Home

IIFT - Operating System 1000+ MCQ [Solved] PDF Download

Thursday 9th of March 2023

Sharing is caring

1. BSD stands for_____________________
A. Basic Software Division
B. Berkeley Software Distribution
C. British Software Distribution
D. Berkeley Software data
Answer : B
2. What do you mean by 0-reliable level in multicast communication?
A. Multiple responses is expected from any receivers.
B. No response is expected from any receivers.
C. Multiple responses is expected from multiple receivers.
D. A multicast message is received by all the members of the group or none.
Answer : B
3. All of the following are TRUE regarding virtual memory EXCEPT
A. Any amount of RAM can be allocated to virtual memory
B. The setting for the amount of hard disk drive space to allocate virtual memory can be manually change
C. This temporary storage is called the swap file or page file
D. Virtual memory is the physical space o the hard drive
Answer : A
4. PVM stands for
A. Parallel Virtual Machine
B. Parallel Virtual Message
C. Process Virtual Machine
D. Process Virtual Monitor
Answer : A
5. The algorithm should be scalable i.e. _____________.
A. The system should not enter a state in which nodes spend all their time migrating processes or exchanging control messages without doing any useful work.
B. The system should be able to handle small and large networked systems.
C. The algorithm should not be affected by the crash of one or more nodes in the system.
D. The process assignment decisions should be based on the current load of the system and not on some fixed static policy.
Answer : B
6. The time taken by the Dispatcher to stop one process and start another running is known as _________________.
A. Turnaround time
B. Dispatch Latency
C. Access time
D. Response time
Answer : B
7. Once text has been cut to the clipboard, you can____hat text into another document
A. Copy
B. Paste
C. Transfer
D. None of the above
Answer : B
8. When a peripheral device needs immediate attention from the operating system, it generates a(n)
A. Page file
B. Spool
C. Stack
D. Interrupt
Answer : D
9. In case of ________________the server automatically copies files to other servers after the files are written.
A. Explicit replication
B. Implicit replication
C. Lazy file replication
D. Group file replication
Answer : C
10. ____________approach can place the data directly into the memory or take the data directly from the memory without direct intervention from the processor.
A. DMA
B. Daisy chain arbitration
C. polling
D. none of these
Answer : A
11. Pick the wrong statement from the following.
A. UNIX systems originally came with a command interpreter called the Bourne Shell.
B. The cat command takes any characters from standard input, and then echoes them to standard output.
C. A pipe is a means of taking the output of one command and directing it as another command.
D. The manual entry is called a man page, even though it is often more than one page long.
Answer : C
12. The Bankers algorithm is used
A. to prevent deadlock
B. to rectify deadlock
C. to detect deadlock
D. to slove deadlock
Answer : A
13. ______________ occurs when multiple processes or threads read and write data items so that the final result depends on the order of execution of instructions in the multiple processes.
A. Race condition
B. Mutual exclusion
C. Exception
D. Interrupt
Answer : A
14. A process is already split into pieces, called________________.
A. Tasks
B. Program
C. Processors
D. Routines
Answer : A
15. A process is ____________________
A. A program in Execution.
B. An asynchronous activity.
C. The 'dispatchable' unit.
D. All A, B, C
Answer : D
16. _____________typically contains temporary data such as subroutine parameter, return address, and temporary variables.
A. Current value of Program Counter
B. Value of the variables
C. The process stack
D. A data section
Answer : C
17. Ext2 is the standard file system of _______ and uses a block size of_____bytes
A. MS DOS,8K
B. Linux ,1024
C. Linux, 512
D. Unix, 512
Answer : B
18. The early ARPAnet is an example of a distributed computing system based on the ________________.
A. Minicomputer model
B. Workstation model
C. Hybrid model
D. Processor pool model
Answer : A
19. The operating system is the most common type of ___ Software
A. System
B. Application
C. Word processing software
D. Communication
Answer : A
20. DSM stands for______________
A. Direct shared memory
B. Direct system memory
C. Distributed shared memory
D. Distributed system memory
Answer : C
21. In the case of____________, message remains in the senders address space until the receiver executes the corresponding receive.
A. No buffering
B. Single message buffering
C. Unbounded-capacity buffer
D. Finite bound buffer
Answer : A
22. Having data belonging to two independent processes in the same page is called____________.
A. Buffering
B. Blocking
C. Message-passing
D. False sharing
Answer : D
23. The find command is different from most UNIX commands in that each of the argument expressions following the beginning path name is considered a _____________
A. action expression
B. Boolean expression.
C. Boolean constant
D. Search qualifiers
Answer : B
24. Which of the following does not occur during the power-on-self-test (POST)?
A. The scandisk utility begins to run
