0% found this document useful (1 vote)
450 views

Os MCQS

Uploaded by

Yashu Gowda
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
450 views

Os MCQS

Uploaded by

Yashu Gowda
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 90

Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Basics”.

1. What is operating system?

a) collection of programs that manages hardware resources

b) system service provider to the application programs

c) link to interface the hardware and application programs

d) all of the mentioned

Answer: d

2. To access the services of operating system, the interface is provided by the ___________

a) System calls

b) API

c) Library

d) Assembly instructions

Answer: a

3. Which one of the following is not true?

a) kernel is the program that constitutes the central core of the operating system

b) kernel is the first part of operating system to load into memory during booting

c) kernel is made of various modules which can not be loaded in running operating system

d) kernel remains in the memory during the entire computer session

Answer: c

4. Which one of the following error will be handle by the operating system?

a) power failure

b) lack of paper in printer

c) connection failure in the network

d) all of the mentioned

Answer: d

5. What is the main function of the command interpreter?

a) to get and execute the next user-specified command

b) to provide the interface between the API and application program

c) to handle the files in operating system


d) none of the mentioned

Answer: a

6. By operating system, the resource management can be done via __________

a) time division multiplexing

b) space division multiplexing

c) time and space division multiplexing

d) none of the mentioned

Answer: c

7. If a process fails, most operating system write the error information to a ______

a) log file

b) another running process

c) new file

d) none of the mentioned

Answer: a

8. Which facility dynamically adds probes to a running system, both in user processes and in the kernel?

a) DTrace

b) DLocate

c) DMap

d) DAdd

Answer: a

9. Which one of the following is not a real time operating system?

a) VxWorks

b) Windows CE

c) RTLinux

d) Palm OS

Answer: d

10. The OS X has ____________

a) monolithic kernel

b) hybrid kernel
c) microkernel

d) monolithic kernel with modules

Answer: b

This set of Operating System Multiple Choice Questions & Answers (MCQs) focuses on
“Processes”.

1. The systems which allow only one process execution at a time, are called __________

a) uniprogramming systems

b) uniprocessing systems

c) unitasking systems

d) none of the mentioned

Answer: b

Explanation: Those systems which allows more than one process execution at a time, are called
multiprogramming systems. Uniprocessing means only one processor.

2. In operating system, each process has its own __________

a) address space and global variables

b) open files

c) pending alarms, signals and signal handlers

d) all of the mentioned

Answer: d

3. In Unix, Which system call creates the new process?

a) fork

b) create

c) new

d) none of the mentioned

Answer: a

4. A process can be terminated due to __________

a) normal exit

b) fatal error

c) killed by another process


d) all of the mentioned

Answer: d

5. What is the ready state of a process?

a) when process is scheduled to run after some execution

b) when process is unable to run until some task has been completed

c) when process is using the CPU

d) none of the mentioned

Answer: a

Explanation: When process is unable to run until some task has been completed, the process is in blocked
state and if process is using the CPU, it is in running state.

6. What is interprocess communication?

a) communication within the process

b) communication between two process

c) communication between two threads of same process

d) none of the mentioned

Answer: b

7. A set of processes is deadlock if __________

a) each process is blocked and will remain so forever

b) each process is terminated

c) all processes are trying to kill each other

d) none of the mentioned

Answer: a

8. A process stack does not contain __________

a) Function parameters

b) Local variables

c) Return addresses

d) PID of child process

Answer: d

9. Which system call returns the process identifier of a terminated child?


a) wait

b) exit

c) fork

d) get

Answer: a

10. The address of the next instruction to be executed by the current process is provided by the
__________

a) CPU registers

b) Program counter

c) Process stack

d) Pipe

Answer: b

This set of Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Process
Control Block”.

1. A Process Control Block(PCB) does not contain which of the following?

a) Code

b) Stack

c) Bootstrap program

d) Data

Answer: c

2. The number of processes completed per unit time is known as __________

a) Output

b) Throughput

c) Efficiency

d) Capacity

Answer: b

3. The state of a process is defined by __________

a) the final activity of the process

b) the activity just executed by the process


c) the activity to next be executed by the process

d) the current activity of the process

Answer: d

4. Which of the following is not the state of a process?

a) New

b) Old

c) Waiting

d) Running

Answer: b

5. What is a Process Control Block?

a) Process type variable

b) Data Structure

c) A secondary storage section

d) A Block in memory

Answer: b

6. The entry of all the PCBs of the current processes is in __________

a) Process Register

b) Program Counter

c) Process Table

d) Process Unit

Answer: c

7. What is the degree of multiprogramming?

a) the number of processes executed per unit time

b) the number of processes in the ready queue

c) the number of processes in the I/O queue

d) the number of processes in memory

Answer: d

8. A single thread of control allows the process to perform __________

a) only one task at a time


b) multiple tasks at a time

c) only two tasks at a time

d) all of the mentioned

Answer: a.

9. What is the objective of multiprogramming?

a) Have some process running at all times

b) Have multiple programs waiting in a queue ready to run

c) To minimize CPU utilization

d) None of the mentioned

Answer: a

This set of Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Process
Scheduling Queues”.

1. Which of the following do not belong to queues for processes?

a) Job Queue

b) PCB queue

c) Device Queue

d) Ready Queue

Answer: b

2. When the process issues an I/O request __________

a) It is placed in an I/O queue

b) It is placed in a waiting queue

c) It is placed in the ready queue

d) It is placed in the Job queue

Answer: a

3. What will happen when a process terminates?

a) It is removed from all queues

b) It is removed from all, but the job queue

c) Its process control block is de-allocated

d) Its process control block is never de-allocated


Answer: a

4. What is a long-term scheduler?

a) It selects which process has to be brought into the ready queue

b) It selects which process has to be executed next and allocates CPU

c) It selects which process to remove from memory by swapping

d) None of the mentioned

Answer: a

5. If all processes I/O bound, the ready queue will almost always be ______ and the Short term Scheduler
will have a ______ to do.

a) full, little

b) full, lot

c) empty, little

d) empty, lot

Answer: c

6. What is a medium-term scheduler?

a) It selects which process has to be brought into the ready queue

b) It selects which process has to be executed next and allocates CPU

c) It selects which process to remove from memory by swapping

d) None of the mentioned

Answer: c

7. What is a short-term scheduler?

a) It selects which process has to be brought into the ready queue

b) It selects which process has to be executed next and allocates CPU

c) It selects which process to remove from memory by swapping

d) None of the mentioned

Answer: b

8. The primary distinction between the short term scheduler and the long term scheduler is __________

a) The length of their queues

b) The type of processes they schedule


c) The frequency of their execution

d) None of the mentioned

Answer: c

9. The only state transition that is initiated by the user process itself is __________

a) block

b) wakeup

c) dispatch

d) none of the mentioned

Answer: a

10. In a time-sharing operating system, when the time slot given to a process is completed, the process
goes from the running state to the __________

a) Blocked state

b) Ready state

c) Suspended state

d) Terminated state

Answer: b

11. In a multiprogramming environment __________

a) the processor executes more than one process at a time

b) the programs are developed by more than one person

c) more than one process resides in the memory

d) a single user can execute many programs at the same time

Answer: c

12. Suppose that a process is in “Blocked” state waiting for some I/O service. When the service is
completed, it goes to the __________

a) Running state

b) Ready state

c) Suspended state

d) Terminated state

Answer: b
13. The context of a process in the PCB of a process does not contain __________

a) the value of the CPU registers

b) the process state

c) memory-management information

d) context switch time

Answer: d

14. Which of the following need not necessarily be saved on a context switch between processes?

a) General purpose registers

b) Translation lookaside buffer

c) Program counter

d) All of the mentioned

Answer: b

15. Which of the following does not interrupt a running process?

a) A device

b) Timer

c) Scheduler process

d) Power failure

Answer: c

This set of Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Inter
Process Communication”.

1. What is Inter process communication?

a) allows processes to communicate and synchronize their actions when using the same address space

b) allows processes to communicate and synchronize their actions without using the same address space

c) allows the processes to only synchronize their actions without communication

d) none of the mentioned

Answer: b

2. Message passing system allows processes to __________

a) communicate with one another without resorting to shared data


b) communicate with one another by resorting to shared data

c) share data

d) name the recipient or sender of the message

Answer: a

3. Which of the following two operations are provided by the IPC facility?

a) write & delete message

b) delete & receive message

c) send & delete message

d) receive & send message

Answer: d

4. Messages sent by a process __________

a) have to be of a fixed size

b) have to be a variable size

c) can be fixed or variable sized

d) None of the mentioned

Answer: c

5. The link between two processes P and Q to send and receive messages is called __________

a) communication link

b) message-passing link

c) synchronization link

d) all of the mentioned

Answer: a

6. Which of the following are TRUE for direct communication?

a) A communication link can be associated with N number of process(N = max. number of processes
supported by system)

b) A communication link can be associated with exactly two processes

c) Exactly N/2 links exist between each pair of processes(N = max. number of processes supported by
system)

d) Exactly two link exists between each pair of processes


Answer: b

7. In indirect communication between processes P and Q __________

a) there is another process R to handle and pass on the messages between P and Q

b) there is another machine between the two processes to help communication

c) there is a mailbox to help communication between P and Q

d) none of the mentioned

Answer: c

8. In the non blocking send __________

a) the sending process keeps sending until the message is received

b) the sending process sends the message and resumes operation

c) the sending process keeps sending until it receives a message

d) none of the mentioned

Answer: b

9. In the Zero capacity queue __________

a) the queue can store at least one message

b) the sender blocks until the receiver receives the message

c) the sender keeps sending and the messages don’t wait in the queue

d) none of the mentioned

Answer: b

10. The Zero Capacity queue __________

a) is referred to as a message system with buffering

b) is referred to as a message system with no buffering

c) is referred to as a link

d) none of the mentioned

Answer: b

11. Bounded capacity and Unbounded capacity queues are referred to as __________

a) Programmed buffering

b) Automatic buffering

c) User defined buffering


d) No buffering

Answer: b

This set of Operating System Multiple Choice Questions & Answers (MCQs) focuses on “CPU
Scheduling”.

