Unit 6 - Practice Quiz

CSE316 61 Questions
0 Correct 0 Wrong 61 Left
0/61

1 Which of the following is considered a fundamental attribute of a file?

File Concepts Easy
A. Network Address
B. CPU Speed
C. RAM Size
D. Name

2 Which file access method reads information in order, one record after the other, from the beginning to the end?

Access methods Easy
A. Indexed Access
B. Random Access
C. Direct Access
D. Sequential Access

3 What is the simplest directory structure where all files are contained in the same directory?

Directory Structure Easy
A. Acyclic-graph directory
B. Two-level directory
C. Single-level directory
D. Tree-structured directory

4 In a tree-structured directory, what is the single main directory at the very top of the hierarchy called?

Directory Structure Easy
A. Branch
B. Leaf
C. Parent
D. Root

5 What is the process of making a file system on a storage device, like a hard drive partition, accessible to the operating system?

File System Mounting and Sharing Easy
A. Allocating
B. Mounting
C. Formatting
D. Partitioning

6 An Access Control List (ACL) associated with a file specifies what?

Protection Easy
A. Which users can perform which operations on the file
B. The physical block numbers of the file
C. The file's size and location on the disk
D. The date the file was last modified

7 Which file allocation method requires that each file occupy a single set of contiguous blocks on the disk?

Allocation methods Easy
A. Indexed allocation
B. Contiguous allocation
C. Linked allocation
D. Hashed allocation

8 What is a major disadvantage of linked allocation of files?

Allocation methods Easy
A. It is inefficient for direct access
B. It requires a large index block for small files
C. It suffers from external fragmentation
D. It is very complex to implement

9 Which free-space management technique uses a series of bits, where each bit represents a disk block, to track available space?

Free-Space Management Easy
A. Counting
B. Bit vector
C. Linked list
D. Grouping

10 What is a major disadvantage of implementing a directory as a simple linear list of file names?

Directory Implementation Easy
A. It wastes a lot of disk space
B. It is not supported by modern file systems
C. It cannot handle subdirectories
D. Searching for a file can be slow

11 A device that is assigned to only one process at a time until that process releases it is known as a:

Device management: Dedicated, shared and virtual devices Easy
A. Dedicated device
B. Block device
C. Virtual device
D. Shared device

12 Which of the following is a classic example of a serial access device?

Serial access and direct access devices Easy
A. CD-ROM
B. Solid State Drive (SSD)
C. Hard Disk Drive (HDD)
D. Magnetic Tape

13 Which disk scheduling algorithm services I/O requests in the exact order that they arrive?

Disk scheduling methods Easy
A. C-LOOK
B. SSTF (Shortest Seek Time First)
C. FCFS (First-Come, First-Served)
D. SCAN

14 The SSTF (Shortest Seek Time First) disk scheduling algorithm selects the request that:

Disk scheduling methods Easy
A. requires the least disk arm movement from its current position
B. arrived first in the queue
C. has the highest priority
D. is located at the lowest cylinder number

15 What is the primary role of a device controller (or I/O controller)?

Direct Access Storage Devices – Channels and Control Units Easy
A. To manage the transfer of data between a peripheral device and main memory
B. To execute application-level programs
C. To manage the CPU's cache memory
D. To store the operating system kernel

16 What is the general term for a mechanism that allows processes to communicate with each other and synchronize their actions?

Inter process communication: Introduction to IPC (Inter process communication) Methods Easy
A. Inter-Process Communication (IPC)
B. Process Control Block (PCB)
C. Central Processing Unit (CPU)
D. Application Programming Interface (API)

17 An ordinary (unnamed) pipe provides a one-way flow of data and can typically only be used between which types of processes?

Pipes - popen and pclose functions Easy
A. Processes running on different computers
B. A user process and the operating system kernel
C. A parent process and its child process
D. Any two unrelated processes on the system

18 Which IPC mechanism is generally considered the fastest because it does not involve the kernel for data transfer once set up?

Shared memory Easy
A. Pipes
B. Message queues
C. Sockets
D. Shared memory

19 What is another common name for a FIFO (First-In, First-Out) in the context of IPC?

FIFOs Easy
A. Anonymous Pipe
B. Named Pipe
C. Socket
D. Semaphore

20 What is a key feature of the message queue IPC mechanism?

Message queues Easy
A. It requires processes to have a parent-child relationship
B. Communication is always synchronous
C. It is the fastest form of IPC
D. Messages are stored in the queue until the recipient retrieves them

21 A disk drive has requests for I/O to blocks on cylinders 98, 183, 37, 122, 14, 124, 65, 67. The head is currently at cylinder 53, moving towards cylinder 0. Using the SCAN (Elevator) algorithm, what is the sequence of cylinders visited?

