Saturday 31 December 2016

OS Part 3

Top of Form

QuestionID  :  11056         Subject Name  Operating Syatems Concepts
Q1. The cpu utilization is low when the system is
     1.  executing
     2.  thrasing
     3.  waiting
     4.  all of the above
     Correct Answer : 2
      3
QuestionID  :  11057         Subject Name  Operating Syatems Concepts
Q2. Which of the following is non preemtive O.S.?
     1.  Unix
     2.  Windows 95
     3.  Windows NT
     4.  None
     Correct Answer : 2
      4
QuestionID  :  11058         Subject Name  Operating Syatems Concepts
Q3. SJF is the best scheduling algorithm.
     Correct Answer : T
     
QuestionID  :  11062         Subject Name  Operating Syatems Concepts
Q4. In a system that does not support swapping

a) the compiler normally binds symbolic addresses to relocatable addresses
b) the compiler normally binds symbolic addresses to physical addresses
c) the loader binds relocatable addresses to physical addresses
d) binding of symbolic addresses to physical addresses normally takes place during execution
     1.  a,b,c
     2.  c,d
     3.  a,c
     4.  all of above
     Correct Answer : 3
     
QuestionID  :  11064         Subject Name  Operating Syatems Concepts
Q5. FAT stands for
     1.  File Allocation Table
     2.  File Access Table
     3.  File Attribute Table
     4.  None of the above
     Correct Answer : 1
     
QuestionID  :  11070         Subject Name  Operating Syatems Concepts
Q6. During the process of loading the program, a __________ modifies the actual
instruction so that the effect of load address is taken into account
     1.  resource locator
     2.  loader
     3.  relocating loader
     4.  relocation register
     Correct Answer : 4
     
QuestionID  :  11071         Subject Name  Operating Syatems Concepts
Q7. ------ scheduler selects the process that is ready to execute to CPU.
     1.  long-term scheduler
     2.  short-term scheduler
     3.  medium-term scheduler
     4.  None of these
     Correct Answer : 2
     
QuestionID  :  11073         Subject Name  Operating Syatems Concepts
Q8. A thread is a light-weight process.
     Correct Answer : T
     
QuestionID  :  11074         Subject Name  Operating Syatems Concepts
Q9. LAN covers radius of up to 10 KM
     Correct Answer : F
     
QuestionID  :  11079         Subject Name  Operating Syatems Concepts
Q10. Mutex is Mutual Exclution semaphore.
     Correct Answer : T
     
QuestionID  :  11081         Subject Name  Operating Syatems Concepts
Q11. The transfer of process from memory to secondary storage is called
     1.  Process loading
     2.  swapping
     3.  segmentation
     4.  relocating
     Correct Answer : 2
     
QuestionID  :  11083         Subject Name  Operating Syatems Concepts
Q12. A process refers to 5 pages, A,B,C,D & E in the order - A; B; C; D; A; B;
E; A; B; C; D; E. If the page replacement algorithm is FIFO,the number
of pages which transfer with an emty internal store of 3 frames is
     1.  8
     2.  10
     3.  9
     4.  7
     Correct Answer : 3
     
QuestionID  :  11087         Subject Name  Operating Syatems Concepts
Q13. FCFS stands for -----
     1.  Fast Come First Serve.
     2.  First Come First Serve.
     3.  Both are true.
     4.  Both are False.
     Correct Answer : 2
     
QuestionID  :  11090         Subject Name  Operating Syatems Concepts
Q14. Spatial locality refers to the problem that once a
location is referenced
     1.  it will not be referenced again.
     2.  it will be referenced again.
     3.  A nearby location will be referenced soon.
     4.  none of the above.
     Correct Answer : 3
     
QuestionID  :  11092         Subject Name  Operating Syatems Concepts
Q15. The CPU utilization is low when the system is
     1.  Timesharing
     2.  Thrashing
     3.  Multiprocessing
     4.  None of the above
     Correct Answer : 2
     
QuestionID  :  11094         Subject Name  Operating Syatems Concepts
Q16. SPOOLING stands for _________
     1.  Simultaneous Peripheral Operations OnLine
     2.  Spontaneous Peripheral Operations OnLine
     3.  Serial
Peripheral Operations OnLine
     4.  None of the above
     Correct Answer : 1
     
QuestionID  :  11097         Subject Name  Operating Syatems Concepts
Q17. Which of the following is true?

a) the linkage editor is used to edit programs which have to be later linked together
b) the linkage editor links object modules during compiling or assembling
c) the linkage editor links object modules and resolves external references between them before loading
d) the linkage editor resolves external references between the object modules during execution time
     1.  only c
     2.  a and c
     3.  only b
     4.  all of the above
     Correct Answer : 1
     
QuestionID  :  11098         Subject Name  Operating Syatems Concepts
Q18. A virtual memory is required for-
     1.  increasing the speed
     2.  increasibg the addressing modes
     3.  overcomming the size limitation of main memeory
     4.  overcomming the size limitation of cache memory
     Correct Answer : 3
     
QuestionID  :  11099         Subject Name  Operating Syatems Concepts
Q19. With a single resource deadlock occures
     1.  if there are more than two processes computing for that resource
     2.  if there are only than two processes computing for that resource
     3.  if there are a single process computing for that resource
     4.  None of the above
     Correct Answer : 4
     
QuestionID  :  11101         Subject Name  Operating Syatems Concepts
Q20. The following is not a form of IPC.
     1.  semaphore
     2.  pipe
     3.  shared memory
     4.  buffering
     Correct Answer : 1
     
QuestionID  :  11102         Subject Name  Operating Syatems Concepts
Q21. Disk request come to a disk driver for cylinders in the order 10,22,20,2,40,6 and 38, at time when the disk drive is reading from cylinder 20.
The seek time is 6 ms per cylinder. the total seek time, if the disk arm sheduling algorithm is closest cylinder next is
     1.  360 ms
     2.  876 ms
     3.  850 ms
     4.  900 ms
     Correct Answer : 1
     
