Operating System MCQ
Operating System MCQ
3. If the displayed system time and dateis wrong, you can reset it using
a. Write
b. Calendar
c. Write file
d. Control panel ( ANS )
a. Viruses
b. Time bombs
c. Worms
d. All of the above ( ANS )
a. Worldwide corporation
b. W3C ( ANS )
c. World Wide Consortium
d.World Wide Web Standard
6. A co-processor
a. Accessories ( ANS )
b. Paint
c. Word
d. All of above
a. Windows NT ( ANS )
b. Page Maker
c. WinWord XP
d. Photoshop
a. WinZip ( ANS )
b. WinShrink
c. WinStyle
d. None of above
a. Lynx
b. MS DOS
c. Windows XP
d. Process Control ( ANS )
12. Which of the following operating system does not implement the multitasking truly?
a. Windows 98
b. Windows NT
c. Windows XP
d. MS DOS ( ANS )
a. Windows 98
b. Windows 2000
c. Windows XP ( ANS )
d. Windows 95
14. Which of the following Operating System does not implement multitasking truly?
a. Windows 98
b. Windows NT
c. Windows XP
d. MS DOS ( ANS )
15. What program runs first aftercomputer is booted and loading GUI?
a. Desktop Manager
b. File Manager
c. Windows Explorer
d. Authentication ( ANS )
16. Which of the following operating system do you choose to implement a client server
network?
a. MS DOS
b. Windows
c. Windows 98
d. Windows 2000 ( ANS )
17. Which of the following Operating systems is better for implementing a Client-Server
network
a. MS DOS
b. Windows 95
c. Windows 98
d. Windows 2000 ( ANS )
a. Windows 3.1
b. Windows 3.11
c. Windows 95 ( ANS )
d. Windows 98
a. Windows Vista
b. Windows 7
c. Windows 8 ( ANS )
d. None of above
a. Windows 2007
b. Windows 8.1 ( ANS )
c. Windows 2008
d. Windows 7
23. Which of the following does not support more than one program at a time?
a. DOS ( ANS )
b. Linux
c. Windows
d. Unix
a. DOS
b. Linux
c. Windows
d. Oracle ( ANS )
26. Which operating system can you give smallest file name?
a. Ps/2
b. Dos ( ANS )
c. Windows
d. Windows NT
a. P11 ( ANS )
b. OS/2
c. Windows
d. Unix
a. Windows
b. Linux
c. Win NT
d. DOS ( ANS )
30. The ..... displays the name of every computer user on the computer
31. The category of software most appropriate for controlling the design and layout of
complex document like newsletters and brochure is:
a. Word processing
b. Computer aided design
c. Web page authoring
d. Desktop publishing ( ANS )
a. Backup
b. Disk defragment
c. Virus scanning ( ANS )
d. All of the above
33. The memory which allocates space for DOS and application is called
a. Expanded memory
b. Cache memory
c. Virtual memory
d. Conventional memory ( ANS )
34. The operating system creates .... from the physical computer
a. Virtual space
b. Virtual computer ( ANS )
c. Virtual device
d. None
a. Virtual space
b. Virtual computers ( ANS )
c. Virtual device
d. None
a. Keyboard driver
b. Mouse driver
c. VGA drive
d. All of above ( ANS )
a. Folder ( ANS )
b. Pod
c. Version
d. None of the above
a. Vol
b. Version
c. Ver ( ANS )
d. None of the above
41. Which type of command requires additional files to perform specific operations?
a. Internal commands
b. External commands ( ANS )
c. Valuable commands
d. Primary commands
a. Operating system
b. Compiler
c. Utilities
d. All of the above ( ANS )
a. User-happy
b. User-simple
c. User-friendly ( ANS )
d. None of the above
44. A .... is a flash memory storage device that plugins into a USB port
a. USB snapdrive
b. USB flashdrive ( ANS )
c. USB memory makerdrive
d. None of above
a. Up to 8 characters ( ANS )
b. 3 characters
c. Up to 10 characters
d. None of the above
a. DOS ( ANS )
b. Windows
c. Unix
d. Linux
48. The most recent version of MAC OS is based on the .... operating system
a. Windows
b. Linux
c. Unix ( ANS )
d. CMOS
49. The ... operating system was initially created in the early 1970s at AT and T's Bell Labs
a. Linux
b. DOS
c. Unix ( ANS )
d. GNU
50. Which command is used to undelete a bunch of files withextension .doc that you have just
deleted?
a. Undelete
b. Undelete/all
c. Undelete *.doc ( ANS )
d. All of above
51. Which command is used to display the contents of the text file of DOS?
a. Copy con
b. Copy
c. Type ( ANS )
d. Dir
a. Run applications
b. Device setting
c. Turn off the system
d. All of above ( ANS )
53. Which of the following is an essential file ofa MS-DOS boot disk?
a. COMMAND.COM ( ANS )
b. START.COM
c. TREE.COM
d. VER.COM
a. Destroys every byte of data on a disk by overwriting itwith with blank spaces ( ANS )
b. Do not check/scan surface after format
c. Transfer system files after format
d. All of above
55. Oncetext has been cut to the clipboard, you can ..... that text into another document
a. Paste ( ANS )
b. Copy
c. Transfer
d. None of the above
a. to rectify deadlock
b. to detect deadlock
c. to prevent deadlock ( ANS )
