Os MCQS
Os MCQS
Answer: d
2. To access the services of operating system, the interface is provided by the ___________
a) System calls
b) API
c) Library
d) Assembly instructions
Answer: a
a) kernel is the program that constitutes the central core of the operating system
b) kernel is the first part of operating system to load into memory during booting
c) kernel is made of various modules which can not be loaded in running operating system
Answer: c
4. Which one of the following error will be handle by the operating system?
a) power failure
Answer: d
Answer: a
Answer: c
7. If a process fails, most operating system write the error information to a ______
a) log file
c) new file
Answer: a
8. Which facility dynamically adds probes to a running system, both in user processes and in the kernel?
a) DTrace
b) DLocate
c) DMap
d) DAdd
Answer: a
a) VxWorks
b) Windows CE
c) RTLinux
d) Palm OS
Answer: d
a) monolithic kernel
b) hybrid kernel
c) microkernel
Answer: b
This set of Operating System Multiple Choice Questions & Answers (MCQs) focuses on
“Processes”.
1. The systems which allow only one process execution at a time, are called __________
a) uniprogramming systems
b) uniprocessing systems
c) unitasking systems
Answer: b
Explanation: Those systems which allows more than one process execution at a time, are called
multiprogramming systems. Uniprocessing means only one processor.
b) open files
Answer: d
a) fork
b) create
c) new
Answer: a
a) normal exit
b) fatal error
Answer: d
b) when process is unable to run until some task has been completed
Answer: a
Explanation: When process is unable to run until some task has been completed, the process is in blocked
state and if process is using the CPU, it is in running state.
Answer: b
Answer: a
a) Function parameters
b) Local variables
c) Return addresses
Answer: d
b) exit
c) fork
d) get
Answer: a
10. The address of the next instruction to be executed by the current process is provided by the
__________
a) CPU registers
b) Program counter
c) Process stack
d) Pipe
Answer: b
This set of Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Process
Control Block”.
a) Code
b) Stack
c) Bootstrap program
d) Data
Answer: c
a) Output
b) Throughput
c) Efficiency
d) Capacity
Answer: b
Answer: d
a) New
b) Old
c) Waiting
d) Running
Answer: b
b) Data Structure
d) A Block in memory
Answer: b
a) Process Register
b) Program Counter
c) Process Table
d) Process Unit
Answer: c
Answer: d
Answer: a.
Answer: a
This set of Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Process
Scheduling Queues”.
a) Job Queue
b) PCB queue
c) Device Queue
d) Ready Queue
Answer: b
Answer: a
Answer: a
5. If all processes I/O bound, the ready queue will almost always be ______ and the Short term Scheduler
will have a ______ to do.
a) full, little
b) full, lot
c) empty, little
d) empty, lot
Answer: c
Answer: c
Answer: b
8. The primary distinction between the short term scheduler and the long term scheduler is __________
Answer: c
9. The only state transition that is initiated by the user process itself is __________
a) block
b) wakeup
c) dispatch
Answer: a
10. In a time-sharing operating system, when the time slot given to a process is completed, the process
goes from the running state to the __________
a) Blocked state
b) Ready state
c) Suspended state
d) Terminated state
Answer: b
Answer: c
12. Suppose that a process is in “Blocked” state waiting for some I/O service. When the service is
completed, it goes to the __________
a) Running state
b) Ready state
c) Suspended state
d) Terminated state
Answer: b
13. The context of a process in the PCB of a process does not contain __________
c) memory-management information
Answer: d
14. Which of the following need not necessarily be saved on a context switch between processes?
c) Program counter
Answer: b
a) A device
b) Timer
c) Scheduler process
d) Power failure
Answer: c
This set of Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Inter
Process Communication”.
a) allows processes to communicate and synchronize their actions when using the same address space
b) allows processes to communicate and synchronize their actions without using the same address space
Answer: b
c) share data
Answer: a
3. Which of the following two operations are provided by the IPC facility?
Answer: d
Answer: c
5. The link between two processes P and Q to send and receive messages is called __________
a) communication link
b) message-passing link
c) synchronization link
Answer: a
a) A communication link can be associated with N number of process(N = max. number of processes
supported by system)
c) Exactly N/2 links exist between each pair of processes(N = max. number of processes supported by
system)
a) there is another process R to handle and pass on the messages between P and Q
Answer: c
Answer: b
c) the sender keeps sending and the messages don’t wait in the queue
Answer: b
c) is referred to as a link
Answer: b
11. Bounded capacity and Unbounded capacity queues are referred to as __________
a) Programmed buffering
b) Automatic buffering
Answer: b
This set of Operating System Multiple Choice Questions & Answers (MCQs) focuses on “CPU
Scheduling”.
