0% found this document useful (0 votes)
81 views

Operating Systems multiple choice questions

Operating System McQ for CSE 2024_25

Uploaded by

dipu0691
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
81 views

Operating Systems multiple choice questions

Operating System McQ for CSE 2024_25

Uploaded by

dipu0691
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

1

1. ___ is a compromise mode between Shut Down and Sleep mode because it does not consume power and remembers the
current state of your desktop

Shut Down

Restart

Sleep

Hibernate

2. Which of the following is not a mode in starting Windows?

Command Prompt

Safe Mode

Normal Mode

Turbo Mode

3. Which of the following statement about directories is false?

Directories can exist inside directories

The root directory is always at the highest level

Directories cannot be renamed

Directories can be deleted

4. The modern keyboard typically has __________ Function keys.

10

12

14

16

5. Which command is used to copy the contents of one disk to another

Diskcopy

Delete

Copy con

Ctrl + Alt

6. User action such as keystroke or mouse click are referred to as

Interrupt

Tasks

Processes

Event

7. Which command will divide the surface of the blank floppy disk into sector and assign a unique address to each
one?

Ver

Format
2

FAT

CHKDSK

8. The operating feature that integrates the file created in different application into WebPages

Web integration

Internet integration

Intranet integration

Hypertext integration

9. A tiny dot of light on the monitor is called

Silicon chip

Optical illusion

Icon

Pixel

10. Page stealing

Is a sign of an efficient system

Is taking page frame from other working sets

Should be the turning goal

Is taking layer disk space for page in page out

11. Which of the following does not occur during the power-on-self-test (POST)?

The scandisk utility begins to run

The video card and video memory are tested

The BIOS identification process occurs

Memory chip are checked to ensure that they are working properly

12. The … operating system was initially created in the early 1970s at AT and T’s Bell Labs

Linux

DOS

Unix

GNU

13. The …. displays the name of every computer user on the computer

Wish list screen

Command screen

Welcome screen

None of the above

14. An entire path name, consisting of several sub-directory name can contain up to

13 character
3

36 character

63 character

53 character

15. Which is not a valid property for attribute setting?

16. To install the new font

Start -> setting -> control panel -> font

Start -> setting -> control panel -> font -> install new font

Start -> control panel -> font -> install new font

Start -> setting -> font

17. The necessary conditions needed before deadlock can occur?

No Mutual Exclusion, Hold and wait, Preemption, Circular Wait

Mutual Exclusion, No Hold and wait, Preemption, Circular Wait

Mutual Exclusion, Hold and wait, No Preemption, Circular Wait

Mutual Exclusion, Hold and wait, Preemption, No Circular Wait

18. Windows can run

One application only

Two applications only

Four applications only

All of above

19. … interface consists of thing like program counter, register, interrupts and terminal

Hardware

Software

Data

None

20. A bar that inform you the available options in your computer, opened applications, background running
applications and can be used to switch between applications quickly is

Menu bar

Tool bar

Status bar

Task bar
4

1. What is an operating system?


a) interface between the hardware and application programs
b) collection of programs that manages hardware resources
c) system service provider to the application programs
d) all of the mentioned
View Answer

2. What is the main function of the command interpreter?


a) to provide the interface between the API and application program
b) to handle the files in the operating system
c) to get and execute the next user-specified command
d) none of the mentioned
View Answer

3. In Operating Systems, which of the following is/are CPU scheduling algorithms?


a) Priority
b) Round Robin
c) Shortest Job First
d) All of the mentioned
View Answer

4. To access the services of the operating system, the interface is provided by the ___________
a) Library
b) System calls
c) Assembly instructions
d) API
View Answer

5. CPU scheduling is the basis of ___________


a) multiprogramming operating systems
b) larger memory sized systems
c) multiprocessor systems
d) none of the mentioned
View Answer

advertisement

6. Which one of the following is not true?


a) kernel remains in the memory during the entire computer session
b) kernel is made of various modules which can not be loaded in running operating system
c) kernel is the first part of the operating system to load into memory during booting
d) kernel is the program that constitutes the central core of the operating system
View Answer

