Question
a.
TXT
b.
COM
c.
BAS
d.
BAK
Posted under Operating System
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Which of the following file name extension suggests that the file is Backup copy of another file ?
Similar Questions
Discover Related MCQs
Q. In memory management , a technique called as paging, physical memory is broken into fixed-sized blocks called ___________.
View solution
Q. Disk scheduling involves deciding ?
View solution
Q. Memory protection is normally done by
View solution
Q. Dynamic allocation of storage areas with VSAM files is accomplished by
View solution
Q. Root directory of a disk should be placed
View solution
Q. CPU can access which type of memory directly?
View solution
Q. What is the effect of using a larger block size in a fixed block size file system?
View solution
Q. Consider a system with 32 bit virtual addresses and 1 kbyte page size. Why is it not possible to use one - level page tables for virtual to physical address translation?
View solution
Q. What should be the size of ROM if it is used to store the table for multiplication of two 8 - bit unsigned integers?
View solution
Q. What will happen when we format a floppy disk?
View solution
Q. The capacity of a memory unit = (the number of words) * (the number of bits / words). What will be the number of separate address and data lines needed for a memory of 4k * 16 ?
View solution
Q. What works on the principle of locality?
View solution
Q. The memory allocation scheme subject to “external” fragmentation is
View solution
Q. The different types of tables maintained by the operating system are .............
View solution
Q. Which of the following information not included in memory table ?
View solution
Q. ................. is the time required to move the disk arm to the required track.
View solution
Q. …………. Involves treating main memory as a resource to be allocated to and shared among a number of active processes.
View solution
Q. The …………….. policy segments the disks request queue into sub queues of the length N.
View solution
Q. Memory management is
View solution
Q. Block or Buffer caches are used
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Operating System? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!