1. Which module gives control of the CPU to the process selected by the short-term scheduler?
a) dispatcher
b) interrupt
c) scheduler
Answer: a
2. The processes that are residing in main memory and are ready and waiting to execute are kept on a list
called _____________
a) job queue
b) ready queue
c) execution queue
d) process queue
Answer: b
3. The interval from the time of submission of a process to the time of completion is termed as
____________
a) waiting time
b) turnaround time
c) response time
d) throughput
Answer: b
4. Which scheduling algorithm allocates the CPU first to the process that requests the CPU first?
c) priority scheduling
Answer: a
6. In priority scheduling algorithm, when a process arrives at the ready queue, its priority is compared
with the priority of ____________
a) all process
c) parent process
d) init process
Answer: b
Answer: b
Answer: d
Answer: a
10. Which one of the following can not be scheduled by the kernel?
c) process
Answer: b
Explanation: User level threads are managed by thread library and the kernel is unaware of them.
This set of Operating System Multiple Choice Questions & Answers (MCQs) focuses on “CPU
Scheduling Benefits”.
a) multiprocessor systems
Answer: b
a) time
b) space
c) money
Answer: a
Answer: b
Answer: c
5. A process is selected from the ______ queue by the ________ scheduler, to be executed.
Answer: c
a) When a process switches from the running state to the ready state
b) When a process goes from the running state to the waiting state
c) When a process switches from the waiting state to the ready state
Answer: b
7. The switching of the CPU from one process or thread to another is called ____________
a) process switch
b) task switch
c) context switch
Answer: d
b) the time of dispatching a process from running to ready state and keeping the CPU idle
c) the time to stop one process and start running another one
Answer: c
Answer: a
Answer: a
d) the total time from the completion till the submission of a process
Answer: d
Answer: b
13. What is Waiting time?
d) the total time from the completion till the submission of a process
Answer: b
Answer: c
a) the total time taken from the submission time till the completion time
b) the total time taken from the submission time till the first response is produced
c) the total time taken from submission time till the response is output
Answer: b
This set of Operating System Multiple Choice Questions & Answers (MCQs) focuses on “CPU
Scheduling Algorithms-1”.
a) Non-preemptive scheduling
b) Preemptive scheduling
Answer: b
a) using very large time slices converts it into First come First served scheduling algorithm
b) using very small time slices converts it into First come First served scheduling algorithm
d) using very small time slices converts it into Shortest Job First algorithm
Answer: a
3. The portion of the process scheduler in an operating system that dispatches processes is concerned with
____________
Answer: a
Answer: a
Answer: b
6. The strategy of making processes that are logically runnable to be temporarily suspended is called
____________
b) Preemptive scheduling
c) Shortest job first
Answer: b
7. What is Scheduling?
Answer: a
8. There are 10 different processes running on a workstation. Idle processes are waiting for an input event
in the input queue. Busy processes are scheduled with the Round-Robin time sharing method. Which out
of the following quantum times is the best value for small response times, if the processes have a short
runtime, e.g. less than 10ms?
a) tQ = 15ms
b) tQ = 40ms
c) tQ = 45ms
d) tQ = 50ms
Answer: a
9. Orders are processed in the sequence they arrive if _______ rule sequences the jobs.
d) critical ratio
Answer: c
10. Which of the following algorithms tends to minimize the process flow time?
Answer: b
11. Under multiprogramming, turnaround time for short jobs is usually ________ and that for long jobs is
slightly ___________
a) Lengthened; Shortened
b) Shortened; Lengthened
c) Shortened; Shortened
d) Shortened; Unchanged
Answer: b
a) I only
d) I, II and III
Answer: d
Explanation: I) Shortest remaining time first scheduling is a preemptive version of shortest job
scheduling. It may cause starvation as shorter processes may keep coming and a long CPU burst process
never gets CPU.
II) Preemption may cause starvation. If priority based scheduling with preemption is used, then a low
priority process may never get CPU.
III) Round Robin Scheduling improves response time as all processes get CPU after a specified time.
This set of Operating System Questions and Answers for Freshers focuses on “CPU Scheduling
Algorithms-2” and will also be useful for interview preparations for freshers.
c) RR – Round Robin
Answer: b
b) multiprogramming systems
c) multiprocessor systems
d) operating systems
Answer: b
Explanation: In a time sharing system, each user needs to get a share of the CPU at regular intervals.
4. Consider the following set of processes, the length of the CPU burst time given in milliseconds.
P1 6
P2 8
P3 7
P4 3
Assuming the above process being scheduled with the SJF scheduling algorithm.