Disk scheduling methods Medium
A. 53, 37, 14, 98, 183, 122, 124, 65, 67
B. 53, 65, 67, 98, 122, 124, 183, 37, 14
C. 53, 37, 14, 0, 65, 67, 98, 122, 124, 183
D. 53, 37, 14, 65, 67, 98, 122, 124, 183

22 Consider a file system that uses indexed allocation with a single level of indexing. The index block can hold 1024 block addresses, and each disk block is 4 KB. What is the maximum possible size of a file in this system?

Allocation methods Medium
A. 4 GB
B. 4 MB
C. 1024 KB
D. Cannot be determined

23 Two processes, P1 and P2, share a memory segment to access a shared integer variable 'count'. P1 executes count++ and P2 executes count--. If these operations are not atomic and no synchronization mechanism (like a semaphore or mutex) is used, which of the following issues is most likely to occur?

Shared memory Medium
A. Starvation
B. Deadlock
C. Race Condition
D. Segmentation Fault

24 A file system needs to allocate a file that requires 100 contiguous blocks. Which free-space management technique would be most efficient for finding and allocating this space, assuming the free space is fragmented?

Free-Space Management Medium
A. Counting, because it stores addresses and counts of contiguous blocks.
B. Linked List, because it only needs to traverse pointers.
C. Indexed Allocation, because it can point to any block.
D. Bit Vector, because it requires scanning a simple array.

25 In a system with an acyclic-graph directory structure, user A shares a file report.txt with user B by creating a link to it in user B's directory. If user A now deletes the original report.txt file from their directory, what should happen to prevent user B from having a dangling pointer?

Directory Structure Medium
A. The system should keep the file on disk until all links to it are deleted.
B. User B will get a 'file not found' error, which is an acceptable behavior.
C. The system should prevent user A from deleting the file as long as links exist.
D. The system should automatically delete user B's link.

26 A file has the octal permissions 764. The owner of the file is 'admin' and it belongs to the group 'staff'. A user named 'bob' who is a member of the 'staff' group tries to execute the file. What will be the result?

Protection Medium
A. Permission denied because only the owner can execute.
B. The execution will be successful.
C. The system will crash.
D. Permission denied because users in the 'staff' group cannot execute it.

27 A file system uses contiguous allocation and has disk blocks of size 2 KB. A file of size 5 KB is created. What is the total amount of internal fragmentation for this file?

Allocation methods Medium
A. 0 KB
B. 1 KB
C. 3 KB
D. 2 KB

28 An administrator mounts a new file system from a device /dev/sdb1 onto an existing, non-empty directory /mnt/data. What happens to the original files that were inside /mnt/data before the mount operation?

File System Mounting and Sharing Medium
A. The original files become temporarily inaccessible until the file system is unmounted.
B. The original files are permanently deleted to make way for the new file system.
C. The mount operation fails because the target directory is not empty.
D. The original files are merged with the files from /dev/sdb1.

29 Consider a disk with 200 cylinders (0-199). The disk head is at cylinder 100 and has just serviced a request at a higher cylinder number. The request queue is 23, 89, 132, 42, 187. Which algorithm would prevent starvation for the request at cylinder 23 but might not be the most optimal in terms of total head movement?

Disk scheduling methods Medium
A. SSTF (Shortest Seek Time First)
B. C-SCAN (Circular SCAN)
C. FCFS (First-Come, First-Served)
D. LOOK

30 What is the primary advantage of using a FIFO (named pipe) for inter-process communication over an ordinary (unnamed) pipe?

FIFOs Medium
A. FIFOs are faster because they don't use the kernel.
B. FIFOs allow for two-way communication by default.
C. FIFOs have a name in the file system and can be used by unrelated processes.
D. FIFOs can transmit more data in a single write operation.

31 For a file system using linked allocation where each block stores a pointer to the next block, what is the major drawback when trying to perform a direct access operation, such as reading the 100th block of a file?

