Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

51.

During compaction time, other normal system operations _______ be permitted.(a) can(b) cannot(c) is(d) none of the mentionedI have been asked this question in exam.My doubt is from File System Implementation topic in division File Systems and their Implementation of Operating System

Answer» RIGHT ANSWER is (B) cannot

Easiest EXPLANATION - NONE.
52.

For processes to request access to file contents, they need _____________(a) to run a seperate program(b) special interrupts(c) to implement the open and close system calls(d) none of the mentionedI had been asked this question in examination.I'm obligated to ask this question of File System Implementation in portion File Systems and their Implementation of Operating System

Answer»

Correct OPTION is (C) to implement the open and close SYSTEM calls

The BEST I can explain: None.

53.

For each file there exists a ___________ that contains information about the file, including ownership, permissions and location of the file contents.(a) metadata(b) file control block(c) process control block(d) all of the mentionedThe question was posed to me in an interview.My question is based upon File System Implementation topic in section File Systems and their Implementation of Operating System

Answer»

Correct OPTION is (b) FILE CONTROL block

The explanation is: NONE.

54.

Metadata includes _____________(a) all of the file system structure(b) contents of files(c) both file system structure and contents of files(d) none of the mentionedI had been asked this question in homework.This intriguing question comes from File System Implementation in section File Systems and their Implementation of Operating System

Answer»

The correct ANSWER is (c) both file system STRUCTURE and CONTENTS of files

The best EXPLANATION: None.

55.

The file organization module knows about _____________(a) files(b) logical blocks of files(c) physical blocks of files(d) all of the mentionedThis question was posed to me in homework.My question is based upon File System Implementation in chapter File Systems and their Implementation of Operating System

Answer»

The CORRECT CHOICE is (d) all of the mentioned

Best EXPLANATION: NONE.

56.

A device driver can be thought of like a translator. Its input consists of _____ commands and output consists of _______ instructions.(a) high level, low level(b) low level, high level(c) complex, simple(d) low level, complexI got this question in an interview.I'd like to ask this question from File System Implementation topic in section File Systems and their Implementation of Operating System

Answer»

The correct choice is (a) high LEVEL, LOW level

The best I can EXPLAIN: NONE.

57.

If too little space is allocated to a file _____________(a) the file will not work(b) there will not be any space for the data, as the FCB takes it all(c) the file cannot be extended(d) the file cannot be openedThis question was addressed to me in exam.Enquiry is from File System Implementation topic in portion File Systems and their Implementation of Operating System

Answer»

The CORRECT ANSWER is (C) the file cannot be extended

For explanation: NONE.

58.

To solve the problem of external fragmentation ________ needs to be done periodically.(a) compaction(b) check(c) formatting(d) replacing memoryI have been asked this question during an interview for a job.I'd like to ask this question from File System Implementation in portion File Systems and their Implementation of Operating System

Answer»

The CORRECT CHOICE is (a) compaction

Explanation: NONE.

59.

The first fit and best fit algorithms suffer from _____________(a) internal fragmentation(b) external fragmentation(c) starvation(d) all of the mentionedThis question was posed to me by my college director while I was bunking the class.I need to ask this question from File System Implementation topic in chapter File Systems and their Implementation of Operating System

Answer»

Correct CHOICE is (b) EXTERNAL fragmentation

Best explanation: NONE.

60.

_______ and ________ are the most common strategies used to select a free hole from the set of available holes.(a) First fit, Best fit(b) Worst fit, First fit(c) Best fit, Worst fit(d) None of the mentionedI had been asked this question in semester exam.I'd like to ask this question from File System Implementation topic in section File Systems and their Implementation of Operating System

Answer»

The correct CHOICE is (a) FIRST fit, Best fit

The EXPLANATION: None.

61.

One difficulty of contiguous allocation is _____________(a) finding space for a new file(b) inefficient(c) costly(d) time takingI have been asked this question during an online interview.This is a very interesting question from File System Implementation topic in section File Systems and their Implementation of Operating System

Answer»

The correct OPTION is (a) finding space for a NEW file

The BEST EXPLANATION: None.

62.

Contiguous allocation of a file is defined by _____________(a) disk address of the first block & length(b) length & size of the block(c) size of the block(d) total size of the fileThe question was posed to me during an interview.My doubt stems from File System Implementation topic in section File Systems and their Implementation of Operating System

Answer»

Correct option is (a) DISK address of the first BLOCK & length

Easy EXPLANATION - NONE.

63.

What is the real disadvantage of a linear list of directory entries?(a) size of the linear list in memory(b) linear search to find a file(c) it is not reliable(d) all of the mentionedThe question was posed to me by my school teacher while I was bunking the class.My question is from File System Implementation in portion File Systems and their Implementation of Operating System

Answer»

The correct answer is (B) LINEAR search to find a file

The EXPLANATION: NONE.

