Operating System MCQ Set 1
1. What are the different ways in which clients and servers are dispersed across machines ?
a) Servers may not run on dedicated machines
b) Servers and clients can be on same machines
c) Distribution cannot be interposed between a OS and the file system
d) OS cannot be distributed with the file system a part of that distribution
Answer
Answer: b [Reason:] None.
2. What are not the characteristics of a DFS ?
a) login transparency and access transparency
b) Files need not contain information about their physical location
c) No Multiplicity of users
d) No Multiplicity if files
Answer
Answer: c [Reason:] None.
3. What are characteristic of a DFS ?
a) Fault tolerance
b) Scaleability
c) Heterogeneity of the system
d) Upgradation
Answer
Answer: d [Reason:] None.
4. What are the different ways file accesses take place ?
a) sequential access
b) direct access
c) indexed sequential access
d) all of the mentioned
Answer
Answer: d [Reason:] None.
5. Which is not a major components of file system ?
a) Directory service
b) Authorization service
c) Shadow service
d) System service
Answer
Answer: c [Reason:] None.
6. What are the different ways mounting of file system ?
a) boot mounting
b) auto mounting
c) explicit mounting
d) all of the mentioned
Answer
Answer: d [Reason:] None.
7. What is the advantage of caching in remote file access ?
a) Reduced network traffic by retaining recently accessed disk blocks
b) Faster network access
c) Copies of data creates backup automatically
d) None of the mentioned
Answer
Answer: a [Reason:] None.
8. What is networked virtual memory ?
a) Caching
b) Segmentation
c) RAM disk
d) None of the mentioned
Answer
Answer: a [Reason:] None.
9. What are examples of state information ?
a) opened files and their clients
b) file descriptors and file handles
c) current file position pointers
d) all of the mentioned
Answer
Answer: d [Reason:] None.
10. Which is not an examples of state information ?
a) Mounting information
b) Description of HDD space
c) Session keys
d) Lock status
Answer
Answer: b [Reason:] None.
Operating System MCQ Set 2
1. What are parts of network structure ?
a) Workstation
b) Gateway
c) Laptop
d) All of the mentioned
Answer
Answer: d [Reason:] None.
2. What are valid network topology ?
a) Multiaccess bus
b) Ring
c) Star
d) All of the mentioned
Answer
Answer: d [Reason:] None.
3. What are sites in network topology compared ?
a) Basic cost
b) Communication cost
c) Reliability
d) All of the mentioned
Answer
Answer: d [Reason:] None.
4. Which design features of a communication network are important ?
a) Naming and name resolution
b) Routing strategies
c) Connection strategies
d) All of the mentioned
Answer
Answer: d [Reason:] None.
5. What are characteristics of Naming and Name resolution ?
a) name systems in the network
b) address messages with the process-id
c) virtual circuit
d) message switching
Answer
Answer: b [Reason:] None.
6. What are routing strategies which is not used in distributed systems ?
a) Fixed routing
b) Token routing
c) Virtual circuit
d) Dynamic routing
Answer
Answer: c [Reason:] None.
7. What are connection strategies not used in distributed systems ?
a) Circuit switching
b) Message switching
c) Token switching
d) Packet switching
Answer
Answer: c [Reason:] None.
8. How is are collisions avoided in network ?
a) Carrier sense with multiple access (CSMA); collision detection (CD)
b) Carrier sense multiple access with collision avoidance
c) Message slots
d) All of the mentioned
Answer
Answer: d [Reason:] None.
9. What is common problem found in distributed system ?
a) Process Synchronization
b) Communication synchronization
c) Deadlock problem
d) Power failure
Answer
Answer: c [Reason:] None.
Operating System MCQ Set 3
1. How many layers does Internet model ISO consists of ?
a) Three
b) Five
c) Seven
d) Eight
Answer
Answer: c [Reason:] None.
2. Which layer is responsible for The process-to-process delivery ?
a) Network
b) Transport
c) Application
d) Physical
Answer
Answer: b [Reason:] None.
3. Which layer is the layer closest to the transmission medium ?
a) Physical
b) Data link
c) Network
d) Transport
Answer
Answer: a [Reason:] None.
4. Header are ______ when data packet moves from upper to the lower layers ?
a) Modified
b) Removed
c) Added
d) All of the mentioned
Answer
Answer: c [Reason:] None.
5. Which layer lies between transport layer and data link layer ?
a) Physical
b) Network
c) Application
d) Session
Answer
Answer: b [Reason:] None.
