Home

GMAT - Operating System 1000+ MCQ [Solved] PDF Download

Thursday 9th of March 2023

Sharing is caring

1. In the case of____________ , changes to an open file are only locally visible.
A. session semantics
B. immutable files
C. atomic transactions
D. None of the above.
Answer : A
2. A bar that inform you the available options in your computer, opened applications, background running applications and can be used to switch between applications quickly is
A. Menu bar
B. Tool bar
C. Status bar
D. Task bar
Answer : D
3. When a child dies, it sends a _______________signal to its parent.
A. SIGCHLD
B. EDEADLK
C. WNOHANG
D. SEDECHLD
Answer : A
4. _____________ manage the name spaces and binds an object to its location.
A. Name Server
B. Name agent
C. Context
D. Name resolution
Answer : A
5. When you start up the computer the boot up storage at which the BIOS versions manufacturer and data are displayed on the monitor is called
A. Bootstrap
B. System configuration
C. Power on self test (POST)
D. Kernel loading
Answer : C
6. Identify the server:
This type of server generally remains in existence indefinitely. It is shared by many clients. Servers of this type are created and installed before the clients use them.

A. Instance-per-call-servers
B. Persistent Servers
C. Non-Persistent Servers
D. Semantic server
Answer : B
7. Ext2 is the standard file system of _______ and uses a block size of_____bytes
A. MS DOS,8K
B. Linux ,1024
C. Linux, 512
D. Unix, 512
Answer : B
8. ______________is responsible for allocating primary memory to processes and for assisting the programmer in loading and storing the contents of the primary memory.
A. Operating system
B. Memory manager
C. Database administrator
D. RAM
Answer : B
9. Objects location is found by _________________
A. Broadcasting
B. Encoding Location of objects within UID
C. Searching creator node first and then broadcasting
D. All A, B, C
Answer : D
10. Which of the following is not essential to shut down your computer?
A. XCOPY
B. Edit
C. Sys
D. None of the above
Answer : D
11. A solution to starvation is _____________.
A. segmentation
B. Aging
C. Paging
D. virtual memory
Answer : B
12. The find command is different from most UNIX commands in that each of the argument expressions following the beginning path name is considered a _____________
A. action expression
B. Boolean expression.
C. Boolean constant
D. Search qualifiers
Answer : B
13. Find out the characteristics of System-oriented names:
A. They are large integers or bit strings.
B. They are of the same size
C. Generally shorter than human-oriented names and are easy for manipulations like hashing, sorting and so on.
D. All A, B, C
Answer : D
14. Which is the layer of a computer system between the hardware and the user program
A. Operating system
B. Operating environment
C. System environment
D. None
Answer : B
15. The Bankers algorithm is used
A. to prevent deadlock
B. to rectify deadlock
C. to detect deadlock
D. to slove deadlock
Answer : A
16. You can move a window to a different position on your screen by dragging it by its
A. Tail
B. Move handle
C. Status bar
D. Title bar
Answer : B
17. When a peripheral device needs immediate attention from the operating system, it generates a(n)
A. Page file
B. Spool
C. Stack
D. Interrupt
Answer : D
18. The ___ contains commands associated with the My Computer window
A. Start menu
B. Standard menu
C. System menu
D. None of the above
Answer : C
19. Which of the following is suitable after you install new drivers?
A. Hibernate
B. Sleep
C. Restart
D. Shut Down
Answer : C
20. The controller can access memory in memory cycles which are not used by the particular bank of memory into which the DMA controller is writing data. This approach, called _________
A. interrupting
B. cycle stealing
C. swapping
D. paging
Answer : B
21. Pick the wrong statement from the following.
A. UNIX systems originally came with a command interpreter called the Bourne Shell.
B. The cat command takes any characters from standard input, and then echoes them to standard output.
C. A pipe is a means of taking the output of one command and directing it as another command.
D. The manual entry is called a man page, even though it is often more than one page long.
Answer : C
22. Which buffering strategy is used for implementing synchronous communication?
A. Single message buffer
B. Unbounded - Capacity buffer
C. Finite-Bound Buffer
D. All can be used.
Answer : A
23. Two clocks are said to be synchronized at a particular instance of time if the difference in time values of the two clocks is less than some specified constant. The difference in time values of two clocks is called ___________.
A. Interrupt
B. Clock Frequency
C. Clock Ticks
D. Clock Skew
Answer : D
24. Windows 2000 supports -------------- type of file system
A. NTFS
B. EFS
C. FEFS
D. EFFS
Answer : A
25. BSD stands for_____________________
A. Basic Software Division
B. Berkeley Software Distribution
C. British Software Distribution
