Home

1000+ Operating System MCQ for NEET [Solved]

Thursday 9th of March 2023

Sharing is caring

1. The Basic Input Output System (BIOS) resides in
A. RAM
B. ROM
C. The CPU
D. Memory Cache
Answer : B
2. ______________ occurs when multiple processes or threads read and write data items so that the final result depends on the order of execution of instructions in the multiple processes.
A. Race condition
B. Mutual exclusion
C. Exception
D. Interrupt
Answer : A
3. In case of ____________________transparency a file can transparently move to another server.
A. Location
B. Migration
C. Replication
D. Concurrency
Answer : B
4. The essential difference between an operating system like Linux and one like Windows is that
A. Linux is a proprietary whereas Windows is not
B. Windows can run with an Intel processor, whereas Linux cannot
C. There are multiple versions of Linux, but only one version of Windows
D. Any programmer can modify Linux code which is not permitted with Windows
Answer : D
5. ______________ selects a process from among the ready processes to execute on the CPU.
A. CPU Scheduler
B. Loader
C. Dispatcher
D. Compiler
Answer : A
6. Choose the correct statement from the following.
A. In computer terminology, variables are symbols which stand for some value.
B. An alternative method for executing the commands in the file backup is to make the file as directory.
C. The restricted shell gives more control to the system administrator and restricts the options of the user.
D. The decision making done by computer programs is in the form of conditional execution.
Answer : C
7. ______________approach simplifies debugging and system verification.
A. Kernel
B. Layered
C. Extended
D. Virtual machine
Answer : B
8. What is Dr. Watson?
A. IT Expert
B. Diagnosis tool
C. Surgeon
D. None
Answer : B
9. ____________approach can place the data directly into the memory or take the data directly from the memory without direct intervention from the processor.
A. DMA
B. Daisy chain arbitration
C. polling
D. none of these
Answer : A
10. _____________ manage the name spaces and binds an object to its location.
A. Name Server
B. Name agent
C. Context
D. Name resolution
Answer : A
11. An option commonly takes the form of a _____followed by __________characters.
A. dot, one or more
B. dash, only one
C. dash, one or more
D. dot,only two
Answer : C
12. Creation of a semaphore set is done using the _______system call.
A. semget()
B. semsget()
C. mknod()
D. sempget()
Answer : A
13. ______________is responsible for allocating primary memory to processes and for assisting the programmer in loading and storing the contents of the primary memory.
A. Operating system
B. Memory manager
C. Database administrator
D. RAM
Answer : B
14. Recently deleted files are stored in
A. Taskbar
B. Desktop
C. My computer
D. Recycle bin
Answer : D
15. __________ deals with when a modified page should be written out to secondary memory.
A. Cleaning policy
B. Fetch policy
C. Frame locking
D. None
Answer : A
16. IDL stands for_____________________
A. Integrated Data library
B. Isolated Data Library
C. Interface Data Language
D. Interface Definition Language
Answer : D
17. SRM stands for
A. Security Resource Manager
B. Secret Resource Manager
C. Security Reference Monitor
D. Security Reference Manual
Answer : C
18. Transparent RPC mechanism refers to :
A. Existance of multuple computer visible and a provide a single system image to its users.
B. It runs the program transparently.
C. It is a technique to shift the program to other computer.
D. It is technique in which local procedures and remote procedures are indistinguishable to programmers.
Answer : D
19. Which of the following is/are external commands?
A. Edit
B. Label
C. Sys
D. All of above
Answer : D
20. _______refers to the block size of the DSM system, i.e. to the units of sharing and the unit of data transfer across the network when a network block fault occurs.
A. Granularity
B. Coherence
C. Abstraction
D. Synchronization
Answer : A
21. Ext2 is the standard file system of _______ and uses a block size of_____bytes
A. MS DOS,8K
B. Linux ,1024
C. Linux, 512
D. Unix, 512
Answer : B
22. __ is the program run on a computer when the computer boots up
A. System software
B. Operating system
C. System operations
D. None
Answer : B
23. A SCSI device can transfer up to----------- of information per second.
A. 40 Mbytes
B. 60 Mbytes
C. 40 Gbytes
D. 60 Gbytes
Answer : A
24. In MS-DOS, the interfaces and levels of functionality are _______________
A. not well separated.
B. well separated
C. independent
D. dependent
Answer : A
25. The algorithm should be scalable i.e. _____________.
A. The system should not enter a state in which nodes spend all their time migrating processes or exchanging control messages without doing any useful work.
B. The system should be able to handle small and large networked systems.
C. The algorithm should not be affected by the crash of one or more nodes in the system.
D. The process assignment decisions should be based on the current load of the system and not on some fixed static policy.
Answer : B