QuestionID  :  11103         Subject Name  Operating Syatems Concepts
Q22. Fence register is used for
     1.  CPU protection
     2.  Memory protection
     3.  File protection
     4.  All of the above
     Correct Answer : 2
     
QuestionID  :  11107         Subject Name  Operating Syatems Concepts
Q23. _____________ is a significant factor in maintaining fragmentation
within usable limits
     1.  External Fragmentation
     2.  Paging
     3.  Coalescing of holes
     4.  Both 2 and 3
     Correct Answer : 4
     
QuestionID  :  11108         Subject Name  Operating Syatems Concepts
Q24. Pre-emptive scheduling is the strategy of temporarily suspending a running
process
     1.  before the cpu time slice expires
     2.  to allow starving process to run
     3.  when it request i/o
     4.  none of the above
     Correct Answer : 1
     
QuestionID  :  11113         Subject Name  Operating Syatems Concepts
Q25. Overlay is
     1.  a part of an Operating System
     2.  a specific memory location
     3.  a single contiguous memory that was used in the olden days for running large programs by swapping
     4.  overloading the system with many user files
     Correct Answer : 3
     
QuestionID  :  11114         Subject Name  Operating Syatems Concepts
Q26. The problem of thrashing may be reduced by
     1.  Using preparing mechanism
     2.  Writing well structered programs
     3.  Both 1 and 2
     4.  Neither 1 nor 2
     Correct Answer : 3
     
QuestionID  :  11115         Subject Name  Operating Syatems Concepts
Q27.
the address sequence generated by a particular program executing in
demand paging with 100 records per page with one free memory
frame is recorded.what is the number of page fault;
100,200,430,499,510,530,560,120,220,240,260,320,370
     1.  13
     2.  7
     3.  8
     4.  10
     Correct Answer : 4
     
QuestionID  :  11119         Subject Name  Operating Syatems Concepts
Q28. Which of the following is true?

a) Overlays are used to increase the size of physical memory
b) Overlays are used to increase the logical address space
c) when overlays are used the size of project is not limited to the size of physical memory
d) Overlays are used whenever the physical address space is smaller than the logical address space
     1.  a and b
     2.  only c
     3.  only a
     4.  none of the above
     Correct Answer : 2
     
QuestionID  :  11121         Subject Name  Operating Syatems Concepts
Q29. which of the following is an example of SPOOLED device
     1.  The terminal used to enter the input data for a program being executed.
     2.  The secondary memory device in a virtual memory system.
     3.  A line printer used to print the output of a number of jobs.
     4.  none of the above.
     Correct Answer : 3
     
QuestionID  :  11124         Subject Name  Operating Syatems Concepts
Q30. Necessary condition for deadlock are
     1.  non preemption and circular wait
     2.  mutual exclusion and partial allocation
     3.  a and b
     4.  None of these
     Correct Answer : 3
     
QuestionID  :  11126         Subject Name  Operating Syatems Concepts
Q31. Round-Robbin understands priority?
     Correct Answer : F
     
QuestionID  :  11129         Subject Name  Operating Syatems Concepts
Q32. A certain moving arm disk storage with one head has following specifications:
Number of tracks/recording surface=200
Disk rotation speed=2400 rpm.
Track storage capacity=62500 bits
The avarage latency time (assume that the head can move from one track to another only by traversing the entire track)
is
     1.  2.5 s
     2.  2.9 s
     3.  3.1 s
     4.  3.6 s
     Correct Answer : 1
     
QuestionID  :  11130         Subject Name  Operating Syatems Concepts
Q33. Which of the following CPU scheduling algorithms will prevent the starvation algorithm?
     1.  Shortest job first.
     2.  Priority schedulling.
     3.  Priority schedulling with aging mechanism.
     4.  None of the above.
     Correct Answer : 3
     
QuestionID  :  11132         Subject Name  Operating Syatems Concepts
Q34. Critical region is
     1.  a part of operating system which is not allowed to be accessed by any process.
     2.  a set of instructions that access common shared resource which exclude one another in time.
     3.  the portion of main memory which can be accessed only by one process at a time.
     4.  None of the above.
     Correct Answer : 2
     
QuestionID  :  11134         Subject Name  Operating Syatems Concepts
Q35. The I/O subsystem consists of__________
     1.  Memory management component including buffering,caching and spooling
     2.  A general device driver interface
     3.  Drivers for specific hardware devices
     4.  All of the above
     Correct Answer : 4
     
QuestionID  :  11136         Subject Name  Operating Syatems Concepts
Q36. Efficient operation of computer system and Convinience for user
are the goals of operating system.
     Correct Answer : T
     
QuestionID  :  11142         Subject Name  Operating Syatems Concepts
Q37. The signal of the keyboard sends to the computer a special kind of
message called
     1.  keyboard request
     2.  keyboard controller
     3.  interrupt controller
     4.  interrupt request
     Correct Answer : 4
     
QuestionID  :  11143         Subject Name  Operating Syatems Concepts
Q38. Concurrent processes are processes that
     1.  Do not overlap in time
     2.  Overlap in time
     3.  Are executed by a processor at the same time
     4.  None of above
     Correct Answer : 2
     
QuestionID  :  11144         Subject Name  Operating Syatems Concepts
Q39. The time of admission of job to ready queue to completion is_______
     1.  Turnaround time
     2.  Burst time
     3.  Response time
     4.  None of the above.
     Correct Answer : 1
     
QuestionID  :  11145         Subject Name  Operating Syatems Concepts
Q40. A file system uses the contiguous space allocation mechanism for disk allocation .For better utilization of disk space ,this file system must use
     1.  A garbage collection mechanism
     2.  A disk compaction mechanism
     3.  A linked-block allocation mechanism
     4.  An indexed-block allocation mechanism
     Correct Answer : 4
     
QuestionID  :  11146         Subject Name  Operating Syatems Concepts
Q41. Disk scheduling involves deciding
     1.  which disk should be accessed next
     2.  the order in which disk access request must be serviced
     3.  the physical location where files should be accessed in the disk
     4.  none of the above
     Correct Answer : 2
     