Answer: a
Answer: d
Answer: a
Explanation: The larger the CPU burst, the lower the priority.
c) it can lead to some low priority process waiting indefinitely for the CPU
Answer: c
8. What is ‘Aging’?
Answer: d
a) Starvation
b) Wait queue
c) Ready queue
d) Aging
Answer: d
a) i only
d) i, ii and iii
Answer: d
11. Which of the following scheduling algorithms gives minimum average waiting time?
a) FCFS
b) SJF
c) Round – robin
d) Priority
Answer: b
This set of Operating System Multiple Choice Questions & Answers (MCQs) focuses on
“Deadlock”.
a) that can be used by one process at a time and is not depleted by that use
Answer: a
a) mutual exclusion
b) a process may hold allocated resources while awaiting assignment of other resources
Answer: d
3. A system is in the safe state if ____________
a) the system can allocate resources to each process in some order and still avoid a deadlock
Answer: a
b) using thread
c) using pipes
Answer: a
a) banker’s algorithm
b) round-robin algorithm
c) elevator algorithm
d) karn’s algorithm
Answer: a
a) in advance processes rarely know how much resource they will need
Answer: d
a) deadlock
b) starvation
c) inversion
d) aging
Answer: b
9. Which one of the following is a visual ( mathematical ) way to determine the deadlock occurrence?
b) starvation graph
c) inversion graph
Answer: a
Answer: a
This set of Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Deadlock
Prevention”.
a) must always be less than the total number of resources available in the system
b) must always be equal to the total number of resources available in the system
c) must not exceed the total number of resources available in the system
Answer: c
2. The request and release of resources are ___________
b) interrupts
c) system calls
d) special programs
Answer: c
Answer: b
4. For a deadlock to arise, which of the following conditions must hold simultaneously?
a) Mutual exclusion
b) No preemption
Answer: d
Answer: a
Explanation: If another process requests that resource (non – shareable resource), the requesting process
must be delayed until the resource has been released.
b) A process must be holding at least one resource and waiting to acquire additional resources that are
being held by other processes
c) A process must hold at least one resource and not be waiting to acquire additional resources
Answer: b
Answer: a
a) must exist
c) may exist
Answer: a
a) is required
b) is not required
Answer: b
Explanation: They do not require mutually exclusive access, and hence cannot be involved in a deadlock.
10. To ensure that the hold and wait condition never occurs in the system, it must be ensured that
____________
Answer: d
Explanation: c – A process may request some resources and use them. Before it can can request any
additional resources, however it must release all the resources that it is currently allocated.
11. The disadvantage of a process being allocated all its resources before beginning its execution is
____________
Answer: b
12. To ensure no preemption, if a process is holding some resources and requests another resource that
cannot be immediately allocated to it ____________
Answer: d
13. One way to ensure that the circular wait condition never holds is to ____________
a) impose a total ordering of all resource types and to determine whether one precedes another in the
ordering
b) to never let a process acquire resources that are held by other processes
Answer: a
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Deadlock
Avoidance”.
1. Each request requires that the system consider the _____________ to decide whether the current
request can be satisfied or must wait to avoid a future possible deadlock.
a) resources currently available
Answer: a
2. Given a priori information about the ________ number of resources of each type that maybe requested
for each process, it is possible to construct an algorithm that ensures that the system will never enter a
deadlock state.
a) minimum
b) average
c) maximum
d) approximate
Answer: c
3. A deadlock avoidance algorithm dynamically examines the __________ to ensure that a circular wait
condition can never exist.
c) operating system
d) resources
Answer: a
Explanation: Resource allocation states are used to maintain the availability of the already and current
available resources.
b) the system can allocate resources to each process in some order and still avoid a deadlock
Answer: b
a) safe allocation
b) safe resource
c) safe sequence
Answer: c
a) deadlocks
b) not deadlocks
c) fatal
Answer: b
7. A system has 12 magnetic tape drives and 3 processes : P0, P1, and P2. Process P0 requires 10 tape
drives, P1 requires 4 and P2 requires 9 tape drives.
Process
P0
P1
P2
10
a) P0, P1, P2
b) P1, P2, P0
c) P2, P0, P1
d) P1, P0, P2
Answer: d
Answer: b
9. The resource allocation graph is not applicable to a resource allocation system ____________
Answer: a
10. The Banker’s algorithm is _____________ than the resource allocation graph algorithm.
a) less efficient
b) more efficient
c) equal
Answer: a
11. The data structures available in the Banker’s algorithm are ____________
a) Available
b) Need
c) Allocation
Answer: d
a) Allocation – Available
b) Max – Available
c) Max – Allocation
d) Allocation – Max
Answer: c
13. A system with 5 processes P0 through P4 and three resource types A, B, C have A with 10 instances,
B with 5 instances, and C with 7 instances. At time t0, the following snapshot has been taken:
Process
P0
P1
P2
P3
P4
A B C
0 1 0
2 0 0
3 0 2
2 1 1
0 0 2
A B C
7 5 3
3 2 2
9 0 2
2 2 2
4 3 3
Available
A B C
3 3 2
The sequence <P1, P3, P4, P2, P0> leads the system to ____________
a) an unsafe state
b) a safe state
c) a protected state
d) a deadlock
Answer: b
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Deadlock Detection”.