D. Berkeley Software data
Answer : B
26. ______________ selects a process from among the ready processes to execute on the CPU.
A. CPU Scheduler
B. Loader
C. Dispatcher
D. Compiler
Answer : A
27. ______________ occurs when multiple processes or threads read and write data items so that the final result depends on the order of execution of instructions in the multiple processes.
A. Race condition
B. Mutual exclusion
C. Exception
D. Interrupt
Answer : A
28. An operating system version designed for use with a media center PC is Microsoft Windows XP
A. Media center edition
B. Home edition
C. Tablet PC edition
D. None of above
Answer : A
29. Fsck conducts a check in _____ phases
A. One
B. Two
C. Five
D. Eight
Answer : C
30. In case of good process migration mechanism, _____________ means failure of any node other than the one on which the process is running should not affect the execution of the process.
A. Robustness
B. Efficiency
C. Transparent
D. Interference
Answer : A
31. Most accurate global time is based on oscillations of the ______________
A. Cesium-130 atom
B. Cesium-133 atom
C. Cesium-136 atom
D. Cesium-139 atom
Answer : B
32. Which of the following operating system reads and reacts in actual time?
A. Quick Response System
B. Time Sharing System
C. Batch Processing System
D. Real Time System
Answer : D
33. The name services of DCE include ________
A. the Cell Directory Service
B. the Global Directory Service
C. the Global Directory Agent
D. A,B and C
Answer : D
34. A process is ____________________
A. A program in Execution.
B. An asynchronous activity.
C. The 'dispatchable' unit.
D. All A, B, C
Answer : D
35. Because the I/O devices are not synchronized with the CPU, some information must be exchanged between the CPU and the device to ensure that the data is received reliably. This interaction between the CPU and an I/O device is usually referred to as ____________
A. polling
B. arbitration
C. handshaking
D. interrupting
Answer : C
36. Process migration involves__________________
A. Selection of a process to be migrated
B. Selection of destination system or node
C. Actual transfer of the selected process to the destination system or node
D. All A, B, C
Answer : D
37. _______________refers to a strategy where whenever a resource is requested, it is only granted if it cannot result in deadlock.
A. Deadlock Prevention
B. Livelock
C. Deadlock avoidance
D. none of these
Answer : C
38. IPC stands for _________
A. Integrated parallel communication
B. Intermediate process call
C. Internal program call
D. Inter process communication
Answer : D
39. ______________approach simplifies debugging and system verification.
A. Kernel
B. Layered
C. Extended
D. Virtual machine
Answer : B
40. ____________ file system allows sharing in multiple different locations grouped under one folder.
A. Direct
B. distributed
C. sequential
D. parallel
Answer : B
41. ______________ are popular way to improve application through parallelism.
A. Processes
B. Threads
C. Context switching
D. none of these
Answer : B
42. Taskbar is used for
A. Navigation program
B. Start a program
C. Switching between program
D. All of above
Answer : D
43. The primary purpose of an operating system is a …
A. To allow people to use the computer
B. To make the most efficient use of computer hardware
C. To make computer easier to use
D. To keep system programmer employed
Answer : B
44. The Network Time Protocol is similar to _______________algorithm in that synchronization is also performed using time servers and an attempt is made to correct for communication latencies.
A. Banker's
B. Divide and conquer's
C. Cristians
D. Xdelta's
Answer : C
45. A process is _________________
A. program in main memory
B. Program in cache memory
C. program in secondary storage
D. program in execution
Answer : D
46. Which command is used to display the contents of the text file of DOS?
A. Copy
B. Copy con
C. Dir
D. Type
Answer : D
47. Which of the following is drop down list?
A. Combo box
B. List
C. Text area
D. None
Answer : A
48. ______________is a mechanism the prevents two or more processes from accessing a shared resource simultaneously.
A. Livelock
B. Preemption
C. Semaphore
D. either or
Answer : C
49. All of the following are TRUE regarding virtual memory EXCEPT
A. Any amount of RAM can be allocated to virtual memory
B. The setting for the amount of hard disk drive space to allocate virtual memory can be manually change
C. This temporary storage is called the swap file or page file
D. Virtual memory is the physical space o the hard drive
Answer : A
50. The essential difference between an operating system like Linux and one like Windows is that
A. Linux is a proprietary whereas Windows is not
B. Windows can run with an Intel processor, whereas Linux cannot
C. There are multiple versions of Linux, but only one version of Windows
D. Any programmer can modify Linux code which is not permitted with Windows
Answer : D

Sharing is caring