QuestionID  :  11151         Subject Name  Operating Syatems Concepts
Q42. Which of the following CPU scheduling algorithm will prevent starvation
problem.
     1.  shortest-job-first
     2.  priority scheduling
     3.  priority scheduling with aging mechanism
     4.  None of the above
     Correct Answer : 3
     
QuestionID  :  11152         Subject Name  Operating Syatems Concepts
Q43. Kernel is
     1.  considered as critical part of operating system.
     2.  software which monitors operating system.
     3.  set of primitive functions upon which rest of operating system functions are built up.
     4.  none of the above.
     Correct Answer : 3
     
QuestionID  :  11155         Subject Name  Operating Syatems Concepts
Q44. The page replacement policy that some times leads to more page faults when size of memory is increased is
     1.  FIFO
     2.  LRU
     3.  No such policy exists
     4.  None of above
     Correct Answer : 1
     
QuestionID  :  11156         Subject Name  Operating Syatems Concepts
Q45. Dirty bit for a page in page table
     1.  helps avoids unnecessary writes on paging
     2.  helps maintain LRU information
     3.  allows only read on a page
     4.  none
     Correct Answer : 1
     
QuestionID  :  11157         Subject Name  Operating Syatems Concepts
Q46. At a perticular time of computation the value of counting semaphore
is 7. Then 20 `p` operation abd x `v` operation were completed on this semaphore.
If the final value of the semaphore is 5, x will be...
     1.  15
     2.  22
     3.  18
     4.  13
     Correct Answer : 3
     
QuestionID  :  11161         Subject Name  Operating Syatems Concepts
Q47. The main purpose(s)of an operating system is/are________
     1.  Convenience for the user.
     2.  Efficient operation of the Computer system.
     3.  Optimal use of Computer resources.
     4.  All of the above
     Correct Answer : 4
     
QuestionID  :  11165         Subject Name  Operating Syatems Concepts
Q48. Bankers algorithm is an example of deadlock avoidance.
     Correct Answer : T
     
QuestionID  :  11166         Subject Name  Operating Syatems Concepts
Q49. cipher text is decrypted text.
     Correct Answer : T
     
QuestionID  :  11170         Subject Name  Operating Syatems Concepts
Q50. The process of loading the os into the main memory is done
by the bootstrap loader.
     Correct Answer : T
     
QuestionID  :  11172         Subject Name  Operating Syatems Concepts
Q51. Andrew and Sprite are examples of Distributed operating system.
     Correct Answer : T
     
QuestionID  :  11175         Subject Name  Operating Syatems Concepts
Q52. CPU performance is based on:-
     1.  ALU width.
     2.  Clock speed .
     3.  Number of instructions executed per second.
     4.  both a and b.
     Correct Answer : 3
     
QuestionID  :  11176         Subject Name  Operating Syatems Concepts
Q53. The protected mode is necessary for
     1.  Multi-tasking system
     2.  Multi-user system
     3.  Both 1 and 2
     4.  16 bit programming
     Correct Answer : 3
     
QuestionID  :  11177         Subject Name  Operating Syatems Concepts
Q54. DMA stands for Dynamic memory allocation.
     Correct Answer : F
     
QuestionID  :  11184         Subject Name  Operating Syatems Concepts
Q55. Intime sharing operating system ,
when time slot given to a process is completed ,
the process goes from RUNNING state to the
     1.  BLOCKED state
     2.  Ready State
     3.  SUSPENDED state
     4.  TERMINATED state
     Correct Answer : 2
     
QuestionID  :  11186         Subject Name  Operating Syatems Concepts
Q56. The size of virtual memory depends on the size of the
     1.  data bus
     2.  main memory
     3.  address bus
     4.  none
     Correct Answer : 3
     
QuestionID  :  11187         Subject Name  Operating Syatems Concepts
Q57. `Aging` is
     1.  keeping track of cache contents
     2.  keeping track of what pages are currently residing in the memory
     3.  keeping track how many times the given page is refrenced
     4.  increasing the priority of jobs to ensure termination in a finite time
     Correct Answer : 4
     
QuestionID  :  11189         Subject Name  Operating Syatems Concepts
Q58. In paged memory system if the page size is increased then internal fragmentation generally.
     1.  becomes less
     2.  becomes more
     3.  remains constant
     4.  none of the above
     Correct Answer : 2
     
QuestionID  :  11196         Subject Name  Operating Syatems Concepts
Q59. In a multi-user OS,20 requests are made to a particular resource per hour,on an average.The probability that no requests are made in 45 minutes is
     1.  (e)-15
     2.  (e)-5
     3.  1-(e)-5
     4.  1-(e)-10
     Correct Answer : 4
     
QuestionID  :  11199         Subject Name  Operating Syatems Concepts
Q60. Which of the following is not a part of a process control block(PCB).
     1.  Values of a CPU registers
     2.  CPU Scheduling information
     3.  Memory limits of the process
     4.  List of files accessible to the proces.
     Correct Answer : 4
     
QuestionID  :  11200         Subject Name  Operating Syatems Concepts
Q61. RAID level 3 is also known as
     1.  memory-style error-correcting code.
     2.  Block-interleaved parity organization.
     3.  Bit-interleaved parity organization.
     4.  All of the above
     Correct Answer : 2
     
QuestionID  :  11204         Subject Name  Operating Syatems Concepts
Q62. _________ sheduler select the process that is ready to execute to CPU.
     1.  Long term
     2.  Short term
     3.  medium term
     4.  none of above
     Correct Answer : 2
     
QuestionID  :  11208         Subject Name  Operating Syatems Concepts
Q63. In multi programming environment
     1.  A processor executes more than one process at a time.
     2.  The program are developed by more than one person.
     3.  More than one process resides in memory
     4.  A single user can executes many programs at the same time.
     Correct Answer : 3
     
QuestionID  :  11209         Subject Name  Operating Syatems Concepts
Q64. FIFO and LRU are the popular page replacement algorithms.
     Correct Answer : T
     
