Home

1000+ Operating System MCQ for NEET PG [Solved]

Thursday 9th of March 2023

Sharing is caring

1. A process is _________________
A. program in main memory
B. Program in cache memory
C. program in secondary storage
D. program in execution
Answer : D
2. A _____________is a collection of processors that do not share memory, peripheral devices,or a clock.
A. Computer system
B. distributed system
C. network
D. None of the above
Answer : B
3. An option commonly takes the form of a _____followed by __________characters.
A. dot, one or more
B. dash, only one
C. dash, one or more
D. dot,only two
Answer : C
4. Windows 2000 supports -------------- type of file system
A. NTFS
B. EFS
C. FEFS
D. EFFS
Answer : A
5. A sequence of instructions telling the computer what to do is called a_____________
A. program
B. language
C. translator
D. package
Answer : A
6. When a peripheral device needs immediate attention from the operating system, it generates a(n)
A. Page file
B. Spool
C. Stack
D. Interrupt
Answer : D
7. A process control block contains varies attributes required by _____________ to control a process.
A. RAM
B. virtual memory
C. BIOS
D. Operating System
Answer : D
8. Which components appear in the initial Windows start up display?
A. Start menu
B. Dialog boxes
C. Taskbar
D. All of above
Answer : C
9. Find out the characteristics of System-oriented names:
A. They are large integers or bit strings.
B. They are of the same size
C. Generally shorter than human-oriented names and are easy for manipulations like hashing, sorting and so on.
D. All A, B, C
Answer : D
10. A process is ____________________
A. A program in Execution.
B. An asynchronous activity.
C. The 'dispatchable' unit.
D. All A, B, C
Answer : D
11. __________ deals with when a modified page should be written out to secondary memory.
A. Cleaning policy
B. Fetch policy
C. Frame locking
D. None
Answer : A
12. When resources have multiple instances ________ is used for deadlock Avoidance.
A. Bankers algorithm
B. Resource Allocation Graph
C. semaphores
D. all of these
Answer : A
13. The find command is different from most UNIX commands in that each of the argument expressions following the beginning path name is considered a _____________
A. action expression
B. Boolean expression.
C. Boolean constant
D. Search qualifiers
Answer : B
14. You can move a window to a different position on your screen by dragging it by its
A. Tail
B. Move handle
C. Status bar
D. Title bar
Answer : B
15. Identify the distributed computing model from the following statement. In this model, the user's processes need not be migrated to the server machines for getting the work done by those machines.
A. Minicomputer model
B. Workstation model
C. Workstation-Server model
D. Processor pool model
Answer : C
16. Taskbar is used for
A. Navigation program
B. Start a program
C. Switching between program
D. All of above
Answer : D
17. The _____________ are based on modification of the original message in some manner, or on creation of a false message.
A. Passive attack
B. Release of message content attack
C. Traffic analysis attack
D. Active attack
Answer : D
18. A small part of taskbar that has icons of background running applications is
A. Start button
B. Quick launch
C. Task bar
D. System tray
Answer : D
19. In case of good process migration mechanism, _____________ means failure of any node other than the one on which the process is running should not affect the execution of the process.
A. Robustness
B. Efficiency
C. Transparent
D. Interference
Answer : A
20. In layered approach each layer uses the functions and services of ------------------
A. kernel
B. lower-level layers
C. higher-level layers
D. all of these
Answer : B
21. ___________variable is not automatically created on all UNIX systems but is used by so many programs that it is considered a standard environment variable.
A. IFS
B. MAIL
C. TERM
D. PATH
Answer : C
22. Fsck conducts a check in _____ phases
A. One
B. Two
C. Five
D. Eight
Answer : C
23. SRM stands for
A. Security ResourceManager
B. Secret Resource Manager
C. Security Reference Monitor
D. Security Reference Manual
Answer : C
24. A _______________in a distributed system is a string of bits or characters that is used to refer to an entity.
A. name
B. attribute
C. identifiers
D. addresses
Answer : A
25. Underlined text, such as text and folder names is referred to as
A. Hyperlink
B. Menu
C. Source drive
D. None of these
Answer : A
26. ______________ occurs when multiple processes or threads read and write data items so that the final result depends on the order of execution of instructions in the multiple processes.
A. Race condition
B. Mutual exclusion
C. Exception
D. Interrupt
Answer : A
27. Objects location is found by _________________
A. Broadcasting
B. Encoding Location of objects within UID