d. to slove deadlock
58. The primary purpose of an operating system is:
61. Which of the following operating system reads and reacts in actual time?
62. All of the following are TRUE regarding virtual memory EXCEPT
63. The essential difference between an operating system like Linux and one like Windows is
that
a. The timetaken by the dispatcher to stop one process and start another ( ANS )
b. The timetaken by the processor to write a file into disk
c. The whole timetaken by all processor
d. None ofAbove
65. A page fault occurs when
a. RAM
b. ROM ( ANS )
c. The CPU
d. Memory Cache
68. Which of the following does not occur during the power-on-self-test (POST)?
a. List
b. Combo box ( ANS )
c. Text area
d. None
73. A small part of taskbar that has icons of background running applications is
a. Start button
b. Quick launch
c. Task bar
d. System tray ( ANS )
74. An operating system version designed for use with a media center PC
is Microsoft Windows XP
a. Home edition
b. Media center edition ( ANS )
c. Tablet PC edition
d. None of above
75. An operating system version designed for use with a tablet PC is Microsoft Windows XP
a. Home edition
b. Media center edition
c. Tablet PC edition ( ANS )
d. None of the above
a. Taskbar
b. Status bar
c. System tray ( ANS )
d. Launch pad
77. runs on a computer hardware and serves as a platform for other system to run on
78. Which runs on computer hardware and serve as platform for other software to run on?
80. Which is the first program run on a computer when the computer boots up?
a. System software
b. Operating system ( ANS )
c. System operations
d. None
81. The .... contains commands associated with the My Computer window
a. Standard menu
b. Start menu
c. System menu ( ANS )
d. None of the above
82. is the layer of a computer system between the hardware and the user program
a. Operating environment
b. Operating system ( ANS )
c. System environment
d. None of these
83. Which is the layer of a computer system between the hardware and the user program
a. Operating environment
b. Operating system ( ANS )
c. System environment
d. None
84. When you start up the computer the boot up storage at which the BIOS versions
manufacturer and data are displayed on the monitor is called
a. Bootstrap
b. Power on self test (POST) ( ANS )
c. System configuration
d. Kernel loading
85. The operating system is the most common type of ..... Software
a. Communication
b. Application
c. System ( ANS )
d. Word processing software
a. Edit
b. XCOPY
c. Sys
d. None of the above ( ANS )
88. Which of the following is not essential to shut down your computer?
a. IT Expert
b. Diagnosis tool ( ANS )
c. Surgeon
d. None
a. Sort
b. Path
c. Subst ( ANS )
d. Batch
91. The command used to create logical drive for specific location of disk
a. Fdisk
b. Format
c. Subst ( ANS )
d. All of the above
92. You can move a window to a different position on your screen by dragging it by its
93. A bar that inform you the available options in your computer, opened applications,
background running applications and can be used to switch between applications quickly is
a. Menu bar
b. Tool bar
c. Status bar
d. Task bar ( ANS )
a. Dialog box
b. Task bar ( ANS )
c. Start menu
d. All of the above
a. Navigation program
b. Switching between program
c. Start a program
d. All of above ( ANS )
97. When a peripheral device needs immediate attention from the operating system, it
generatesa(n)
a. Interrupt ( ANS )
b. Spool
c. Stack
d. Page file
a. Hyperlink ( ANS )
b. Menu
c. Source drive
d. None of these
99. Which of the following is suitable after you install new drivers?
a. Shut Down
b. Restart ( ANS )
c. Sleep
d. Hibernate
100. Windows displays various options to shutdown. Which is suitable at the end ofday?
a. Shut Down ( ANS )
b. Restart
c. Sleep
d. Hibernate
Correct Answers
1–a 2–c 3–d 4–d 5–b 6–a 7–a 8–a 9–a 10 – a
11 – d 12 – d 13 – C 14 – d 15 – d 16 – d 17 – d 18 – c 19 – c 20 – b
21 – a 22 – a 23 – a 24 – d 25 – a 26 – b 27 – a 28 – d 29 – b 30 – c
31 – d 32 – c 33 – d 34 – b 35 – b 36 – d 37 – a 38 – d 39 – a 40 – c
41 – b 42 – d 43 – c 44 – b 45 – a 46 – a 47 – a 48 – c 49 – c 50 - c
51 – c 52 – d 53 – a 54 – a 55 – a 56 – b 57 – c 58 – a 59 – a 60 – d
61 – b 62 – a 63 – d 64 – a 65 – d 66 – d 67 – b 68 – a 69 – c 70 – b
71 – a 72 – c 73 – d 74 – b 75 – c 76 – c 77 – a 78 – a 79 – b 80 – b
81 – c 82 – b 83 – b 84 – b 85 – c 86 – d 87 – d 88 – c 89 – b 90 – c
91 – c 92 – a 93 – d 94 – b 95 – d 96 – b 97 – a 98 – a 99 – b 100 - a
Part-1
Q.9 Assume that the kernel mode is non-preemptive. What happens when an I/O interrupt comes
while a process `P,' is running in the kernel mode on the CPU?
(a) CPU is given to the process for which the I/ O has completed
(b) CPU is given to some other process based on the scheduling policy
(c) P1 continues to execute on the CPU ( ANS )
(d) None of the above
Q.10 Overlay is
(a) a part of an operating system
(b) a specific memory location
(c) a single contiguous memory that was used in the olden days for running large programs by
swapping ( ANS )
(d) overloading the system with many user files
Q.11 When an interrupt occurs, an operating system
(a) ignores :he interrupt
(b) al,vays changes the stage of the interr,...cted access after processing the inte—_,c:
(c) ays resumes execution of the interrupted process after processing the interrupt
(d) may change the state of the interrupted process to "blocked" and schedule another
process ( ANS )
Q.12 Consider the following statements:
S1: The OS is designed to maximize the resource utilization.