QuestionID  :  11211         Subject Name  Operating Syatems Concepts
Q65. In a page segemented scheme of memory management, the segement table
itself must have a page table because...
     1.  the segement tabble is often too large to fit in one page
     2.  each segment is seperated over a number of pages
     3.  segement tables point to page tables and not to the physical location of the segement
     4.  the processor`s description base register point to a page table
     Correct Answer : 2
     
QuestionID  :  11216         Subject Name  Operating Syatems Concepts
Q66. Sector Interleaving in disks is doen by
     1.  disk manufacturer
     2.  disk controller cord
     3.  the operating system
     4.  none of above
     Correct Answer : 3
     
QuestionID  :  11222         Subject Name  Operating Syatems Concepts
Q67. Which of the following scheduling policy is well
suited for a time-shared operating system?
     1.  Shortest job first
     2.  Round robin
     3.  First-come-first-serve
     4.  Elevator
     Correct Answer : 2
     
QuestionID  :  11224         Subject Name  Operating Syatems Concepts
Q68. Which of the following are RTOS ?
     1.  An on-line railway reservation system
     2.  A process control system.
     3.  Aircraft control system.
     4.  Payroll processing system.
     Correct Answer : 3
     
QuestionID  :  11235         Subject Name  Operating Syatems Concepts
Q69. The Motivations Behind Networks are
1)Resource Sharing
2)Computation Speedup
3)Reliability
4)Communication
     1.  1,2
     2.  1,3
     3.  only 3
     4.  All the Above
     Correct Answer : 4
     
QuestionID  :  11236         Subject Name  Operating Syatems Concepts
Q70. Which of the following is a non-preemtive O.S?
     1.  Unix
     2.  Windows95
     3.  Wnidows NT
     4.  None of the above
     Correct Answer : 4
     
QuestionID  :  11237         Subject Name  Operating Syatems Concepts
Q71. The main purpose of an Operatimg system is/are ...
     1.  convenience for the user
     2.  efficient operation of the computer system.
     3.  optimal use of the compuetr resources.
     4.  All of the above.
     Correct Answer : 4
     
QuestionID  :  11242         Subject Name  Operating Syatems Concepts
Q72. In a typical unix set up the host machinbe is attached to the termnals through
     1.  i/o card
     2.  Disk controller card
     3.  Sound blaster card
     4.  4/8 - port contrller card
     Correct Answer : 4
     
QuestionID  :  11244         Subject Name  Operating Syatems Concepts
Q73. Round Robin is an example of timesharing scheduling policy.
     Correct Answer : T
     
QuestionID  :  11245         Subject Name  Operating Syatems Concepts
Q74. The segmented memory is provided mainly
     1.  for higher speeds
     2.  to maintain compatibity with old processors
     3.  for ease of application programming
     4.  simple hardware
     Correct Answer : 1
     
QuestionID  :  11247         Subject Name  Operating Syatems Concepts
Q75. Unix is an example of multiuser system.
     Correct Answer : T
     
QuestionID  :  11250         Subject Name  Operating Syatems Concepts
Q76. single system image is obtained in case of Distributed system
     Correct Answer : T
     
QuestionID  :  11252         Subject Name  Operating Syatems Concepts
Q77. Device Controller is a Hardware
     Correct Answer : F
     
QuestionID  :  11255         Subject Name  Operating Syatems Concepts
Q78. Consider a system having m resources of same type.The resources are shared by
3 processes A,B ,C which have peak time demands of 3,4,6 respctively.The minimum
value of m that ensures that deadlock will never occur is
     1.  11
     2.  12
     3.  13
     4.  14
     Correct Answer : 1
     
QuestionID  :  11258         Subject Name  Operating Syatems Concepts
Q79. Consider a computer with 8 Mbytes of the main memory & 128 K cache.The cache block size is 4K .It
uses a direct mapping scheme for the cache management. how many different main memory blocks can map on to a given physical cache block 
     1.  2048
     2.  256
     3.  64
     4.  none
     Correct Answer : 3
     
QuestionID  :  11260         Subject Name  Operating Syatems Concepts
Q80. Which of the following statement is not true
     1.  A directory is a special type of file.
     2.  A directory is used to store file attribute.
     3.  A directory is used to store file data.
     4.  A directory is used to store file access information.
     Correct Answer : 3
     
QuestionID  :  11262         Subject Name  Operating Syatems Concepts
Q81. Which schedular selects the process that is ready toexecute to CPU.
     1.  long term schedular
     2.  mid-term schedular
     3.  short-term schedular
     4.  any schedular does not do that task
     Correct Answer : 3
     
QuestionID  :  11270         Subject Name  Operating Syatems Concepts
Q82. Within `` piping and redirection metacharacters cannot be used.
     Correct Answer : F
     
QuestionID  :  11272         Subject Name  Operating Syatems Concepts
Q83. which of the following is false
     1.  deadlock state is unsafe
     2.  unsafe state may lead to deadlock situation
     3.  unsafe state must lead to deadlock situation
     4.  deadlock system is subset of unsafe system
     Correct Answer : 3
     
QuestionID  :  11274         Subject Name  Operating Syatems Concepts
Q84. If filenames are supplied as arguments to a script rm"$@" would remove all files supplied as arguments.
     Correct Answer : T
     
QuestionID  :  11275         Subject Name  Operating Syatems Concepts
Q85. a demand paging system with page table held in registers takes 5 milli sec to service a page fault, if an empty page is available,
or if page to be replaced is not dirty. It takes 50 milli sec if the replaced page is dirty. memory access time is 1 micro sec,
assume we want an effective access time of 2 micro sec and that page to be replaced is dirty 60% of time, what is the approximate
maximum acceptible page fault rate to meet this access time requirement
     1.  0.1%
     2.  1.0%
     3.  2.5%
     4.  0.01%
     Correct Answer : 4
     
QuestionID  :  11276         Subject Name  Operating Syatems Concepts
Q86. Which of the following statements is not true?
     1.  a directory is special type of file
     2.  a directory is used to store file attributes
     3.  a directory is used to store data
     4.  a directory is used to store file access information
     Correct Answer : 3
     