64.

The VFS (virtual file system) activates file system specific operations to handle local requests according to their _______(a) size(b) commands(c) timings(d) file system typesI had been asked this question in an interview for job.My question is based upon File System Implementation topic in section File Systems and their Implementation of Operating System

Answer»

The correct CHOICE is (d) file system types

The BEST I can EXPLAIN: None.

65.

On systems where there are multiple operating system, the decision to load a particular one is done by _____________(a) boot loader(b) bootstrap(c) process control block(d) file control blockThe question was asked in unit test.My doubt stems from File System Implementation topic in division File Systems and their Implementation of Operating System

Answer»

The CORRECT answer is (a) boot loader

The best I can explain: NONE.

66.

In indexed allocation _____________(a) each file must occupy a set of contiguous blocks on the disk(b) each file is a linked list of disk blocks(c) all the pointers to scattered blocks are placed together in one location(d) none of the mentionedThis question was posed to me during an online interview.My doubt is from File System Implementation topic in division File Systems and their Implementation of Operating System

Answer» CORRECT choice is (C) all the pointers to SCATTERED blocks are placed together in one location

To explain: None.
67.

In linked allocation _____________(a) each file must occupy a set of contiguous blocks on the disk(b) each file is a linked list of disk blocks(c) all the pointers to scattered blocks are placed together in one location(d) none of the mentionedThis question was addressed to me in semester exam.My question is taken from File System Implementation topic in chapter File Systems and their Implementation of Operating System

Answer» RIGHT CHOICE is (b) each FILE is a LINKED LIST of disk blocks

Explanation: None.
68.

In contiguous allocation _____________(a) each file must occupy a set of contiguous blocks on the disk(b) each file is a linked list of disk blocks(c) all the pointers to scattered blocks are placed together in one location(d) none of the mentionedThe question was posed to me during a job interview.Asked question is from File System Implementation topic in chapter File Systems and their Implementation of Operating System

Answer» CORRECT option is (a) each file must occupy a SET of contiguous blocks on the disk

The BEST I can explain: NONE.
69.

The three major methods of allocating disk space that are in wide use are _____________(a) contiguous(b) linked(c) indexed(d) all of the mentionedThe question was posed to me in homework.I'm obligated to ask this question of File System Implementation in portion File Systems and their Implementation of Operating System

Answer» RIGHT OPTION is (d) all of the mentioned

The BEST EXPLANATION: NONE.
70.

Disks are segmented into one or more partitions, each containing a file system or ______(a) left ‘raw’(b) made into swap space(c) made into backup space(d) left ‘ripe’I got this question during an internship interview.I would like to ask this question from File System Interface Protection topic in section File Systems and their Implementation of Operating System

Answer» CORRECT option is (a) LEFT ‘raw’

EXPLANATION: None.
71.

In UNIX, the directory protection is handled _________ to the file protection.(a) different(b) similar(c) it is not handled at all(d) none of the mentionedI had been asked this question during an online exam.I'm obligated to ask this question of File System Interface Protection in chapter File Systems and their Implementation of Operating System

Answer» RIGHT OPTION is (B) similar

The EXPLANATION is: NONE.
72.

What will happen in a multi level directory structure?(a) the same previous techniques will be used as in the other structures(b) a mechanism for directory protection will have to applied(c) the subdirectories do not need protection once the directory is protected(d) none of the mentionedThe question was asked in a job interview.This question is from File System Interface Protection in chapter File Systems and their Implementation of Operating System

Answer»

Right CHOICE is (b) a mechanism for DIRECTORY protection will have to applied

Best explanation: NONE.

73.

If each access to a file is controlled by a password, then what is the disadvantage?(a) user will need to remember a lot of passwords(b) it is not reliable(c) it is not efficient(d) all of the mentionedI got this question in an online quiz.Origin of the question is File System Interface Protection in division File Systems and their Implementation of Operating System

Answer»

Right answer is (a) USER will NEED to remember a LOT of passwords

Easiest explanation - NONE.

74.

To control access the three bits used in UNIX are represented by _____________(a) r(b) w(c) x(d) all of the mentionedThis question was posed to me in an online quiz.The query is from File System Interface Protection in portion File Systems and their Implementation of Operating System

Answer» RIGHT OPTION is (d) all of the mentioned

The BEST EXPLANATION: NONE.
75.

In UNIX, groups can be created and modified by?(a) superuser(b) any user(c) a programmer only(d) the people in the group onlyI had been asked this question by my school principal while I was bunking the class.I want to ask this question from File System Interface Protection topic in portion File Systems and their Implementation of Operating System

Answer» CORRECT CHOICE is (a) superuser

The BEST EXPLANATION: NONE.
76.

