Operating System MCQ
Computer Science B.sc Ist year
Semester II paper V
Dr. Baba Saheb Ambedkar Marathwada University, Aurangabad
operating system computer science bsc Ist year semester II paper V
Quiz
- What is the swap space in the disk used for?
- Saving temporary html pages
- Saving process data
- Storing the super-block
- Storing device
- Increasing the RAM of a computer typically improves performance because
- Virtual memory increases
- Larger RAMs are faster
- Fewer page faults occur
- Fewer segmentation faults occur
- More than one word are put in one chache block to
- Exploit the temporal locality of reference in a program
- Exploit the spatial locality of reference in a program
- Reduce the miss penalty
- None of the above
- Which of the following statements is false?
- Virtual memory implements the translation of a program’s address space into physical memory address space
- Virtual memory allows each program to exceed the size of the primary memory
- Virtual memory increases the degree of multiprogramming
- Virtual memory reduces the context switching overhead
- Which of the following requires a device driver?
- Register
- Chache
- Main memory
- Disk
- Which of the following is NOT a valid deadlock prevention scheme?
- Release all resource before requesting a new resource
- Number the resources uniquely and never request a lower numbered resource than the last one requested
- Never request a resource after releasing any resource
- Request and all required resources be allocated before execution
- Which of the following is NOT a valid deadlock prevention scheme?
- Release all resources before requesting a new resource
- Number the resources uniquely and never request a lower numbered resource than the last one requested.
- Never request a resource after releasing any resource
- Request and all required resources be allocated before execution
- Normally user programs are prevented from handling I/0 directly by I/0 instruction in them. For CPUs having explicit I/0 instructions, such I/0 protection is ensured by having the I/0 instructions privileged. In a CPU with memory mapped I/0, there is no explicit I/0 instruction. Which one of the following is true for a CPU with memory mapped I/0?
- I/0 protection is ensured by operating system routine
- I/0 protection is ensured by a hardware trap
- I/0 protection is ensured during system configuration
- I/0 protection is not possible
- What is the swap space in the disk used for?
- Saving temporary html pages
- Saving process data
- Storing the super-block
- Storing device drives
- Increasing the RAM of a computer typically improves performance because:
- Virtual memory increases
- Larger RAMs are faster
- Fewer page faults occur
- None of these
- Which of the following is not a system tool?
- Scandisk
- Drive space
- Backup
- Skin disk
- Which program would you use to create copies of important information stored on your fixed disk drive?
- Scan disk
- Copy disk
- Backup
- None of above
- Which of the following is not an advantage of open source operating system over proprietary version?
- Free to use and distribution
- Availability of technical support
- Availability of source code
- Ability to modify code
- DOS uses a special batch file named?
- Autoexec.bat
- Autoexe.bat
- Autoexecute.bat
- Auto.bat
- Where can you define the permanent path for DOS?
- Io.sys
- Config.sys
- Autoexec.sys
- Command .com
- What should be the extension to execute automatically when OS is started?
- Command.com
- Any batch file
- Autoexec.bat
- Config.sys
- Where you can define permanent path in DOS?
- I0.sys
- Config.sys
- Autoexec.bat
- Command.com
- Which file keeps command to execute automatically when OS is started?
- Command.com
- Config.sys
- Autoexec.bat
- Command.com
- Which of the following is a correct association between a vendor and an operating system
- Redhat Linux
- Microsoft Unix
- AT & DOS
- Novell Linux
- ……..controls the way in which the computer system functions and provides a means by which users can interact with the computer
- The platform
- The operating system
- Application software
- The motherboard
- Which one of the following is not a layer of the operating system?
- Kernel
- Shell
- Application program
- Critical selection
- Which is not the function of the operating system?
- Memory management
- Disk management
- Application management
- Virus protection
- Which is not the function of the operating system?
- Memory management
- Disk management
- Application management
- Virus protection
- The virtual memory is
- An extremely large main memory
- An extremely large secondary memory
- An illusion of extremely large main memory
- A type of memory used in super computer
- Internet explorer is
- An internet browser
- Provided by windows OS
- An access point for word wide web
- All of the above
- Which of the following command is used to close the active window?
- Ctrl+F4
- Ctrl+F5
- Alt+F6
- None of the above
- The shortcut key is used to open properties window of selected item is
- Ctrl+Enter
- Shift+Enter
- Alt+Enter
- None of above
- The shortcut key is used to open a task manager is:
- Alt+F1
- Alt+Ctrl+Delete
- Alt+Tab
- F1
- The collection of processes on the disk that is waiting to be brought into memory for execution forms the------
- Ready queue
- Device queue
- Input queue
- Priority queue
- Demand paged memory allocation
- Allows the virtual address space to be independent of the physical memory
- Allows the virtual address space to be a multiple of the physical memory size
- Allows deadlock tobe detected in paging scheme
- Is present only in windows NT
- Which is not an Operating system?
- Windows 95
- MS-DOS
- Windows 3.1
- Windows 2000
- The operating system manages------
- Memory
- Processor
- Disk and I/0 devices
- All of the above
- ------begins at the root and follows a path down to the specified file
- Relative path name
- Absolute path name
- Standalone name
- All of the above
- Who is called a supervisor of computer activity?
