Home

1000+ Operating System MCQ for LIC ADO [Solved]

Thursday 9th of March 2023

Sharing is caring

1. Which command is used to display the contents of the text file of DOS?
A. Copy
B. Copy con
C. Dir
D. Type
Answer : D
2. A small part of taskbar that has icons of background running applications is
A. Start button
B. Quick launch
C. Task bar
D. System tray
Answer : D
3. One of the wonderful things about UNIX is its ___________names.
A. Unlimited path
B. Unlimited directory
C. Limited path
D. Limited file
Answer : A
4. You can move a window to a different position on your screen by dragging it by its
A. Tail
B. Move handle
C. Status bar
D. Title bar
Answer : B
5. Which components appear in the initial Windows start up display?
A. Start menu
B. Dialog boxes
C. Taskbar
D. All of above
Answer : C
6. When resources have multiple instances ________ is used for deadlock Avoidance.
A. Bankers algorithm
B. Resource Allocation Graph
C. semaphores
D. all of these
Answer : A
7. _______________occurs when two or more execution flows are able to run simultaneously.
A. Deadlock
B. Concurrency
C. race condition
D. interrupt
Answer : B
8. In the case of____________, message remains in the senders address space until the receiver executes the corresponding receive.
A. No buffering
B. Single message buffering
C. Unbounded-capacity buffer
D. Finite bound buffer
Answer : A
9. Recently deleted files are stored in
A. Taskbar
B. Desktop
C. My computer
D. Recycle bin
Answer : D
10. In layered approach each layer uses the functions and services of ------------------
A. kernel
B. lower-level layers
C. higher-level layers
D. all of these
Answer : B
11. BSD stands for_____________________
A. Basic Software Division
B. Berkeley Software Distribution
C. British Software Distribution
D. Berkeley Software data
Answer : B
12. A shared memory segment first needs to be allocated (create, using the__________ system call.
A. semget()
B. msgrcv()
C. shmget()
D. mknod()
Answer : C
13. __________ deals with when a modified page should be written out to secondary memory.
A. Cleaning policy
B. Fetch policy
C. Frame locking
D. None
Answer : A
14. The find command is different from most UNIX commands in that each of the argument expressions following the beginning path name is considered a _____________
A. action expression
B. Boolean expression.
C. Boolean constant
D. Search qualifiers
Answer : B
15. A SCSI device can transfer up to----------- of information per second.
A. 40 Mbytes
B. 60 Mbytes
C. 40 Gbytes
D. 60 Gbytes
Answer : A
16. ______________is a mechanism the prevents two or more processes from accessing a shared resource simultaneously.
A. Livelock
B. Preemption
C. Semaphore
D. either or
Answer : C
17. The Network Time Protocol is similar to _______________algorithm in that synchronization is also performed using time servers and an attempt is made to correct for communication latencies.
A. Banker's
B. Divide and conquer's
C. Cristians
D. Xdelta's
Answer : C
18. A solution to starvation is _____________.
A. segmentation
B. Aging
C. Paging
D. virtual memory
Answer : B
19. In case of modification an unauthorized party not only gains access to but tampers with an asset. This is an attack on ____________________.
A. availability
B. confidentiality
C. integrity
D. authenticity
Answer : C
20. The two sub systems of user mode layer of windows 2000 are _________ and __________
A. excel, executive
B. environment, integral
C. orbit , kernel
D. Kernel , executive
Answer : B
21. Which of the following is suitable after you install new drivers?
A. Hibernate
B. Sleep
C. Restart
D. Shut Down
Answer : C
22. The _________takes any characters from standard input, and then echoes them to standard output.
A. kill character
B. cat command
C. cate command
D. control command
Answer : B
23. When copying more than one file at a time, you must specify an existing directory as the ___________
A. Source
B. Sub directory
C. Destination.
D. Path name
Answr : C
24. The Basic Input Output System (BIOS) resides in
A. RAM
B. ROM
C. The CPU
D. Memory Cache
Answer : B
25. What is dispatch latency?
A. The time taken by the dispatcher to stop one process and start another
B. The whole time taken by all processor
C. The time taken by the processor to write a file into disk
D. None of Above
Answer : A
26. In case of ________________the server automatically copies files to other servers after the files are written.
A. Explicit replication
B. Implicit replication
C. Lazy file replication
D. Group file replication
Answer : C
27. ______________is responsible for allocating primary memory to processes and for assisting the programmer in loading and storing the contents of the primary memory.
A. Operating system
B. Memory manager
C. Database administrator
D. RAM
Answer : B
28. DSM stands for______________
A. Direct shared memory
B. Direct system memory
C. Distributed shared memory
D. Distributed system memory
Answer : C
29. Whenever you move a directory from one location to another
A. The directory is moved the source file is not moved
B. All the subdirectory inside that directory are moved
C. All files inside the directory are moved
D. Both b and c
Answer : A
30. Which of the following is not essential to shut down your computer?
A. XCOPY
B. Edit
C. Sys
D. None of the above
Answer : D
31. Identify the distributed computing model from the following statement. In this model, the user's processes need not be migrated to the server machines for getting the work done by those machines.
A. Minicomputer model
B. Workstation model
C. Workstation-Server model
D. Processor pool model
Answer : C
32. ____________ file system allows sharing in multiple different locations grouped under one folder.
A. Direct
B. distributed
C. sequential
D. parallel
Answer : B
33. __ is the program run on a computer when the computer boots up
A. System software
B. Operating system
C. System operations
D. None
Answer : B
34. Identify the server:
This type of server generally remains in existence indefinitely. It is shared by many clients. Servers of this type are created and installed before the clients use them.