1. The wait-for graph is a deadlock detection algorithm that is applicable when ____________
Answer: a
Answer: a
Answer: b
a) rarely
b) frequently
5. What is the disadvantage of invoking the detection algorithm for every request?
Answer: c
6. A deadlock eventually cripples system throughput and will cause the CPU utilization to ______
a) increase
b) drop
c) stay still
Answer: b
7. Every time a request for allocation cannot be granted immediately, the detection algorithm is invoked.
This will help identify ____________
Answer: a
8. A computer system has 6 tape drives, with ‘n’ processes competing for them. Each process may need 3
tape drives. The maximum value of ‘n’ for which the system is guaranteed to be deadlock free is?
a) 2
b) 3
c) 4
d) 1
Answer: a
9. A system has 3 processes sharing 4 resources. If each process needs a maximum of 2 units then,
deadlock ____________
c) has to occur
Answer: a
10. ‘m’ processes share ‘n’ resources of the same type. The maximum need of each process doesn’t
exceed ‘n’ and the sum of all their maximum needs is always less than m+n. In this setup, deadlock
____________
b) may occur
c) has to occur
Answer: a
Operating System Questions and Answers for Experienced people focuses on “Deadlock Recovery”
and will also be useful for interview preparations for experienced people.
Answer: a
2. The two ways of aborting processes and eliminating deadlocks are ____________
Answer: c
Answer: b
Answer: d
c) Amount of time a deadlocked process has thus far consumed during its execution
Answer: c
6. If we preempt a resource from a process, the process cannot continue with its normal execution and it
must be ____________
a) aborted
b) rolled back
c) terminated
d) queued
Answer: b
7. To _______ to a safe state, the system needs to keep more information about the states of processes.
Answer: b
8. If the resources are always preempted from the same process __________ can occur.
a) deadlock
b) system crash
c) aging
d) starvation
Answer: d
Answer: a
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Swapping Processes
– 1”.
c) binding two addresses together to form a new address in a different memory space
Answer: d
a) Compile time
b) Load time
c) Execution time
Answer: d
3. If the process can be moved during its execution from one memory segment to another, then binding
must be ____________
Answer: a
Answer: b
Answer: b
Answer: d
a) programmer
b) system architect
c) system designer
Answer: a
a) Memory manager
b) CPU
c) CPU manager
d) User
Answer: a
9. If a higher priority process arrives and wants service, the memory manager can swap out the lower
priority process to execute the higher priority process. When the higher priority process finishes, the
lower priority process is swapped back in and continues execution. This variant of swapping is sometimes
called?
a) priority swapping
Answer: c
10. If binding is done at assembly or load time, then the process _____ be moved to different locations
after being swapped out and in again.
a) can
b) must
c) can never
d) may
Answer: c
d) binding of symbolic addresses to physical addresses normally takes place during execution
Answer: a
c) When overlays are used, the size of a process is not limited to the size of the physical memory
d) Overlays are used whenever the physical address space is smaller than the logical address space
Answer: c
a) Physical address
b) Logical address
Answer: b
2. The address loaded into the memory address register of the memory is referred to as ____________
a) Physical address
b) Logical address
Answer: a
3. The run time mapping from virtual to physical addresses is done by a hardware device called the
____________
Answer: b
a) basic register
b) regular register
c) relocation register
d) delocation register
Answer: c
5. The size of a process is limited to the size of ____________
a) physical memory
b) external storage
c) secondary storage
Answer: a
6. If execution time binding is being used, then a process ______ be swapped to a different memory
space.
a) has to be
b) can never
c) must
d) may
Answer: d
a) motherboard
b) keyboard
c) monitor
d) backing store
Answer: d
a) fast disk
b) disk large enough to accommodate copies of all memory images for all users
Answer: d
9. The ________ consists of all processes whose memory images are in the backing store or in memory
and are ready to run.
a) wait queue
b) ready queue
c) cpu
d) secondary storage
Answer: b
10. The _________ time in a swap out of a running process and swap in of a new process into the
memory is very high.
a) context – switch
b) waiting
c) execution
Answer: a
a) waiting
b) transfer
c) execution
Answer: b
12. Swapping _______ be done when a process has pending I/O, or has to execute I/O operations only
into operating system buffers.
a) must
b) can
c) must never
d) maybe
Answer: c
a) as a chunk of disk
Answer: a
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Memory
Management”.
