Home

1000+ Operating System Multiple Choice Question Answer [Solved]

Thursday 9th of March 2023

Sharing is caring

1. A shared memory segment first needs to be allocated (create, using the__________ system call.
A. semget()
B. msgrcv()
C. shmget()
D. mknod()
Answer : C
2. In MS-DOS, the interfaces and levels of functionality are _______________
A. not well separated.
B. well separated
C. independent
D. dependent
Answer : A
3. An operating system version designed for use with a media center PC is Microsoft Windows XP
A. Media center edition
B. Home edition
C. Tablet PC edition
D. None of above
Answer : A
4. Taskbar is used for
A. Navigation program
B. Start a program
C. Switching between program
D. All of above
Answer : D
5. Which of the following is an essential file of a MS-DOS boot disk?
A. COMMANCOM
B. START.COM
C. VER.COM
D. TREE.COM
Answer : A
6. The name services of DCE include ________
A. the Cell Directory Service
B. the Global Directory Service
C. the Global Directory Agent
D. A,B and C
Answer : D
7. Which of the following is suitable after you install new drivers?
A. Hibernate
B. Sleep
C. Restart
D. Shut Down
Answer : C
8. _______________occurs when two or more execution flows are able to run simultaneously.
A. Deadlock
B. Concurrency
C. race condition
D. interrupt
Answer : B
9. In case of modification an unauthorized party not only gains access to but tampers with an asset. This is an attack on ____________________.
A. availability
B. confidentiality
C. integrity
D. authenticity
Answer : C
10. The ______________ unpacks the call receipt messages from local RPC Runtime and makes a perfect local call to invoke the appropriate procedure in the server.
A. server Stub
B. server
C. client
D. client stub
Answer : A
11. What is Dr. Watson?
A. IT Expert
B. Diagnosis tool
C. Surgeon
D. None
Answer : B
12. BSD stands for_____________________
A. Basic Software Division
B. Berkeley Software Distribution
C. British Software Distribution
D. Berkeley Software data
Answer : B
13. A process is _________________
A. program in main memory
B. Program in cache memory
C. program in secondary storage
D. program in execution
Answer : D
14. ___________variable is not automatically created on all UNIX systems but is used by so many programs that it is considered a standard environment variable.
A. IFS
B. MAIL
C. TERM
D. PATH
Answer : C
15. Which of the following does not occur during the power-on-self-test (POST)?
A. The scandisk utility begins to run
B. The video card and video memory are tested
C. The BIOS identification process occurs
D. Memory chip are checked to ensure that they are working properly
Answer : A
16. Having data belonging to two independent processes in the same page is called____________.
A. Buffering
B. Blocking
C. Message-passing
D. False sharing
Answer : D
17. Process migration involves__________________
A. Selection of a process to be migrated
B. Selection of destination system or node
C. Actual transfer of the selected process to the destination system or node
D. All A, B, C
Answer : D
18. You can move a window to a different position on your screen by dragging it by its
A. Tail
B. Move handle
C. Status bar
D. Title bar
Answer : B
19. _____________ manage the name spaces and binds an object to its location.
A. Name Server
B. Name agent
C. Context
D. Name resolution
Answer : A
20. In the case of____________ , changes to an open file are only locally visible.
A. session semantics
B. immutable files
C. atomic transactions
D. None of the above.
Answer : A
21. A bar that inform you the available options in your computer, opened applications, background running applications and can be used to switch between applications quickly is
A. Menu bar
B. Tool bar
C. Status bar
D. Task bar
Answer : D
22. DSM stands for______________
A. Direct shared memory
B. Direct system memory
C. Distributed shared memory
D. Distributed system memory
Answer : C
23. _______refers to the block size of the DSM system, i.e. to the units of sharing and the unit of data transfer across the network when a network block fault occurs.
A. Granularity
B. Coherence
C. Abstraction
D. Synchronization
Answer : A
24. _________, as a feature of good distributed file system, clients should be able to continue working if a file server crashes. Likewise, data must not be lost and a restarted file server must be able to recover to a valid state.
A. Scalability
B. Reliability