S2: The control program manages the system programs.
Which of the above statements is/are true?
(a) Si is true S2 is false ( ANS )
(b) S2 is true and S1 is false
(c) both Si and S2 are true
(d) both S1 and S2 are false
0.13 Bootstrap loader is always stored in
(a) cache (b) ROM ( ANS )
(c) RAM (d) disk
Q.14 Which of the following is true?
(a) Overlays are used to increase the size of physical memory.
(b) Overlays are used to increase the logical address space.
(c) When overlays are used, the size of a process is not limited to the size of physical
memory. ( ANS )
(d) Overlays are used whenever the physical address space is smaller than the logical
address space.
Answers Basic Concepts of OS
1. (a) 2. (c) 3. (c) 4. (d) 5. (b) 6. (b) 7. (b) 8. (b) 9. (c)
10.(c)11.(d)12.(a)13.(b)14. (c)
Answer: d
Explanation: An Operating System acts as an intermediary between user/user
applications/application programs and hardware. It is a program that manages hardware
resources. It provides services to application programs.
2. To access the services of operating system, the interface is provided by the
a) System calls
b) API
c) Library
d) Assembly instructions
Answer: a
Explanation: To access services of the Operating System an interface is provided by the System
Calls. Generally, these are functions written in C and C++. Open, Close, Read, Write are some of
most prominently used system calls.
3. Which one of the following is not true?
a) kernel is the program that constitutes the central core of the operating system
b) kernel is the first part of operating system to load into memory during booting
c) kernel is made of various modules which can not be loaded in running operating system
d) kernel remains in the memory during the entire computer session
Answer: c
Explanation: Kernel is the first program which is loaded in memory when OS is loading as well as
it remains in memory till OS is running. Kernel is the core part of the OS which is responsible for
managing resources, allowing multiple processes to use the resources and provide services to
various processes. Kernel modules can be loaded and unloaded in run-time i.e. in running OS.
4. Which one of the following error will be handle by the operating system?
a) power failure
b) lack of paper in printer
c) connection failure in the network
d) all of the mentioned
Answer: d
Explanation: All the mentioned errors are handled by OS. The OS is continuously monitoring all
of its resources. Also, the OS is constantly detecting and correcting errors.
5. What is the main function of the command interpreter?
a) to get and execute the next user-specified command
b) to provide the interface between the API and application program
c) to handle the files in operating system
d) none of the mentioned
Answer: a
Explanation: The main function of command interpreter is to get and execute the next user-
specified command. Command Interpreter checks for valid command and then runs that
command else it will throw an error.
Answer: d
Explanation: In Operating Systems, CPU scheduling algorithms are:
i) First Come First Served scheduling
ii) Shortest Job First scheduling
iii) Priority scheduling
iv) Round Robin scheduling
v) Multilevel Queue scheduling
vi) Multilevel Feedback Queue scheduling
All of these scheduling algorithms have their own advantages and disadvantages.
7. If a process fails, most operating system write the error information to a
a) log file
b) another running process
c) new file
d) none of the mentioned
Answer: a
Explanation: If a process fails, most operating systems write the error information to a log file.
Log file is examined by the debugger, to find out what is the actual cause of that particular
problem. Log file is useful for system programmers for correcting errors.
8. Which facility dynamically adds probes to a running system, both in user processes and in the
kernel?
a) DTrace
b) DLocate
c) DMap
d) DAdd
Answer: a
Explanation: A facility that dynamically adds probes to a running system, both in user process
and in the kernel is called DTrace. This is very much useful in troubleshooting kernels in real-
time.
9. Which one of the following is not a real time operating system?
a) VxWorks
b) QNX
c) RTLinux
d) Palm OS
Answer: d
Explanation: VxWorks, QNX & RTLinux are real-time operating systems. Palm OS is a mobile
operating system. Palm OS is developed for Personal Digital Assistants (PDAs).
10. The OS X has
a) monolithic kernel
b) hybrid kernel
c) microkernel
d) monolithic kernel with modules
Answer: b
Explanation: OS X has a hybrid kernel. Hybrid kernel is a combination of two different kernels.
OS X is developed by Apple and originally it is known as Mac OS X.
Part-3
Q.1 The software that contains the core components of the operating system is called
(a) Controller (b) Root
( c ) K e r n e l ( ANS ) (d) None of the above
Q.2 When a computer is switched on, where is the operating system loaded?
(a) BIOS (b) ROM
(c) PO ST
( d ) R A M ( ANS )
Q.3 On which chip is the BIOS program permanently stored?
(a) RAM (b) ROM ( ANS )
(c) SIMBA (d) none of these
Q.4 Spooling helps because
(a) it is a more secure method of accessing data
(b) print jobs go more smoothly with less stop and go
(c) the computer is released to do other things while still printing ( ANS )
(d) None of the above
Q.8 Which of the following is true about a terminal on a time-sharing computer system?