Universe consists of _____________(a) all users that aren’t included in the group or owners(b) all users that are not owners(c) all users in the system(d) none of the mentionedThe question was posed to me in an interview for internship.Origin of the question is File System Interface Protection in chapter File Systems and their Implementation of Operating System

Answer»

The correct answer is (C) all users in the system

The EXPLANATION is: NONE.

77.

All users in a group get _______ access to a file.(a) different(b) similar(c) same(d) none of the mentionedThe question was asked during an interview.The origin of the question is File System Interface Protection in chapter File Systems and their Implementation of Operating System

Answer» CORRECT ANSWER is (B) similar

Explanation: NONE.
78.

Many systems recognize three classifications of users in connection with each file (to condense the access control list).(a) Owner(b) Group(c) Universe(d) All of the mentionedThis question was addressed to me in my homework.My query is from File System Interface Protection in division File Systems and their Implementation of Operating System

Answer» CORRECT ANSWER is (d) All of the mentioned

Explanation: NONE.
79.

What is the main problem with access control lists?(a) their maintenance(b) their length(c) their permissions(d) all of the mentionedThis question was posed to me in an online interview.This intriguing question comes from File System Interface Protection in division File Systems and their Implementation of Operating System

Answer»

The CORRECT CHOICE is (b) their length

The best I can EXPLAIN: None.

80.

Protection is only provided at the _____ level.(a) lower(b) central(c) higher(d) none of the mentionedThis question was addressed to me in a national level competition.This intriguing question comes from File System Interface Protection topic in section File Systems and their Implementation of Operating System

Answer» RIGHT CHOICE is (a) lower

Easiest EXPLANATION - NONE.
81.

Reliability of files can be increased by _____________(a) keeping the files safely in the memory(b) making a different partition for the files(c) by keeping them in external storage(d) by keeping duplicate copies of the fileThis question was addressed to me in final exam.My enquiry is from File System Interface Protection in chapter File Systems and their Implementation of Operating System

Answer»

The correct answer is (d) by KEEPING duplicate COPIES of the file

For EXPLANATION: None.

82.

The series of accesses between the open and close operations is a _____________(a) transaction(b) procedure(c) program(d) file sessionThe question was posed to me during an online interview.Origin of the question is File System Interface Mounting and Sharing topic in portion File Systems and their Implementation of Operating System

Answer» CORRECT CHOICE is (d) FILE session

Easy EXPLANATION - NONE.
83.

To recover from failures in the network operations _____________ information may be maintained.(a) ip address(b) state(c) stateless(d) operating systemThe question was asked in an interview.The origin of the question is File System Interface Mounting and Sharing in chapter File Systems and their Implementation of Operating System

Answer»

The CORRECT CHOICE is (B) state

The EXPLANATION is: NONE.

84.

Domain name system provides _____________(a) host-name-to-network-address translations for the entire internet(b) network-address-to-host-name translations for the entire internet(c) binary to hex translations for the entire internet(d) all of the mentionedThis question was posed to me in an online quiz.I need to ask this question from File System Interface Mounting and Sharing topic in portion File Systems and their Implementation of Operating System

Answer»

The correct ANSWER is (a) host-name-to-network-address TRANSLATIONS for the ENTIRE internet

To explain I WOULD say: NONE.

85.

Distributed naming services/Distributed information systems have been devised to _____________(a) provide information about all the systems(b) provide unified access to the information needed for remote computing(c) provide unique names to all systems in a network(d) all of the mentionedThis question was posed to me in a job interview.Enquiry is from File System Interface Mounting and Sharing in division File Systems and their Implementation of Operating System

Answer» RIGHT option is (b) provide UNIFIED access to the INFORMATION NEEDED for remote computing

Best explanation: None.
86.

The machine containing the files is the _______ and the machine wanting to access the files is the ______(a) master, slave(b) memory, user(c) server, client(d) none of the mentionedThis question was addressed to me in exam.Enquiry is from File System Interface Mounting and Sharing in chapter File Systems and their Implementation of Operating System

Answer»

The CORRECT choice is (c) server, client

Easiest EXPLANATION - NONE.

87.

Anonymous access allows a user to transfer files _____________(a) without having an account on the remote system(b) only if he accesses the system with a guest account(c) only if he has an account on the remote system(d) none of the mentionedI have been asked this question during a job interview.The above asked question is from File System Interface Mounting and Sharing topic in section File Systems and their Implementation of Operating System

Answer»

The correct option is (a) WITHOUT having an account on the remote system

The BEST explanation: The world WIDE web USES anonymous FILE exchange almost exclusively.

88.

In the world wide web, a ____ is needed to gain access to the remote files, and separate operations are used to transfer files.(a) laptop(b) plugin(c) browser(d) playerThe question was asked during an interview for a job.My question comes from File System Interface Mounting and Sharing topic in section File Systems and their Implementation of Operating System

Answer» CORRECT OPTION is (C) browser

The EXPLANATION is: NONE.
89.

