is invalid ?
a. OSCONCEPTS.doc
b. RAW
c. COMPAQ.BOOK
d. JUMPSTART.BOS
Answer: (c).COMPAQ.BOOK
8. The time taken to bring the desired track/cylinder under the head is _________.
a. Seek time
b. Latency time
c. Transfer time
d. Read time
Answer: (a).Seek time
9. If the Disk head is located initially at 32, find the number of disk moves required with FCFS if the disk queue of
I/O blocks requests are 98,37,14,124,65,67.
a. 310
b. 324
c. 315
d. 321
Answer: (d).321
10. The solution to Critical Section Problem is : Mutual Exclusion, Progress and Bounded Waiting.
12. If the disk head is located initially at 32, find the number of disk moves required with FCFS if the disk queue of
I/O blocks requests are 98, 37, 14, 124, 65, 70.
a. 320
b. 321
c. 324
Answer: (c).324
13. A machine has a physical memory of 64 Mbyte and a virtual address space of 32 - bit. The page size is 4kbyte,
What is the approximate size of the page table?
a. 24 Mbyte
b. 16 Mbyte
c. 2 Mbyte
d. 8 Mbyte
Answer: (c).2 Mbyte
14. We have a CPU that generates virtual addresses of 32 bits and the page size
is of 4 kbyte. Transition Lookaside Buffer ( TLB ) of the processor can hold a
total of 128 page table entries and 4 - way set associative. What is the
minimum size of the TLB tag?
a. 16 bit
b. 20 bit
c. 11 bit
d. 15 bit
Answer: (d).15 bit
15. An application loads 100 libraries at startup and loading each library exactly one disk access is
required. 10ms is the seek time of the disk to a random location and 6000rpm is the rotational
speed of the disk. Neglect the time to transfer data from the disk block once the head has been
positioned at the start of the block. What will be the time taken by the application to load all the
libraries, if all 100 libraries are loaded from random location on the disk?
a. 1.50s
b. 1.00s
c. 1.87s
d. 0.74s
Answer: (a).1.50s
16. In a virtual memory environment the minimum number of page frames that must be allocated to
a running process is determined by ___________________.
a. Shortest-Seek-time-first scheduling
b. small – small-time-first
c. simple-seek-time-first
d. small-simple-time-first
Answer: (a).Shortest-Seek-time-first scheduling
18. The total time to prepare a disk drive mechanism for a block of data to be read from is its
a. latency
19. ________ is the time required by a sector to reach below read/write head.
a. Seek Time
b. Latency Time
c. Access time
20. The methods or algorithms which are used to increase the performance of
disk storage subsystem is called .............
a. Disk performing
b. Disk scheduling
c. Disk storing
d. Disk extending
Answer: (b).Disk scheduling
a. SCAN
b. C-SCAN
c. N-Step SCAN
d. Both a and b
Answer: (b).C-SCAN
22. ............... policy selects the disk I/O request that requires the least movement of the disk arm
from its current position.
a. FSCAN
b. SSTF
c. SCAN
d. C-SCAN
Answer: (b).SSTF
a. I only
b. II only
c. Both I and II
d. Neither I nor II
Answer: (c).Both I and II
24. ______ is a unique tag, usually a number, identifies the file within the file
system.
a. File identifier
b. File name
c. File type
Answer: (a).File identifier
c. allocate the space in file system & make an entry for new file in directory
Answer: (c).allocate the space in file system & make an entry for new file in directory
