Saturday 31 December 2016

OS Part 2

Operating System and Linux MCQ
for COMPETITIVE exams


QuestionID  :  11316         Subject Name  Linux
Q1. Functions defined in the current shell are available to all the subshell
invoke from the current shell
     Correct Answer : F
     
QuestionID  :  11325         Subject Name  Linux
Q2. OPTIND and OPTARG are unix defined variables.
     Correct Answer : T
     
QuestionID  :  11332         Subject Name  Linux
Q3. Setting made using stty in a shell script are effective only during
the execution of the script.The orignal setting are restored the moment
excution of the script is over.
     Correct Answer : F
     
QuestionID  :  11333         Subject Name  Linux
Q4. we can trap a signal such that on occurence of that signal a particular
shell script gets executed.
     Correct Answer : T
     
QuestionID  :  11336         Subject Name  Linux
Q5. Binary executables required for system administration are usually placed in /etc.
     Correct Answer : T
     
QuestionID  :  11339         Subject Name  Linux
Q6. An exported variable cannot be unset
     Correct Answer : F
     
QuestionID  :  11344         Subject Name  Linux
Q7. To list hidden as well as normal files in thr current directory the command you would use is--
     1.  ls - a
     2.  ls - b
     3.  ls - l
     4.  None of above.
     Correct Answer : 1
     
QuestionID  :  11352         Subject Name  Linux
Q8. who is a special case of who am i command.
     Correct Answer : F
     
QuestionID  :  11356         Subject Name  Linux
Q9. While executing a script the shell acts as a compiler
     Correct Answer : F
     
QuestionID  :  11365         Subject Name  Linux
Q10. A PC having its own harddisk and memory continue to use them when it is acting as a terminal for a host machine.
     Correct Answer : F
     
QuestionID  :  11366         Subject Name  Linux
Q11. All device related files are present in /dev directory.
     Correct Answer : T
     
QuestionID  :  11373         Subject Name  Linux
Q12. A kernel program is usually stored in a file called sh.
     Correct Answer : F
     
QuestionID  :  11375         Subject Name  Linux
Q13. Shell program is usually stored in a file called Unix.
     Correct Answer : F
     
QuestionID  :  11383         Subject Name  Linux
Q14. What would be the output of the following?

echo Hello
eval echo Hello
eval eval echo Hello



echo${newname+Arora}
     1.  Hello
Hello
     2.  Error
     3.  none of the above
     4.  Hello
Hello
Hello
     Correct Answer : 4
     
QuestionID  :  11385         Subject Name  Linux
Q15. All the utilities, applications, directories and data in Unix are stored as files.
     Correct Answer : T
     
QuestionID  :  11388         Subject Name  Linux
Q16. The file that controls the printer is stored in a sub-directory called printer created by system admin.
     Correct Answer : F
     
QuestionID  :  11397         Subject Name  Linux
Q17. Read,write,execute permissions to a file created by you can be alter by other user
     Correct Answer : F
     
QuestionID  :  11409         Subject Name  Linux
Q18. How would you perform the following operations on the contents of a given file.
insert a> and a space at the start of every line in the file
     1.  1,$s/^/>[][]/g
     2.  1,$s/>[][]/g
     3.  1,$s/^/>[]/g
     4.  none of the above
     Correct Answer : 1
     
QuestionID  :  11410         Subject Name  Linux
Q19. If in a script value of IFS is changed to : after execcution of script
the value of IFS is automatically set back to original value
     1.   True
     2.   False
     3.  Can not say
     4.  Partly True Partly False
     Correct Answer : 4
     
QuestionID  :  11425         Subject Name  Linux
Q20. Purpose of .exrc file is convinient way to customize the vi environment and like all
good things you shold put it to utmost use to improve your efficiency .
     Correct Answer : T
     
QuestionID  :  11432         Subject Name  Linux
Q21. What is the output of following program segments?
a=b
b=c d=c
echo $$b
echo $$$d
     1.  521b
521c
     2.  512b
512c
     3.  100b
100c
     4.  none of the above
     Correct Answer : 1
     
QuestionID  :  11441         Subject Name  Linux
Q22. Unix uses serial multitasking to support various programs running in memory
     Correct Answer : F
     
QuestionID  :  11463         Subject Name  Linux
Q23. the command used for flip the case from upper to lower or vice versa.......
is ~
     Correct Answer : T
     
QuestionID  :  11466         Subject Name  Linux
Q24. echo statements output can be redirected to file
     Correct Answer : F
     
QuestionID  :  11470         Subject Name  Linux
Q25. Comments can be spilt over multiple lines if each line is preceded
by #
     Correct Answer : T
     
QuestionID  :  11474         Subject Name  Linux
Q26. to delete 5 lines from file & to copy them to buffer x we use "x5dd
     Correct Answer : T
     
QuestionID  :  11479         Subject Name  Linux
Q27. The following command going to do?
at 0915am Mar 24
echo "Good Morning"
ctrl d
------------------------------------------
o/p: On march 24 at 9.15 am it will print "good morning" on the screen
     Correct Answer : T
     
QuestionID  :  11484         Subject Name  Linux
Q28. If the printer goes out of order the system administrator can ensure that the system refuses to accept new printing job
     Correct Answer : T
     
QuestionID  :  11486         Subject Name  Linux
Q29. Only system adminstrator can cancel your printing job
     Correct Answer : F
     
QuestionID  :  11492         Subject Name  Linux
Q30. The file /bin/sysadmsh can be executed only by the system admin.
     Correct Answer : T
     
QuestionID  :  11495         Subject Name  Linux
Q31. which of the following assignment is illgal
     1.  a=`ls`
     2.  b=`ls-l`
     3.  c=`1972`
     4.  d=`who|grep aal`
     Correct Answer : 3
     
QuestionID  :  11496         Subject Name  Linux
Q32. When fork() is given
     1.  It creats a child process
     2.  Allocate slot in process table
     3.  returns 0 to parent & ID to child
     4.  All of the above
     Correct Answer : 4
     
QuestionID  :  11506         Subject Name  Linux
Q33. For a person to receive messages he should have his terminal set to a parameter which will allow him receive messages.
The command to set this parameter is
     1.  message -on
     2.  msg -o
     3.  mesg -y
     4.  message -y
     Correct Answer : 3
     
QuestionID  :  11509         Subject Name  Linux
Q34. we can change the prompt to What Next while using the more command
     Correct Answer : F
     
QuestionID  :  11513         Subject Name  Linux
Q35. The shell meta character $# represents
     1.  total number of arguments supplied to the shell script
     2.  total number of files in the current directory
     3.  total number of users who have logged in
     4.  total number of process running in the background
     Correct Answer : 1
     
QuestionID  :  11518         Subject Name  Linux
Q36. There is no need to make file system on a disk if we are going to use it only to back up files on it.
     Correct Answer : T
     
QuestionID  :  11524         Subject Name  Linux
Q37. A file system can be mounted and unmounted by any user.
     Correct Answer : F
     
QuestionID  :  11527         Subject Name  Linux
Q38. A floppy can be formated only by system administrator
     Correct Answer : F
     
QuestionID  :  11528         Subject Name  Linux
Q39. On executing a statement set -3+1
     1.  $1 would be -3
     2.  $1 would be -
     3.  $1 would be set
     4.  this command would result into an error
     Correct Answer : 4
     
QuestionID  :  11540         Subject Name  Linux
Q40. if there are number of file systems then each one will have its own
block
     Correct Answer : T
     
QuestionID  :  11551         Subject Name  Linux
Q41. A tar command is can be used to list all the backed up files present on floppy disk.
     Correct Answer : T
     
QuestionID  :  11556         Subject Name  Linux
Q42. Unix commands which accept the input from standard input device
and send the output to the standard output device are known as
filters.
     Correct Answer : T
     
QuestionID  :  11559         Subject Name  Linux
Q43. k=35
echo `[$k -eq 35 ] ``[$k-eq 50]`
     1.  blank line
     2.  dotted line
     3.  error
     4.  none
     Correct Answer : 1
     
QuestionID  :  11562         Subject Name  Linux
Q44. i=4 z=12
[$i=5 -a $z - gt5]
echo $?
     1.  1
     2.  0
     3.  none
     4.  error
     Correct Answer : 1
     
QuestionID  :  11566         Subject Name  Linux
Q45. To perform the numeric test we must use -ge instead of >=
     Correct Answer : T
     
QuestionID  :  11572         Subject Name  Linux
Q46. cat < file1 > file2
cat > file2 < file1
Both the commands will show the same result.
     Correct Answer : T
     
QuestionID  :  11575         Subject Name  Linux
Q47. what are the contents of the file /usr/lib/cron/at.deny ?
     1.  list of users who are currently logged in "at" the current instant
     2.  list of users who are not allowed to use the "at" command
     3.  both the above
     4.  none of the above
     Correct Answer : 2
     
QuestionID  :  11582         Subject Name  Linux
Q48. the if-then-fi instruction are loop control instruction
     Correct Answer : F
     
QuestionID  :  11600         Subject Name  Linux
Q49. A file can have links across file system.
     Correct Answer : F
     
QuestionID  :  11611         Subject Name  Linux
Q50. The command cut -f 2,8 -d":" file1 would output
     1.  the fields 2 to 8 from file1 where deliminator between fields is :
     2.  the fields 2 to 8 from file1 including the deliminator : between fields
     3.  the columns 2 to 8 from file1 with : between each column
     4.  none
     Correct Answer : 1
     

Top of Form
QuestionID  :  11323         Subject Name  Linux
Q1. OPTIND and OPTARG are unix defined variables.
     Correct Answer : T
     
QuestionID  :  11327         Subject Name  Linux
Q2. If shell script is called from antohter then the called shell script should necessarily have a return statement.
     Correct Answer : F
     
QuestionID  :  11330         Subject Name  Linux
Q3. An argument to the option cannot begin with a minu sign.
     Correct Answer : F
     
QuestionID  :  11340         Subject Name  Linux
Q4. Hidden files in Unix always begin with a character " . "
     Correct Answer : T
     
QuestionID  :  11353         Subject Name  Linux
Q5. The shell performs command substitution before filename substitution
     Correct Answer : F
     
QuestionID  :  11366         Subject Name  Linux
Q6. All device related files are present in /dev directory.
     Correct Answer : T
     
QuestionID  :  11369         Subject Name  Linux
Q7. what would be the output of the following program:
name=Sanjay
surname=khare
echo{name=rahul}
echo{middlename+Rahul}
echo${surname-Arora}
     1.  Sanjay
Blank line
Khare
     2.  Khare
Blank line
sanjay
     3.  error
     4.  none of the above
     Correct Answer : 1
     
QuestionID  :  11379         Subject Name  Linux
Q8. What would be the output of the following?

name=Sanjay
surname=khare
echo${name-Rahul}
echo${middlename-Rahul}
echo${surname+Arora}
echo${newname+Arora}
     1.  Sanjay
Rahul
Arora
Blank line
     2.  Blank line
Sanjay
Arora
Rahul
     3.  error
     4.  now of the above
     Correct Answer : 1
     
