Home

GRE - Operating System 1000+ MCQ [Solved] PDF Download

Thursday 9th of March 2023

Sharing is caring

1. Two clocks are said to be synchronized at a particular instance of time if the difference in time values of the two clocks is less than some specified constant. The difference in time values of two clocks is called ___________.
A. Interrupt
B. Clock Frequency
C. Clock Ticks
D. Clock Skew
Answer : D
2. An orphan process is automatically inherited by the _____and becomes a _______ of this process.
A. 'init' process, father
B. 'init' process, child
C. 'initial process, father
D. 'it' process, child
Answer : B
3. The Network Time Protocol is similar to _______________algorithm in that synchronization is also performed using time servers and an attempt is made to correct for communication latencies.
A. Banker's
B. Divide and conquer's
C. Cristians
D. Xdelta's
Answer : C
4. What do you mean by 0-reliable level in multicast communication?
A. Multiple responses is expected from any receivers.
B. No response is expected from any receivers.
C. Multiple responses is expected from multiple receivers.
D. A multicast message is received by all the members of the group or none.
Answer : B
5. Process migration involves__________________
A. Selection of a process to be migrated
B. Selection of destination system or node
C. Actual transfer of the selected process to the destination system or node
D. All A, B, C
Answer : D
6. A process control block contains varies attributes required by _____________ to control a process.
A. RAM
B. virtual memory
C. BIOS
D. Operating System
Answer : D
7. The command used to create logical drive for specific location of disk
A. Format
B. Fdisk
C. Subst
D. All of the above
Answer : C
8. When a child dies, it sends a _______________signal to its parent.
A. SIGCHLD
B. EDEADLK
C. WNOHANG
D. SEDECHLD
Answer : A
9. ______________is responsible for allocating primary memory to processes and for assisting the programmer in loading and storing the contents of the primary memory.
A. Operating system
B. Memory manager
C. Database administrator
D. RAM
Answer : B
10. _______________refers to a strategy where whenever a resource is requested, it is only granted if it cannot result in deadlock.
A. Deadlock Prevention
B. Livelock
C. Deadlock avoidance
D. none of these
Answer : C
11. The essential difference between an operating system like Linux and one like Windows is that
A. Linux is a proprietary whereas Windows is not
B. Windows can run with an Intel processor, whereas Linux cannot
C. There are multiple versions of Linux, but only one version of Windows
D. Any programmer can modify Linux code which is not permitted with Windows
Answer : D
12. The ______________ unpacks the call receipt messages from local RPC Runtime and makes a perfect local call to invoke the appropriate procedure in the server.
A. server Stub
B. server
C. client
D. client stub
Answer : A
13. ______________is a mechanism the prevents two or more processes from accessing a shared resource simultaneously.
A. Livelock
B. Preemption
C. Semaphore
D. either or
Answer : C
14. The primary purpose of an operating system is a …
A. To allow people to use the computer
B. To make the most efficient use of computer hardware
C. To make computer easier to use
D. To keep system programmer employed
Answer : B
15. A bar that inform you the available options in your computer, opened applications, background running applications and can be used to switch between applications quickly is
A. Menu bar
B. Tool bar
C. Status bar
D. Task bar
Answer : D
16. To install the new font
A. Start -> setting -> font
B. Start -> control panel -> font -> install new font
C. Start -> setting -> control panel -> font -> install new font
D. Start -> setting -> control panel -> font
Answer : C
17. _____________ manage the name spaces and binds an object to its location.
A. Name Server
B. Name agent
C. Context
D. Name resolution
Answer : A
18. In case of ____________________transparency a file can transparently move to another server.
A. Location
B. Migration
C. Replication
D. Concurrency
Answer : B
19. In case of ________________the server automatically copies files to other servers after the files are written.
A. Explicit replication
B. Implicit replication
C. Lazy file replication
D. Group file replication
Answer : C
20. Fsck conducts a check in _____ phases
A. One
B. Two
C. Five
D. Eight
Answer : C
2. Which command is used to display the contents of the text file of DOS?
A. Copy
B. Copy con
C. Dir
D. Type
Answer : D
22. Find out the characteristics of System-oriented names:
A. They are large integers or bit strings.
B. They are of the same size
C. Generally shorter than human-oriented names and are easy for manipulations like hashing, sorting and so on.
D. All A, B, C
Answer : D
23. DSM stands for______________
A. Direct shared memory
B. Direct system memory
C. Distributed shared memory
D. Distributed system memory
Answer : C
24. The usual su command syntax is
A. su-pwd
B. su-pd
C. su - userID
D. Sue- ID
Answer : C
25. A sequence of instructions telling the computer what to do is called a_____________
A. program
B. language
C. translator
D. package
Answer : A