QuestionID  :  11280         Subject Name  Operating Syatems Concepts
Q87. $? gives the PID of last background process, where as $! gives the exit status of the last command executed.
     Correct Answer : F
     
QuestionID  :  11286         Subject Name  Operating Syatems Concepts
Q88. When $,*,\,? or `` are enclosed within a pair of double qoutes they continue to enjoy their same normal meaning.
     Correct Answer : F
     
QuestionID  :  11287         Subject Name  Operating Syatems Concepts
Q89. Th e correct matching of the following pairs :
A. disk sccheduling 1.round robin
B. batch processing 2.scan
C. time sharing 3. LIFO
D. interrupt processing 4.FIFO
     1.  A-3,B-4,C-2,D-1
     2.  A-4,B-3,C-2,D-1
     3.  A-2,B-4,C-1,D-3
     4.  A-2,B-1,C-4,D-3
     Correct Answer : 3
     
QuestionID  :  11290         Subject Name  Operating Syatems Concepts
Q90. Mutex is an acronym for Mutual Exclusion.
     Correct Answer : T
     
QuestionID  :  11292         Subject Name  Operating Syatems Concepts
Q91. Suppose the following files are present in the current directory:
ashish arctan dac.doc dim.dwg document
fag fibonacci finder fog folder
sam si.c tarun zenith zombie
Which files would be listed by the following command?
Is [!fd]
     1.  None
     2.  zenith zombie
     3.  [!fd] not found
     4.  fag fibonacci finder fog folder
     Correct Answer : 3
     
QuestionID  :  11293         Subject Name  Operating Syatems Concepts
Q92. Suppose the following files are present in the current directory:
ashish arctan dac.doc dim.dwg document
fag fibonacci finder fog folder
sam si.c tarun zenith zombie
Which files would be listed by the following command?
Is[!fd]*
     1.  Displays all the files other than those whose names begin with `f`or `d`
     2.  Displays all the files other than those whose names begin with `f`or `d`or `.c`
     3.  Display all files
     4.  None
     Correct Answer : 1
     
QuestionID  :  11297         Subject Name  Operating Syatems Concepts
Q93. the fol.is a part of FAT
     1.  sector info
     2.  disk type
     3.  date info
     4.  none
     Correct Answer : 1
     
QuestionID  :  11303         Subject Name  Operating Syatems Concepts
Q94. b=
[-n $b]
echo $ ?
[-z $b]
echo $?
     1.  Will run fine
     2.  test : argument expected
     3.  error
     4.  none
     Correct Answer : 2
     
QuestionID  :  11304         Subject Name  Operating Syatems Concepts
Q95. x=3 y=5 z=10
if [\($x-eq 3\) -a \($y - eq 5 - 0 $z - eq 10\) ]
then
echo $x
else
echo $y

fi
     1.  2
     2.  3
     3.  none
     4.  4
     Correct Answer : 1
     
QuestionID  :  11305         Subject Name  Operating Syatems Concepts
Q96. point out error
a=12 b=12.52
if[a=b] then echo "\n a and b are equal"
fi
     1.  [a=b]
     2.  fi
     3.  both
     4.  none
     Correct Answer : 1
     
QuestionID  :  11308         Subject Name  Operating Syatems Concepts
Q97. A space allocated in units of fixed size is called block
     Correct Answer : T
     
QuestionID  :  11309         Subject Name  Operating Syatems Concepts
Q98. Single system image is obtained in case of ----
     1.  desktop
     2.  Distributed
     3.  network
     4.  none
     Correct Answer : 2
     
QuestionID  :  11311         Subject Name  Operating Syatems Concepts
Q99. 80826 the addressing schema is __________ addressing
     1.  8 bit
     2.  16 bit
     3.  24 bit
     4.  28 bit
     Correct Answer : 3
     
QuestionID  :  11629         Subject Name  Operating Syatems Concepts
Q100. Banking Algorithm is example of
     1.  Deadlock avoidance
     2.  deadlock detection
     3.  both option 1 and option 2
     4.  deadlock recovery
     Correct Answer : 1
     

QuestionID  :  11320         Subject Name  Linux
Q1. The shell script containing functions should be executed in the current
shell.
     Correct Answer : T
     
QuestionID  :  11325         Subject Name  Linux
Q2. OPTIND and OPTARG are unix defined variables.
     Correct Answer : T
     
QuestionID  :  11332         Subject Name  Linux
Q3. Setting made using stty in a shell script are effective only during
the execution of the script.The orignal setting are restored the moment
excution of the script is over.
     Correct Answer : F
     
QuestionID  :  11344         Subject Name  Linux
Q4. To list hidden as well as normal files in thr current directory the command you would use is--
     1.  ls - a
     2.  ls - b
     3.  ls - l
     4.  None of above.
     Correct Answer : 1
     
QuestionID  :  11369         Subject Name  Linux
Q5. what would be the output of the following program:
name=Sanjay
surname=khare
echo{name=rahul}
echo{middlename+Rahul}
echo${surname-Arora}
     1.  Sanjay
Blank line
Khare
     2.  Khare
Blank line
sanjay
     3.  error
     4.  none of the above
     Correct Answer : 1
     
QuestionID  :  11376         Subject Name  Linux
Q6. The minium number of links for any directory file are two.
     Correct Answer : T
     
QuestionID  :  11380         Subject Name  Linux
Q7. A common user can not set sticky for his file.
     Correct Answer : T
     
QuestionID  :  11381         Subject Name  Linux
Q8. Setting a sticky bit for a non executable file is meaningless.
     Correct Answer : T
     
QuestionID  :  11394         Subject Name  Linux
Q9. How would you perform the following operation on the contents of a given file.
Replace one or more spaces with a single space
     1.  1,$s/[][]*/[]/g
     2.  1,$s/[]*/[]/g
     3.  1,$s/[][]+/[]/g
     4.  1,$s/[]+/[]/g
     Correct Answer : 1
     
QuestionID  :  11399         Subject Name  Linux
Q10. The command cat test1 test2 >> test3 would concatenate the contents of test1
and test2 and overwrite the contents of test3 with the concatenated contents.
     Correct Answer : F
     
