1.
When you save to this, your data will remain intact even when the computer is turned off-
(A) RAM
(B) Motherboard
(C) Secondary storage device
(D) Primary storage device
(E) None of these
2. A central computer that holds collections of data and programs for many PCs, workstations,
and other computers is a (n)-
Examrac
(A) supercomputer
(B) minicomputer
(C) laptop
e
(D) server
(E) None of these
3. The folder retains copies of messages that you have started but are not yet ready to send.
(A) Drafts
(B) Outbox
(C) Address Book
(D) Sent Items
(E) Inbox
4. Grouping and processing all of a firm's transactions at one time is called-
(A) a database management system
(B) batch processing
(C) a real-time system
(D) an on-line system
(E) None of these
1
5. The enables you to simultaneously keep multiple Web pages open in one browser window.
(A) tab box
2
(B) pop-up helper
(C) tab row
(D) address bar
(E) Esc key
6. Which ports connect special types of music instruments to sound cards?
(A) BUS
(B) CPU
(C) USB
Examrac
(D) MIDI
(E) MINI
7. You can a search by providing more information the search engine can use to select
e
a smaller, more useful set of results.
(A) refine
(B) expand
(C) load
(D) query
(E) slowdown
8. What is the permanent memory built into your computer called?
(A) RAM
(B) Floppy
(C) CPU
(D) CD-ROM
(E) ROM
9. What displays the contents of the active cell in Excel?
(A) Namebox
3
(B) RowHeadings
(C) Formulabar
4
(D) Taskpane
(E) None of these
10. The piece of hardware that converts your computer's digital signal to an analog signal that
can travel over telephone lines is called a-
(A) red wire
(B) blue cord
(C) tower
(D) modem
Examrac
(E) None of these
11. Computer uses the number system to store data and perform calculations.
(A) binary
e
(B) octal
(C) decimal
(D) hexadecimal
(E) None of these
12. A disk's content that is recorded at the time of manufacture and that cannot be changed
or erased by the user is-
(A) Memory-only
(B) Write-only
(C) Once-only
(D) Run-only
(E) Read-only
13. Which of the following can be used to select the entire document?
(A) CTRL+A
(B) ALT+F5
(C) SHIFT +A
5
(D) CTRL+K
6
(E) CTRL+H
14. are attempts by individuals to obtain confidential information from you by
falsifying their identity.
(A) Phishing
(B) Computer viruses
(C) Spyware scams
(D) Viruses
(E) None of the above
Examrac
15. Part number, part description, and number of parts ordered are examples of-
(A) control
(B) output
e
(C) processing
(D) feedback
(E) input
16. A Web site's main page is called its-
(A) Home Page
(B) Browser Page
(C) Search Page
(D) Bookmark
(E) None of these
17. The simultaneous processing of two or more programs by multiple processors is-
(A) multiprogramming
(B) multitasking
(C) time-sharing
(D) multiprocessing
7
(E) None of these
18. Codes consisting of lines of varying widths or lengths that are computer-readable are known as-
8
(A) an ASCII code
(B) a magnetic tape
(C) an OCR scanner
(D) a bar code
(E) None of these
19. To instruct Word to fit the width of a column to the contents of a table automatically, click the
button and then point to AutoFit Contents.
(A) Fit to Form
Examrac
(B) Format
(C) Autosize
(D) Contents
e
(E) AutoFit
20. Why is it unethical to share copyrighted files with your friends?
(A) It is not unethical, because it is legal.
(B) It is unethical because the files are being given for free.
(C) Sharing copyrighted files without permission breaks copyright laws.
(D) It is not unethical because the files are being given for free.