1. CPU fetches the instruction from memory according to the value of ____________
a) program counter
b) status register
c) instruction register
Answer: a
a) stack pointer
b) cache
c) accumulator
d) disk buffer
Answer: b
a) physical address
b) absolute address
c) logical address
Answer: c
b) CPU
c) PCI
Answer: a
5. Memory management technique in which system stores and retrieves data from secondary storage for
use in main memory is called?
a) fragmentation
b) paging
c) mapping
Answer: b
a) stack pointer
c) page register
d) program counter
Answer: b
a) logical address
b) absolute address
c) physical address
d) relative address
Answer: a
b) page offset
c) page size
Answer: a
9. What is compaction?
b) a paging technique
Answer: c
10. Operating System maintains the page table for ____________
a) each process
b) each thread
c) each instruction
d) each address
Answer: a
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Memory
Management – Memory Allocation – 1”.
a) operating system
b) cpu
c) user processes
Answer: a
Answer: c
Answer: a
Answer: c
5. With relocation and limit registers, each logical address must be _______ the limit register.
a) less than
b) equal to
c) greater than
Answer: a
6. The operating system and the other processes are protected from being modified by an already running
process because ____________
d) every address generated by the CPU is being checked against the relocation and limit registers
Answer: d
Answer: b
8. Using transient code, _______ the size of the operating system during program execution.
a) increases
b) decreases
c) changes
d) maintains
Answer: c
9. When memory is divided into several fixed sized partitions, each partition may contain ________
Answer: a
Answer: a
11. The first fit, best fit and worst fit are strategies to select a ______
Answer: c
a) is being used
c) is always used
Answer: b
a) compaction
Answer: a
Answer: a
a) cannot be done
b) must be done
d) can be done
Answer: a
5. The disadvantage of moving all process to one end of memory and all holes to the other direction,
producing one large hole of available memory is ____________
Answer: a
Answer: a
Answer: a
Answer: d
c) very small
Answer: b
10. When the memory allocated to a process is slightly larger than the process, then ____________
Answer: a
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Paging – 1”.
a) frames
b) pages
c) backing store
d) none of the mentioned
Answer: a
2. Logical memory is broken into blocks of the same size called _________
a) frames
b) pages
c) backing store
Answer: b
3. Every address generated by the CPU is divided into two parts. They are ____________
Answer: b
a) frame bit
b) page number
c) page offset
d) frame offset
Answer: b
5. The _____ table contains the base address of each page in physical memory.
a) process
b) memory
c) page
d) frame
Answer: c
a) varied
b) power of 2
c) power of 4
Answer: b
7. If the size of logical address space is 2 to the power of m, and a page size is 2 to the power of n
addressing units, then the high order _____ bits of a logical address designate the page number, and the
____ low order bits designate the page offset.
a) m, n
b) n, m
c) m – n, m
d) m – n, n
Answer: d
a) internal
b) external
c) either type of
Answer: b
9. The operating system maintains a ______ table that keeps track of how many frames have been
allocated, how many are there, and how many are available.
a) page
b) mapping
c) frame
d) memory
Answer: c
a) waiting
b) execution
c) context – switch
Answer: c
11. Smaller page tables are implemented as a set of _______
a) queues
b) stacks
c) counters
d) registers
Answer: d
Answer: b
13. For larger page tables, they are kept in main memory and a __________ points to the page table.
Answer: a
a) page table
Answer: a
a) extended by a factor of 3
b) extended by a factor of 2
c) slowed by a factor of 3
d) slowed by a factor of 2
Answer: d
a) key
b) value
c) bit value
d) constant
Answer: a
a) TLB miss
b) Buffer miss
c) TLB hit
Answer: a
3. An ______ uniquely identifies processes and is used to provide address space protection for that
process.
Answer: b
4. The percentage of times a page number is found in the TLB is known as ____________
a) miss ratio
b) hit ratio
c) miss percent
Answer: b
Answer: d
6. When the valid – invalid bit is set to valid, it means that the associated page ____________
a) is in the TLB
b) has data in it
Answer: c
a) error
b) protection
c) valid – invalid
d) access
Answer: c
8. When there is a large logical address space, the best way of paging would be ____________
a) not to page
Answer: b
9. In a paged memory, the page hit ratio is 0.35. The required to access a page in secondary memory is
equal to 100 ns. The time required to access a page in primary memory is 10 ns. The average time
required to access a page is?
a) 3.0 ns
b) 68.0 ns
c) 68.5 ns
d) 78.5 ns
Answer: c
10. To obtain better memory utilization, dynamic loading is used. With dynamic loading, a routine is not
loaded until it is called. For implementing dynamic loading ____________
d) user programs can implement dynamic loading without any special support from hardware or operating
system
Answer: d
11. In paged memory systems, if the page size is increased, then the internal fragmentation generally
____________
a) becomes less
b) becomes more
c) remains constant
Answer: b
Answer: a
2. In paging the user provides only ________ which is partitioned by the hardware into ________ and
______
Answer: a
a) segment base
b) segment peak
c) segment value
Answer: a
c) segment length
Answer: b
c) segment length
Answer: c
Answer: b
b) it is subtracted from the segment base to produce the physical memory address
c) it is added to the segment base to produce the physical memory address
Answer: a
8. When the entries in the segment tables of two different processes point to the same physical location
____________
Answer: c
a) write only
b) read only
c) read – write
Answer: c
10. If there are 32 segments, each of size 1Kb, then the logical address should have ____________
a) 13 bits
b) 14 bits
c) 15 bits
d) 16 bits
Answer: a
Explanation: To specify a particular segment, 5 bits are required. To select a particular byte after selecting
a page, 10 more bits are required. Hence 15 bits are required.