QuestionID  :  11400         Subject Name  Linux
Q11. Until = 1
while [$until =1]
do
echo until can not be used as veriable name
done
     1.  No Error,unitl
can be used as veriavle name.
     2.  untill is reseved word it can`t be used as veriable name.
     3.  none
     4.  none
     Correct Answer : 1
     
QuestionID  :  11402         Subject Name  Linux
Q12. How would you perform the following operations on the contents of a given file.
Replace one or more spaces following a fullstop or a comma with two spaces
     1.  1,$s/[.,][][]*/[][]/g
     2.  1,$s,[.][,][][]*/[][]/g
     3.  1,$s/[.,][]*/[]/g
     4.  1,$s/[.,][][]+/[]/g
     Correct Answer : 1
     
QuestionID  :  11404         Subject Name  Linux
Q13. Command to create 5 empty files empty1,empty2,empty3,empty4,empty5
     1.  touch empty1,empty2,empty3,empty4,empty5
     2.  cat empty1,empty2,empty3,empty4,empty5
     3.  Both
     4.  None of above
     Correct Answer : 1
     
QuestionID  :  11405         Subject Name  Linux
Q14. "g/^[[]tab]*$/d" :command use to delete all the blank lines
     Correct Answer : T
     
QuestionID  :  11409         Subject Name  Linux
Q15. How would you perform the following operations on the contents of a given file.
insert a> and a space at the start of every line in the file
     1.  1,$s/^/>[][]/g
     2.  1,$s/>[][]/g
     3.  1,$s/^/>[]/g
     4.  none of the above
     Correct Answer : 1
     
QuestionID  :  11413         Subject Name  Linux
Q16. Which of the following is a popular terminal emulation software
     1.  VTERM
     2.  VT100
     3.  COMIT
     4.  Perl
     Correct Answer : 1
     
QuestionID  :  11420         Subject Name  Linux
Q17. The program contained in boot block that loads kernel into memory is called
     1.  Disk Bootstrap program
     2.  Master Boot program
     3.  shell program
     4.  None of above
     Correct Answer : 1
     
QuestionID  :  11425         Subject Name  Linux
Q18. Purpose of .exrc file is convinient way to customize the vi environment and like all
good things you shold put it to utmost use to improve your efficiency .
     Correct Answer : T
     
QuestionID  :  11440         Subject Name  Linux
Q19. Which command displays the line numbers by the side of each line?
     1.  set nu
     2.  set ai
     3.  set eb
     4.  set ic
     Correct Answer : 1
     
QuestionID  :  11446         Subject Name  Linux
Q20. while executing a shell script shell acts as a compiler
     Correct Answer : F
     
QuestionID  :  11450         Subject Name  Linux
Q21. vi has only help can be invocked using F1key
     Correct Answer : F
     
QuestionID  :  11452         Subject Name  Linux
Q22. To change our existing password we can execute the file /etc/passwd
     Correct Answer : F
     
QuestionID  :  11459         Subject Name  Linux
Q23. Unix can be ported to a new hardware platform with minimum changes in the unix code
     Correct Answer : T
     
QuestionID  :  11461         Subject Name  Linux
Q24. Any Shell script by default get executed in the current shell
     Correct Answer : F
     
QuestionID  :  11469         Subject Name  Linux
Q25. to search a pattern which starts with uni the command would be
     1.  :/ < uni
     2.  :/\ < uni
     3.  : / \ < uni >
     4.  none
     Correct Answer : 2
     
QuestionID  :  11473         Subject Name  Linux
Q26. A DOS formatted floopy can be used in UNIX and formated floppy can be used in DOS
     Correct Answer : F
     
QuestionID  :  11478         Subject Name  Linux
Q27. Once a jopb is submited for printing using lp command we have to take print out even if on second thoughts we realise that we should not have the printed the file
     Correct Answer : F
     
QuestionID  :  11487         Subject Name  Linux
Q28. What will be the output of the following command.
command:
at now + 15 minutes
clear
is -l
ctrl d
output:
NO OUTPUT.
     Correct Answer : F
     
QuestionID  :  11492         Subject Name  Linux
Q29. The file /bin/sysadmsh can be executed only by the system admin.
     Correct Answer : T
     
QuestionID  :  11502         Subject Name  Linux
Q30. A null variable a can be created using
     1.  a=
     2.  a=` `
     3.  a=`` ``
     4.  All of above
     Correct Answer : 4
     
QuestionID  :  11510         Subject Name  Linux
Q31. what will be the output:
command:
at now +1 week < atfile
output:
NO output.
     Correct Answer : F
     
QuestionID  :  11512         Subject Name  Linux
Q32. Which statements are true if the file which contains the following line is
submitted to the crontab command.
10 2 3 * 0 echo ``There is no substitute for hard work``
     1.  The message is echoed on the 3rd of every month at 2.10 a.m
     2.  The message is echoed on the 3rd of every month at 2.10 p.m
     3.  The message is echoed on the 3rd of every month at 2.10 a.m
if it happens to be a sunday
     4.  None of the above.
     Correct Answer : 3
     
QuestionID  :  11513         Subject Name  Linux
Q33. The shell meta character $# represents
     1.  total number of arguments supplied to the shell script
     2.  total number of files in the current directory
     3.  total number of users who have logged in
     4.  total number of process running in the background
     Correct Answer : 1
     
QuestionID  :  11519         Subject Name  Linux
Q34. The command wc -l < aaa displays the no of words present in the
file aaa.
     Correct Answer : F
     
QuestionID  :  11522         Subject Name  Linux
Q35. The state of the file system is contained in
     1.  Boot block
     2.  A special block created by Boot Block
     3.  Super Block
     4.  None of the above
     Correct Answer : 3
     
QuestionID  :  11527         Subject Name  Linux
Q36. A floppy can be formated only by system administrator
     Correct Answer : F
     
QuestionID  :  11539         Subject Name  Linux
Q37. It is neccesary to unmount a file system before removing a floppy.
     Correct Answer : T
     