26. _______________occurs when two or more execution flows are able to run simultaneously.
A. Deadlock
B. Concurrency
C. race condition
D. interrupt
Answer : B
27. The primary purpose of an operating system is a …
A. To allow people to use the computer
B. To make the most efficient use of computer hardware
C. To make computer easier to use
D. To keep system programmer employed
Answer : B
28. You can use print manage window
A. To cancel the print job
B. To check status of files in the print queue
C. To interrupt printing
D. All of the above
Answer : D
29. Taskbar is used for
A. Navigation program
B. Start a program
C. Switching between program
D. All of above
Answer : D
30. A bar that inform you the available options in your computer, opened applications, background running applications and can be used to switch between applications quickly is
A. Menu bar
B. Tool bar
C. Status bar
D. Task bar
Answer : D
31. In_________________ model, when a process does a release access, the contents of all the modifications are not immediately sent to other nodes but they are sent only on demand.
A. Release Consistency Model
B. Lazy Release consistency model
C. Weak Consistency Model
D. Processor Consistency Model
Answer : B
32. Underlined text, such as text and folder names is referred to as
A. Hyperlink
B. Menu
C. Source drive
D. None of these
Answer : A
33. Which one of the following statements is true?
A. The cat command cares which file it receives as input or where the input goes.
B. Relative pathnames begin with something other than the slash character
C. UNIX shells never remember their current working directory (CW.
D. The cat command interprets -X as an option character rather than a pathname.
Answer : B
34. Which of the following is drop down list?
A. Combo box
B. List
C. Text area
D. None
Answer : A
35. The _________takes any characters from standard input, and then echoes them to standard output.
A. kill character
B. cat command
C. cate command
D. control command
Answer : B
36. Which one is true for unconditional disk formatting?
A. Transfer system files after format
B. Do not check/scan surface after format
C. Destroys every byte of data on a disk by overwriting it with with blank spaces
D. All of above
Answer : C
37. In case of modification an unauthorized party not only gains access to but tampers with an asset. This is an attack on ____________________.
A. availability
B. confidentiality
C. integrity
D. authenticity
Answer : C
38. The _____________ are based on modification of the original message in some manner, or on creation of a false message.
A. Passive attack
B. Release of message content attack
C. Traffic analysis attack
D. Active attack
Answer : D
39. A shared memory segment first needs to be allocated (create, using the__________ system call.
A. semget()
B. msgrcv()
C. shmget()
D. mknod()
Answer : C
40. An orphan process is automatically inherited by the _____and becomes a _______ of this process.
A. 'init' process, father
B. 'init' process, child
C. 'initial process, father
D. 'it' process, child
Answer : B
41. The Network Time Protocol is similar to _______________algorithm in that synchronization is also performed using time servers and an attempt is made to correct for communication latencies.
A. Banker's
B. Divide and conquer's
C. Cristians
D. Xdelta's
Answer : C
42. A program to be executed must be in ---------------
A. main memory
B. secondary memory
C. virtual memory
D. Read only memory
Answer : A
43. The maximum size of a write file is limitd to only
A. Name of the file
B. Extension of the file
C. The amount of memory in your computer
D. All of above
Answer : C
44. Whenever you move a directory from one location to another
A. The directory is moved the source file is not moved
B. All the subdirectory inside that directory are moved
C. All files inside the directory are moved
D. Both b and c
Answer : A
45. PVM stands for
A. Parallel Virtual Machine
B. Parallel Virtual Message
C. Process Virtual Machine
D. Process Virtual Monitor
Answer : A
46. Which is the layer of a computer system between the hardware and the user program
A. Operating system
B. Operating environment
C. System environment
D. None
Answer : B
47. You can move a window to a different position on your screen by dragging it by its
A. Tail
B. Move handle
C. Status bar
D. Title bar
Answer : B
48. Which of the following operating system reads and reacts in actual time?
A. Quick Response System
B. Time Sharing System
C. Batch Processing System
D. Real Time System
Answer : D
49. Pick the wrong statement from the following.
A. UNIX systems originally came with a command interpreter called the Bourne Shell.
B. The cat command takes any characters from standard input, and then echoes them to standard output.
C. A pipe is a means of taking the output of one command and directing it as another command.
D. The manual entry is called a man page, even though it is often more than one page long.
Answer : C
50. Having data belonging to two independent processes in the same page is called____________.
A. Buffering
B. Blocking
C. Message-passing
D. False sharing
Answer : D

Sharing is caring