11. Consider a computer with 8 Mbytes of main memory and a 128K cache. The cache block size is 4 K.
It uses a direct mapping scheme for cache management. How many different main memory blocks can
map onto a given physical cache block?
a) 2048
b) 256
c) 64
d) 8
Answer: c
12. A multilevel page table is preferred in comparison to a single level page table for translating virtual
address to physical address because ____________
b) it helps to reduce the size of page table needed to implement the virtual address space of a process
Answer: b
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Disk Scheduling –
1”.
a) magnetic disks
b) electrical disks
c) assemblies
d) cylinders
Answer: a
2. The heads of the magnetic disk are attached to a _____ that moves all the heads as a unit.
a) spindle
b) disk arm
c) track
Answer: b
3. The set of tracks that are at one arm position make up a ___________
a) magnetic disks
b) electrical disks
c) assemblies
d) cylinders
Answer: d
4. The time taken to move the disk arm to the desired cylinder is called the ____________
a) positioning time
c) seek time
d) rotational latency
Answer: c
5. The time taken for the desired sector to rotate to the disk head is called ____________
a) positioning time
c) seek time
d) rotational latency
Answer: d
a) disk crash
b) head crash
c) magnetic damage
Answer: b
a) faster
b) slower
Answer: b
Answer: b
9. ______ controller sends the command placed into it, via messages to the _____ controller.
a) host, host
b) disk, disk
c) host, disk
d) disk, host
Answer: c
b) total time between the first request for service and the completion on the last transfer
c) the total number of bytes transferred divided by the total time between the first request for service and
the completion on the last transfer
Answer: c
c) a special procedure
Answer: b
2. If a process needs I/O to or from a disk, and if the drive or controller is busy then ____________
a) the request will be placed in the queue of pending requests for that drive
Answer: a
3. Consider a disk queue with requests for I/O to blocks on cylinders.
Considering FCFS (first cum first served) scheduling, the total number of head movements is, if the disk
head is initially at 53 is?
a) 600
b) 620
c) 630
d) 640
Answer: d
Considering SSTF (shortest seek time first) scheduling, the total number of head movements is, if the disk
head is initially at 53 is?
a) 224
b) 236
c) 245
d) 240
Answer: b
a) fast
b) very fast
c) slow
d) very slow
Answer: d
6. Magnetic tape drives can write data at a speed ________ disk drives.
b) comparable to
7. On media that use constant linear velocity (CLV), the _____________ is uniform.
Answer: c
d) causes aging
Answer: a
9. In the ______ algorithm, the disk arm starts at one end of the disk and moves toward the other end,
servicing requests till the other end of the disk. At the other end, the direction is reversed and servicing
continues.
a) LOOK
b) SCAN
c) C-SCAN
d) C-LOOK
Answer: b
10. In the _______ algorithm, the disk head moves from one end to the other, servicing requests along the
way. When the head reaches the other end, it immediately returns to the beginning of the disk without
servicing any requests on the return trip.
a) LOOK
b) SCAN
c) C-SCAN
d) C-LOOK
Answer: c
11. In the ______ algorithm, the disk arm goes as far as the final request in each direction, then reverses
direction immediately without going to the end of the disk.
a) LOOK
b) SCAN
c) C-SCAN
d) C-LOOK
Answer: a
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Disk Management”.
1. The process of dividing a disk into sectors that the disk controller can read and write, before a disk can
store data is known as ____________
a) partitioning
c) low-level formatting
Answer: c
a) header
b) data area
c) trailer
Answer: d
3. The header and trailer of a sector contain information used by the disk controller such as _________
and _________
Answer: b
4. The two steps the operating system takes to use a disk to hold its files are _______ and ________
a) partitioning & logical formatting
Answer: a
5. The _______ program initializes all aspects of the system, from CPU registers to device controllers and
the contents of main memory, and then starts the operating system.
a) main
b) bootloader
c) bootstrap
d) rom
Answer: c
a) RAM
b) ROM
c) Cache
d) Tertiary storage
Answer: b
a) start disk
b) end disk
c) boot disk
Answer: c
a) good blocks
b) destroyed blocks
c) bad blocks
9. In SCSI disks used in high end PCs, the controller maintains a list of _________ on the disk. The disk
is initialized during ________ formatting which sets aside spare sectors not visible to the operating
system.