Allocation methods Medium
A. The file size is limited by the number of available pointers.
B. It requires sequentially reading the first 99 blocks to find the 100th.
C. It results in significant external fragmentation.
D. It is prone to data loss if a pointer is corrupted.

32 A large database file stores fixed-length records. The application frequently needs to retrieve the Nth record from the file. Which file access method would provide the best performance for this task?

Access methods Medium
A. Direct Access
B. Sequential Access
C. Indexed Access
D. Appended Access

33 When implementing a directory with a large number of files, what is the primary advantage of using a hash table over a simple linear list?

Directory Implementation Medium
A. A hash table simplifies the deletion of files.
B. A hash table significantly decreases the time required to locate a file.
C. A hash table uses less disk space.
D. A hash table allows for variable-length file names more easily.

34 A print spooler accepts print jobs from multiple users and places them in a queue on the disk, feeding them to the printer one by one. This mechanism makes the printer, which is a dedicated device, appear as if it is available to all users simultaneously. This is an example of creating a:

Device management: Dedicated, shared and virtual devices Medium
A. Virtual device
B. Dedicated device
C. Raw device
D. Shared device

35 A C program executes the following line of code: FILE *pipe_fp = popen("grep 'error' log.txt | wc -l", "r");. What does the popen function accomplish in this context?

Pipes - popen and pclose functions Medium
A. It creates a pipe, forks a child process to run the shell command, and connects the command's standard output to the pipe's read end.
B. It executes the grep command and writes the result into the wc command.
C. It opens a file named "grep 'error' log.txt | wc -l" for reading.
D. It creates two pipes, one for grep and one for wc, and manages their communication.

36 In a file system using a bit vector for free-space management, the disk has 16384 blocks. If the size of a CPU word is 32 bits, how many words of memory are required to hold the entire bit vector?

Free-Space Management Medium
A. 512
B. 4096
C. 1024
D. 16384

37 What is the primary advantage of the LOOK disk scheduling algorithm over the SCAN algorithm?

Disk scheduling methods Medium
A. LOOK prioritizes requests based on their size.
B. LOOK reverses direction as soon as it services the last request in the current direction, avoiding an unnecessary trip to the end of the disk.
C. LOOK is simpler to implement.
D. LOOK services requests in a circular fashion, providing better fairness.

38 A user opens a file, reads its entire content, and then closes it without making any changes. Which of the following file attributes (timestamps) is most likely to be updated by the operating system?

File Concepts Medium
A. Last access time
B. Archive bit
C. Creation time
D. Last modified time

39 In a mainframe architecture, what is the primary role of an I/O Channel?

Direct Access Storage Devices – Channels and Control Units Medium
A. To execute I/O-specific instructions, offloading the work from the main CPU and managing control units.
B. To act as a high-speed bus connecting the CPU directly to the disk.
C. To format the disk and manage bad sectors.
D. To store a copy of the operating system for faster boot times.

40 Which of the following scenarios is best suited for using a message queue for Inter-Process Communication (IPC)?

Message queues Medium
A. Two processes needing to share a large, frequently updated data structure with minimal latency.
B. A client process sending a request to a server process and needing to wait for an immediate, direct reply.
C. A parent process sending a single line of text to a child process it just forked.
D. A producer process generating work items that need to be processed asynchronously by multiple consumer processes.

41 Consider a file system that uses an indexed allocation scheme with 4 KB blocks and 4-byte block pointers. The inode contains 12 direct pointers, one single indirect pointer, one double indirect pointer, and one triple indirect pointer. A process attempts to write to a file at a logical offset of 266,400,300 bytes. Which of the following statements accurately describes the number of I/O operations required to access the data block for this write, assuming the inode is already in memory but all indirect blocks must be fetched from disk?

Allocation methods Hard
A. The file offset is too large to be represented by this inode structure.
B. 4 I/O operations are required: one for the triple indirect block, one for a double indirect block, one for a single indirect block, and one for the data block.
C. 5 I/O operations are required: one for the inode, one for the triple indirect block, one for a double indirect block, one for a single indirect block, and one for the data block.
D. 3 I/O operations are required: one for a double indirect block, one for a single indirect block, and one for the data block.

42 A file system uses 4 KB blocks and 4-byte block pointers. An inode, which is already in memory, is updated when a process writes for the first time to an offset that falls within the range of the file's triple indirect pointer. Assume all required indirect blocks must be newly allocated and the free space is managed by a bit vector that is also entirely in memory. What is the minimum number of disk write operations required to complete this single logical write?