1. Which module gives control of the CPU to the process selected by the short-term scheduler?

a) dispatcher

b) interrupt

c) scheduler

d) none of the mentioned

Answer: a

2. The processes that are residing in main memory and are ready and waiting to execute are kept on a list
called _____________

a) job queue

b) ready queue

c) execution queue

d) process queue

Answer: b

3. The interval from the time of submission of a process to the time of completion is termed as
____________

a) waiting time

b) turnaround time

c) response time

d) throughput

Answer: b

4. Which scheduling algorithm allocates the CPU first to the process that requests the CPU first?

a) first-come, first-served scheduling

b) shortest job scheduling

c) priority scheduling

d) none of the mentioned


Answer: a

5. In priority scheduling algorithm ____________

a) CPU is allocated to the process with highest priority

b) CPU is allocated to the process with lowest priority

c) Equal priority processes can not be scheduled

d) None of the mentioned

Answer: a

6. In priority scheduling algorithm, when a process arrives at the ready queue, its priority is compared
with the priority of ____________

a) all process

b) currently running process

c) parent process

d) init process

Answer: b

7. Which algorithm is defined in Time quantum?

a) shortest job scheduling algorithm

b) round robin scheduling algorithm

c) priority scheduling algorithm

d) multilevel queue scheduling algorithm

Answer: b

8. Process are classified into different groups in ____________

a) shortest job scheduling algorithm

b) round robin scheduling algorithm

c) priority scheduling algorithm

d) multilevel queue scheduling algorithm

Answer: d

9. In multilevel feedback scheduling algorithm ____________

a) a process can move to a different classified ready queue

b) classification of ready queue is permanent


c) processes are not classified into groups

d) none of the mentioned

Answer: a

10. Which one of the following can not be scheduled by the kernel?

a) kernel level thread

b) user level thread

c) process

d) none of the mentioned

Answer: b

Explanation: User level threads are managed by thread library and the kernel is unaware of them.

This set of Operating System Multiple Choice Questions & Answers (MCQs) focuses on “CPU
Scheduling Benefits”.

1. CPU scheduling is the basis of ___________

a) multiprocessor systems

b) multiprogramming operating systems

c) larger memory sized systems

d) none of the mentioned

Answer: b

2. With multiprogramming ______ is used productively.

a) time

b) space

c) money

d) all of the mentioned

Answer: a

3. What are the two steps of a process execution?

a) I/O & OS Burst

b) CPU & I/O Burst


c) Memory & I/O Burst

d) OS & Memory Burst

Answer: b

4. An I/O bound program will typically have ____________

a) a few very short CPU bursts

b) many very short I/O bursts

c) many very short CPU bursts

d) a few very short I/O bursts

Answer: c

5. A process is selected from the ______ queue by the ________ scheduler, to be executed.

a) blocked, short term

b) wait, long term

c) ready, short term

d) ready, long term

Answer: c

6. In the following cases non – preemptive scheduling occurs?

a) When a process switches from the running state to the ready state

b) When a process goes from the running state to the waiting state

c) When a process switches from the waiting state to the ready state

d) All of the mentioned

Answer: b

Explanation: There is no other choice.

7. The switching of the CPU from one process or thread to another is called ____________

a) process switch

b) task switch

c) context switch

d) all of the mentioned

Answer: d

8. What is Dispatch latency?


a) the speed of dispatching a process from running to the ready state

b) the time of dispatching a process from running to ready state and keeping the CPU idle

c) the time to stop one process and start running another one

d) none of the mentioned

Answer: c

9. Scheduling is done so as to ____________

a) increase CPU utilization

b) decrease CPU utilization

c) keep the CPU more idle

d) none of the mentioned

Answer: a

10. Scheduling is done so as to ____________

a) increase the throughput

b) decrease the throughput

c) increase the duration of a specific amount of work

d) none of the mentioned

Answer: a

11. What is Turnaround time?

a) the total waiting time for a process to finish execution

b) the total time spent in the ready queue

c) the total time spent in the running queue

d) the total time from the completion till the submission of a process

Answer: d

12. Scheduling is done so as to ____________

a) increase the turnaround time

b) decrease the turnaround time

c) keep the turnaround time same

d) there is no relation between scheduling and turnaround time

Answer: b
13. What is Waiting time?

a) the total time in the blocked and waiting queues

b) the total time spent in the ready queue

c) the total time spent in the running queue

d) the total time from the completion till the submission of a process

Answer: b

14. Scheduling is done so as to ____________

a) increase the waiting time

b) keep the waiting time the same

c) decrease the waiting time

d) none of the mentioned

Answer: c

15. What is Response time?

a) the total time taken from the submission time till the completion time

b) the total time taken from the submission time till the first response is produced

c) the total time taken from submission time till the response is output

d) none of the mentioned

Answer: b

This set of Operating System Multiple Choice Questions & Answers (MCQs) focuses on “CPU
Scheduling Algorithms-1”.

1. Round robin scheduling falls under the category of ____________

a) Non-preemptive scheduling

b) Preemptive scheduling

c) All of the mentioned

d) None of the mentioned

Answer: b

2. With round robin scheduling algorithm in a time shared system ____________

a) using very large time slices converts it into First come First served scheduling algorithm
b) using very small time slices converts it into First come First served scheduling algorithm

c) using extremely small time slices increases performance

d) using very small time slices converts it into Shortest Job First algorithm

Answer: a

Explanation: All the processes will be able to get completed.

3. The portion of the process scheduler in an operating system that dispatches processes is concerned with
____________

a) assigning ready processes to CPU

b) assigning ready processes to waiting queue

c) assigning running processes to blocked queue

d) all of the mentioned

Answer: a

4. Complex scheduling algorithms ____________

a) are very appropriate for very large computers

b) use minimal resources

c) use many resources

d) all of the mentioned

Answer: a

Explanation: Large computers are overloaded with a greater number of processes.

5. What is FIFO algorithm?

a) first executes the job that came in last in the queue

b) first executes the job that came in first in the queue

c) first executes the job that needs minimal processor

d) first executes the job that has maximum processor needs

Answer: b

6. The strategy of making processes that are logically runnable to be temporarily suspended is called
____________

a) Non preemptive scheduling

b) Preemptive scheduling
c) Shortest job first

d) First come First served

Answer: b

7. What is Scheduling?

a) allowing a job to use the processor

b) making proper use of processor

c) all of the mentioned

d) none of the mentioned

Answer: a

8. There are 10 different processes running on a workstation. Idle processes are waiting for an input event
in the input queue. Busy processes are scheduled with the Round-Robin time sharing method. Which out
of the following quantum times is the best value for small response times, if the processes have a short
runtime, e.g. less than 10ms?

a) tQ = 15ms

b) tQ = 40ms

c) tQ = 45ms

d) tQ = 50ms

Answer: a

9. Orders are processed in the sequence they arrive if _______ rule sequences the jobs.

a) earliest due date

b) slack time remaining

c) first come, first served

d) critical ratio

Answer: c

10. Which of the following algorithms tends to minimize the process flow time?

a) First come First served

b) Shortest Job First

c) Earliest Deadline First

d) Longest Job First

Answer: b
11. Under multiprogramming, turnaround time for short jobs is usually ________ and that for long jobs is
slightly ___________

a) Lengthened; Shortened

b) Shortened; Lengthened

c) Shortened; Shortened

d) Shortened; Unchanged

Answer: b

12. Which of the following statements are true? (GATE 2010)

I. Shortest remaining time first scheduling may cause starvation

II. Preemptive scheduling may cause starvation

III. Round robin is better than FCFS in terms of response time

a) I only

b) I and III only

c) II and III only

d) I, II and III

Answer: d

Explanation: I) Shortest remaining time first scheduling is a preemptive version of shortest job
scheduling. It may cause starvation as shorter processes may keep coming and a long CPU burst process
never gets CPU.

II) Preemption may cause starvation. If priority based scheduling with preemption is used, then a low
priority process may never get CPU.

III) Round Robin Scheduling improves response time as all processes get CPU after a specified time.

This set of Operating System Questions and Answers for Freshers focuses on “CPU Scheduling
Algorithms-2” and will also be useful for interview preparations for freshers.

1. Which is the most optimal scheduling algorithm?

a) FCFS – First come First served

b) SJF – Shortest Job First

c) RR – Round Robin

d) None of the mentioned


Answer: b

2. The real difficulty with SJF in short term scheduling is ____________

a) it is too good an algorithm

b) knowing the length of the next CPU request

c) it is too complex to understand

d) none of the mentioned

Answer: b

3. The FCFS algorithm is particularly troublesome for ____________

a) time sharing systems

b) multiprogramming systems

c) multiprocessor systems

d) operating systems

Answer: b

Explanation: In a time sharing system, each user needs to get a share of the CPU at regular intervals.

