File

advertisement
OSA (UNIT-II): MCQ
1. _______ is used as an index to access correct entry in UFDT so as to traverse to
relevant file table and then to correct inode table.
a. File Table
b. Inode Table
c. Page Map Table
d. File Descriptor.
2. _______ maintains information about file/directory such as its owner, access rights,
various creations, usage and amendment dates.
a. Inodes. b. u-area c. kernel stack
d. grafting
3. In UNIX the status of the process may be ?
4.
5.
6.
7.
8.
a. Running
b. orphan
c. sleeping
d. zombie
e. All of above.
Which of the following processes has a PID ‘1’ ?
a. Kernel
b. UNIX
c. Init.
d. shell
The PID of kernel process is?
a. undefined
b. 0
c. 1
d. 3
When a process makes a system call ,its mode changes from
a. User to kernel.
b. kernel to user
c. Restricted to unrestricted
d. Unrestricted to restricted
Mounting a file system results in the loading of
a. Boot block
b. Super block.
c. i-node table
d. All of these
Which of the following information is contained in inode structure
a. The file size
b. The name of the owner of the file
c. The access permissions for the file
d. All the dates of modification since the file’s creation
e. All of above.
1
9. Inode stands for
a. Intermediate node
b. Index node.
c. Internal node
10. Which of the following is “raw” devices
a. Serial port
b. Parallel port
c. Hard disk
d. a & b.
e. a & c
11. which of the following is “block devices”
a. sound cards
b. serial port
c. parallel port
d. none of the above.
12. USB camera is
a. Raw device
b. Block device.
c. Both a & b
d. none
13. which of the following is “block devices”
a. sound cards
b. serial port
c. parallel port
d. hard disk.
14. System call and library interface is
a. The border between user program and kernel.
b. The border between kernel and hardware
c. The border between user program and hardware
d. none
15. System calls that interacts with file subsystem such as
a. Open
b. Retrieve data
c. Close
d. Allocating file space
e. b & d.
16. “stat” system call is used to
a. Change access permissions of a file
b. Change the record of who owns the file
c. Query the attribute of a file.
d. none
17. “chown” system call is used to
a. Change access permissions of a file
b. Change the record of who owns the file.
c. Query the attribute of a file
d. none
2
18. “chmod” system call is used to
a. Change access permissions of a file.
b. Change the record of who owns the file
c. Query the attribute of a file
d. none
19. Buffering mechanism is used by
a. Block I/O.
b. Character I/O
c. Raw I/O
d. Both b & c
20. File system has
a. Life
b. Value
c. Places.
d. none
21. Processes have
a. Value
b. Places
c. Life.
d. none
22. process control subsystem has
a. memory management module
b. scheduler
c. inter-process communication module
d. all of above.
23. Kernel model has
a. 2-levels
b. 4-levels
c. 3-levels.
d. 1-level
24. Memory management module
a. Control the allocation of memory to a process.
b. Allocate the CPU to processes
c. De-allocate CPU from processes
25. Interprocess communication have
a. Asynchronous signaling of events
b. Synchronous transmission of messages between processes.
c. Both a & b.
d. none
26. Scheduler module
a. Control the allocation of memory to a process
b. Allocate the CPU to processes.
c. De-allocate CPU from processes
3
27. Hardware control module is responsible for
a. Handling interrupts
b. Communicating with the machine.
c. Both a & b.
d. none
28. when a user issues open(``/etc/passwd'', ...) the kernel performs
a. Find the inode of the root directory and search the corresponding file for the entry
“etc”
b. When the entry ``etc'' is found, fetch its corresponding inode and check that it is
of type directory
c. Scan the file associated with ``/etc'' looking for ``passwd''
d. Fetch the inode associated with passwd's directory entry, verify that it is a regular
file, and start accessing the file.
e. All of above.
f. None of above
29. A file system has
a. Boot block
b. Super block
c. Inode list
d. Data blocks
e. All of above.
f. None of above
30. File table is
a. Local to kernel
b. Local to file subsystem
c. Global to kernel.
d. Global to file subsystem
31. User File Descriptor table is
a. Local to every process.
b. Global to every process
c. Local to kernel
d. Global to kernel
32. Boot block is present at
a. Before inode list
b. Beginning of file system.
c. After data block
d. After super block
33. Super block is present at
a. Before inode list
b. Beginning of file system
c. After data block
d. After boot block
e. Both a & d.
4
34. Super block describes
a. Initialization of file system
b. State of file system.
c. Both a & b
d. none
35. inode list is used to
a. Access disk files
b. Map the disk files
c. Keeps track of directory structure
d. All of above.
36. Data block
a. Starts at the end of the inode list.
b. Before inode list
c. Beginning of file system
d. Before super block
37. A process is consists of
a. Text (machine code)
b. Data
c. Stack
d. All above.
38. Region table entries describes the attributes of the region, such as
a. whether it contains text or data
b. whether it is shared or private
c. both a & b.
d. none
39. Fields of U Area
a. Pointer to process table entry
b. File descriptors of all open files
c. Current directory and current root
d. I/O parameters
e. Process and file size limit
f. All of above.
40. Process states are
a. The process is running in user mode
b. The process is running in kernel mode
c. The process is not executing, but it is ready to run as soon as the scheduler
chooses it
d. The process is sleeping
e. All.
41. Trap is special instruction, which, when executed, cause an ‘interrupt’ that results in
a. User switch to kernel mode
b. Kernel to user mode
c. A hardware switch to kernel mode.
d. Kernel to hardware mode
5
42. Process in UNIX system can execute in kernel or user mode, it uses
a. User stack
b. Kernel stack
c. Separate stack for each mode.
d. none
43. User stack frame contains
a. Arguments to called function
b. Local variables of called function
c. Address of previous frame
d. Return address to calling function
e. All.
44. Kernel stack contains Stack frames
a. for functions executing in kernel mode.
b. for functions executing in user mode
c. for functions executing in both kernel & user mode
d. none of above
45. which of the following is not a fields of U Area
a. Pointer to process table entry of currently executing process
b. File descriptors of all open files
c. Current directory and current root
d. Inode table pointer.
e. Process and file size limit
46. Process ‘0’ is created by
a. Fork system call
b. System boot code.
c. user
d. none
47. Kernel allows context switch only when
a. Process moves from ‘kernel running’ state to ‘ready’ state
b. Process moves from ‘kernel running’ state to ‘asleep in memory’ state.
c. Process moves from ‘user running’ state to ‘kernel running’ state
d. Process moves from ‘kernel running’ state to ‘user running’ state
48. Which of the following is the data structure of process
a. Process table
b. inode table
c. region table
d. both a & b
e. both a & c.
49. Which of the following data structure used in file handling
a. Region table
b. Process table
c. File descriptor table.
d. Both a &c
50. U-area is used for
a. Process.
c. File handling
b. Both a & c
d. None
6
Download