6. Which of the following is an application layer service ?
a) Mail service
b) File transfer
c) Remote access
d) All of the mentioned
Answer
Answer: d [Reason:] None.
7. What are different ways distributed may suffer ?
a) Failure of a link
b) Failure of a site
c) Loss of message
d) All of the mentioned
Answer
Answer: d [Reason:] None.
8. What are design issues in distributed system structure ?
a) Scaleability
b) Fault-tolerance
c) Clustering
d) All of the mentioned
Answer
Answer: d [Reason:] None.
9. In which OSI layer encryption and decryption happens ?
a) Application
b) Presentation
c) Transport
d) Data Link
Answer
Answer: b [Reason:] None.
10. What are important step followed when recovery from failure happens ?
a) Post repairing integration with main system should happen smoothly and gracefully
b) Upon link failure both parties at end must not be notified
c) Fault recovery system must me adjusted
d) Failures are logged systematically
Answer
Answer: a [Reason:] None.
Operating System MCQ Set 4
1. What is not true about distributed system ?
a) It is a collection of processor
b) All processors are synchronized
c) They do not share memory
d) None of the mentioned
Answer
Answer: b [Reason:] None.
2. What are characteristics of processor in distributed system ?
a) They vary in size and function
b) They are same in size and function
c) They are manufactured with single purpose
d) They are real-time devices
Answer
Answer: a [Reason:] None.
3. What are characteristics of distributed file system ?
a) Its users, servers and storage devices are dispersed
b) Service activity is not carried out across the network
c) They have single centralized data repository
d) There are multiple dependent storage devices
Answer
Answer: a [Reason:] None.
4. What is not a major reason for building distributed systems ?
a) Resource sharing
b) Computation speedup
c) Reliability
d) Simplicity
Answer
Answer: d [Reason:] None.
5. What are types of distributed operating system ?
a) Network Operating system
b) Zone based Operating system
c) Level based Operating system
d) All of the mentioned
Answer
Answer: a [Reason:] None.
6. What are characteristic of Network Operating Systems ?
a) Users are aware of multiplicity of machines
b) They are transparent
c) They are simple to use
d) All of the mentioned
Answer
Answer: a [Reason:] None.
7. How are access to resources of various machines is done ?
a) Remote logging using ssh or telnet
b) Zone are configured for automatic access
c) FTP is not used
d) All of the mentioned
Answer
Answer: a [Reason:] None.
8. What are characteristics of Distributed Operating system ?
a) Users are aware of multiplicity of machines
b) Access is done like local resources
c) Users are aware of multiplicity of machines
d) They have multiple zones to access files
Answer
Answer: b [Reason:] None.
9. What are characteristics of data migration ?
a) transfer data by entire file or immediate portion required
b) transfer the computation rather than the data
c) execute an entire process or parts of it at different sites
d) none of the mentioned
Answer
Answer: a [Reason:] None.
10. What are characteristics of computation migration ?
a) transfer data by entire file or immediate portion required
b) transfer the computation rather than the data
c) execute an entire process or parts of it at different sites
d) none of the mentioned
Answer
Answer: b [Reason:] None.
11. What are characteristics of process migration ?
a) transfer data by entire file or immediate portion required
b) transfer the computation rather than the data
c) execute an entire process or parts of it at different sites
d) none of the mentioned
Answer
Answer: c [Reason:] None.
Operating System MCQ Set 5
1. What are the characteristics of tightly coupled system ?
i) Same clock, usually shared memory
ii) Communication is via this shared memory
iii) Multiprocessors
iv) Different clock
a) i
b) i, ii and ii
c) ii and iii
d) i, iii and iv
Answer
Answer : b [Reason:] None.
2. What are the characteristics of tightly coupled system ?
i) Different clock
ii) Use communication links
iii) Same clock
iv) Distributed systems
a) i
b) i and iv
c) i, ii and iii
d) ii, iii and iv
Answer
Answer : d [Reason:] None.
3. What are the characteristics of mutual exclusion using centralized approach ?
a) One processor as coordinator which handles all requests
b) It requires request,reply and release per critical section entry
c) The method is free from starvation
d) All of the mentioned
Answer
Answer : d [Reason:] None.
4. What are the characteristics of fully distributed approach ?
i) When responses are received from all processes, then process can enter its Critical Section
ii) When process exits its critical section, the process sends reply messages to all its deferred requests.
iii) It requires request,reply and release per critical section entry
iv) One processor as coordinator which handles all requests
a) i
b) i and ii
c) ii and iii
d) iii and iv
Answer
Answer : b [Reason:] None.
