---Advertisement---
Operating System Computer Science Engineering

Operating System MCQ Question-Answer Part 4

By smart_answer13

Published on:

Operating System MCQ Question-Answer Part 4
---Advertisement---

Q.1 What is an operating system?

       A. System service provider to the application programs

       B. Interface between the hardware and application programs

       C. Collection of programs that manages hardware resources

       D. All of the mentioned

Ans : All of the mentioned


Q.2 In Operating Systems, which of the following is/are CPU scheduling algorithms?

       A. Shortest Job First

       B. Priority

       C. Round Robin

       D. All of the mentioned

Ans : All of the mentioned


Q.3 What is the main function of the command interpreter?

       A. to get and execute the next user-specified command

       B. to provide the interface between the API and application program

       C. to handle the files in the operating system

       D. Stateless

Ans : to get and execute the next user-specified command


Q.4 CPU scheduling is the basis of ___________.

       A. Larger memory sized systems

       B. None of the mentioned

       C. Multiprogramming operating systems

       D. Multiprocessor systems

Ans : Multiprogramming operating systems


Q.5 To access the services of the operating system, the interface is provided by the ___________.

       A. System calls

       B. API

       C. Library

       D. Assembly instructions

Ans : System calls


Q.6 Which one of the following errors will be handle by the operating system?

       A. connection failure in the network

       B. all of the mentioned

       C. lack of paper in printer

       D. power failure

Ans : All of the mentioned


Q.7 Which one of the following is not true?

       A. kernel is made of various modules which can not be loaded in running operating system

       B. kernel is the program that constitutes the central core of the operating system

       C. kernel remains in the memory during the entire computer session

       D. kernel is the first part of the operating system to load into memory during booting

Ans : kernel is made of various modules which can not be loaded in running operating system


Q.8 If a process fails, most operating system write the error information to a ______.

       A. another running process

       B. none of the mentioned

       C. new file

       D. log file

Ans : log file


Q.9 Where is the operating system placed in the memory?

       A. in the low memory

       B. none of the mentioned

       C. either low or high memory (depending on the location of interrupt vector)

       D. in the high memory

Ans : either low or high memory (depending on the location of interrupt vector)


Q.10 Which one of the following is not a real time operating system?

       A. Palm OS

       B. VxWorks

       C. RTLinux

       D. QNX

Ans : Palm OS


Q.11 What does OS X has?

       A. Microkernel

       B. Hybrid kernel

       C. Monolithic kernel with modules

       D. Monolithic kernel

Ans : Hybrid kernel


Q.12 In a timeshare operating system, when the time slot assigned to a process is completed, the process switches from the current state to?

       A. Terminated state

       B. Blocked state

       C. Suspended state

       D. Ready state

Ans : Ready state


Q.13 In operating system, each process has its own __________.

       A. pending alarms, signals, and signal handlers

       B. All of the mentioned

       C. open files

       D. address space and global variables

Ans : All of the mentioned


Q.14 When a process is in a “Blocked” state waiting for some I/O service. When the service is completed, it goes to the __________.

       A. Suspended state

       B. Ready state

       C. Terminated state

       D. Running state

Ans : Ready state


Q.15 Cascading termination refers to the termination of all child processes if the parent process terminates ______.

       A. Abnormally

       B. None of the mentioned

       C. Normally or abnormally

       D. Normally

Ans : Normally or abnormally


Q.16 The portion of the process scheduler in an operating system that dispatches processes is concerned with ____________.

       A. assigning running processes to blocked queue

       B. All of the mentioned

       C. assigning ready processes to waiting queue

       D. assigning ready processes to CPU

Ans : assigning ready processes to CPU


Q.17 Transient operating system code is a code that ____________.

       A. never enters the memory space

       B. is not easily accessible

       C. stays in the memory always

       D. comes and goes as needed

Ans : comes and goes as needed


Q.18 For an effective operating system, when to check for deadlock?