Allocation methods Hard
A. 1 write: for the data block only, as metadata is cached and written lazily.
B. 4 writes: one for each of the three indirect blocks and one for the data block.
C. 2 writes: one for the data block and one for the inode.
D. 5 writes: one for the data block, one for each of the three levels of indirect blocks, and one for the updated inode.

43 A disk drive has 1000 cylinders, numbered 0 to 999. The head is currently at cylinder 250, moving towards cylinder 999. The queue of pending requests, in arrival order, is [810, 150, 475, 950, 180, 500, 50]. What is the absolute difference in the total head movement (number of cylinders traversed) between servicing this queue using the LOOK algorithm versus the C-LOOK algorithm?

Disk scheduling methods Hard
A. 0
B. 130
C. 900
D. 800

44 A file system on a 16 GB disk uses a free-space management scheme known as 'grouping', where the first free block in a group contains the addresses of N other free blocks in that group and a pointer to the next group's starting block. Given a disk block size of 4 KB and 4-byte disk addresses, what is the primary disadvantage of this scheme compared to a bit vector when a process requests to allocate a 100 MB contiguous file?

Free-Space Management Hard
A. Grouping is much slower for finding a single free block.
B. Grouping can only manage disks up to 4 GB in size due to the 4-byte address limit.
C. The space overhead of grouping (one pointer per group) is significantly higher than that of a bit vector.
D. The grouping scheme is highly inefficient for finding a large number of contiguous blocks, as the free blocks listed in a group block are not necessarily adjacent on the disk.

45 Two processes, P1 and P2, attempt to establish bidirectional communication using two named pipes (FIFOs), fifo1 and fifo2. P1 executes fd1 = open("fifo1", O_WRONLY); followed by fd2 = open("fifo2", O_RDONLY);. Concurrently, P2 executes fd2 = open("fifo2", O_WRONLY); followed by fd1 = open("fifo1", O_RDONLY);. What is the most likely outcome?

FIFOs Hard
A. An error ENXIO is returned because a reader must be present when opening a FIFO for writing.
B. A race condition occurs where success depends on P1 opening both pipes before P2 opens either.
C. A deadlock will occur because each process will block on its first open call, waiting for the other process to open the other end of the pipe, which it never will.
D. The communication channel is established successfully regardless of scheduling.

46 A system implements a circular buffer in a shared memory segment for high-speed communication. Access is controlled by in and out indices, also in shared memory. To prevent race conditions, a single binary semaphore (mutex) is used to protect all accesses (reads and writes) to the shared segment. While this ensures correctness, what is a significant and subtle performance pathology this design introduces, especially on a multi-core system?

Shared memory Hard
A. The memory overhead of the single semaphore is greater than that of using two counting semaphores.
B. It prevents the producer and consumer from operating in parallel, effectively serializing their execution and negating the concurrency benefits of a multi-core CPU.
C. It introduces the risk of priority inversion if the consumer and producer have different priorities.
D. It is not possible to implement a blocking mechanism; it forces busy-waiting on the indices.

47 Consider two protection schemes: Access Control Lists (ACLs) and Capability Lists. In a large distributed system, a security administrator needs to perform two tasks frequently: 1) Revoke a single user's access to all resources. 2) Revoke all users' access to a single, compromised resource. How do the two schemes compare in terms of efficiency for these specific tasks?

Protection Hard
A. ACLs are efficient for task 1 but inefficient for task 2; Capability Lists are efficient for task 2 but inefficient for task 1.
B. Both schemes are equally efficient, with performance depending on the implementation.
C. ACLs are efficient at both tasks; Capability Lists are inefficient at both.
D. ACLs are efficient for task 2 but inefficient for task 1; Capability Lists are efficient for task 1 but inefficient for task 2.

48 A client mounts a remote file system using NFS, which provides 'close-to-open' consistency. Process A on the client opens a file, writes data, and closes it. Immediately after, Process B on the same client opens the same file. What guarantee does Process B have regarding the data written by Process A?

File System Mounting and Sharing Hard
A. Process B is not guaranteed to see the writes, as another client on the network could have overwritten the file in the interim.
B. Process B will see the writes from Process A only if both processes are running as the same user.
C. Process B will see stale data because NFS caches are only invalidated every 30 seconds.
D. Process B is guaranteed to see the writes from Process A because the close() call flushes the client's cache to the server, and the subsequent open() will fetch the updated file state.

