Operating System MCQ Set 1
1. Which one of the following is not a secondary storage?
a) Magnetic disks
b) Magnetic tapes
c) RAM
d) None of the mentioned
Answer
Answer: c [Reason:] None.
2. Which private network uses storage protocol rather than networking protocol?
a) storage area network
b) local area network
c) wide area network
d) none of the mentioned
Answer
Answer: a [Reason:] None.
3. The time for the disk arm to move the heads to the cylinder containing the desired sector is called
a) disk time
b) seek time
c) arm time
d) sector time
Answer
Answer: b [Reason:] None.
4. Which algorithm of disk scheduling selects the request with the least seek time from the current head positions?
a) SSTF scheduling
b) FCFS scheduling
c) SCAN scheduling
d) LOOK scheduling
Answer
Answer: a [Reason:] None.
5. Operating system is responsible for
a) disk initialization
b) booting from disk
c) bad-block recovery
d) all of the mentioned
Answer
Answer: d [Reason:] None.
6. A swap space can reside in
a) Separate disk partition
b) RAM
c) Cache
d) None of the mentioned
Answer
Answer: a [Reason:] None.
7. RAID level 1 refers to
a) disk arrays with striping
b) disk mirroring
c) both disk arrays with striping and disk mirroring
d) none of the mentioned
Answer
Answer: b [Reason:] A variety of disk-organization techniques is called “redundant arrays of independent disks (RAID)”.
8. When we write something on the disk, which one of the following can not happen?
a) successful completion
b) partial failure
c) total failure
d) none of the mentioned
Answer
Answer: d [Reason:] None.
9. During recovery from a failure
a) each pair of physical block is examined
b) specified pair of physical block is examined
c) first pair of physical block is examined
d) none of the mentioned
Answer
Answer: a [Reason:] None.
10. The replacement of a bad block generally is not totally automatic because
a) data in bad block can not be replaced
b) data in bad block is usually lost
c) bad block does not contain any data
d) none of the mentioned
Answer
Answer: b [Reason:] None.
Operating System MCQ Set 2
1. When an attempt is to make a machine or network resource unavailable to its intended users, the attack is called
a) denial-of-service attack
b) slow read attack
c) spoofed attack
d) starvation attack
Answer
Answer: a [Reason:] None.
2. The code segment that misuses its environment is called a
a) internal thief
b) trojan horse
c) code stacker
d) none of the mentioned
Answer
Answer: b [Reason:] None.
3. The internal code of any software that will set of a malicious function when specified conditions are met, is called
a) logic bomb
b) trap door
c) code stacker
d) none of the mentioned
Answer
Answer: a [Reason:] None.
4. The pattern that can be used to identify a virus is known as
a) stealth
b) virus signature
c) armoured
d) multipartite
Answer
Answer: b [Reason:] None.
5. Which one of the following is a process that uses the spawn mechanism to revage the system performance?
a) worm
b) trojen
c) threat
d) virus
Answer
Answer: a [Reason:] None.
6. What is a trap door in a program?
a) a security hole, inserted at programming time in the system for later use
b) a type of antivirus
c) security hole in a network
d) none of the mentioned
Answer
Answer: a [Reason:] None.
7. Which one of the following is not an attack, but a search for vulnerabilities to attack?
a) denial of service
b) port scanning
c) memory access violation
d) dumpster diving
Answer
Answer: b [Reason:] None.
8. File virus attaches itself to the
a) source file
b) object file
c) executable file
d) all of the mentioned
Answer
Answer: c [Reason:] None.
9. Multipartite viruses attack on
a) files
b) boot sector
c) memory
d) all of the mentioned
Answer
Answer: d [Reason:] None.
10. In asymmetric encryption
a) same key is used for encryption and decryption
b) different keys are used encryption and decryption
c) no key is required for encryption and decryption
d) none of the mentioned
Answer
Answer: b [Reason:] None.
Operating System MCQ Set 3
1. Which one of the following is not shared by threads?
a) program counter
b) stack
c) both program counter and stack
d) none of the mentioned
Answer
Answer: c [Reason:] None.
2. A process can be
a) single threaded
b) multithreaded
c) both single threaded and multithreaded
d) none of the mentioned
Answer
Answer: c [Reason:] None.
3. If one thread opens a file with read privileges then
a) other threads in the another process can also read from that file
b) other threads in the same process can also read from that file
c) any other thread can not read from that file
d) all of the mentioned
Answer
Answer: b [Reason:] None.
4. The time required to create a new thread in an existing process is
a) greater than the time required to create a new process
c) less than the time required to create a new process
c) equal to the time required to create a new process
d) none of the mentioned
Answer
Answer: b [Reason:] None.
5. When the event for which a thread is blocked occurs,
a) thread moves to the ready queue
b) thread remains blocked
c) thread completes
d) a new thread is provided
Answer
Answer: a [Reason:] None.
6. The jacketing technique is used to
a) convert a blocking system call into nonblocking system call
b) create a new thread
c) communicate between threads
d) terminate a thread
Answer
Answer: a [Reason:] None.
7. Termination of the process terminates
a) first thread of the process
b) first two threads of the process
c) all threads within the process
d) no thread within the process
Answer
Answer: c [Reason:] None.
8. Which one of the following is not a valid state of a thread?
a) running
b) parsing
c) ready
d) blocked
Answer
Answer: b [Reason:] None.
9. The register context and stacks of a thread are deallocated when the thread
a) terminates
b) blocks
c) unblocks
d) spawns
Answer
Answer: a [Reason:] None.
10. Thread synchronization is required because
a) all threads of a process share the same address space
b) all threads of a process share the same global variables
c) all threads of a process can share the same files
d) all of the mentioned
Answer
Answer: d [Reason:] None.
Operating System MCQ Set 4
1. Because of virtual memory, the memory can be shared among
a) processes
b) threads
c) instructions
d) none of the mentioned
Answer
Answer: a [Reason:] None.
2. _____ is the concept in which a process is copied into main memory from the secondary memory according to the requirement.
a) Paging
b) Demand paging
c) Segmentation
d) Swapping
Answer
Answer: b [Reason:] None.
3. The pager concerns with the
a) individual page of a process
b) entire process
c) entire thread
d) first page of a process
Answer
Answer: a [Reason:] None.
4. Swap space exists in
a) primary memory
b) secondary memory
c) cpu
d) none of the mentioned
Answer
Answer: b [Reason:] None.
5. When a program tries to access a page that is mapped in address space but not loaded in physical memory, then
a) segmentation fault occurs
b) fatal error occurs
c) page fault occurs
d) no error occurs
Answer
Answer: c [Reason:] None.
6. Effective access time is directly proportional to
a) page-fault rate
b) hit ratio
c) memory access time
d) none of the mentioned
Answer
Answer: a [Reason:] None.
7. In FIFO page replacement algorithm, when a page must be replaced
a) oldest page is chosen
b) newest page is chosen
c) random page is chosen
d) none of the mentioned
Answer
Answer: a [Reason:] None.
8. Which algorithm chooses the page that has not been used for the longest period of time whenever the page required to be replaced?
a) first in first out algorithm
b) additional reference bit algorithm
c) least recently used algorithm
d) counting based page replacement algorithm
Answer
Answer: c [Reason:] None.
9. A process is thrashing if
a) it is spending more time paging than executing
b) it is spending less time paging than executing
c) page fault occurs
d) swapping can not take place
Answer
Answer: a [Reason:] None.
10. Working set model for page replacement is based on the assumption of
a) modularity
b) locality
c) globalization
d) random access
Answer
Answer: b [Reason:] None.