       A. at fixed time intervals

       B. None of the mentioned

       C. every time a resource request is made at fixed time intervals

       D. every time a resource request is made

Ans : every time a resource request is made at fixed time intervals


Q.19 The FCFS algorithm is particularly troublesome for ____________.

       A. multiprocessor systems

       B. multiprogramming systems

       C. operating systems

       D. time sharing systems

Ans : time sharing systems


Q.20 A deadlock avoidance algorithm dynamically examines the __________ to ensure that a circular wait condition can never exist.

       A. resources

       B. resource allocation state

       C. operating system

       D. system storage state

Ans : resource allocation state


Q.21 Swapping _______ be done when a process has pending I/O, or has to execute I/O operations only into operating system buffers.

       A. maybe

       B. must

       C. must never

       D. can

Ans : must never


Q.22 The operating system is responsible for?

       A. booting from disk

       B. All of the mentioned

       C. bad-block recovery

       D. disk initialization

Ans : All of the mentioned


Q.23 The main memory accommodates ____________.

       A. user processes

       B. Operating System

       C. CPU

       D. All of the mentioned

Ans : Operating system


Q.24 Using transient code, _______ the size of the operating system during program execution.

       A. changes

       B. decreases

       C. maintains

       D. increases

Ans : changes


Q.25 The operating system and the other processes are protected from being modified by an already running process because ____________.

       A. they have a protection algorithm

       B. they are in different logical addresses

       C. every address generated by the CPU is being checked against the relocation and limit registers

       D. they are in different memory spaces

Ans : every address generated by the CPU is being checked against the relocation and limit registers


Q.26 To obtain better memory utilization, dynamic loading is used. With dynamic loading, a routine is not loaded until it is called. For implementing dynamic loading ____________.

       A. special support from hardware is required

       B. special support from both hardware and operating system is essential

       C. special support from operating system is essential

       D. user programs can implement dynamic loading without any special support from hardware or operating system

Ans : user programs can implement dynamic loading without any special support from hardware or operating system


Q.27 The operating system maintains a ______ table that keeps track of how many frames have been allocated, how many are there, and how many are available.

       A. mapping

       B. frame

       C. memory

       D. page

Ans : frame


Q.28 In real time operating system ____________.

       A. all processes have the same priority

       B. a task must be serviced by its deadline period

       C. process scheduling can be done only once

       D. kernel is not required

Ans : a task must be serviced by its deadline period


Q.29 The _________ presents a uniform device-access interface to the I/O subsystem, much as system calls provide a standard interface between the application and the operating system.

       A. I/O systems

       B. Buses

       C. Device drivers

       D. Devices

Ans : Device drivers


Q.30 Hard real time operating system has ______________ jitter than a soft real time operating system.

       A. more

       B. none of the above

       C. equal

       D. less

Ans : less


Q.31 For real time operating systems, interrupt latency should be ____________.

       A. minimal

       B. dependent on the scheduling

       C. zero

       D. maximum

Ans : minimal


Q.32 The priority of a process will ______________ if the scheduler assigns it a static priority.

       A. change

       B. none of the mentioned

       C. depends on the operating system

       D. remain unchanged

Ans : remain unchanged


Q.33 Which one of the following is a real time operating system?

       A. RTLinux

       B. All of the mentioned

       C. Windows CE

       D. VxWorks

Ans : All of the mentioned


Q.34 What are the characteristics of stack based IDS?

       A. It models the normal usage of the network as a noise characterization

       B. The host operating system logs in the audit information

       C. It is programmed to interpret a certain series of packets

       D. They are integrated closely with the TCP/IP stack and watch packets

Ans : They are integrated closely with the TCP/IP stack and watch packets


Q.35 What are the characteristics of Host based IDS?

       A. The host operating system logs in the audit information

       B. All of the mentioned

       C. Logs are analysed to detect tails of intrusion

       D. Logs includes logins, file opens, and program executions

Ans : All of the mentioned


Q.36 The information about all files is kept in ____________.