(a) has its own CPU and some memory
(b) has no memory or CPU of its own ( ANS )
(c) has its own CPU but no memory
(d) has its own memory but no CPU
Q.9 The boot process happens in the order
(a) POST test, activate BIOS, check settings, load OS into RAM ( ANS )
(b) Activate BIOS, POST test, load OS into RAM, check settings
(c) Check settings, load OS into RAM, activate BIOS, POST test
(d) Load OS into RAM, check settings, activate BIOS, POST test
Q.10 An interrupt handler is a
(a) location in memory that keeps track of recently generated interrupts
(b) peripheral device
(c) utility program ( ANS )
(d) special numeric code that indicates the priority of a request
Q.14 Which of the following functions is not controlled by the operating system?
(a) managing memory
(b) managing programs and data
(c) managing input and output
(d) all of the above are controlled by the operating system ( ANS )
Q.15 Executing more than one program concurrently by one user on one computer is known
as
(a) multiprogramming
(b) time-sharing
(c) multitasking ( ANS )
(d) multiprocessing
Q.19 Overlay is
(a) a part of an OS
(b) a specific memory location
(c) a single contiguous memory that was used in the olden days for running large
programs by swapping ( ANS )
(d) overloading the system with many user fills
Answer Key:
MCQs
1. Concurrent access to shared data may result in ____________
a) data consistency
b) data insecurity
c) data inconsistency ( ANS)
d) none of the mentioned
2. A situation where several processes access and manipulate the same data concurrently and the
outcome of the execution depends on the particular order in which access takes place is called
____________
a) data consistency
b) race condition ( ANS)
c) aging
d) starvation
3. The segment of code in which the process may change common variables, update tables, write into
files is known as ____________
a) program
b) critical section ( ANS)
c) non – critical section
d) synchronizing
4. Which of the following conditions must be satisfied to solve the critical section problem?
a) Mutual Exclusion
b) Progress
c) Bounded Waiting
d) All of the mentioned ( ANS)
6. Bounded waiting implies that there exists a bound on the number of times a process is allowed to
enter its critical section ____________
a) after a process has made a request to enter its critical section and before the request is granted
(ANS)
b) when another process is in its critical section
c) before a process has made a request to enter its critical section
d) none of the mentioned
7. A minimum of _____ variable(s) is/are required to be shared between processes to solve the critical
section problem.
a) one
b) two ( ANS)
c) three
d) four
14. The wait operation of the semaphore basically works on the basic _______ system call.
a) stop()
b) block() ( ANS)
c) hold()
d) wait()
15. The signal operation of the semaphore basically works on the basic _______ system call.
a) continue()
b) wakeup() ( ANS)
c) getup()
d) start()
17. The code that changes the value of the semaphore is ____________
a) remainder section code
b) non – critical section code
c) critical section code ( ANS)
d) none of the mentioned
18. What will happen if a non-recursive mutex is locked more than once?
a) Starvation
b) Deadlock ( ANS)
c) Aging
d) Signaling
21. At a particular time of computation the value of a counting semaphore is 7.Then 20 P operations
and 15 V operations were completed on this semaphore. The resulting value of the semaphore is?
a) 42
b) 2 ( ANS)
c) 7
d) 12
26. In the bounded buffer problem, there are the empty and full semaphores that ____________
a) count the number of empty and full buffers ( ANS)
b) count the number of empty and full memory spaces
c) count the number of empty and full queues
d) none of the mentioned
28. To ensure difficulties do not arise in the readers – writers problem _______ are given exclusive
access to the shared object.
a) readers
b) writers ( ANS)
c) readers and writers
d) none of the mentioned
31. All processes share a semaphore variable mutex, initialized to 1. Each process must execute
wait(mutex) before entering the critical section and signal(mutex) afterward.
Suppose a process executes in the following manner.
signal(mutex);
.....
critical section
.....
wait(mutex);
In this situation :
a) a deadlock will occur
b) processes will starve to enter critical section
c) several processes maybe executing in their critical section ( ANS)
d) all of the mentioned
32. All processes share a semaphore variable mutex, initialized to 1. Each process must execute
wait(mutex) before entering the critical section and signal(mutex) afterward.
Suppose a process executes in the following manner.
wait(mutex);
.....
critical section
.....
wait(mutex);
In this situation :
a) a deadlock will occur ( ANS)
b) processes will starve to enter critical section
c) several processes maybe executing in their critical section
d) all of the mentioned
33. Consider the methods used by processes P1 and P2 for accessing their critical sections whenever
needed, as given below. The initial values of shared boolean variables S1 and S2 are randomly
assigned.
Method used by P1:
while(S1==S2);
Critical section
S1 = S2;
35. When high priority task is indirectly preempted by medium priority task effectively inverting the
relative priority of the two tasks, the scenario is called __________
a) priority inversion ( ANS)
b) priority removal
c) priority exchange
d) priority modification
38. Which process can be affected by other processes executing in the system?
a) cooperating process ( ANS)
b) child process
c) parent process
d) init process
39. Cascading termination refers to termination of all child processes if the parent process terminates
______
a) Normally
b) Abnormally
c) Normally or abnormally ( ANS)
d) None of the mentioned
40. With _____________ only one process can execute at a time; meanwhile all other process are
waiting for the processor. With ______________ more than one process can be running
simultaneously each on a different processor.
a) Multiprocessing, Multiprogramming
b) Multiprogramming, Uniprocessing
c) Multiprogramming, Multiprocessing
d) Uniprogramming, Multiprocessing ( ANS)
41. In UNIX, the return value for the fork system call is _____ for the child process and _____ for the
parent process.
