Home

Operating System MCQ Solved Paper for CEED

Thursday 9th of March 2023

Sharing is caring

1. An unauthorized party inserts counterfeit objects into the system is called_________________
A. interruption
B. interception
C. fabrication
D. modification
Answer : C
2. DSM stands for______________
A. Direct shared memory
B. Direct system memory
C. Distributed shared memory
D. Distributed system memory
Answer : C
3. ______________ occurs when multiple processes or threads read and write data items so that the final result depends on the order of execution of instructions in the multiple processes.
A. Race condition
B. Mutual exclusion
C. Exception
D. Interrupt
Answer : A
4. ______________ selects a process from among the ready processes to execute on the CPU.
A. CPU Scheduler
B. Loader
C. Dispatcher
D. Compiler
Answer : A
5. What is the function of radio button?
A. To select multiple option
B. To select single option
C. To select all option
D. All of above
Answer : B
6. Which of the following is an essential file of a MS-DOS boot disk?
A. COMMANCOM
B. START.COM
C. VER.COM
D. TREE.COM
Answer : A
7. Pick the wrong statement from the following.
A. UNIX systems originally came with a command interpreter called the Bourne Shell.
B. The cat command takes any characters from standard input, and then echoes them to standard output.
C. A pipe is a means of taking the output of one command and directing it as another command.
D. The manual entry is called a man page, even though it is often more than one page long.
Answer : C
8. One of the wonderful things about UNIX is its ___________names.
A. Unlimited path
B. Unlimited directory
C. Limited path
D. Limited file
Answer : A
9. _______________refers to a strategy where whenever a resource is requested, it is only granted if it cannot result in deadlock.
A. Deadlock Prevention
B. Livelock
C. Deadlock avoidance
D. none of these
Answer : C
10. The find command is different from most UNIX commands in that each of the argument expressions following the beginning path name is considered a _____________
A. action expression
B. Boolean expression.
C. Boolean constant
D. Search qualifiers
Answer : B
11. An operating system version designed for use with a media center PC is Microsoft Windows XP
A. Media center edition
B. Home edition
C. Tablet PC edition
D. None of above
Answer : A
12. A process may create a new process by executing ___________system call.
A. init
B. fork
C. create
D. new
Answer : B
13. Choose the correct statement from the following.
A. In computer terminology, variables are symbols which stand for some value.
B. An alternative method for executing the commands in the file backup is to make the file as directory.
C. The restricted shell gives more control to the system administrator and restricts the options of the user.
D. The decision making done by computer programs is in the form of conditional execution.
Answer : C
14. _______refers to the block size of the DSM system, i.e. to the units of sharing and the unit of data transfer across the network when a network block fault occurs.
A. Granularity
B. Coherence
C. Abstraction
D. Synchronization
Answer : A
15. RPN stands for
A. Reverse Polish Notation
B. Record Police Notation
C. Record Polish Notation
D. Reverse Police Negation
Answer : A
16. An option commonly takes the form of a _____followed by __________characters.
A. dot, one or more
B. dash, only one
C. dash, one or more
D. dot,only two
Answer : C
17. IDL stands for_____________________
A. Integrated Data library
B. Isolated Data Library
C. Interface Data Language
D. Interface Definition Language
Answer : D
18. Transparent RPC mechanism refers to :
A. Existance of multuple computer visible and a provide a single system image to its users.
B. It runs the program transparently.
C. It is a technique to shift the program to other computer.
D. It is technique in which local procedures and remote procedures are indistinguishable to programmers.
Answer : D
19. Whenever you move a directory from one location to another
A. The directory is moved the source file is not moved
B. All the subdirectory inside that directory are moved
C. All files inside the directory are moved
D. Both b and c
Answer : A
20. SRM stands for
A. Security Resource Manager
B. Secret Resource Manager
C. Security Reference Monitor
D. Security Reference Manual
Answer : C
21. The time taken by the Dispatcher to stop one process and start another running is known as _________________.
A. Turnaround time
B. Dispatch Latency
C. Access time
D. Response time
Answer : B
22. _____________typically contains temporary data such as subroutine parameter, return address, and temporary variables.
A. Current value of Program Counter
B. Value of the variables
C. The process stack
D. A data section
Answer : C
23. Load balancing algorithms in ______________ class use the processor and process characteristics to allocate processes to nodes.
A. Static
B. Dynamic
C. Deterministic
D. Probabilistic
Answer : C
