Operating Systems (MCQ)
Operating Systems (MCQ)
I BCA [2013-2016]
Semester II
Core: Operating Systems – 206A
Multiple Choice Questions.
1. Which system software acts as interface between user of a computer and computer hardware?
A. Compiler.
B. Operating system.
C. Interpreter.
D. Editor.
ANSWER: B
3. Processes hold resources already allocated to them while waiting for additional resources is ____.
A. mutual exclusion condition.
B. non preemption condition.
C. wait for condition.
D. circular wait for condition.
ANSWER: C
6. The Strategies which are concerned determining where in main storage to place an incoming program are____.
A. fetch strategies.
B. replacement strategies.
C. placement strategies.
D. management strategies.
ANSWER: C
10. The act of assigning a process to the first process to the first processor on the ready list is _______.
A. dispatcher.
B. block.
C. wakeup.
D. quantum.
ANSWER: A
11. ________ contains the value of which instruction the processor should execute next.
A. Program control block.
B. Program counter.
C. Program identification number.
D. Process descriptor.
ANSWER: B
12. An action performed by the OS to remove a process from a processor and replace it with another is _____.
A. interrupting.
B. control switching.
C. solaris.
D. running.
ANSWER: B
13. Technique to discover hardware status by repeatedly testing each device is _______.
A. piping.
B. polling.
C. dispatching.
D. interrupting.
ANSWER: B
16. ______ indicate that an error has occurred, either is hardware or as a result of a software instruction.
A. Interrupt.
B. Quantum.
C. Exception.
D. Dispatching.
ANSWER: C
17. A data structure that contains information that characterizes a process is _____.
A. PID.
B. PCB.
C. Process in execution.
D. Process priority.
ANSWER: D
19. A unit of time during which a process can execute before it is removed from the processor is _____.
A. spawn.
B. quartz.
C. quantum.
D. trap.
ANSWER: C
20. A situation in which a process or thread is waiting for an event that will never occur is ____.
A. interrupt.
B. deadlock.
C. checkpoint.
D. deadline.
ANSWER: B
25. It is possible to run programs larger than the main storage by using _______.
A. boundary register.
B. coalescing.
C. overlays.
D. garbage collection.
ANSWER: C
26. _______ contains the highest address used by the operating system.
A. Coalescing.
B. Boundary register.
C. Garbage collection.
D. Overlays.
ANSWER: B
28. The technique of _______ involves moving all occupied areas of storage to one end or the other of main storage.
A. storage compaction.
B. storage swapping.
C. storage placement.
D. storage replacement.
ANSWER: A
29. An incoming job is placed in the hole in main storage in which it fits more tightly in ____ strategy.
A. best-fit.
B. first-fit.
C. worst-fit.
D. last-fit.
ANSWER: A
31. The process of merging adjacent holes to form a single larger hole is called ____.
A. coalescing.
B. overlay.
C. garbage collection.
D. virtual storage.
ANSWER: A
32. In contiguous storage allocation multiprogramming systems, protection is often implemented with ____.
A. overlays.
B. garbage collection.
C. boundary registers.
D. compaction.
ANSWER: C
33. In ______ a program is divided into several blocks that are placed throughout the main storage.
A. contiguous allocation.
B. non contiguous allocation.
C. variable partition.
D. fixed partition.
ANSWER: B
34. In _____ page replacement strategy, we replace the page that has been in the system the longest.
A. FIFO.
B. LRU.
C. LFU.
D. NUR.
ANSWER: A
35. FIFO anomaly is also called as _____.
A. baden’s anomaly.
B. brethren’s anomaly.
C. bowel’s anomaly.
D. be lady’s anomaly.
ANSWER: D
36. A popular scheme for approximating LRU with little overhead is the _____ page replacement strategy.
A. FIFO.
B. LRU.
C. LFU.
D. NUR.
ANSWER: D
37. The referenced bit in not recently used page replacement is called ____
A. modified bit.
B. waiting bit.
C. accessed bit.
D. queued bit.
ANSWER: C
38. When a process first executes, the system loads into main memory the page that contains its first instruction. This is ___ paging.