QuestionID  :  11394         Subject Name  Linux
Q9. How would you perform the following operation on the contents of a given file.
Replace one or more spaces with a single space
     1.  1,$s/[][]*/[]/g
     2.  1,$s/[]*/[]/g
     3.  1,$s/[][]+/[]/g
     4.  1,$s/[]+/[]/g
     Correct Answer : 1
     
QuestionID  :  11401         Subject Name  Linux
Q10. Using for loop we can calculate factorial value .
     Correct Answer : F
     
QuestionID  :  11402         Subject Name  Linux
Q11. How would you perform the following operations on the contents of a given file.
Replace one or more spaces following a fullstop or a comma with two spaces
     1.  1,$s/[.,][][]*/[][]/g
     2.  1,$s,[.][,][][]*/[][]/g
     3.  1,$s/[.,][]*/[]/g
     4.  1,$s/[.,][][]+/[]/g
     Correct Answer : 1
     
QuestionID  :  11410         Subject Name  Linux
Q12. If in a script value of IFS is changed to : after execcution of script
the value of IFS is automatically set back to original value
     1.   True
     2.   False
     3.  Can not say
     4.  Partly True Partly False
     Correct Answer : 4
     
QuestionID  :  11421         Subject Name  Linux
Q13. To logout from your terminal you
     1.  Switch off the terminal
     2.  Press ctrl -d or type exit
     3.  press ctrl-Alt-Del
     4.  do nothing it is the system administrator who would do this for you
     Correct Answer : 2
     
QuestionID  :  11422         Subject Name  Linux
Q14. The difference between the commands ps -e and ps -a is
     1.  ps -e gives detail of every process running in memory whereas ps -a gives output for all the process that you have launched.
     2.  ps -e gives details of every process running in memory whereas ps -a gives details of all user processes.
     3.  No difference,both give same output.
     4.  None of the above.
     Correct Answer : 2
     
QuestionID  :  11423         Subject Name  Linux
Q15. A single UNIX file System can be split over multiple harh disks
     Correct Answer : F
     
QuestionID  :  11424         Subject Name  Linux
Q16. What is the output of following program segments?
n="ask me"
echo $n
echo "$n"
echo `$n`
     1.  ask me
ask me
$n
     2.  ask me
$n
ask me
     3.  ask me
     4.  $n
     Correct Answer : 1
     
QuestionID  :  11425         Subject Name  Linux
Q17. Purpose of .exrc file is convinient way to customize the vi environment and like all
good things you shold put it to utmost use to improve your efficiency .
     Correct Answer : T
     
QuestionID  :  11427         Subject Name  Linux
Q18. You can execute shell script onces it has be typed
     Correct Answer : F
     
QuestionID  :  11433         Subject Name  Linux
Q19. To create files of large size in UNIX file System it is
preferable to have blocks of large size
     Correct Answer : T
     
QuestionID  :  11447         Subject Name  Linux
Q20. AABBCC is a valid password
     Correct Answer : F
     
QuestionID  :  11452         Subject Name  Linux
Q21. To change our existing password we can execute the file /etc/passwd
     Correct Answer : F
     
QuestionID  :  11453         Subject Name  Linux
Q22. Every legal user has to have a login id and a password
     Correct Answer : T
     
QuestionID  :  11461         Subject Name  Linux
Q23. Any Shell script by default get executed in the current shell
     Correct Answer : F
     
QuestionID  :  11466         Subject Name  Linux
Q24. echo statements output can be redirected to file
     Correct Answer : F
     
QuestionID  :  11469         Subject Name  Linux
Q25. to search a pattern which starts with uni the command would be
     1.  :/ < uni
     2.  :/\ < uni
     3.  : / \ < uni >
     4.  none
     Correct Answer : 2
     
QuestionID  :  11471         Subject Name  Linux
Q26. A shell variable can not handled negative value
     Correct Answer : F
     
QuestionID  :  11474         Subject Name  Linux
Q27. to delete 5 lines from file & to copy them to buffer x we use "x5dd
     Correct Answer : T
     
QuestionID  :  11482         Subject Name  Linux
Q28. The escape sequence \033[4m is used to
     1.  underline character
     2.  marked them as bold
     3.  displayed them in reversed video
     4.  None of the above
     Correct Answer : 1
     
QuestionID  :  11485         Subject Name  Linux
Q29. The following command will give output:
command:
at 18:32 tommorow
echo "Happy Birthday"

output:
After 15 minute form the time when the command is executed th screen
will be cleared and a long listing of the current directory would ne dispalyed on
the screen.
ctr d
     Correct Answer : T
     
QuestionID  :  11486         Subject Name  Linux
Q30. Only system adminstrator can cancel your printing job
     Correct Answer : F
     
QuestionID  :  11500         Subject Name  Linux
Q31. Which of the following is not true as regards the kill command.

1)Superuser can kill daemon processes.
2)For sure kill the signal no is 9.
3)There is no surety that the shell process
will get killed by the command kill < PID of shell process >
4)Using kill command you can kill other user`s processes too.
     1.  1,2
     2.  2,3
     3.  1,4
     4.  All
     Correct Answer : 3
     
QuestionID  :  11507         Subject Name  Linux
Q32. Which of the following is not true.

1)The at command permits you to receive messages only by mail.
2)A person`s login name appears in the file at.allow if he is not allowed use
the at command.
     1.  1
     2.  2
     3.  Both are false
     4.  Both are true.
     Correct Answer : 3
     
QuestionID  :  11511         Subject Name  Linux
Q33. The command cat < file1 > file2 will copy the contents of file1
to file2
     Correct Answer : T
     
QuestionID  :  11513         Subject Name  Linux
Q34. The shell meta character $# represents
     1.  total number of arguments supplied to the shell script
     2.  total number of files in the current directory
     3.  total number of users who have logged in
     4.  total number of process running in the background
     Correct Answer : 1
     
QuestionID  :  11516         Subject Name  Linux
Q35. The command that Unix offers to a user to find out whether he can send messages to a particular terminal are
     1.  finger and who
     2.  finger -mesg and who -T
     3.  finger -i and who -t
     4.  finger -i and who -T
     Correct Answer : 2
     
QuestionID  :  11519         Subject Name  Linux
Q36. The command wc -l < aaa displays the no of words present in the
file aaa.
     Correct Answer : F
     
QuestionID  :  11535         Subject Name  Linux
Q37. Using a tar we can archive files only on magnetic tape
     Correct Answer : F
     
QuestionID  :  11543         Subject Name  Linux
Q38. Command to Merge the content of file f1 with the inputs supplied from the keyboard and store the output in a file f2
     1.  sort -m f1 - > f2
     2.  sort -m f1 f2
     3.  merge -m f1 f2
     4.  none
     Correct Answer : 1
     
QuestionID  :  11549         Subject Name  Linux
Q39. Unix commands which accept the input from standard input device and
send the output to the standard output device are called "filters".
     Correct Answer : T
     
QuestionID  :  11559         Subject Name  Linux
Q40. k=35
echo `[$k -eq 35 ] ``[$k-eq 50]`
     1.  blank line
     2.  dotted line
     3.  error
     4.  none
     Correct Answer : 1
     
QuestionID  :  11570         Subject Name  Linux
Q41. Command for search all lines in a file which do not ends with a semicolon
     1.  grep -v ";" filename
     2.  grep -v ";$" filename
     3.  grep ";$" filename
     4.  grep -x ";$" filename
     Correct Answer : 2
     
QuestionID  :  11573         Subject Name  Linux
Q42. x=10
if[x -ge 2] //Is the comparision correct ?
     Correct Answer : F
     
QuestionID  :  11576         Subject Name  Linux
Q43. x=3 y=3.5
if [$x -eq $y ]
then
Echo x and y are equal
else
Echo x and y are not equal
     1.  Echo x and y are equal
     2.  Echo x and y are not equal
     3.  error
     4.  none
     Correct Answer : 1
     
QuestionID  :  11581         Subject Name  Linux
Q44. The command ls -l >> f1 would overwrite the contents of f1 with the
output of the command ls -l.
     Correct Answer : F
     
QuestionID  :  11584         Subject Name  Linux
Q45. the if-then-fi instruction are decision control instruction
     Correct Answer : T
     
QuestionID  :  11594         Subject Name  Linux
Q46. which of the following are not unix commnads?
     1.  md
     2.  rd
     3.  both 1 & 2
     4.  cd
     Correct Answer : 3
     
QuestionID  :  11597         Subject Name  Linux
Q47. You have already logged in and some body sends mail to you. In such an
event when you whould receive the message `you have mail`?
     1.  By setting the variable MAILNOTIFY
     2.  By setting the variable MAILCHECK
     3.  By setting the variable MAILREAD
     4.  None
     Correct Answer : 2
     
QuestionID  :  11607         Subject Name  Linux
Q48. how will you find out which process have been launched from a specific terminal ?
     1.  ps -t ttynumber
     2.  ps
     3.  ps -t
     4.  none
     Correct Answer : 1
     
QuestionID  :  11612         Subject Name  Linux
Q49. point out error
1. Echo Enter filename
2. read fname
3. if[-rwx $fname]
3. then
4. echo read write and execute permissions
5. fi
     1.  line 3
     2.  line 1
     3.  line 5
     4.  no error
     Correct Answer : 1
     
QuestionID  :  11613         Subject Name  Linux
Q50. In scheduling using "batch" command the system decides the best
time for executing our command.Moreover the time at which our
command will be executed is not in our control.
     Correct Answer : T
     

QuestionID  :  11056         Subject Name  Operating Syatems Concepts
Q1. The cpu utilization is low when the system is
     1.  executing
     2.  thrasing
     3.  waiting
     4.  all of the above
     Correct Answer : 2
     
QuestionID  :  11065         Subject Name  Operating Syatems Concepts
Q2. A programm can execute more than once simultaneously is called
     1.  re-executable
     2.  re-entrant
     3.  multiprogramming
     4.  none of the above
     Correct Answer : 2
     
QuestionID  :  11068         Subject Name  Operating Syatems Concepts
Q3. All the entries in FAT corresponds to clusters
     Correct Answer : T
     
QuestionID  :  11071         Subject Name  Operating Syatems Concepts
Q4. ------ scheduler selects the process that is ready to execute to CPU.
     1.  long-term scheduler
     2.  short-term scheduler
     3.  medium-term scheduler
     4.  None of these
     Correct Answer : 2
     
QuestionID  :  11074         Subject Name  Operating Syatems Concepts
Q5. LAN covers radius of up to 10 KM
     Correct Answer : F
     
QuestionID  :  11089         Subject Name  Operating Syatems Concepts
Q6. Semaphores are used to solve the problem of
     1.  Race condition
     2.  process syncronisation
     3.  mutual exclusion
     4.  both b&c
     Correct Answer : 4
     
