SSC Multi-Tasking Non-Technical Staff Model Exams in Telugu

AP Grama Sachivalayam 2023 Free Test Series in Telugu (14,523 Vacancies)

Digital Assistant 2023 PART B - 100 Marks All Topics MCQs

File System Interface Protection - Operating System Questions & Answers

1.

Disks are segmented into one or more partitions, each containing a file system or ______

   A.) left ‘raw’
   B.) made into swap space
   C.) made into backup space
   D.) left ‘ripe’

Answer: Option 'A'

left ‘raw’

2.

Disks are segmented into one or more partitions, each containing a file system or ______

   A.) left ‘raw’
   B.) made into swap space
   C.) made into backup space
   D.) left ‘ripe’

Answer: Option 'A'

left ‘raw’

3.

In UNIX, the directory protection is handled _________ to the file protection.

   A.) different
   B.) similar
   C.) it is not handled at all
   D.) none of the mentioned

Answer: Option 'B'

​similar

4.

In UNIX, the directory protection is handled _________ to the file protection.

   A.) different
   B.) similar
   C.) it is not handled at all
   D.) none of the mentioned

Answer: Option 'B'

​similar

5.

In a multi level directory structure :

   A.) the same previous techniques will be used as in the other structures
   B.) a mechanism for directory protection will have to applied
   C.) the subdirectories do not need protection once the directory is protected
   D.) none of the mentioned

Answer: Option 'B'

​a mechanism for directory protection will have to applied

6.

In a multi level directory structure :

   A.) the same previous techniques will be used as in the other structures
   B.) a mechanism for directory protection will have to applied
   C.) the subdirectories do not need protection once the directory is protected
   D.) none of the mentioned

Answer: Option 'B'

​a mechanism for directory protection will have to applied

7.

If each access to a file is controlled by a password, then the disadvantage is that :

   A.) user will need to remember a lot of passwords
   B.) it is not reliable
   C.) it is not efficient
   D.) all of the mentioned

Answer: Option 'A'

user will need to remember a lot of passwords

8.

If each access to a file is controlled by a password, then the disadvantage is that :

   A.) user will need to remember a lot of passwords
   B.) it is not reliable
   C.) it is not efficient
   D.) all of the mentioned

Answer: Option 'A'

user will need to remember a lot of passwords

9.

To control access the three bits used in UNIX are represented by :

   A.) r
   B.) w
   C.) x
   D.)

Answer: Option ''

all of the mentioned

10.

To control access the three bits used in UNIX are represented by :

   A.) r
   B.) w
   C.) x
   D.)

Answer: Option ''

all of the mentioned

11.

In UNIX, groups can be created and modified by :

   A.) superuser
   B.) any user
   C.) a programmer only
   D.) the people in the group only

Answer: Option 'A'

superuser

12.

In UNIX, groups can be created and modified by :

   A.) superuser
   B.) any user
   C.) a programmer only
   D.) the people in the group only

Answer: Option 'A'

superuser

13.

Universe consists of :

   A.) all users that aren’t included in the group or owners
   B.) all users that are not owners
   C.) all users in the system
   D.) none of the mentioned

Answer: Option 'C'

​all users in the system

14.

Universe consists of :

   A.) all users that aren’t included in the group or owners
   B.) all users that are not owners
   C.) all users in the system
   D.) none of the mentioned

Answer: Option 'C'

​all users in the system

15.

Many systems recognize three classifications of users in connection with each file (to condense the access control list) :

   A.) Owner
   B.) Group
   C.) Universe
   D.) All of the mentioned

Answer: Option 'D'

All of the mentioned

16.

Many systems recognize three classifications of users in connection with each file (to condense the access control list) :

   A.) Owner
   B.) Group
   C.) Universe
   D.) All of the mentioned

Answer: Option 'D'

All of the mentioned

17.

All users in a group get _______ access to a file.

   A.) different
   B.) similar
   C.) same
   D.) none of the mentioned

Answer: Option 'B'

similar

18.

All users in a group get _______ access to a file.

   A.) different
   B.) similar
   C.) same
   D.) none of the mentioned

Answer: Option 'B'

similar

19.

Reliability of files can be increased by :

   A.) keeping the files safely in the memory
   B.) making a different partition for the files
   C.) by keeping them in external storage
   D.) by keeping duplicate copies of the file

Answer: Option 'D'

by keeping duplicate copies of the file

20.

Reliability of files can be increased by :

   A.) keeping the files safely in the memory
   B.) making a different partition for the files
   C.) by keeping them in external storage
   D.) by keeping duplicate copies of the file

Answer: Option 'D'

by keeping duplicate copies of the file


File System Interface Protection - Operating System Questions & Answers Download Pdf

Recent Posts