24. A _____________is a collection of processors that do not share memory, peripheral devices,or a clock.
A. Computer system
B. distributed system
C. network
D. None of the above
Answer : B
25. The Basic Input Output System (BIOS) resides in
A. RAM
B. ROM
C. The CPU
D. Memory Cache
Answer : B
26. A SCSI device can transfer up to----------- of information per second.
A. 40 Mbytes
B. 60 Mbytes
C. 40 Gbytes
D. 60 Gbytes
Answer : A
27. Ext2 is the standard file system of _______ and uses a block size of_____bytes
A. MS DOS,8K
B. Linux ,1024
C. Linux, 512
D. Unix, 512
Answer : B
28. To install the new font
A. Start -> setting -> font
B. Start -> control panel -> font -> install new font
C. Start -> setting -> control panel -> font -> install new font
D. Start -> setting -> control panel -> font
Answer : C
29. The _________takes any characters from standard input, and then echoes them to standard output.
A. kill character
B. cat command
C. cate command
D. control command
Answer : B
30. The Bankers algorithm is used
A. to prevent deadlock
B. to rectify deadlock
C. to detect deadlock
D. to slove deadlock
Answer : A
31. ___________variable is not automatically created on all UNIX systems but is used by so many programs that it is considered a standard environment variable.
A. IFS
B. MAIL
C. TERM
D. PATH
Answer : C
32. In_________________ model, when a process does a release access, the contents of all the modifications are not immediately sent to other nodes but they are sent only on demand.
A. Release Consistency Model
B. Lazy Release consistency model
C. Weak Consistency Model
D. Processor Consistency Model
Answer : B
33. Which of the following is not essential to shut down your computer?
A. XCOPY
B. Edit
C. Sys
D. None of the above
Answer : D
34. ______________ is a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function.
A. Semaphore
B. Deadlock
C. Mutual Exclusion
D. No preemption
Answer : B
35. Most accurate global time is based on oscillations of the ______________
A. Cesium-130 atom
B. Cesium-133 atom
C. Cesium-136 atom
D. Cesium-139 atom
Answer : B
36. The early ARPAnet is an example of a distributed computing system based on the ________________.
A. Minicomputer model
B. Workstation model
C. Hybrid model
D. Processor pool model
Answer : A
37. ____________ file system allows sharing in multiple different locations grouped under one folder.
A. Direct
B. distributed
C. sequential
D. parallel
Answer : B
38. In layered approach each layer uses the functions and services of ------------------
A. kernel
B. lower-level layers
C. higher-level layers
D. all of these
Answer : B
39. In ____________ location policies a random node is polled to check its state and the task is transferred if it will not be overloaded; polling is continued until a suitable node is found.
A. Threshold
B. Shortest
C. Bidding
D. Pairing
Answer : A
40. Find out the characteristics of System-oriented names:
A. They are large integers or bit strings.
B. They are of the same size
C. Generally shorter than human-oriented names and are easy for manipulations like hashing, sorting and so on.
D. All A, B, C
Answer : D
41. The algorithm should be scalable i.e. _____________.
A. The system should not enter a state in which nodes spend all their time migrating processes or exchanging control messages without doing any useful work.
B. The system should be able to handle small and large networked systems.
C. The algorithm should not be affected by the crash of one or more nodes in the system.
D. The process assignment decisions should be based on the current load of the system and not on some fixed static policy.
Answer : B
42. Which components appear in the initial windows start up display?
A. Dialog box
B. Task bar
C. Start menu
D. All of the above
Answer : B
43. Process migration involves__________________
A. Selection of a process to be migrated
B. Selection of destination system or node
C. Actual transfer of the selected process to the destination system or node
D. All A, B, C
Answer : D
44. The usual su command syntax is
A. su-pwd
B. su-pd
C. su - userID
D. Sue- ID
Answer : C
45. ______________is a mechanism the prevents two or more processes from accessing a shared resource simultaneously.
A. Livelock
B. Preemption
C. Semaphore
D. either or
Answer : C
46. Objects location is found by _________________
A. Broadcasting
B. Encoding Location of objects within UID
C. Searching creator node first and then broadcasting
D. All A, B, C
Answer : D
47. A _______________in a distributed system is a string of bits or characters that is used to refer to an entity.
A. name
B. attribute
C. identifiers
D. addresses
Answer : A
48. A process is already split into pieces, called________________.
A. Tasks
B. Program
C. Processors
D. Routines
Answer : A
49. Creation of a semaphore set is done using the _______system call.
A. semget()
B. semsget()
C. mknod()
D. sempget()
Answer : A
50. PVM stands for
A. Parallel Virtual Machine
B. Parallel Virtual Message
C. Process Virtual Machine
D. Process Virtual Monitor
Answer : A

Sharing is caring