QuestionID  :  11094         Subject Name  Operating Syatems Concepts
Q7. SPOOLING stands for _________
     1.  Simultaneous Peripheral Operations OnLine
     2.  Spontaneous Peripheral Operations OnLine
     3.  Serial
Peripheral Operations OnLine
     4.  None of the above
     Correct Answer : 1
     
QuestionID  :  11097         Subject Name  Operating Syatems Concepts
Q8. Which of the following is true?

a) the linkage editor is used to edit programs which have to be later linked together
b) the linkage editor links object modules during compiling or assembling
c) the linkage editor links object modules and resolves external references between them before loading
d) the linkage editor resolves external references between the object modules during execution time
     1.  only c
     2.  a and c
     3.  only b
     4.  all of the above
     Correct Answer : 1
     
QuestionID  :  11099         Subject Name  Operating Syatems Concepts
Q9. With a single resource deadlock occures
     1.  if there are more than two processes computing for that resource
     2.  if there are only than two processes computing for that resource
     3.  if there are a single process computing for that resource
     4.  None of the above
     Correct Answer : 4
     
QuestionID  :  11105         Subject Name  Operating Syatems Concepts
Q10. It is possible to have a deadlock involving only a single process
     Correct Answer : F
     
QuestionID  :  11107         Subject Name  Operating Syatems Concepts
Q11. _____________ is a significant factor in maintaining fragmentation
within usable limits
     1.  External Fragmentation
     2.  Paging
     3.  Coalescing of holes
     4.  Both 2 and 3
     Correct Answer : 4
     
QuestionID  :  11108         Subject Name  Operating Syatems Concepts
Q12. Pre-emptive scheduling is the strategy of temporarily suspending a running
process
     1.  before the cpu time slice expires
     2.  to allow starving process to run
     3.  when it request i/o
     4.  none of the above
     Correct Answer : 1
     
QuestionID  :  11112         Subject Name  Operating Syatems Concepts
Q13. When fork() is given-
     1.  it creates a child process
     2.  allocates slot in process table
     3.  returns 0 to parent & ID to child
     4.  All of the above.
     Correct Answer : 1
     
QuestionID  :  11125         Subject Name  Operating Syatems Concepts
Q14. ________ is an example of sharable resource and __________ is an example of non Sharable resouece.
     1.  Memory,Terminal.
     2.  Mouse,KeyBoard
     3.  Monitor,CPU
     4.  None of above.
     Correct Answer : 1
     
QuestionID  :  11137         Subject Name  Operating Syatems Concepts
Q15. When fork() is given-
     1.  it creates a child process.
     2.  Allocates slot in process table.
     3.  returns 0 to parent and ID to child.
     4.  all of the above.
     Correct Answer : 4
     
QuestionID  :  11138         Subject Name  Operating Syatems Concepts
Q16. Which of the following cpu schedulling algorithms will prevented stravation?
     1.  shortest-job-first
     2.  priority schedulling algorithm
     3.  priority schedulling will againg mechanism
     4.  none
     Correct Answer : 3
     
QuestionID  :  11141         Subject Name  Operating Syatems Concepts
Q17. Which of the following statement is true?
     1.  A computer Virus is complete program that makes active attacks.
     2.  A computer virus is program segment that makes passive attatcks.
     3.  A logic bomb is program segment that makes passive attacks.
     4.  A logic bomb is program that makes active attacks.
     Correct Answer : 1
     
QuestionID  :  11144         Subject Name  Operating Syatems Concepts
Q18. The time of admission of job to ready queue to completion is_______
     1.  Turnaround time
     2.  Burst time
     3.  Response time
     4.  None of the above.
     Correct Answer : 1
     
QuestionID  :  11149         Subject Name  Operating Syatems Concepts
Q19. The fastest strogage element is?
     1.  CDRAM
     2.  DRAM
     3.  EDO-DRAM
     4.  SDRAM
     Correct Answer : 2
     
QuestionID  :  11151         Subject Name  Operating Syatems Concepts
Q20. Which of the following CPU scheduling algorithm will prevent starvation
problem.
     1.  shortest-job-first
     2.  priority scheduling
     3.  priority scheduling with aging mechanism
     4.  None of the above
     Correct Answer : 3
     
QuestionID  :  11152         Subject Name  Operating Syatems Concepts
Q21. Kernel is
     1.  considered as critical part of operating system.
     2.  software which monitors operating system.
     3.  set of primitive functions upon which rest of operating system functions are built up.
     4.  none of the above.
     Correct Answer : 3
     
QuestionID  :  11157         Subject Name  Operating Syatems Concepts
Q22. At a perticular time of computation the value of counting semaphore
is 7. Then 20 `p` operation abd x `v` operation were completed on this semaphore.
If the final value of the semaphore is 5, x will be...
     1.  15
     2.  22
     3.  18
     4.  13
     Correct Answer : 3
     
QuestionID  :  11170         Subject Name  Operating Syatems Concepts
Q23. The process of loading the os into the main memory is done
by the bootstrap loader.
     Correct Answer : T
     
QuestionID  :  11193         Subject Name  Operating Syatems Concepts
Q24. A___________ operating system is an operating syatem which
requires a timely response from a computer system
     1.  Batch os
     2.  Workstation
     3.  a and b
     4.  None of the above
     Correct Answer : 4
     
QuestionID  :  11194         Subject Name  Operating Syatems Concepts
Q25. following is a path under execution
     1.  directory
     2.  file
     3.  thread
     4.  all
     Correct Answer : 3
     
QuestionID  :  11202         Subject Name  Operating Syatems Concepts
Q26. Supervisor call
     1.  is call made by supervisor of the system
     2.  is a call with control functions
     3.  are previlaged calls that are used to perform resource management functions which are controlled by operating system.
     4.  is a call made by someone working in root directory.
     Correct Answer : 3
     
QuestionID  :  11217         Subject Name  Operating Syatems Concepts
Q27. Which of the following page replacement algorithms
suffers from Belady`s anomaly?
     1.  Optimal replacement
     2.  LRU
     3.  FIFO
     4.  Both optimal replacement and FIFO
     Correct Answer : 3
     
QuestionID  :  11227         Subject Name  Operating Syatems Concepts
Q28. DOS is an example of ...... user system
     1.  Multiuser system
     2.  Single user system
     3.  both 1 and 2
     4.  none of the above
     Correct Answer : 2
     
QuestionID  :  11246         Subject Name  Operating Syatems Concepts
Q29. Blocking primitives are also called as synchronous communication
     Correct Answer : T
     
QuestionID  :  11248         Subject Name  Operating Syatems Concepts
Q30. which of the following is page replacement algorithim
     1.  FIFO Page replacement
     2.  LRU
     3.  
optimal page replacement
     4.  all
     Correct Answer : 4
     
QuestionID  :  11250         Subject Name  Operating Syatems Concepts
Q31. single system image is obtained in case of Distributed system
     Correct Answer : T
     
QuestionID  :  11251         Subject Name  Operating Syatems Concepts
Q32. Unix is a Multiuser,Multitasking,Multiprocessing Operating system.
     Correct Answer : T
     
QuestionID  :  11252         Subject Name  Operating Syatems Concepts
Q33. Device Controller is a Hardware
     Correct Answer : F
     
QuestionID  :  11255         Subject Name  Operating Syatems Concepts
Q34. Consider a system having m resources of same type.The resources are shared by
3 processes A,B ,C which have peak time demands of 3,4,6 respctively.The minimum
value of m that ensures that deadlock will never occur is
     1.  11
     2.  12
     3.  13
     4.  14
     Correct Answer : 1
     
QuestionID  :  11256         Subject Name  Operating Syatems Concepts
Q35. The context of a process is the union of its
     1.  region table,uarea,system level context & user level context
     2.  register context,pregion table,user level context
     3.  System level context,register context,user level context
     4.  process table,user level context,register context
     Correct Answer : 1
     
QuestionID  :  11268         Subject Name  Operating Syatems Concepts
Q36. m processes share n resources of the same type .The maximum need of
each process does not exceed n and the sum of all their maximum needs
is always less than m+n.In this set up deadlock --------.
     1.  can never occur
     2.  may occur
     3.  has to occur
     4.  none of the above
     Correct Answer : 1
     
QuestionID  :  11270         Subject Name  Operating Syatems Concepts
Q37. Within `` piping and redirection metacharacters cannot be used.
     Correct Answer : F
     
QuestionID  :  11271         Subject Name  Operating Syatems Concepts
Q38. Unix is the example of the Distributed operating system
     Correct Answer : T
     
QuestionID  :  11272         Subject Name  Operating Syatems Concepts
Q39. which of the following is false
     1.  deadlock state is unsafe
     2.  unsafe state may lead to deadlock situation
     3.  unsafe state must lead to deadlock situation
     4.  deadlock system is subset of unsafe system
     Correct Answer : 3
     
QuestionID  :  11275         Subject Name  Operating Syatems Concepts
Q40. a demand paging system with page table held in registers takes 5 milli sec to service a page fault, if an empty page is available,
or if page to be replaced is not dirty. It takes 50 milli sec if the replaced page is dirty. memory access time is 1 micro sec,
assume we want an effective access time of 2 micro sec and that page to be replaced is dirty 60% of time, what is the approximate
maximum acceptible page fault rate to meet this access time requirement
     1.  0.1%
     2.  1.0%
     3.  2.5%
     4.  0.01%
     Correct Answer : 4
     
QuestionID  :  11282         Subject Name  Operating Syatems Concepts
Q41. Round Robin algorithm is an example timesharing scheduling policy.
     Correct Answer : T
     
QuestionID  :  11285         Subject Name  Operating Syatems Concepts
Q42. Locality of reference implies that the page reference being made by a process
     1.  will always be to the page used in previous page refernce
     2.  is likely to be one of the pages used in the last few page references
     3.  will always be one of the pages existing in memory
     4.  will always lead to a page fault
     Correct Answer : 2
     
QuestionID  :  11287         Subject Name  Operating Syatems Concepts
Q43. Th e correct matching of the following pairs :
A. disk sccheduling 1.round robin
B. batch processing 2.scan
C. time sharing 3. LIFO
D. interrupt processing 4.FIFO
     1.  A-3,B-4,C-2,D-1
     2.  A-4,B-3,C-2,D-1
     3.  A-2,B-4,C-1,D-3
     4.  A-2,B-1,C-4,D-3
     Correct Answer : 3
     
QuestionID  :  11290         Subject Name  Operating Syatems Concepts
Q44. Mutex is an acronym for Mutual Exclusion.
     Correct Answer : T
     
QuestionID  :  11302         Subject Name  Operating Syatems Concepts
Q45. Main advantage of EISA bus over micro channel bus was:
     1.  it offered more bandwidth over micro channel
     2.  it had software configurable devices
     3.  it was backward compatible with ISA
     4.  it made the existing peripherals run faster
     Correct Answer : 2
     