A. Instance-per-call-servers
B. Persistent Servers
C. Non-Persistent Servers
D. Semantic server
Answer : B
35. A process is ____________________
A. A program in Execution.
B. An asynchronous activity.
C. The 'dispatchable' unit.
D. All A, B, C
Answer : D
36. What do you mean by 0-reliable level in multicast communication?
A. Multiple responses is expected from any receivers.
B. No response is expected from any receivers.
C. Multiple responses is expected from multiple receivers.
D. A multicast message is received by all the members of the group or none.
Answer : B
37. _____________typically contains temporary data such as subroutine parameter, return address, and temporary variables.
A. Current value of Program Counter
B. Value of the variables
C. The process stack
D. A data section
Answer : C
38. In ________________________ each node periodically sends a message to the time server.
A. Passive Time Server Centralized Algorithm
B. Active Time Server Centralized Algorithm
C. Global Averaging Distributed Algorithms
D. Localized Averaging Distributed Algorithms
Answer : A
39. An orphan process is automatically inherited by the _____and becomes a _______ of this process.
A. 'init' process, father
B. 'init' process, child
C. 'initial process, father
D. 'it' process, child
Answer : B
40. Objects location is found by _________________
A. Broadcasting
B. Encoding Location of objects within UID
C. Searching creator node first and then broadcasting
D. All A, B, C
Answer : D
41. In case of ____________________transparency a file can transparently move to another server.
A. Location
B. Migration
C. Replication
D. Concurrency
Answer : B
42. Which of the following does not occur during the power-on-self-test (POST)?
A. The scandisk utility begins to run
B. The video card and video memory are tested
C. The BIOS identification process occurs
D. Memory chip are checked to ensure that they are working properly
Answer : A
43. The primary purpose of an operating system is:
A. To allow people to use the computer,
B. To make the most efficient use of the computer hardware
C. To make computers easier to use
D. To keep systems programmers employed
Answer : B
44. A two-byte integer called ____________is interpreted as an index into an array of inodes in a fixed, known location on disk.
A. an inoe
B. an inumber
C. an imap
D. an imark
Answer : B
45. ___________variable is not automatically created on all UNIX systems but is used by so many programs that it is considered a standard environment variable.
A. IFS
B. MAIL
C. TERM
D. PATH
Answer : C
46. PVM stands for
A. Parallel Virtual Machine
B. Parallel Virtual Message
C. Process Virtual Machine
D. Process Virtual Monitor
Answer : A
47. _____________ manage the name spaces and binds an object to its location.
A. Name Server
B. Name agent
C. Context
D. Name resolution
Answer : A
48. The name services of DCE include ________
A. the Cell Directory Service
B. the Global Directory Service
C. the Global Directory Agent
D. A,B and C
Answer : D
49. Process migration involves__________________
A. Selection of a process to be migrated
B. Selection of destination system or node
C. Actual transfer of the selected process to the destination system or node
D. All A, B, C
Answer : D
50. The essential difference between an operating system like Linux and one like Windows is that
A. Linux is a proprietary whereas Windows is not
B. Windows can run with an Intel processor, whereas Linux cannot
C. There are multiple versions of Linux, but only one version of Windows
D. Any programmer can modify Linux code which is not permitted with Windows
Answer : D

Sharing is caring