- CPU
- Operating system
- Control unit
- Application program
- Consider the two statements. (A) protection is an internal problem. (B) security is considered as an external environment within which the system works. Which of the statement is not true?
- Only A
- Only B
- Both A and B
- None of the above
- The process related to process control, file management, device management, information about system and communication that is requested by any higher level language can be performed by-----
- Editors
- Compilers
- System call
- Catching
- Mutual exclusion
- If one process is in a critical region others are excluded
- Prevents deadlock
- Requires semaphores to implement
- Is found only in the windows NT operating system
- Which scheduler controls the degree of multiprogramming?
- Short term scheduler
- Long term scheduler
- Middle term scheduler
- None of the above
- What is the name of the software which can be legally compiled and often used for free?
- Shareware program
- Public domain program
- Firmware program
- Mind ware
- The problem of fragmentation arises in-------
- Static storage allocation
- Stack allocation storage
- Stack allocation with dynamic binding
- Heap allocation
- In interactive environments such as time-sharing systems, the primary requirement is to provide reasonably good response time and in general, to share system resources equitably. In such situations, the scheduling algorithm that is most popularly applied is------
- Shortest remaining Time Next (SRTN) scheduling
- Priority based preemptive scheduling
- Round robin scheduling
- None of the above
- Thrashing occurs-----
- When excessive swapping takes place
- When you thrash your computer
- Whenever deadlock occurs
- When no swapping takes place
- Boundary registers ------
- Are available in temporary program variable storage
- Are only necessary with fixed partition
- Track the beginning and ending the program
- Track page boundaries
- The principal of locality of reference justifies the use of -------
- Virtual memory
- Interrupts
- Main memory
- Chache memory
- The section of code which accesses shared variables is called as
- Critical section
- Block
- Procedure
- Semaphore
- Thrashing occur ------
- Reduces page I/0
- Decreases the degree of multiprogramming
- Implies excessive page I/0
- Improve the system performance
- In memory management, a technique called as paging, physical memory is broken into fixed-sized blocks called-----
- Pages
- Frames
- Blocks
- Segments
- The state of process after it encounters an I/0 instructions is------
- Ready
- Blocked/waiting
- Idle
- Running
- In one of the deadlock prevention methods, impose a total ordering of all resource types, and require that each process requests resources in an increasing order of enumeration. This violates the-----condition of deadlock.
- Mutual exclusion
- Hold and wait
- Circular wait
- No preemption
- Which of the following file name extension suggest that the file is backup copy of another file?
- TXT
- COM
- BAS
- BAK
- The degree of multiprogramming is controlled by
- CPU schedular
- Context switching
- Long-term schedular
- Medium term schedular
- The higher versions of operating systems are so written that programs designed for earlier versions can still be run. What is it called?
- Up gradeability
- Upward mobility
- Universality
- Upward compatibility
- A scheduling algorithm is fair
- If no process faces starvation
- If a process is starved, detect it and run it with high priority
- If it uses semaphoes
- Only if a queue is used for scheduling
- A critical region
- Is a piece of code which only one process executes at a time
- Is a region prone to deadlock
- Is a piece of code which only a finite number of process execute
- Is found only in windows NT operation system
- Semaphores can be used for solving --------
- Wait & signal
- Deadlock
- Synchronization
- Priority
- The operating systems of a computer serves as a software interface between the user and the ------
- Hardware
- Peripheral
- Memory
- Screen
- What is the name of the software which deals with the running of the actual computer and not with the programming problems?
- Operating system
- System program
- Object program
- Source program
- The systems which allows only one process execution at a time, are called
- Uniprogramming systems
- Uniprocessing systems
- Unitasking system
- None of mentioned
- In operating system, each process has its own
- Address space and global variables
- Open files
- Pending alarms, signals and signal handlers
- All of the mentioned
- A process can be terminated due to
- Normal exit
- Fatal error
- Killed by another process
- All of the mentioned
- What is the ready state of a process?
- When process is scheduled to run after some execution
- When process is unable to run until some task has been completed
- When process is using the CPU
- None of the mentioned
- What is interprocess communication?
- Communication within the process
- Communication between two process
- Commnication between two threads of same process
- None of the mentioned
- A set of process is deadlock if
- Each process is blocked and will remain so forever
- Each process is terminated
- All process are trying to kill each other
- None of the mentioned
- A process stack does not contain
- Function parameters
- Local variables
- Return address
- PID of child process
- Which system call returns the process identifier of a terminated child?
- Wait
- Exit
- Fork
- Get
- The address of the next instruction to be executed by the current process is provided by the
- CPU registers
- Program counter
- Process stack
- Pipe
- Round robin scheduling is essentially the preemptive version of -
- FIFO
- Shortest job first
- Shortest remaining
- Longest time first
- A page fault occurs
- When the page is not in the memory
- When the page is in the memory
- When the process enters the blocked state
- When the process is in the ready state
- Which of the following will determine your choice of systems software for your computer?
- Is the applications software you want to use compatible with it?
- Is it expensive?
- Is it compatible with your hardware?
- Both (a) & (b)
0 Comments