(E) It is not unethical-anyone can access a computer
21. Hackers
(A) all have the same motive
(B) are people who maintain computers
(C) may legally break into computers as long as they do not do any damage
(D) are people who are allergic to computers
(E) break into other people's computers
22. Unauthorised copying of software to be used for personal gain instead of for personal backups
9
is called
(A) program thievery
10
(B) data snatching
(C) software piracy
(D) program looting
(E) data looting
23. Junk e-mail is also called
(A) spam
(B) spoof
(C) cookie crumb
Examrac
(D) sniffer script
(E) spill
24. What is usually used for displaying information at public places?
e
(A) Monitors
(B) Overhead Projections
(C) Monitors and Overhead Projections
(D) Touch Screen Kiosks
(E) Loud Speakers
25. What is MP3?
(A) A Mouse
(B) A Printer
(C) A Sound format
(D) A Scanner
(E) A Mobile Phone
26. What is the most popular hardware for multimedia creations?
(A) PCs
11
(B) Minicomputers
(C) Mainframe Computers
12
(D) WANs
(E) Super Computers
27. Which of the following is needed for sound recording?
(A) Speaker
(B) Microphone
(C) Talker
(D) Mouse
(E) Telephone
Examrac
28. The life span of a CD-ROM is
(A) approximately one year
(B) approximately two years
e
(C) approximately five years
(D) approximately twenty-five years
(E) almost unlimited
29. The settings are automatic and standard.
(A) default
(B) CPU
(C) peripheral
(D) user-friendly
(E) defaulter
30. What are the two parts of an e-mail address?
(A) User name and street address
(B) Legal name and phone number
(C) User name and domain name
(D) Initials and password
13
(E) User name and recipient name
31. If you wish to extend the length of the network without having the signal degrade, you
would use a
(A) resonance
(B) router
(C) gateway
(D) switch
(E) repeater
32. A repair for a known software bug, usually available at no charge on the internet, is called
Examrac
(A) version
(B) patch
(C) tutorial
e
(D) FAQ
(E) rectifier
33. URL stands for
(A) Universal Research List
(B) Universal Resource List
(C) Uniform Research Lis
(D) Uniform Research Locator
(E) Uniform Resource Locator
34. When data changes in multiple lists and all lists are not updated, this causes
(A) data redundancy
(B) information overload
(C) duplicate data
(D) data inconsistency
(E) data repetition
14
35. What is a backup?
(A) Restoring the information backup
(B) An exact copy of a system's information
(C) The ability to get a . system up and running in the event of a system crash or failure
(D) All of these
(E) None of these
36. The Internet is
(A) a large network of networks
(B) an internal communication system for a business
(C) a communication system for the Indian government
Examrac
(D) a communication system for some states of India
(E) a communication system for some cities of India
37. Computers that are portable and convenient for users who travel are known as
e
(A) supercomputers
(B) planners
(C) minicomputers
(D) file servers
(E) laptops
38. What is the storage area for e-mail messages called?
(A) A folder
(B) A mail box
(C) A directory
(D) The hard disk
(E) None of these
39. One advantage of dial-up Internet access is that
15
(A) it utilises broadband technology
(B) it is Indian
(C) it uses a router for security
(D) modem speeds are very fast
(E) it utilises existing telephone service
40. What is the process of copying software programs from secondary storage media to the
hard disk called?
(A) Configuration
(B) Download
(C) Storage
(D) Upload
Examrac
(E) Installation
41. When the pointer is positioned on a , it is shaped like a hand.
(A) grammar error
e
(B) Formatting error
(C) Screen Tip
(D) Spelling error
(E) hyperlink
42. Personal computers can be connected together to form a-
(A) server
(B) supercomputer
(C) network
(D) enterprise
(E) None of these
43. A is the term used when a search engine returns a Web page that matches the
search criteria.
(A) blog
16
(B) hit
(C) link
(D) view
(E) success
44. are words that a programming language has set aside for its own use.
(A) Control words
(B) Control structures
(C) Reserved words
(D) Reserved keys
(E) None of these
45. Mobile Commerce is best described as-
Examrac
(A) The use of Kiosks in marketing
(B) Transporting products
(C) Buying and selling goods/ services through wireless hand- held devices
e
(D) Using notebook PC's in marketing
(E) None of the above
46 Which of the following controls the manner of interaction between the user and the operating
system?
(A) Language translator
(B) Platform
(C) User interface
(D) Icon
(E) None of these
47 You can keep your personal files/folders in
(A) My Folder
(B) My Documents
17
(C) My Files
(D) My Text
(E) My Collection
48 Three types of compact disks include CD-ROM, CD-R, and
(A) CD-W
(B) CD-RAM
(C) CD-DVD
(D) CD-RW
(E) None of these
49 All computers must have
(A) a word processing software
(B) an operating system
Examrac
(C) an attached printer
(D) a virus checking program
(E) None of these
e
50 Collecting personal information and effectively posing as another individual is known as
(A) spooling
(B) spoofing
(C) hacking
(D) identity theft
(E) None of these
18
ANSWER SHEET
1 (C) 26 (A)
2 (D) 27 (B)
3 (B) 28 (C)
4 (B) 29 (A)
5 (C) 30 (C)
6 (C) 31 (E)
7 (A) 32 (B)
8 (E) 33 (E)
9 (A) 34 (D)
10 (D) 35 (D)
Examrac
11 (A) 36 (A)
12 (E) 37 (E)
13 (A) 38 (B)
14 (A) 39 (E)
15 (E) 40 (E)
e
16 (A) 41 (E)
17 (D) 42 (C)
18 (D) 43 (E)
19 (E) 44 (C)
20 (C) 45 (C)
21 (E) 46 (C)
22 (C) 47 (B)
23 (A) 48 (D)
24 (C) 49 (B)
25 (C) 50 (B)
19
12/19/23, 8:28 AM Operating System Official Questions: Mock Test: Answers, Solutions, & Explanations at Exampyq.Com & Doorsteptutor.Co…
Examrace: Downloaded from examrace.com
[https://www.examrace.com/] For solved question bank visit
doorsteptutor.com [https://www.doorsteptutor.com] and for free video
lectures visit Examrace YouTube Channel
[https://youtube.com/c/Examrace/]
Operating System Official Questions: Mock Test: Answers,
Solutions, & Explanations at ExamPYQ. Com &
DoorstepTutor. Com
Get top class preparation for competitive exams right from your home:
- for all subjects
of your exam.