QuestionID  :  11306         Subject Name  Operating Syatems Concepts
Q46. Multiprograming degenrates to time sharing system
if there is no proper mix of CPU and i/o bound jobs
     Correct Answer : F
     
QuestionID  :  11309         Subject Name  Operating Syatems Concepts
Q47. Single system image is obtained in case of ----
     1.  desktop
     2.  Distributed
     3.  network
     4.  none
     Correct Answer : 2
     
QuestionID  :  11310         Subject Name  Operating Syatems Concepts
Q48. Circuit switching has two variants -connection oriented and
connectionless
     Correct Answer : F
     
QuestionID  :  11311         Subject Name  Operating Syatems Concepts
Q49. 80826 the addressing schema is __________ addressing
     1.  8 bit
     2.  16 bit
     3.  24 bit
     4.  28 bit
     Correct Answer : 3
     
QuestionID  :  11624         Subject Name  Operating Syatems Concepts
Q50. Unix is a network operating system
     Correct Answer : T
     

Top of Form
QuestionID  :  11063         Subject Name  Operating Syatems Concepts
Q1. Tape is magnetic device.
     Correct Answer : T
     
QuestionID  :  11070         Subject Name  Operating Syatems Concepts
Q2. During the process of loading the program, a __________ modifies the actual
instruction so that the effect of load address is taken into account
     1.  resource locator
     2.  loader
     3.  relocating loader
     4.  relocation register
     Correct Answer : 4
     
QuestionID  :  11072         Subject Name  Operating Syatems Concepts
Q3. Relocation and address translation can be achieved with the help of paging
     Correct Answer : T
     
QuestionID  :  11074         Subject Name  Operating Syatems Concepts
Q4. LAN covers radius of up to 10 KM
     Correct Answer : F
     
QuestionID  :  11078         Subject Name  Operating Syatems Concepts
Q5. time sharing system uses round robin scheduling algorithmn.
     Correct Answer : T
     
QuestionID  :  11084         Subject Name  Operating Syatems Concepts
Q6. If the scheduling policy is FCFS the average waiting time will be?
     1.  12.8 ms
     2.  8 ms
     3.  16 ms
     4.  none of the above
     Correct Answer : 1
     
QuestionID  :  11090         Subject Name  Operating Syatems Concepts
Q7. Spatial locality refers to the problem that once a
location is referenced
     1.  it will not be referenced again.
     2.  it will be referenced again.
     3.  A nearby location will be referenced soon.
     4.  none of the above.
     Correct Answer : 3
     
QuestionID  :  11099         Subject Name  Operating Syatems Concepts
Q8. With a single resource deadlock occures
     1.  if there are more than two processes computing for that resource
     2.  if there are only than two processes computing for that resource
     3.  if there are a single process computing for that resource
     4.  None of the above
     Correct Answer : 4
     
QuestionID  :  11106         Subject Name  Operating Syatems Concepts
Q9. NRU stands for NOT RECENTLY USED & LRU stands for LEAST RECENTLY USED
     Correct Answer : T
     
QuestionID  :  11109         Subject Name  Operating Syatems Concepts
Q10. The following is a part of FAT.
     1.  Sector info.
     2.  Disk type
     3.  Modified info.
     4.  Date info.
     Correct Answer : 1
     
QuestionID  :  11111         Subject Name  Operating Syatems Concepts
Q11. Time elapsed for position of Read / Write head under the desired sector is called?
     1.  Seek Time
     2.  Latency Time
     3.  Turnaround Time
     4.  None of above
     Correct Answer : 2
     
QuestionID  :  11115         Subject Name  Operating Syatems Concepts
Q12.
the address sequence generated by a particular program executing in
demand paging with 100 records per page with one free memory
frame is recorded.what is the number of page fault;
100,200,430,499,510,530,560,120,220,240,260,320,370
     1.  13
     2.  7
     3.  8
     4.  10
     Correct Answer : 4
     
QuestionID  :  11125         Subject Name  Operating Syatems Concepts
Q13. ________ is an example of sharable resource and __________ is an example of non Sharable resouece.
     1.  Memory,Terminal.
     2.  Mouse,KeyBoard
     3.  Monitor,CPU
     4.  None of above.
     Correct Answer : 1
     
QuestionID  :  11126         Subject Name  Operating Syatems Concepts
Q14. Round-Robbin understands priority?
     Correct Answer : F
     
QuestionID  :  11132         Subject Name  Operating Syatems Concepts
Q15. Critical region is
     1.  a part of operating system which is not allowed to be accessed by any process.
     2.  a set of instructions that access common shared resource which exclude one another in time.
     3.  the portion of main memory which can be accessed only by one process at a time.
     4.  None of the above.
     Correct Answer : 2
     
QuestionID  :  11133         Subject Name  Operating Syatems Concepts
Q16. Pipe is the mechanism whereby the output of one process is directed into input of another process
     Correct Answer : T
     
QuestionID  :  11136         Subject Name  Operating Syatems Concepts
Q17. Efficient operation of computer system and Convinience for user
are the goals of operating system.
     Correct Answer : T
     
QuestionID  :  11138         Subject Name  Operating Syatems Concepts
Q18. Which of the following cpu schedulling algorithms will prevented stravation?
     1.  shortest-job-first
     2.  priority schedulling algorithm
     3.  priority schedulling will againg mechanism
     4.  none
     Correct Answer : 3
     
QuestionID  :  11140         Subject Name  Operating Syatems Concepts
Q19. The first-fit,best-fit,worst-fit algorithm can be used for
     1.  Contiguous memory allocation
     2.  Linked memory allocation
     3.  Indexed memory allocation
     4.  All of the above
     Correct Answer : 1
     
QuestionID  :  11141         Subject Name  Operating Syatems Concepts
Q20. Which of the following statement is true?
     1.  A computer Virus is complete program that makes active attacks.
     2.  A computer virus is program segment that makes passive attatcks.
     3.  A logic bomb is program segment that makes passive attacks.
     4.  A logic bomb is program that makes active attacks.
     Correct Answer : 1
     
QuestionID  :  11145         Subject Name  Operating Syatems Concepts
Q21. A file system uses the contiguous space allocation mechanism for disk allocation .For better utilization of disk space ,this file system must use
     1.  A garbage collection mechanism
     2.  A disk compaction mechanism
     3.  A linked-block allocation mechanism
     4.  An indexed-block allocation mechanism
     Correct Answer : 4
     
QuestionID  :  11150         Subject Name  Operating Syatems Concepts
Q22. If the C.P.U. scheduling Policy is priority scheduing without the
pre-emption the average waiting time will be_________
     1.  12.8 ms
     2.  11.8 ms
     3.  10.8 ms
     4.  none of the above
     Correct Answer : 3
     
QuestionID  :  11153         Subject Name  Operating Syatems Concepts
Q23. A purpose of virtual memory system is to
     1.  Allow multiprocessing
     2.  Allow multiprogramming
     3.  Allow batch processing
     4.  Allow execution of program that larger memory than the size of the physical main memory.
     Correct Answer : 4
     
QuestionID  :  11157         Subject Name  Operating Syatems Concepts
Q24. At a perticular time of computation the value of counting semaphore
is 7. Then 20 `p` operation abd x `v` operation were completed on this semaphore.
If the final value of the semaphore is 5, x will be...
     1.  15
     2.  22
     3.  18
     4.  13
     Correct Answer : 3
     
QuestionID  :  11160         Subject Name  Operating Syatems Concepts
Q25. An OS is the interface between Hardware and user.
     Correct Answer : T
     
QuestionID  :  11161         Subject Name  Operating Syatems Concepts
Q26. The main purpose(s)of an operating system is/are________
     1.  Convenience for the user.
     2.  Efficient operation of the Computer system.
     3.  Optimal use of Computer resources.
     4.  All of the above
     Correct Answer : 4
     
QuestionID  :  11167         Subject Name  Operating Syatems Concepts
Q27. In the context of concurrent processes ,____________ is used to control the access
to shared the data
     1.  semaphore
     2.  deadlock
     3.  monitor
     4.  ALU
     Correct Answer : 1
     
QuestionID  :  11171         Subject Name  Operating Syatems Concepts
Q28. Memory protection is of no use in a ...
     1.  single user system
     2.  non-multiprogramming system
     3.  non-multitasking system
     4.  none of above
     Correct Answer : 4
     
QuestionID  :  11183         Subject Name  Operating Syatems Concepts
Q29. Cascading Termination refers to termination of all child processes
before parent terminates
     1.  normally
     2.  abnormally
     3.  normally and abnormally
     4.  none of above
     Correct Answer : 4
     
QuestionID  :  11186         Subject Name  Operating Syatems Concepts
Q30. The size of virtual memory depends on the size of the
     1.  data bus
     2.  main memory
     3.  address bus
     4.  none
     Correct Answer : 3
     
QuestionID  :  11187         Subject Name  Operating Syatems Concepts
Q31. `Aging` is
     1.  keeping track of cache contents
     2.  keeping track of what pages are currently residing in the memory
     3.  keeping track how many times the given page is refrenced
     4.  increasing the priority of jobs to ensure termination in a finite time
     Correct Answer : 4
     
QuestionID  :  11190         Subject Name  Operating Syatems Concepts
Q32. Which of the following CPU scheduling algorithms will prevent starvation problem?
     1.  shortest job first
     2.  priority scheduling
     3.  priority scheduling with aging mechanism
     4.  none of the above
     Correct Answer : 3
     
QuestionID  :  11197         Subject Name  Operating Syatems Concepts
Q33. If property of locality of reference is well pronounced in a
program
     1.  number of page faults will be more.
     2.  number of page faults will be less and execution will be faster.
     3.  number of page faults will remain same.
     4.  none of the above.
     Correct Answer : 2
     
QuestionID  :  11199         Subject Name  Operating Syatems Concepts
Q34. Which of the following is not a part of a process control block(PCB).
     1.  Values of a CPU registers
     2.  CPU Scheduling information
     3.  Memory limits of the process
     4.  List of files accessible to the proces.
     Correct Answer : 4
     
QuestionID  :  11201         Subject Name  Operating Syatems Concepts
Q35. Following is not a IPC
     1.  semaphore
     2.  pipe
     3.  shared memory
     4.  Buffering
     Correct Answer : 1
     
QuestionID  :  11218         Subject Name  Operating Syatems Concepts
Q36. In partitioned memory allocation scheme the ________
     1.  Best fit Algorithm is always better then the first fit algorithm.
     2.  First fit Algorithm is always better then the Best fit algorithm.
     3.  Superiority of the first fit & best fit depends
on the sequence of memory request .
     4.  none of the above.
     Correct Answer : 3
     
QuestionID  :  11223         Subject Name  Operating Syatems Concepts
Q37. If there are 32 segments ,each of size 1 kbytes,then the logical
address should have-----.
     1.  13 bits
     2.  14 bits
     3.  15 bits
     4.  16 bits
     Correct Answer : 3
     