26. ______________ refers to the technology in which some space in hard disk is used as an extension of main memory.
A. Cache memory
B. Paging
C. Virtual memory
D. Associative memory
Answer : C
27. The _____________ are based on modification of the original message in some manner, or on creation of a false message.
A. Passive attack
B. Release of message content attack
C. Traffic analysis attack
D. Active attack
Answer : D
28. The Basic Input Output System (BIOS) resides in
A. RAM
B. ROM
C. The CPU
D. Memory Cache
Answer : B
29. Which of the following operating system reads and reacts in actual time?
A. Quick Response System
B. Time Sharing System
C. Batch Processing System
D. Real Time System
Answer : D
30. The _________takes any characters from standard input, and then echoes them to standard output.
A. kill character
B. cat command
C. cate command
D. control command
Answer : B
31. IPC stands for _________
A. Integrated parallel communication
B. Intermediate process call
C. Internal program call
D. Inter process communication
Answer : D
32. _______refers to the block size of the DSM system, i.e. to the units of sharing and the unit of data transfer across the network when a network block fault occurs.
A. Granularity
B. Coherence
C. Abstraction
D. Synchronization
Answer : A
33. Taskbar is used for
A. Navigation program
B. Start a program
C. Switching between program
D. All of above
Answer : D
34. Choose the correct statement from the following.
A. In computer terminology, variables are symbols which stand for some value.
B. An alternative method for executing the commands in the file backup is to make the file as directory.
C. The restricted shell gives more control to the system administrator and restricts the options of the user.
D. The decision making done by computer programs is in the form of conditional execution.
Answer : C
35. Which components appear in the initial Windows start up display?
A. Start menu
B. Dialog boxes
C. Taskbar
D. All of above
Answer : C
36. Which of the following is not essential to shut down your computer?
A. XCOPY
B. Edit
C. Sys
D. None of the above
Answer : D
37. In the case of____________, message remains in the senders address space until the receiver executes the corresponding receive.
A. No buffering
B. Single message buffering
C. Unbounded-capacity buffer
D. Finite bound buffer
Answer : A
38. _________, as a feature of good distributed file system, clients should be able to continue working if a file server crashes. Likewise, data must not be lost and a restarted file server must be able to recover to a valid state.
A. Scalability
B. Reliability
C. Flexibility
D. Fault tolerance
Answer : D
39. A standard UNIX system includes a set of ___________ and a set of ___________.
A. Commands ,files
B. Libraries, Applications
C. Libraries, files
D. Files, Applications
Answer : B
40. A two-byte integer called ____________is interpreted as an index into an array of inodes in a fixed, known location on disk.
A. an inode
B. an inumber
C. an imap
D. an imark
Answer : B
41. The maximum size of a write file is limited to only
A. Name of the file
B. Extension of the file
C. The amount of memory in your computer
D. All of above
Answer : C
42. Most accurate global time is based on oscillations of the ______________
A. Cesium-130 atom
B. Cesium-133 atom
C. Cesium-136 atom
D. Cesium-139 atom
Answer : B
43. The algorithm should be scalable i.e. _____________.
strong>A. The system should not enter a state in which nodes spend all their time migrating processes or exchanging control messages without doing any useful work.
B. The system should be able to handle small and large networked systems.
C. The algorithm should not be affected by the crash of one or more nodes in the system.
D. The process assignment decisions should be based on the current load of the system and not on some fixed static policy.
Answer : B
44. Wiretapping to capture data in a network is an example of ________________
A. interruption
B. interception
C. fabrication
D. modification
Answer : B
45. The primary purpose of an operating system is:
A. To allow people to use the computer,
B. To make the most efficient use of the computer hardware
C. To make computers easier to use
D. To keep systems programmers employed
Answer : B
46. In layered approach each layer uses the functions and services of ------------------
A. kernel
B. lower-level layers
C. higher-level layers
D. all of these
Answer : B
47. _____________typically contains temporary data such as subroutine parameter, return address, and temporary variables.
A. Current value of Program Counter
B. Value of the variables
C. The process stack
D. A data section
Answer : C
48. SRM stands for
A. Security Resource Manager
B. Secret Resource Manager
C. Security Reference Monitor
D. Security Reference Manual
Answer : C
49. ______________ occurs when multiple processes or threads read and write data items so that the final result depends on the order of execution of instructions in the multiple processes.
A. Race condition
B. Mutual exclusion
C. Exception
D. Interrupt
Answer : A
50. A SCSI device can transfer up to----------- of information per second.
A. 40 Mbytes
B. 60 Mbytes
C. 40 Gbytes
D. 60 Gbytes
Answer : A

Sharing is caring