Answer: c
10. The scheme used in the above question is known as _______ or ________
Answer: a
a) hard error
b) tough error
c) soft error
Answer: a
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Swap Space
Management”.
a) secondary storage
b) main memory
c) tertiary storage
Answer: b
2. Using swap space significantly _________ system performance.
a) increases
b) decreases
c) maintains
Answer: b
a) allows
c) may allow
Answer: a
Explanation: Putting these swap spaces on separate disks reduces the load places on the I/O system.
a) can
b) cannot
c) must not
Answer: a
5. If the swap space is simply a large file, within the file system, ____________ used to create it, name it
and allocate its space.
Answer: b
6. For swap space created in a separate disk partition where no file system or directory structure is placed,
_____________ used to allocate and deallocate the blocks.
a) special routines must be
Answer: d
7. When a fixed amount of swap space is created during disk partitioning, more swap space can be added
only by?
a) only I
b) only II
c) both I and II
d) neither I nor II
Answer: c
8. In UNIX, two per process ________ are used by the kernel to track swap space use.
a) process tables
b) swap maps
c) memory maps
d) partition maps
Answer: b
9. It is __________ to reread a page from the file system than to write it to swap space and then to reread
it from there.
a) useless
b) less efficient
c) more efficient
Answer: c
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “RAID Structure –
1”.
1. RAID level 3 supports a lower number of I/Os per second, because _______________
Answer: a
2. RAID level _____ is also known as block interleaved parity organisation and uses block level striping
and keeps a parity block on a separate disk.
a) 1
b) 2
c) 3
d) 4
Answer: d
3. A performance problem with _________ is the expense of computing and writing parity.
Answer: b
Answer: a
a) low
b) very low
c) high
Answer: c
b) parity disk
c) a parity block
Answer: d
Answer: c
8. RAID level ____ spreads parity and data among all N+1 disks rather than storing data in N disks and
parity in 1.
a) 3
b) 4
c) 5
d) 6
Answer: c
9. The potential overuse of a single parity disk is avoided in RAID level _______
a) 3
b) 4
c) 5
Answer: c
10. RAID level 0+1 is used because, RAID level 0 provides ______ whereas RAID level 1 provides
________
a) performance, redundancy
b) performance, reliability
c) redundancy, performance
Answer: b
11. If a disk fails in RAID level ___________ rebuilding lost data is easiest.
a) 1
b) 2
c) 3
d) 4
Answer: a
Explanation: Data can be copied from another disk in raid level 1, for other raid levels all other disks have
to be accessed.
12. Where performance and reliability are both important, RAID level ____ is used.
a) 0
b) 1
c) 2
d) 0+1
Answer: d
Advanced Operating System Questions and Answers focuses on “RAID Structure – 2”.
1. A large number of disks in a system improves the rate at which data can be read or written if
____________
Answer: c
2. RAID stands for ____________
Answer: d
3. If the mean time to failure of a single disk is 100,000 hours, then the mean time to failure of some disk
in an array of 100 disks will be ____________
a) 100 hours
b) 10 days
c) 10 hours
d) 1000 hours
Answer: d
a) aging
b) scheduling
c) redundancy
d) disks
Answer: c
a) mirroring
b) shadowing
c) redundancy
Answer: a
a) Only I
b) Only II
c) Both I and II
d) Neither I nor II
Answer: c
7. RAID level ________ refers to disk arrays with striping at the level of blocks, but without any
redundancy.
a) 0
b) 1
c) 2
d) 3
Answer: a
a) 0
b) 1
c) 2
d) 3
Answer: b
a) 0
b) 1
c) 2
d) 3
Answer: d
a) detection
Answer: a
11. RAID level ______ is also known as memory style error correcting code(ECC) organization.
a) 1
b) 2
c) 3
d) 4
Answer: b
a) efficiency
c) storage overhead
Answer: c
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Tertiary Storage”.
a) a lot of money
b) unremovable media
c) removable media
d) secondary storage
Answer: c
a) primary storage
b) secondary storage
c) tertiary storage
Answer: c
a) primary storage
b) secondary storage
c) removable disk
Answer: c
4. The magneto-optic head flies ___________ the disk surface than a magnetic disk head does.
b) much closer to
Answer: a
a) use
b) do not use
c) may use
Answer: b
6. The phase change disk is coated with a material that can freeze into either _______ or ________ state.
a) crystalline, solid
b) ice, amorphous
c) crystalline, liquid
d) crystalline, amorphous
Answer: d
Answer: b
b) more
c) much lesser
Answer: b
c) comparable to
Answer: a
b) cheaper than
Answer: a
11. The surface area of tape is ________ the surface area of a disk.
c) equal to
Answer: b
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Protection – Access
Matrix”.