QuestionID  :  11224         Subject Name  Operating Syatems Concepts
Q38. Which of the following are RTOS ?
     1.  An on-line railway reservation system
     2.  A process control system.
     3.  Aircraft control system.
     4.  Payroll processing system.
     Correct Answer : 3
     
QuestionID  :  11235         Subject Name  Operating Syatems Concepts
Q39. The Motivations Behind Networks are
1)Resource Sharing
2)Computation Speedup
3)Reliability
4)Communication
     1.  1,2
     2.  1,3
     3.  only 3
     4.  All the Above
     Correct Answer : 4
     
QuestionID  :  11244         Subject Name  Operating Syatems Concepts
Q40. Round Robin is an example of timesharing scheduling policy.
     Correct Answer : T
     
QuestionID  :  11261         Subject Name  Operating Syatems Concepts
Q41. In a paged memory the page hit ratio is 0.35.The time required to access a page in secondary memory is equal to 100ns.
the time required to access a page in primary memory is 10ns.The average time required to access a page is
     1.  3.0ns
     2.  68.0ns
     3.  68.5ns
     4.  78.5ns
     Correct Answer : 3
     
QuestionID  :  11264         Subject Name  Operating Syatems Concepts
Q42. The problem of Thrashing may be reduced by ______________
     1.  using prepaging mechanism
     2.  writing well structured programs
     3.  both 1 & 2
     4.  neither 1 & 2
     Correct Answer : 3
     
QuestionID  :  11266         Subject Name  Operating Syatems Concepts
Q43. The problem of thrashing may be reduced by
     1.  Using prepaging mechanism
     2.  writing well structured program.
     3.  Both 1 & 2
     4.  Neither 1 & 2
     Correct Answer : 3
     
QuestionID  :  11272         Subject Name  Operating Syatems Concepts
Q44. which of the following is false
     1.  deadlock state is unsafe
     2.  unsafe state may lead to deadlock situation
     3.  unsafe state must lead to deadlock situation
     4.  deadlock system is subset of unsafe system
     Correct Answer : 3
     
QuestionID  :  11274         Subject Name  Operating Syatems Concepts
Q45. If filenames are supplied as arguments to a script rm"$@" would remove all files supplied as arguments.
     Correct Answer : T
     
QuestionID  :  11277         Subject Name  Operating Syatems Concepts
Q46. Which of the Following operating Systems are not available for
non-intel platforms
     1.  Windows NT
     2.  Solaris
     3.  Linux
     4.  All of the above
     Correct Answer : 2
     
QuestionID  :  11284         Subject Name  Operating Syatems Concepts
Q47. The interval from the time of submission of a process to the time of completion is
     1.  Turnaround time
     2.  waiting time
     3.  response time
     4.  none of these
     Correct Answer : 1
     
QuestionID  :  11285         Subject Name  Operating Syatems Concepts
Q48. Locality of reference implies that the page reference being made by a process
     1.  will always be to the page used in previous page refernce
     2.  is likely to be one of the pages used in the last few page references
     3.  will always be one of the pages existing in memory
     4.  will always lead to a page fault
     Correct Answer : 2
     
QuestionID  :  11309         Subject Name  Operating Syatems Concepts
Q49. Single system image is obtained in case of ----
     1.  desktop
     2.  Distributed
     3.  network
     4.  none
     Correct Answer : 2
     
QuestionID  :  11310         Subject Name  Operating Syatems Concepts
Q50. Circuit switching has two variants -connection oriented and
connectionless
     Correct Answer : F
     
Top of Form
QuestionID  :  11059         Subject Name  Operating Syatems Concepts
Q1. The CPU utilization is low when the system is
     1.  Time sharing
     2.  Thrashing
     3.  Multiprocessing
     4.  None of the above
     Correct Answer : 2
     
QuestionID  :  11071         Subject Name  Operating Syatems Concepts
Q2. ------ scheduler selects the process that is ready to execute to CPU.
     1.  long-term scheduler
     2.  short-term scheduler
     3.  medium-term scheduler
     4.  None of these
     Correct Answer : 2
     
QuestionID  :  11074         Subject Name  Operating Syatems Concepts
Q3. LAN covers radius of up to 10 KM
     Correct Answer : F
     
QuestionID  :  11083         Subject Name  Operating Syatems Concepts
Q4. A process refers to 5 pages, A,B,C,D & E in the order - A; B; C; D; A; B;
E; A; B; C; D; E. If the page replacement algorithm is FIFO,the number
of pages which transfer with an emty internal store of 3 frames is
     1.  8
     2.  10
     3.  9
     4.  7
     Correct Answer : 3
     
QuestionID  :  11088         Subject Name  Operating Syatems Concepts
Q5. Disk request come to a disk driver for cylinders in the order 10,22,20,2,40,6 and 38, at time when the disk drive is reading from cylinder 20.
The seek time is 6 ms per cylinder. the total seek time, if the disk arm sheduling algorithm is first come first served is
     1.  360 ms
     2.  850 ms
     3.  900 ms
     4.  none of above
     Correct Answer : 4
     
QuestionID  :  11093         Subject Name  Operating Syatems Concepts
Q6. SPOOLING stands for simultaneous peripheral operation online.
     Correct Answer : T
     
QuestionID  :  11101         Subject Name  Operating Syatems Concepts
Q7. The following is not a form of IPC.
     1.  semaphore
     2.  pipe
     3.  shared memory
     4.  buffering
     Correct Answer : 1
     
QuestionID  :  11102         Subject Name  Operating Syatems Concepts
Q8. Disk request come to a disk driver for cylinders in the order 10,22,20,2,40,6 and 38, at time when the disk drive is reading from cylinder 20.
The seek time is 6 ms per cylinder. the total seek time, if the disk arm sheduling algorithm is closest cylinder next is
     1.  360 ms
     2.  876 ms
     3.  850 ms
     4.  900 ms
     Correct Answer : 1
     
QuestionID  :  11105         Subject Name  Operating Syatems Concepts
Q9. It is possible to have a deadlock involving only a single process
     Correct Answer : F
     
QuestionID  :  11110         Subject Name  Operating Syatems Concepts
Q10. The signal the keyboard sends to the computer is special kind of
message called__________
     1.  Keyboard request
     2.  Keyboard controller
     3.  Interrupt Controller
     4.  Interrupt Request
     Correct Answer : 4
     
QuestionID  :  11115         Subject Name  Operating Syatems Concepts
Q11.
the address sequence generated by a particular program executing in
demand paging with 100 records per page with one free memory
frame is recorded.what is the number of page fault;
100,200,430,499,510,530,560,120,220,240,260,320,370
     1.  13
     2.  7
     3.  8
     4.  10
     Correct Answer : 4
     
QuestionID  :  11118         Subject Name  Operating Syatems Concepts
Q12. Protection of memory is ensured using ------- and -------.
     1.  paging,virtual memory
     2.  base register ,limit register
     3.  IP egister,hardware register
     4.  scheduling,synchronization
     Correct Answer : 2
     
QuestionID  :  11119         Subject Name  Operating Syatems Concepts
Q13. Which of the following is true?

a) Overlays are used to increase the size of physical memory
b) Overlays are used to increase the logical address space
c) when overlays are used the size of project is not limited to the size of physical memory
d) Overlays are used whenever the physical address space is smaller than the logical address space
     1.  a and b
     2.  only c
     3.  only a
     4.  none of the above
     Correct Answer : 2
     
QuestionID  :  11122         Subject Name  Operating Syatems Concepts
Q14. Banker`s algorithm is an example of Deadlock avoidance.
     Correct Answer : T
     
QuestionID  :  11125         Subject Name  Operating Syatems Concepts
Q15. ________ is an example of sharable resource and __________ is an example of non Sharable resouece.
     1.  Memory,Terminal.
     2.  Mouse,KeyBoard
     3.  Monitor,CPU
     4.  None of above.
     Correct Answer : 1
     
QuestionID  :  11141         Subject Name  Operating Syatems Concepts
Q16. Which of the following statement is true?
     1.  A computer Virus is complete program that makes active attacks.
     2.  A computer virus is program segment that makes passive attatcks.
     3.  A logic bomb is program segment that makes passive attacks.
     4.  A logic bomb is program that makes active attacks.
     Correct Answer : 1
     
QuestionID  :  11148         Subject Name  Operating Syatems Concepts
Q17. Which of the following is the most suitable scheduling scheme in
real time operating system.
     1.  round robin
     2.  first come first served
     3.  pre-emtive scheduling
     4.  random scheduling
     Correct Answer : 3
     
QuestionID  :  11165         Subject Name  Operating Syatems Concepts
Q18. Bankers algorithm is an example of deadlock avoidance.
     Correct Answer : T
     
QuestionID  :  11167         Subject Name  Operating Syatems Concepts
Q19. In the context of concurrent processes ,____________ is used to control the access
to shared the data
     1.  semaphore
     2.  deadlock
     3.  monitor
     4.  ALU
     Correct Answer : 1
     
QuestionID  :  11168         Subject Name  Operating Syatems Concepts
Q20. Which of the following are single user Operating Systems.
     1.  MS-DOS Only
     2.  Unix
     3.  MS-DOS,Xenix
     4.  OS/2.
     Correct Answer : 3
     
QuestionID  :  11172         Subject Name  Operating Syatems Concepts
Q21. Andrew and Sprite are examples of Distributed operating system.
     Correct Answer : T
     
QuestionID  :  11180         Subject Name  Operating Syatems Concepts
Q22. During system stratup,program execution begin at address FFFOH
     Correct Answer : T
     
QuestionID  :  11182         Subject Name  Operating Syatems Concepts
Q23. In Round robin CPU scheduling as the time quantum is incresed
the average turn around time ....
     1.  Increases
     2.  Decreases
     3.  Varies
     4.  Varies irregularly.
     Correct Answer : 4
     
QuestionID  :  11186         Subject Name  Operating Syatems Concepts
Q24. The size of virtual memory depends on the size of the
     1.  data bus
     2.  main memory
     3.  address bus
     4.  none
     Correct Answer : 3
     
QuestionID  :  11189         Subject Name  Operating Syatems Concepts
Q25. In paged memory system if the page size is increased then internal fragmentation generally.
     1.  becomes less
     2.  becomes more
     3.  remains constant
     4.  none of the above
     Correct Answer : 2
     
QuestionID  :  11193         Subject Name  Operating Syatems Concepts
Q26. A___________ operating system is an operating syatem which
requires a timely response from a computer system
     1.  Batch os
     2.  Workstation
     3.  a and b
     4.  None of the above
     Correct Answer : 4
     
QuestionID  :  11195         Subject Name  Operating Syatems Concepts
Q27. Suppose the architecture of a computer system
is layered into the following four layers:-
     1.  Operating System software.
     2.  users application software.
     3.  hardware and programming environment software.
     4.  all of the above.
     Correct Answer : 4
     