B. The video card and video memory are tested
C. The BIOS identification process occurs
D. Memory chip are checked to ensure that they are working properly
Answer : A
25. An orphan process is automatically inherited by the _____and becomes a _______ of this process.
A. 'init' process, father
B. 'init' process, child
C. 'initial process, father
D. 'it' process, child
Answer : B
26. When resources have multiple instances ________ is used for deadlock Avoidance.
A. Bankers algorithm
B. Resource Allocation Graph
C. semaphores
D. all of these
Answer : A
27. A bar that inform you the available options in your computer, opened applications, background running applications and can be used to switch between applications quickly is
A. Menu bar
B. Tool bar
C. Status bar
D. Task bar
Answer : D
28. _________, as a feature of good distributed file system, clients should be able to continue working if a file server crashes. Likewise, data must not be lost and a restarted file server must be able to recover to a valid state.
A. Scalability
B. Reliability
C. Flexibility
D. Fault tolerance
Answer : D
29. In layered approach each layer uses the functions and services of ------------------
A. kernel
B. lower-level layers
C. higher-level layers
D. all of these
Answer : B
30. The date and time displays on
A. Taskbar
B. Launch pad
C. Status bar
D. System tray
Answer : D
31. Which of the following is drop down list?
A. Combo box
B. List
C. Text area
D. None
Answer : A
32. In ________________________ each node periodically sends a message to the time server.
A. Passive Time Server Centralized Algorithm
B. Active Time Server Centralized Algorithm
C. Global Averaging Distributed Algorithms
D. Localized Averaging Distributed Algorithms
Answer : A
33. An unauthorized party inserts counterfeit objects into the system is called_________________
A. interruption
B. interception
C. fabrication
D. modification
Answer : C
34. The Network Time Protocol is similar to _______________algorithm in that synchronization is also performed using time servers and an attempt is made to correct for communication latencies.
A. Banker's
B. Divide and conquer's
C. Cristians
D. Xdelta's
Answer : C
35. Recently deleted files are stored in
A. Taskbar
B. Desktop
C. My computer
D. Recycle bin
Answer : D
36. Most accurate global time is based on oscillations of the ______________
A. Cesium-130 atom
B. Cesium-133 atom
C. Cesium-136 atom
D. Cesium-139 atom
Answer : B
37. Choose the correct statement from the following.
A. In computer terminology, variables are symbols which stand for some value.
B. An alternative method for executing the commands in the file backup is to make the file as directory.
C. The restricted shell gives more control to the system administrator and restricts the options of the user.
D. The decision making done by computer programs is in the form of conditional execution.
Answer : C
38. The _________takes any characters from standard input, and then echoes them to standard output.
A. kill character
B. cat command
C. cate command
D. control command
Answer : B
39. Which command is used to display the contents of the text file of DOS?
A. Copy
B. Copy con
C. Dir
D. Type
Answer : D
40. When a child dies, it sends a _______________signal to its parent.
A. SIGCHLD
B. EDEADLK
C. WNOHANG
D. SEDECHLD
Answer : A
41. The ___ contains commands associated with the My Computer window
A. Start menu
B. Standard menu
C. System menu
D. None of the above
Answer : C
42. SRM stands for
A. Security Resource Manager
B. Secret Resource Manager
C. Security Reference Monitor
D. Security Reference Manual
Answer : C
43. Creation of a semaphore set is done using the _______system call.
A. semget()
B. semsget()
C. mknod()
D. sempget()
Answer : A
44. In _______, if a processor writes the value 100 to the memory location x, this write operation will only change the contents of its local memory and will not affect the contents of the memory of any other processor.
A. Tightly coupled systems,
B. Loosely coupled systems
C. Parallel processing systems
D. File management system
Answer : B
45. __ is the program run on a computer when the computer boots up
A. System software
B. Operating system
C. System operations
D. None
Answer : B
46. When copying more than one file at a time, you must specify an existing directory as the ___________
A. Source
B. Sub directory
C. Destination.
D. Path name
Answer : C
47. _______refers to the block size of the DSM system, i.e. to the units of sharing and the unit of data transfer across the network when a network block fault occurs.
A. Granularity
B. Coherence
C. Abstraction
D. Synchronization
Answer : A
48. Process migration involves__________________
A. Selection of a process to be migrated
B. Selection of destination system or node
C. Actual transfer of the selected process to the destination system or node
D. All A, B, C
Answer : D
49. Which of the following is not essential to shut down your computer?
A. XCOPY
B. Edit
C. Sys
D. None of the above
Answer : D
50. Find out the characteristics of System-oriented names:
A. They are large integers or bit strings.
B. They are of the same size
C. Generally shorter than human-oriented names and are easy for manipulations like hashing, sorting and so on.
D. All A, B, C
Answer : D

Sharing is caring