C. Searching creator node first and then broadcasting
D. All A, B, C
Answer : D
28. The problem with logical dumping is ________________
A. very costly
B. very slow
C. human errors
D. all of these
Answer : B
29. In_________________ model, when a process does a release access, the contents of all the modifications are not immediately sent to other nodes but they are sent only on demand.
A. Release Consistency Model
B. Lazy Release consistency model
C. Weak Consistency Model
D. Processor Consistency Model
Answer : B
30. Bootstrapping is also known as ______
A. cold-hot boot
B. hot boot
C. hot strap
D. cold boot
Answer : D
31. Initialization of I/O devices is part of the_________.
A. CPU
B. MSDOS
C. UNIX kernel
D. None of the above
Answer : C
32. A page fault occurs when
A. the page is not found in the memory
B. the page is found in the memory
C. the Segmentation starts
D. the Deadlock happens
Answer : A
33. A shared memory segment first needs to be allocated (create, using the__________ system call.
A. semget()
B. msgrcv()
C. shmget()
D. mknod()
Answer : C
34. Which is the layer of a computer system between the hardware and the user program
A. Operating system
B. Operating environment
C. System environment
D. None
Answer : B
35. In___________, the requesting device or devices assert the signal bus_request.
A. Priority encoded arbitration
B. Distributed arbitration by self-selection
C. Priority arbitration
D. Daisy chain arbitration
Answer : D
36. The operating system is the most common type of ___ Software
A. System
B. Application
C. Word processing software
D. Communication
Answer : A
37. Choose the correct statement from the following.
A. In computer terminology, variables are symbols which stand for some value.
B. An alternative method for executing the commands in the file backup is to make the file as directory.
C. The restricted shell gives more control to the system administrator and restricts the options of the user.
D. The decision making done by computer programs is in the form of conditional execution.
Answer : C
38. Which of the following is drop down list?
A. Combo box
B. List
C. Text area
D. None
Answer : A
39. When you start up the computer the boot up storage at which the BIOS versions manufacturer and data are displayed on the monitor is called
A. Bootstrap
B. System configuration
C. Power on self test (POST)
D. Kernel loading
Answer : C
40. In _______, if a processor writes the value 100 to the memory location x, this write operation will only change the contents of its local memory and will not affect the contents of the memory of any other processor.
A. Tightly coupled systems,
B. Loosely coupled systems
C. Parallel processing systems
D. File management system
Answer : B
41. When a child dies, it sends a _______________signal to its parent.
A. SIGCHLD
B. EDEADLK
C. WNOHANG
D. SEDECHLD
Answer : A
42. The Network Time Protocol is similar to _______________algorithm in that synchronization is also performed using time servers and an attempt is made to correct for communication latencies.
A. Banker's
B. Divide and conquer's
C. Cristians
D. Xdelta's
Answer : C
43. A SCSI device can transfer up to----------- of information per second.
A. 40 Mbytes
B. 60 Mbytes
C. 40 Gbytes
D. 60 Gbytes
Answer : A
44. Two clocks are said to be synchronized at a particular instance of time if the difference in time values of the two clocks is less than some specified constant. The difference in time values of two clocks is called ___________.
A. Interrupt
B. Clock Frequency
C. Clock Ticks
D. Clock Skew
Answer : D
45. In the case of____________, message remains in the senders address space until the receiver executes the corresponding receive.
A. No buffering
B. Single message buffering
C. Unbounded-capacity buffer
D. Finite bound buffer
Answer : A
46. The maximum size of a write file is limited to only
A. Name of the file
B. Extension of the file
C. The amount of memory in your computer
D. All of above
Answer : C
47. The primary purpose of an operating system is:
A. To allow people to use the computer,
B. To make the most efficient use of the computer hardware
C. To make computers easier to use
D. To keep systems programmers employed
Answer : B
48. A standard UNIX system includes a set of ___________ and a set of ___________.
A. Commands ,files
B. Libraries, Applications
C. Libraries, files
D. Files, Applications
Answer : B
49. One of the wonderful things about UNIX is its ___________names.
A. Unlimited path
B. Unlimited directory
C. Limited path
D. Limited file
Answer : A
50. ____________approach can place the data directly into the memory or take the data directly from the memory without direct intervention from the processor.
A. DMA
B. Daisy chain arbitration
C. polling
D. none of these
Answer : A

Sharing is caring