Home

Operating System MCQ Solved Paper for XAT

Thursday 9th of March 2023

Sharing is caring

1. Fsck conducts a check in _____ phases
A. One
B. Two
C. Five
D. Eight
Answer : C
2. An unauthorized party inserts counterfeit objects into the system is called_________________
A. interruption
B. interception
C. fabrication
D. modification
Answer : C
3. Transparent RPC mechanism refers to :
A. Existance of multuple computer visible and a provide a single system image to its users.
B. It runs the program transparently.
C. It is a technique to shift the program to other computer.
D. It is technique in which local procedures and remote procedures are indistinguishable to programmers.
Answer : D
4. In case of ____________________transparency a file can transparently move to another server.
A. Location
B. Migration
C. Replication
D. Concurrency
Answer : B
5. The ______________ unpacks the call receipt messages from local RPC Runtime and makes a perfect local call to invoke the appropriate procedure in the server.
A. server Stub
B. server
C. client
D. client stub
Answer : A
6. The find command is different from most UNIX commands in that each of the argument expressions following the beginning path name is considered a _____________
A. action expression
B. Boolean expression.
C. Boolean constant
D. Search qualifiers
Answer : B
7. The essential difference between an operating system like Linux and one like Windows is that
A. Linux is a proprietary whereas Windows is not
B. Windows can run with an Intel processor, whereas Linux cannot
C. There are multiple versions of Linux, but only one version of Windows
D. Any programmer can modify Linux code which is not permitted with Windows
Answer : D
8. Initialization of I/O devices is part of the_________.
A. CPU
B. MSDOS
C. UNIX kernel
D. None of the above
Answer : C
9. _____________ manage the name spaces and binds an object to its location.
A. Name Server
B. Name agent
C. Context
D. Name resolution
Answer : A
10. Identify the distributed computing model from the following statement. In this model, the user's processes need not be migrated to the server machines for getting the work done by those machines.
A. Minicomputer model
B. Workstation model
C. Workstation-Server model
D. Processor pool model
Answer : C
11. Two clocks are said to be synchronized at a particular instance of time if the difference in time values of the two clocks is less than some specified constant. The difference in time values of two clocks is called ___________.
A. Interrupt
B. Clock Frequency
C. Clock Ticks
D. Clock Skew
Answer : D
12. You can move a window to a different position on your screen by dragging it by its
A. Tail
B. Move handle
C. Status bar
D. Title bar
Answer : B
13. A standard UNIX system includes a set of ___________ and a set of ___________.
A. Commands ,files
B. Libraries, Applications
C. Libraries, files
D. Files, Applications
Answer : B
14. The _________takes any characters from standard input, and then echoes them to standard output.
A. kill character
B. cat command
C. cate command
D. control command
Answer : B
15. Whenever you move a directory from one location to another
A. The directory is moved the source file is not moved
B. All the subdirectory inside that directory are moved
C. All files inside the directory are moved
D. Both b and c
Answer : A
16. In Windows, start button is used to
A. Device setting
B. Run applications
C. All of above
D. Turn off the system
Answer : C
17. Taskbar is used for
A. Navigation program
B. Start a program
C. Switching between program
D. All of above
Answer : D
18. A _______________in a distributed system is a string of bits or characters that is used to refer to an entity.
A. name
B. attribute
C. identifiers
D. addresses
Answer : A
19. ____ runs on a computer hardware and serves as a platform for other system to run on
A. System software
B. Operating system
C. Application system
D. All of above
Answer : B
20. Ext2 is the standard file system of _______ and uses a block size of_____bytes
A. MS DOS,8K
B. Linux ,1024
C. Linux, 512
D. Unix, 512
Answer : B
21. RPN stands for
A. Reverse Polish Notation
B. Record Police Notation
C. Record Polish Notation
D. Reverse Police Negation
Answer : A
22. A bar that infrm you the available options in your computer, opened applications, background running applications and can be used to switch between applications quickly is
A. Menu bar
B. Tool bar
C. Status bar
D. Task bar
Answer : D
23. Which of the following is suitable after you install new drivers?
A. Hibernate
B. Sleep
C. Restart
D. Shut Down
Answer : C
24. The _____________ are based on modification of the original message in some manner, or on creation of a false message.
A. Passive attack
B. Release of message content attack
C. Traffic analysis attack
D. Active attack
Answer : D
25. The Network Time Protocol is similar to _______________algorithm in that synchronization is also performed using time servers and an attempt is made to correct for communication latencies.