4. Consider the following set of processes, the length of the CPU burst time given in milliseconds.

Process Burst time

P1 6

P2 8

P3 7

P4 3

Assuming the above process being scheduled with the SJF scheduling algorithm.

a) The waiting time for process P1 is 3ms

b) The waiting time for process P1 is 0ms

c) The waiting time for process P1 is 16ms

d) The waiting time for process P1 is 9ms

Answer: a

5. Preemptive Shortest Job First scheduling is sometimes called ____________

a) Fast SJF scheduling

b) EDF scheduling – Earliest Deadline First


c) HRRN scheduling – Highest Response Ratio Next

d) SRTN scheduling – Shortest Remaining Time Next

Answer: d

6. An SJF algorithm is simply a priority algorithm where the priority is ____________

a) the predicted next CPU burst

b) the inverse of the predicted next CPU burst

c) the current CPU burst

d) anything the user wants

Answer: a

Explanation: The larger the CPU burst, the lower the priority.

7. Choose one of the disadvantages of the priority scheduling algorithm?

a) it schedules in a very complex manner

b) its scheduling takes up a lot of time

c) it can lead to some low priority process waiting indefinitely for the CPU

d) none of the mentioned

Answer: c

8. What is ‘Aging’?

a) keeping track of cache contents

b) keeping track of what pages are currently residing in memory

c) keeping track of how many times a given page is referenced

d) increasing the priority of jobs to ensure termination in a finite time

Answer: d

9. A solution to the problem of indefinite blockage of low – priority processes is ____________

a) Starvation

b) Wait queue

c) Ready queue

d) Aging

Answer: d

10. Which of the following statements are true? (GATE 2010)


i) Shortest remaining time first scheduling may cause starvation

ii) Preemptive scheduling may cause starvation

iii) Round robin is better than FCFS in terms of response time

a) i only

b) i and iii only

c) ii and iii only

d) i, ii and iii

Answer: d

11. Which of the following scheduling algorithms gives minimum average waiting time?

a) FCFS

b) SJF

c) Round – robin

d) Priority

Answer: b

This set of Operating System Multiple Choice Questions & Answers (MCQs) focuses on
“Deadlock”.

1. What is a reusable resource?

a) that can be used by one process at a time and is not depleted by that use

b) that can be used by more than one process at a time

c) that can be shared between various threads

d) none of the mentioned

Answer: a

2. Which of the following condition is required for a deadlock to be possible?

a) mutual exclusion

b) a process may hold allocated resources while awaiting assignment of other resources

c) no resource can be forcibly removed from a process holding it

d) all of the mentioned

Answer: d
3. A system is in the safe state if ____________

a) the system can allocate resources to each process in some order and still avoid a deadlock

b) there exist a safe sequence

c) all of the mentioned

d) none of the mentioned

Answer: a

4. The circular wait condition can be prevented by ____________

a) defining a linear ordering of resource types

b) using thread

c) using pipes

d) all of the mentioned

Answer: a

5. Which one of the following is the deadlock avoidance algorithm?

a) banker’s algorithm

b) round-robin algorithm

c) elevator algorithm

d) karn’s algorithm

Answer: a

6. What is the drawback of banker’s algorithm?

a) in advance processes rarely know how much resource they will need

b) the number of processes changes as time progresses

c) resource once available can disappear

d) all of the mentioned

Answer: d

7. For an effective operating system, when to check for deadlock?

a) every time a resource request is made

b) at fixed time intervals

c) every time a resource request is made at fixed time intervals

d) none of the mentioned


Answer: c

8. A problem encountered in multitasking when a process is perpetually denied necessary resources is


called ____________

a) deadlock

b) starvation

c) inversion

d) aging

Answer: b

9. Which one of the following is a visual ( mathematical ) way to determine the deadlock occurrence?

a) resource allocation graph

b) starvation graph

c) inversion graph

d) none of the mentioned

Answer: a

10. To avoid deadlock ____________

a) there must be a fixed number of resources to allocate

b) resource allocation must be done only once

c) all deadlocked processes must be aborted

d) inversion technique can be used

Answer: a

This set of Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Deadlock
Prevention”.

1. The number of resources requested by a process ____________

a) must always be less than the total number of resources available in the system

b) must always be equal to the total number of resources available in the system

c) must not exceed the total number of resources available in the system

d) must exceed the total number of resources available in the system

Answer: c
2. The request and release of resources are ___________

a) command line statements

b) interrupts

c) system calls

d) special programs

Answer: c

3. What are Multithreaded programs?

a) lesser prone to deadlocks

b) more prone to deadlocks

c) not at all prone to deadlocks

d) none of the mentioned

Answer: b

Explanation: Multiple threads can compete for shared resources.

4. For a deadlock to arise, which of the following conditions must hold simultaneously?

a) Mutual exclusion

b) No preemption

c) Hold and wait

d) All of the mentioned

Answer: d

5. For Mutual exclusion to prevail in the system ____________

a) at least one resource must be held in a non sharable mode

b) the processor must be a uniprocessor rather than a multiprocessor

c) there must be at least one resource in a sharable mode

d) all of the mentioned

Answer: a

Explanation: If another process requests that resource (non – shareable resource), the requesting process
must be delayed until the resource has been released.

6. For a Hold and wait condition to prevail ____________


a) A process must be not be holding a resource, but waiting for one to be freed, and then request to
acquire it

b) A process must be holding at least one resource and waiting to acquire additional resources that are
being held by other processes

c) A process must hold at least one resource and not be waiting to acquire additional resources

d) None of the mentioned

Answer: b

7. Deadlock prevention is a set of methods ____________

a) to ensure that at least one of the necessary conditions cannot hold

b) to ensure that all of the necessary conditions do not hold

c) to decide if the requested resources for a process have to be given or not

d) to recover from a deadlock

Answer: a

8. For non sharable resources like a printer, mutual exclusion ____________

a) must exist

b) must not exist

c) may exist

d) none of the mentioned

Answer: a

Explanation: A printer cannot be simultaneously shared by several processes.

9. For sharable resources, mutual exclusion ____________

a) is required

b) is not required

c) may be or may not be required

d) none of the mentioned

Answer: b

Explanation: They do not require mutually exclusive access, and hence cannot be involved in a deadlock.

10. To ensure that the hold and wait condition never occurs in the system, it must be ensured that
____________

a) whenever a resource is requested by a process, it is not holding any other resources


b) each process must request and be allocated all its resources before it begins its execution

c) a process can request resources only when it has none

d) all of the mentioned

Answer: d

Explanation: c – A process may request some resources and use them. Before it can can request any
additional resources, however it must release all the resources that it is currently allocated.

11. The disadvantage of a process being allocated all its resources before beginning its execution is
____________

a) Low CPU utilization

b) Low resource utilization

c) Very high resource utilization

d) None of the mentioned

Answer: b

12. To ensure no preemption, if a process is holding some resources and requests another resource that
cannot be immediately allocated to it ____________

a) then the process waits for the resources be allocated to it

b) the process keeps sending requests until the resource is allocated to it

c) the process resumes execution without the resource being allocated to it

d) then all resources currently being held are preempted

Answer: d

13. One way to ensure that the circular wait condition never holds is to ____________

a) impose a total ordering of all resource types and to determine whether one precedes another in the
ordering

b) to never let a process acquire resources that are held by other processes

c) to let a process wait for only one resource at a time

d) all of the mentioned

Answer: a

Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Deadlock
Avoidance”.

1. Each request requires that the system consider the _____________ to decide whether the current
request can be satisfied or must wait to avoid a future possible deadlock.
a) resources currently available

b) processes that have previously been in the system

c) resources currently allocated to each process

d) future requests and releases of each process

Answer: a

2. Given a priori information about the ________ number of resources of each type that maybe requested
for each process, it is possible to construct an algorithm that ensures that the system will never enter a
deadlock state.

a) minimum

b) average

c) maximum

d) approximate

Answer: c

3. A deadlock avoidance algorithm dynamically examines the __________ to ensure that a circular wait
condition can never exist.

a) resource allocation state

b) system storage state

c) operating system

d) resources

Answer: a

Explanation: Resource allocation states are used to maintain the availability of the already and current
available resources.

4. A state is safe, if ____________

a) the system does not crash due to deadlock occurrence

b) the system can allocate resources to each process in some order and still avoid a deadlock

c) the state keeps the system protected and safe

d) all of the mentioned

Answer: b

5. A system is in a safe state only if there exists a ____________

a) safe allocation
b) safe resource

c) safe sequence

d) all of the mentioned

Answer: c

6. All unsafe states are ____________

a) deadlocks

b) not deadlocks

c) fatal

d) none of the mentioned

Answer: b

7. A system has 12 magnetic tape drives and 3 processes : P0, P1, and P2. Process P0 requires 10 tape
drives, P1 requires 4 and P2 requires 9 tape drives.