QuestionID  :  11201         Subject Name  Operating Syatems Concepts
Q28. Following is not a IPC
     1.  semaphore
     2.  pipe
     3.  shared memory
     4.  Buffering
     Correct Answer : 1
     
QuestionID  :  11203         Subject Name  Operating Syatems Concepts
Q29. The protected mode is necessary for :-
     1.  Multitasking system.
     2.  Multiuser System.
     3.  both 1 & 2
     4.  16 bit programming.
     Correct Answer : 1
     
QuestionID  :  11204         Subject Name  Operating Syatems Concepts
Q30. _________ sheduler select the process that is ready to execute to CPU.
     1.  Long term
     2.  Short term
     3.  medium term
     4.  none of above
     Correct Answer : 2
     
QuestionID  :  11217         Subject Name  Operating Syatems Concepts
Q31. Which of the following page replacement algorithms
suffers from Belady`s anomaly?
     1.  Optimal replacement
     2.  LRU
     3.  FIFO
     4.  Both optimal replacement and FIFO
     Correct Answer : 3
     
QuestionID  :  11233         Subject Name  Operating Syatems Concepts
Q32. Which of the following statement is true for dead lock?
     1.  The system can not run any process.
     2.  The system can not run any process barring all those involved in the deadlock?
     3.  A running process can not request any new response.
     4.  All processes in the ready queue enter the wait.
     Correct Answer : 1
     
QuestionID  :  11234         Subject Name  Operating Syatems Concepts
Q33. The time of admission of a job to ready queue to completion is ______ .
     1.  turn-arround time
     2.  burst time
     3.  response time
     4.  None of above
     Correct Answer : 1
     
QuestionID  :  11245         Subject Name  Operating Syatems Concepts
Q34. The segmented memory is provided mainly
     1.  for higher speeds
     2.  to maintain compatibity with old processors
     3.  for ease of application programming
     4.  simple hardware
     Correct Answer : 1
     
QuestionID  :  11249         Subject Name  Operating Syatems Concepts
Q35. Which of the following is not features of RISC architecture.
     1.  A limited instruction set.
     2.  A large number of registers.
     3.  Virtual memory
     4.  The large number of execution modes.
     Correct Answer : 2
     
QuestionID  :  11250         Subject Name  Operating Syatems Concepts
Q36. single system image is obtained in case of Distributed system
     Correct Answer : T
     
QuestionID  :  11251         Subject Name  Operating Syatems Concepts
Q37. Unix is a Multiuser,Multitasking,Multiprocessing Operating system.
     Correct Answer : T
     
QuestionID  :  11252         Subject Name  Operating Syatems Concepts
Q38. Device Controller is a Hardware
     Correct Answer : F
     
QuestionID  :  11262         Subject Name  Operating Syatems Concepts
Q39. Which schedular selects the process that is ready toexecute to CPU.
     1.  long term schedular
     2.  mid-term schedular
     3.  short-term schedular
     4.  any schedular does not do that task
     Correct Answer : 3
     
QuestionID  :  11272         Subject Name  Operating Syatems Concepts
Q40. which of the following is false
     1.  deadlock state is unsafe
     2.  unsafe state may lead to deadlock situation
     3.  unsafe state must lead to deadlock situation
     4.  deadlock system is subset of unsafe system
     Correct Answer : 3
     
QuestionID  :  11275         Subject Name  Operating Syatems Concepts
Q41. a demand paging system with page table held in registers takes 5 milli sec to service a page fault, if an empty page is available,
or if page to be replaced is not dirty. It takes 50 milli sec if the replaced page is dirty. memory access time is 1 micro sec,
assume we want an effective access time of 2 micro sec and that page to be replaced is dirty 60% of time, what is the approximate
maximum acceptible page fault rate to meet this access time requirement
     1.  0.1%
     2.  1.0%
     3.  2.5%
     4.  0.01%
     Correct Answer : 4
     
QuestionID  :  11284         Subject Name  Operating Syatems Concepts
Q42. The interval from the time of submission of a process to the time of completion is
     1.  Turnaround time
     2.  waiting time
     3.  response time
     4.  none of these
     Correct Answer : 1
     
QuestionID  :  11285         Subject Name  Operating Syatems Concepts
Q43. Locality of reference implies that the page reference being made by a process
     1.  will always be to the page used in previous page refernce
     2.  is likely to be one of the pages used in the last few page references
     3.  will always be one of the pages existing in memory
     4.  will always lead to a page fault
     Correct Answer : 2
     
QuestionID  :  11295         Subject Name  Operating Syatems Concepts
Q44. Suppose the following files are present in the current directory:
ashish arctan dac.doc dim.dwg document
fag fibonacci finder fog folder
sam si.c tarun zenith zombie
Which files would be listed by the following command?
Is [!0-9][!asd]*
     1.  Display all the files whose first character is other than a digit and the second character is other than `a`, `s` or `d`
     2.  Display all the files whose first character is other than a digit and the second character is other than `a`, `s`
     3.  Display all the files
     4.  None of the above
     Correct Answer : 1
     
QuestionID  :  11296         Subject Name  Operating Syatems Concepts
Q45. The signal the keyboard sends to the computer is a special kind of
message called ______
     1.  Keyboard request
     2.  Keyboard controller
     3.  Interrupt controller
     4.  Interrupt request
     Correct Answer : 4
     
QuestionID  :  11303         Subject Name  Operating Syatems Concepts
Q46. b=
[-n $b]
echo $ ?
[-z $b]
echo $?
     1.  Will run fine
     2.  test : argument expected
     3.  error
     4.  none
     Correct Answer : 2
     
QuestionID  :  11308         Subject Name  Operating Syatems Concepts
Q47. A space allocated in units of fixed size is called block
     Correct Answer : T
     
QuestionID  :  11310         Subject Name  Operating Syatems Concepts
Q48. Circuit switching has two variants -connection oriented and
connectionless
     Correct Answer : F
     
QuestionID  :  11623         Subject Name  Operating Syatems Concepts
Q49. It is possible to have a dead lock involving only a single process
     Correct Answer : F
     
QuestionID  :  12261         Subject Name  Operating Syatems Concepts
Q50. The __________ decodes an instruction and generates an electrical signal
     1.  Arithematic and logic unit
     2.  Main Memory
     3.  Bios
     4.  Control Unit
     Correct Answer : 4




Top of Form
QuestionID  :  11056         Subject Name  Operating Syatems Concepts
Q1. The cpu utilization is low when the system is
     1.  executing
     2.  thrasing
     3.  waiting
     4.  all of the above
     Correct Answer : 2
      0
QuestionID  :  11057         Subject Name  Operating Syatems Concepts
Q2. Which of the following is non preemtive O.S.?
     1.  Unix
     2.  Windows 95
     3.  Windows NT
     4.  None
     Correct Answer : 2
     
QuestionID  :  11064         Subject Name  Operating Syatems Concepts
Q3. FAT stands for
     1.  File Allocation Table
     2.  File Access Table
     3.  File Attribute Table
     4.  None of the above
     Correct Answer : 1
     
QuestionID  :  11065         Subject Name  Operating Syatems Concepts
Q4. A programm can execute more than once simultaneously is called
     1.  re-executable
     2.  re-entrant
     3.  multiprogramming
     4.  none of the above
     Correct Answer : 2
     
QuestionID  :  11067         Subject Name  Operating Syatems Concepts
Q5. A virus is a type of worm
     Correct Answer : F
     
QuestionID  :  11069         Subject Name  Operating Syatems Concepts
Q6. To obtain better memory utilization , dynamic loading is used. With dynamic loading , routine is not loaded until it is called for. For implementing dynamic loading
     1.  special support from hardware is essential
     2.  special support from OS is essential
     3.  special support from both hardware and OS is essential
     4.  user programss can implement dynamic loading without any special support form the OS or the hardware
     Correct Answer : 4
     
QuestionID  :  11070         Subject Name  Operating Syatems Concepts
Q7. During the process of loading the program, a __________ modifies the actual
instruction so that the effect of load address is taken into account
     1.  resource locator
     2.  loader
     3.  relocating loader
     4.  relocation register
     Correct Answer : 4
     
QuestionID  :  11071         Subject Name  Operating Syatems Concepts
Q8. ------ scheduler selects the process that is ready to execute to CPU.
     1.  long-term scheduler
     2.  short-term scheduler
     3.  medium-term scheduler
     4.  None of these
     Correct Answer : 2
     
QuestionID  :  11073         Subject Name  Operating Syatems Concepts
Q9. A thread is a light-weight process.
     Correct Answer : T
     
QuestionID  :  11074         Subject Name  Operating Syatems Concepts
Q10. LAN covers radius of up to 10 KM
     Correct Answer : F
     
QuestionID  :  11081         Subject Name  Operating Syatems Concepts
Q11. The transfer of process from memory to secondary storage is called
     1.  Process loading
     2.  swapping
     3.  segmentation
     4.  relocating
     Correct Answer : 2
     
QuestionID  :  11082         Subject Name  Operating Syatems Concepts
Q12. paging allows protection
     Correct Answer : F
     
QuestionID  :  11086         Subject Name  Operating Syatems Concepts
Q13. Page Fault occurs when
     1.  the page is corrupted by application software
     2.  the page is in main memory
     3.  the page is not in main memory
     4.  one tries to divide a number by 0
     Correct Answer : 3
     
QuestionID  :  11087         Subject Name  Operating Syatems Concepts
Q14. FCFS stands for -----
     1.  Fast Come First Serve.
     2.  First Come First Serve.
     3.  Both are true.
     4.  Both are False.
     Correct Answer : 2
     
QuestionID  :  11091         Subject Name  Operating Syatems Concepts
Q15. Mutex is Mutual Exclusion semaphore.
     Correct Answer : T
     
QuestionID  :  11094         Subject Name  Operating Syatems Concepts
Q16. SPOOLING stands for _________
     1.  Simultaneous Peripheral Operations OnLine
     2.  Spontaneous Peripheral Operations OnLine
     3.  Serial
Peripheral Operations OnLine
     4.  None of the above
     Correct Answer : 1
     
QuestionID  :  11095         Subject Name  Operating Syatems Concepts
Q17. Page fault rate is a relation between number of page faults & number of the page frames allocated to the process.
     Correct Answer : T
     
QuestionID  :  11096         Subject Name  Operating Syatems Concepts
Q18. Turnaround refers to delay between job submission and job completion
     Correct Answer : T
     
QuestionID  :  11097         Subject Name  Operating Syatems Concepts
Q19. Which of the following is true?

a) the linkage editor is used to edit programs which have to be later linked together
b) the linkage editor links object modules during compiling or assembling
c) the linkage editor links object modules and resolves external references between them before loading
d) the linkage editor resolves external references between the object modules during execution time
     1.  only c
     2.  a and c
     3.  only b
     4.  all of the above
     Correct Answer : 1
     
QuestionID  :  11099         Subject Name  Operating Syatems Concepts
Q20. With a single resource deadlock occures
     1.  if there are more than two processes computing for that resource
     2.  if there are only than two processes computing for that resource
     3.  if there are a single process computing for that resource
     4.  None of the above
     Correct Answer : 4
     