Q 1. measure is the time from the submission of a request until the first output is produced.
a. Response time
b. Throughput
c. Waiting time
d. Turnaround time
Q 2. Which of the following is not a valid process state?
a. Ready
b. Hold
c. New
d. Running
Q 3. A state is known as , if the system allocates resources to each process and still avoids a
deadlock.
a. Safe
b. Protected
c. Unsafe
d. Locked
Q 4. is a situation in which processes wait indefinitely within the semaphore.
a. Locking
b. Critical section
c. Starvation
d. Definite waiting
Q 5. A process is a program that performs of execution.
a. At least four threads
b. Single thread
1 of 5
12/19/23, 8:28 AM Operating System Official Questions: Mock Test: Answers, Solutions, & Explanations at Exampyq.Com & Doorsteptutor.Co…
c. Parallel threads
d. Multiple threads
Q 6. In a file system, a (n) defines a path from the current directory.
a. Root directory
b. Relative path name
c. Virtual path name
d. Absolute path name
Q 7.
Consider the following set of processes and the length of the CPU burst given in ms. What is the average
waiting time using priority scheduling?
Process Burst-time Priority
P1 10 3
P2 1 1
P3 2 4
P4 1 5
P5 5 2
Table Supporting: Operating System Official Questions: Mock Test: Answers, Solutions, & Explanations at ExamPYQ. Com
&
DoorstepTutor. Com
a. 7.2 ms
b. 8.2 ms
c. 5.2 ms
d. 10 ms
Q 8. Details about each process is stored in a data structure called:
a. Process Control Block
b. Stack
c. Program counter
d. Heap
Q 9. Which of the following is a technique of gradually increasing the priority of processes that wait in
the system for a long time?
a. Scheduling
b. Aging
c. Dispatch latency
2 of 5
d. Starvati
on
Q 10.
How many page faults will occur if FIFO Page replacement algorithm is used for the following
reference string with three-page frames?
7, 0, 1, 2, 0, 3, 0, 4, 2, 3, 0, 3, 2, 1, 2, 0, 1,7, 0,1
a. 17
b. 14
c. 16
d. 15
Q 11. Which of the following conditions need to be held simultaneously for deadlock occurrences
a. Mutual Exclusion, Hold and Wait, No Preemption, and Circular Wait
b. Hold and Wait, No Preemption, and Circular Wait
c. Mutual Exclusion, No Preemption, and Circular Wait
d. Mutual Exclusion, Hold and Wait, and No Preemption
Q 12. One of the Scheduling method is also known as Shortest-next-CPU-burst algorithm, because
scheduling through this method depends on the length of the next CPU burst of a process rather than
its total length. Which of the following scheduling method is being discussed here?
a. SJF Scheduling
b. FCFS Scheduling
c. Round Robin Scheduling
d. Multilevel-queue
Scheduling
Q 13.
How many page faults will occur if Optimal Page replacement algorithm is used for the following
reference string with three page frames?
7, 0, 1, 2, 0, 3, 0, 4, 2, 3, 0, 3, 2, 1, 2, 0, 1,7, 0,1
a. 10
b. 7
c. 9
d. 8
Q
14.
Which of the following process of an operating system is shown in this figure?
a. Fundamental state transition
b. Scheduling of kernel level threads
c. Event handling action of kernel
d. Scheduling of user level threads
Q 15. An address generated by the CPU is known as address, and an address seen by
the memory unit is referred as address,
a. Physical, Logical
b. Logical, Virtual
c. Virtual, Logical
d. Logical, hysical
Q 16.
Consider the following statements regarding interrupts.
(I) If a process is interrupted during system call handling then the OS will crash.
(II) If a process is interrupted during system call handling then the process is moved to the
READY queue.
(III) If an interrupt handler is interrupted, the OS will crash.
While of the above statements are true?
a. None of the above
b. I and II
c. III only
d. II and III
Q 17. A is a program in execution.
a. Process
b. Stack
c. Program counter
d. Heap
Q 18. is generated when it is known at compile time that where the process resides in
memory.
a. Virtual code
b. Locatable code
c. Absolute code
d. Relocatable code
Q 19. semaphores are also known as locks, as they are locks that provide
mutual exclusion.
a. Counting, Shared
b. Counting, Mutex
c. Binary, Mutex
d. Binary, Shared
Q 20. The number of processes that are completed by a system per time unit, is called
.
a. Process output
b. Turnaround time
c. Throughput
d. Response time