Answer: a
Answer: b
3. What is Domain?
Answer: c
a) Rows-Domains, Columns-Objects
b) Rows-Objects, Columns-Domains
Answer: a
5. What are the three additional operations to change the contents of the access-matrix?
a) copy
b) Owner
c) control
Answer: d
b) transfer
c) limited copy
d) owner
Answer: d
a) copy
b) transfer
c) limited copy
Answer: d
Answer: a
a) Owner override
b) Brute force
c) Access denied
d) Confinement
Answer: d
a) CPU
b) Printers
c) Motherboard
Answer: b
11. What is ‘separation’ in security of Operating systems?
Answer: c
i) Physical separation – in which process use different physical objects like separate printers
ii) Physical separation – in which process having different security requirement at different times
iii) Logical separation – In which users operate under illusion that no other processes exist
iv) Logical separation – In which processes conceal their data and computations
a) i
b) i and iii
c) ii and iii
d) iii and iv
Answer: b
i) Physical separation – in which process use different physical objects like separate printers
ii) Temporal separation – in which process having different security requirement at different times
iii) Physical separation – In which users operate under illusion that no other processes exist
iv) Temporal separation – In which processes conceal their data and computations
a) i
b) i and ii
c) ii and iii
d) iii and iv
Answer: b
i) logical separation – in which process use different physical objects like separate printers
ii) cryptographic separation – in which process having different security requirement at different times
iii) Logical separation – In which users operate under illusion that no other processes exist
iv) cryptographic separation – In which processes conceal their data and computations
a) i
b) i and ii
c) ii and iii
d) iii and iv
Answer: d
Answer: a
a) Memory
b) Monitor
Answer: a
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Protection concepts”.
1. Which principle states that programs, users and even the systems be given just enough privileges to
perform their task?
Answer: b
Answer: a
Answer: b
a) object name
b) rights-set
Answer: c
5. If the set of resources available to the process is fixed throughout the process’s lifetime then its domain
is _____________
a) static
b) dynamic
Answer: a
a) a list of objects
b) a list of domains
a) domain
b) object
c) right-set
Answer: d
8. For a domain _______ is a list of objects together with the operation allowed on these objects.
a) capability list
b) access list
Answer: a
a) hydra
Answer: c
a) file system
b) user
c) superuser
Answer: a
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Security”.
1. When an attempt is to make a machine or network resource unavailable to its intended users, the attack
is called _____________
a) denial-of-service attack
c) spoofed attack
d) starvation attack
Answer: a
a) internal thief
b) trojan horse
c) code stacker
Answer: b
3. The internal code of any software that will set of a malicious function when specified conditions are
met, is called _____________
a) logic bomb
b) trap door
c) code stacker
Answer: a
a) stealth
b) virus signature
c) armoured
d) multipartite
Answer: b
5. Which one of the following is a process that uses the spawn mechanism to revage the system
performance?
a) worm
b) trojan
c) threat
d) virus
Answer: a
a) a security hole, inserted at programming time in the system for later use
b) a type of antivirus
Answer: a
7. Which one of the following is not an attack, but a search for vulnerabilities to attack?
a) denial of service
b) port scanning
d) dumpster diving
Answer: b
a) source file
b) object file
c) executable file
Answer: c
a) files
b) boot sector
c) memory
Answer: d
Answer: b
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Protection – Memory
Protection”.
Answer: d
d) Its implementation is unrestricted and can take any amount of space in Operating system.
Answer: d
Answer: a
c) To each program address, the contents of fence register are not added
Answer: c
b) Program’s addresses are neatly confined to space between the base and the bound registers
d) This technique doesn’t protects a program’s address from modification by another user
Answer: b
Answer: a
a) Base/Bound
b) Relocation technique
c) Fence method
d) Tagged architecture
Answer: d
Answer: a
10. What is best solution to have effect of unbounded number if base/bound registers?
a) Tagged architecture
b) Segmentation
c) Fence method
Answer: b
Answer: c
12. What is the correct way the segmentation program address is stored?
a) name, offset
b) start, stop
c) access, rights
d) offset, rights
Answer: a
Explanation: OS can retrieve the real address via looking for the table then making a simple calculation:
address of the name + offset.
c) Ensure that each object is accessed correctly and only by allowed processes
Answer: c
14. What is the principle of least privilege?
Answer: c
Answer: d
Operating System Questions and Answers focuses on “Protection – Revocation of Access Rights”.
a) Immediate/Delayed
b) Selective/General
c) Partial/total
d) Crucial
Answer: d
Answer: c
b) Pointers are maintained for each object which can be used to revoke
Answer: a
Answer: c
Answer: a
b) set-key
c) Key
Answer: b
Answer: a
Answer: a
b) Service program can malfunction and retain some rights of data provided by user
c) Calling program can get access to restricted portion from service program
Answer: b
Explanation: Both calling program and service program are vulnerable to access each others private
data/rights.
10. What are the characteristics of Cambridge CAP system as compared to Hydra system?
Answer: a
d) software capability
Answer: a