C. Flexibility
D. Fault tolerance
Answer : D
25. SRM stands for
A. Security Resource Manager
B. Secret Resource Manager
C. Security Reference Monitor
D. Security Reference Manual
Answer : C
26. In___________, the requesting device or devices assert the signal bus_request.
A. Priority encoded arbitration
B. Distributed arbitration by self-selection
C. Priority arbitration
D. Daisy chain arbitration
Answer : D
27. Once text has been cut to the clipboard, you can____hat text into another document
A. Copy
B. Paste
C. Transfer
D. None of the above
Answer : B
28. A _______________in a distributed system is a string of bits or characters that is used to refer to an entity.
A. name
B. attribute
C. identifiers
D. addresses
Answer : A
29. Which components appear in the initial Windows start up display?
A. Start menu
B. Dialog boxes
C. Taskbar
D. All of above
Answer : C
30. Transparent RPC mechanism refers to :
A. Existance of multuple computer visible and a provide a single system image to its users.
B. It runs the program transparently.
C. It is a technique to shift the program to other computer.
D. It is technique in which local procedures and remote procedures are indistinguishable to programmers.
Answer : D
31. In case of good process migration mechanism, _____________ means failure of any node other than the one on which the process is running should not affect the execution of the process.
A. Robustness
B. Efficiency
C. Transparent
D. Interference
Answer : A
32. Which components appear in the initial windows start up display?
A. Dialog box
B. Task bar
C. Start menu
D. All of the above
Answer : B
33. What is dispatch latency?
A. The time taken by the dispatcher to stop one process and start another
B. The whole time taken by all processor
C. The time taken by the processor to write a file into disk
D. None of Above
Answer : A
34. Wiretapping to capture data in a network is an example of ________________
A. interruption
B. interception
C. fabrication
D. modification
Answer : B
35. Which buffering strategy is used for implementing synchronous communication?
A. Single message buffer
B. Unbounded - Capacity buffer
C. Finite-Bound Buffer
D. All can be used.
Answer : A
36. A program to be executed must be in ---------------
A. main memory
B. secondary memory
C. virtual memory
D. Read only memory
Answer : A
37. In ____________ location policies a random node is polled to check its state and the task is transferred if it will not be overloaded; polling is continued until a suitable node is found.
A. Threshold
B. Shortest
C. Bidding
D. Pairing
Answer : A
38. Which of the following is/are external commands?
A. Edit
B. Label
C. Sys
D. All of above
Answer : D
39. The usual su command syntax is
A. su-pwd
B. su-pd
C. su - userID
D. Sue- ID
Answer : C
40. In case of ________________the server automatically copies files to other servers after the files are written.
A. Explicit replication
B. Implicit replication
C. Lazy file replication
D. Group file replication
Answer : C
41. A sequence of instructions telling the computer what to do is called a_____________
A. program
B. language
C. translator
D. package
Answer : A
42. The problem with logical dumping is ________________
A. very costly
B. very slow
C. human errors
D. all of these
Answer : B
43. Which is the layer of a computer system between the hardware and the user program
A. Operating system
B. Operating environment
C. System environment
D. None
Answer : B
44. Which of the following is drop down list?
A. Combo box
B. List
C. Text area
D. None
Answer : A
45. Initialization of I/O devices is part of the_________.
A. CPU
B. MSDOS
C. UNIX kernel
D. None of the above
Answer : C
46. The ___ contains commands associated with the My Computer window
A. Start menu
B. Standard menu
C. System menu
D. None of the above
Answer : C
47. A page fault occurs when
A. the page is not found in the memory
B. the page is found in the memory
C. the Segmentation starts
D. the Deadlock happens
Answer : A
48. When a child dies, it sends a _______________signal to its parent.
A. SIGCHLD
B. EDEADLK
C. WNOHANG
D. SEDECHLD
Answer : A
49. A process is ____________________
A. A program in Execution.
B. An asynchronous activity.
C. The 'dispatchable' unit.
D. All A, B, C
Answer : D
50. The Bankers algorithm is used
A. to prevent deadlock
B. to rectify deadlock
C. to detect deadlock
D. to slove deadlock
Answer : A

Sharing is caring