QuestionID  :  11546         Subject Name  Linux
Q38. doscp /usr/aa1/cobol/* b:/ Command for copy all the files from /usr/aa1/cobol directory to a dos formatted floppy in drive B
     Correct Answer : T
     
QuestionID  :  11549         Subject Name  Linux
Q39. Unix commands which accept the input from standard input device and
send the output to the standard output device are called "filters".
     Correct Answer : T
     
QuestionID  :  11556         Subject Name  Linux
Q40. Unix commands which accept the input from standard input device
and send the output to the standard output device are known as
filters.
     Correct Answer : T
     
QuestionID  :  11557         Subject Name  Linux
Q41. Which of the following is not a filter ?
     1.  head
     2.  grep
     3.  tail
     4.  ls
     Correct Answer : 4
     
QuestionID  :  11559         Subject Name  Linux
Q42. k=35
echo `[$k -eq 35 ] ``[$k-eq 50]`
     1.  blank line
     2.  dotted line
     3.  error
     4.  none
     Correct Answer : 1
     
QuestionID  :  11565         Subject Name  Linux
Q43. i=3
if[! -z $i]
then
echo ABC
else
echo abc

fi
     1.  ABC
     2.  abc
     3.  error
     4.  none
     Correct Answer : 1
     
QuestionID  :  11566         Subject Name  Linux
Q44. To perform the numeric test we must use -ge instead of >=
     Correct Answer : T
     
QuestionID  :  11572         Subject Name  Linux
Q45. cat < file1 > file2
cat > file2 < file1
Both the commands will show the same result.
     Correct Answer : T
     
QuestionID  :  11593         Subject Name  Linux
Q46. if x=11 and y=6 then exit status of :

[ $x -eq 5 -o $y - ne 3 ]
     1.  0
     2.  1
     3.  11
     4.  none
     Correct Answer : 1
     
QuestionID  :  11600         Subject Name  Linux
Q47. A file can have links across file system.
     Correct Answer : F
     
QuestionID  :  11612         Subject Name  Linux
Q48. point out error
1. Echo Enter filename
2. read fname
3. if[-rwx $fname]
3. then
4. echo read write and execute permissions
5. fi
     1.  line 3
     2.  line 1
     3.  line 5
     4.  no error
     Correct Answer : 1
     
QuestionID  :  11620         Subject Name  Linux
Q49. The process id number of the process vhand,bdflush,sched and init are
     1.  1,2,3 1nd 4
     2.  2,3,0 and 1
     3.  3,4,1 and 2
     4.  0,1,2 and 3
     Correct Answer : 2
     
QuestionID  :  11621         Subject Name  Linux
Q50. The daemon process can be killed using using the kill command
     Correct Answer : F
     

QuestionID  :  11317         Subject Name  Linux
Q1. When you login the functions that you have declared automatically get loaded in the memory.
     Correct Answer : F
     
QuestionID  :  11320         Subject Name  Linux
Q2. The shell script containing functions should be executed in the current
shell.
     Correct Answer : T
     
QuestionID  :  11321         Subject Name  Linux
Q3. Functions get executed faster than the corresponding shell script.
     Correct Answer : T
     
QuestionID  :  11324         Subject Name  Linux
Q4. All shell script automatically get executed in the current shell.
     Correct Answer : F
     
QuestionID  :  11325         Subject Name  Linux
Q5. OPTIND and OPTARG are unix defined variables.
     Correct Answer : T
     
QuestionID  :  11326         Subject Name  Linux
Q6. if a shell script is called from another then the called shell script
should necessarly have a return statement.
     Correct Answer : F
     
QuestionID  :  11331         Subject Name  Linux
Q7. All unix command always have single character option.
     Correct Answer : T
     
QuestionID  :  11333         Subject Name  Linux
Q8. we can trap a signal such that on occurence of that signal a particular
shell script gets executed.
     Correct Answer : T
     
QuestionID  :  11340         Subject Name  Linux
Q9. Hidden files in Unix always begin with a character " . "
     Correct Answer : T
     
QuestionID  :  11345         Subject Name  Linux
Q10. What are the modes of operation of vi
     1.  Command Mode
     2.  Insert Mode
     3.  ex command mode
     4.  all of the above
     Correct Answer : 4
     
QuestionID  :  11348         Subject Name  Linux
Q11. Usually size of each block in Unix file system is----
     1.  512
     2.  1024
     3.  2048
     4.  None of above.
     Correct Answer : 2
     
QuestionID  :  11349         Subject Name  Linux
Q12. Which are the editors available under unix
     1.  vi
     2.  ed
     3.  ex
     4.  all of the above
     Correct Answer : 4
     
QuestionID  :  11366         Subject Name  Linux
Q13. All device related files are present in /dev directory.
     Correct Answer : T
     
QuestionID  :  11375         Subject Name  Linux
Q14. Shell program is usually stored in a file called Unix.
     Correct Answer : F
     
QuestionID  :  11388         Subject Name  Linux
Q15. The file that controls the printer is stored in a sub-directory called printer created by system admin.
     Correct Answer : F
     
QuestionID  :  11390         Subject Name  Linux
Q16. point out the errors if any

j=1
while [ $j -le 10 ]
do
echo $j
j=j+1
done
     1.  j=1
     2.  while [ $j -le 10 ]
     3.   echo $j
     4.   j=j+1
     Correct Answer : 4
     
QuestionID  :  11399         Subject Name  Linux
Q17. The command cat test1 test2 >> test3 would concatenate the contents of test1
and test2 and overwrite the contents of test3 with the concatenated contents.
     Correct Answer : F
     
QuestionID  :  11405         Subject Name  Linux
Q18. "g/^[[]tab]*$/d" :command use to delete all the blank lines
     Correct Answer : T
     
QuestionID  :  11406         Subject Name  Linux
Q19. If every user working on unix set up is to use the printer,then the printer should be attached to
     1.  the host machine
     2.  any of the terminal
     3.  the terminal from wher the first login was made
     4.  none
     Correct Answer : 1
     