49 A directory in a file system contains 2^20 (1,048,576) files. The OS needs to look up a file by name. Compare the worst-case I/O performance of a directory implemented as a simple linear list versus a B+-tree implementation. Assume a disk block read takes 10 ms, the B+-tree has a height of 4 for this number of entries, and that on average 128 (filename, inode pointer) pairs fit in a single disk block.

Directory Implementation Hard
A. The B+-tree lookup requires 40 ms, while the linear search requires only half the blocks on average (4096 blocks), making it merely twice as slow.
B. Linear search is faster because it has lower computational overhead.
C. The B+-tree lookup requires reading at most 4 blocks (40 ms), while the worst-case linear search requires reading 8192 blocks (~82 seconds), making the B+-tree orders of magnitude faster.
D. Performance is nearly identical because both are limited by the rotational latency of the disk.

50 A C program executes FILE *p = popen("some_command", "r"); where some_command is a process that generates a large amount of output to stdout and then waits for input on stdin. The parent process never reads from the pipe p and never calls pclose(p). What is the most likely state of the some_command process?

Pipes - popen and pclose functions Hard
A. It runs to completion, its output is discarded, and it exits normally.
B. It immediately terminates with a SIGPIPE signal.
C. It becomes a zombie process immediately after the popen call.
D. It runs until its standard output pipe buffer is full, at which point its next write to stdout will block indefinitely.

51 Consider a system with a high-priority real-time process P_H, a medium-priority CPU-bound process P_M, and a low-priority I/O server process P_L. P_H sends a request to P_L via a message queue and then blocks, waiting for a reply. P_L needs the CPU to process the request and generate the reply. What scheduling anomaly is demonstrated if P_M is currently running?

Message queues Hard
A. Livelock, as P_L and P_H continuously change state without doing useful work.
B. Priority Inversion, because the high-priority P_H is blocked, waiting for the low-priority P_L, which itself cannot run because it is being preempted by the medium-priority P_M.
C. Deadlock, as P_H and P_L are waiting for each other.
D. Starvation of P_M, because the real-time process P_H will always have precedence.

52 In a file system that supports an acyclic graph directory structure, a file named data.txt with a reference count of 3 is hard-linked from three directories: /home/a/, /home/b/, and /tmp/. A user executes rm /home/a/data.txt. Subsequently, a power failure occurs before the file system can fully commit metadata changes, corrupting the inode's reference count to 0, while the directory entries in /home/b/ and /tmp/ still exist. What is the most likely state of the file's data blocks after the system reboots and runs its file system check utility (like fsck)?

Directory Structure Hard
A. The data blocks are considered free space because the reference count is 0, and they will be marked as available for allocation, leading to data loss.
B. The data blocks are intact, and fsck will repair the reference count to 2.
C. The file becomes a 'lost file', and fsck places a new link to it in the /lost+found directory.
D. The system will panic on reboot because of the inconsistent file system state.

53 A database application requires a high-performance, transaction-safe log file. The system administrator is deciding between using a raw partition on a shared SSD (Solid State Drive) or a RAM disk (a virtual device using system memory). Which choice is more appropriate, and what is the critical trade-off?

Device management: Dedicated, shared and virtual devices Hard
A. The RAM disk is better due to its superior speed, and the trade-off is higher cost.
B. The shared SSD is better because it allows concurrent access from other processes.
C. The RAM disk is optimal for performance, but its contents are volatile and will be lost on power failure, making it fundamentally unsafe for a transaction log without a backing store or UPS.
D. The shared SSD is better because a raw partition bypasses the file system, which is the main source of volatility.

54 In a mainframe architecture, the CPU issues a command to an I/O channel to perform a scatter/gather read from a disk. The command specifies reading 5 discontiguous disk blocks and placing them into 5 different memory buffers. Which of the following best describes the sequence of events and the role of the channel?

Direct Access Storage Devices – Channels and Control Units Hard
A. The CPU directly controls the disk head for each of the 5 seeks and reads, with the channel only managing the data bus.
B. The CPU provides the channel with a single Channel Command Word (CCW) program. The channel executes this program independently, managing the disk control unit for all 5 reads and transferring data directly to the specified memory locations, only interrupting the CPU once the entire program is complete.
C. The CPU issues 5 separate read commands, and the channel executes them in order, interrupting the CPU after each one.
D. The channel reads all 5 blocks into its own internal buffer and then uses DMA to transfer the entire buffer to the CPU, which then scatters the data into the correct memory locations.