Process

P0

P1

P2

Maximum needs (process-wise: P0 through P2 top to bottom)

10

Currently allocated (process-wise)

Which of the following sequence is a safe sequence?

a) P0, P1, P2

b) P1, P2, P0

c) P2, P0, P1

d) P1, P0, P2
Answer: d

8. If no cycle exists in the resource allocation graph ____________

a) then the system will not be in a safe state

b) then the system will be in a safe state

c) all of the mentioned

d) none of the mentioned

Answer: b

9. The resource allocation graph is not applicable to a resource allocation system ____________

a) with multiple instances of each resource type

b) with a single instance of each resource type

c) single & multiple instances of each resource type

d) none of the mentioned

Answer: a

10. The Banker’s algorithm is _____________ than the resource allocation graph algorithm.

a) less efficient

b) more efficient

c) equal

d) none of the mentioned

Answer: a

11. The data structures available in the Banker’s algorithm are ____________

a) Available

b) Need

c) Allocation

d) All of the mentioned

Answer: d

12. The content of the matrix Need is ____________

a) Allocation – Available

b) Max – Available

c) Max – Allocation
d) Allocation – Max

Answer: c

13. A system with 5 processes P0 through P4 and three resource types A, B, C have A with 10 instances,
B with 5 instances, and C with 7 instances. At time t0, the following snapshot has been taken:

Process

P0

P1

P2

P3

P4

Allocation (process-wise : P0 through P4 top TO bottom)

A B C

0 1 0

2 0 0

3 0 2

2 1 1

0 0 2

MAX (process-wise: P0 through P4 top TO bottom)

A B C

7 5 3

3 2 2

9 0 2

2 2 2

4 3 3

Available

A B C

3 3 2

The sequence <P1, P3, P4, P2, P0> leads the system to ____________

a) an unsafe state
b) a safe state

c) a protected state

d) a deadlock

Answer: b

Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Deadlock Detection”.

1. The wait-for graph is a deadlock detection algorithm that is applicable when ____________

a) all resources have a single instance

b) all resources have multiple instances

c) all resources have a single 7 multiple instances

d) all of the mentioned

Answer: a

2. An edge from process Pi to Pj in a wait for graph indicates that ____________

a) Pi is waiting for Pj to release a resource that Pi needs

b) Pj is waiting for Pi to release a resource that Pj needs

c) Pi is waiting for Pj to leave the system

d) Pj is waiting for Pi to leave the system

Answer: a

3. If the wait for graph contains a cycle ____________

a) then a deadlock does not exist

b) then a deadlock exists

c) then the system is in a safe state

d) either deadlock exists or system is in a safe state

Answer: b

4. If deadlocks occur frequently, the detection algorithm must be invoked ________

a) rarely

b) frequently

c) rarely & frequently

d) none of the mentioned


Answer: b

5. What is the disadvantage of invoking the detection algorithm for every request?

a) overhead of the detection algorithm due to consumption of memory

b) excessive time consumed in the request to be allocated memory

c) considerable overhead in computation time

d) all of the mentioned

Answer: c

6. A deadlock eventually cripples system throughput and will cause the CPU utilization to ______

a) increase

b) drop

c) stay still

d) none of the mentioned

Answer: b

7. Every time a request for allocation cannot be granted immediately, the detection algorithm is invoked.
This will help identify ____________

a) the set of processes that have been deadlocked

b) the set of processes in the deadlock queue

c) the specific process that caused the deadlock

d) all of the mentioned

Answer: a

8. A computer system has 6 tape drives, with ‘n’ processes competing for them. Each process may need 3
tape drives. The maximum value of ‘n’ for which the system is guaranteed to be deadlock free is?

a) 2

b) 3

c) 4

d) 1

Answer: a

9. A system has 3 processes sharing 4 resources. If each process needs a maximum of 2 units then,
deadlock ____________

a) can never occur


b) may occur

c) has to occur

d) none of the mentioned

Answer: a

10. ‘m’ processes share ‘n’ resources of the same type. The maximum need of each process doesn’t
exceed ‘n’ and the sum of all their maximum needs is always less than m+n. In this setup, deadlock
____________

a) can never occur

b) may occur

c) has to occur

d) none of the mentioned

Answer: a

Operating System Questions and Answers for Experienced people focuses on “Deadlock Recovery”
and will also be useful for interview preparations for experienced people.

1. A deadlock can be broken by ____________

a) abort one or more processes to break the circular wait

b) abort all the process in the system

c) preempt all resources from all processes

d) none of the mentioned

Answer: a

2. The two ways of aborting processes and eliminating deadlocks are ____________

a) Abort all deadlocked processes

b) Abort all processes

c) Abort one process at a time until the deadlock cycle is eliminated

d) All of the mentioned

Answer: c

3. Those processes should be aborted on occurrence of a deadlock, the termination of which?

a) is more time consuming

b) incurs minimum cost

c) safety is not hampered


d) all of the mentioned

Answer: b

4. The process to be aborted is chosen on the basis of the following factors?

a) priority of the process

b) process is interactive or batch

c) how long the process has computed

d) all of the mentioned

Answer: d

5. Cost factors for process termination include ____________

a) Number of resources the deadlock process is not holding

b) CPU utilization at the time of deadlock

c) Amount of time a deadlocked process has thus far consumed during its execution

d) All of the mentioned

Answer: c

6. If we preempt a resource from a process, the process cannot continue with its normal execution and it
must be ____________

a) aborted

b) rolled back

c) terminated

d) queued

Answer: b

7. To _______ to a safe state, the system needs to keep more information about the states of processes.

a) abort the process

b) roll back the process

c) queue the process

d) none of the mentioned

Answer: b

8. If the resources are always preempted from the same process __________ can occur.

a) deadlock
b) system crash

c) aging

d) starvation

Answer: d

9. What is the solution to starvation?

a) the number of rollbacks must be included in the cost factor

b) the number of resources must be included in resource preemption

c) resource preemption be done instead

d) all of the mentioned

Answer: a

Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Swapping Processes
– 1”.

1. What is Address Binding?

a) going to an address in memory

b) locating an address with the help of another address

c) binding two addresses together to form a new address in a different memory space

d) a mapping from one address space to another

Answer: d

2. Binding of instructions and data to memory addresses can be done at ____________

a) Compile time

b) Load time

c) Execution time

d) All of the mentioned

Answer: d

3. If the process can be moved during its execution from one memory segment to another, then binding
must be ____________

a) delayed until run time

b) preponed to compile time


c) preponed to load time

d) none of the mentioned

Answer: a

4. What is Dynamic loading?

a) loading multiple routines dynamically

b) loading a routine only when it is called

c) loading multiple routines randomly

d) none of the mentioned

Answer: b

5. What is the advantage of dynamic loading?

a) A used routine is used multiple times

b) An unused routine is never loaded

c) CPU utilization increases

d) All of the mentioned

Answer: b

6. The idea of overlays is to ____________

a) data that are needed at any given time

b) enable a process to be larger than the amount of memory allocated to it

c) keep in memory only those instructions

d) all of the mentioned

Answer: d

7. The ___________ must design and program the overlay structure.

a) programmer

b) system architect

c) system designer

d) none of the mentioned

Answer: a

8. The ___________ swaps processes in and out of the memory.

a) Memory manager
b) CPU

c) CPU manager

d) User

Answer: a

9. If a higher priority process arrives and wants service, the memory manager can swap out the lower
priority process to execute the higher priority process. When the higher priority process finishes, the
lower priority process is swapped back in and continues execution. This variant of swapping is sometimes
called?

a) priority swapping

b) pull out, push in

c) roll out, roll in

d) none of the mentioned

Answer: c

10. If binding is done at assembly or load time, then the process _____ be moved to different locations
after being swapped out and in again.

a) can

b) must

c) can never

d) may

Answer: c

11. In a system that does not support swapping ____________

a) the compiler normally binds symbolic addresses (variables) to relocatable addresses

b) the compiler normally binds symbolic addresses to physical addresses

c) the loader binds relocatable addresses to physical addresses

d) binding of symbolic addresses to physical addresses normally takes place during execution

Answer: a

12. Which of the following is TRUE?

a) Overlays are used to increase the size of physical memory

b) Overlays are used to increase the logical address space

c) When overlays are used, the size of a process is not limited to the size of the physical memory
d) Overlays are used whenever the physical address space is smaller than the logical address space

Answer: c

Operating System Interview Questions and Answers focuses on “Swapping Processes”

1. The address generated by the CPU is referred to as ____________

a) Physical address

b) Logical address

c) Neither physical nor logical

d) None of the mentioned

Answer: b

2. The address loaded into the memory address register of the memory is referred to as ____________

a) Physical address

b) Logical address

c) Neither physical nor logical

d) None of the mentioned

Answer: a

3. The run time mapping from virtual to physical addresses is done by a hardware device called the
____________

a) Virtual to physical mapper

b) Memory management unit

c) Memory mapping unit

d) None of the mentioned

Answer: b

4. The base register is also known as the ____________

a) basic register

b) regular register

c) relocation register

d) delocation register

Answer: c
5. The size of a process is limited to the size of ____________

a) physical memory

b) external storage

c) secondary storage

d) none of the mentioned

Answer: a

6. If execution time binding is being used, then a process ______ be swapped to a different memory
space.

a) has to be

b) can never

c) must

d) may

Answer: d

7. Swapping requires a _________

a) motherboard

b) keyboard

c) monitor

d) backing store

Answer: d

8. The backing store is generally a ____________

a) fast disk

b) disk large enough to accommodate copies of all memory images for all users

c) disk to provide direct access to the memory images

d) all of the mentioned

Answer: d

9. The ________ consists of all processes whose memory images are in the backing store or in memory
and are ready to run.

a) wait queue

b) ready queue
c) cpu

d) secondary storage

Answer: b

10. The _________ time in a swap out of a running process and swap in of a new process into the
memory is very high.

a) context – switch

b) waiting

c) execution

d) all of the mentioned

Answer: a

11. The major part of swap time is _______ time.

a) waiting

b) transfer

c) execution

d) none of the mentioned

Answer: b

12. Swapping _______ be done when a process has pending I/O, or has to execute I/O operations only
into operating system buffers.

a) must

b) can

c) must never

d) maybe

Answer: c

13. Swap space is allocated ____________

a) as a chunk of disk

b) separate from a file system

c) into a file system

d) all of the mentioned

Answer: a
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Memory
Management”.

