Operating System MCQ
Operating System MCQ
a) Operating system
b) system software
c) Application software
d) All.
Ans:a
8. Memory management technique in which system stores and retrieves data from
secondary storage for use in main memory is called?
a) fragmentation
b) paging
c) mapping
d) none of the mentioned
Ans:b
15. The operating system and the other processes are protected from being
modified by an already running process because ____________
a) they are in different memory spaces
b) they are in different logical addresses
c) they have a protection algorithm
d) every address generated by the CPU is being checked against the
relocation and limit registers
Ans:d
17. Using transient code, _______ the size of the operating system during program
execution.
a) increases
b) decreases
c) changes
d) maintains
Ans:c
18. When memory is divided into several fixed sized partitions, each partition may
contain ________
a) exactly one process
b) at least one process
c) multiple processes at once
d) none of the mentioned
Ans:a
19. Logical memory is broken into blocks of the same size called _________
a) frames
b) pages
c) backing store
d) none of the mentioned
Ans:b
20. Every address generated by the CPU is divided into two parts. They are
____________
a) frame bit & page number
b) page number & page offset
c) page offset & frame bit
d) frame offset & page offset
Ans:b
22. The _____ table contains the base address of each page in physical memory.
a) process
b) memory
c) page
d) frame
Ans:c
24. The operating system maintains a ______ table that keeps track of how many
frames have been allocated, how many are there, and how many are available.
a) page
b) mapping
c) frame
d) memory
Ans:c
25. Paging increases the ______ time.
a) waiting
b) execution
c) context – switch
d) all of the mentioned
Ans:c
28. For larger page tables, they are kept in main memory and a __________ points
to the page table.
a) page table base register
b) page table base pointer
c) page table register pointer
d) page table base
Ans:a
39. If there are 32 segments, each of size 1Kb, then the logical address should have
____________
a) 13 bits
b) 14 bits
c) 15 bits
d) 16 bits
Ans:a
40. Consider a computer with 8 Mbytes of main memory and a 128K cache. The
cache block size is 4 K. It uses a direct mapping scheme for cache
management. How many different main memory blocks can map onto a given
physical cache block?
a) 2048
b) 256
c) 64
d) 8
Ans:c
41. A multilevel page table is preferred in comparison to a single level page table
for translating virtual address to physical address because ____________
a) it reduces the memory access time to read or write a memory location
b) it helps to reduce the size of page table needed to implement the virtual
address space of a process
c) it is required by the translation lookaside buffer
d) it helps to reduce the number of page faults in page replacement
algorithms
Ans:b
42. A ____ a set of wires and a rigidly defined protocol that specifies a set of
messages that can be sent on the wires.
a) port
b) node
c) bus
d) none of the mentioned
Ans:c
43. When device A has a cable that plugs into device B, and device B has a cable
that plugs into device C and device C plugs into a port on the computer, this
arrangement is called a _________
a) port
b) daisy chain
c) bus
d) cable
Ans:b
44. The _________ present a uniform device-access interface to the I/O subsystem,
much as system calls provide a standard interface between the application and
the operating system.
a) Devices
b) Buses
c) Device drivers
d) I/O systems
Ans:c
48. The _________ determines the cause of the interrupt, performs the necessary
processing and executes a return from the interrupt instruction to return the
CPU to the execution state prior to the interrupt.
a) interrupt request line
b) device driver
c) interrupt handler
d) all of the mentioned
Ans:c
61. Consider a machine in which all memory reference instructions have only one
memory address, for them we need at least _____ frame(s).
a) one
b) two
c) three
d) none of the mentioned
Ans:b
62. The algorithm in which we allocate memory to each process according to its
size is known as ____________
a) proportional allocation algorithm
b) equal allocation algorithm
c) split allocation algorithm
d) none of the mentioned
Ans:a
63. With either equal or proportional algorithm, a high priority process is treated
___________ a low priority process.
a) greater than
b) same as
c) lesser than
d) none of the mentioned
Ans:b
66. One problem with the global replacement algorithm is that ____________
a) it is very expensive
b) many frames can be allocated to a process
c) only a few frames can be allocated to a process
d) a process cannot control its own page – fault rate
Ans:d
75. Which file is a sequence of bytes organized into blocks understandable by the
system’s linker?
a) object file
b) source file
c) executable file
d) text file
Ans:a
81. The data structure used for file directory is called ____________
a) mount table
b) hash table
c) file table
d) process table
Ans:b
82. In which type of allocation method each file occupy a set of contiguous block
on the disk?
