Home

ESIC - Operating System 1000+ MCQ [Solved] PDF Download

Thursday 9th of March 2023

Sharing is caring

1. _______________occurs when two or more execution flows are able to run simultaneously.
A. Deadlock
B. Concurrency
C. race condition
D. interrupt
Answer : B
2. Bootstrapping is also known as ______
A. cold-hot boot
B. hot boot
C. hot strap
D. cold boot
Answer : D
3. __________ deals with when a modified page should be written out to secondary memory.
A. Cleaning policy
B. Fetch policy
C. Frame locking
D. None
Answer : A
4. A page fault occurs when
A. the page is not found in the memory
B. the page is found in the memory
C. the Segmentation starts
D. the Deadlock happens
Answer : A
5. ______________ selects a process from among the ready processes to execute on the CPU.
A. CPU Scheduler
B. Loader
C. Dispatcher
D. Compiler
Answer : A
6. A shared memory segment first needs to be allocated (create, using the__________ system call.
A. semget()
B. msgrcv()
C. shmget()
D. mknod()
Answer : C
7. In _______, if a processor writes the value 100 to the memory location x, this write operation will only change the contents of its local memory and will not affect the contents of the memory of any other processor.
A. Tightly coupled systems,
B. Loosely coupled systems
C. Parallel processing systems
D. File management system
Answer : B
8. Find out the characteristics of System-oriented names:
A. They are large integers or bit strings.
B. They are of the same size
C. Generally shorter than human-oriented names and are easy for manipulations like hashing, sorting and so on.
D. All A, B, C
Answer : D
9. The two sub systems of user mode layer of windows 2000 are _________ and __________
A. excel, executive
B. environment, integral
C. orbit , kernel
D. Kernel , executive
Answer : B
10. Which of the following does not occur during the power-on-self-test (POST)?
A. The scandisk utility begins to run
B. The video card and video memory are tested
C. The BIOS identification process occurs
D. Memory chip are checked to ensure that they are working properly
Answer : A
11. The maximum size of a write file is limited to only
A. Name of the file
B. Extension of the file
C. The amount of memory in your computer
D. All of above
Answer : C
12. The essential difference between an operating system like Linux and one like Windows is that
A. Linux is a proprietary whereas Windows is not
B. Windows can run with an Intel processor, whereas Linux cannot
C. There are multiple versions of Linux, but only one version of Windows
D. Any programmer can modify Linux code which is not permitted with Windows
Answer : D
13. An option commonly takes the form of a _____followed by __________characters.
A. dot, one or more
B. dash, only one
C. dash, one or more
D. dot,only two
Answer : C
14. Which one of the following statements is true?
A. The cat command cares which file it receives as input or where the input goes.
B. Relative pathnames begin with something other than the slash character
C. UNIX shells never remember their current working directory (CW.
D. The cat command interprets -X as an option character rather than a pathname.
Answer : B
15. The Bankers algorithm is used
A. to prevent deadlock
B. to rectify deadlock
C. to detect deadlock
D. to slove deadlock
Answer : A
16. Two clocks are said to be synchronized at a particular instance of time if the difference in time values of the two clocks is less than some specified constant. The difference in time values of two clocks is called ___________.
A. Interrupt
B. Clock Frequency
C. Clock Ticks
D. Clock Skew
Answer : D
17. Which of the following is drop down list?
A. Combo box
B. List
C. Text area
D. None
Answer : A
18. When resources have multiple instances ________ is used for deadlock Avoidance.
A. Bankers algorithm
B. Resource Allocation Graph
C. semaphores
D. all of these
Answer : A
19. ______________ occurs when multiple processes or threads read and write data items so that the final result depends on the order of execution of instructions in the multiple processes.
A. Race condition
B. Mutual exclusion
C. Exception
D. Interrupt
Answer : A
20. _______________refers to a strategy where whenever a resource is requested, it is only granted if it cannot result in deadlock.
A. Deadlock Prevention
B. Livelock
C. Deadlock avoidance
D. none of these
Answer : C
21. When a peripheral device needs immediate attention from the operating system, it geerates a(n)
A. Page file
B. Spool
C. Stack
D. Interrupt
Answer : D
22. Objects location is found by _________________
A. Broadcasting
B. Encoding Location of objects within UID
C. Searching creator node first and then broadcasting
D. All A, B, C
Answer : D
23. In the case of____________, message remains in the senders address space until the receiver executes the corresponding receive.
A. No buffering
B. Single message buffering
C. Unbounded-capacity buffer
D. Finite bound buffer
Answer : A
24. A process is already split into pieces, called________________.
A. Tasks
B. Program
C. Processors
D. Routines
Answer : A
25. Creation of a semaphore set is done using the _______system call.
A. semget()
B. semsget()
C. mknod()
D. sempget()
