Google News
logo
Operating System - Quiz(MCQ)
A)
MAC
B)
Linux
C)
Oracle
D)
Windows

Correct Answer :   Oracle


Explanation : Oracle is an RDBMS (Relational Database Management System). It is known as Oracle Database, Oracle DB, or Oracle Only. The first database for enterprise grid computing is the Oracle database.

A)
Links the program with subroutines
B)
Helps to create a flow chart of the programs
C)
Provides a layer so as to act as a user-friendly interface that enables the programmer to draw a flow chart
D)
All of the above

Correct Answer :   Provides a layer so as to act as a user-friendly interface that enables the programmer to draw a flow chart


Explanation : OS acts as an interface between the user.

A)
system service provider to the application programs
B)
collection of programs that manages hardware resources
C)
interface between the hardware and application programs
D)
All of the above

Correct Answer :   All of the above


Explanation : An Operating System acts as an intermediary between user/user applications/application programs and hardware. It is a program that manages hardware resources. It provides services to application programs.

A)
to get and execute the next user-specified command
B)
to handle the files in the operating system
C)
to provide the interface between the API and application program
D)
None of the above

Correct Answer :   to get and execute the next user-specified command


Explanation : The main function of a command interpreter is to get and execute the next user-specified command. Command Interpreter checks for valid command and then runs that command else it will throw an error.

A)
12
B)
8
C)
5
D)
4

Correct Answer :   8


Explanation : The maximum length of the filename is 8 characters in the DOS operating system. It is commonly known as an 8.3 filename.

A)
1949
B)
1950
C)
1951
D)
1952

Correct Answer :   1950


Explanation : The first operating system was developed in the early 1950's. It was also called a single-stream batch processing system because it presented data in groups.

A)
1970
B)
1975
C)
1980
D)
1985

Correct Answer :   1985


Explanation : The first MS Windows operating system was introduced in early 1985.

A)
Priority
B)
Round Robin
C)
Shortest Job First
D)
All of the above

Correct Answer :   All of the above


Explanation :

In Operating Systems, CPU scheduling algorithms are :

i) First Come First Served scheduling
ii) Shortest Job First scheduling
iii) Priority scheduling
iv) Round Robin scheduling
v) Multilevel Queue scheduling
vi) Multilevel Feedback Queue scheduling

All of these scheduling algorithms have their own advantages and disadvantages.

A)
.xls
B)
.bmp
C)
.txt
D)
.ppt

Correct Answer :   .txt


Explanation : The .txt file extension is a standard text document extension that contains the unformatted text. It is the default file extension for the notepad.

A)
Address
B)
Operation code
C)
Locator
D)
Flip-Flop

Correct Answer :   Operation code

A)
there is no need for an address i.e. the data is used as an address
B)
the data are accessed sequentially
C)
the address of the data is generated by the CPU
D)
the address of the data is supplied by the users

Correct Answer :   there is no need for an address i.e. the data is used as an address

A)
Thread
B)
Process
C)
Program
D)
Software

Correct Answer :   Software


Explanation : An operating system is a software that performs all the basic tasks like file management, process management, etc.

A)
3
B)
5
C)
7
D)
8

Correct Answer :   7


Explanation : Mainly there are 7 types of operating systems: Batch OS, Multitasking OS, Multiprocessing OS, Real-time OS, Distributed OS, Network OS, and mobile OS.

A)
shell
B)
kernel
C)
prompt
D)
command

Correct Answer :   shell


Explanation : The command interpreter is also called the shell.

A)
File attribute table
B)
Font attribute table
C)
File allocation table
D)
Format allocation table

Correct Answer :   File allocation table


Explanation : The FAT stands for File allocation table. The FAT is a file system architecture. It is used in computer systems and memory cards. A FAT of the contents of a computer disk indicates which field is used for which file.

A)
By compiler
B)
By operating system
C)
By interpreter
D)
By application software

Correct Answer :   By operating system


Explanation : BIOS is used by the operating system. It is used to configure and identify the hardware in a system such as the hard drive, floppy drive, optical drive, CPU, and memory.

A)
Error detection aids
B)
Control over system performance
C)
Coordination between other software and users
D)
All of the above

Correct Answer :   All of the above


Explanation : Error detection aids, Control over system performance, Job accounting, Coordination between other software and users, Process management, Memory management, etc are some of the common features of the operating system.

A)
Batch Operating system
B)
Distributed Operating System
C)
Multitasking Operating System
D)
Time-sharing Operating System

Correct Answer :   Batch Operating system


Explanation : Batch Operating system does not interact with the computer directly, in fact in this operating system each user prepares his job in an offline device like a punch card and submits it to the computer.

A)
Batch Operating system
B)
Time-sharing Operating System
C)
Distributed Operating System
D)
Multitasking Operating System

Correct Answer :   Time-sharing Operating System


Explanation : Time-sharing Operating System is a technique that enables many people, located at various terminals, to use a particular computer system at the same time; it is shared among different users.

A)
assembler
B)
load and go
C)
linking loader
D)
cross compiler

Correct Answer :   linking loader

A)
a program in execution
B)
a job in secondary memory
C)
contents of main memory
D)
program in High level language kept on disk

Correct Answer :   a program in execution

A)
performs indicated operations on two fast registers of the machine and leave the result in one of the registers.
B)
are variations in the use of fundamental addressing structures, or some associated actions which are related to addressing.
C)
defines the fundamental method of determining effective operand addresses
D)
All of the above

Correct Answer :   defines the fundamental method of determining effective operand addresses

A)
To scan
B)
To turn off
C)
Install the program
D)
Restarting computer

Correct Answer :   Restarting computer


Explanation : Booting is a process of the restart the computer. After restarting it, there is no software in the computer's main memory.

A)
The deadlock occurs.
B)
The buffering occurs.
C)
The page is present in memory.
D)
The page does not present in memory.

Correct Answer :   The page does not present in memory.


Explanation : Page faults occur when a process tries to access a block page of the memory and that page is not stored in RAM (Read only memory) or memory.

A)
API
B)
System calls
C)
Library
D)
Assembly instructions

Correct Answer :   System calls


Explanation : To access services of the Operating System an interface is provided by the System Calls. Generally, these are functions written in C and C++. Open, Close, Read, Write are some of most prominently used system calls.