       A. swap space

       B. Operating System

       C. separate directory structure

       D. none of the mentioned

Ans : separate directory structure


Q.37 If the sum of the working – set sizes increases, exceeding the total number of available frames ____________.

       A. the system crashes

       B. the memory overflows

       C. the operating system selects a process to suspend

       D. then the process crashes

Ans : the operating system selects a process to suspend


Q.38 What will happen in the single level directory?

       A. All files are contained in different directories all at the same level

       B. None of the mentioned

       C. All files are contained in the same directory

       D. Depends on the operating system

Ans : All files are contained in the same directory


Q.39 The operating system keeps a small table containing information about all open files called ____________.

       A. directory table

       B. system table

       C. file table

       D. open-file table

Ans : open-file table


Q.40 The operating system _______ the links when traversing directory trees, to preserve the acyclic structure of the system.

       A. considers

       B. none of the mentioned

       C. deletes

       D. ignores

Ans : ignores


Q.41 To recover from failures in the network operations _____________ information may be maintained.

       A. State

       B. Operating System

       C. ip address

       D. Stateless

Ans : State


Q.42 Whenever a process needs I/O to or from a disk it issues a ______________.

       A. a special procedure

       B. All of the mentioned

       C. system call to the operating system

       D. system call to the CPU

Ans : system call to the operating system


Q.43 On systems where there are multiple operating system, the decision to load a particular one is done by _____________.

       A. file control block

       B. bootstrap

       C. process control block

       D. boot loader

Ans : boot loader


Q.44 The _______ program initializes all aspects of the system, from CPU registers to device controllers and the contents of main memory, and then starts the operating system.

       A. main

       B. rom

       C. bootstrap

       D. bootloader

Ans : bootstrap


Q.45 The two steps the operating system takes to use a disk to hold its files are _______ and ________.

       A. logical formatting & swap space creation

       B. partitioning & logical formatting

       C. caching & logical formatting

       D. swap space creation & caching

Ans : partitioning & logical formatting


Q.46 Which principle states that programs, users, and even the systems be given just enough privileges to perform their task?

       A. principle of process scheduling

       B. none of the mentioned

       C. principle of least privilege

       D. principle of operating system

Ans : principle of least privilege


Q.47 In SCSI disks used in high end PCs, the controller maintains a list of _________ on the disk. The disk is initialized during ________ formatting which sets aside spare sectors not visible to the operating system.

       A. bad blocks, low level formatting

       B. bad blocks, partitioning

       C. destroyed blocks, partitioning

       D. destroyed blocks, high level formatting

Ans : bad blocks, low level formatting


Q.48 What are the types of distributed operating systems?

       A. Level based Operating system

       B. All of the mentioned

       C. Zone based Operating system

       D. Network Operating system

Ans : Level based Operating system


Q.49 Network operating system runs on ___________.

       A. server

       B. none of the mentioned

       C. every system in the network

       D. both server and every system in the network

Ans : server


Q.50 In Unix, which system call creates the new process?

       A. fork

       B. none of the mentioned

       C. create

       D. new

Ans : fork


Operating System MCQ Operating System MCQ Question-Answer

smart_answer13

---Advertisement---

Related Post

Operating System Processes MCQ (Interview-Exam) Question-Answer

Q.1 To access the services of operating system, the interface is provided by the ___________.        A. API        B. Assembly instructions     ...

AH and ESP Protocols Interview/Exam Question-Answer

Q.1 Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?        A. SHA        B. Kerberos ...

UDP Interview/Exam Question-Answer

Q.1 Return value of the UDP port “Chargen” is _______.        A. String of integers        B. String of characters        C. ...

TCP Interview/Exam Question-Answer

Q.1 In TCP, sending and receiving data is done as _______.        A. Sequence of characters        B. Stream of bytes       ...

Leave a Comment