Home

1000+ Operating System Multiple Choice Question Answer [Solved]

Thursday 9th of March 2023

Sharing is caring

1. A solution to starvation is _____________.
A. segmentation
B. Aging
C. Paging
D. virtual memory
Answer : B
2. The primary purpose of an operating system is:
A. To allow people to use the computer,
B. To make the most efficient use of the computer hardware
C. To make computers easier to use
D. To keep systems programmers employed
Answer : B
3. A _______________in a distributed system is a string of bits or characters that is used to refer to an entity.
A. name
B. attribute
C. identifiers
D. addresses
Answer : A
4. The controller can access memory in memory cycles which are not used by the particular bank of memory into which the DMA controller is writing data. This approach, called _________
A. interrupting
B. cycle stealing
C. swapping
D. paging
Answer : B
5. Which of the following operating system reads and reacts in actual time?
A. Quick Response System
B. Time Sharing System
C. Batch Processing System
D. Real Time System
Answer : D
6. Ext2 is the standard file system of _______ and uses a block size of_____bytes
A. MS DOS,8K
B. Linux ,1024
C. Linux, 512
D. Unix, 512
Answer : B
7. Which command is used to display the contents of the text file of DOS?
A. Copy
B. Copy con
C. Dir
D. Type
Answer : D
8. All of the following are TRUE regarding virtual memory EXCEPT
A. Any amount of RAM can be allocated to virtual memory
B. The setting for the amount of hard disk drive space to allocate virtual memory can be manually change
C. This temporary storage is called the swap file or page file
D. Virtual memory is the physical space o the hard drive
Answer : A
9. The ______________ unpacks the call receipt messages from local RPC Runtime and makes a perfect local call to invoke the appropriate procedure in the server.
A. server Stub
B. server
C. client
D. client stub
Answer : A
10. The command used to create logical drive for specific location of disk
A. Format
B. Fdisk
C. Subst
D. All of the above
Answer : C
11. Which components appear in the initial windows start up display?
A. Dialog box
B. Task bar
C. Start menu
D. All of the above
Answer : B
12. In MS-DOS, the interfaces and levels of functionality are _______________
A. not well separated.
B. well separated
C. independent
D. dependent
Answer : A
13. __________ deals with when a modified page should be written out to secondary memory.
A. Cleaning policy
B. Fetch policy
C. Frame locking
D. None
Answer : A
14. ____ runs on a computer hardware and serves as a platform for other system to run on
A. System software
B. Operating system
C. Application system
D. All of above
Answer : B
15. IPC stands for _________
A. Integrated parallel communication
B. Intermediate process call
C. Internal program call
D. Inter process communication
Answer : D
16. The essential difference between an operating system like Linux and one like Windows is that
A. Linux is a proprietary whereas Windows is not
B. Windows can run with an Intel processor, whereas Linux cannot
C. There are multiple versions of Linux, but only one version of Windows
D. Any programmer can modify Linux code which is not permitted with Windows
Answer : D
17. When you start up the computer the boot up storage at which the BIOS versions manufacturer and data are displayed on the monitor is called
A. Bootstrap
B. System configuration
C. Power on self test (POST)
D. Kernel loading
Answer : C
18. The early ARPAnet is an example of a distributed computing system based on the ________________.
A. Minicomputer model
B. Workstation model
C. Hybrid model
D. Processor pool model
Answer : A
19. Initialization of I/O devices is part of the_________.
A. CPU
B. MSDOS
C. UNIX kernel
D. None of the above
Answer : C
20. Find out the characteristics of System-oriented names:
A. They are large integers or bit strings.
B. They are of the same size
C. Generally shorter than human-oriented names and are easy for manipulations like hashing, sorting and so on.
D. All A, B, C
Answer : D
21. The primary purpose of an operating system is a …
A. To allow people to use the computer
B. To make the most efficient use of computer hardware
C. To make computer easier to use
D. To keep system programmer employed
Answer : B
22. Once text has been cut to the clipboard, you can____hat text into another document
A. Copy
B. Paste
C. Transfer
D. None of the above
Answer : B
23. What is Dr. Watson?
A. IT Expert
B. Diagnosis tool
C. Surgeon
D. None
Answer : B
24. Pick the wrong statement from the following.
A. UNIX systems originally came with a command interpreter called the Bourne Shell.
B. The cat command takes any characters from standard input, and then echoes them to standard output.
C. A pipe is a means of taking the output of one command and directing it as another command.
D. The manual entry is called a man page, even though it is often more than one page long.
Answer : C
25. Choose the correct statement from the following.
