Wednesday 5 March 2014

OPERATING SYSTEM SOLVED MCQS

1) The size of the virtual memory depends on the size of the 
 A. Data bus
 B. Main memory
 C. Address bus
 D. None of these
 Ans:- C

2) The operating system that reads and reacts in terms of actual time is 
 A. Batch system
 B. Quick response system
 C. Real time system
 D. Time sharing system
Ans:-C

3) A tree structured file directory system 
 A. Allows easy storage and retrieval of file names
 B. Is a much debated unnecessary feature
 C. Is not essential when we have millions of files
 D. None of the above
Ans:-A

4) Overlay is 
 A. A part of Operating System
 B. A specific memory location
 C. A single contiguous memory that was used in the olden days for running large programs by swapping
 D. Overloading the system with many user files
Ans:- C
  Explanation An overlay is when a process replaces itself with the code of another program. 

5) FAT stands for 
 A. File Accomodation Table
 B. File Access Tape
 C. File Allocation Table
 D. File Activity Table
Ans:- C 

6) In which of the following page replacement policies Balady’s anomaly occurs? 
 A. FIFO
 B. LRU
 C. LFU
 D. NRU
Ans:- A

7) An example of an operating system is _______________ 
 A. Windows XP
 B. UNIX or LINUX
 C. MAC OS
 D. All of the above
Ans:-D

8) Interrupts per second  
 A. Is a good measure of the system I\O activity
 B. Is a good measure of the system paging activity 
 C. Should never be greater than 1000/second
 D. Is higher on smaller computers
Ans:-A

9) The cylinder skew problem is concern with which of the following 
 A. Semaphore
 B. Thrashing
 C. Interleaving
 D. Deadlock
Ans:-C 

10) File record length 
 A. Should always be fixed
 B. Should always be variable
 C. Depends upon the size of the file
 D. Should be chosen to match the data characteristics
Ans:-D

11) To protect system,there are how many security levels? 
 A. One
 B. Two
 C. Three
 D. Four
Ans:- C

12) In one time password 
 A. The password is different in each instance
 B. The password is same in each instance
 C. Both A and B
 D. None of these
Ans:- A

13) Which of the following is an example of a spooled device? 
 A. The terminal used to enter the input data for a program being executed.
 B. The secondary memory device in a virtual memory system.
 C. A line printer used to print the O/P of a number of jobs.
 D. One tries to divide a number by 0.
Ans:-C

14) Peterson’s solution to the critical-section problem 
 A. Only satisfies mutual exclusion and progress requirements
 B. Is a hardware synchronization using locks
 C. Is a software-based solution
 D. All of the above
Ans:-C

15) A file sometimes called a 
 A. Collection of input data
 B. Data set
 C. Temporary place to store data
 D. Program
Ans:-B

16) The simplest way to break a deadlock is to 
 A. Preempt a resource
 B. Rollback
 C. Kill one of the processes
 D. Lock one of the processes
Ans:-C

17) Which model estimates the total effort in terms of person,months of the technical project staff? 
 A. Spiral
 B. Waterfall
 C. Prototyping
 D. COCOMO model
Ans:-D

18) The primary purpose of an operating system is 
 A. To make the most efficient use of the computer hardware
 B. To allow people to use the computer
 C. To keep systems programmers employed
 D. To make computers easier to use
Ans:-A

19) Which of the following is true? 
 A. Overlays are used to increase the size of physical memory.
 B. Overlays are used to increase the logical address space.
 C. When overlays are used ,the size of a process is not limited to the size of physical memory.
 D. Overlays are used whenever the physical address space is smaller than the logical address space.
Ans:-C

20) An interrupt handler is a 
 A. Location in memory that keeps track of recently generated interupts
 B. Peripheral device
 C. Utility program
 D. Special numeric code that indicates the priority of a request
Ans:-C

No comments:

Post a Comment