a) A Negative integer, Zero
b) Zero, A Negative integer
c) Zero, A nonzero integer ( ANS)
d) A nonzero integer, Zero
46. The link between two processes P and Q to send and receive messages is called __________
a) communication link ( ANS)
b) message-passing link
c) synchronization link
d) all of the mentioned
52. Bounded capacity and Unbounded capacity queues are referred to as __________
a) Programmed buffering
b) Automatic buffering ( ANS)
c) User defined buffering
d) No buffering
53. Which are two fundamental models of interprocess communication:
i) Shared Memory
ii) Message Passing
iii) Independent
iv) Cooperating
A. i, ii ( ANS)
B. ii, iii
C. iii, iv
D. i, iv
54. Under direct communication, when asymmetry in addressing scheme is employed, the send() and
receive() primitives are defined as follows:
1. send(P, message)- Send a message to process P
2. receive(Q, message)- Receive a message from process Q
3. receive(id, message)- Receive a message from any process
4. send(id, message)- Send a message to any process
A. 1, 3 ( ANS)
B. 2, 4
C. 3, 4
D. 1, 2
59. Peterson’s solution is restricted to ______ process that alternate execution between their critical
sections and remainder section.
A. One
B. Three
C. Two ( ANS)
D. Five
61. A classic _____ solution to the critical section problem known as Peterson’s Solution.
A. Hardware Based
B. Software Based ( ANS)
C. Hardware & Software Based
D. None of the above
62. A semaphore is an integer variable that apart from initialization is accessed only through two
standard atomic operations called_______
A. exec() and exit()
B. exec() and signal()
C. wait() and exit()
D. wait() and signal() ( ANS)
63. For semaphores and binary semaphores, a _________ is used to hold processes waiting on the
semaphore.
A) Stack
B) Queue ( ANS)
C) Tree
D) Graph
64. A semaphore whose definition includes the fairest policy First-in-First-Out (FIFO) is called ____
A) binary semaphore
B) strong semaphore ( ANS)
C) weak semaphore
D) multi semaphore
65. A semaphore that does not specify the order in which processes are removed from the queue is a
_______
A) binary semaphore
B) strong semaphore
C) weak semaphore ( ANS)
D) multi semaphore
66. Which of the following is/are the disadvantages of machine instruction approach to enforce
mutual exclusion.
i) Busy waiting employees
ii) hard to verify
iii) starvation is possible
iv) Deadlock is possible
A) i, ii and iii only
B) ii, iii and iv only
C) i, iii and iv only ( ANS)
D) All i, ii, iii and iv
67. With the use of special machine instruction to enforce mutual exclusion has the following
advantages.
i) It is applicable to any number of processes on either a single processor or multiple
processors sharing main memory.
ii) It is simple therefore easy to verify
iii) It can be used to support multiple critical sections.
A) i and ii only
B) ii and iii only
C) i and iii only
D) All i, ii and iii ( ANS)
68. Which of the following facility or capacity are required to provide support for the mutual
exclusion?
i) A process that halts in its noncritical section must do so without interfering with other processes.
ii) The assumption should be made about relative process speeds or the number of processors.
iii) A process remains inside its critical section for a finite time only
A) i and ii only
B) ii and iii only
C) i and iii only ( ANS)
D) All i, ii and iii
70. The creating process is called a _____ process while the new processes are called the _____ of
that process.
A) Single, Zoombie
B) Child, Parent
C) Parent, Child ( ANS)
D) Single, Child
72. The critical section problem can be solved by the following except
A) Software Based Solution
B) Firmware Based Solution ( ANS)
C) Operating System Based Solution
D) Hardware Based Solution
73. In bounded buffer problem which of the following assumptions stands TRUE?
i) We assume that the pool consists of N buffers, each capable of holding one item.
ii) The mutex semaphore provides mutual exclusion for accesses to the buffer pool and is initialized to
1.
iii) The mutex semaphore provides mutual exclusion for accesses to the buffer pool and is initialized
to 0.
iv) The empty and full semaphores count the number of empty and full buffers. The semaphore
empty is initialized to the value N; the semaphore full is initialized to the value 0.
v) The empty and full semaphores count the number of empty and full buffers. The semaphore empty
is initialized to the value 0; the semaphore full is initialized to the value N.
A) 1, 3, 5
B) 1, 2, 4 ( ANS)
C) 1, 2, 5
D) 3, 4, 5
74. For how many processes which are sharing common data, the Dekker's algorithm implements
mutual exclusion?
A) 1
B) 2 ( ANS)
C) 3
D) 4
76. Consider the methods used by processes P1 and P2 for accessing their critical sections whenever
needed, as given below. The initial values of shared boolean variables S1 and S2 are randomly
assigned.
Method used by P1 :
while(S1==S2);
Critical section
S1 = S2;
Method used by P2 :
while(S1!=S2);
Critical section
S2 = not(S1);
78. During process interaction concurrent processes come into conflict with each other when they are
A) Executed
B) Completed ( ANS)
C) Decoded
D) Aborted
79. For a single processor system, implementation of semaphore is possible to inhibited through:
A) Deadlock
B) Lock Step
C) Paging
D) Interrupts ( ANS)
81. In special machine instruction, compare and swap instruction to memory location against a
A) Configuration
B) Test
C) Test Value ( ANS)
D) Memory
85. The following two functions P1 and P2 that share a variable B with an initial value of 2 execute
concurrently.