1. CPU fetches the instruction from memory according to the value of ____________

a) program counter

b) status register

c) instruction register

d) program status word

Answer: a

2. A memory buffer used to accommodate a speed differential is called ____________

a) stack pointer

b) cache

c) accumulator

d) disk buffer

Answer: b

3. Which one of the following is the address generated by CPU?

a) physical address

b) absolute address

c) logical address

d) none of the mentioned

Answer: c

4. Run time mapping from virtual to physical address is done by ____________

a) Memory management unit

b) CPU

c) PCI

d) None of the mentioned

Answer: a

5. Memory management technique in which system stores and retrieves data from secondary storage for
use in main memory is called?
a) fragmentation

b) paging

c) mapping

d) none of the mentioned

Answer: b

6. The address of a page table in memory is pointed by ____________

a) stack pointer

b) page table base register

c) page register

d) program counter

Answer: b

7. Program always deals with ____________

a) logical address

b) absolute address

c) physical address

d) relative address

Answer: a

8. The page table contains ____________

a) base address of each page in physical memory

b) page offset

c) page size

d) none of the mentioned

Answer: a

9. What is compaction?

a) a technique for overcoming internal fragmentation

b) a paging technique

c) a technique for overcoming external fragmentation

d) a technique for overcoming fatal error

Answer: c
10. Operating System maintains the page table for ____________

a) each process

b) each thread

c) each instruction

d) each address

Answer: a

Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Memory
Management – Memory Allocation – 1”.

1. The main memory accommodates ____________

a) operating system

b) cpu

c) user processes

d) all of the mentioned

Answer: a

2. What is the operating system?

a) in the low memory

b) in the high memory

c) either low or high memory (depending on the location of interrupt vector)

d) none of the mentioned

Answer: c

3. In contiguous memory allocation ____________

a) each process is contained in a single contiguous section of memory

b) all processes are contained in a single contiguous section of memory

c) the memory space is contiguous

d) none of the mentioned

Answer: a

4. The relocation register helps in ____________

a) providing more address space to processes


b) a different address space to processes

c) to protect the address spaces of processes

d) none of the mentioned

Answer: c

5. With relocation and limit registers, each logical address must be _______ the limit register.

a) less than

b) equal to

c) greater than

d) none of the mentioned

Answer: a

6. The operating system and the other processes are protected from being modified by an already running
process because ____________

a) they are in different memory spaces

b) they are in different logical addresses

c) they have a protection algorithm

d) every address generated by the CPU is being checked against the relocation and limit registers

Answer: d

7. Transient operating system code is code that ____________

a) is not easily accessible

b) comes and goes as needed

c) stays in the memory always

d) never enters the memory space

Answer: b

8. Using transient code, _______ the size of the operating system during program execution.

a) increases

b) decreases

c) changes

d) maintains

Answer: c
9. When memory is divided into several fixed sized partitions, each partition may contain ________

a) exactly one process

b) at least one process

c) multiple processes at once

d) none of the mentioned

Answer: a

10. In fixed size partition, the degree of multiprogramming is bounded by ___________

a) the number of partitions

b) the CPU utilization

c) the memory size

d) all of the mentioned

Answer: a

11. The first fit, best fit and worst fit are strategies to select a ______

a) process from a queue to put in memory

b) processor to run the next process

c) free hole from a set of available holes

d) all of the mentioned

Answer: c

Operating System test focuses on “Memory Allocation – 2”.

1. In internal fragmentation, memory is internal to a partition and ____________

a) is being used

b) is not being used

c) is always used

d) none of the mentioned

Answer: b

2. A solution to the problem of external fragmentation is ____________

a) compaction

b) larger memory space


c) smaller memory space

d) none of the mentioned

Answer: a

3. Another solution to the problem of external fragmentation problem is to ____________

a) permit the logical address space of a process to be noncontiguous

b) permit smaller processes to be allocated memory at last

c) permit larger processes to be allocated memory at last

d) all of the mentioned

Answer: a

4. If relocation is static and is done at assembly or load time, compaction _________

a) cannot be done

b) must be done

c) must not be done

d) can be done

Answer: a

5. The disadvantage of moving all process to one end of memory and all holes to the other direction,
producing one large hole of available memory is ____________

a) the cost incurred

b) the memory used

c) the CPU used

d) all of the mentioned

Answer: a

6. __________ is generally faster than _________ and _________

a) first fit, best fit, worst fit

b) best fit, first fit, worst fit

c) worst fit, best fit, first fit

d) none of the mentioned

Answer: a

7. External fragmentation exists when?


a) enough total memory exists to satisfy a request but it is not contiguous

b) the total memory is insufficient to satisfy a request

c) a request cannot be satisfied even when the total memory is free

d) none of the mentioned

Answer: a

8. External fragmentation will not occur when?

a) first fit is used

b) best fit is used

c) worst fit is used

d) no matter which algorithm is used, it will always occur

Answer: d

9. Sometimes the overhead of keeping track of a hole might be ____________

a) larger than the memory

b) larger than the hole itself

c) very small

d) all of the mentioned

Answer: b

10. When the memory allocated to a process is slightly larger than the process, then ____________

a) internal fragmentation occurs

b) external fragmentation occurs

c) both internal and external fragmentation occurs

d) neither internal nor external fragmentation occurs

Answer: a

Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Paging – 1”.

1. Physical memory is broken into fixed-sized blocks called ________

a) frames

b) pages

c) backing store
d) none of the mentioned

Answer: a

2. Logical memory is broken into blocks of the same size called _________

a) frames

b) pages

c) backing store

d) none of the mentioned

Answer: b

3. Every address generated by the CPU is divided into two parts. They are ____________

a) frame bit & page number

b) page number & page offset

c) page offset & frame bit

d) frame offset & page offset

Answer: b

4. The __________ is used as an index into the page table.

a) frame bit

b) page number

c) page offset

d) frame offset

Answer: b

5. The _____ table contains the base address of each page in physical memory.

a) process

b) memory

c) page

d) frame

Answer: c

6. The size of a page is typically ____________

a) varied

b) power of 2
c) power of 4

d) none of the mentioned

Answer: b

7. If the size of logical address space is 2 to the power of m, and a page size is 2 to the power of n
addressing units, then the high order _____ bits of a logical address designate the page number, and the
____ low order bits designate the page offset.

a) m, n

b) n, m

c) m – n, m

d) m – n, n

Answer: d

8. With paging there is no ________ fragmentation.

a) internal

b) external

c) either type of

d) none of the mentioned

Answer: b

9. The operating system maintains a ______ table that keeps track of how many frames have been
allocated, how many are there, and how many are available.

a) page

b) mapping

c) frame

d) memory

Answer: c

10. Paging increases the ______ time.

a) waiting

b) execution

c) context – switch

d) all of the mentioned

Answer: c
11. Smaller page tables are implemented as a set of _______

a) queues

b) stacks

c) counters

d) registers

Answer: d

12. The page table registers should be built with _______

a) very low speed logic

b) very high speed logic

c) a large memory space

d) none of the mentioned

Answer: b

13. For larger page tables, they are kept in main memory and a __________ points to the page table.

a) page table base register

b) page table base pointer

c) page table register pointer

d) page table base

Answer: a

14. For every process there is a __________

a) page table

b) copy of page table

c) pointer to page table

d) all of the mentioned

Answer: a

15. Time taken in memory access through PTBR is ____________

a) extended by a factor of 3

b) extended by a factor of 2

c) slowed by a factor of 3

d) slowed by a factor of 2
Answer: d

Operating System Quiz focuses on “Paging – 2”.

1. Each entry in a translation lookaside buffer (TLB) consists of ____________

a) key

b) value

c) bit value

d) constant

Answer: a

2. If a page number is not found in the TLB, then it is known as a ____________

a) TLB miss

b) Buffer miss

c) TLB hit

d) All of the mentioned

Answer: a

3. An ______ uniquely identifies processes and is used to provide address space protection for that
process.

a) address space locator

b) address space identifier

c) address process identifier

d) none of the mentioned

Answer: b

4. The percentage of times a page number is found in the TLB is known as ____________

a) miss ratio

b) hit ratio

c) miss percent

d) none of the mentioned

Answer: b

5. Memory protection in a paged environment is accomplished by ____________


a) protection algorithm with each page

b) restricted access rights to users

c) restriction on page visibility

d) protection bit with each page

Answer: d

6. When the valid – invalid bit is set to valid, it means that the associated page ____________

a) is in the TLB

b) has data in it

c) is in the process’s logical address space

d) is the system’s physical address space

Answer: c

7. Illegal addresses are trapped using the _____ bit.

a) error

b) protection

c) valid – invalid

d) access

Answer: c

8. When there is a large logical address space, the best way of paging would be ____________

a) not to page

b) a two level paging algorithm

c) the page table itself

d) all of the mentioned

Answer: b

9. In a paged memory, the page hit ratio is 0.35. The required to access a page in secondary memory is
equal to 100 ns. The time required to access a page in primary memory is 10 ns. The average time
required to access a page is?

a) 3.0 ns

b) 68.0 ns

c) 68.5 ns
d) 78.5 ns

Answer: c

10. To obtain better memory utilization, dynamic loading is used. With dynamic loading, a routine is not
loaded until it is called. For implementing dynamic loading ____________

a) special support from hardware is required

b) special support from operating system is essential

c) special support from both hardware and operating system is essential

d) user programs can implement dynamic loading without any special support from hardware or operating
system

