Home

Operating System MCQ Solved Paper for SSC Stenographer

Thursday 9th of March 2023

Sharing is caring

1. Which one of the following statements is true?
A. The cat command cares which file it receives as input or where the input goes.
B. Relative pathnames begin with something other than the slash character
C. UNIX shells never remember their current working directory (CW.
D. The cat command interprets -X as an option character rather than a pathname.
Answer : B
2. PVM stands for
A. Parallel Virtual Machine
B. Parallel Virtual Message
C. Process Virtual Machine
D. Process Virtual Monitor
Answer : A
3. Whenever you move a directory from one location to another
A. The directory is moved the source file is not moved
B. All the subdirectory inside that directory are moved
C. All files inside the directory are moved
D. Both b and c
Answer : A
4. An operating system version designed for use with a media center PC is Microsoft Windows XP
A. Media center edition
B. Home edition
C. Tablet PC edition
D. None of above
Answer : A
5. ______________is a mechanism the prevents two or more processes from accessing a shared resource simultaneously.
A. Livelock
B. Preemption
C. Semaphore
D. either or
Answer : C
6. What is Dr. Watson?
A. IT Expert
B. Diagnosis tool
C. Surgeon
D. None
Answer : B
7. Choose the correct statement from the following.
A. In computer terminology, variables are symbols which stand for some value.
B. An alternative method for executing the commands in the file backup is to make the file as directory.
C. The restricted shell gives more control to the system administrator and restricts the options of the user.
D. The decision making done by computer programs is in the form of conditional execution.
Answer : C
8. _________, as a feature of good distributed file system, clients should be able to continue working if a file server crashes. Likewise, data must not be lost and a restarted file server must be able to recover to a valid state.
A. Scalability
B. Reliability
C. Flexibility
D. Fault tolerance
Answer : D
9. The early ARPAnet is an example of a distributed computing system based on the ________________.
A. Minicomputer model
B. Workstation model
C. Hybrid model
D. Processor pool model
Answer : A
10. The date and time displays on
A. Taskbar
B. Launch pad
C. Status bar
D. System tray
Answer : D
11. Load balancing algorithms in ______________ class use the processor and process characteristics to allocate processes to nodes.
A. Static
B. Dynamic
C. Deterministic
D. Probabilistic
Answer : C
12. A SCSI device can transfer up to----------- of information per second.
A. 40 Mbytes
B. 60 Mbytes
C. 40 Gbytes
D. 60 Gbytes
Answer : A
13. All of the following are TRUE regarding virtual memory EXCEPT
A. Any amount of RAM can be allocated to virtual memory
B. The setting for the amount of hard disk drive space to allocate virtual memory can be manually change
C. This temporary storage is called the swap file or page file
D. Virtual memory is the physical space o the hard drive
Answer : A
14. In layered approach each layer uses the functions and services of ------------------
A. kernel
B. lower-level layers
C. higher-level layers
D. all of these
Answer : B
15. In Windows, start button is used to
A. Device setting
B. Run applications
C. All of above
D. Turn off the system
Answer : C
16. The two sub systems of user mode layer of windows 2000 are _________ and __________
A. excel, executive
B. environment, integral
C. orbit , kernel
D. Kernel , executive
Answer : B
17. A sequence of instructions telling the computer what to do is called a_____________
A. program
B. language
C. translator
D. package
Answer : A
18. _______________occurs when two or more execution flows are able to run simultaneously.
A. Deadlock
B. Concurrency
C. race condition
D. interrupt
Answer : B
19. In case of ________________the server automatically copies files to other servers after the files are written.
A. Explicit replication
B. Implicit replication
C. Lazy file replication
D. Group file replication
Answer : C
20. An orphan process is automatically inherited by the _____and becomes a _______ of this process.
A. 'init' process, father
B. 'init' process, child
C. 'initial process, father
D. 'it' process, child
Answer : B
21. Creation of a semaphore set is done using the _______system call.
A. semget()
B. semsget()
C. mknod()
D. sempget()
Answer : A
22. ______________approach simplifies debugging and system verification.
A. Kernel
B. Layered
C. Extended
D. Virtual machine
Answer : B
23. ______________ is a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function.
A. Semaphore
B. Deadlock
C. Mutual Exclusion
D. No preemption
Answer : B
24. ____________approach can place the data directly into the memory or take the data directly from the memory without direct intervention from the processor.
A. DMA
B. Daisy chain arbitration
C. polling
D. none of these
Answer : A
25. The Network Time Protocol is similar to _______________algorithm in that synchronization is also performed using time servers and an attempt is made to correct for communication latencies.
A. Banker's
B. Divide and conquer's
C. Cristians
