Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages
Filter by Categories
nmims post
Objective Type Set
Online MCQ Assignment
Question Solution
Solved Question
Uncategorized

Operating System MCQ Set 1

1. Reliability of files can be increased by :
a) keeping the files safely in the memory
b) making a different partition for the files
c) by keeping them in external storage
d) by keeping duplicate copies of the file

View Answer

Answer: d [Reason:] None.

2. Protection is only provided at the _____ level.
a) lower
b) central
c) higher
d) none of the mentioned

View Answer

Answer: a [Reason:] None.

3. The main problem with access control lists is :
a) their maintenance
b) their length
c) their permissions
d) all of the mentioned

View Answer

Answer: b [Reason:] None.

4. Many systems recognize three classifications of users in connection with each file (to condense the access control list) :
a) Owner
b) Group
c) Universe
d) All of the mentioned

View Answer

Answer: d [Reason:] None.

5. All users in a group get _______ access to a file.
a) different
b) similar
c) same
c) none of the mentioned

View Answer

Answer: b [Reason:] None.

6. Universe consists of :
a) all users that arent included in the group or owners
b) all users that are not owners
c) all users in the system
d) none of the mentioned

View Answer

Answer: c [Reason:] None.

7. In UNIX, groups can be created and modified by :
a) superuser
b) any user
c) a programmer only
d) the people in the group only

View Answer

Answer: a [Reason:] None.

8. To control access the three bits used in UNIX are represented by :
a) r
b) w
c) x
d) all of the mentioned

View Answer

Answer: d [Reason:] None.

9. If each access to a file is controlled by a password, then the disadvantage is that :
a) user will need to remember a lot of passwords
b) it is not reliable
c) it is not efficient
d) all of the mentioned

View Answer

Answer: a [Reason:] None.

10. In a multilevel directory structure :
a) the same previous techniques will be used as in the other structures
b) a mechanism for directory protection will have to applied
c) the subdirectories do not need protection once the directory is protected
d) none of the mentioned

View Answer

Answer: b [Reason:] None.

11. In UNIX, the directory protection is handled ___ to the file protection.
a) different
b) similar
c) it is not handled at all
d) none of the mentioned

View Answer

Answer: b [Reason:] None.

12. Disks are segmented into one or more partitions, each containing a file system or ______
a) left ‘raw’
b) made into swap space
c) made into backup space
d) left ‘ripe’

View Answer

Answer: a [Reason:] None.

Operating System MCQ Set 2

1. Some directory information is kept in main memory or cache to _____
a) fill up the cache
b) increase free space in secondary storage
c) decrease free space in secondary storage
d) speed up access

View Answer

Answer: d [Reason:] None.

2. A systems program such as fsck in ______ is a consistency checker.
a) UNIX
b) Windows
c) Macintosh
d) Solaris

View Answer

Answer: a [Reason:] None.

3. A consistency checker ______ and tries to fix any inconsistencies it finds.
a) compares the data in the secondary storage with the data in the cache
b) compares the data in the directory structure with the data blocks on disk
c) compares the system generated output and user required output
d) all of the mentioned

View Answer

Answer: b [Reason:] None.

4. Each set of operations for performing a specific task is a ___
a) program
b) code
c) transaction
d) all of the mentioned

View Answer

Answer: c [Reason:] None.

5. Once the changes are written to the log, they are considered to be ________
a) committed
b) aborted
c) completed
d) none of the mentioned

View Answer

Answer: a [Reason:] None.

6. When an entire committed transaction is completed, _____
a) it is stored in the memory
b) it is removed from the log file
c) it is redone
d) none of the mentioned

View Answer

Answer: b [Reason:] None.

7. A circular buffer :
a) writes to the end of its space and then continues at the beginning
b) overwrites older values as it goes
c) all of the mentioned
d) none of the mentioned

View Answer

Answer: a [Reason:] None.

8. All the changes that were done from a transaction that did not commit before the system crashed, have to be ___
a) saved
b) saved and the transaction redone
c) undone
d) none of the mentioned

View Answer

Answer: c [Reason:] None.

Operating System MCQ Set 3

1. Inter process communication :
a) allows processes to communicate and synchronize their actions when using the same address space
b) allows processes to communicate and synchronize their actions without using the same address space
c) allows the processes to only synchronize their actions without communication
d) none of the mentioned

View Answer

Answer: b [Reason:] None.

2. Message passing system allows processes to :
a) communicate with one another without resorting to shared data
b) communicate with one another by resorting to shared data
c) share data
d) name the recipient or sender of the message

View Answer

Answer: a [Reason:] None.

3. An IPC facility provides atleast two operations :
a) write & delete message
b) delete & receive message
c) send & delete message
d) receive & send message

View Answer

Answer: d [Reason:] None.

4. Messages sent by a process :
a) have to be of a fixed size
b) have to be a variable size
c) can be fixed or variable sized
d) None of the mentioned

View Answer

Answer: c [Reason:] None.

5. The link between two processes P and Q to send and receive messages is called :
a) communication link
b) message-passing link
c) synchronization link
d) all of the mentioned

View Answer

Answer: a [Reason:] None.

6. Which of the following are TRUE for direct communication :
a) A communication link can be associated with N number of process(N = max. number of processes supported by system)
b) A communication link can be associated with exactly two processes
c) Exactly N/2 links exist between each pair of processes(N = max. number of processes supported by system)
d) Exactly two link exists between each pair of processes

View Answer

Answer: b [Reason:] None.