a) contiguous allocation
b) dynamic-storage allocation
c) linked allocation
d) indexed allocation
Ans:a
83. If the block of free-space list is free then bit will ____________
a) 1
b) 0
c) any of 0 or 1
d) none of the mentioned
Ans:a
87. The operating system keeps a small table containing information about all open
files called ____________
a) system table
b) open-file table
c) file table
d) directory table
Ans:b
88. The open file table has a/an _______ associated with each file.
a) file content
b) file permission
c) open count
d) close count
Ans:c
89. Which of the following are the two parts of the file name?
a) name & identifier
b) identifier & type
c) extension & name
d) type & extension
Ans:c
90. The directory can be viewed as a _________ that translates file names into
their directory entries.
a) symbol table
b) partition
c) swap space
d) cache
Ans:a
92. When a user job starts in a two level directory system, or a user logs in
_____________
a) the users user file directory is searched
b) the system’s master file directory is not searched
c) the master file directory is indexed by user name or account number, and
each entry points to the UFD for that user
d) all of the mentioned
Ans:c
94. The current directory contains, most of the files that are _____________
a) of current interest to the user
b) stored currently in the system
c) not used in the system
d) not of current interest to the system
Ans:a
95. Which of the following are the types of Path names?
a) absolute & relative
b) local & global
c) global & relative
d) relative & local
Ans:a
104. Hard real time operating system has ______________ jitter than a soft real
time operating system.
a) less
b) more
c) equal
d) none of the mentioned
Ans:a
105. For real time operating systems, interrupt latency should be ____________
a) minimal
b) maximum
c) zero
d) dependent on the scheduling
Ans:a
107. In which scheduling certain amount of CPU time is allocated to each process?
a) earliest deadline first scheduling
b) proportional share scheduling
c) equal share scheduling
d) none of the mentioned
Ans:b
108. The problem of priority inversion can be solved by ____________
a) priority inheritance protocol
b) priority inversion protocol
c) both priority inheritance and inversion protocol
d) none of the mentioned
Ans:a
109. Time duration required for scheduling dispatcher to stop one process and start
another is known as ____________
a) process latency
b) dispatch latency
c) execution latency
d) interrupt latency
Ans:b
110. Time required to synchronous switch from the context of one thread to the
context of another thread is called?
a) threads fly-back time
b) jitter
c) context switch time
d) none of the mentioned
Ans:c
112. A process P1 has a period of 50 and a CPU burst of t1 = 25, P2 has a period of
80 and a CPU burst of 35. The total CPU utilization is ____________
a) 0.90
b) 0.74
c) 0.94
d) 0.80
Ans:c
113. A process P1 has a period of 50 and a CPU burst of t1 = 25, P2 has a period of
80 and a CPU burst of 35., the priorities of P1 and P2 are?
a) remain the same throughout
b) keep varying from time to time
c) may or may not be change
d) none of the mentioned
Ans:b
114. A process P1 has a period of 50 and a CPU burst of t1 = 25, P2 has a period of
80 and a CPU burst of 35., can the two processes be scheduled using the EDF
algorithm without missing their respective deadlines?
a) Yes
b) No
c) Maybe
d) None of the mentioned
Ans:a
116. If there are a total of T = 100 shares to be divided among three processes, A, B
and C. A is assigned 50 shares, B is assigned 15 shares and C is assigned 20
shares.B will have ______ percent of the total processor time.
a) 20
b) 15
c) 50
d) none of the mentioned
Ans:b
118. In which type of streaming multimedia file is delivered to the client, but
not shared?
a) real-time streaming
b) progressive download
c) compression
d) none of the mentioned
Ans:c
119. Which one of the following is the characteristic of a multimedia system?
a) high storage
b) high data rates
c) both high storage and high data rates
d) none of the mentioned
Ans:c
120. The delay that occur during the playback of a stream is called
___________
a) stream delay
b) playback delay
c) jitter
d) event delay
Ans:c
121. Which algorithm can be optimized to meet the timing deadlines and rate
requirements of continuous media?
a) Earliest-Deadline-First scheduling
b) SCAN-EDF scheduling
c) Both Earliest-Deadline-First scheduling & SCAN-EDF scheduling
d) None of the mentioned
Ans:c
127. As disks have relatively low transfer rates and relatively high latency
rates, disk schedulers must reduce latency times to ___________
a) ensure high bandwidth
b) ensure low bandwidth
c) make sure data is transferred
d) reduce data transfer speeds
Ans:a
128. Servicing requests strictly according to deadline using EDF may result
in ___________
a) lower seek times
b) lower bandwidth
c) higher seek time
d) higher bandwidth
Ans:c
129. The hybrid algorithm that combines EDF with SCAN algorithm is
known as ___________
a) EDS
b) SDF
c) SCAN-EDF
d) None of the mentioned
Ans:c
**************************