Home

Operating System MCQ Solved Paper for SSC JE

Thursday 9th of March 2023

Sharing is caring

1. The maximum size of a write file is limited to only
A. Name of the file
B. Extension of the file
C. The amount of memory in your computer
D. All of above
Answer : C
2. The Network Time Protocol is similar to _______________algorithm in that synchronization is also performed using time servers and an attempt is made to correct for communication latencies.
A. Banker's
B. Divide and conquer's
C. Cristians
D. Xdelta's
Answer : C
3. The time taken by the Dispatcher to stop one process and start another running is known as _________________.
A. Turnaround time
B. Dispatch Latency
C. Access time
D. Response time
Answer : B
4. When resources have multiple instances ________ is used for deadlock Avoidance.
A. Bankers algorithm
B. Resource Allocation Graph
C. semaphores
D. all of these
Answer : A
5. Which of the following is drop down list?
A. Combo box
B. List
C. Text area
D. None
Answer : A
6. ____________approach can place the data directly into the memory or take the data directly from the memory without direct intervention from the processor.
A. DMA
B. Daisy chain arbitration
C. polling
D. none of these
Answer : A
7. A SCSI device can transfer up to----------- of information per second.
A. 40 Mbytes
B. 60 Mbytes
C. 40 Gbytes
D. 60 Gbytes
Answer : A
8. Which one is true for unconditional disk formatting?
A. Transfer system files after format
B. Do not check/scan surface after format
C. Destroys every byte of data on a disk by overwriting it with with blank spaces
D. All of above
Answer : C
9. The operating system is the most common type of ___ Software
A. System
B. Application
C. Word processing software
D. Communication
Answer : A
10. One of the wonderful things about UNIX is its ___________names.
A. Unlimited path
B. Unlimited directory
C. Limited path
D. Limited file
Answer : A
11. DSM stands for______________
A. Direct shared memory
B. Direct system memory
C. Distributed shared memory
D. Distributed system memory
Answer : C
12. ______________ is a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function.
A. Semaphore
B. Deadlock
C. Mutual Exclusion
D. No preemption
Answer : B
13. Find out the characteristics of System-oriented names:
A. They are large integers or bit strings.
B. They are of the same size
C. Generally shorter than human-oriented names and are easy for manipulations like hashing, sorting and so on.
D. All A, B, C
Answer : D
14. A _______________in a distributed system is a string of bits or characters that is used to refer to an entity.
A. name
B. attribute
C. identifiers
D. addresses
Answer : A
15. In Multics, a process could have up to 256K segments, but each segment was limited to ___________ 64K words.
A. 64K
B. 32K
C. 1024K
D. 112K
Answer : A
16. ______________is a mechanism the prevents two or more processes from accessing a shared resource simultaneously.
A. Livelock
B. Preemption
C. Semaphore
D. either or
Answer : C
17. What is Dr. Watson?
A. IT Expert
B. Diagnosis tool
C. Surgeon
D. None
Answer : B
18. The controller can access memory in memory cycles which are not used by the particular bank of memory into which the DMA controller is writing data. This approach, called _________
A. interrupting
B. cycle stealing
C. swapping
D. paging
Answer : B
19. A process is ____________________
A. A program in Execution.
B. An asynchronous activity.
C. The 'dispatchable' unit.
D. All A, B, C
Answer : D
20. Taskbar is used for
A. Navigation program
B. Start a program
C. Switching between program
D. All of above
Answer : D
21. Which components appear in the initial windows start up display?
A. Dialog box
B. Task bar
C. Start menu
D. All of the above
Answer : B
22. Which is the layer of a computer system between the hardware and the user program
A. Operating system
B. Operating environment
C. System environment
D. None
Answer : B
23. When copying more than ne file at a time, you must specify an existing directory as the ___________
A. Source
B. Sub directory
C. Destination.
D. Path name
Answer : C
24. In case of ________________the server automatically copies files to other servers after the files are written.
A. Explicit replication
B. Implicit replication
C. Lazy file replication
D. Group file replication
Answer : C
25. You can move a window to a different position on your screen by dragging it by its
A. Tail
B. Move handle
C. Status bar
D. Title bar
Answer : B
26. Recently deleted files are stored in
A. Taskbar
B. Desktop
C. My computer
D. Recycle bin
