Unit 6 - Practice Quiz

CSE316 50 Questions
0 Correct 0 Wrong 50 Left
0/50

1 Which of the following is NOT a standard file attribute maintained by the operating system?

A. Name
B. Location
C. Current file contents
D. Identifier

2 In which file access method is information in the file processed in order, one record after the other?

A. Relative Access
B. Direct Access
C. Sequential Access
D. Indexed Access

3 Which directory structure allows a user to create their own subdirectories and organizes files into a hierarchy?

A. Hash-structured directory
B. Flat directory
C. Single-level directory
D. Tree-structured directory

4 What is the specific operation called when a file system is attached to an existing directory structure?

A. Linking
B. Formatting
C. Spooling
D. Mounting

5 Which allocation method suffers from external fragmentation?

A. Linked allocation
B. Hashed allocation
C. Indexed allocation
D. Contiguous allocation

6 In Linked Allocation, what is the major disadvantage regarding file access?

A. It only supports efficient sequential access
B. It uses too much disk space for pointers
C. It requires a File Allocation Table (FAT)
D. It creates external fragmentation

7 Which allocation method solves the external fragmentation problem and supports efficient direct access by bringing all pointers together into one block?

A. Linked allocation
B. Contiguous allocation
C. Dynamic allocation
D. Indexed allocation

8 A Bit Vector is used for which purpose in file management?

A. File protection
B. Free-space management
C. Directory implementation
D. File compression

9 Which directory implementation method requires a linear search to find a file?

A. B+ Tree
B. Linear List
C. Hash Table
D. Indexed List

10 What is the primary problem with using a Hash Table for directory implementation?

A. Linear search time
B. Collisions
C. Inability to store metadata
D. External fragmentation

11 Which of the following is a 'Dedicated Device'?

A. Tape Drive
B. Main Memory
C. CPU
D. Hard Disk Drive

12 What technique allows a dedicated device (like a printer) to appear as a shared device?

A. Swapping
B. Polling
C. Caching
D. Spooling

13 In the context of device management, which devices transfer data one character at a time?

A. Block devices
B. Storage devices
C. Character devices
D. Network devices

14 What is the time taken for the disk arm to move the heads to the cylinder containing the desired sector called?

A. Response time
B. Rotational latency
C. Seek time
D. Transfer time

15 Which disk scheduling algorithm selects the request with the least seek time from the current head position?

A. FCFS
B. SSTF
C. SCAN
D. C-LOOK

16 What is a major disadvantage of the SSTF disk scheduling algorithm?

A. It may cause starvation of some requests
B. It causes head crashing
C. It is slower than FCFS
D. It is difficult to implement

17 Which disk scheduling algorithm is also known as the 'Elevator Algorithm'?

A. SSTF
B. SCAN
C. FCFS
D. C-SCAN

18 In C-SCAN disk scheduling, what happens when the head reaches the end of the disk?

A. It randomly jumps to a new cylinder
B. It reverses direction immediately and services requests
C. It stops and waits for new requests
D. It returns to the beginning without servicing requests on the return trip

19 What is a Direct Access Storage Device (DASD)?

A. Magnetic Tape
B. Magnetic Disk
C. Keyboard
D. Punch Card

20 Which hardware component is responsible for handling the details of specific device control and data transfer, offloading this work from the main CPU?

A. Cache
B. System Bus
C. I/O Channel / IOP
D. ALU

21 What is the primary purpose of Inter Process Communication (IPC)?

A. To prevent processes from running simultaneously
B. To increase the CPU clock speed
C. To allow processes to exchange data and synchronize actions
D. To manage disk space allocation

22 Which of the following is NOT a standard IPC mechanism?

A. Fragmentation
B. Pipes
C. Message Passing
D. Shared Memory

23 In the context of IPC, what is a 'Race Condition'?

A. When two processes communicate via a pipe
B. When a process runs faster than the CPU
C. When two processes try to read the same file
D. When the outcome of execution depends on the specific order in which access takes place

24 What is a fundamental characteristic of a standard (anonymous) Pipe?

A. It persists after the creating process terminates
B. It is unidirectional
C. It allows communication between unrelated processes
D. It is bidirectional by default

