Unit 6 - Practice Quiz

CSE316 50 Questions
0 Correct 0 Wrong 50 Left
0/50

1 Which of the following is NOT a standard file attribute maintained by the operating system?

A. Current file contents
B. Identifier
C. Location
D. Name

2 In which file access method is information in the file processed in order, one record after the other?

A. Direct Access
B. Indexed Access
C. Relative Access
D. Sequential Access

3 Which directory structure allows a user to create their own subdirectories and organizes files into a hierarchy?

A. Single-level directory
B. Flat directory
C. Tree-structured directory
D. Hash-structured directory

4 What is the specific operation called when a file system is attached to an existing directory structure?

A. Linking
B. Spooling
C. Formatting
D. Mounting

5 Which allocation method suffers from external fragmentation?

A. Hashed allocation
B. Contiguous allocation
C. Indexed allocation
D. Linked allocation

6 In Linked Allocation, what is the major disadvantage regarding file access?

A. It uses too much disk space for pointers
B. It creates external fragmentation
C. It only supports efficient sequential access
D. It requires a File Allocation Table (FAT)

7 Which allocation method solves the external fragmentation problem and supports efficient direct access by bringing all pointers together into one block?

A. Indexed allocation
B. Dynamic allocation
C. Contiguous allocation
D. Linked allocation

8 A Bit Vector is used for which purpose in file management?

A. File compression
B. Free-space management
C. File protection
D. Directory implementation

9 Which directory implementation method requires a linear search to find a file?

A. B+ Tree
B. Linear List
C. Indexed List
D. Hash Table

10 What is the primary problem with using a Hash Table for directory implementation?

A. Linear search time
B. Collisions
C. External fragmentation
D. Inability to store metadata

11 Which of the following is a 'Dedicated Device'?

A. Main Memory
B. Hard Disk Drive
C. CPU
D. Tape Drive

12 What technique allows a dedicated device (like a printer) to appear as a shared device?

A. Polling
B. Spooling
C. Swapping
D. Caching

13 In the context of device management, which devices transfer data one character at a time?

A. Block devices
B. Storage devices
C. Network devices
D. Character devices

14 What is the time taken for the disk arm to move the heads to the cylinder containing the desired sector called?

A. Seek time
B. Response time
C. Transfer time
D. Rotational latency

15 Which disk scheduling algorithm selects the request with the least seek time from the current head position?

A. SCAN
B. C-LOOK
C. FCFS
D. SSTF

16 What is a major disadvantage of the SSTF disk scheduling algorithm?

A. It is slower than FCFS
B. It is difficult to implement
C. It may cause starvation of some requests
D. It causes head crashing

17 Which disk scheduling algorithm is also known as the 'Elevator Algorithm'?

A. FCFS
B. SCAN
C. C-SCAN
D. SSTF

18 In C-SCAN disk scheduling, what happens when the head reaches the end of the disk?

A. It reverses direction immediately and services requests
B. It randomly jumps to a new cylinder
C. It stops and waits for new requests
D. It returns to the beginning without servicing requests on the return trip

19 What is a Direct Access Storage Device (DASD)?

A. Punch Card
B. Keyboard
C. Magnetic Disk
D. Magnetic Tape

20 Which hardware component is responsible for handling the details of specific device control and data transfer, offloading this work from the main CPU?

A. System Bus
B. ALU
C. I/O Channel / IOP
D. Cache

21 What is the primary purpose of Inter Process Communication (IPC)?

A. To manage disk space allocation
B. To allow processes to exchange data and synchronize actions
C. To prevent processes from running simultaneously
D. To increase the CPU clock speed

22 Which of the following is NOT a standard IPC mechanism?

A. Shared Memory
B. Message Passing
C. Fragmentation
D. Pipes

23 In the context of IPC, what is a 'Race Condition'?

A. When a process runs faster than the CPU
B. When two processes communicate via a pipe
C. When two processes try to read the same file
D. When the outcome of execution depends on the specific order in which access takes place

24 What is a fundamental characteristic of a standard (anonymous) Pipe?

A. It persists after the creating process terminates
B. It is bidirectional by default
C. It is unidirectional
D. It allows communication between unrelated processes

25 What limitation applies to standard (anonymous) pipes?

A. They can only be used by processes with a common ancestor (parent-child)
B. They are slower than message queues
C. They require a network connection
D. They store data permanently on disk

26 The popen() function in C library is used to:

A. Create a pipe, fork a child, and invoke a shell
B. Open a file for direct access
C. Allocate shared memory
D. Create a new thread

27 Which function is used to close a stream opened by popen()?

A. exit()
B. close()
C. pclose()
D. fclose()

28 Which IPC method is generally considered the fastest?

A. Message Queues
B. Shared Memory
C. Sockets
D. Pipes

29 What is a mandatory requirement when using Shared Memory?

A. Synchronization mechanism
B. Network protocols
C. Disk mounting
D. Serial access

30 What is another name for a Named Pipe?

A. LIFO
B. Signal
C. Socket
D. FIFO

31 How does a FIFO differ from a standard Pipe?

A. FIFO is faster
B. FIFO can only be used by a parent and child
C. FIFO allows bidirectional communication only
D. FIFO exists as a device special file in the file system

32 Which system call is typically used to create a FIFO?

A. pipe()
B. mkfifo()
C. shmget()
D. msgget()

33 In a Message Queue, how are messages typically retrieved?

A. By message type or priority
B. Randomly
C. By message size
D. Strictly FIFO only

34 Which protection mechanism involves associating a list of users and their access rights with each file?

A. Key locks
B. Password protection
C. Access Control List (ACL)
D. Capability Lists

35 In an Acyclic-Graph Directory structure, what is the main benefit over a Tree structure?

A. No cycle detection required
B. Ability to share files and subdirectories
C. Faster searching
D. Smaller size

36 What happens to a file in a 'DAG' directory structure if one of the links to it is deleted?

A. The file remains if other links exist
B. The file becomes hidden
C. The file system crashes
D. The file is deleted immediately

37 Which file access pattern is best suited for CD-ROMs?

A. Read-Write
B. Write-only
C. Random Access
D. Sequential Access

38 Group 'world' or 'others' in Unix file protection refers to:

A. The owner of the file
B. Users in the same group as the owner
C. System Administrators only
D. All users in the system other than owner and group

39 What does the acronym NFS stand for?

A. Network File System
B. Network Folder Service
C. Non-fragmented System
D. New File System

40 In Free-Space Management, what is a disadvantage of the Linked List method?

A. It requires traversing the list to find multiple free blocks
B. It wastes space
C. It causes internal fragmentation
D. It is hard to implement

41 Which device type is strictly sequential access?

A. Flash Drive
B. Magnetic Disk
C. Solid State Drive
D. Magnetic Tape

42 What is the role of the Device Controller?

A. To compile code
B. To manage user logins
C. To interface between the OS and the device hardware
D. To schedule processes

43 Blocking I/O means:

A. The process continues while I/O executes
B. The I/O device is blocked
C. The kernel crashes
D. The process is suspended until I/O is completed

44 Which IPC method utilizes a kernel-managed linked list of messages?

A. Shared Memory
B. Pipes
C. Message Queues
D. Semaphores

45 In File Management, what is an Absolute Path Name?

A. Path starting from the root directory
B. Path containing no spaces
C. Path starting from the current directory
D. Path of a hidden file

46 What does the open() system call typically return?

A. The file size
B. A file handle or file descriptor
C. The file content
D. True or False

47 Which disk scheduling algorithm is theoretically optimal but impossible to implement without knowing future requests?

A. FCFS
B. Look
C. SCAN
D. Shortest Seek Time First

48 With respect to Directory Implementation, what is a Hash Table bucket?

A. A type of file
B. A physical storage unit
C. A trash can for deleted files
D. A list of entries that hash to the same value

49 The logic that prevents a user from reading another user's file is handled by:

A. Disk Scheduling
B. File Protection Mechanism
C. Directory Structure
D. File Allocation Table

50 What is the main function of a Control Unit in I/O systems?

A. Store data permanently
B. Execute arithmetic operations
C. Decode instructions and generate control signals for the device
D. Manage RAM