Answer : D
27. _________, as a feature of good distributed file system, clients should be able to continue working if a file server crashes. Likewise, data must not be lost and a restarted file server must be able to recover to a valid state.
A. Scalability
B. Reliability
C. Flexibility
D. Fault tolerance
Answer : D
28. __ is the program run on a computer when the computer boots up
A. System software
B. Operating system
C. System operations
D. None
Answer : B
29. In MS-DOS, the interfaces and levels of functionality are _______________
A. not well separated.
B. well separated
C. independent
D. dependent
Answer : A
30. Choose the correct statement from the following.
A. In computer terminology, variables are symbols which stand for some value.
B. An alternative method for executing the commands in the file backup is to make the file as directory.
C. The restricted shell gives more control to the system administrator and restricts the options of the user.
D. The decision making done by computer programs is in the form of conditional execution.
Answer : C
31. When you start up the computer the boot up storage at which the BIOS versions manufacturer and data are displayed on the monitor is called
A. Bootstrap
B. System configuration
C. Power on self test (POST)
D. Kernel loading
Answer : C
32. In the case of____________ , changes to an open file are only locally visible.
A. session semantics
B. immutable files
C. atomic transactions
D. None of the above.
Answer : A
33. The name services of DCE include ________
A. the Cell Directory Service
B. the Global Directory Service
C. the Global Directory Agent
D. A,B and C
Answer : D
34. SRM stands for
A. Security Resource Manager
B. Secret Resource Manager
C. Security Reference Monitor
D. Security Reference Manual
Answer : C
35. You can use print manage window
A. To cancel the print job
B. To check status of files in the print queue
C. To interrupt printing
D. All of the above
Answer : D
36. A process may create a new process by executing ___________system call.
A. init
B. fork
C. create
D. new
Answer : B
37. A page fault occurs when
A. the page is not found in the memory
B. the page is found in the memory
C. the Segmentation starts
D. the Deadlock happens
Answer : A
38. PVM stands for
A. Parallel Virtual Machine
B. Parallel Virtual Message
C. Process Virtual Machine
D. Process Virtual Monitor
Answer : A
39. An option commonly takes the form of a _____followed by __________characters.
A. dot, one or more
B. dash, only one
C. dash, one or more
D. dot,only two
Answer : C
40. The command used to create logical drive for specific location of disk
A. Format
B. Fdisk
C. Subst
D. All of the above
Answer : C
41. Fsck conducts a check in _____ phases
A. One
B. Two
C. Five
D. Eight
Answer : C
42. _______________occurs when two or more execution flows are able to run simultaneously.
A. Deadlock
B. Concurrency
C. race condition
D. interrupt
Answer : B
43. What is the function of radio button?
A. To select multiple option
B. To select single option
C. To select all option
D. All of above
Answer : B
44. Process migration involves__________________
A. Selection of a process to be migrated
B. Selection of destination system or node
C. Actual transfer of the selected process to the destination system or node
D. All A, B, C
Answer : D
45. The ___ contains commands associated with the My Computer window
A. Start menu
B. Standard menu
C. System menu
D. None of the above
Answer : C
46. The problem with logical dumping is ________________
A. very costly
B. very slow
C. human errors
D. all of these
Answer : B
47. BSD stands for_____________________
A. Basic Software Division
B. Berkeley Software Distribution
C. British Software Distribution
D. Berkeley Software data
Answer : B
48. __________ deals with when a modified page should be written out to secondary memory.
A. Cleaning policy
B. Fetch policy
C. Frame locking
D. None
Answer : A
49. The essential difference between an operating system like Linux and one like Windows is that
A. Linux is a proprietary whereas Windows is not
B. Windows can run with an Intel processor, whereas Linux cannot
C. There are multiple versions of Linux, but only one version of Windows
D. Any programmer can modify Linux code which is not permitted with Windows
Answer : D
50. To install the new font
A. Start -> setting -> font
B. Start -> control panel -> font -> install new font
C. Start -> setting -> control panel -> font -> install new font
D. Start -> setting -> control panel -> font
Answer : C

Sharing is caring