Operating System Multiple Choice Questions on “File System Interface Mounting and Sharing”.
1. What is the mount point?
a) an empty directory at which the mounted file system will be attached
b) a location where every time file systems are mounted
c) is the time when the mounting is done
d) none of the mentioned
Answer: a
Clarification: None.
2. When a file system is mounted over a directory that is not empty then _____________
a) the system may not allow the mount
b) the system must allow the mount
c) the system may allow the mount and the directory’s existing files will then be made obscure
d) all of the mentioned
Answer: c
Clarification: None.
3. In UNIX, exactly which operations can be executed by group members and other users is definable by _____________
a) the group’s head
b) the file’s owner
c) the file’s permissions
d) all of the mentioned
Answer: b
Clarification: None.
4. A process _____ lower the priority of another process if both are owned by the same owner.
a) must
b) can
c) cannot
d) none of the mentioned
Answer: b
Clarification: None.
5. In distributed file system ________________ directories are visible from the local machine.
a) protected
b) local
c) private
d) remote
Answer: d
Clarification: None.
6. In the world wide web, a ____ is needed to gain access to the remote files, and separate operations are used to transfer files.
a) laptop
b) plugin
c) browser
d) player
Answer: c
Clarification: None.
7. Anonymous access allows a user to transfer files _____________
a) without having an account on the remote system
b) only if he accesses the system with a guest account
c) only if he has an account on the remote system
d) none of the mentioned
Answer: a
Clarification: The world wide web uses anonymous file exchange almost exclusively.
8. The machine containing the files is the _______ and the machine wanting to access the files is the ______
a) master, slave
b) memory, user
c) server, client
d) none of the mentioned
Answer: c
Clarification: None.
9. Distributed naming services/Distributed information systems have been devised to _____________
a) provide information about all the systems
b) provide unified access to the information needed for remote computing
c) provide unique names to all systems in a network
d) all of the mentioned
Answer: b
Clarification: None.
10. Domain name system provides _____________
a) host-name-to-network-address translations for the entire internet
b) network-address-to-host-name translations for the entire internet
c) binary to hex translations for the entire internet
d) all of the mentioned
Answer: a
Clarification: None.
11. To recover from failures in the network operations _____________ information may be maintained.
a) ip address
b) state
c) stateless
d) operating system
Answer: b
Clarification: None.
12. The series of accesses between the open and close operations is a _____________
a) transaction
b) procedure
c) program
d) file session
Answer: d