D. Xdelta's
Answer : C
26. ______________ occurs when multiple processes or threads read and write data items so that the final result depends on the order of execution of instructions in the multiple processes.
A. Race condition
B. Mutual exclusion
C. Exception
D. Interrupt
Answer : A
27. BSD stands for_____________________
A. Basic Software Division
B. Berkeley Software Distribution
C. British Software Distribution
D. Berkeley Software data
Answer : B
28. Which components appear in the initial windows start up display?
A. Dialog box
B. Task bar
C. Start menu
D. All of the above
Answer : B
29. A process is already split into pieces, called________________.
A. Tasks
B. Program
C. Processors
D. Routines
Answer : A
30. Once text has been cut to the clipboard, you can____hat text into another document
A. Copy
B. Paste
C. Transfer
D. None of the above
Answer : B
31. You can use print manage window
A. To cancel the print job
B. To check status of files in the print queue
C. To interrupt printing
D. All of the above
Answer : D
32. A two-byte integer called ____________is interpreted as an index into an array of inodes in a fixed, known location on disk.
A. an inode
B. an inumber
C. an imap
D. an imark
Answer : B
33. A process may create a new process by executing ___________system call.
A. init
B. fork
C. create
D. new
Answer : B
34. ______________ are popular way to improve application through parallelism.
A. Processes
B. Threads
C. Context switching
D. none of these
Answer : B
35. In_________________ model, when a process does a release access, the contents of all the modifications are not immediately sent to other nodes but they are sent only on demand.
A. Release Consistency Model
B. Lazy Release consistency model
C. Weak Consistency Model
D. Processor Consistency Model
Answer : B
36. When resources have multiple instances ________ is used for deadlock Avoidance.
A. Bankers algorithm
B. Resource Allocation Graph
C. semaphores
D. all of these
Answer : A
37. Two clocks are said to be synchronized at a particular instance of time if the difference in time values of the two clocks is less than some specified constant. The difference in time values of two clocks is called ___________.
A. Interrupt
B. Clock Frequency
C. Clock Ticks
D. Clock Skew
Answer : D
38. The find command is different from most UNIX commands in that each of the argument expressions following the beginning path name is considered a _____________
A. action expression
B. Boolean expression.
C. Boolean constant
D. Search qualifiers
Answer : B
39. A _______________in a distributed system is a string of bits or characters that is used to refer to an entity.
A. name
B. attribute
C. identifiers
D. addresses
Answer : A
40. What is the function of radio button?
A. To select multiple option
B. To select single option
C. To select all option
D. All of above
Answer : B
41. ___________variable is not automatically created on all UNIX systems but is used by so many programs that it is considered a standard environment variable.
A. IFS
B. MAIL
C. TERM
D. PATH
Answer : C
42. The problem with logical dumping is ________________
A. very costly
B. very slow
C. human errors
D. all of these
Answer : B
43. A process is ____________________
A. A program in Execution.
B. An asynchronous activity.
C. The 'dispachable' unit.
D. All A, B, C
Answer : D
44. What is dispatch latency?
A. The time taken by the dispatcher to stop one process and start another
B. The whole time taken by all processor
C. The time taken by the processor to write a file into disk
D. None of Above
Answer : A
45. A process is _________________
A. program in main memory
B. Program in cache memory
C. program in secondary storage
D. program in execution
Answer : D
46. To install the new font
A. Start -> setting -> font
B. Start -> control panel -> font -> install new font
C. Start -> setting -> control panel -> font -> install new font
D. Start -> setting -> control panel -> font
Answer : C
47. The essential difference between an operating system like Linux and one like Windows is that
A. Linux is a proprietary whereas Windows is not
B. Windows can run with an Intel processor, whereas Linux cannot
C. There are multiple versions of Linux, but only one version of Windows
D. Any programmer can modify Linux code which is not permitted with Windows
Answer : D
48. The name services of DCE include ________
A. the Cell Directory Service
B. the Global Directory Service
C. the Global Directory Agent
D. A,B and C
Answer : D
49. The algorithm should be scalable i.e. _____________.
A. The system should not enter a state in which nodes spend all their time migrating processes or exchanging control messages without doing any useful work.
B. The system should be able to handle small and large networked systems.
C. The algorithm should not be affected by the crash of one or more nodes in the system.
D. The process assignment decisions should be based on the current load of the system and not on some fixed static policy.
Answer : B
50. RPN stands for
A. Reverse Polish Notation
B. Record Police Notation
C. Record Polish Notation
D. Reverse Police Negation
Answer : A

Sharing is caring