7. Which one of the following errors will be handle by the operating system?
a) lack of paper in printer
b) connection failure in the network
c) power failure
d) all of the mentioned
View Answer

8. Where is the operating system placed in the memory?


a) either low or high memory (depending on the location of interrupt vector)
b) in the low memory
c) in the high memory
5

d) none of the mentioned


View Answer

9. If a process fails, most operating system write the error information to a ______
a) new file
b) another running process
c) log file
d) none of the mentioned
View Answer

10. Which one of the following is not a real time operating system?
a) RTLinux
b) Palm OS
c) QNX
d) VxWorks
View Answer

11. What does OS X has?


a) monolithic kernel with modules
b) microkernel
c) monolithic kernel
d) hybrid kernel
View Answer

12. In operating system, each process has its own __________


a) open files
b) pending alarms, signals, and signal handlers
c) address space and global variables
d) all of the mentioned
View Answer

13. In a timeshare operating system, when the time slot assigned to a process is completed, the process switches
from the current state to?
a) Suspended state
b) Terminated state
c) Ready state
d) Blocked state
View Answer

14. Cascading termination refers to the termination of all child processes if the parent process terminates ______
a) Normally or abnormally
b) Abnormally
c) Normally
d) None of the mentioned
View Answer

15. When a process is in a “Blocked” state waiting for some I/O service. When the service is completed, it goes to the
__________
a) Terminated state
b) Suspended state
c) Running state
d) Ready state
View Answer

16. Transient operating system code is a code that ____________


a) stays in the memory always
6

b) never enters the memory space


c) comes and goes as needed
d) is not easily accessible
View Answer

17. The portion of the process scheduler in an operating system that dispatches processes is concerned with
____________
a) assigning ready processes to waiting queue
b) assigning running processes to blocked queue
c) assigning ready processes to CPU
d) all of the mentioned
View Answer

18. The FCFS algorithm is particularly troublesome for ____________


a) operating systems
b) multiprocessor systems
c) time sharing systems
d) multiprogramming systems
View Answer

19. For an effective operating system, when to check for deadlock?


a) every time a resource request is made at fixed time intervals
b) at fixed time intervals
c) every time a resource request is made
d) none of the mentioned
View Answer

20. A deadlock avoidance algorithm dynamically examines the __________ to ensure that a circular wait condition
can never exist.
a) operating system
b) resources
c) system storage state
d) resource allocation state
View Answer

21. Swapping _______ be done when a process has pending I/O, or has to execute I/O operations only into operating
system buffers.
a) must never
b) maybe
c) can
d) must
View Answer

22. The main memory accommodates ____________


a) cpu
b) user processes
c) operating system
d) all of the mentioned
View Answer

23. The operating system is responsible for?


a) bad-block recovery
b) booting from disk
c) disk initialization
d) all of the mentioned
View Answer
7

24. The operating system and the other processes are protected from being modified by an already running process
because ____________
a) every address generated by the CPU is being checked against the relocation and limit registers
b) they have a protection algorithm
c) they are in different memory spaces
d) they are in different logical addresses
View Answer

25. Using transient code, _______ the size of the operating system during program execution.
a) maintains
b) changes
c) increases
d) decreases
View Answer

26. The operating system maintains a ______ table that keeps track of how many frames have been allocated, how
many are there, and how many are available.
a) memory
b) mapping
c) page
d) frame
View Answer

27. To obtain better memory utilization, dynamic loading is used. With dynamic loading, a routine is not loaded until
it is called. For implementing dynamic loading ____________
a) special support from operating system is essential
b) special support from hardware is required
c) user programs can implement dynamic loading without any special support from hardware or operating system
d) special support from both hardware and operating system is essential
View Answer

28. The _________ presents a uniform device-access interface to the I/O subsystem, much as system calls provide a
standard interface between the application and the operating system.
a) Device drivers
b) I/O systems
c) Devices
d) Buses
View Answer