P1()
{
C = B – 1;
B = 2*C;
}
P2()
{
D = 2 * B;
B = D - 1;
}
The number of distinct values that B can possibly take after the execution is
A) 3 ( ANS)
B) 2
C) 5
D) 4
87.
Answer: a
a) mutual exclusion
b) a process may hold allocated resources while awaiting
assignment of other resources
c) no resource can be forcibly removed from a process holding it
d) all of the mentioned
Answer: d
3. A system is in the safe state if ____________
Answer: a
4. The circular wait condition can be prevented by ____________
a) defining a linear ordering of resource types
b) using thread
c) using pipes
d) all of the mentioned
Answer: a
5. Which one of the following is the deadlock avoidance algorithm?
a) banker’s algorithm
b) round-robin algorithm
c) elevator algorithm
d) karn’s algorithm
Answer: a
6.
a) in advance processes rarely know how much resource they will need
b) the number of processes changes as time progresses
c) resource once available can disappear
d) all of the mentioned
Answer: d
7. For an effective operating system, when to check for deadlock?
Answer: c
a) deadlock
b) starvation
c) inversion
d) aging
Answer: b
Answer:a
10. To avoid deadlock ____________
Answer: a
11. Which requested resources are granted with deadlock detection?
A. Resources
B. Processes
C. Programs
D. Users
E. Data
F. Both C &D
Answer: B
A. Simple
B. Complex
C. Conservative
D. Straight
E. Difficult
F. Both A&B
Answer: C
Answer: A
Answer: D
Answer: D
18. Which one process cannot overwrite another’s a memory,
either inadvertently or maliciously.
A. sections
B. partitions
C. modules
D. regions
E. frames
F. both A&B
Answer: B
19. .……….. That can be loaded into adjacent “holes” in the main
memory.
A. segments
B. frames
C. partitions
D. pages
E. regions
F. None of these
Answer. A
20. System’s evaluate common schedule strategies.
A. throughput
B. means response time
C. variance of response time
D. all of the above
E. both A&B
F. no response time
Answer: D
21. How much time will spend when LRU replaces the page?
A. shortest time in memory
B. shortest time in memory without being referenced
C. longest time in memory
D. longest time in memory without being referenced
E. both A&B
F. both C&D
Answer: D
22. Why Spooling helps?
A. while printing when computer release to do other things
B. jobs go more smoothly with less stop
C. printing it is a more secure method of accessing data
D. none of the above
E. both B&C
F. both A&C
Answer: A
23. OS spends much of its time paging also instead of
executing applications software, it is called………..
A. spooling
B. formatting
C. thrashing
D. booting
E. scanning
F. both A&B
Answer: C
24. ………… is an interrupt handler.
A. memory location that keeps track
B. peripheral devices
C. operating device
D. numeric code that indicated the priority request
E. utility program
F. None of these
Answer: E
25. Running process does not interrupt by ……………
A. device
B. timer interrupts
C. power failure
D. scheduling process
E. both A&B
F. none of above
Answer: A
26. ………….. is an Overlay.
A. a part of an OS
B. a specific memory location
C. overloading the system with many users fills
D. a contiguous memory that was used in the olden days for
running
E. both A&B
F. None of these
Answer: C
27. A ……………… is one that can be safely used by only one process
at a time and is not depleted by that use.
A) Reusable Resource
B) Single Process Resource
C) Consumable Resource
D) Produced Resource
28. Processors, I/O channels, main and secondary memory devices, and
data structures such as files, databases, and semaphores are the examples
of ……..
A) Reusable Resources
B) Single Process Resources
C) Consumable Resources
D) Produced Resources
30. Interrupts, signals, messages and information in I/O buffers are the
examples of ……………….
A) Reusable Resources
B) Single Process Resources
C) Consumable Resources
D) Produced Resources
31. Which of the following are the conditions of policy must be present
for a deadlock to be possible.
i) If only one process may use a resource at a time
ii) If a process may hold allocated resources while awaiting assignment
of others
iii) If no resource can be forcibly removed from a process holding it.
A) i and ii only
B) ii and iii only
C) i and iii only
D) All i, ii and iii
Answer C) Preemption
35. Which of the following is/are the schemes uses for the prevention of
deadlock.
i) Requesting all resources ii) Preemption iii) Resource Ordering iv)
Manipulate to find at least one safe path
A) i, ii and iii only
B) ii, iii and iv only
C) i, iii and iv only
D) All i, ii, iii and iv
36. Invoking periodically to test for deadlock is one of the ways for
deadlock ………………..
A) Prevention
B) Avoidance
C) Detection
D) Deletion
Answer C) Detection
37. Which of the following is/are the major advantages of requesting all
resources at once.
i) Works well for processes that perform a single burst of activity
ii) No preemption is necessary
iii) Feasible to enforce via compile-time checks
A) i and ii only
B) ii and iii only
C) i and iii only
D) All i, ii and iii
Answer B) Avoid
44. In resource allocation denial, a ……………………….. is one in
which there is at least one sequence that does not result in a deadlock.
