Home

RBI Grade B officer - Operating System 1000+ MCQ [Solved] PDF Download

Thursday 9th of March 2023

Sharing is caring

1. Wiretapping to capture data in a network is an example of ________________
A. interruption
B. interception
C. fabrication
D. modification
Answer : B
2. ______________ selects a process from among the ready processes to execute on the CPU.
A. CPU Scheduler
B. Loader
C. Dispatcher
D. Compiler
Answer : A
3. The Bankers algorithm is used
A. to prevent deadlock
B. to rectify deadlock
C. to detect deadlock
D. to slove deadlock
Answer : A
4. The name services of DCE include ________
A. the Cell Directory Service
B. the Global Directory Service
C. the Global Directory Agent
D. A,B and C
Answer : D
5. The _____________ are based on modification of the original message in some manner, or on creation of a false message.
A. Passive attack
B. Release of message content attack
C. Traffic analysis attack
D. Active attack
Answer : D
6. To install the new font
A. Start -> setting -> font
B. Start -> control panel -> font -> install new font
C. Start -> setting -> control panel -> font -> install new font
D. Start -> setting -> control panel -> font
Answer : C
7. Which components appear in the initial Windows start up display?
A. Start menu
B. Dialog boxes
C. Taskbar
D. All of above
Answer : C
8. ______________ refers to the technology in which some space in hard disk is used as an extension of main memory.
A. Cache memory
B. Paging
C. Virtual memory
D. Associative memory
Answer : C
9. ______________is responsible for allocating primary memory to processes and for assisting the programmer in loading and storing the contents of the primary memory.
A. Operating system
B. Memory manager
C. Database administrator
D. RAM
Answer : B
10. What is the function of radio button?
A. To select multiple option
B. To select single option
C. To select all option
D. All of above
Answer : B
11. What is dispatch latency?
A. The time taken by the dispatcher to stop one process and start another
B. The whole time taken by all processor
C. The time taken by the processor to write a file into disk
D. None of Above
Answer : A
12. The command used to create logical drive for specific location of disk
A. Format
B. Fdisk
C. Subst
D. All of the above
Answer : C
13. The ______________ unpacks the call receipt messages from local RPC Runtime and makes a perfect local call to invoke the appropriate procedure in the server.
A. server Stub
B. server
C. client
D. client stub
Answer : A
14. A process control block contains varies attributes required by _____________ to control a process.
A. RAM
B. virtual memory
C. BIOS
D. Operating System
Answer : D
15. In the case of____________, message remains in the senders address space until the receiver executes the corresponding receive.
A. No buffering
B. Single message buffering
C. Unbounded-capacity buffer
D. Finite bound buffer
Answer : A
16. A process is ____________________
A. A program in Execution.
B. An asynchronous activity.
C. The 'dispatchable' unit.
D. All A, B, C
Answer : D
17. __________ deals with when a modified page should be written out to secondary memory.
A. Cleaning policy
B. Fetch policy
C. Frame locking
D. None
Answer : A
18. Find out the characteristics of System-oriented names:
A. They are large integers or bit strings.
B. They are of the same size
C. Generally shorter than human-oriented names and are easy for manipulations like hashing, sorting and so on.
D. All A, B, C
Answer : D
19. ____________ file system allows sharing in multiple different locations grouped under one folder.
A. Direct
B. distributed
C. sequential
D. parallel
Answer : B
20. What is Dr. Watson?
A. IT Expert
B. Diagnosis tool
C. Surgeon
D. None
Answer : B
21. Identify the server:
This type of server generally remains in existence indefinitely. It is shared by many clients. Servers of this type are created and installed before the clients use them.