26. By using the specific system call, we can
a. file name
b. file extension
c. file identifier
Answer: (b).file extension
28. Which file is a sequence of bytes organized into blocks understandable by the system’s linker?
a. object file
b. source file
c. executable file
d. text file
Answer: (a).object file
a. crating of a filesystem
b. deleting a filesystem
a. file metadata
b. page table
c. virtual memory
d. file system
Answer: (a).file metadata
31. Mapping of network file system protocol to local file system is done by
c. volume manager
d. remote mirror
a. file-organisation module
d. application programs
a. file ownership
b. file permissions
a. mount table
c. file-organisation module
b. empty disk
a. mount table
b. hash table
c. file table
d. process table
Answer: (b).hash table
41. In which type of allocation method each file occupy a set of contiguous block on the disk?
a. contiguous allocation
b. dynamic-storage allocation
c. linked allocation
d. indexed allocation
Answer: (a).contiguous allocation
42. If the block of free-space list is free then bit will
a. 1
b. 0
c. any of 0 or 1
Answer: (a).1
43. Which protocol establishes the initial logical connection between a server and a client?
c. mount protocol
Answer: (c).mount protocol
44. Data cannot be written to secondary storage unless written within a ______
a. file
b. swap space
c. directory
d. text format
Answer: (a).file
a. name
b. type
c. identifier
a. swap space
b. operating system
a. abstract
b. primitive
c. public
d. private
Answer: (a).abstract
48. The operating system keeps a small table containing information about all open files called :
a. system table
b. open-file table
c. file table
d. directory table
Answer: (b).open-file table
b. access dates
c. file size
51. The open file table has a/an _______ associated with each file.
a. file content
b. file permission
c. open count
d. close count
Answer: (c).open count
52. The file name is generally split into two parts :
53. The UNIX sytem uses a/an ________ stored at the beginning of a some files to indicate roughly the type of file.
a. identifier
b. extension
c. virtual number
d. magic number
Answer: (d).magic number
54. The larger the block size, the ______ the internal fragmentation.
a. greater
b. lesser
c. same
Answer: (a).greater
a. works well
Answer: (a).works well
57. The direct access method is based on a ______ model of a file, as _____ allow random access to any file block.
b. tape, tapes
c. disk, disks
Answer: (c).disk, disks
58. For a direct access file :
61. For large files, when the index itself becomes too large to be kept in memory :
a. index is called
a. CPUs
b. Disks
c. Programs
d. I/O
Answer: (b).Disks
63. In UNIX, even an ’empty’ disk has a percentage of its space lost to ______
a. programs
b. inodes
c. virtual memory
d. stacks
Answer: (b).inodes
64. By preallocating the inodes and spreading them across the volume, we ___________ the system performance.
a. improve
b. decrease
c. maintain
d. do not affect
Answer: (a).improve
65. ____________ writes occur in the order in which the disk subsystem receives them, and the writes are not
buffered.
a. Asynchronous
b. Regular
c. Synchronous
d. Irregular
View Answer Report Discuss Too Difficult!
Answer: (c).Synchronous
a. Asynchronous
b. Regular
c. Synchronous
d. Irregular
67. A file being read or written sequentially should not have its pages replaced in LRU order, because _____________
a. it is very costly
c. it is not efficient
68. In the optimized technique for sequential access ___________ removes a page from the buffer as soon as the next
page is requested.
a. write ahead
b. read ahead
c. free-behind
d. add-front
Answer: (c).free-behind
69. With _______ a requested page and several subsequent pages are read and cached.
a. write ahead
b. read ahead
c. free-behind
d. add-front
Answer: (b).read ahead
d. speed up access
Answer: (d).speed up access
a. UNIX
b. Windows
c. Macintosh
d. Solaris
Answer: (a).UNIX
72. A consistency checker __________________ and tries to fix any inconsistencies it finds.
a. compares the data in the secondary storage with the data in the cache
b. compares the data in the directory structure with the data blocks on disk
c. compares the system generated output and user required output
Answer: (b).compares the data in the directory structure with the data blocks on disk
a. program
b. code
c. transaction
Answer: (c).transaction
74. Once the changes are written to the log, they are considered to be ________
a. committed
b. aborted
c. completed
Answer: (a).committed
c. it is redone
Answer: (a).writes to the end of its space and then continues at the beginning
77. All the changes that were done from a transaction that did not commit before the system crashed, have to be
_________
a. saved
c. undone
Answer: (c).undone
a. client
b. server
79. The _________ becomes the name of the root of the newly mounted directory.
b. local directory
Answer: (b).local directory
80. ___________ mounts, is when a file system can be mounted over another file system, that is remotely mounted,
not local.
a. recursive
b. cascading
c. trivial
d. none of the mentioned
Answer: (b).cascading
a. exhibits
c. may exhibit
83. The mount request is mapped to the corresponding _____ and is forwarded to the mount server running on the
specific server machine.
a. IPC
b. System
c. CPU
d. RPC
Answer: (b).System
84. The server maintains a/an ________ that specifies local file systems that it exports for mounting, along with
names of machines that are permitted to mount them.
a. export list
b. import list
c. sending list
d. receiving list
Answer: (a).export list
c. maybe stateless
Answer: (a).are stateless
87. Every NFS request has a _________ allowing the server to determine if a
request is duplicated or if any are missing.
a. name
b. transaction
c. sequence number
Answer: (c).sequence number
a. be visible
b. affect
c. be invisible
d. harm
Answer: (c).be invisible
b. asynchronously
c. index-wise
Answer: (a).synchronously
a. can be atomic
b. is atomic
c. is non atomic
Answer: (b).is atomic
c. may provide
92. _______________ in NFS involves the parsing of a path name into seperate directory entries – or components.
a. Path parse
b. a single NFS lookup call is used beginning from the last component
94. When a client has a cascading mount, _______ server(s) is/are involved in a path name traversal.
a. atleast one
95. A disk scheduling algorithm in an operating system causes the disk arm to
move back and forth across the disk surface in order to service all requests
in its path. This is a
c. Scan
d. FIFO
View Answer Report Discuss Too Difficult!
Answer: (c).Scan
96. The working set theory of programming behaviour of processes running within an operating system involves
98. The computational technique used to compute the disk storage address of individual records is called:
a. bubble memory
b. key fielding
c. dynamic reallocation
d. hashing
Answer: (d).hashing
a. to provide complete file naming freedom to the users and to permit controlled sharing of files
b. to provide for long and short term storage of files with appropriate economic tradeoffs.
c. to provide security against loss of information due to system failure
100
The total time to prepare a disk drive mechanism for a block of data to be read from it is
.
a. latency
101
Which of the following filename extension suggests that the file is a backup copy of another file?
.
a. TXT
b. COM
c. BAS
d. BAK
Answer: (d).BAK