In distributed file system________________ directories are visible from the local machine.(a) protected(b) local(c) private(d) remoteI had been asked this question in semester exam.This is a very interesting question from File System Interface Mounting and Sharing in portion File Systems and their Implementation of Operating System

Answer» RIGHT ANSWER is (d) remote

To EXPLAIN: NONE.
90.

A process _____ lower the priority of another process if both are owned by the same owner.(a) must(b) can(c) cannot(d) none of the mentionedI got this question during an interview.This question is from File System Interface Mounting and Sharing in section File Systems and their Implementation of Operating System

Answer» CORRECT ANSWER is (B) can

Easy EXPLANATION - NONE.
91.

In UNIX, exactly which operations can be executed by group members and other users is definable by _____________(a) the group’s head(b) the file’s owner(c) the file’s permissions(d) all of the mentionedThis question was addressed to me in my homework.Asked question is from File System Interface Mounting and Sharing topic in section File Systems and their Implementation of Operating System

Answer»

The correct ANSWER is (B) the file’s owner

The BEST EXPLANATION: None.

92.

When a file system is mounted over a directory that is not empty then _____________(a) the system may not allow the mount(b) the system must allow the mount(c) the system may allow the mount and the directory’s existing files will then be made obscure(d) all of the mentionedI got this question in homework.I would like to ask this question from File System Interface Mounting and Sharing in section File Systems and their Implementation of Operating System

Answer»

The CORRECT choice is (C) the system may allow the mount and the directory’s existing FILES will then be MADE obscure

Easiest explanation - NONE.

93.

What is the mount point?(a) an empty directory at which the mounted file system will be attached(b) a location where every time file systems are mounted(c) is the time when the mounting is done(d) none of the mentionedThis question was addressed to me in a national level competition.Enquiry is from File System Interface Mounting and Sharing topic in division File Systems and their Implementation of Operating System

Answer»

Correct answer is (a) an empty directory at which the MOUNTED file SYSTEM will be attached

The BEST I can EXPLAIN: None.

94.

When a cycle exists, the reference count maybe non zero, even when it is no longer possible to refer to a directory or file, due to _______(a) the possibility of one hidden reference(b) the possibility of two hidden references(c) the possibility of self referencing(d) none of the mentionedThis question was addressed to me by my school principal while I was bunking the class.The above asked question is from File System Interface Directory Structure in portion File Systems and their Implementation of Operating System

Answer» RIGHT choice is (c) the POSSIBILITY of SELF referencing

To explain: NONE.
95.

When keeping a list of all the links/references to a file, and the list is empty, implies that _____________(a) the file has no copies(b) the file is deleted(c) the file is hidden(d) none of the mentionedI had been asked this question by my college director while I was bunking the class.The query is from File System Interface Directory Structure in portion File Systems and their Implementation of Operating System

Answer»

Correct ANSWER is (b) the FILE is deleted

Easiest EXPLANATION - None.

96.

The deletion of a link ________ the original file.(a) deletes(b) affects(c) does not affect(d) none of the mentionedI had been asked this question during an interview for a job.This intriguing question originated from File System Interface Directory Structure in portion File Systems and their Implementation of Operating System

Answer» CORRECT choice is (C) does not affect

The BEST I can explain: NONE.
97.

The operating system _______ the links when traversing directory trees, to preserve the acyclic structure of the system.(a) considers(b) ignores(c) deletes(d) none of the mentionedI got this question in final exam.My enquiry is from File System Interface Directory Structure in portion File Systems and their Implementation of Operating System

Answer» CORRECT OPTION is (B) ignores

Easy EXPLANATION - NONE.
98.

In UNIX, what is a link?(a) a directory entry(b) a pointer to another file or subdirectory(c) implemented as an absolute or relative path name(d) all of the mentionedI got this question by my college director while I was bunking the class.Query is from File System Interface Directory Structure in portion File Systems and their Implementation of Operating System

Answer» CORRECT ANSWER is (d) all of the mentioned

To EXPLAIN: NONE.
99.

With a shared file _____________(a) actual file exists(b) there are two copies of the file(c) the changes made by one person are not reflected to the other(d) the changes made by one person are reflected to the otherI have been asked this question by my school teacher while I was bunking the class.The question is from File System Interface Directory Structure in portion File Systems and their Implementation of Operating System

Answer»

The CORRECT answer is (d) the CHANGES made by ONE PERSON are reflected to the other

Easy explanation - None.

100.

A tree structure ______ the sharing of files and directories.(a) allows(b) may restrict(c) restricts(d) none of the mentionedI got this question during an interview.This interesting question is from File System Interface Directory Structure topic in division File Systems and their Implementation of Operating System

Answer» RIGHT CHOICE is (c) restricts

To explain I would SAY: NONE.