7. In indirect communication between processes P and Q :
a) there is another process R to handle and pass on the messages between P and Q
b) there is another machine between the two processes to help communication
c) there is a mailbox to help communication between P and Q
d) none of the mentioned

View Answer

Answer: c [Reason:] None.

8. In the non blocking send :
a) the sending process keeps sending until the message is received
b) the sending process sends the message and resumes operation
c) the sending process keeps sending until it receives a message
d) none of the mentioned

View Answer

Answer: b [Reason:] None.

9. In the Zero capacity queue :
a) the queue can store at least one message
b) the sender blocks until the receiver receives the message
c) the sender keeps sending and the messages dont wait in the queue
d) none of the mentioned

View Answer

Answer: b [Reason:] None.

10. The Zero Capacity queue :
a) is referred to as a message system with buffering
b) is referred to as a message system with no buffering
c) is referred to as a link
d) none of the mentioned

View Answer

Answer: b [Reason:] None.

11. Bounded capacity and Unbounded capacity queues are referred to as :
a) Programmed buffering
b) Automatic buffering
c) User defined buffering
d) No buffering

View Answer

Answer: b [Reason:] None.

Operating System MCQ Set 4

1. Buffering is done to :
a) cope with device speed mismatch
b) cope with device transfer size mismatch
c) maintain copy semantics
d) all of the mentioned

View Answer

Answer: d [Reason:] None.

2. Caching is ________ spooling.
a) same as
b) not the same as
c) all of the mentioned
d) none of the mentioned

View Answer

Answer: b [Reason:] None.

3. Caching :
a) holds a copy of the data
b) is fast memory
c) holds the only copy of the data
d) holds output for a device

View Answer

Answer: a [Reason:] None.

4. Spooling :
a) holds a copy of the data
b) is fast memory
c) holds the only copy of the data
d) holds output for a device

View Answer

Answer: c [Reason:] None.

5. The ________ keeps state information about the use of I/O components.
a) CPU
b) OS
c) kernel
d) shell

View Answer

Answer: c [Reason:] None.

6. The kernel data structures include :
a) process table
b) open file table
c) close file table
d) all of the mentioned

View Answer

Answer: b [Reason:] None.

7. Windows NT uses a ____ implementation for I/O
a) message – passing
b) draft – passing
c) secondary memory
d) cache

View Answer

Answer: a [Reason:] None.

8. A ________ is a full duplex connection between a device driver and a user level process.
a) Bus
b) I/O operation
c) Stream
d) Flow

View Answer

Answer: c [Reason:] None.

9. I/O is a ___ in system performance.
a) major factor
b) minor factor
c) does not matter
d) none of the mentioned

View Answer

Answer: a [Reason:] None.

10. If the number of cycles spent busy – waiting is not excessive, then :
a) interrupt driven I/O is more efficient than programmed I/O
b) programmed I/O is more efficient than interrupt driven I/O
c) both programmed and interrupt driven I/O are equally efficient
d) none of the mentioned

View Answer

Answer: b [Reason:] None.

Operating System MCQ Set 5

1. RAID level 3 supports a lower number of I/Os per second, because ___
a) Every disk has to participate in every I/O request
b) Only one disk participates per I/O request
c) I/O cycle consumes a lot of CPU time
d) All of the mentioned

View Answer

Answer: a [Reason:] None.

2. RAID level _____ is also known as block interleaved parity organisation and uses block level striping and keeps a parity block on a separate disk.
a) 1
b) 2
c) 3
d) 4

View Answer

Answer: d [Reason:] None.

3. A performance problem with ___ is the expense of computing and writing parity.
a) non-parity based RAID levels
b) parity based RAID levels
c) all RAID levels
d) none of the mentioned

View Answer

Answer: b [Reason:] None.

4. In RAID level 4, one block read, accesses ____
a) only one disk
b) all disks simultaneously
c) all disks sequentially
d) none of the mentioned

View Answer

Answer: a [Reason:] Other requests are allowed to be processed by other disks.

5. The overall I/O rate in RAID level 4 is :
a) low
b) very low
c) high
d) none of the mentioned

View Answer

Answer: c [Reason:] All disks can be read in parallel.

6. A write of a block has to access :
a) the disk on which the block is stored
b) parity disk
c) a parity block
d) all of the mentioned

View Answer

Answer: d [Reason:] None.

7. RAID level 5 is also known as :
a) bit-interleaved parity organization
b) block-interleaved parity organization
c) block-interleaved distributed parity
d) memory-style ECC organization

View Answer

Answer: c [Reason:] None.

8. RAID level ____ spreads parity and data among all N+1 disks rather than storing data in N disks and parity in 1.
a) 3
b) 4
c) 5
d) 6

View Answer

Answer: c [Reason:] None.

9. The potential overuse of a single parity disk is avoided in RAID level _______
a) 3
b) 4
c) 5
d) all of the mentioned

View Answer

Answer: c [Reason:] None.

10. RAID level 0+1 is used because, RAID level 0 provides ______ whereas RAID level 1 provides ________
a) performance, redundancy
b) performance, reliability
c) redundancy, performance
d) none of the mentioned

View Answer

Answer: b [Reason:] None.

11. If a disk fails in RAID level ___ rebuilding lost data is easiest.
a) 1
b) 2
c) 3
d) 4

View Answer

Answer: a [Reason:] Data can be copied from another disk in raid level 1, for other raid levels all other disks have to be accessed.

12. Where performance and reliability are both important, RAID level ____ is used.
a) 0
b) 1
c) 2
d) 0+1

View Answer

Answer:d [Reason:] None.

.woocommerce-message { background-color: #98C391 !important; }