QuestionID  :  11105         Subject Name  Operating Syatems Concepts
Q21. It is possible to have a deadlock involving only a single process
     Correct Answer : F
     
QuestionID  :  11107         Subject Name  Operating Syatems Concepts
Q22. _____________ is a significant factor in maintaining fragmentation
within usable limits
     1.  External Fragmentation
     2.  Paging
     3.  Coalescing of holes
     4.  Both 2 and 3
     Correct Answer : 4
     
QuestionID  :  11108         Subject Name  Operating Syatems Concepts
Q23. Pre-emptive scheduling is the strategy of temporarily suspending a running
process
     1.  before the cpu time slice expires
     2.  to allow starving process to run
     3.  when it request i/o
     4.  none of the above
     Correct Answer : 1
     
QuestionID  :  11110         Subject Name  Operating Syatems Concepts
Q24. The signal the keyboard sends to the computer is special kind of
message called__________
     1.  Keyboard request
     2.  Keyboard controller
     3.  Interrupt Controller
     4.  Interrupt Request
     Correct Answer : 4
     
QuestionID  :  11112         Subject Name  Operating Syatems Concepts
Q25. When fork() is given-
     1.  it creates a child process
     2.  allocates slot in process table
     3.  returns 0 to parent & ID to child
     4.  All of the above.
     Correct Answer : 1
     
QuestionID  :  11114         Subject Name  Operating Syatems Concepts
Q26. The problem of thrashing may be reduced by
     1.  Using preparing mechanism
     2.  Writing well structered programs
     3.  Both 1 and 2
     4.  Neither 1 nor 2
     Correct Answer : 3
     
QuestionID  :  11115         Subject Name  Operating Syatems Concepts
Q27.
the address sequence generated by a particular program executing in
demand paging with 100 records per page with one free memory
frame is recorded.what is the number of page fault;
100,200,430,499,510,530,560,120,220,240,260,320,370
     1.  13
     2.  7
     3.  8
     4.  10
     Correct Answer : 4
     
QuestionID  :  11117         Subject Name  Operating Syatems Concepts
Q28. Which of the following service is not supported by Operating system ?
     1.  Protection
     2.  Accounting
     3.  Compilation
     4.  I/O operation
     Correct Answer : 3
     
QuestionID  :  11118         Subject Name  Operating Syatems Concepts
Q29. Protection of memory is ensured using ------- and -------.
     1.  paging,virtual memory
     2.  base register ,limit register
     3.  IP egister,hardware register
     4.  scheduling,synchronization
     Correct Answer : 2
     
QuestionID  :  11124         Subject Name  Operating Syatems Concepts
Q30. Necessary condition for deadlock are
     1.  non preemption and circular wait
     2.  mutual exclusion and partial allocation
     3.  a and b
     4.  None of these
     Correct Answer : 3
     
QuestionID  :  11136         Subject Name  Operating Syatems Concepts
Q31. Efficient operation of computer system and Convinience for user
are the goals of operating system.
     Correct Answer : T
     
QuestionID  :  11137         Subject Name  Operating Syatems Concepts
Q32. When fork() is given-
     1.  it creates a child process.
     2.  Allocates slot in process table.
     3.  returns 0 to parent and ID to child.
     4.  all of the above.
     Correct Answer : 4
     
QuestionID  :  11140         Subject Name  Operating Syatems Concepts
Q33. The first-fit,best-fit,worst-fit algorithm can be used for
     1.  Contiguous memory allocation
     2.  Linked memory allocation
     3.  Indexed memory allocation
     4.  All of the above
     Correct Answer : 1
     
QuestionID  :  11142         Subject Name  Operating Syatems Concepts
Q34. The signal of the keyboard sends to the computer a special kind of
message called
     1.  keyboard request
     2.  keyboard controller
     3.  interrupt controller
     4.  interrupt request
     Correct Answer : 4
     
QuestionID  :  11143         Subject Name  Operating Syatems Concepts
Q35. Concurrent processes are processes that
     1.  Do not overlap in time
     2.  Overlap in time
     3.  Are executed by a processor at the same time
     4.  None of above
     Correct Answer : 2
     
QuestionID  :  11144         Subject Name  Operating Syatems Concepts
Q36. The time of admission of job to ready queue to completion is_______
     1.  Turnaround time
     2.  Burst time
     3.  Response time
     4.  None of the above.
     Correct Answer : 1
     
QuestionID  :  11145         Subject Name  Operating Syatems Concepts
Q37. A file system uses the contiguous space allocation mechanism for disk allocation .For better utilization of disk space ,this file system must use
     1.  A garbage collection mechanism
     2.  A disk compaction mechanism
     3.  A linked-block allocation mechanism
     4.  An indexed-block allocation mechanism
     Correct Answer : 4
     
QuestionID  :  11146         Subject Name  Operating Syatems Concepts
Q38. Disk scheduling involves deciding
     1.  which disk should be accessed next
     2.  the order in which disk access request must be serviced
     3.  the physical location where files should be accessed in the disk
     4.  none of the above
     Correct Answer : 2
     
QuestionID  :  11148         Subject Name  Operating Syatems Concepts
Q39. Which of the following is the most suitable scheduling scheme in
real time operating system.
     1.  round robin
     2.  first come first served
     3.  pre-emtive scheduling
     4.  random scheduling
     Correct Answer : 3
     
QuestionID  :  11149         Subject Name  Operating Syatems Concepts
Q40. The fastest strogage element is?
     1.  CDRAM
     2.  DRAM
     3.  EDO-DRAM
     4.  SDRAM
     Correct Answer : 2
     
QuestionID  :  11150         Subject Name  Operating Syatems Concepts
Q41. If the C.P.U. scheduling Policy is priority scheduing without the
pre-emption the average waiting time will be_________
     1.  12.8 ms
     2.  11.8 ms
     3.  10.8 ms
     4.  none of the above
     Correct Answer : 3
     
QuestionID  :  11151         Subject Name  Operating Syatems Concepts
Q42. Which of the following CPU scheduling algorithm will prevent starvation
problem.
     1.  shortest-job-first
     2.  priority scheduling
     3.  priority scheduling with aging mechanism
     4.  None of the above
     Correct Answer : 3
     
QuestionID  :  11154         Subject Name  Operating Syatems Concepts
Q43. A ___________ is an intermediate main memory storage area holding the data in
transit between user`s work area and the device
     1.  buffer
     2.  cache
     3.  back up
     4.  page
     Correct Answer : 1
     
QuestionID  :  11155         Subject Name  Operating Syatems Concepts
Q44. The page replacement policy that some times leads to more page faults when size of memory is increased is
     1.  FIFO
     2.  LRU
     3.  No such policy exists
     4.  None of above
     Correct Answer : 1
     
QuestionID  :  11161         Subject Name  Operating Syatems Concepts
Q45. The main purpose(s)of an operating system is/are________
     1.  Convenience for the user.
     2.  Efficient operation of the Computer system.
     3.  Optimal use of Computer resources.
     4.  All of the above
     Correct Answer : 4
     
QuestionID  :  11163         Subject Name  Operating Syatems Concepts
Q46. Determine the number of page faults when reference to pages occur in the
order -1,2,4,5,2,1,2,4.Assume that the main memory can accommodate 3
pages and the main memory already has the pages 1 and 2,with page 1
having been brought earlier than page 2(Assume LRU algorithm is used
     1.  3
     2.  5
     3.  4
     4.  none of the above
     Correct Answer : 3
     
QuestionID  :  11169         Subject Name  Operating Syatems Concepts
Q47. ________________is an example of sharable resource and __________is an example of nonsharable resource
     1.  memory,I/O devices
     2.  I/O devices,memory
     3.  memory,CPU-Clock
     4.  CPU-Clock,memory
     Correct Answer : 1
     
QuestionID  :  11173         Subject Name  Operating Syatems Concepts
Q48. Which of the following statement is true for a deadlock state
     1.  The system cannot run any process
     2.  The system can run process barring those involved in the deadlock
     3.  A running process cannot request any new resource
     4.  All processes in ready queue enter the wait
     Correct Answer : 4
     
QuestionID  :  11175         Subject Name  Operating Syatems Concepts
Q49. CPU performance is based on:-
     1.  ALU width.
     2.  Clock speed .
     3.  Number of instructions executed per second.
     4.  both a and b.
     Correct Answer : 3
     
QuestionID  :  11179         Subject Name  Operating Syatems Concepts
Q50. Thrashing is when more time is spent in paging
than in actually running program.
     Correct Answer : T
     
QuestionID  :  11181         Subject Name  Operating Syatems Concepts
Q51. Dijkstra`s banking algorithm in an o.s. solves the problem of
     1.  deadlock avoidance
     2.  deadlock detection
     3.  mutual exclusion
     4.  context switching
     Correct Answer : 1
     
QuestionID  :  11183         Subject Name  Operating Syatems Concepts
Q52. Cascading Termination refers to termination of all child processes
before parent terminates
     1.  normally
     2.  abnormally
     3.  normally and abnormally
     4.  none of above
     Correct Answer : 4
     
QuestionID  :  11187         Subject Name  Operating Syatems Concepts
Q53. `Aging` is
     1.  keeping track of cache contents
     2.  keeping track of what pages are currently residing in the memory
     3.  keeping track how many times the given page is refrenced
     4.  increasing the priority of jobs to ensure termination in a finite time
     Correct Answer : 4
     
QuestionID  :  11192         Subject Name  Operating Syatems Concepts
Q54. Premptive scheduling is the forceful deallocation of a resource.
     Correct Answer : T
     
QuestionID  :  11193         Subject Name  Operating Syatems Concepts
Q55. A___________ operating system is an operating syatem which
requires a timely response from a computer system
     1.  Batch os
     2.  Workstation
     3.  a and b
     4.  None of the above
     Correct Answer : 4
     
QuestionID  :  11195         Subject Name  Operating Syatems Concepts
Q56. Suppose the architecture of a computer system
is layered into the following four layers:-
     1.  Operating System software.
     2.  users application software.
     3.  hardware and programming environment software.
     4.  all of the above.
     Correct Answer : 4
     
QuestionID  :  11196         Subject Name  Operating Syatems Concepts
Q57. In a multi-user OS,20 requests are made to a particular resource per hour,on an average.The probability that no requests are made in 45 minutes is
     1.  (e)-15
     2.  (e)-5
     3.  1-(e)-5
     4.  1-(e)-10
     Correct Answer : 4
     
QuestionID  :  11199         Subject Name  Operating Syatems Concepts
Q58. Which of the following is not a part of a process control block(PCB).
     1.  Values of a CPU registers
     2.  CPU Scheduling information
     3.  Memory limits of the process
     4.  List of files accessible to the proces.
     Correct Answer : 4
     