A. In computer terminology, variables are symbols which stand for some value.
B. An alternative method for executing the commands in the file backup is to make the file as directory.
C. The restricted shell gives more control to the system administrator and restricts the options of the user.
D. The decision making done by computer programs is in the form of conditional execution.
Answer : C
26. RPN stands for
A. Reverse Polish Notation
B. Record Police Notation
C. Record Polish Notation
D. Reverse Police Negation
Answer : A
27. A program to be executed must be in ---------------
A. main memory
B. secondary memory
C. virtual memory
D. Read only memory
Answer : A
28. In ____________ location policies a random node is polled to check its state and the task is transferred if it will not be overloaded; polling is continued until a suitable node is found.
A. Threshold
B. Shortest
C. Bidding
D. Pairing
Answer : A
29. Which buffering strategy is used for implementing synchronous communication?
A. Single message buffer
B. Unbounded - Capacity buffer
C. Finite-Bound Buffer
D. All can be used.
Answer : A
30. In_________________ model, when a process does a release access, the contents of all the modifications are not immediately sent to other nodes but they are sent only on demand.
A. Release Consistency Model
B. Lazy Release consistency model
C. Weak Consistency Model
D. Processor Consistency Model
Answer : B
31. In ________________________ each node periodically sends a message to the time server.
A. Passive Time Server Centralized Algorithm
B. Active Time Server Centralized Algorithm
C. Global Averaging Distributed Algorithms
D. Localized Averaging Distributed Algorithms
Answer : A
32. The usual su command syntax is
A. su-pwd
B. su-pd
C. su - userID
D. Sue- ID
Answer : C
33. ____________ file system allows sharing in multiple different locations grouped under one folder.
A. Direct
B. distributed
C. sequential
D. parallel
Answer : B
34. One of the wonderful things about UNIX is its ___________names.
A. Unlimited path
B. Unlimited directory
C. Limited path
D. Limited file
Answer : A
35. ______________ selects a process from among the ready processes to execute on the CPU.
A. CPU Scheduler
B. Loader
C. Dispatcher
D. Compiler
Answer : A
36. ______________ refers to the technology in which some space in hard disk is used as an extension of main memory.
A. Cache memory
B. Paging
C. Virtual memory
D. Associative memory
Answer : C
37. In the case of____________ , changes to an open file are only locally visible.
A. session semantics
B. immutable files
C. atomic transactions
D. None of the above.
Answer : A
38. The maximum size of a write file is limited to only
A. Name of the file
B. Extension of the file
C. The amount of memory in your computer
D. All of above
Answer : C
39. In Windows, start button is used to
A. Device setting
B. Run applications
C. All of above
D. Turn off the system
Answer : C
40. ______________is a mechanism the prevents two or more processes from accessing a shared resource simultaneously.
A. Livelock
B. Preemption
C. Semaphore
D. either or
Answer : C
41. What is the function of radio button?
A. To select multiple option
B. To select single option
C. To select all option
D. All of above
Answer : B
42. An option commonly takes the form of a _____followed by __________characters.
A. dot, one or more
B. dash, only one
C. dash, one or more
D. dot,only two
Answer : C
43. A shared memory segment first needs to be allocated (create, using the__________ system call.
A. semget()
B. msgrcv()
C. shmget()
D. mknod()
Answer : C
44. Whenever you move a directory from one location to another
A. The directory is moved the source file is not moved
B. All the subdirectory inside that directory are moved
C. All files inside the directory are moved
D. Both b and c
Answer : A
45. Process migration involves__________________
A. Selection of a process to be migrated
B. Selection of destination system or node
C. Actual transfer of the selected process to the destination system or node
D. All A, B, C
Answer : D
46. ______________ occurs when multiple processes or threads read and write data items so that the final result depends on the order of execution of instructions in the multiple processes.
A. Race condition
B. Mutual exclusion
C. Exception
D. Interrupt
Answer : A
47. In___________, the requesting device or devices assert the signal bus_request.
A. Priority encoded arbitration
B. Distributed arbitration by self-selection
C. Priority arbitration
D. Daisy chain arbitration
Answer : D
48. Which of the following is drop down list?
A. Combo box
B. List
C. Text area
D. None
Answer : A
49. Objects location is found by _________________
A. Broadcasting
B. Encoding Location of objects within UID
C. Searching creator node first and then broadcasting
D. All A, B, C
Answer : D
50. Which of the following is an essential file of a MS-DOS boot disk?
A. COMMANCOM
B. START.COM
C. VER.COM
D. TREE.COM
Answer : A

Sharing is caring