A. local.
B. future.
C. anticipatory.
D. demand.
ANSWER: D
39. The ____ algorithm adjusts a process’s resident page set based on the frequency at which the process is faulting.
A. FIFO.
B. Optimal.
C. PFF.
D. RAND.
ANSWER: B
42. The amount of internal fragmentation can be reduced by employing _____ page sizes.
A. smaller.
B. larger.
C. simple.
D. multiple.
ANSWER: A
43. The problems of determining when processors should be assigned & to which processes is called _____.
A. processor scheduling.
B. job scheduling.
C. high-level scheduling.
D. low-level scheduling.
ANSWER: A
44. A scheduling discipline is ___________ if once a process has given the CPU.
A. preemptive.
B. non-preemptive.
C. real time.
D. online
ANSWER: A
46. In _______ scheduling, certain jobs are scheduled to be completed by a specific time or deadline.
A. processor scheduling.
B. job scheduling.
C. deadline scheduling.
D. real time scheduling.
ANSWER: C
47. Processes are dispatched FIFO but are given a limited amount of CPU time called _____.
A. time–slice or quantum.
B. RR.
C. SJF.
D. HRN.
ANSWER: A
48. ________ is effective in timesharing environments in which the system needs to guarantee reasonable response times for interactive users.
A. RR.
B. FIFO.
C. HRN.
D. LIFO.
ANSWER: A
50. SJF is not useful in _____ environments in which reasonable response times much be guaranteed.
A. real time.
B. time sharing.
C. online.
D. multiprogramming.
ANSWER: B
58. The time taken by the disk surface for data to rotate from its current position to the beginning of the read / write head is called ______.
A. seek time.
B. transmission time.
C. read /write latency time.
D. rotational latency time.
ANSWER: D
59. Fined – size unit of data, typically much larger than a byte is ________.
A. contiguous seconds.
B. sectors.
C. blocks.
D. tracks.
ANSWER: C
60. _____ are set of tracks that can be accessed by read / write head.
A. Cylinder.
B. Sector.
C. Boom.
D. Blocks.
ANSWER: A
62. What is the pattern that has series of request in cylinder randomly distributed access disk surfaces?
A. Seek operating.
B. Memory.
C. Random seek pattern.
D. System.
ANSWER: C
63. Name the magnetic rotational secondary storage that provides persistent storage for random access to data.
A. Hot space disk.
B. Hard disk device.
C. Independent disks.
D. Dependent disks.
ANSWER: B
64. What is the average time a system spends waiting for a disk request to be serviced?
A. mean time to failure.
B. mean response time.
C. response time.
D. request time.
ANSWER: B
65. The smallest portion of a track that can be accessed by an I/O request is ___.
A. sector.
B. partition.
C. blocks.
D. tracks.
ANSWER: A
67. What is the file property that places restrictions in which users can access file data?
A. Accessibility.
B. Location.
C. Volatility.
D. Activity.
ANSWER: A
69. Which is the directory entry that references a data file or directory that is typically located in a different directory?
A. Hard disk.
B. Soft link.
C. Link.
D. Soft disk.
ANSWER: C
73. __________ is the mechanisms for files to be stored, to be referenced, shared and secured.
A. File reorganization.
B. File integrity mechanism.
C. File management.
D. File system.
ANSWER: C
74. Which is the table that stores pointers to file data blocks in Microsoft’s FAT file system?
A. Open file table.
B. File allocation table.
C. File reallocation table.
D. Close file table.
ANSWER: B
76. ___________ strategies are concerned with determining which piece of program or data to displace to make room for incoming programs.
A. Fetch.
B. Replacement.
C. Placement.
D. Demand fetch.
ANSWER: B
77. The default shell in the Berkeley version of UNIX is____.
A. korn shell.
B. C shell.
C. bourne shell.
D. K shell.
ANSWER: B
79. The UNIX command which is used to insert text or new line is ____.
A. x.
B. o.
C. a.
D. i.
ANSWER: D
81. _________ is a high speed cache used to hold recently referenced page table entries a part of paged virtual memory.