A)
multiprogramming operating systems
B)
multiprocessor systems
C)
larger memory sized systems
D)
None of the above

Correct Answer :   multiprogramming operating systems

A)
power failure
B)
lack of paper in printer
C)
connection failure in the network
D)
All of the above

Correct Answer :   All of the above


Explanation : All the mentioned errors are handled by OS. The OS is continuously monitoring all of its resources. Also, the OS is constantly detecting and correcting errors.

A)
To solve the deadlock
B)
To deadlock recovery
C)
To prevent deadlock
D)
None of the above

Correct Answer :   To prevent deadlock


Explanation : Banker's algorithm is used to prevent the deadlock condition. The banker algorithm is sometimes called the detection algorithm. It is named the banker algorithm because it is used to determine whether a loan can be granted in the banking system or not.

A)
Taskbar
B)
Hard disk
C)
Recycle bin
D)
None of the above

Correct Answer :   Recycle bin


Explanation : When you delete a file on your computer device, it is transferred to your computer system's recycle bin or trash.

A)
Batch OS
B)
Real time OS
C)
Time Sharing OS
D)
Quick sharing OS

Correct Answer :   Real time OS

A)
Context Switching
B)
Deadlock
C)
Starvation
D)
Synchronization

Correct Answer :   Context Switching


Explanation : Multiple processes are run in parallel in CPU. Sometimes when a high priority process comes up, the kernel transfers control of the CPU to that process.

A)
C#
B)
C++
C)
.NET
D)
C Language

Correct Answer :   C Language


Explanation : UNIX is written in C language. It was developed in 1970s at AT & T Bell laboratories.

A)
the page size
B)
the size of the physical memory
C)
the total number of processes in memory
D)
the instruction set architecture

Correct Answer :   the instruction set architecture

A)
reducing the miss penalty
B)
exploiting the reference’s spatial locality in a program
C)
exploiting the reference’s temporal locality in a program
D)
None of the above

Correct Answer :   exploiting the reference’s spatial locality in a program

A)
Deadlock cannot occur, but starvation can occur
B)
Deadlock can occur, but starvation cannot occur
C)
Both deadlock and starvation can occur
D)
Neither deadlock nor starvation can occur

Correct Answer :   Neither deadlock nor starvation can occur

38 .
Three concurrent processes X, Y, and Z execute three different code segments that access and update certain shared variables. Process X executes the P operation (i.e., wait) on semaphores a, b and c; process Y executes the P operation on semaphores b, c and d; process Z executes the P operation on semaphores c, d, and a before entering the respective code segments. After completing the execution of its code segment, each process invokes the V operation (i.e., signal) on its three semaphores. All semaphores are binary semaphores initialized to one. Which one of the following represents a deadlockfree order of invoking the P operations by the processes?
A)
X: P(b)P(a)P(c) Y:P(b)P(c)P(d) Z:P(a)P(c)P(d)
B)
X: P(a)P(b)P(c) Y:P(b)P(c)P(d) Z:P(c)P(d)P(a)
C)
X: P(a)P(b)P(c) Y:P(c)P(b)P(d) Z:P(c)P(d)P(a)
D)
X: P(b)P(a)P(c) Y:P(c)P(b)P(d) Z:P(a)P(c)P(d)

Correct Answer :   X: P(b)P(a)P(c) Y:P(b)P(c)P(d) Z:P(a)P(c)P(d)

A)
preemptive scheduling
B)
shortest job first
C)
first come first served
D)
non preemptive scheduling

Correct Answer :   preemptive scheduling

A)
pages out the first page in a given area
B)
pages out pages that have been used recently
C)
pages out pages that have been least used recently
D)
pages out pages that have not been used recently

Correct Answer :   pages out pages that have been least used recently

A)
have both their operands in the main store.
B)
which perform indicated operations on two fast registers of the machine and have the result in one of the registers
C)
which perform an operation on a register operand and an operand which is located in the main store, generally leaving the result in the register, expect in the case of store operation when it is also written into the specified storage location.
D)
All of the above

Correct Answer :   have both their operands in the main store.

A)
Large turnaround time
B)
It is very easy to debug the program in this operating system
C)
Other pending jobs are affected due to a lack of protection schemes
D)
All of the above

Correct Answer :   It is very easy to debug the program in this operating system

A)
In a multi-programmed batch system, the objective is to minimize processor use, whereas, in time-sharing systems, the objective is to maximize response time
B)
In a multi-programmed batch system, the objective is to maximize processor use, whereas, in time-sharing systems, the objective is to minimize response time
C)
Both (A) and (B)
D)
None of the above

Correct Answer :   In a multi-programmed batch system, the objective is to minimize processor use, whereas, in time-sharing systems, the objective is to maximize response time


Explanation : In a multi-programmed batch system, the objective is to maximize processor use, whereas, in time-sharing systems, the objective is to minimize response time.

A)
Batch Operating system
B)
Time-sharing Operating System
C)
Multitasking Operating System
D)
Distributed Operating System

Correct Answer :   Distributed Operating System


Explanation : Distributed Operating systems use multiple central processors to serve multiple real-time applications and multiple users.

A)
Security software
B)
Documentation system
C)
Utility program
D)
Networking software

Correct Answer :   Utility program

A)
the creation of a new process
B)
the dispatching of a task
C)
the creation of a new job
D)
increasing the priority of a task

Correct Answer :   the creation of a new process

A)
always occurs on large computers
B)
can always be avoided by swapping
C)
is a natural consequence of virtual memory systems
D)
can be caused by poor paging algorithms

Correct Answer :   can be caused by poor paging algorithms

A)
Batch Operating System
B)
Time-sharing Operating Systems
C)
Both (A) and (B)
D)
None of the above

Correct Answer :   Time-sharing Operating Systems


Explanation : In Timesharing Operating Systems, CPU idle time is reduced as it provides a quick response, whereas in batch OS CPU is often idle.

A)
Mobile Operating system
B)
Batch Operating system
C)
Network operating system
D)
Real-time Operating system

Correct Answer :   Network operating system


Explanation : Network Operating System runs on a server and provides the server the capability to manage data, users, groups, security, applications, and other networking functions.

A)
in the low memory
B)
in the high memory
C)
either low or high memory (depending on the location of interrupt vector)
D)
None of the above

Correct Answer :   either low or high memory (depending on the location of interrupt vector)

A)
log file
B)
new file
C)
another running process
D)
None of the above

Correct Answer :   log file


Explanation : If a process fails, most operating systems write the error information to a log file. Log file is examined by the debugger, to find out what is the actual cause of that particular problem. Log file is useful for system programmers for correcting errors.