A. Banker's
B. Divide and conquer's
C. Cristians
D. Xdelta's
Answer : C
26. ______________ are popular way to improve application through parallelism.
A. Processes
B. Threads
C. Context switching
D. none of these
Answer : B
27. An option commonly takes the form of a _____followed by __________characters.
A. dot, one or more
B. dash, only one
C. dash, one or more
D. dot,only two
Answer : C
28. Recently deleted files are stored in
A. Taskbar
B. Desktop
C. My computer
D. Recycle bin
Answer : D
29. Which of the following is drop down list?
A. Combo box
B. List
C. Text area
D. None
Answer : A
30. The date and time displays on
A. Taskbar
B. Launch pad
C. Status bar
D. System tray
Answer : D
31. Which components appear in the initial Windows start up display?
A. Start menu
B. Dialog boxes
C. Taskbar
D. All of above
Answer : C
32. The ___ contains commands associated with the My Computer window
A. Start menu
B. Standard menu
C. System menu
D. None of the above
Answer : C
33. One of the wonderful things about UNIX is its ___________names.
A. Unlimited path
B. Unlimited directory
C. Limited path
D. Limited file
Answer : A
34. Choose the correct statement from the following.
A. In computer terminology, variables are symbols which stand for some value.
B. An alternative method for executing the commands in the file backup is to make the file as directory.
C. The restricted shell gives more control to the system administrator and restricts the options of the user.
D. The decision making done by computer programs is in the form of conditional execution.
Answer : C
35. ______________ occurs when multiple processes or threads read and write data items so that the final result depends on the order of execution of instructions in the multiple processes.
A. Race condition
B. Mutual exclusion
C. Exception
D. Interrupt
Answer : A
36. In the case of____________, message remains in the senders address space until the receiver executes the corresponding receive.
A. No buffering
B. Single message buffering
C. Unbounded-capacity buffer
D. Finite bound buffer
Answer : A
37. A solution to starvation is _____________.
A. segmentation
B. Aging
C. Paging
D. virtual memory
Answer : B
38. In layered approach each layer uses the functions and services of ------------------
A. kernel
B. lower-level layers
C. higher-level layers
D. all of these
Answer : B
39. Load balancing algorithms in ______________ class use the processor and process characteristics to allocate processes to nodes.
A. Static
B. Dynamic
C. Deterministic
D. Probabilistic
Answer : C
40. An orphan process is automatically inherited by the _____and becomes a _______ of this process.
A. 'init' process, father
B. 'init' process, child
C. 'initial process, father
D. 'it' process, child
Answer : B
41. A shared memory segment first needs to be allocated (create, using the__________ system call.
A. semget()
B. msgrcv()
C. shmget()
D. mknod()
Answer : C
42. Which one of the following statements is true?
A. The cat command cares which file it receives as input or where the input goes.
B. Relative pathnames begin with something other than the slash character
C. UNIX shells never remember their current working directory (CW.
D. The cat command interprets -X as an option character rather than a pathname.
Answer : B
43. IPC stands for _________
A. Integrated parallel communication
B. Intermediate process call
C. Internal program call
D. Inter process communication
Answer : D
44. The primary purpose of an operating system is a …
A. To allow people to use the computer
B. To make the most efficient use of computer hardware
C. To make computer easier to use
D. To keep system programmer employed
Answer : B
45. The algorithm should be scalable i.e. _____________.
A. The system should not enter a state in which nodes spend all their time migrating processes or exchanging control messages without doing any useful work.
B. The system should be able to handle small and large networked systems.
C. The algorithm should not be affected by the crash of one or more nodes in the system.
D. The process assignment decisions should be based on the current load of the system and not on some fixed static policy.
Answer : B
46. What is Dr. Watson?
A. IT Expert
B. Diagnosis tool
C. Surgeon
D. None
Answer : B
47. A sequence of instructions telling the computer what to do is called a_____________
A. program
B. language
C. translator
D. package
Answer : A
48. A process may create a new process by executing ___________system call.
A. init
B. fork
C. create
D. new
Answer : B
49. Which of the following operating system reads and reacts in actual time?
A. Quick Response System
B. Time Sharing System
C. Batch Processing System
D. Real Time System
Answer : D
50. Which one is true for unconditional disk formatting?
A. Transfer system files after format
B. Do not check/scan surface after format
C. Destroys every byte of data on a disk by overwriting it with with blank spaces
D. All of above
Answer : C

Sharing is caring