QuestionID  :  11412         Subject Name  Linux
Q20. break statement is used to exit from
     1.  if statement
     2.  for loop
     3.  a program
     4.  none
     Correct Answer : 2
     
QuestionID  :  11414         Subject Name  Linux
Q21. Each entry in inode table is of size
     1.  64kb
     2.  32kb
     3.  32bytes
     4.  64bytes
     Correct Answer : 4
     
QuestionID  :  11417         Subject Name  Linux
Q22. which of the following is the command for the searching a pattern in a file
     1.  find
     2.  grep
     3.  lookup
     4.  none
     Correct Answer : 2
     
QuestionID  :  11421         Subject Name  Linux
Q23. To logout from your terminal you
     1.  Switch off the terminal
     2.  Press ctrl -d or type exit
     3.  press ctrl-Alt-Del
     4.  do nothing it is the system administrator who would do this for you
     Correct Answer : 2
     
QuestionID  :  11424         Subject Name  Linux
Q24. What is the output of following program segments?
n="ask me"
echo $n
echo "$n"
echo `$n`
     1.  ask me
ask me
$n
     2.  ask me
$n
ask me
     3.  ask me
     4.  $n
     Correct Answer : 1
     
QuestionID  :  11431         Subject Name  Linux
Q25. Which commands in vi would you use to perform Block copy
     1.  :m co p
     2.  :m,n co p
     3.  both of above
     4.  none of these
     Correct Answer : 3
     
QuestionID  :  11450         Subject Name  Linux
Q26. vi has only help can be invocked using F1key
     Correct Answer : F
     
QuestionID  :  11454         Subject Name  Linux
Q27. variable declare in the shell script can be displayed at the $(doller) promot
using the set command
     Correct Answer : F
     
QuestionID  :  11458         Subject Name  Linux
Q28. expr can handle only integers where as bc can handle both integer as well as
floats
     Correct Answer : T
     
QuestionID  :  11462         Subject Name  Linux
Q29. Unix kernel acts as an agent between the shell and the hadware
     Correct Answer : T
     
QuestionID  :  11465         Subject Name  Linux
Q30. In a typical unix Enviornment there are several kernels and one
shell
     Correct Answer : F
     
QuestionID  :  11468         Subject Name  Linux
Q31. banner "aaa\nbbb" will display "aaa" and "bbb" as large characters
split over to lines
     Correct Answer : T
     
QuestionID  :  11471         Subject Name  Linux
Q32. A shell variable can not handled negative value
     Correct Answer : F
     
QuestionID  :  11477         Subject Name  Linux
Q33. You can yank line from one file and paste them into another file
     Correct Answer : F
     
QuestionID  :  11481         Subject Name  Linux
Q34. Once a job is submited for printing using the lp command we have to remain logged in till our file gets printed
     Correct Answer : F
     
QuestionID  :  11488         Subject Name  Linux
Q35. We can not see contents of packed or compressed file unless we unpack or uncompress it
     Correct Answer : F
     
QuestionID  :  11490         Subject Name  Linux
Q36. The main purpose(s) of an O.S. is
     1.  convinience for the user
     2.  optimal use of computing resourse
     3.  both
     4.  none
     Correct Answer : 3
     
QuestionID  :  11496         Subject Name  Linux
Q37. When fork() is given
     1.  It creats a child process
     2.  Allocate slot in process table
     3.  returns 0 to parent & ID to child
     4.  All of the above
     Correct Answer : 4
     
QuestionID  :  11501         Subject Name  Linux
Q38. The command /etc/init 1 puts the system in multi user mode
     Correct Answer : F
     
QuestionID  :  11511         Subject Name  Linux
Q39. The command cat < file1 > file2 will copy the contents of file1
to file2
     Correct Answer : T
     
QuestionID  :  11526         Subject Name  Linux
Q40. A single Unix file System can be split over multiple hard Disks
     Correct Answer : F
     
QuestionID  :  11528         Subject Name  Linux
Q41. On executing a statement set -3+1
     1.  $1 would be -3
     2.  $1 would be -
     3.  $1 would be set
     4.  this command would result into an error
     Correct Answer : 4
     
QuestionID  :  11538         Subject Name  Linux
Q42. which is following is NOT shell keyword
     1.  shift
     2.  readonly
     3.  unset
     4.  ls
     Correct Answer : 4
     
QuestionID  :  11541         Subject Name  Linux
Q43. A tar command always needs at least one function option.
     Correct Answer : T
     
QuestionID  :  11545         Subject Name  Linux
Q44. The number of inodes that can be created on a floppy disk have been fixed according to their capacities.
     Correct Answer : F
     
QuestionID  :  11564         Subject Name  Linux
Q45. Which command can be used to find all links with vi editor suupose the
     1.  $ls -i /bin/vi
     2.  $find / -inum < inode no > -print
     3.  Both 1 and 2
     4.  None of the above
     Correct Answer : 3
     
QuestionID  :  11572         Subject Name  Linux
Q46. cat < file1 > file2
cat > file2 < file1
Both the commands will show the same result.
     Correct Answer : T
     
QuestionID  :  11602         Subject Name  Linux
Q47. how will you find out which jobs have been submitted for execution in future?
     1.  using at -l command
     2.  using at -t command
     3.  using fut -jobs command
     4.  none
     Correct Answer : 1
     
QuestionID  :  11605         Subject Name  Linux
Q48. Which of the following is not true?
     1.  sorting is done on the basis of first charecter of each line
     2.  sort command sorts a file word by word rather than line by line
     3.  sort command has a provision to do a numeric sort
     4.  sort is not a filter
     Correct Answer : 2
     
QuestionID  :  11612         Subject Name  Linux
Q49. point out error
1. Echo Enter filename
2. read fname
3. if[-rwx $fname]
3. then
4. echo read write and execute permissions
5. fi
     1.  line 3
     2.  line 1
     3.  line 5
     4.  no error
     Correct Answer : 1
     
QuestionID  :  11613         Subject Name  Linux
Q50. In scheduling using "batch" command the system decides the best
time for executing our command.Moreover the time at which our
command will be executed is not in our control.
     Correct Answer : T
     

Bottom of Form