A. Translation look aside buffer.
B. Inverse page table.
C. Segmented page table.
D. All the above.
ANSWER: A
85. The kernel keeps track of the state of each task by using a data structure called ______.
A. process control block.
B. user control block.
C. memory control block.
D. memory.
ANSWER: A
90. The Hardware mechanism that enables a device to notify the CPU is called __________.
A. polling.
B. interrupt.
C. system Call.
D. system request.
ANSWER: B
93. Which of the following will determine the choice of systems software for your computer?
A. Is the applications software you want to use compatible with it?
B. Is it expensive?
C. Is it compatible with your hardware?
D. Both A and C.
ANSWER: D
94. The removal of process from active contention of CPU and reintroduce them into memory later is known as ____________.
A. interrupt.
B. swapping.
C. signal.
D. thread.
ANSWER: B
95. A process said to be in ___________ state if it was waiting for an event that will never occur.
A. safe.
B. unsafe.
C. starvation.
D. dead lock.
ANSWER: D
105. _______kind of operating systems pays more attention on the meeting of the time limits.
A. distributed.
B. network.
C. real time.
D. online.
ANSWER: C
109. An optimal scheduling algorithm in terms of minimizing the average waiting time of a given set of processes is ________.
A. FCFS scheduling algorithm.
B. round robin scheduling algorithm.
C. shortest job - first scheduling algorithm.
D. shortest job - last scheduling algorithm
ANSWER: C
115. The time taken by the disk arm to locate the specific address of a sector for getting information is called __________.
A. rotational latency.
B. seek time.
C. search time.
D. response time.
ANSWER: B
121. Which of the following memory allocation scheme suffers from external fragmentation?
A. segmentation
B. pure demand paging.
C. swapping.
D. paging.
ANSWER: A
123. The time between submission of a job and the return of its results is ___ time.
A. saved.
B. waiting.
C. sharing.
D. turn around.
ANSWER: D
124. Which of the following is crucial time while accessing data on the disk?
A. seek time.
B. rotational time.
C. transmission time.
D. waiting time.
ANSWER: A
125. Routine is not loaded until it is called. All routines are kept on disk in a relocatable load format. The main program is loaded into memory & is executed. This type of
loading is called _________ .
A. static loading.
B. dynamic loading.
C. dynamic linking
D. overlays.
ANSWER: C
127. A _____ is a program that processes input data to produce output data directed to some file.
A. filter.
B. setuid.
C. inode.
D. pipe.
ANSWER: A
128. The _____ file is used to specify the OS of hardware device changes to additional hardware.
A. CONFIG.SYS.
B. IO.SYS.
C. MSDOS.SYS.
D. All the above.
ANSWER: A
132. The Sun OS provides UNIX System ________ to control access to shared resources.
A. pipes.
B. messages.
C. signals.
D. semaphores.
ANSWER: D
133. An array of ______ is used to define the file in the file system.
A. mount.
B. inode.
C. pipe.
D. setuid.
ANSWER: B
134. The system call _______ creates a new child process from the parent process.
A. trap.
B. vfork.
C. fork.
D. copy.
ANSWER: C
139. ___________ loses their content when power is turned off or when the power supply is interrupted.
A. ROM.
B. Both A & D.
C. file.
D. RAM.
ANSWER: D
140. In sequential file organization, the records are placed in _______ order.
A. random.
B. physical.
C. index block.
D. logical sequential.
ANSWER: B
144. What is the file property that places restrictions in which users can access file data?
A. Accessibility.
B. Location.
C. Volatility.
D. Activity.
ANSWER: A
145. Disk that stores files in discontinuous blocks as the result of file creation is ____.
A. hard disk.
B. hot space disk.
C. fragmented disk.
D. defragmented disk.
ANSWER: C
146. Which reduces unfairness and variance of response time as compare to SSTF?
A. SCAN disk scheduling.
B. Look disk scheduling.
C. Disk scheduling.
D. Disk processing.
ANSWER: A
147. A _______ is a communication path, consisting of a FIFO queue of bytes between two processes.
A. pipe line.
B. pipe.
C. sockets.
D. filters.
ANSWER: B
Staff Name
KAVITHA.K.