Answer: d

11. In paged memory systems, if the page size is increased, then the internal fragmentation generally
____________

a) becomes less

b) becomes more

c) remains constant

d) none of the mentioned

Answer: b

Operating System MCQs focuses on “Memory Management – Segmentation”

1. In segmentation, each address is specified by ____________

a) a segment number & offset

b) an offset & value

c) a value & segment number

d) a key & value

Answer: a

2. In paging the user provides only ________ which is partitioned by the hardware into ________ and
______

a) one address, page number, offset

b) one offset, page number, address

c) page number, offset, address


d) none of the mentioned

Answer: a

3. Each entry in a segment table has a ____________

a) segment base

b) segment peak

c) segment value

d) none of the mentioned

Answer: a

4. The segment base contains the ____________

a) starting logical address of the process

b) starting physical address of the segment in memory

c) segment length

d) none of the mentioned

Answer: b

5. The segment limit contains the ____________

a) starting logical address of the process

b) starting physical address of the segment in memory

c) segment length

d) none of the mentioned

Answer: c

6. The offset ‘d’ of the logical address must be ____________

a) greater than segment limit

b) between 0 and segment limit

c) between 0 and the segment number

d) greater than the segment number

Answer: b

7. If the offset is legal ____________

a) it is used as a physical memory address itself

b) it is subtracted from the segment base to produce the physical memory address
c) it is added to the segment base to produce the physical memory address

d) none of the mentioned

Answer: a

8. When the entries in the segment tables of two different processes point to the same physical location
____________

a) the segments are invalid

b) the processes get blocked

c) segments are shared

d) all of the mentioned

Answer: c

9. The protection bit is 0/1 based on ____________

a) write only

b) read only

c) read – write

d) none of the mentioned

Answer: c

10. If there are 32 segments, each of size 1Kb, then the logical address should have ____________

a) 13 bits

b) 14 bits

c) 15 bits

d) 16 bits

Answer: a

Explanation: To specify a particular segment, 5 bits are required. To select a particular byte after selecting
a page, 10 more bits are required. Hence 15 bits are required.

11. Consider a computer with 8 Mbytes of main memory and a 128K cache. The cache block size is 4 K.
It uses a direct mapping scheme for cache management. How many different main memory blocks can
map onto a given physical cache block?

a) 2048

b) 256

c) 64
d) 8

Answer: c

12. A multilevel page table is preferred in comparison to a single level page table for translating virtual
address to physical address because ____________

a) it reduces the memory access time to read or write a memory location

b) it helps to reduce the size of page table needed to implement the virtual address space of a process

c) it is required by the translation lookaside buffer

d) it helps to reduce the number of page faults in page replacement algorithms

Answer: b

Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Disk Scheduling –
1”.

1. In _______ information is recorded magnetically on platters.

a) magnetic disks

b) electrical disks

c) assemblies

d) cylinders

Answer: a

2. The heads of the magnetic disk are attached to a _____ that moves all the heads as a unit.

a) spindle

b) disk arm

c) track

d) none of the mentioned

Answer: b

3. The set of tracks that are at one arm position make up a ___________

a) magnetic disks

b) electrical disks

c) assemblies

d) cylinders
Answer: d

4. The time taken to move the disk arm to the desired cylinder is called the ____________

a) positioning time

b) random access time

c) seek time

d) rotational latency

Answer: c

5. The time taken for the desired sector to rotate to the disk head is called ____________

a) positioning time

b) random access time

c) seek time

d) rotational latency

Answer: d

6. When the head damages the magnetic surface, it is known as _________

a) disk crash

b) head crash

c) magnetic damage

d) all of the mentioned

Answer: b

7. A floppy disk is designed to rotate ___________ as compared to a hard disk drive.

a) faster

b) slower

c) at the same speed

d) none of the mentioned

Answer: b

8. What is the host controller?

a) controller built at the end of each disk

b) controller at the computer end of the bus

c) all of the mentioned


d) none of the mentioned

Answer: b

9. ______ controller sends the command placed into it, via messages to the _____ controller.

a) host, host

b) disk, disk

c) host, disk

d) disk, host

Answer: c

10. What is the disk bandwidth?

a) the total number of bytes transferred

b) total time between the first request for service and the completion on the last transfer

c) the total number of bytes transferred divided by the total time between the first request for service and
the completion on the last transfer

d) none of the mentioned

Answer: c

Operating System online quiz focuses on “Disk Scheduling – 2”.

1. Whenever a process needs I/O to or from a disk it issues a ______________

a) system call to the CPU

b) system call to the operating system

c) a special procedure

d) all of the mentioned

Answer: b

2. If a process needs I/O to or from a disk, and if the drive or controller is busy then ____________

a) the request will be placed in the queue of pending requests for that drive

b) the request will not be processed and will be ignored completely

c) the request will be not be placed

d) none of the mentioned

Answer: a
3. Consider a disk queue with requests for I/O to blocks on cylinders.

98 183 37 122 14 124 65 67

Considering FCFS (first cum first served) scheduling, the total number of head movements is, if the disk
head is initially at 53 is?

a) 600

b) 620

c) 630

d) 640

Answer: d

4. Consider a disk queue with requests for I/O to blocks on cylinders.

98 183 37 122 14 124 65 67

Considering SSTF (shortest seek time first) scheduling, the total number of head movements is, if the disk
head is initially at 53 is?

a) 224

b) 236

c) 245

d) 240

Answer: b

5. Random access in magnetic tapes is _________ compared to magnetic disks.

a) fast

b) very fast

c) slow

d) very slow

Answer: d

6. Magnetic tape drives can write data at a speed ________ disk drives.

a) much lesser than

b) comparable to

c) much faster than

d) none of the mentioned


Answer: b

7. On media that use constant linear velocity (CLV), the _____________ is uniform.

a) density of bits on the disk

b) density of bits per sector

c) the density of bits per track

d) none of the mentioned

Answer: c

Explanation: The farther a track is from the center of the disk.

8. SSTF algorithm, like SJF __________ of some requests.

a) may cause starvation

b) will cause starvation

c) does not cause starvation

d) causes aging

Answer: a

9. In the ______ algorithm, the disk arm starts at one end of the disk and moves toward the other end,
servicing requests till the other end of the disk. At the other end, the direction is reversed and servicing
continues.

a) LOOK

b) SCAN

c) C-SCAN

d) C-LOOK

Answer: b

10. In the _______ algorithm, the disk head moves from one end to the other, servicing requests along the
way. When the head reaches the other end, it immediately returns to the beginning of the disk without
servicing any requests on the return trip.

a) LOOK

b) SCAN

c) C-SCAN

d) C-LOOK

Answer: c
11. In the ______ algorithm, the disk arm goes as far as the final request in each direction, then reverses
direction immediately without going to the end of the disk.

a) LOOK

b) SCAN

c) C-SCAN

d) C-LOOK

Answer: a

Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Disk Management”.

1. The process of dividing a disk into sectors that the disk controller can read and write, before a disk can
store data is known as ____________

a) partitioning

b) swap space creation

c) low-level formatting

d) none of the mentioned

Answer: c

2. The data structure for a sector typically contains ____________

a) header

b) data area

c) trailer

d) all of the mentioned

Answer: d

3. The header and trailer of a sector contain information used by the disk controller such as _________
and _________

a) main section & disk identifier

b) error correcting codes (ECC) & sector number

c) sector number & main section

d) disk identifier & sector number

Answer: b

4. The two steps the operating system takes to use a disk to hold its files are _______ and ________
a) partitioning & logical formatting

b) swap space creation & caching

c) caching & logical formatting

d) logical formatting & swap space creation

Answer: a

5. The _______ program initializes all aspects of the system, from CPU registers to device controllers and
the contents of main memory, and then starts the operating system.

a) main

b) bootloader

c) bootstrap

d) rom

Answer: c

6. For most computers, the bootstrap is stored in ________

a) RAM

b) ROM

c) Cache

d) Tertiary storage

Answer: b

7. A disk that has a boot partition is called a _________

a) start disk

b) end disk

c) boot disk

d) all of the mentioned

Answer: c

8. Defective sectors on disks are often known as __________

a) good blocks

b) destroyed blocks

c) bad blocks

d) none of the mentioned


Answer: c

9. In SCSI disks used in high end PCs, the controller maintains a list of _________ on the disk. The disk
is initialized during ________ formatting which sets aside spare sectors not visible to the operating
system.

a) destroyed blocks, high level formatting

b) bad blocks, partitioning

c) bad blocks, low level formatting

d) destroyed blocks, partitioning

Answer: c

10. The scheme used in the above question is known as _______ or ________

a) sector sparing & forwarding

b) forwarding & sector utilization

c) backwarding & forwarding

d) sector utilization & backwarding

Answer: a

11. An unrecoverable error is known as _________

a) hard error

b) tough error

c) soft error

d) none of the mentioned

Answer: a

Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Swap Space
Management”.

1. Virtual memory uses disk space as an extension of _________

a) secondary storage

b) main memory

c) tertiary storage

d) none of the mentioned

Answer: b
2. Using swap space significantly _________ system performance.

a) increases

b) decreases

c) maintains

d) does not affect

Answer: b

Explanation: Disk access is much slower than memory access.

3. Linux __________ the use of multiple swap spaces.

a) allows

b) does not allow

c) may allow

d) none of the mentioned

Answer: a

Explanation: Putting these swap spaces on separate disks reduces the load places on the I/O system.

