Home

Operating System 1000+ MCQ with answer for UPSC IES

Thursday 9th of March 2023

Sharing is caring

1. In case of modification an unauthorized party not only gains access to but tampers with an asset. This is an attack on ____________________.
A. availability
B. confidentiality
C. integrity
D. authenticity
Answer : C
2. Which of the following operating system reads and reacts in actual time?
A. Quick Response System
B. Time Sharing System
C. Batch Processing System
D. Real Time System
Answer : D
3. In _______, if a processor writes the value 100 to the memory location x, this write operation will only change the contents of its local memory and will not affect the contents of the memory of any other processor.
A. Tightly coupled systems,
B. Loosely coupled systems
C. Parallel processing systems
D. File management system
Answer : B
4. Which one is true for unconditional disk formatting?
A. Transfer system files after format
B. Do not check/scan surface after format
C. Destroys every byte of data on a disk by overwriting it with with blank spaces
D. All of above
Answer : C
5. The time taken by the Dispatcher to stop one process and start another running is known as _________________.
A. Turnaround time
B. Dispatch Latency
C. Access time
D. Response time
Answer : B
6. Having data belonging to two independent processes in the same page is called____________.
A. Buffering
B. Blocking
C. Message-passing
D. False sharing
Answer : D
7. One of the wonderful things about UNIX is its ___________names.
A. Unlimited path
B. Unlimited directory
C. Limited path
D. Limited file
Answer : A
8. In ____________ location policies a random node is polled to check its state and the task is transferred if it will not be overloaded; polling is continued until a suitable node is found.
A. Threshold
B. Shortest
C. Bidding
D. Pairing
Answer : A
9. The date and time displays on
A. Taskbar
B. Launch pad
C. Status bar
D. System tray
Answer : D
10. In ________________________ each node periodically sends a message to the time server.
A. Passive Time Server Centralized Algorithm
B. Active Time Server Centralized Algorithm
C. Global Averaging Distributed Algorithms
D. Localized Averaging Distributed Algorithms
Answer : A
11. DSM stands for______________
A. Direct shared memory
B. Direct system memory
C. Distributed shared memory
D. Distributed system memory
Answer : C
12. The ______________ unpacks the call receipt messages from local RPC Runtime and makes a perfect local call to invoke the appropriate procedure in the server.
A. server Stub
B. server
C. client
D. client stub
Answer : A
13. In the case of____________ , changes to an open file are only locally visible.
A. session semantics
B. immutable files
C. atomic transactions
D. None of the above.
Answer : A
14. In case of ________________the server automatically copies files to other servers after the files are written.
A. Explicit replication
B. Implicit replication
C. Lazy file replication
D. Group file replication
Answer : C
15. A two-byte integer called ____________is interpreted as an index into an array of inodes in a fixed, known location on disk.
A. an inode
B. an inumber
C. an imap
D. an imark
Answer : B
16. You can move a window to a different position on your screen by dragging it by its
A. Tail
B. Move handle
C. Status bar
D. Title bar
Answer : B
17. ______________ occurs when multiple processes or threads read and write data items so that the final result depends on the order of execution of instructions in the multiple processes.
A. Race condition
B. Mutual exclusion
C. Exception
D. Interrupt
Answer : A
18. In Windows, start button is used to
A. Device setting
B. Run applications
C. All of above
D. Turn off the system
Answer : C
19. To install the new font
A. Start -> setting -> font
B. Start -> control panel -> font -> install new font
C. Start -> setting -> control panel -> font -> install new font
D. Start -> setting -> control panel -> font
Answer : C
20. An operating system version designed for use with a media center PC is Microsoft Windows XP
A. Media center edition
B. Home edition
C. Tablet PC edition
D. None of above
Answer : A
21. The algorithm should be scalable i.e. _____________.
A. The system should not enter a state in which nodes spend all their time migrating processes or exchanging control messages without doing any useful work.
B. The system should be able to handle small and large networked systems.
C. The algorithm should not be affected by the crash of one or more nodes in the system.
D. The process assignment decisions should be based on the current load of the system and not on some fixed static policy.
Answer : B
22. In___________, the requesting device or devices assert the signal bus_request.
A. Priority encoded arbitration
B. Distributed arbitration by self-selection
C. Priority arbitration
D. Daisy chain arbitration
Answer : D
23. A page fault occurs when
A. the page is not found in the memory
B. the page is found in the memory
C. the Segmentation starts
D. the Deadlock happens
Answer : A
