Home

1000+ Operating System Multiple Choice Question Answer [Solved]

Thursday 9th of March 2023

Sharing is caring

1. A program to be executed must be in ---------------
A. main memory
B. secondary memory
C. virtual memory
D. Read only memory
Answer : A
2. A process may create a new process by executing ___________system call.
A. init
B. fork
C. create
D. new
Answer : B
3. A solution to starvation is _____________.
A. segmentation
B. Aging
C. Paging
D. virtual memory
Answer : B
4. Taskbar is used for
A. Navigation program
B. Start a program
C. Switching between program
D. All of above
Answer : D
5. In ____________ location policies a random node is polled to check its state and the task is transferred if it will not be overloaded; polling is continued until a suitable node is found.
A. Threshold
B. Shortest
C. Bidding
D. Pairing
Answer : A
6. The _________takes any characters from standard input, and then echoes them to standard output.
A. kill character
B. cat command
C. cate command
D. control command
Answer : B
7. Choose the correct statement from the following.
A. In computer terminology, variables are symbols which stand for some value.
B. An alternative method for executing the commands in the file backup is to make the file as directory.
C. The restricted shell gives more control to the system administrator and restricts the options of the user.
D. The decision making done by computer programs is in the form of conditional execution.
Answer : C
8. Having data belonging to two independent processes in the same page is called____________.
A. Buffering
B. Blocking
C. Message-passing
D. False sharing
Answer : D
9. All of the following are TRUE regarding virtual memory EXCEPT
A. Any amount of RAM can be allocated to virtual memory
B. The setting for the amount of hard disk drive space to allocate virtual memory can be manually change
C. This temporary storage is called the swap file or page file
D. Virtual memory is the physical space o the hard drive
Answer : A
10. Bootstrapping is also known as ______
A. cold-hot boot
B. hot boot
C. hot strap
D. cold boot
Answer : D
11. _______________refers to a strategy where whenever a resource is requested, it is only granted if it cannot result in deadlock.
A. Deadlock Prevention
B. Livelock
C. Deadlock avoidance
D. none of these
Answer : C
12. Identify the server:
This type of server generally remains in existence indefinitely. It is shared by many clients. Servers of this type are created and installed before the clients use them.