A) Safe state
B) Unsafe state
C) Safe allocation
D) Unsafe allocation
1. CPU fetches the instruction from memory according to the value of ____________
a) program counter
b) status register
c) instruction register
d) program status word
Ans :- a
5. Memory management technique in which system stores and retrieves data from secondary storage
for use in main memory is called?
a) fragmentation
b) paging
c) mapping
d) none of the mentioned
Ans :- b
9. What is compaction?
a) a technique for overcoming internal fragmentation
b) a paging technique
c) a technique for overcoming external fragmentation
d) a technique for overcoming fatal error
Ans :- c
11. The address loaded into the memory address register of the memory is referred to as
____________
a) Physical address
b) Logical address
c) Neither physical nor logical
d) None of the mentioned
Ans :- a
12. The run time mapping from virtual to physical addresses is done by a hardware device called the
____________
a) Virtual to physical mapper
b) Memory management unit
c) Memory mapping unit
d) None of the mentioned
Ans :- b
15. The _________ time in a swap out of a running process and swap in of a new process into the
memory is very high.
a) context – switch
b) waiting
c) execution
d) all of the mentioned
Ans :- a
19. With relocation and limit registers, each logical address must be _______ the limit register.
a) less than
b) equal to
c) greater than
d) none of the mentioned
Ans :- a
20. With relocation and limit registers, each logical address must be _______ the limit register.
a) less than
b) equal to
c) greater than
d) none of the mentioned
Ans :- a
22. The first fit, best fit and worst fit are strategies to select a ______
a) process from a queue to put in memory
b) processor to run the next process
c) free hole from a set of available holes
d) all of the mentioned
Ans :- c
23. What is true about memory management?
b. a paging technique
Ans :- c
A. 2
B. 3
C. 4
D. 5
Ans :- a
27. In which type of Fragmentation, Memory block assigned to process is bigger. Some portion of
memory is left unused, as it cannot be used by another process.
A. External fragmentation
B. Internal fragmentation
C. Both A and B
D. None of the above
Ans :- b
28. __________ is a memory management technique in which process address space is broken into
blocks of the same size
A. Fragmentation
B. Frames
C. Paging
D. Address Translation
Ans :- c
29. Which of the following page replacement algorithms suffers from Belady’s anomaly?
a) FIFO
b) LRU
c) Optimal Page Replacement
d) Both LRU and FIFO
Ans :- a
32. Logical memory is broken into blocks of the same size called _________
a) frames
b) pages
c) backing store
d) none of the mentioned
Ans :- b
33. Everyaddress generated by the CPU is divided into two parts. They are ____________
a) frame bit & page number
b) page number & page offset
c) page offset & frame bit
d) frame offset & page offset
Ans :- b
35. The _____ table contains the base address of each page in physical memory.
a) process
b) memory
c) page
d) frame
Ans :- c
39. The operating system maintains a ______ table that keeps track of how many frames have
been allocated, how many are there, and how many are available.
a) page
b) mapping
c) frame
d) memory
Ans :- c
43. For larger page tables, they are kept in main memory and a __________ points to the page
table.
a) page table base register
b) page table base pointer
c) page table register pointer
d) page table base
Ans :- a
47. If
a page number is not found in the TLB, then it is known as a ____________
a) TLB miss
b) Buffer miss
c) TLB hit
d) All of the mentioned
Ans :- a
48. An ______ uniquely identifies processes and is used to provide address space protection for
that process.
a) address space locator
b) address space identifier
c) address process identifier
d) none of the mentioned
Ans :- b
49. The percentage of times a page number is found in the TLB is known as ____________
a) miss ratio
b) hit ratio
c) miss percent
d) none of the mentioned
Ans :- b
Ans :- d
51. Memory protection in a paged environment is accomplished by ____________
a) protection algorithm with each page
b) restricted access rights to users
c) restriction on page visibility
d) protection bit with each page
Ans :- d
52. When the valid – invalid bit is set to valid, it means that the associated page ____________
a) is in the TLB
b) has data in it
c) is in the process’s logical address space
d) is the system’s physical address space
Ans :- c
54. When there is a large logical address space, the best way of paging would be ____________
a) not to page
b) a two level paging algorithm
c) the page table itself
d) all of the mentioned
Ans :- b
55. Ina paged memory, the page hit ratio is 0.35. The required to access a page in secondary
memory is equal to 100 ns. The time required to access a page in primary memory is 10 ns. The
average time required to access a page is?
a) 3.0 ns
b) 68.0 ns
c) 68.5 ns
d) 78.5 ns
Ans :- c
56. To obtain better memory utilization, dynamic loading is used. With dynamic loading, a routine
is not loaded until it is called. For implementing dynamic loading ____________
a) special support from hardware is required
b) special support from operating system is essential
c) special support from both hardware and operating system is essential
d) user programs can implement dynamic loading without any special support from hardware or
operating system
Ans :- d
57. Inpaged memory systems, if the page size is increased, then the internal fragmentation
generally ____________
a) becomes less
b) becomes more
c) remains constant
d) none of the mentioned
Ans :- b
65. When the entries in the segment tables of two different processes point to the same physical
location ____________
a) the segments are invalid
b) the processes get blocked
c) segments are shared
d) all of the mentioned
Ans :- c
67. If
there are 32 segments, each of size 1Kb, then the logical address should have ____________
a) 13 bits
b) 14 bits
c) 15 bits
d) 16 bits
Ans :- a
68. Consider a computer with 8 Mbytes of main memory and a 128K cache. The cache block size
is 4 K. It uses a direct mapping scheme for cache management. How many different main
memory blocks can map onto a given physical cache block?
a) 2048
b) 256
c) 64
d) 8
Ans :- c
69. A multilevel page table is preferred in comparison to a single level page table for translating
virtual address to physical address because ____________
a) it reduces the memory access time to read or write a memory location
b) it helps to reduce the size of page table needed to implement the virtual address space of a
process
c) it is required by the translation lookaside buffer
d) it helps to reduce the number of page faults in page replacement algorithms
Ans :- b
70. A computer system supports 32-bit virtual addresses as well as 32-bit physical addresses.
Since the virtual address space is of the same size as the physical address space, the operating
system designers decide to get rid of the virtual memory entirely. Which one of the following
is true?
a) Efficient implementation of multi-user support is no longer possible
b) The processor cache organization can be made more efficient now
c) Hardware support for memory management is no longer needed
d) CPU Scheduling can be made more efficient now
Ans :- c
This set of MCQ questions on I/O management and disk scheduling in OS
includes the collections of MCQ questions related to I/O management in OS.