29. In real time operating system ____________


a) process scheduling can be done only once
b) all processes have the same priority
c) kernel is not required
d) a task must be serviced by its deadline period
View Answer

30. Hard real time operating system has ______________ jitter than a soft real time operating system.
a) equal
b) more
c) less
d) none of the mentioned
View Answer

31. For real time operating systems, interrupt latency should be ____________
a) zero
b) minimal
8

c) maximum
d) dependent on the scheduling
View Answer

32. Which one of the following is a real time operating system?


a) Windows CE
b) RTLinux
c) VxWorks
d) All of the mentioned
View Answer

33. The priority of a process will ______________ if the scheduler assigns it a static priority.
a) depends on the operating system
b) change
c) remain unchanged
d) none of the mentioned
View Answer

34. What are the characteristics of Host based IDS?


a) Logs are analysed to detect tails of intrusion
b) The host operating system logs in the audit information
c) Logs includes logins, file opens, and program executions
d) All of the mentioned

35. What are the characteristics of stack based IDS?


a) It is programmed to interpret a certain series of packets
b) It models the normal usage of the network as a noise characterization
c) They are integrated closely with the TCP/IP stack and watch packets
d) The host operating system logs in the audit information
View Answer

36. If the sum of the working – set sizes increases, exceeding the total number of available frames ____________
a) the operating system selects a process to suspend
b) the system crashes
c) then the process crashes
d) the memory overflows
View Answer

37. The information about all files is kept in ____________


a) operating system
b) separate directory structure
c) swap space
d) none of the mentioned
View Answer

38. The operating system keeps a small table containing information about all open files called ____________
a) file table
b) directory table
c) open-file table
d) system table
View Answer

39. What will happen in the single level directory?


a) All files are contained in the same directory
b) All files are contained in different directories all at the same level
9

c) Depends on the operating system


d) None of the mentioned
View Answer

40. The operating system _______ the links when traversing directory trees, to preserve the acyclic structure of the
system.
a) deletes
b) considers
c) ignores
d) none of the mentioned
View Answer

41. To recover from failures in the network operations _____________ information may be maintained.
a) operating system
b) ip address
c) stateless
d) state
View Answer

42. On systems where there are multiple operating system, the decision to load a particular one is done by
_____________
a) process control block
b) file control block
c) boot loader
d) bootstrap
View Answer

43. Whenever a process needs I/O to or from a disk it issues a ______________


a) system call to the operating system
b) a special procedure
c) system call to the CPU
d) all of the mentioned
View Answer

44. The two steps the operating system takes to use a disk to hold its files are _______ and ________
a) caching & logical formatting
b) logical formatting & swap space creation
c) swap space creation & caching
d) partitioning & logical formatting
View Answer

45. The _______ program initializes all aspects of the system, from CPU registers to device controllers and the
contents of main memory, and then starts the operating system.
a) bootstrap
b) main
c) bootloader
d) rom
View Answer

46. In SCSI disks used in high end PCs, the controller maintains a list of _________ on the disk. The disk is initialized
during ________ formatting which sets aside spare sectors not visible to the operating system.
a) destroyed blocks, partitioning
b) bad blocks, low level formatting
c) destroyed blocks, high level formatting
d) bad blocks, partitioning
View Answer
10

47. Which principle states that programs, users, and even the systems be given just enough privileges to perform
their task?
a) principle of least privilege
b) principle of process scheduling
c) principle of operating system
d) none of the mentioned
View Answer

48. Network operating system runs on ___________


a) every system in the network
b) server
c) both server and every system in the network
d) none of the mentioned
View Answer

49. What are the types of distributed operating systems?


a) Zone based Operating system
b) Level based Operating system
c) Network Operating system
d) All of the mentioned
View Answer

50. In Unix, which system call creates the new process?


a) create
b) fork
c) new
d) none of the mentioned
View Answer

You might also like