25 What limitation applies to standard (anonymous) pipes?

A. They store data permanently on disk
B. They can only be used by processes with a common ancestor (parent-child)
C. They require a network connection
D. They are slower than message queues

26 The popen() function in C library is used to:

A. Allocate shared memory
B. Create a pipe, fork a child, and invoke a shell
C. Open a file for direct access
D. Create a new thread

27 Which function is used to close a stream opened by popen()?

A. exit()
B. close()
C. pclose()
D. fclose()

28 Which IPC method is generally considered the fastest?

A. Message Queues
B. Sockets
C. Pipes
D. Shared Memory

29 What is a mandatory requirement when using Shared Memory?

A. Synchronization mechanism
B. Network protocols
C. Serial access
D. Disk mounting

30 What is another name for a Named Pipe?

A. Signal
B. FIFO
C. LIFO
D. Socket

31 How does a FIFO differ from a standard Pipe?

A. FIFO allows bidirectional communication only
B. FIFO can only be used by a parent and child
C. FIFO exists as a device special file in the file system
D. FIFO is faster

32 Which system call is typically used to create a FIFO?

A. mkfifo()
B. pipe()
C. shmget()
D. msgget()

33 In a Message Queue, how are messages typically retrieved?

A. Strictly FIFO only
B. By message type or priority
C. Randomly
D. By message size

34 Which protection mechanism involves associating a list of users and their access rights with each file?

A. Password protection
B. Capability Lists
C. Key locks
D. Access Control List (ACL)

35 In an Acyclic-Graph Directory structure, what is the main benefit over a Tree structure?

A. Faster searching
B. Smaller size
C. Ability to share files and subdirectories
D. No cycle detection required

36 What happens to a file in a 'DAG' directory structure if one of the links to it is deleted?

A. The file remains if other links exist
B. The file is deleted immediately
C. The file becomes hidden
D. The file system crashes

37 Which file access pattern is best suited for CD-ROMs?

A. Sequential Access
B. Random Access
C. Write-only
D. Read-Write

38 Group 'world' or 'others' in Unix file protection refers to:

A. The owner of the file
B. All users in the system other than owner and group
C. System Administrators only
D. Users in the same group as the owner

39 What does the acronym NFS stand for?

A. New File System
B. Network Folder Service
C. Non-fragmented System
D. Network File System

40 In Free-Space Management, what is a disadvantage of the Linked List method?

A. It causes internal fragmentation
B. It requires traversing the list to find multiple free blocks
C. It is hard to implement
D. It wastes space

41 Which device type is strictly sequential access?

A. Flash Drive
B. Magnetic Tape
C. Magnetic Disk
D. Solid State Drive

42 What is the role of the Device Controller?

A. To manage user logins
B. To compile code
C. To schedule processes
D. To interface between the OS and the device hardware

43 Blocking I/O means:

A. The kernel crashes
B. The process continues while I/O executes
C. The I/O device is blocked
D. The process is suspended until I/O is completed

44 Which IPC method utilizes a kernel-managed linked list of messages?

A. Semaphores
B. Pipes
C. Message Queues
D. Shared Memory

45 In File Management, what is an Absolute Path Name?

A. Path containing no spaces
B. Path starting from the root directory
C. Path starting from the current directory
D. Path of a hidden file

46 What does the open() system call typically return?

A. The file size
B. A file handle or file descriptor
C. The file content
D. True or False

47 Which disk scheduling algorithm is theoretically optimal but impossible to implement without knowing future requests?

A. SCAN
B. Shortest Seek Time First
C. FCFS
D. Look

48 With respect to Directory Implementation, what is a Hash Table bucket?

A. A type of file
B. A trash can for deleted files
C. A list of entries that hash to the same value
D. A physical storage unit

49 The logic that prevents a user from reading another user's file is handled by:

A. Directory Structure
B. File Allocation Table
C. File Protection Mechanism
D. Disk Scheduling

50 What is the main function of a Control Unit in I/O systems?

A. Manage RAM
B. Execute arithmetic operations
C. Decode instructions and generate control signals for the device
D. Store data permanently