It includes MCQ questions for the fundamentals of I/O management, I/O
command, appropriate sequences of I/O instructions and rapid bursts of I/O.
1. Which of the following is/are the technique(s) for performing I/O
management function.
A) Programmed I/O
A) Programmed I/O
A) Programmed I/O
A) Programmed I/O
6. The ................... module deals with t he device as a logical resource and is not
concerned with the details of actually controlling the device.
A) Directory Management
C) Device I/O
D) Scheduling and control
A) Directory Management
B) Logical I/O
B) Logical I/O
C) Device I/O
9. ………………. layer deals with the logical structure of files and with the
operations that can be specified by users such as open, close, read and write.
A) Physical organization
B) File system
( ANS)
C) Directory management
10. When a user process issues an I/O request, the operating system assigns a
bu"er in the system portion of main memory to the operation called …………..
A) Double bu"er
C) Linear bu"er
D) Circular bu"er
B) Single bu"ering
C) Linear bu"ering
D) Circular bu"ering
12. On a movable head system, the time it takes to position the head at the track
is known as …………
B) rotational delay
C) access time
D) Transfer time
13. The time disk controller takes for the beginning of the sector to reach the
head is known as ……………..
A) seek time
C) access time
D) Transfer time
14. The ……………….. consists of two key components: the initial startup time,
and the time taken to traverse the tracks that have to be crossed once the
access arm is up to speed.
B) rotational delay
C) access time
D) Transfer time
15. The ............... policy is to select the disk I/O request that requires the least
movement of the disk arm from its current position.
C) Priority by process
D) Random scheduling
16. In ………………. policy, when the last track has been visited in one direction,
the arm is returned to the opposite end of the disk and the scan begins again.
C) SCAN
i) RAID is set of physical disk drives viewed by the operating system as a single
logical drive
A) i and ii only
18. …………….. is not a true member of RAID family, because it does not include
redundancy to improve performance.
B) RAID Level 1
C) RAID Level 2
D) RAID Level 3
A) RAID Level 0
B) RAID Level 1
D) RAID Level 3
20. In the ................... scheme, two di"erent parity calculations are carried out
and stored in separate blocks on di"erent disks.
A) RAID Level 4
B) RAID Level 5
D) RAID Level 3
Answers
2. A) Programmed I/O
6. B) Logical I/O
7. C) Device I/O
8. A) Directory Management
9. B) File system
A) field ( ANS)
B) record
C) file
D) database
A) field
B) record ( ANS)
C) file
D) database
B) Physical I/O
C) Basic I/O supervisor
D) Logical I/O
4. The ..................... is responsible for all file I/O initiation and termination.
A) Device drivers
B) Physical I/O
D) Logical I/O
A) Device drivers
B) Physical I/O
A) Pile ( ANS)
B) sequential
C) indexed sequential
D) indexed
7. In ....................... file organization, a fixed format is used for records where
all records are of the same length, consisting of the same number of fixed
length fields in a particular order.
A) pile
B) sequential ( ANS)
C) indexed sequential
D) indexed
A) pile
B) sequential file
D) indexed file
A) pile
B) sequential file
A) pile
B) sequential file
11. Airline reservation systems and inventory control system are the examples
of system.
A) pile
B) sequential file
12. The .................... greatly reduced the time required to access a single record,
without sacrificing the sequential nature of the file.
A) pile
B) sequential file
D) indexed file
13. In free space management, ………………….. method has negligible space
overhead because there is no need for a disk allocation table, merely for a
pointer to the beginning of the chain and the length of the first portion.
A) Bit tables
C) Indexing
A) Bit tables
C) Indexing
C) Indexing
A) Chained allocation
C) Contiguous allocation
D) Variable allocation
A) Chained allocation
B) Indexed allocation
D) Variable allocation
B) Indexed allocation
C) Contiguous allocation
D) Variable allocation
19. Which of the following is/are the types of operations that may be performed
on the directory.
i) Search ii) Create file iii) Create directory iv) List directory
20 .................... are often used where very rapid access is required, where fixed
length records are used, and where records are always accessed one at a time.
A) Indexed files
C) Sequential files
A) List
C) Queue
D) Stack
22. …………………… are typically used in batch applications and are generally
optimum for such applications if they involve the processing of all the records.
A) Indexed files
B) Direct files
23. Directories, pricing tables, schedules and name lists are the examples of
……………….
A) Indexed files
C) Sequential files
A) update directory
B) list directory
D) create directory
25. ……………………….. are small fixed portions which provide greater flexibility
which may require large tables or complex structures for their allocation.
A) Blocks ( ANS)
B) Columns
C) Segments
D) Partitions
Answers
1. A) field
2. B) record
3. A) Device drivers
5. D) Logical I/O
6. A) pile
7. B) sequential
25. A) Blocks