4. A single swap space ______ reside in two places.

a) can

b) cannot

c) must not

d) none of the mentioned

Answer: a

5. If the swap space is simply a large file, within the file system, ____________ used to create it, name it
and allocate its space.

a) special routines must be

b) normal file system routines can be

c) normal file system routines cannot be

d) swap space storage manager is

Answer: b

6. For swap space created in a separate disk partition where no file system or directory structure is placed,
_____________ used to allocate and deallocate the blocks.
a) special routines must be

b) normal file system routines can be

c) normal file system routines cannot be

d) swap space storage manager is

Answer: d

7. When a fixed amount of swap space is created during disk partitioning, more swap space can be added
only by?

I) repartitioning of the disk

II) adding another swap space elsewhere

a) only I

b) only II

c) both I and II

d) neither I nor II

Answer: c

8. In UNIX, two per process ________ are used by the kernel to track swap space use.

a) process tables

b) swap maps

c) memory maps

d) partition maps

Answer: b

9. It is __________ to reread a page from the file system than to write it to swap space and then to reread
it from there.

a) useless

b) less efficient

c) more efficient

d) none of the mentioned

Answer: c

Operating System Multiple Choice Questions & Answers (MCQs) focuses on “RAID Structure –
1”.
1. RAID level 3 supports a lower number of I/Os per second, because _______________

a) Every disk has to participate in every I/O request

b) Only one disk participates per I/O request

c) I/O cycle consumes a lot of CPU time

d) All of the mentioned

Answer: a

2. RAID level _____ is also known as block interleaved parity organisation and uses block level striping
and keeps a parity block on a separate disk.

a) 1

b) 2

c) 3

d) 4

Answer: d

3. A performance problem with _________ is the expense of computing and writing parity.

a) non-parity based RAID levels

b) parity based RAID levels

c) all RAID levels

d) none of the mentioned

Answer: b

4. In RAID level 4, one block read, accesses __________

a) only one disk

b) all disks simultaneously

c) all disks sequentially

d) none of the mentioned

Answer: a

Explanation: Other requests are allowed to be processed by other disks.

5. The overall I/O rate in RAID level 4 is ____________

a) low

b) very low
c) high

d) none of the mentioned

Answer: c

Explanation: All disks can be read in parallel.

6. A write of a block has to access ____________

a) the disk on which the block is stored

b) parity disk

c) a parity block

d) all of the mentioned

Answer: d

7. RAID level 5 is also known as ____________

a) bit-interleaved parity organization

b) block-interleaved parity organization

c) block-interleaved distributed parity

d) memory-style ECC organization

Answer: c

8. RAID level ____ spreads parity and data among all N+1 disks rather than storing data in N disks and
parity in 1.

a) 3

b) 4

c) 5

d) 6

Answer: c

9. The potential overuse of a single parity disk is avoided in RAID level _______

a) 3

b) 4

c) 5

d) all of the mentioned

Answer: c
10. RAID level 0+1 is used because, RAID level 0 provides ______ whereas RAID level 1 provides
________

a) performance, redundancy

b) performance, reliability

c) redundancy, performance

d) none of the mentioned

Answer: b

11. If a disk fails in RAID level ___________ rebuilding lost data is easiest.

a) 1

b) 2

c) 3

d) 4

Answer: a

Explanation: Data can be copied from another disk in raid level 1, for other raid levels all other disks have
to be accessed.

12. Where performance and reliability are both important, RAID level ____ is used.

a) 0

b) 1

c) 2

d) 0+1

Answer: d

Advanced Operating System Questions and Answers focuses on “RAID Structure – 2”.

1. A large number of disks in a system improves the rate at which data can be read or written if
____________

a) the disks are operated on sequentially

b) the disks are operated on selectively

c) the disks are operated in parallel

d) all of the mentioned

Answer: c
2. RAID stands for ____________

a) Redundant Allocation of Inexpensive Disks

b) Redundant Array of Important Disks

c) Redundant Allocation of Independent Disks

d) Redundant Array of Independent Disks

Answer: d

3. If the mean time to failure of a single disk is 100,000 hours, then the mean time to failure of some disk
in an array of 100 disks will be ____________

a) 100 hours

b) 10 days

c) 10 hours

d) 1000 hours

Answer: d

4. The solution to the problem of reliability is the introduction of __________

a) aging

b) scheduling

c) redundancy

d) disks

Answer: c

5. The technique of duplicating every disk is known as ____________

a) mirroring

b) shadowing

c) redundancy

d) all of the mentioned

Answer: a

6. The mean time to failure of a mirrored disk depends on ____________

I) the mean time to failure of individual disks

II) the mean time to repair

a) Only I
b) Only II

c) Both I and II

d) Neither I nor II

Answer: c

7. RAID level ________ refers to disk arrays with striping at the level of blocks, but without any
redundancy.

a) 0

b) 1

c) 2

d) 3

Answer: a

8. RAID level _______ refers to disk mirroring.

a) 0

b) 1

c) 2

d) 3

Answer: b

9. RAID level ______ is also known as bit interleaved parity organisation.

a) 0

b) 1

c) 2

d) 3

Answer: d

10. A single parity bit can be used for ____________

a) detection

b) multiple error corrections

c) few error corrections

d) all of the mentioned

Answer: a
11. RAID level ______ is also known as memory style error correcting code(ECC) organization.

a) 1

b) 2

c) 3

d) 4

Answer: b

12. RAID level 3 does not have _________ as in RAID level 1.

a) efficiency

b) enough storage space for data

c) storage overhead

d) time consumption overhead

Answer: c

Explanation: There is one mirror disk for every disk in level 1.

Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Tertiary Storage”.

1. Tertiary storage is built with ____________

a) a lot of money

b) unremovable media

c) removable media

d) secondary storage

Answer: c

2. Floppy disks are examples of ____________

a) primary storage

b) secondary storage

c) tertiary storage

d) none of the mentioned

Answer: c

3. What is a magneto-optic disk?

a) primary storage
b) secondary storage

c) removable disk

d) none of the mentioned

Answer: c

4. The magneto-optic head flies ___________ the disk surface than a magnetic disk head does.

a) much farther from

b) much closer to

c) at the same distance as

d) none of the mentioned

Answer: a

5. Optical disks ______ magnetism.

a) use

b) do not use

c) may use

d) none of the mentioned

Answer: b

6. The phase change disk is coated with a material that can freeze into either _______ or ________ state.

a) crystalline, solid

b) ice, amorphous

c) crystalline, liquid

d) crystalline, amorphous

Answer: d

7. WORM stands for ____________

a) write only, read mandatory

b) write once, read many times

c) write only once, read multiple

d) none of the mentioned

Answer: b

8. A tape holds _______ data than optical or magnetic disk cartridge.


a) lesser

b) more

c) much lesser

d) none of the mentioned

Answer: b

9. Random access to tape is _______ a disk seek.

a) much slower than

b) much faster than

c) comparable to

d) none of the mentioned

Answer: a

10. A typical tape drive is ________ a typical disk drive.

a) more expensive than

b) cheaper than

c) of the same cost as

d) none of the mentioned

Answer: a

11. The surface area of tape is ________ the surface area of a disk.

a) much lesser than

b) much larger than

c) equal to

d) none of the mentioned

Answer: b

Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Protection – Access
Matrix”.

1. In domain structure what is Access-right equal to?

a) Access-right = object-name, rights-set


b) Access-right = read-name, write-set

c) Access-right = read-name, execute-set

d) Access-right = object-name, execute-set

Answer: a

2. What is meaning of right-set?

a) It is a subset consist of read and write

b) It is a subset of all valid operations that can be performed on the object

c) It is a subset consist of read, write and execute

d) None of the mentioned

Answer: b

3. What is Domain?

a) Domain = Set of all objects

b) It is a collection of protection policies

c) Domain= set of access-rights

d) None of the mentioned

Answer: c

4. What does the access matrix represent?

a) Rows-Domains, Columns-Objects

b) Rows-Objects, Columns-Domains

c) Rows-Access List, Columns-Domains

d) Rows-Domains, Columns-Access list

Answer: a

5. What are the three additional operations to change the contents of the access-matrix?

a) copy

b) Owner

c) control

d) all of the mentioned

Answer: d

6. Who can add new rights and remove some rights?


a) copy

b) transfer

c) limited copy

d) owner

Answer: d

7. What are the three copyrights?

a) copy

b) transfer

c) limited copy

d) all of the mentioned

Answer: d

8. Which two rights allow a process to change the entries in a column?

a) copy and transfer

b) copy and owner

c) owner and transfer

d) deny and copy

Answer: a

9. Which is an unsolvable problem in access-matrix?

a) Owner override

b) Brute force

c) Access denied

d) Confinement

Answer: d

10. Which of the following objects require protection?

a) CPU

b) Printers

c) Motherboard

d) All of the mentioned

Answer: b
11. What is ‘separation’ in security of Operating systems?

a) To have separate login for different users

b) To have separate Hard disk drive/partition for different users

c) It means keeping one user’s objects separate from other users

d) None of the mentioned

Answer: c

12. Which of the following statements are correct?

i) Physical separation – in which process use different physical objects like separate printers

ii) Physical separation – in which process having different security requirement at different times

iii) Logical separation – In which users operate under illusion that no other processes exist

iv) Logical separation – In which processes conceal their data and computations

a) i

b) i and iii

c) ii and iii

d) iii and iv

Answer: b

13. Which of the following statements are correct?

i) Physical separation – in which process use different physical objects like separate printers

ii) Temporal separation – in which process having different security requirement at different times

iii) Physical separation – In which users operate under illusion that no other processes exist

iv) Temporal separation – In which processes conceal their data and computations

a) i

b) i and ii

c) ii and iii

d) iii and iv

Answer: b

14. Which of the following statements are correct?

i) logical separation – in which process use different physical objects like separate printers

ii) cryptographic separation – in which process having different security requirement at different times
iii) Logical separation – In which users operate under illusion that no other processes exist

iv) cryptographic separation – In which processes conceal their data and computations

a) i

b) i and ii

c) ii and iii

d) iii and iv

Answer: d

15. What are the various roles of protection?

a) It is used to detect errors which can prevent contamination of system

b) It is used used to accelerate a process

c) It is used to optimize system downtime

d) None of the mentioned

Answer: a

16. Which of the following objects require protection?

a) Memory

b) Monitor

c) Power supply unit

d) All of the mentioned

Answer: a

Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Protection concepts”.

