What is an operating system?
a) interface between the hardware and application programs
b) collection of programs that manages hardware resources
c) system service provider to the application programs
d) all of the mentioned
Answer: d
What is the main function of the command interpreter?
a) to provide the interface between the API and application program
b) to handle the files in the operating system
c) to get and execute the next user-specified command
d) none of the mentioned
3. In Operating Systems, which of the following is/are CPU scheduling algorithms?
a) Priority
b) Round Robin
c) Shortest Job First
d) All of the mentioned
Answer: d
Explanation: In Operating Systems, CPU scheduling algorithms are:
i) First Come First Served scheduling
ii) Shortest Job First scheduling
iii) Priority scheduling
iv) Round Robin scheduling
v) Multilevel Queue scheduling
vi) Multilevel Feedback Queue scheduling
All of these scheduling algorithms have their own advantages and disadvantages.
4. To access the services of the operating system, the interface is provided by the ___________
a) Library b) System calls c) Assembly instructions d) API
Answer: b
CPU scheduling is the basis of ___________
a) multiprogramming operating systems
b) larger memory-sized systems
c) multiprocessor systems
d) none of the mentioned
Answer: a
Identify false Statements
(a) You can find deleted files in recycle bin
(b) You can restore any files in recycle bin if you ever need
(c) You can increase the free space of the disk by sending files to recycle bin.
(d) You can right-click and choose Empty Recycle Bin to clean it.
Answer: c
Which one of the following is not true?
a) kernel remains in the memory during the entire computer session
b) kernel is made of various modules which can not be loaded in running operating system
c) kernel is the first part of the operating system to load into memory during booting
d) kernel is the program that constitutes the central core of the operating system
(a) RTLinux (b) VxWorks (c) Windows CE (d) All of the mentioned
Answer: D
Which one of the following errors will be handled by the operating system?
a) lack of paper in printer b) connection failure in the network
c) power failure d) all of the mentioned
Answer: d
(a) system table (b) open-file table
(c) file table (d) directory table
Answer: B
Where is the operating system placed in the memory?
a) either low or high memory (depending on the location of interrupt vector)
b) in the low memory c) in the high memory d) none of the mentioned
Answer: a
(a) Direct mode, indirect mode (b) Virtual mode, dedicated mode
(c) Private mode, public mode (d) Real mode, protected mode
Answer: D
If a process fails, most operating systems write the error information to a ______
a) new file b) another running process
c) log file d) none of the mentioned
Answer: c
ThrowCardsFastCardThrowing
For real time operating systems, interrupt latency should be____________
(a) minimal (b) maximum (c) zero (d) dependent on the scheduling
Answer: A
Which one of the following is not a real-time operating system?
a) RTLinux b) Palm OS c) QNX d) VxWorks
Answer: b
The operating system _______ the links when traversing
(a) considers (b) ignores (c) deletes (d) none of the mentioned
Answer: B
What does OS X have?
c) monolithic kernel d) hybrid kernel
Answer: d
Network operating system runs on___________
(a) server (b) every system in the network
(c) both server and every system in the network (d) none of the mentioned
Answer: A
In operating system, each process has its own __________
a) open files b) pending alarms, signals, and signal handlers c) address space and global variables
Answer: d
In operating system, each process has its own __________
(a) address space and global variables (b) open files
c) pending alarms, signals, and signal handlers (d) all of the mentioned
Answer: D
In a timeshare operating system, when the time slot assigned to a process is completed, the process switches from the current state to?
Answer: c
The two steps the operating system takes to use a disk to hold its files are _______ and ________
Answer: A
Cascading termination refers to the termination of all child processes if the parent process terminates ______
c) Normally d) None of the mentioned
Answer: a
New Ola S1 Gen Read More
. To access the services of the operating system, the interface is provided by the___________
(a) System calls
(b) API
(c) Library
(d) Assembly instructions
Answer: A
The main memory accommodates ____________
a) CPU
b) user processes
c) operating system
d) all of the mentioned
Answer: c
Oprating system imp set
Which one of the following errors will be handled by the operating system?
(a) power failure
(b) lack of paper in the printer
(c) connection failure in the network
(d) all of the mentioned
Answer: D
The operating system is responsible for?
a) bad-block recovery
b) booting from disk
c) disk initialization
d) all of the mentioned
Answer: d
What is the name of the operating system that reads and reacts in terms of actual time?
(a) Real-time system
(b) Time sharing system
(c) Quick response system
(d) Batch system
Answer: A
Ivi Rein Biography Age read more
. The operating system and the other processes are protected from being modified by an already running process because ____________
a) every address generated by the CPU is being checked against the relocation and limit registers
b) they have a protection algorithm
c) they are in different memory spaces
d) they are in different logical addresses
Answer: a
. In Operating Systems, which of the following is/are CPU scheduling algorithms?
(a) Round Robin
(b) Shortest Job First
(c) Priority
(d) All of the mentioned
Answer: D
Using transient code, _______ the size of the operating system during program execution.
a) maintains
b) changes
c) increases
d) decreases
Answer: b
Operating system is a collection of_____________
(a) Software routines
(b) Input-output devices
(c) Hardware components
d) All of these
Answer: A
Where is the operating system placed in the memory?
(a) in the low memory
(b) in the high memory
c) either low or high memory (depending on the location of the interrupt vector)
(d) none of the mentioned
Answer: C
The operating system maintains a ______ table that keeps track of how many frames have been allocated, how many are there, and how many are available.
a) memory
b) mapping
c) page
d) frame
Answer: d
(a) Input/output control program
(b) Job control program
(c) Supervisor
(d) Performance monitor
Answer: D
a) special support from the operating system is essential
b) special support from hardware is required
c) user programs can implement dynamic loading without any special support from hardware or operating system
d) special support from both hardware and operating system is essential
Answer: c
What is an operating system?
(a) collection of programs that manages hardware resources
(b) system service provider to the application programs
(c) interface between the hardware and application programs
(d) all of the mentioned
Answer: D
+The _________ presents a uniform device-access interface to the I/O subsystem, much as system calls provide a standard interface between the application and the operating system.
a) Device drivers
b) I/O systems
c) Devices
d) Buses
Answer: a
+. In real time operating system ____________
a) process scheduling can be done only once
b) all processes have the same priority
c) kernel is not required
d) a task must be serviced by its deadline period
Answer: d
a) equal
b) more
c) less
d) none of the mentioned
Answer: c
When was the first operating system developed?
(a) 1948
b 1949
c) 1950
(d) 1951
Answer: C
a) zero
b) minimal
c) maximum
d) dependent on the scheduling
Answer: b
International men's Day do you know about
. Which one of the following is a real-time operating system?
a) Windows CE
b) RTLinux
c) VxWorks
d) All of the mentioned
Answer: d
Which of the following is not an operating system?
(a) Windows
(b) Linux
(c) Oracle
Answer: C
The priority of a process will ______________ if the scheduler assigns it a static priority.
a) depends on the operating system
b) change
c) remain unchanged
d) none of the mentioned
Answer: c
In real time operating system is__________
(a) the kernel is not required
(b) process scheduling can be done only once the task
(c) must be serviced by its deadline period
(d) all processes have the same priority
Answer : C
a) Logs are analysed to detect tails of intrusion
b) The host operating system logs in the audit information
c) Logs include logins, the file opens, and program executions
d) All of the mentioned
Answer: d
(a) Primarily used on mainframe computers
(b) Used for monitoring events as they occur
(c) Used for program development
(d) Used for real-time interactive users
Answer : B
What are the characteristics of stack-based IDS?
a) It is programmed to interpret a certain series of packets
b) It models the normal usage of the network as a noise characterization
c) They are integrated closely with the TCP/IP stack and watch packets
d) The host operating system logs in the audit information
Answer: c
When the System processes data instructions without any delay is called as________________
(a) online system
(b) real-time system
(c) instruction system
(d) offline system
Answer: B
a) the operating system selects a process to suspend
b) the system crashes
c) then the process crashes
d) the memory overflows
Answer: a
The operating system is resident in memory of which part?
(a) Middle
(B) Lower
(C) Upper
(D) All of these
Answer: C
Understanding student loans and Loans.com: Exploring the Way to Instruction
a) Terminated state
b) Suspended state
c) Running state
d) Ready state
Answer: d
UNIX operating system__________
(a) can run on PCs and larger system
(b) is multitasking
(c) is multiuser
(d) all of these
Answer: D
Transient operating system code is a code that ____________
a) stays in the memory always
b) never enters the memory space
c) comes and goes as needed
d) is not easily accessible
answer: c
2\77. Example of open source operating system is__________
(a) Linux
(c) Android
(d) DOS
Answer: A
a) operating system
b) separate directory structure
c) swap space
d) none of the mentioned
Answer: b
Which of the following is a database of information about the windows operating system including customized settings and software installations?
(a) Registry
(b) Changelog
(c) Performance Monitor
(d) None of the above
Answer: A
The operating system keeps a small table containing information about all open files called ____________
a) file table
b) directory table
c) open-file table
d) system table
Answer: c
An operating system that can do multitasking means that__________
(a) The OS can divide up work between several CPUs.
(b) Several programs can be operated concurrently
(c) Multiple people can use the computer concurrently
(d) All of the above
Answer: B
. What will happen in the single-level directory?
a) All files are contained in the same directory
b) All files are contained in different directories all at the same level
c) Depends on the operating system
d) None of the mentioned
Answer: a
The desktop operating system is also called a___________
(a) Single-user operating system
(b) Client operating system
(c) Multi-user operating system
(d) Embedded operating system
Answer: B
=====================================================
The systems which allow only one process execution at a time, are called as____________
(a) Uniprogramming systems
(b) Uniprocessing systems
(c) Unitasking systems
(d) None of the mentioned
Answer: B
=====================================================
The operating system _______ the links when traversing directory trees, to preserve the acyclic structure of the system.
a) deletes
b) considers
c) ignores
d) none of the mentioned
Answer: c
=====================================================
46. In SCSI disks used in high-end PCs, the controller maintains a list of _________ on the disk. The disk is initialized during ________ formatting which sets aside spare sectors not visible to the operating system.
a) destroyed blocks, partitioning
b) bad blocks, low-level formatting
c) destroyed blocks, high-level formatting
d) bad blocks, partitioning
View Answer
Answer: b
47. Which principle states that programs, users, and even the systems be given just enough privileges to perform their task?
a) principle of least privilege
b) principle of process scheduling
c) principle of operating system
d) none of the mentioned
Answer: a
OS stands for______________
(a) Operating system
(b) Open Source
(c) Open System
(d) Operating Styling
Answer: A
. Network operating system runs on ___________
a) every system in the network
b) server
c) both server and every system in the network
d) none of the mentioned
Answer: b
a) Zone-based Operating system
b) Level-based Operating system
c) Network Operating system
d) All of the mentioned
Answer: c
Operating systems__________
(a) enables the programmer to draw a flow chart
(b) provides a layer, user-friendly interface
(c) links a program with subroutine it references
(d) all of these
Answer: B
. In Unix, which system called creates the new process?
a) create
b) fork
c) new
d) none of the mentioned
Answer: b
Explanation: In UNIX, a new process is created by a fork() system call. fork() system call returns a process ID which is generally the process id of the child process created.
Scheduling of tasks is a critical consideration in RTOS. Which of the following best described the scheduling policy design: Select one____________
(a) The scheduler must follow a pre-emptive policy
(b) The scheduler must not use pre-emptive policy options (c) The scheduler must not only use pre-emptive policy options with the priority considerations.
(d) The scheduler must not use the pre-emptive policy option but must employ priority consideration
Answer : D
The basic types of OS are__________
(a) batch and time-sharing
(b) sequential and real-time
(c) direct and interactive
(d) batch and interactive
Answer : D
In ______ OS, the response time is very critical.
(a) Multitasking
(b) Batch
Related: Matter in our surroundings class 9 MCQ with answers
(c) Online
(d) Real-time
Answer : D
In real time operating system ____________
(a) all processes have the same priority
(b) a task must be serviced by its deadline period
(c) process scheduling can be done only once
(d) the kernel is not required
Answer : B
To recover from failures in the network operations _____________ information may be maintained.
a) operating system
b) IP address
c) stateless
d) state
Answer: d
The amount of memory in a real time system is generally____________
(a) less compared to PCs
(b) high compared to PCs
(c) same as in PCs
(d) they do not have any memory
Answer: A
operating system?
collection of programs that manages hardware resources, system service provider to the application programs link to interface the hardware and application programs
1. Which system call returns the process identifier of a terminated child?
wait
exit
fork
get
2. To access the services of the operating system, the interface is provided by the
system calls
assembly instructions
6. When the process issues an I/O request :
It is placed in an I/O queue
It is placed in a waiting queue, It is placed in the ready queue, It is placed in the Job queue
Which one of the following errors will be handled by the operating system?
power failure, lack of paper in the printer, connection failure in the network
4. The primary function of the command interpreter is?
to get and execute the next user-specified command
What is a short-term scheduler?
It selects which process has to be executed next and allocates the CPU
5. By operating system, the resource management can be done via?
time division multiplexing & space division multiplexing
6. If a process fails, most operating systems write the error information to a
log file
What is interprocess communication?
communication between two process
The primary distinction between the short-term scheduler and the long-term scheduler is :
The frequency of their execution
. Operating System maintains the page table for
A. each process
2. Because of virtual memory, the memory can be shared among
A. processes
3. _____ is the concept in which a process is copied into the main memory from the secondary memory according to the requirement.
B. Demand paging
4. The pager concerned with the
i
A. individual page of a process
5. Swap space exists in
B. secondary memory
6. A memory buffer used to accommodate a speed differential is called
B. cache
7. Which one of the following is the address generated by the CPU?
C. logical address
8. Run time mapping from virtual to physical address is done by
A. memory management unit
9. Memory management technique in which the system stores and retrieves data from secondary storage for use in main memory is called
B. paging
10. Program always deals with
A. logical address
The ______ register is read by the host to get input.
C. data in
2. The ______ register is written by the host to send output.
D. data out
3. The hardware mechanism that allows a device to notify the CPU is _______.
B. interrupt
What does Belady’s Anomaly relate to?
A. Page Replacement Algorithm
2. What are the two types of Semaphore?
C. Counting Semaphores and Binary Semaphores
3. What are the requirements for the solution to the critical section problem?
Mutual Exclusion
Progress
Bounded Waiting
All of Above
D. All of the Above
4. Which of the following memory unit processor can access more rapidly
C. Cache memory
5. Which of the following is the system tool?
Backup
Disk defragmenter
Both of above
C. Both of above
6. When a computer is first turned on or restarted, a special type of absolute loader called ____ is executed
C. Bootstrap loader
7. In which type of the following OS, the response time is very crucial.
B. Real-Time Operating System
8. Virtual Memory is
C. An illusion of huge main memory
9. Swapping
C. Allows each program in turn to use the memory
10. A program in execution is called
B. A Process
What is thrashing?
A. A high paging activity is called thrashing.
2. Symptoms of swap-file problems include extremely slow system speed and a disk that is constantly being accessed, which is referred to as ______________.
B. Thrashing
3. What hole will allocate in the “Worst-Fit” algorithm of memory management?
C. It allocates the largest hole from the available memory holes
4. Which of the following is the allocation method of disk space?
Contiguous allocation
Linked allocation
Indexed allocation
All of the Above
D. All of the Above
5. Which of the following concept is best for preventing page faults?
B. The working set
6. Poor response times are usually caused by
Process busy
High I/O rates
High paging rate
Any of the above
D. Any of the above
7. Virtual memory is typically located on
D. Hard drive
8. What is contained in the page table?
A. Base address of each frame and corresponding page number
9. Tree structure displays the
C. File and directory name
10. Multiprogramming systems:
C. Execute more jobs in the same period
Bringing a page into memory only when it is needed, this mechanism is called
Deadlock
Page Fault
Dormant Paging
Demand Paging
D. Demand Paging
2. What do you mean by Memory Compaction?
Combine multiple equal memory holes into one big hole
Combine multiple small memory holes into one big hole
Divide big memory holes into small holes
Divide the memory hole by 2
B. Combine multiple small memory holes into one big hole
3. Copying a process from memory to disk to allow space for other processes is Called
Swapping
Deadlock
Demand Paging
Page Fault
A. Swapping
4. Page stealing
Is a sign of an efficient system
Is taking page frames from other working sets
Should be the turning goal
Is taking layer disk space for the page in page out
B. Is taking page frames from other working sets
5. A spooler is a
Location in memory that maintains the contents of documents until it prints out
The queue of a print jobs that is waiting to print
A program that coordinates the print job that is waiting to process
Message sent from the printer to the operating system when a print job is completed
C. Program that coordinates the print job that is waiting to process
6. What is the method of handling deadlocks?
Use a protocol to ensure that the system will never enter a deadlock state.
Allow the system to enter the deadlock state and then recover.
Pretend that deadlocks never occur in the system
All of the Above
D. All of the Above
7. The Banker’s algorithm is used
to rectify deadlock
to detect deadlock
to prevent deadlock
to solve deadlock
C. to prevent deadlock
8. All of the following are TRUE regarding virtual memory EXCEPT
Any amount of RAM can be allocated to virtual memory
The setting for the amount of hard disk drive space to allocate virtual memory can be manually changed
This temporary storage is called the swap file or page file
Virtual memory is the physical space of the hard drive
B. The setting for the amount of hard disk drive space to allocate virtual memory can be manually changed
9. What is dispatch latency?
The time is taken by the dispatcher to stop one process and start another
The time is taken by the processor to write a file into the disk
The whole time is taken by all processor
None of Above
A. The time is taken by the dispatcher to stop one process and start another
10. A page fault occurs when
the Deadlock happens
the Segmentation starts
the page is found in the memory
the page is not found in the memory
D. the page is not found in the memory
The systems which allow only one process execution at a time, are called?
unit programming systems
8. In an operating system, each process has its own
address space and global variables, open files pending alarms, signals and signal handlers
7. What is a long-term scheduler?
It selects which process has to be brought into the ready queue
A process can be terminated due to?
normal exit, fatal error, killed by another process
A set of processes is deadlock if
each process is blocked and will remain so forever
each process is terminated
all processes are trying to kill each other
none of the mentioned
The address of the next instruction to be executed by the current process is provided by the
program counter
What is the ready state of a process?
Ans. when the process is scheduled to run after some execution
What is a medium-term scheduler?
It selects which process to remove from memory by swapping
A process stack does not contain
function parameters
local variables
return addresses
PID of the child process
. On systems where there are multiple operating systems, the decision to load a particular one is done by _____________
a) process control block
b) file control block
c) boot loader
d) bootstrap
Answer: c
What are the Real-time systems?
(a) Used for monitoring events as they occur
(b) Primarily used on mainframe computers
(c) Used for real-time interactive users
(d) Used for program development
Answer : A
. Whenever a process needs I/O to or from a disk it issues a ______________
a) system call to the operating system
b) a special procedure
c) system call to the CPU
d) all of the mentioned
Answer: a
Type of processor in which single task of a particular application is process is termed as Select one_______________
(a) real-time processor
(b) dedicated processor
(c) applicant processor
(d) one task processor
Answer : B
For real time operating systems, interrupt latency should be_________
(a) minimal
(b) maximum
(c) zero
(d) dependent on the scheduling
Answer : A
. The two steps the operating system takes to use a disk to hold its files are _______ and ________
a) caching & logical formatting
b) logical formatting & swap space creation
c) swap space creation & caching
d) partitioning & logical formatting
Answer: d
VxWorks is centered around ____________
(a) wind microkernel
(b) Linux kernel
(c) Unix kernel
(d) none of the mentioned
Answer: a
In Hard real time operating system has ______________ jitter than a soft real time operating system.
(a) less
(b) more
(c) equal
(d) none of the mentioned
Answer : A
In a___________ real-time system, it is guaranteed that critical real-time tasks will be completed within their deadlines.
(a) soft
(b) hard
(c) critical
(d) none of the mentioned
Answer: B
The _______ program initializes all aspects of the system, from CPU registers to devise controllers and the contents of main memory, and then starts the operating system.
a) bootstrap
b) main
c) bootloader
d) rom
View Answer
Answer: a
Explanation: None.
Answer: c
Explanation: None.
18. The FCFS algorithm is particularly troublesome for ____________
a) operating systems
b) multiprocessor systems
c) time-sharing systems
d) multiprogramming systems
Answer: c
Explanation: In a time-sharing system, each user needs to get a share of the CPU at regular intervals.
The amount of memory in a real time system is generally___________
(a) less compared to PCs
(b) high compared to PCs
(c) same as in PCs
(d) they do not have any memory
Answer : A
Which of the following is correct in real-time?
(a) non-preemptive kernels
(b) preemptive kernels
(c) neither preemptive nor non-preemptive kernels
(d) preemptive kernels or non-preemptive kernels
Answer : B
For an effective operating system, when to check for deadlock?
a) every time a resource request is made at fixed time intervals
b) at fixed time intervals
c) every time a resource request is made
d) none of the mentioned
Answer: a
In a real time system the computer results ____________
(a) must be produced within a specific deadline period
(b) may be produced at any time
(c) may be correct
(d) all of the mentioned
Answer : A
A deadlock avoidance algorithm dynamically examines the __________ to ensure that a circular wait condition can never exist.
a) operating system
b) resources
c) system storage state
d) resource allocation state
Answer: d
Time required to synchronous switch from the context of one thread to the context of another thread is called?
(a) threads fly-back time
(b) jitter
(c) context switch time
(d) none of the mentioned
Answer: c
Swapping _______ be done when a process has pending I/O, or has to execute I/O operations only into operating system buffers.
a) must never
b) maybe
c) can
d) must
Answer: a
The interrupt latency should be_________ for real time operating systems.
(a) maximum
(b) minimal
(c) dependent on the scheduling
(d) zero
Answer : B
Which one of the following is a real time operating system?
(a) RTLinux
(b) VxWorks
(c) Windows CE
(d) All of the mentioned
Answer: D
0 Comments