Answer : A
26. Because the I/O devices are not synchronized with the CPU, some information must be exchanged between the CPU and the device to ensure that the data is received reliably. This interaction between the CPU and an I/O device is usually referred to as ____________
A. polling
B. arbitration
C. handshaking
D. interrupting
Answer : C
27. When you start up the computer the boot up storage at which the BIOS versions manufacturer and data are displayed on the monitor is called
A. Bootstrap
B. System configuration
C. Power on self test (POST)
D. Kernel loading
Answer : C
28. Initialization of I/O devices is part of the_________.
A. CPU
B. MSDOS
C. UNIX kernel
D. None of the above
Answer : C
29. Choose the correct statement from the following.
A. In computer terminology, variables are symbols which stand for some value.
B. An alternative method for executing the commands in the file backup is to make the file as directory.
C. The restricted shell gives more control to the system administrator and restricts the options of the user.
D. The decision making done by computer programs is in the form of conditional execution.
Answer : C
30. The early ARPAnet is an example of a distributed computing system based on the ________________.
A. Minicomputer model
B. Workstation model
C. Hybrid model
D. Processor pool model
Answer : A
31. Which buffering strategy is used for implementing synchronous communication?
A. Single message buffer
B. Unbounded - Capacity buffer
C. Finite-Bound Buffer
D. All can be used.
Answer : A
32. You can use print manage window
A. To cancel the print job
B. To check status of files in the print queue
C. To interrupt printing
D. All of the above
Answer : D
33. Process migration involves__________________
A. Selection of a process to be migrated
B. Selection of destination system or node
C. Actual transfer of the selected process to the destination system or node
D. All A, B, C
Answer : D
34. A SCSI device can transfer up to----------- of information per second.
A. 40 Mbytes
B. 60 Mbytes
C. 40 Gbytes
D. 60 Gbytes
Answer : A
35. ______________ is a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function.
A. Semaphore
B. Deadlock
C. Mutual Exclusion
D. No preemption
Answer : B
36. ______________is a mechanism the prevents two or more processes from accessing a shared resource simultaneously.
A. Livelock
B. Preemption
C. Semaphore
D. either or
Answer : C
37. __ is the program run on a computer when the computer boots up
A. System software
B. Operating system
C. System operations
D. None
Answer : B
38. _________, as a feature of good distributed file system, clients should be able to continue working if a file server crashes. Likewise, data must not be lost and a restarted file server must be able to recover to a valid state.
A. Scalability
B. Reliability
C. Flexibility
D. Fault tolerance
Answer : D
39. Which of the following is/are external commands?
A. Edit
B. Label
C. Sys
D. All of above
Answer : D
40. The algorithm should be scalable i.e. _____________.
A. The system should not enter a state in which nodes spend all their time migrating processes or exchanging control messages without doing any useful work.
B. The system should be able to handle small and large networked systems.
C. The algorithm should not be affected by the crash of one or more nodes in the system.
D. The process assignment decisions should be based on the current load of the system and not on some fixed static policy.
Answer : B
41. Which one is true for unconditional disk formatting?
A. Transfer system files after format
B. Do not check/scan surface after format
C. Destroys every byte of ata on a disk by overwriting it with with blank spaces
D. All of above
Answer : C
42. RPN stands for
A. Reverse Polish Notation
B. Record Police Notation
C. Record Polish Notation
D. Reverse Police Negation
Answer : A
43. What is the function of radio button?
A. To select multiple option
B. To select single option
C. To select all option
D. All of above
Answer : B
44. The command used to create logical drive for specific location of disk
A. Format
B. Fdisk
C. Subst
D. All of the above
Answer : C
45. You can move a window to a different position on your screen by dragging it by its
A. Tail
B. Move handle
C. Status bar
D. Title bar
Answer : B
46. The Network Time Protocol is similar to _______________algorithm in that synchronization is also performed using time servers and an attempt is made to correct for communication latencies.
A. Banker's
B. Divide and conquer's
C. Cristians
D. Xdelta's
Answer : C
47. The usual su command syntax is
A. su-pwd
B. su-pd
C. su - userID
D. Sue- ID
Answer : C
48. The date and time displays on
A. Taskbar
B. Launch pad
C. Status bar
D. System tray
Answer : D
49. ______________is responsible for allocating primary memory to processes and for assisting the programmer in loading and storing the contents of the primary memory.
A. Operating system
B. Memory manager
C. Database administrator
D. RAM
Answer : B
50. _____________ manage the name spaces and binds an object to its location.
A. Name Server
B. Name agent
C. Context
D. Name resolution
Answer : A

Sharing is caring