55 A 1 GB file is stored on a disk. The file is processed by an application that frequently performs searches that require jumping to arbitrary byte offsets (e.g., 'find record at offset 500,000,000'). Which file access method and allocation scheme combination would provide the best performance for this workload?

Access methods Hard
A. Direct access with indexed allocation.
B. Direct access with linked allocation.
C. Sequential access with indexed allocation.
D. Sequential access with contiguous allocation.

56 When designing a high-throughput system where multiple worker processes need to read the same large (e.g., 2 GB) read-only dataset, which IPC mechanism is fundamentally superior in terms of memory efficiency and initialization speed, and why?

Inter process communication: Introduction to IPC Methods Hard
A. Sockets, because they are the most flexible and can work across a network, which implies efficiency.
B. Shared Memory, because the single 2 GB dataset can be mapped into the virtual address space of all worker processes without creating multiple copies, leading to near-instantaneous 'transfer' and minimal physical memory overhead.
C. Message Queues, because they decouple the processes and manage data transfer asynchronously.
D. Pipes, because they provide a simple, kernel-managed stream that is highly optimized.

57 A process writes 1 KB of data to a file, and the write() system call returns successfully. Immediately after, the system experiences a sudden power loss. Upon reboot, the file's data is found to be in its original state (pre-write), but its mtime (modification time) metadata has been updated to reflect the time of the write. What type of file system journaling mode could explain this specific inconsistent state?

File Concepts Hard
A. Data mode, where both data and metadata are written to the journal, ensuring full consistency.
B. Writeback mode, where only metadata is journaled, and data is written to its final location later.
C. This state is impossible, as a successful write() guarantees data persistence.
D. Ordered mode, where data is forced to the disk before the metadata referencing it is committed to the journal.

58 A system uses the Buddy System for memory allocation with an initial memory block of 1024 KB. A sequence of requests arrives: A=70 KB, B=35 KB, C=60 KB, D=130 KB. After these allocations, request B is freed. What is the size of the block that is freed, and what is the state of its buddy?

Free-Space Management Hard
A. 64 KB is freed, but its buddy of size 64 KB (allocated for request C) is still in use, so no merge occurs.
B. 35 KB is freed, and its buddy of size 35 KB is also free, so they are merged.
C. 128 KB is freed, and its buddy is part of the block allocated for D.
D. 64 KB is freed, but its buddy of size 64 KB (allocated for request A) is still in use, so no merge occurs.

59 A major drawback of contiguous file allocation is external fragmentation. A proposed solution is to perform periodic compaction. If a disk has a total capacity of 1 TB, a seek time of 4 ms, a rotational latency of 2 ms, and a transfer rate of 200 MB/s, what is the approximate time required to compact the disk if 50% of the disk is filled with files that are, on average, located in the first 75% of the disk's physical space and need to be moved to the first 50%?

Allocation methods Hard
A. ~4.2 seconds
B. ~1 minute
C. ~2 hours
D. ~42 minutes

60 A modern LTO (Linear Tape-Open) tape drive uses a technique called 'serpentine recording' where it writes data in parallel tracks in one direction, then reverses direction and writes on an adjacent set of tracks. How does this technique attempt to mitigate the fundamental performance limitation of tape as a storage medium?

Serial access and direct access devices Hard
A. It eliminates the need for rewinding the tape, thus improving write speeds.
B. It transforms the tape into a direct access device.
C. It increases the data density, but has no impact on access performance.
D. It significantly reduces the 'access time' or 'seek time' by minimizing the long delays associated with rewinding the entire tape to find an adjacent track.

61 The N-Step-SCAN disk scheduling algorithm processes requests in batches of size N to prevent starvation of requests for distant cylinders. If the algorithm is currently processing a batch and new requests arrive, when are these new requests eligible to be serviced?

Disk scheduling methods Hard
A. They are deferred and placed in a new queue to be serviced only after all requests in the current batch have been completed.
B. Immediately, if they fall along the current path of the disk head.
C. They are added to the current batch and serviced if N has not yet been reached.
D. They are ignored until the disk head sweeps back in the other direction.