A)
QNX
B)
RTLinux
C)
VxWorks
D)
Palm OS

Correct Answer :   Palm OS


Explanation : VxWorks, QNX & RTLinux are real-time operating systems. Palm OS is a mobile operating system. Palm OS is developed for Personal Digital Assistants (PDAs).

A)
Windows operating system
B)
Open-source operating system
C)
Private operating system
D)
None of the above

Correct Answer :   Open-source operating system


Explanation : The Linux operating system is an open-source operating system made up of a kernel. It is a very safe operating system.

A)
Distributed shared memory
B)
Direct system memory
C)
Direct system module
D)
Demoralized system memory

Correct Answer :   Distributed shared memory


Explanation : The DSM stands for Distributed Shared Memory.

A)
Interface data library
B)
Interface direct language
C)
Interface definition language
D)
None of the above

Correct Answer :   Interface definition language


Explanation : The IDL stands for Interface Definition Language. It is used to establish communications between clients and servers in RPC (Remote Procedure Call).

A)
Hot boot
B)
Cold boot
C)
Cold hot boot
D)
Cold hot strap

Correct Answer :   Cold boot


Explanation : Bootstrapping is also known as the cool boot.

A)
OS and CPU level
B)
Security and Memory level
C)
Mainframe and motherboard level
D)
Kernel and User level

Correct Answer :   Kernel and User level


Explanation : OS classifies the threads into two types - User level thread: Implemented by user and Kernel level thread, implemented by the kernel.

A)
SJF
B)
Priority scheduling
C)
FCFS
D)
None of the above

Correct Answer :   FCFS


Explanation : FCFS allocates resources to the process that requests first.

A)
Real mode, protected mode
B)
Direct mode, indirect mode
C)
Private mode, public mode
D)
Virtual mode, dedicated mode

Correct Answer :   Real mode, protected mode


Explanation : Two operating modes of AT are Real mode and protected mode.

A)
When the process is currently using the CPU
B)
When the process is scheduled to run after some execution
C)
When the process is dependent of the execution time of some other process.
D)
None of the above

Correct Answer :   None of the above


Explanation : Ready state of the process means the process has all necessary resources which are required for execution of that process when CPU is allocated.

A)
A I/O device to display graphics.
B)
A line printer that prints the output of a number of jobs.
C)
A terminal that inputs user data
D)
None of the above

Correct Answer :   A line printer that prints the output of a number of jobs.

A)
Volatile
B)
Non-volatile
C)
Restricted
D)
Unrestricted

Correct Answer :   Volatile

63 .
In the case of a working-set strategy, which of these is done by the OS to prevent thrashing?
 
P. If there are enough extra frames, it initiates another process.
 
Q. It selects any process for suspending in case the sum of the working sets’ sizes exceed the number of available frames.
A)
P only
B)
Q only
C)
Both P and Q
D)
Neither P nor Q

Correct Answer :   Both P and Q

A)
Program counter
B)
General-purpose registers
C)
Translation look-aside buffer
D)
None of the above

Correct Answer :   Translation look-aside buffer

A)
Cache
B)
Register
C)
Disk
D)
Main Memory

Correct Answer :   Disk


Explanation : A disk driver is a device driver that allows a specific disk drive to communicate with the remainder of the computer. A good example of this driver is a floppy disk driver.

A)
when the thread blocks
B)
when the thread spawns
C)
when the thread unblocks
D)
when the thread terminates

Correct Answer :   when the thread terminates

A)
to construct a new thread
B)
convert a blocking system call into non blocking system call
C)
to communicate between threads
D)
None of the above

Correct Answer :   convert a blocking system call into non blocking system call


Explanation : Jacketing technique used to convert a blocking system call into non blocking system call.

A)
Compress the address space a process can use
B)
share the memory and resources of the process to which the threads belong
C)
an application having several threads of activity all within the same address space.
D)
All of the above

Correct Answer :   All of the above


Explanation : Resource sharing is used for sharing memory and resources and well as compressing the address space.

A)
the total number of blocks that have been used for the index, size of all the blocks
B)
the actual size of all blocks, the size of the blocks’ address
C)
the of the blocks’ size, the blocks’ address size, and the total number of blocks that have been used for the index
D)
None of the above

Correct Answer :   the total number of blocks that have been used for the index, size of all the blocks

A)
Save process data
B)
Store the super-block
C)
Store the device drivers
D)
Save temporary HTML pages

Correct Answer :   Save process data

A)
LRU
B)
FIFO
C)
Both LRU and FIFO
D)
Optimal Page Replacement

Correct Answer :   FIFO

A)
A larger RAM is faster
B)
Virtual memory increases
C)
Fewer page faults occur
D)
Fewer segmentation faults occur

Correct Answer :   Fewer page faults occur

A)
Deadlock avoidance is less restrictive than deadlock prevention
B)
Deadlock avoidance requires knowledge of resource requirements a priori
C)
In deadlock avoidance, the request for resources is always granted if the result state is safe
D)
In deadlock prevention, the request for resources is always granted if the resulting state is safe

Correct Answer :   In deadlock prevention, the request for resources is always granted if the resulting state is safe

A)
6
B)
7
C)
8
D)
9

Correct Answer :   7


Explanation : If 6 resources are there then it may be possible that all three process have 2 resources and waiting for 1 more resource. Therefore, all of them will have to wait indefinitely. If 7 resources are there, then atleast one must have 3 resources so deadlock can never occur.

75 .
Consider the following snapshot of a system running n processes. Process i is holding Xi instances of a resource R, 1 <= i <= n. currently, all instances of R are occupied. Further, for all i, process i has placed a request for an additional Yi instances while holding the Xi instances it already has. There are exactly two processes p and q such that Yp = Yq = 0. Which one of the following can serve as a necessary condition to guarantee that the system is not approaching a deadlock?
A)
max (Xp, Xq) > 1
B)
min (Xp, Xq) > 1
C)
Xp + Xq >= min (Yk) where k != p and k != q
D)
min (Xp, Xq) < max (Yk) where k != p and k != q

Correct Answer :   Xp + Xq >= min (Yk) where k != p and k != q


Explaination :

Deadlock refers to a specific condition when two or more processes are each waiting for another to release a resource, or more than two processes are waiting for resources. 
 
Solution : Necessary condition to guarantee no deadlock which means without satisfying this condition, no deadlock is possible. Both the process p and q have no additional requirement; they both can be finished releasing Xp + Xq resources without asking for any additional resource. Using this, we can finish one more process only if condition B is satisfied. If the resources released by p and q are sufficient for another process waiting for Yk resources, then system is not approaching deadlock. i.e Xp+Xq > min (Yk) where k != p and k != q Note: Option B just ensured that the system can proceed from the current state. It does not guarantee that there won’t be a deadlock before all processes are finished.

A)
2
B)
3
C)
4
D)
5

Correct Answer :   2


Explanation : There are two types of real-time Operating Systems: Hard real-time systems, and soft real-time systems.

A)
Hard real-time systems
B)
Soft real-time system
C)
Both (A) and (B)
D)
None of the above

Correct Answer :   Hard real-time systems


Explanation : In a hard real-time system, secondary storage is limited or missing and the data is stored in ROM, moreover in these systems virtual memory is never found.

A)
8
B)
7
C)
6
D)
5

Correct Answer :   5


Explanation : In total there are 5 types of kernels :

* Monolithic kernels
* Microkernel kernels
* Hybrid Kernels
* Nano Kernels
* Exo kernels.

A)
Nano Kernels
B)
Hybrid Kernels
C)
Monolithic kernel
D)
Microkernel kernels

Correct Answer :   Monolithic kernel


Explanation : In a Monolithic kernel, the entire operating system runs as a single program.

A)
Linux
B)
Windows 95
C)
Windows 98
D)
Windows 7

Correct Answer :   Windows 7

A)
Nano Kernels
B)
Microkernel
C)
Hybrid Kernels
D)
Monolithic kernel

Correct Answer :   Microkernel


Explanation : The function of a microkernel is to provide a communication facility between the client programs; it also provides a facility for various services that are running in user space.

A)
Hybrid kernel
B)
Microkernel
C)
Monolithic kernel
D)
Monolithic kernel with modules

Correct Answer :   Hybrid kernel


Explanation : OS X has a hybrid kernel. Hybrid kernel is a combination of two different kernels. OS X is developed by Apple and originally it is known as Mac OS X.

A)
open files
B)
address space and global variables
C)
pending alarms, signals, and signal handlers
D)
All of the above

Correct Answer :   All of the above


Explanation : In Operating Systems, each process has its own address space which contains code, data, stack, and heap segments or sections. Each process also has a list of files that is opened by the process as well as all pending alarms, signals, and various signal handlers.

A)
Ready state
B)
Blocked state
C)
Suspended state
D)
Terminated state

Correct Answer :   Ready state


Explanation : In a time-sharing operating system, when the time slot given to a process is completed, the process goes from the running state to the Ready State. In a time-sharing operating system, unit time is defined for sharing CPU, it is called a time quantum or time slice. If a process takes less than 1 time quantum, then the process itself releases the CPU.

A)
Normally
B)
Abnormally
C)
Normally or abnormally
D)
None of the above

Correct Answer :   Normally or abnormally


Explanation : Cascading termination refers to the termination of all child processes if the parent process terminates Normally or Abnormally. Some systems don’t allow child processes to exist if the parent process has terminated. Cascading termination is normally initiated by the operating system.

A)
Running state
B)
Ready state
C)
Suspended state
D)
Terminated state

Correct Answer :   Ready state


Explanation : Suppose that a process is in “Blocked” state waiting for some I/O service. When the service is completed, it goes to the ready state. Process never goes directly to the running state from the waiting state. Only processes which are in ready state go to the running state whenever CPU allocated by operating system.

A)
To CPU protection
B)
To disk protection
C)
To memory protection
D)
None of the above

Correct Answer :   To memory protection


Explanation : The fence register is used for memory protection on the computer. It is a way to access the memory in the computer.

A)
Increases
B)
Decreases
C)
Remains constant
D)
None of the above

Correct Answer :   Increases

A)
MAC
B)
Ms-Dos
C)
Windows
D)
None of the above

Correct Answer :   Ms-Dos


Explanation : The single-user operating system is the operating system in which only one user can access the computer system at a time, and Ms-DOS is the best example of a single-user operating system.

A)
RAM
B)
CPU
C)
Data bus
D)
Address bus

Correct Answer :   Address bus


Explanation : The size of virtual memory is based on the address bus.

A)
fork
B)
ioctl
C)
longjmp
D)
exec

Correct Answer :   exec

92 .
Consider the following program:
main()
{
     if(fork()>0)
sleep(100);
}
 
A)
zombie process
B)
orphan process
C)
infinite process
D)
None of the above

Correct Answer :   zombie process

A)
The process of removing a thread after its work is executed
B)
The process of destroying the thread after its work is executed
C)
The process of terminating a thread process before its execution
D)
None of the above

Correct Answer :   The process of terminating a thread process before its execution

A)
Asynchronous termination
B)
Synchronous termination
C)
Immediate Termination
D)
Deferred cancellation

Correct Answer :   Asynchronous termination


Explanation : When a thread terminates some target thread immediately, it is know as Asynchronous termination.

A)
Send
B)
Kill
C)
Sigsend
D)
None of the above

Correct Answer :   Kill

A)
is not easily accessible
B)
comes and goes as needed
C)
stays in the memory always
D)
never enters the memory space

Correct Answer :   comes and goes as needed

A)
assigning ready processes to CPU
B)
assigning running processes to blocked queue
C)
assigning ready processes to waiting queue
D)
All of the above

Correct Answer :   assigning ready processes to CPU

A)
resources
B)
operating system
C)
system storage state
D)
resource allocation state

Correct Answer :   resource allocation state


Explanation : Resource allocation states are used to maintain the availability of the already and current available resources.

A)
can
B)
must
C)
must never
D)
maybe

Correct Answer :   must never

A)
booting from disk
B)
bad-block recovery
C)
disk initialization
D)
All of the above

Correct Answer :   All of the above

A)
they have a protection algorithm
B)
they are in different memory spaces
C)
they are in different logical addresses
D)
every address generated by the CPU is being checked against the relocation and limit registers

Correct Answer :   every address generated by the CPU is being checked against the relocation and limit registers

A)
increases
B)
changes
C)
decreases
D)
maintains

Correct Answer :   changes

A)
Translation Lookaside Buffer miss
B)
Buffer miss
C)
Translation Lookaside Buffer hit
D)
All of the above

Correct Answer :   Translation Lookaside Buffer miss


Explanation : A Translation Lookaside Buffer miss arises when the page table entry needed to translate a virtual address to a physical address is not available in the translation lookaside buffer.

A)
Window 1998
B)
Window 2000
C)
Windows XP
D)
None of the above

Correct Answer :   Windows XP


Explanation : Windows XP supports the 64-bits. Windows XP is designed to expand the memory address space. Its original name is Microsoft Windows XP Professional x64 and it is based on the x86-64 architecture.

A)
Windows XP
B)
Windows 7
C)
Windows 8
D)
None of the above

Correct Answer :   Windows 8


Explanation : Windows 8 does not have a start button because it uses the tablet mode, but windows 8.1 has a start button.

A)
MAC
B)
Linux
C)
Windows
D)
DOS

Correct Answer :   DOS


Explanation : DOS stands for Disk operating system. Disk operating system is a single-user operating system that does not support more than one program at a time.

A)
Spooling is a type of fast memory
B)
Spooling holds a single copy of data
C)
Spooling holds copy of all data in the system
D)
None of the above

Correct Answer :   Spooling holds a single copy of data

A)
block
B)
wakeup
C)
dispatch
D)
None of the above

Correct Answer :   block


Explanation : The only state transition that is initiated by the user process itself is block. Whenever a user process initiates an I/O request it goes into block state unless and until the I/O request is not completed.

A)
I/O & OS Burst
B)
Memory & I/O Burst
C)
CPU and Memory burst
D)
CPU & I/O Burst

Correct Answer :   CPU & I/O Burst

A)
It is possible to make CPU scheduling more efficient now
B)
It is no longer possible to efficiently implement multi-user support
C)
There would no longer be a requirement for hardware support for memory management
D)
It would be possible to make the processor cache organisation more efficient now

Correct Answer :   There would no longer be a requirement for hardware support for memory management

A)
Page frame number
B)
Virtual page number
C)
Accessing the right information
D)
Both page frame number and virtual page number

Correct Answer :   Page frame number

A)
Is required by the lookaside buffer translation
B)
Reduces the total memory access time for reading or writing a memory location
C)
Helps in the reduction of the total page faults in the page replacement algorithms
D)
Helps in the reduction of the page table size required for implementing a process’s virtual address space

Correct Answer :   Helps in the reduction of the page table size required for implementing a process’s virtual address space

A)
PRINT A
B)
S = B - C
C)
IS A<10
D)
DATA X,4Z

Correct Answer :   IS A<10

A)
Processors
B)
Spooling
C)
Memory Buffer
D)
None of the above

Correct Answer :   Spooling


Explanation : Spooling refers to putting data of various I/O jobs in the buffer; this buffer is a special area in memory.

A)
Economy of scale
B)
Increased throughput
C)
Increased reliability
D)
All of the above

Correct Answer :   All of the above


Explanation : Increased throughput, Economy of scale, and increased reliability are the three main advantages of a microprocessor system.

A)
3
B)
4
C)
5
D)
6

Correct Answer :   3


Explanation : Linux Operating system has primarily three components: - Kernel, System library, system utility.

A)
Files
B)
Directory
C)
File management
D)
None of the above

Correct Answer :   Directory


Explanation : A collection of the node which contains the information about all the files is known as a directory.

A)
File Allocation
B)
Contiguous Allocation
C)
Linked Allocation
D)
None of the above

Correct Answer :   Linked Allocation


Explanation : Linked allocation method involves no external fragmentation and it is only efficient for sequential access files.

A)
True
B)
False
C)
None of the above
D)
--

Correct Answer :   True


Explanation : Seek time is the time taken by the head to move from the current track to the one where data is present, so the disk scheduling algorithm that gives a minimum average seek time is better.

A)
Disk Access time=Seek time-Rotational latency-transfer time
B)
Disk Access time=Seek time+ Rotational latency/transfer time
C)
Disk Access time=Seek time +Rotational latency +transfer time
D)
Disk Access time=Seek time-Rotational latency+ transfer time

Correct Answer :   Disk Access time=Seek time +Rotational latency +transfer time

A)
Network OS
B)
Distributed OS
C)
Both (A) and (B)
D)
None of the above

Correct Answer :   Distributed OS


Explanation : Distributed OS is more reliable or fault tolerant.

A)
5
B)
2
C)
3
D)
4

Correct Answer :   4


Explanation : Hardware layer, kernel, shell, and utilities are the layers of the Linux system.

A)
Segment peak
B)
Segment value
C)
Segment length
D)
Segment base

Correct Answer :   Segment base

A)
It occurs due to the uncontrolled priority and resource management
B)
It occurs due to uncontrolled priority and preemption
C)
It occurs due to uncontrolled mutual exclusion and resource management
D)
All of the above

Correct Answer :   It occurs due to the uncontrolled priority and resource management

A)
Process
B)
Software
C)
Algorithm
D)
None of the above

Correct Answer :   Algorithm


Explanation : A part of a computer program that performs a well-defined task is known as an algorithm.

A)
Process
B)
Software
C)
Algorithm
D)
None of the above

Correct Answer :   Software


Explanation : A collection of computer programs, libraries, and related data are referred to as software.

A)
Schedulers are the processes that manage queues
B)
Schedulers are the system that schedules the processes
C)
Schedulers are the special software that handles process scheduling in various ways
D)
All of the above

Correct Answer :   Schedulers are the special software that handles process scheduling in various ways

A)
6 types
B)
5 types
C)
4 types
D)
3 types

Correct Answer :   3 types


Explanation : There are 3 types of schedulers: Long term schedulers, short-term schedulers, Medium term schedulers.

A)
The primary objective of the job scheduler is to suspend the processes
B)
The primary objective of the job scheduler is to decrease the traffic of processes
C)
The primary objective of the job scheduler is to increase system performance in accordance with the chosen set of criteria
D)
The primary objective of a job scheduler is to provide a balanced mix of jobs

Correct Answer :   The primary objective of a job scheduler is to provide a balanced mix of jobs

A)
Network Operating system
B)
Zone based Operating system
C)
Level based Operating system
D)
All of the above

Correct Answer :   Network Operating system

A)
Server
B)
Every system in the network
C)
Both server and every system in the network
D)
None of the above

Correct Answer :   Server

A)
principle of operating system
B)
principle of least privilege
C)
principle of process scheduling
D)
None of the above

Correct Answer :   principle of least privilege

A)
bad blocks, partitioning
B)
destroyed blocks, partitioning
C)
bad blocks, low level formatting
D)
destroyed blocks, high level formatting

Correct Answer :   bad blocks, low level formatting

A)
API
B)
Library
C)
Assembly instruction
D)
System call

Correct Answer :   System call


Explanation : The system call provides an interface for user programs to access the services of the operating system through the API (Application Program Interface).

A)
Fork
B)
Down
C)
Read
D)
All of the above

Correct Answer :   All of the above

A)
Authentication
B)
File Manager
C)
Desktop Manager
D)
Windows Explorer

Correct Answer :   Authentication


Explanation : The authentication program is run first after booting the computer and loading the GUI. Authentication is a process of verifying the person or device. For example, when you log in to Facebook, you enter a username and password.

A)
Undelete
B)
Undelete *.doc
C)
Undelete/all
D)
All of the above

Correct Answer :   Undelete *.doc


Explanation : Undelete *.doc command is used to fetch a group (.doc) of files that have just been deleted.

A)
Primary commands
B)
Internal commands
C)
External commands
D)
Valuable commands

Correct Answer :   External commands


Explanation : External commands are required to perform various tasks in DOS.

A)
Windows 95
B)
Windows 98
C)
Windows XP
D)
Windows 10

Correct Answer :   Windows 95


Explanation : Windows 95 was first window to introduced the My Computer.

A)
MAC
B)
MS-DOS
C)
Windows 10
D)
Process Control

Correct Answer :   Process Control


Explanation : Process control is a best example of a Real time operating system.

A)
Word
B)
Accessories
C)
Paint
D)
All of the above

Correct Answer :   Accessories


Explanation : The windows accessories are a group of programs in the operating system. Windows XP offers many accessories or software that you can use to help with your work. The accessories are not full features programs, but it is useful for a specific task in the operating systems. It provides many programs such as a painting program, a calculator, a word processor, a notepad, and Internet software.

A)
a large amount of internal fragmentation
B)
a large amount of external fragmentation
C)
a large computation overhead in the process of translation
D)
a large memory overhead when maintaining the page tables

Correct Answer :   a large memory overhead when maintaining the page tables

A)
Faster program startup
B)
Smaller sizes of executable files
C)
Lesser page fault rate in a system
D)
The existing programs do not need to be re-linked so as to take advantage of the newer library versions

Correct Answer :   Faster program startup

A)
Security is dynamic
B)
Linking is insecure
C)
The path of the searching dynamic libraries isn’t known until the runtime
D)
The cryptographic procedures aren’t available for the process of dynamic linking

Correct Answer :   The cryptographic procedures aren’t available for the process of dynamic linking

A)
caching & logical formatting
B)
swap space creation & caching
C)
partitioning & logical formatting
D)
logical formatting & swap space creation

Correct Answer :   partitioning & logical formatting

A)
special support from hardware is required
B)
special support from operating system is essential
C)
user programs can implement dynamic loading without any special support from hardware or operating system
D)
special support from both hardware and operating system is essential

Correct Answer :   user programs can implement dynamic loading without any special support from hardware or operating system

A)
less
B)
more
C)
equal
D)
None of the above

Correct Answer :   less

A)
zero
B)
minimal
C)
maximum
D)
dependent on the scheduling

Correct Answer :   minimal

A)
change
B)
depends on the operating system
C)
remain unchanged
D)
None of the above

Correct Answer :   remain unchanged

A)
Logs are analysed to detect tails of intrusion
B)
The host operating system logs in the audit information
C)
Logs includes logins, file opens, and program executions
D)
All of the above

Correct Answer :   All of the above

A)
The host operating system logs in the audit information
B)
It is programmed to interpret a certain series of packets
C)
They are integrated closely with the TCP/IP stack and watch packets
D)
It models the normal usage of the network as a noise characterization

Correct Answer :   They are integrated closely with the TCP/IP stack and watch packets

A)
boot loader
B)
bootstrap
C)
file control block
D)
process control block

Correct Answer :   boot loader

A)
state
B)
stateless
C)
ip address
D)
operating system

Correct Answer :   state

A)
deletes
B)
ignores
C)
considers
D)
None of the above

Correct Answer :   ignores

A)
file table
B)
system table
C)
directory table
D)
open-file table

Correct Answer :   open-file table

A)
atomic, memory error
B)
atomic, critical section
C)
integer variable, critical section
D)
integer variable, memory error

Correct Answer :   integer variable, critical section

A)
wait, stop
B)
signal, stop
C)
wait, signal
D)
signal, wait

Correct Answer :   wait, signal

A)
Not deadlocks
B)
Deadlocks
C)
Livelock
D)
None of the above

Correct Answer :   Not deadlocks

A)
0
B)
1
C)
-1
D)
2

Correct Answer :   1

A)
Counting and mutex
B)
Counting and binary semaphore
C)
Counting and decimal semaphore
D)
None of the above

Correct Answer :   Counting and binary semaphore

A)
a non-uniform distribution of all the requests
B)
the use of arm scheduling policies that are unfair
C)
a higher track capacity on the platter’s periphery
D)
a starting and stopping inertia for arms

Correct Answer :   a starting and stopping inertia for arms

A)
a better disk space utilisation and better disk throughput
B)
a better disk space utilisation but poorer disk throughput
C)
a poorer disk space utilisation but better disk throughput
D)
a poorer disk space utilisation and poorer disk throughput

Correct Answer :   a poorer disk space utilisation but better disk throughput

A)
A resolution of 1600 x 400 and a 14-inch monitor with 16 million colours.
B)
A resolution of 800 x 800 and a 14-inch monitor with 256 colours.
C)
A resolution of 1600 x 400 and a 17-inch monitor with 256 colours.
D)
A resolution of 800 x 400 and a 17-inch monitor with 16 million colours.

Correct Answer :   A resolution of 1600 x 400 and a 14-inch monitor with 16 million colours.

A)
Vectored interrupts and Cycle-stealing
B)
Polling interrupts and Transparent DMA
C)
Polling interrupts and Block transfer
D)
Vectored interrupts and Block transfer

Correct Answer :   Vectored interrupts and Block transfer

A)
The primary objective of the CPU scheduler is to suspend the processes
B)
The primary objective of the CPU scheduler is to increase system performance in accordance with the chosen set of criteria
C)
The primary objective of the CPU scheduler is to provide a balanced mix of jobs
D)
The primary objective of the CPU scheduler is to decrease the traffic of processes

Correct Answer :   The primary objective of the CPU scheduler is to increase system performance in accordance with the chosen set of criteria

A)
6
B)
5
C)
4
D)
3

Correct Answer :   5


Explanation : There are 5 states of processes: new, running, waiting, ready, and terminated.

A)
In Pre-emption, the process is forcefully removed from the CPU
B)
In Pre-emption, the processes are not removed until they complete the execution
C)
Both (A) and (B)
D)
None of the above

Correct Answer :   In Pre-emption, the process is forcefully removed from the CPU

A)
In Non-Pre-emotion, the process is forcefully removed from the CPU
B)
In Non-Pre-emption, the processes are not removed until they complete the execution
C)
Both (A) and (B)
D)
None of the above

Correct Answer :   In Non-Pre-emption, the processes are not removed until they complete the execution

A)
A PCB just contains information about new processes
B)
A PCB just contains the information of terminated processes
C)
A PCB contains the information of processes that are in waiting for the state
D)
A PCB contains information about the process, i.e. registers

Correct Answer :   A PCB contains information about the process, i.e. registers

A)
Round robin
B)
Shortest job first
C)
Banker's algorithm
D)
First come First Serve

Correct Answer :   Banker's algorithm

A)
Medium Scheduler
B)
Short term scheduler
C)
Resource Scheduler
D)
Long term scheduler

Correct Answer :   Resource Scheduler

A)
Starvation
B)
Aging
C)
Deadlock
D)
Inversion

Correct Answer :   Starvation

A)
DMA and DMA controller
B)
Shared Memory and Message Passing
C)
Shared Memory and Data controller
D)
Devices drivers and other peripherals

Correct Answer :   Shared Memory and Message Passing

A)
Binary semaphores
B)
Counting semaphores
C)
Both (A) and (B)
D)
None of the above

Correct Answer :   Binary semaphores

A)
Semaphores
B)
Normalization
C)
Transactions
D)
Concurrency

Correct Answer :   Concurrency

A)
6 ways
B)
4 ways
C)
3 ways
D)
2 ways

Correct Answer :   3 ways


Explanation : Burst mode, cycle steal mode, and transparent mode are the three modes in which the DMA controller transfers the block of data to and from memory.

A)
Chip units
B)
Data registers
C)
DMA Controller
D)
Device drivers

Correct Answer :   Data registers

A)
DMA
B)
DMA Controller
C)
Device drivers
D)
Data Controller

Correct Answer :   DMA Controller


Explanation : Whenever an I/O device wants to transfer the data to or from memory, it sends the DMA request (DRQ) to the DMA controller accepts this DRQ, and asks the CPU to hold for a few clock cycles.

A)
DMA Controller
B)
Data Controller
C)
DMA
D)
Device Drivers

Correct Answer :   DMA Controller

A)
RAM
B)
ROM
C)
Virtual memory
D)
Cache

Correct Answer :   Cache

A)
Virtual address and logical address
B)
Absolute address and physical address
C)
Physical address and virtual address
D)
None of the above

Correct Answer :   Physical address and virtual address

A)
CPU
B)
Chipset
C)
Memory management unit
D)
None of the above

Correct Answer :   Memory management unit

A)
Swapping
B)
Paging
C)
Segmentation
D)
Fragmentation

Correct Answer :   Paging

A)
Critical section problem
B)
Mutual exclusion
C)
Process mechanism problems
D)
Process synchronization problems

Correct Answer :   Critical section problem

A)
have both their operands in the main store.
B)
which perform indicated operations on two fast registers of the machine and leave the result in one of the registers.
C)
which perform an operation on a register operand and an operand which is located in the main store, generally leaving the result in the register, except in the case of store operation when it is also written into the specified storage location.
D)
All of the above

Correct Answer :   which perform indicated operations on two fast registers of the machine and leave the result in one of the registers.

A)
A computer language
B)
A branch of mathematics
C)
A step by step procedure for solving a problem
D)
All of the above

Correct Answer :   A step by step procedure for solving a problem

A)
first fit
B)
best fit
C)
worst fit
D)
None of the above

Correct Answer :   worst fit

A)
disk
B)
mouse
C)
printer
D)
terminals

Correct Answer :   disk

A)
spreadsheet
B)
timesharing
C)
multitasking
D)
operating environment

Correct Answer :   timesharing

A)
It is mnemonic and easy to read.
B)
Addresses any symbolic, not absolute
C)
Introduction of data to program is easier
D)
All of the above

Correct Answer :   All of the above

A)
is not needed in small installations
B)
requires detailed system performance information
C)
does not depend on the monitoring tools available
D)
is independent of the operating system

Correct Answer :   is independent of the operating system

A)
broadcasting
B)
time sharing
C)
multi threading
D)
multiprogramming

Correct Answer :   multi threading

A)
Literal table
B)
Reductions
C)
Terminal table
D)
Identifier table

Correct Answer :   Literal table

A)
use of macro processor to produce more optimal assembly code
B)
creation of more optional matrix.
C)
recognition of basic syntactic constructs through reductions.
D)
recognition of basic elements and creation of uniform symbols.

Correct Answer :   creation of more optional matrix.

A)
macro
B)
label
C)
literal
D)
procedure name

Correct Answer :   macro

A)
can itself performs the relocation of its address-sensitive portions.
B)
consists of a program and relevant information for its relocation.
C)
cannot be made to execute in any area of storage other than the one designated for it at the time of its coding or translation.
D)
All of the above

Correct Answer :   can itself performs the relocation of its address-sensitive portions.

A)
surplus
B)
volatile
C)
garbage
D)
non-volatile

Correct Answer :   garbage

A)
BAS
B)
COM
C)
TXT
D)
BAK

Correct Answer :   BAK

A)
topdown procedures
B)
reentrant procedures
C)
concurrent procedures
D)
serially usable procedures

Correct Answer :   reentrant procedures

A)
execute each job faster
B)
are used only on large mainframe computers
C)
execute more jobs in the same time period
D)
are easier to develop than single programming system

Correct Answer :   execute more jobs in the same time period

A)
lexical analysis
B)
syntax analysis
C)
general syntax analysis
D)
interpretation analysis

Correct Answer :   lexical analysis

A)
do not usually work
B)
usually are immediately discovered
C)
are hidden programs that do not show up on the system
D)
are legitimate programs that allow unauthorized access

Correct Answer :   are legitimate programs that allow unauthorized access

A)
1980
B)
1981
C)
1982
D)
1983

Correct Answer :   1981

A)
monitors
B)
semaphores
C)
event counters
D)
All of the above

Correct Answer :   All of the above

A)
they are memory resident
B)
they are initially stored on disk
C)
they are available on magnetic tapes
D)
they are partly in primary memory and partly on disk

Correct Answer :   they are initially stored on disk

A)
Paging
B)
Windowing
C)
Multitasking
D)
Partitioning

Correct Answer :   Multitasking

A)
real-time software
B)
system software
C)
business software
D)
scientific software

Correct Answer :   real-time software

A)
Left-Right development
B)
Top-down development
C)
Bottom-up development
D)
All of the above

Correct Answer :   Top-down development

A)
computer magazines
B)
objective software reviews
C)
recommendations by other users
D)
All of the above

Correct Answer :   All of the above

A)
reenterable
B)
recursive
C)
non reusable
D)
serially usable

Correct Answer :   reenterable

A)
MS-DOS
B)
OS/360
C)
CP/M
D)
PC-DOS

Correct Answer :   CP/M

A)
FAT command
B)
FORMAT command
C)
VER command
D)
CHKDSK command

Correct Answer :   FORMAT command

A)
compiler
B)
assembler
C)
translator
D)
system software

Correct Answer :   compiler

A)
A greater degree of machine independence
B)
Improved debugging capability, and superior documentation
C)
Fewer people, less management and shorter transition in learning time
D)
All of the above

Correct Answer :   All of the above

A)
Mindware
B)
Firmware program
C)
Public domain program
D)
Shareware program

Correct Answer :   Public domain program

A)
that last entered the queue
B)
with the least processor needs
C)
that first entered the queue
D)
that has been in the queue the longest

Correct Answer :   with the least processor needs

A)
Allocate the CPU to a job
B)
Read the input from the slow-speed card reader to the high-speed magnetic disk
C)
Specify, to the operating system, the beginning and end of a job in a batch
D)
All of the above

Correct Answer :   Specify, to the operating system, the beginning and end of a job in a batch

A)
allows the programmer to write base registers and displacements explicitly in the source program.
B)
is a term that refers to the control programs of an operating system.
C)
allows multiple programs to reside in separate areas of core at the same time.
D)
is used to remember which of the general-purpose registers are currently available as base registers, and what base addresses they contain.

Correct Answer :   allows the programmer to write base registers and displacements explicitly in the source program.

A)
Loading
B)
Linking
C)
Allocation
D)
Reallocation

Correct Answer :   Loading

A)
5
B)
4
C)
3
D)
2

Correct Answer :   2


Explanation :

Dekker's algorithm is the first known correct solution to the mutual exclusion problem in concurrent programming. The solution is attributed to Dutch mathematician Th. J. Dekker by Edsger W. Dijkstra in his manuscript on cooperating sequential processes. It allows two threads to share a single-use resource without conflict, using only shared memory for communication.
 
It avoids the strict alternation of a naive turn-taking algorithm, and was one of the first mutual exclusion algorithms to be invented.

A)
hashing
B)
key fielding
C)
dynamic reallocation
D)
relative organization

Correct Answer :   relative organization

A)
Code generation
B)
Machine independent optimization
C)
Syntax analysis
D)
Assembly and output

Correct Answer :   Machine independent optimization

A)
Code generation
B)
Syntax analysis
C)
Assembly and output
D)
Storage assignment

Correct Answer :   Assembly and output

A)
Systems program
B)
Object program
C)
Source program
D)
Operating system

Correct Answer :   Systems program

A)
VER command
B)
DIR command
C)
DISK command
D)
FORMAT command

Correct Answer :   VER command

A)
Swapping a process to the disk
B)
Bring processes from the disk to the main memory
C)
Suspending some of the processes when the CPU load is high
D)
Assigning ready process to the CPU

Correct Answer :   Assigning ready process to the CPU

A)
.COM and .OBJ, respectively
B)
.OBJ and .COM or .EXE, respectively
C)
.DAS and .EXE, respectively
D)
.EXE and .OBJ, respectively

Correct Answer :   .OBJ and .COM or .EXE, respectively

A)
detects/corrects errors
B)
decides correct alternative by analysing several ones
C)
inquires to see if a terminal has any transaction to send
D)
multiplexes the inputs and updates the memory accordingly

Correct Answer :   inquires to see if a terminal has any transaction to send

A)
semaphore
B)
multitasking
C)
mutual exclusion
D)
multiprogramming

Correct Answer :   mutual exclusion

A)
to improve disk performance
B)
to handle interrupts
C)
to speed up main memory read operation
D)
to increase the capacity of main memory

Correct Answer :   to improve disk performance

A)
latency
B)
latency plus transmission time
C)
latency plus seek time plus transmission time
D)
latency plus seek time

Correct Answer :   latency plus seek time

A)
FORTRAN is a high level language
B)
FORTRAN is extensively used to write programs for performing scientific computations
C)
A FORTRAN program, written for the IBM-PC, is totally different from a FORTRAN program written for execution on the SUN machine
D)
All of the above

Correct Answer :   A FORTRAN program, written for the IBM-PC, is totally different from a FORTRAN program written for execution on the SUN machine

A)
JPL
B)
JCL
C)
Load modules
D)
Utility programs

Correct Answer :   JCL

A)
creation of more optional matrix.
B)
use of macro processor to produce more optimal assembly code
C)
recognition of basic syntactic constructs through reductions.
D)
recognition of basic elements and creation of uniform symbols

Correct Answer :   recognition of basic syntactic constructs through reductions.

A)
CU
B)
CPU
C)
ALU
D)
Processor

Correct Answer :   Processor

A)
cross compiler
B)
one pass compiler
C)
multipass compiler
D)
optimizing compiler

Correct Answer :   cross compiler

A)
GOTO
B)
DO-WHILE
C)
WHILE-DO
D)
IF-THEN-ELSE

Correct Answer :   GOTO