MCQ On Operating System-All Unit
MCQ On Operating System-All Unit
CsTutorialpoint.com
HOD(IT),
Govt Polytechnic Aurai,Bhadohi
Answer: d
9. Which one of the following is a visual ( mathematical ) way to determine the deadlock
occurrence?
a) resource allocation graph
b) starvation graph
c) inversion graph
d) none of the mentioned
Answer: a
2. Logical memory is broken into blocks of the same size called _________
a) frames
CsTutorialpoint.com
b) pages
c) backing store
d) none of the mentioned
Answer: b
3. Every address generated by the CPU is divided into two parts. They are ____________
a) frame bit & page number
b) page number & page offset
c) page offset & frame bit
d) frame offset & page offset
Answer: b
5. The _____ table contains the base address of each page in physical memory.
a) process
b) memory
c) page
d) frame
Answer: c
7. If the size of logical address space is 2 to the power of m, and a page size is 2 to the power of n
addressing units, then the high order _____ bits of a logical address designate the page number, and
the ____ low order bits designate the page offset.
a) m, n
b) n, m
c) m – n, m
d) m – n, n
Answer: d
Answer: b
CsTutorialpoint.com
9. The operating system maintains a ______ table that keeps track of how many frames have been
allocated, how many are there, and how many are available.
a) page
b) mapping
c) frame
d) memory
Answer: c
13. For larger page tables, they are kept in main memory and a __________ points to the page table.
a) page table base register
b) page table base pointer
c) page table register pointer
d) page table base
Answer: a
Answer: a
Answer: a
1. Paging is implemented in
A. Operating System
B. Hardware
C. Software
D. All of them
ans-b
5. Which scheduler selects which processes should be brought into the ready queue
A. Real-term
B. Long-term
C. Mid-term
CsTutorialpoint.com
D. Short-term
ans-b
6. Dived logical memory into blocks with the same size as frames are called
A. Pages
B. Frames
C. Page Table
D. Segmentation
ans-a
7. Which memory allocation policy allocate the largest hole to the process?
A. Best-Fit
B. Worst-Fit
C. First-Fit
D. None of them
ans-b
8. When there is enough memory to fit a process in memory, but the space is not contiguous we
need
A. Internal Fragmentation
B. Virtual Fragmentation
C. External Fragmentation
D. None of them
ans-c
9. Piece of code that only one thread can execute at a time is called
A. Mutual Exclusion
B. Critical Section
C. Synchronization
D. All of them
ans-b
10. When a thread waits indefinitely for some resource, but other threads are actually using it is
called
A. Starvation
B. Demand Paging
C. Segmentation
D. None of them
ans-a
a)Hit miss
b)Page hit
c)Page miss
d)Page fault
Answer
d)Page fault
CsTutorialpoint.com
2.a process is copied into the main memory from the secondary memory
a) Swapping
b) Paging
c) Segmentation
d) Demand paging
Answer
d) demand paging
3. process is trash
a) it spends more time paging than executing
b) it spends less time paging than executing
c) page fault occurs
d)swapping can not take place
Answer
a) it spends more time paging than executing
c) individual page of a process
5. When a program tries to access a page that is mapped in address space but not loaded in physical
memory, then what occurs
a) page fault occurs
b) fatal error occurs
c) segmentation fault occurs
d) no error occurs
Answer
a) page fault occurs
7.In FIFO page replacement algorithm, when a page must be replaced what is chosen
a) oldest page is chosen
b) newest page is chosen
c) median page is chosen
d) none of the mentioned
Answer
a) oldest page is chosen
CsTutorialpoint.com
8. whenever the page required to be replaced which algorithm chooses the page that has not been
used for the longest period of time?
a) additional reference bit algorithm
b) least recently used algorithm
c) counting based page replacement algorithm
d) first in first out algorithm
Answer
b)least recently used algorithm
10. Working set model for page replacement is based on the assumption of
a)globalization
b) random access
c) modularity
d) locality
Answer
d) locality
11. what memory is called separation of user logical memory and physical memory
a) Memory sharing
b)Virtual memory
c)Memory management
d) Memory control
Answer
b)Virtual memory
12.Is logical Address space can be larger than physical address space?
a) True
b) False
Answer
a) True
c) Cut overwrite
d) Copy overwrite
View Answer
d) Copy overwrite
16. What allocation uses a proportional allocation scheme using priorities rather than size.
a) Simple allocation
b) File allocation
c) Priority allocation
d)Preference allocation
Answer
c) Priority allocation
17. Which a process selects a replacement frame from the set of all frames.
a) Global replacement
b) Local replacement
c) Module replacement
d)Block replacement
Answer
a) Global replacement
20. select the most nearest answer for one or more physically contiguous pages.
a) Allocator
b) Object
c) Slab
d) Cache
CsTutorialpoint.com
Answer
c) Slab
21.technique is implemented by magnetic disk for secondary memory is called
a)Main memory
b)Cache
c)Buffer
d)Virtual memory
Answer
d)Virtual memory
4. Which of the following option is true for virtual to physical address run-time mapping?
A. CPU
B. Operating system
C. memory management unit
CsTutorialpoint.com
D. PCI
E. both a and b
F. None of these
Answer C
Answer C
13. the size of the operating system during program execution is ——— while using transient code.
A. changed
B. increased
C. maintained
D. decreased
E. both a, b and c
F. None of these
Answer A
14. Each partition may contain ________ when memory is divided into several fixed sized partitions.
A. multiple processes at once
B. exactly one process
C. Two process
D. at least one process
E. both a and b
F. None of these
Answer B
17. The number of ——- can be granted by the Owner of address space.
A. Computers
B. Modules
C. Pages
D. Devices
E. both c and b
F. None of these
Answer C
18. To load and store the system data from memory ——- is used.
A. register
B. RAM
C. ROM
D. Buses
E. both c and b
F. None of these
Answer A
4. Many systems recognize three classifications of users in connection with each file (to condense
the access control list) :
a) ) Universe
b) Group
c) owner
d) All of the mentioned
Answer D
LINUX
1.
What command is used to count the total number of lines, words, and characters contained in a file?
A.countw
B.wcount
C.wc
D.count p
E.None of the above
Answer: C
A.dm
B.rm
C.delete
D.erase
E.None of the above
Answer: B
CsTutorialpoint.com
A.rdir
B.remove
C.rd
D.rmdir
E.None of the above
Answer: D
4.
What command is used with vi editor to delete a single character?
A.x
B.y
C.a
D.z
E.None of the above
Answer: A
5.
What hardware architectures are not supported by Red Hat?
A.SPARC
B.IBM-compatible
C.Alpha
D.Macintosh
E.None of the above
Answer: D
B. pg
C. prn
D. print
CsTutorialpoint.com