File System Interface Protection - Operating System Questions & Answers

1.

Disks are segmented into one or more partitions, each containing a file system or ______

   A.) left ‘raw’
   B.) made into swap space
   C.) made into backup space
   D.) left ‘ripe’

Answer: Option 'A'

left ‘raw’

2.

Disks are segmented into one or more partitions, each containing a file system or ______

   A.) left ‘raw’
   B.) made into swap space
   C.) made into backup space
   D.) left ‘ripe’

Answer: Option 'A'

left ‘raw’

3.

In UNIX, the directory protection is handled _________ to the file protection.

   A.) different
   B.) similar
   C.) it is not handled at all
   D.) none of the mentioned

Answer: Option 'B'

​similar

4.

In UNIX, the directory protection is handled _________ to the file protection.

   A.) different
   B.) similar
   C.) it is not handled at all
   D.) none of the mentioned

Answer: Option 'B'

​similar

5.

In a multi level directory structure :

   A.) the same previous techniques will be used as in the other structures
   B.) a mechanism for directory protection will have to applied
   C.) the subdirectories do not need protection once the directory is protected
   D.) none of the mentioned

Answer: Option 'B'

​a mechanism for directory protection will have to applied

6.

In a multi level directory structure :

   A.) the same previous techniques will be used as in the other structures
   B.) a mechanism for directory protection will have to applied
   C.) the subdirectories do not need protection once the directory is protected
   D.) none of the mentioned

Answer: Option 'B'

​a mechanism for directory protection will have to applied

7.

If each access to a file is controlled by a password, then the disadvantage is that :

   A.) user will need to remember a lot of passwords
   B.) it is not reliable
   C.) it is not efficient
   D.) all of the mentioned

Answer: Option 'A'

user will need to remember a lot of passwords

8.

If each access to a file is controlled by a password, then the disadvantage is that :

   A.) user will need to remember a lot of passwords
   B.) it is not reliable
   C.) it is not efficient
   D.) all of the mentioned

Answer: Option 'A'

user will need to remember a lot of passwords

9.

To control access the three bits used in UNIX are represented by :

   A.) r
   B.) w
   C.) x
   D.)

Answer: Option ''

all of the mentioned

10.

To control access the three bits used in UNIX are represented by :

   A.) r
   B.) w
   C.) x
   D.)

Answer: Option ''

all of the mentioned

File System Interface Protection - Operating System Questions & Answers Download Pdf

Recent Posts