A. Instance-per-call-servers
B. Persistent Servers
C. Non-Persistent Servers
D. Semantic server
Answer : B
13. Once text has been cut to the clipboard, you can____hat text into another document
A. Copy
B. Paste
C. Transfer
D. None of the above
Answer : B
14. A page fault occurs when
A. the page is not found in the memory
B. the page is found in the memory
C. the Segmentation starts
D. the Deadlock happens
Answer : A
15. The maximum size of a write file is limited to only
A. Name of the file
B. Extension of the file
C. The amount of memory in your computer
D. All of above
Answer : C
16. Transparent RPC mechanism refers to :
A. Existance of multuple computer visible and a provide a single system image to its users.
B. It runs the program transparently.
C. It is a technique to shift the program to other computer.
D. It is technique in which local procedures and remote procedures are indistinguishable to programmers.
Answer : D
17. Underlined text, such as text and folder names is referred to as
A. Hyperlink
B. Menu
C. Source drive
D. None of these
Answer : A
18. When a peripheral device needs immediate attention from the operating system, it generates a(n)
A. Page file
B. Spool
C. Stack
D. Interrupt
Answer : D
19. Which buffering strategy is used for implementing synchronous communication?
A. Single message buffer
B. Unbounded - Capacity buffer
C. Finite-Bound Buffer
D. All can be used.
Answer : A
20. In_________________ model, when a process does a release access, the contents of all the modifications are not immediately sent to other nodes but they are sent only on demand.
A. Release Consistency Model
B. Lazy Release consistency model
C. Weak Consistency Model
D. Processor Consistency Model
Answer : B
21. The name services of DCE include ________
A. the Cell Directory Service
B. the Global Directory Service
C. the Global Directory Agent
D. A,B and C
Answer : D
22. Two clocks are said to be synchronized at a particular instance of time if the difference in time values of the two clocks is less than some specified constant. The difference in time values of two clocks is called ___________.
A. Interrupt
B. Clock Frequency
C. Clock Ticks
D. Clock Skew
Answer : D
23. ______________ selects a process from among the ready processes to execute on the CPU.
A. CPU Scheduler
B. Loader
C. Dispatcher
D. Compiler
Answer : A
24. In case of modification an unauthorized party not only gains access to but tampers with an asset. This is an attack on ____________________.
A. availability
B. confidentiality
C. integrity
D. authenticity
Answer : C
25. Which of the following is an essential file of a MS-DOS boot disk?
A. COMMANCOM
B. START.COM
C. VER.COM
D. TREE.COM
Answer : A
26. A small part of taskbar that has icons of background running applications is
A. Start button
B. Quick launch
C. Task bar
D. System tray
Answer : D
27. _______________occurs when two or more execution flows are able to run simultaneously.
A. Deadlock
B. Concurrency
C. race condition
D. interrupt
Answer : B
28. The time taken by the Dispatcher to stop one process and start another running is known as _________________.
A. Turnaround time
B. Dispatch Latency
C. Access time
D. Response time
Answer : B
29. The two sub systems of user mode layer of windows 2000 are _________ and __________
A. excel, executive
B. environment, integral
C. orbit , kernel
D. Kernel , executive
Answer : B
30. You can use print manage window
A. To cancel the print job
B. To check status of files in the print queue
C. To interrupt printing
D. All of the above
Answer : D
31. Process migration involves__________________
A. Selection of a process to be migrated
B. Selection of destination system or node
C. Actual transfer of the selected process to the destination system or node
D. All A, B, C
Answer : D
32. Which components appear in the initial Windows start up display?
A. Start menu
B. Dialog boxes
C. Taskbar
D. All of above
Answer : C
33. Which command is used to display the contents of the text file of DOS?
A. Copy
B. Copy con
C. Dir
D. Type
Answer : D
34. _____________ manage the name spaces and binds an object to its location.
A. Name Server
B. Name agent
C. Context
D. Name resolution
Answer : A
35. An operating system version designed for use with a media center PC is Microsoft Windows XP
A. Media center edition
B. Home edition
C. Tablet PC edition
D. None of above
Answer : A
36. Windows 2000 supports -------------- type of file system
A. NTFS
B. EFS
C. FEFS
D. EFFS
Answer : A
37. A _____________is a collection of processors that do not share memory, peripheral devices,or a clock.
A. Computer system
B. distributed system
C. network
D. None of the above
Answer : B
38. Recently deleted files are stored in
A. Taskbar
B. Desktop
C. My computer
D. Recycle bin
Answer : D
39. IPC stands for _________
A. Integrated parallel communication
B. Intermediate process call
C. Internal program call
D. Inter process communication
Answer : D
40. A _______________in a distributed system is a string of bits or characters that is used to refer to an entity.
A. name
B. attribute
C. identifiers
D. addresses
Answer : A
41. In case of ____________________transparency a file can transparently move to another server.
A. Location
B. Migration
C. Replication
D. Concurrency
Answer : B
42. In MS-DOS, the interfaces and levels of functionality are _______________
A. not well separated.
B. well separated
C. independent
D. dependent
Answer : A
43. A process control block contains varies attributes required by _____________ to control a process.
A. RAM
B. virtual memory
C. BIOS
D. Operating System
Answer : D
44. The _____________ are based on modification of the original message in some manner, or on creation of a false message.
A. Passive attack
B. Release of message content attack
C. Traffic analysis attack
D. Active attack
Answer : D
45. ______________ are popular way to improve application through parallelism.
A. Processes
B. Threads
C. Context switching
D. none of these
Answer : B
46. Load balancing algorithms in ______________ class use the processor and process characteristics to allocate processes to nodes.
A. Static
B. Dynamic
C. Deterministic
D. Probabilistic
Answer : C
47. Which one of the following statements is true?
A. The cat command cares which file it receives as input or where the input goes.
B. Relative pathnames begin with something other than the slash character
C. UNIX shells never remember their current working directory (CW.
D. The cat command interprets -X as an option character rather than a pathname.
Answer : B
48. Objects location is found by _________________
A. Broadcasting
B. Encoding Location of objects within UID
C. Searching creator node first and then broadcasting
D. All A, B, C
Answer : D
49. Most accurate global time is based on oscillations of the ______________
A. Cesium-130 atom
B. Cesium-133 atom
C. Cesium-136 atom
D. Cesium-139 atom
Answer : B
50. The primary purpose of an operating system is:
A. To allow people to use the computer,
B. To make the most efficient use of the computer hardware
C. To make computers easier to use
D. To keep systems programmers employed
Answer : B

Sharing is caring