A. Instance-per-call-servers
B. Persistent Servers
C. Non-Persistent Servers
D. Semantic server
Answer : B
22. Creation of a semaphore set is done using the _______system call.
A. semget()
B. semsget()
C. mknod()
D. sempget()
Answe : A
23. In layered approach each layer uses the functions and services of ------------------
A. kernel
B. lower-level layers
C. higher-level layers
D. all of these
Answer : B
24. A _____________is a collection of processors that do not share memory, peripheral devices,or a clock.
A. Computer system
B. distributed system
C. network
D. None of the above
Answer : B
25. Which of the following does not occur during the power-on-self-test (POST)?
A. The scandisk utility begins to run
B. The video card and video memory are tested
C. The BIOS identification process occurs
D. Memory chip are checked to ensure that they are working properly
Answer : A
26. Which of the following operating system reads and reacts in actual time?
A. Quick Response System
B. Time Sharing System
C. Batch Processing System
D. Real Time System
Answer : D
27. In___________, the requesting device or devices assert the signal bus_request.
A. Priority encoded arbitration
B. Distributed arbitration by self-selection
C. Priority arbitration
D. Daisy chain arbitration
Answer : D
28. In ____________ location policies a random node is polled to check its state and the task is transferred if it will not be overloaded; polling is continued until a suitable node is found.
A. Threshold
B. Shortest
C. Bidding
D. Pairing
Answer : A
29. The Basic Input Output System (BIOS) resides in
A. RAM
B. ROM
C. The CPU
D. Memory Cache
Answer : B
30. ______________ occurs when multiple processes or threads read and write data items so that the final result depends on the order of execution of instructions in the multiple processes.
A. Race condition
B. Mutual exclusion
C. Exception
D. Interrupt
Answer : A
31. Process migration involves__________________
A. Selection of a process to be migrated
B. Selection of destination system or node
C. Actual transfer of the selected process to the destination system or node
D. All A, B, C
Answer : D
32. Which buffering strategy is used for implementing synchronous communication?
A. Single message buffer
B. Unbounded - Capacity buffer
C. Finite-Bound Buffer
D. All can be used.
Answer : A
33. The maximum size of a write file is limited to only
A. Name of the file
B. Extension of the file
C. The amount of memory in your computer
D. All of above
Answer : C
34. DSM stands for______________
A. Direct shared memory
B. Direct system memory
C. Distributed shared memory
D. Distributed system memory
Answer : C
35. Which one is true for unconditional disk formatting?
A. Transfer system files after format
B. Do not check/scan surface after format
C. Destroys every byte of data on a disk by overwriting it with with blank spaces
D. All of above
Answer : C
36. Ext2 is the standard file system of _______ and uses a block size of_____bytes
A. MS DOS,8K
B. Linux ,1024
C. Linux, 512
D. Unix, 512
Answer : B
37. _________, as a feature of good distributed file system, clients should be able to continue working if a file server crashes. Likewise, data must not be lost and a restarted file server must be able to recover to a valid state.
A. Scalability
B. Reliability
C. Flexibility
D. Fault tolerance
Answer : D
38. IDL stands for_____________________
A. Integrated Data library
B. Isolated Data Library
C. Interface Data Language
D. Interface Definition Language
Answer : D
39. The usual su command syntax is
A. su-pwd
B. su-pd
C. su - userID
D. Sue- ID
Answer : C
40. Because the I/O devices are not synchronized with the CPU, some information must be exchanged between the CPU and the device to ensure that the data is received reliably. This interaction between the CPU and an I/O device is usually referred to as ____________
A. polling
B. arbitration
C. handshaking
D. interrupting
Answer : C
41. The early ARPAnet is an example of a distributed computing system based on the ________________.
A. Minicomputer model
B. Workstation model
C. Hybrid model
D. Processor pool model
Answer : A
42. The date and time displays on
A. Taskbar
B. Launch pad
C. Status bar
D. System tray
Answer : D
43. Pick the wrong statement from the following.
A. UNIX systems originally came with a command interpreter called the Bourne Shell.
B. The cat command takes any characters from standard input, and then echoes them to standard output.
C. A pipe is a means of taking the output of one command and directing it as another command.
D. The manual entry is called a man page, even though it is often more than one page long
Answer : C
44. Two clocks are said to be synchronized at a particular instance of time if the difference in time values of the two clocks is less than some specified constant. The difference in time values of two clocks is called ___________.
A. Interrupt
B. Clock Frequency
C. Clock Ticks
D. Clock Skew
Answer : D
45. A standard UNIX system includes a set of ___________ and a set of ___________.
A. Commands ,files
B. Libraries, Applications
C. Libraries, files
D. Files, Applications
Answer : B
46. The _________takes any characters from standard input, and then echoes them to standard output.
A. kill character
B. cat command
C. cate command
D. control command
Answer : B
47. ____ runs on a computer hardware and serves as a platform for other system to run on
A. System software
B. Operating system
C. Application system
D. All of above
Answer : B
48. In case of ____________________transparency a file can transparently move to another server.
A. Location
B. Migration
C. Replication
D. Concurrency
Answer : B
49. A bar that inform you the available options in your computer, opened applications, background running applications and can be used to switch between applications quickly is
A. Menu bar
B. Tool bar
C. Status bar
D. Task bar
Answer : D
50. Which of the following is not essential to shut down your computer?
A. XCOPY
B. Edit
C. Sys
D. None of the above
Answer : D

Sharing is caring