System Administrator 2026
_______ and ________ are the most common strategies used to select a free hole from the set of available holes.
  • A. First fit, best fit
  • B. Worst fit, first fit
  • C. Best fit, worst fit
  • D. None of the mentioned
The first fit and best fit algorithms suffer from _____________
  • A. Internal fragmentation
  • B. External fragmentation
  • C. Starvation
  • D. All of the mentioned
To solve the problem of external fragmentation ________ needs to be done periodically.
  • A. Compaction
  • B. Check
  • C. Formatting
  • D. Replacing memory
If too little space is allocated to a file _____________
  • A. The file will not work
  • B. There will not be any space for the data, as the fcb takes it all
  • C. The file cannot be extended
  • D. The file cannot be opened
A machine in Network file system (NFS) can be ________
  • A. Client
  • B. Server
  • C. Both client and server
  • D. Neither client nor server
A _________ directory is mounted over a directory of a _______ file system.
  • A. Local, remote
  • B. Remote, local
  • C. Local, local
  • D. None of the mentioned
The _________ becomes the name of the root of the newly mounted directory.
  • A. Root of the previous directory
  • B. Local directory
  • C. Remote directory itself
  • D. None of the mentioned
The mount mechanism ________ a transitive property.
  • A. Exhibits
  • B. Does not exhibit
  • C. May exhibit
  • D. None of the mentioned
A mount operation includes the _____________
  • A. Name of the network
  • B. Name of the remote directory to be mounted
  • C. Name of the server machine storing it
  • D. All of the mentioned