5. What are the advantages of token(with rings) passing approach ?
i) One processor as coordinator which handles all requests
ii) No starvation if the ring is unidirectional
iii) There are many messages passed per section entered if few users want to get in section
iv) One processor as coordinator which handles all requests
v) Only one message/entry if everyone wants to get in
a) i
b) ii and iii
c) i, ii and iii
d) i, ii and iv
Answer
Answer : d [Reason:] None.
6. What is the characteristics of atomicity ?
a) All operations associated are executed to completion or none are performed
b) One processor as coordinator which handles all requests
c) When responses are received from all processes, then process can enter its Critical Section
d) Use communication links
Answer
Answer : a [Reason:] None.
7. What things are transaction coordinator is responsible for ?
a) Starting the execution of the transaction
b) Breaking transaction into a number of subtransactions
c) Coordinating the termination of the transaction
d) All of the mentioned
Answer
Answer : d [Reason:] None.
8. Single coordinator approach has the following advantages :
a) Simple implementation
b) Simple deadlock handling
c) bottleneck
d) All of the mentioned
Answer
Answer : d [Reason:] None.
9. Single coordinator approach has the following disadvantages :
a) Bottleneck
b) Slow response
c) Deadlock
d) One request per second
Answer
Answer : a [Reason:] None.
10. What are the disadvantages of majority protocol ?
a) Complicated implementation
b) Deadlock cannot occur easily
c) Bottleneck
d) All of the mentioned
Answer
Answer : a [Reason:] None.
11. What are the parts of global unique identifier ?
a) Local unique time stamp
b) Remote time stamp
c) Clock number
d) All of the mentioned
Answer
Answer : a [Reason:] None.
12. Which are the two complementary deadlock-prevention schemes using time stamps ?
a) The wait-die & wound-wait scheme
b) The wait-n-watch scheme
c) The wound-wait scheme
d) The wait-wound & wound-wait scheme
Answer
Answer : a [Reason:] None.
Operating System MCQ Set 6
1. If one or more devices use a common set of wires to communicate with the computer system, the connection is called ______
a) CPU
b) Monitor
c) Wirefull
d) Bus
Answer
Answer: d [Reason:] None.
2. A ____ a set of wires and a rigidly defined protocol that specifies a set of messages that can be sent on the wires.
a) port
b) node
c) bus
d) none of the mentioned
Answer
Answer: c [Reason:] None.
3. When device A has a cable that plugs into device B, and device B has a cable that plugs into device C and device C plugs into a port on the computer, this arrangement is called a ___
a) port
b) daisy chain
c) bus
d) cable
Answer
Answer: b [Reason:] None.
4. The ___ present a uniform device-access interface to the I/O subsystem, much as system calls provide a standard interface between the application and the operating system.
a) Devices
b) Buses
c) Device drivers
d) I/O systems
Answer
Answer: c [Reason:] None.
5. A ________ is a collection of electronics that can operate a port, a bus, or a device.
a) controller
b) driver
c) host
d) bus
Answer
Answer: a [Reason:] None.
6. An I/O port typically consists of four registers status, control, ________ and ________ registers.
a) system in, system out
b) data in, data out
c) flow in, flow out
d) input, output
Answer
Answer: b [Reason:] None.
7. The ______ register is read by the host to get input.
a) flow in
b) flow out
c) data in
d) data out
Answer
Answer: c [Reason:] None.
8. The ______ register is written by the host to send output.
a) status
b) control
c) data in
d) data out
Answer
Answer: d [Reason:] None.
9. The hardware mechanism that allows a device to notify the CPU is called _______
a) polling
b) interrupt
c) driver
d) controlling
Answer
Answer: b [Reason:] None.
10. The CPU hardware has a wire called ____ that the CPU senses after executing every instruction.
a) interrupt request line
b) interrupt bus
c) interrupt receive line
d) interrupt sense line
Answer
Answer: a [Reason:] None.
11. The ___ determines the cause of the interrupt, performs the necessary processing and executes a return from the interrupt instruction to return the CPU to the execution state prior to the interrupt.
a) interrupt request line
b) device driver
c) interrupt handler
d) all of the mentioned
Answer
Answer: c [Reason:] None.
12. In general the two interrupt request lines are :
a) maskable & nonmaskable interrupts
b) blocked & nonmaskable interrupts
c) maskable & blocked interrupts
d) none of the mentioned
Answer
Answer: a [Reason:] None.
13. The ___ are reserved for events such as unrecoverable memory errors.
a) nonmaskable interrupts
b) blocked interrupts
c) maskable interrupts
d) none of the mentioned
Answer
Answer: a [Reason:] None.