QuestionID  :  11200         Subject Name  Operating Syatems Concepts
Q59. RAID level 3 is also known as
     1.  memory-style error-correcting code.
     2.  Block-interleaved parity organization.
     3.  Bit-interleaved parity organization.
     4.  All of the above
     Correct Answer : 2
     
QuestionID  :  11201         Subject Name  Operating Syatems Concepts
Q60. Following is not a IPC
     1.  semaphore
     2.  pipe
     3.  shared memory
     4.  Buffering
     Correct Answer : 1
     
QuestionID  :  11206         Subject Name  Operating Syatems Concepts
Q61. For implementing a multiprogramming Operating System _________
     1.  special support from processor is required
     2.  special support from processor is not essential
     3.  cache memory must be available
     4.  more than one processor must be available
     Correct Answer : 2
     
QuestionID  :  11207         Subject Name  Operating Syatems Concepts
Q62. A process is Thrashing if it spends more time on execution than paging
     1.  True
     2.  False
     3.  None of the above.
     4.  Partially True
     Correct Answer : 2
     
QuestionID  :  11208         Subject Name  Operating Syatems Concepts
Q63. In multi programming environment
     1.  A processor executes more than one process at a time.
     2.  The program are developed by more than one person.
     3.  More than one process resides in memory
     4.  A single user can executes many programs at the same time.
     Correct Answer : 3
     
QuestionID  :  11211         Subject Name  Operating Syatems Concepts
Q64. In a page segemented scheme of memory management, the segement table
itself must have a page table because...
     1.  the segement tabble is often too large to fit in one page
     2.  each segment is seperated over a number of pages
     3.  segement tables point to page tables and not to the physical location of the segement
     4.  the processor`s description base register point to a page table
     Correct Answer : 2
     
QuestionID  :  11212         Subject Name  Operating Syatems Concepts
Q65. UNIX uses _________ scheduling policy
     1.  preemptive
     2.  non-preemptive
     3.  UNIX never folloe any sceduling policy
     4.  NOne of the above
     Correct Answer : 1
     
QuestionID  :  11215         Subject Name  Operating Syatems Concepts
Q66. A process refers to 5 pages A,B,C,D,E in order - A;B;C;D;A;B;E;A;B;C;D;E.
If the page replacement algorithm is FIFO,the number of page transfer with
an empty internal store of 4 frames is greater than for 3 frames.
     Correct Answer : T
     
QuestionID  :  11222         Subject Name  Operating Syatems Concepts
Q67. Which of the following scheduling policy is well
suited for a time-shared operating system?
     1.  Shortest job first
     2.  Round robin
     3.  First-come-first-serve
     4.  Elevator
     Correct Answer : 2
     
QuestionID  :  11225         Subject Name  Operating Syatems Concepts
Q68. Circuit switching has two variants-
connection oriented and connectionless
     Correct Answer : F
     
QuestionID  :  11229         Subject Name  Operating Syatems Concepts
Q69. The Scheduling policy in case of Batch processing is
     1.  Long Term Scheduling
     2.  Short Term Scheduling
     3.  Both 1 & 2
     4.  None of above
     Correct Answer : 3
     
QuestionID  :  11230         Subject Name  Operating Syatems Concepts
Q70. A virtual memory is required for
     1.  Increasing the speed
     2.  Increasing the addressing modes
     3.  Overcoming size limitation of main memory
     4.  Overcoming size limitation of cache memory
     Correct Answer : 3
     
QuestionID  :  11231         Subject Name  Operating Syatems Concepts
Q71. Turnaround Time refers to delay between job submission and job completion.
     Correct Answer : T
     
QuestionID  :  11235         Subject Name  Operating Syatems Concepts
Q72. The Motivations Behind Networks are
1)Resource Sharing
2)Computation Speedup
3)Reliability
4)Communication
     1.  1,2
     2.  1,3
     3.  only 3
     4.  All the Above
     Correct Answer : 4
     
QuestionID  :  11238         Subject Name  Operating Syatems Concepts
Q73. A file is anything held on secondary storage
     Correct Answer : T
     
QuestionID  :  11241         Subject Name  Operating Syatems Concepts
Q74. Which of the following is true about deadlock state?
     1.  The system cannot run any process
     2.  The system can run process barring those invloved in the deadlock
     3.  A running process cannot request any new resource
     4.  All process in the ready queue enter the wait queue
     Correct Answer : 2
     
QuestionID  :  11242         Subject Name  Operating Syatems Concepts
Q75. In a typical unix set up the host machinbe is attached to the termnals through
     1.  i/o card
     2.  Disk controller card
     3.  Sound blaster card
     4.  4/8 - port contrller card
     Correct Answer : 4
     
QuestionID  :  11250         Subject Name  Operating Syatems Concepts
Q76. single system image is obtained in case of Distributed system
     Correct Answer : T
     
QuestionID  :  11252         Subject Name  Operating Syatems Concepts
Q77. Device Controller is a Hardware
     Correct Answer : F
     
QuestionID  :  11253         Subject Name  Operating Syatems Concepts
Q78. Device files in UNIX are
     1.  Device drivers
     2.  Special Files
     3.  Pipes
     4.  Unstructured files
     Correct Answer : 2
     
QuestionID  :  11257         Subject Name  Operating Syatems Concepts
Q79. A system has 3 processes sharing 4 resources.If each process needs
a maximun of 2 units,deadlock ----------
     1.  can never occur
     2.  may occur
     3.  has to occur
     4.  none of the above
     Correct Answer : 1
     
QuestionID  :  11258         Subject Name  Operating Syatems Concepts
Q80. Consider a computer with 8 Mbytes of the main memory & 128 K cache.The cache block size is 4K .It
uses a direct mapping scheme for the cache management. how many different main memory blocks can map on to a given physical cache block
     1.  2048
     2.  256
     3.  64
     4.  none
     Correct Answer : 3
     
QuestionID  :  11260         Subject Name  Operating Syatems Concepts
Q81. Which of the following statement is not true
     1.  A directory is a special type of file.
     2.  A directory is used to store file attribute.
     3.  A directory is used to store file data.
     4.  A directory is used to store file access information.
     Correct Answer : 3
     
QuestionID  :  11265         Subject Name  Operating Syatems Concepts
Q82. Some computer systems support dual mode operation the user mode and the
supervisor mode or monitor mode. These refer to the modes
     1.  by which user programs handle their data
     2.  By which OS executes user programs
     3.  In which the processor and the associated hardware operate
     4.  Of memory access
     Correct Answer : 3
     
QuestionID  :  11270         Subject Name  Operating Syatems Concepts
Q83. Within `` piping and redirection metacharacters cannot be used.
     Correct Answer : F
     
QuestionID  :  11271         Subject Name  Operating Syatems Concepts
Q84. Unix is the example of the Distributed operating system
     Correct Answer : T
     
QuestionID  :  11273         Subject Name  Operating Syatems Concepts
Q85. In which of the following directory systems,is it possible to have
multiple complete paths for a file,starting from the root directory ?
     1.  Single level directory
     2.  Two level directory
     3.  Tree structured directory
     4.  Acyclic graph directory
     Correct Answer : 4
     
QuestionID  :  11276         Subject Name  Operating Syatems Concepts
Q86. Which of the following statements is not true?
     1.  a directory is special type of file
     2.  a directory is used to store file attributes
     3.  a directory is used to store data
     4.  a directory is used to store file access information
     Correct Answer : 3
     
QuestionID  :  11277         Subject Name  Operating Syatems Concepts
Q87. Which of the Following operating Systems are not available for
non-intel platforms
     1.  Windows NT
     2.  Solaris
     3.  Linux
     4.  All of the above
     Correct Answer : 2
     
QuestionID  :  11279         Subject Name  Operating Syatems Concepts
Q88. LRU and optimal are popular algoritm of page replacement
     Correct Answer : T
     
QuestionID  :  11280         Subject Name  Operating Syatems Concepts
Q89. $? gives the PID of last background process, where as $! gives the exit status of the last command executed.
     Correct Answer : F
     
QuestionID  :  11281         Subject Name  Operating Syatems Concepts
Q90. SS402>myfile would redirect the standard output and standard error to the myfile.
     Correct Answer : F
     
QuestionID  :  11283         Subject Name  Operating Syatems Concepts
Q91. In the systems which do not have multiple CPUS is the cache
coharency is an issue while design.
     Correct Answer : F
     
QuestionID  :  11289         Subject Name  Operating Syatems Concepts
Q92. Which of the following Device asychronous
     1.  SSRAM
     2.  EPROM
     3.  Disk Controller
     4.  all of the above
     Correct Answer : 1
     
QuestionID  :  11291         Subject Name  Operating Syatems Concepts
Q93. Suppose the following files are present in the current directory:
ashish arctan dac.doc dim.dwg document
fag fibonacci finder fog folder
sam si.c tarun zenith zombie
Which files would be listed by the following command?
Is fi*
     1.  fibonacci finder
     2.   zenith zombie
     3.  fag zenith fibonacci finder
     4.  None
     Correct Answer : 1
     
QuestionID  :  11293         Subject Name  Operating Syatems Concepts
Q94. Suppose the following files are present in the current directory:
ashish arctan dac.doc dim.dwg document
fag fibonacci finder fog folder
sam si.c tarun zenith zombie
Which files would be listed by the following command?
Is[!fd]*
     1.  Displays all the files other than those whose names begin with `f`or `d`
     2.  Displays all the files other than those whose names begin with `f`or `d`or `.c`
     3.  Display all files
     4.  None
     Correct Answer : 1
     
QuestionID  :  11294         Subject Name  Operating Syatems Concepts
Q95. The I/O subsystem consist of
     1.  A memory management component includind buffering, caching and spooling
     2.  A general device driver interface
     3.  drivers for specific hardware devices
     4.  All of the above
     Correct Answer : 4
     
QuestionID  :  11299         Subject Name  Operating Syatems Concepts
Q96. ________ is the coincidence of high paging traffic and low CPU utilization
     1.  Thrashing
     2.  spoolinh
     3.  swapping
     4.  All
     Correct Answer : 1
     
QuestionID  :  11301         Subject Name  Operating Syatems Concepts
Q97. peak bandwidth of a 64 bit, 33 MHz based PCI bus would be...
     1.  133MB/s
     2.  266 MB/s
     3.  512 MB/s
     4.  33 MB/s
     Correct Answer : 3
     
QuestionID  :  11304         Subject Name  Operating Syatems Concepts
Q98. x=3 y=5 z=10
if [\($x-eq 3\) -a \($y - eq 5 - 0 $z - eq 10\) ]
then
echo $x
else
echo $y

fi
     1.  2
     2.  3
     3.  none
     4.  4
     Correct Answer : 1
     
QuestionID  :  11625         Subject Name  Operating Syatems Concepts
Q99. SJF is the best sheduling policy
     Correct Answer : T
     
QuestionID  :  11626         Subject Name  Operating Syatems Concepts
Q100. Paging allow protection
     Correct Answer : F