24. Choose the correct statement from the following.
A. In computer terminology, variables are symbols which stand for some value.
B. An alternative method for executing the commands in the file backup is to make the file as directory.
C. The restricted shell gives more control to the system administrator and restricts the options of the user.
D. The decision making done by computer programs is in the form of conditional execution.
Answer : C
25. A process control block contains varies attributes required by _____________ to control a process.
A. RAM
B. virtual memory
C. BIOS
D. Operating System
Answer : D
26. All of the following are TRUE regarding virtual memory EXCEPT
A. Any amount of RAM can be allocated to virtual memory
B. The setting for the amount of hard disk drive space to allocate virtual memory can be manually change
C. This temporary storage is called the swap file or page file
D. Virtual memory is the physical space o the hard drive
Answer : A
27. In MS-DOS, the interfaces and levels of functionality are _______________
A. not well separated.
B. well separated
C. independent
D. dependent
Answer : A
28. Which is the layer of a computer system between the hardware and the user program
A. Operating system
B. Operating environment
C. System environment
D. None
Answer : B
29. ______________ refers to the technology in which some space in hard disk is used as an extension of main memory.
A. Cache memory
B. Paging
C. Virtual memory
D. Associative memory
Answer : C
30. An orphan process is automatically inherited by the _____and becomes a _______ of this process.
A. 'init' process, father
B. 'init' process, child
C. 'initial process, father
D. 'it' process, child
Answer : B
31. A small part of taskbar that has icons of background running applications is
A. Start button
B. Quick launch
C. Task bar
D. System tray
Answer : D
32. A _______________in a distributed system is a string of bits or characters that is used to refer to an entity.
A. name
B. attribute
C. identifiers
D. addresses
Answer : A
33. In case of ____________________transparency a file can transparently move to another server.
A. Location
B. Migration
C. Replication
D. Concurrency
Answer : B
34. The Basic Input Output System (BIOS) resides in
A. RAM
B. ROM
C. The CPU
D. Memory Cache
Answer : B
35. An option commonly takes the form of a _____followed by __________characters.
A. dot, one or more
B. dash, only one
C. dash, one or more
D. dot,only two
Answer : C
36. IPC stands for _________
A. Integrated parallel communication
B. Intermediate process call
C. Internal program call
D. Inter process communication
Answer : D
37. When you start up the computer the boot up storage at which the BIOS versions manufacturer and data are displayed on the monitor is called
A. Bootstrap
B. System configuration
C. Power on self test (POST)
D. Kernel loading
Answer : C
38. The primary purpose of an operating system is a …
A. To allow people to use the computer
B. To make the most efficient use of computer hardware
C. To make computer easier to use
D. To keep system programmer employed
Answer : B
39. The Network Time Protocol is similar to _______________algorithm in that synchronization is also performed using time servers and an attempt is made to correct for communication latencies.
A. Banker's
B. Divide and conquer's
C. Cristians
D. Xdelta's
Answer : C
40. A sequence of instructions telling the computer what to do is called a_____________
A. program
B. language
C. translator
D. package
Answer : A
41. Which buffering strategy is used for implementing synchronous communication?
A. Single message buffer
B. Unbounded - Capacity buffer
C. Finite-Bound Buffer
D. All can be used.
Answer : A
42. In layered approach each layer uses the functions and services o ------------------
A. kernel
B. lower-level layers
C. higher-level layers
D. all of these
Answer : B
43. Recently deleted files are stored in
A. Taskbar
B. Desktop
C. My computer
D. Recycle bin
Answer : D
44. The Bankers algorithm is used
A. to prevent deadlock
B. to rectify deadlock
C. to detect deadlock
D. to slove deadlock
Answer : A
45. In case of good process migration mechanism, _____________ means failure of any node other than the one on which the process is running should not affect the execution of the process.
A. Robustness
B. Efficiency
C. Transparent
D. Interference
Answer : A
46. A process is _________________
A. program in main memory
B. Program in cache memory
C. program in secondary storage
D. program in execution
Answer : D
47. PVM stands for
A. Parallel Virtual Machine
B. Parallel Virtual Message
C. Process Virtual Machine
D. Process Virtual Monitor
Answer : A
48. A process is already split into pieces, called________________.
A. Tasks
B. Program
C. Processors
D. Routines
Answer : A
49. What is the function of radio button?
A. To select multiple option
B. To select single option
C. To select all option
D. All of above
Answer : B
50. A SCSI device can transfer up to----------- of information per second.
A. 40 Mbytes
B. 60 Mbytes
C. 40 Gbytes
D. 60 Gbytes
Answer : A

Sharing is caring