1. Which principle states that programs, users and even the systems be given just enough privileges to
perform their task?

a) principle of operating system

b) principle of least privilege

c) principle of process scheduling

d) none of the mentioned

Answer: b

2. _______ is an approach to restricting system access to authorized users.


a) Role-based access control

b) Process-based access control

c) Job-based access control

d) None of the mentioned

Answer: a

3. For system protection, a process should access _____________

a) all the resources

b) only those resources for which it has authorization

c) few resources but authorization is not required

d) all of the mentioned

Answer: b

4. The protection domain of a process contains _____________

a) object name

b) rights-set

c) both object name and rights-set

d) none of the mentioned

Answer: c

5. If the set of resources available to the process is fixed throughout the process’s lifetime then its domain
is _____________

a) static

b) dynamic

c) neither static nor dynamic

d) none of the mentioned

Answer: a

6. Access matrix model for user authentication contains _____________

a) a list of objects

b) a list of domains

c) a function which returns an object’s type

d) all of the mentioned


Answer: d

7. Global table implementation of the matrix table contains _____________

a) domain

b) object

c) right-set

d) all of the mentioned

Answer: d

8. For a domain _______ is a list of objects together with the operation allowed on these objects.

a) capability list

b) access list

c) both capability and access list

d) none of the mentioned

Answer: a

9. Which one of the following is capability based protection system?

a) hydra

b) cambridge CAP system

c) both hydra and cambridge CAP system

d) none of the mentioned

Answer: c

10. In UNIX, domain switch is accomplished via _____________

a) file system

b) user

c) superuser

d) none of the mentioned

Answer: a

Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Security”.

1. When an attempt is to make a machine or network resource unavailable to its intended users, the attack
is called _____________
a) denial-of-service attack

b) slow read attack

c) spoofed attack

d) starvation attack

Answer: a

2. The code segment that misuses its environment is called a _____________

a) internal thief

b) trojan horse

c) code stacker

d) none of the mentioned

Answer: b

3. The internal code of any software that will set of a malicious function when specified conditions are
met, is called _____________

a) logic bomb

b) trap door

c) code stacker

d) none of the mentioned

Answer: a

4. The pattern that can be used to identify a virus is known as _____________

a) stealth

b) virus signature

c) armoured

d) multipartite

Answer: b

5. Which one of the following is a process that uses the spawn mechanism to revage the system
performance?

a) worm

b) trojan

c) threat
d) virus

Answer: a

6. What is a trap door in a program?

a) a security hole, inserted at programming time in the system for later use

b) a type of antivirus

c) security hole in a network

d) none of the mentioned

Answer: a

7. Which one of the following is not an attack, but a search for vulnerabilities to attack?

a) denial of service

b) port scanning

c) memory access violation

d) dumpster diving

Answer: b

8. File virus attaches itself to the _____________

a) source file

b) object file

c) executable file

d) all of the mentioned

Answer: c

9. Multipartite viruses attack on _____________

a) files

b) boot sector

c) memory

d) all of the mentioned

Answer: d

10. In asymmetric encryption _____________

a) same key is used for encryption and decryption

b) different keys are used encryption and decryption


c) no key is required for encryption and decryption

d) none of the mentioned

Answer: b

Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Protection – Memory
Protection”.

1. What is true regarding ‘Fence’?

a) Its a method to confine users to one side of a boundary

b) It can protect Operating system from one user

c) It cannot protect users from each other

d) All of the mentioned

Answer: d

2. What is not true regarding ‘Fence’?

a) It is implemented via hardware register

b) It doesn’t protect users from each other

c) It good to protect OS from abusive users

d) Its implementation is unrestricted and can take any amount of space in Operating system.

Answer: d

3. What is correct regarding ‘relocation’ w.r.t protecting memory?

a) It is a process of taking a program as if it began at address 0

b) It is a process of taking a program as if it began at address 0A

c) Fence cannot be used within relocation process

d) All of the mentioned

Answer: a

4. How can fence and relocation be used together?

a) To each program address, the contents of fence register are added

b) To contents of fence register is subtracted from actual address of program

c) To each program address, the contents of fence register are not added

d) None of the mentioned


Explanation: This both relocates the address and guarantees that no one can access a location lower than a
fence address.

5. What is the basic need in protecting memory in multi-user environment?

a) We need two registers one ‘start’ and other ‘end’

b) We need a variable register

c) A fence register has to be used known as base register.

d) None of the mentioned

Answer: c

6. What is the role of base/bound registers?

a) They give starting address to a program

b) Program’s addresses are neatly confined to space between the base and the bound registers

c) They provide encrypted environment

d) This technique doesn’t protects a program’s address from modification by another user

Answer: b

7. What is all-or-nothing situation for sharing in memory?

a) Program makes all its data available to be accessed

b) It prohibits access to some

c) It creates rules who can access program memory

d) It separates program memory and data memory

Answer: a

8. How is disadvantage of all-or-nothing approach overcome?

a) Base/Bound

b) Relocation technique

c) Fence method

d) Tagged architecture

Answer: d

9. What is true regarding tagged architecture?

a) Every word of machine memory has one or more extra bits

b) Extra bits are used to do padding


c) Extra bits are not used to identify rights to that word

d) It is very compatible to code upgrades

Answer: a

10. What is best solution to have effect of unbounded number if base/bound registers?

a) Tagged architecture

b) Segmentation

c) Fence method

d) None of the mentioned

Answer: b

11. What is a major feature of segmentation?

a) Program is divided in data memory and program memory

b) Program is executed in segments

c) Program is divided into pieces having different access rights

d) It has effect of an unbounded architecture

Answer: c

12. What is the correct way the segmentation program address is stored?

a) name, offset

b) start, stop

c) access, rights

d) offset, rights

Answer: a

Explanation: OS can retrieve the real address via looking for the table then making a simple calculation:
address of the name + offset.

13. What is the main objective of protection?

a) Ensure all objects are protected individually

b) Objects have different priority and thus different levels of protection

c) Ensure that each object is accessed correctly and only by allowed processes

d) None of the mentioned

Answer: c
14. What is the principle of least privilege?

a) Less privileges provide difficulty in executing admin tasks

b) Users can get temporary high privilege access

c) Users should be given just enough privileges to perform their tasks

d) None of the mentioned

Answer: c

15. What is the need of protection?

a) Prevent mischievous violation

b) Prevent and intentional

c) Ensure that each program component uses resources allotted to it only

d) All of the mentioned

Answer: d

Operating System Questions and Answers focuses on “Protection – Revocation of Access Rights”.

1. What are the incorrect methods of revocation of access rights?

a) Immediate/Delayed

b) Selective/General

c) Partial/total

d) Crucial

Answer: d

2. Why is it difficult to revoke capabilities?

a) They are too many

b) They are not defined precicely

c) They are distributed throughout the system

d) None of the mentioned

Answer: c

3. What is the reacquisition scheme to revoke capability?

a) When a process capability is revoked then it won’t be able to reacquire it

b) Pointers are maintained for each object which can be used to revoke

c) Indirect pointing is done to revoke object’s capabilities


d) Master key can be used compare and revoke.

Answer: a

4. What is false regarding Back-Pointers scheme to revoke capability?

a) List of pointers is maintained with each object

b) When revocation is required these pointers are followed

c) This scheme is not adopted in MULTICS system

d) These point to all capabilities associated with that object

Answer: c

5. What is true about Indirection to revoke capability?

a) Capabilities point indirectly to the objects

b) Each capability will not have a unique entry in global

c) Table entries cannot be reused for other capabilities

d) This system was adopted in MULTICS system

Answer: a

6. How can Keys be defined or replaced?

a) create [keyname] [bits]

b) set-key

c) Key

d) MAKE [Key Name]

Answer: b

7. What are the characteristics of the Hydra system?

a) It consists of known access rights and interpreted by the system

b) A user can of protection system can declare other rights

c) Hydra system is not flexible

d) Hydra doesn’t provide rights amplification

Answer: a

8. What are the characteristics of rights amplification in Hydra?

a) This scheme allows a procedure to be certified as trustworthy

b) Amplification of rights cannot be stated explicitly in declaration


c) It includes kernel rights such as read

d) All of the mentioned

Answer: a

9. What is the problem of mutually suspicious subsystem?

a) Service program can steal users data

b) Service program can malfunction and retain some rights of data provided by user

c) Calling program can get access to restricted portion from service program

d) Calling program gets unrestricted access

Answer: b

Explanation: Both calling program and service program are vulnerable to access each others private
data/rights.

10. What are the characteristics of Cambridge CAP system as compared to Hydra system?

a) It is simpler and less powerful than hydra system

b) It is more powerful than hydra system

c) It is powerful than hydra system

d) It is not as secure as Hydra system

Answer: a

11. What are the two capabilities defined in CAP system?

a) data & software capability

b) address & data capability

c) hardware & software capability

d) software capability

Answer: a

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy