Professional Documents
Culture Documents
OS MCQ
OS MCQ
2. Thread is a single sequence stream which allows a program to split itself into two
or more simultaneously running tasks. (True / False)
Ans. True
3. As threads have some of the properties of processes, they are sometimes called ___
processes.
Ans. Lightweight
5. In ___ method, the information in a file is accessed sequentially one record after
another.
Ans. Sequential Access
6. A ___ is a tree of height two with the master file directory at the root having user
directories as descendants that in turn have the files themselves as descendants.
(Pick the right option)
a) Single level directory
b) Tree-structured directory
c) Two-level directory
d) Directory
Ans. b) Tree-Structured Directory
7. In contiguous allocation the disk access time is reduced, as disk head movement is
usually restricted to only one track. (True / False)
Ans. True
9. If the file size is small, then ___ is advantageous and provides good performance.
(Pick the right option)
a) Linked allocation
b) Indexed allocation
c) Contiguous file allocation
1
d) Linked with the indexed allocation
Ans. c) Contiguous File Allocation
10. The CPU can directly process the information stored in secondary memory
without transferring it to main memory. (True / False)
Ans. False
11. All I/O devices operate at the same speed. (True / False)
Ans. False
13. The interaction between the CPU and an I/O device is usually referred to as “___.
(Pick the right option)
a) Handshaking
b) Communication
c) Talking
d) Listening
Ans. a) Handshaking
14. The simplest I/O strategy is to use the processor itself as the I/O controller. (True
/ False)
Ans. True
16. A 9600 baud modem can transfer approximately ___ character for every
millisecond.
(Pick the right option)
a) Three
b) One
c) Two
d) Four
Ans. b) One
17. File / Printer resources software runs both on client and server. (True / False)
Ans. False
19. ___ software is responsible for monitoring the network and its components such
as computers, modems, repeaters, lines, adapters, multiplexers and many more.
(Pick the right option)
a) Network Management
b) Communication Management
c) Redirection
2
d) File / Printer
Ans. a) Network Management
20. The NOS is not responsible for activities such as memory and process
management on the server.
(True / False)
Ans. False
22. Migrations are necessary for optimal use of available resources. Migrations
include: (Pick the right option)
a) Data migration
b) Computation migration
c) Process migration
d) All of the above
Ans. d) All of the above
23. A procedure is present on the server to locate and retrieve data present on a shared
device attached to it.
(True / False)
Ans. True
24. In RPC ___ is very difficult because it is difficult to let processors on different
machines to share a common address space.
Ans. Call by reference
25. ___ can support multiple machines and multiple networks/ distributed file
systems at the same time. (Pick the right option)
a) DOS
b) NetWare-386
c) Windows
d) Linux
Ans. b) Netware-386
26. Distributed processing and parallel processing are two technologies used to
harness the power of a multiprocessor system. (True / False)
Ans. True
28. In ___ distribution all computers are at the same level implying that all the
computers are capable of handling any functionality. (Pick the right option)
a) Horizontal
b) Vertical
c) Parallel
d) Hierarchical
Ans. a) Horizontal
3
29. In NOS, the shared data resides on the server and clients access the shared data.
(True / False)
Ans. True
31. Security is concerned with the ability of the operating system to enforce control
over storage and movement of data in and between the objects that the operating
system supports. (True / False)
Ans. True
32. ___ refers to the Information that is not modified or deleted in an unauthorized
manner.
Ans. Integrity
33. ___ is the verification of access to system resources. (Pick the right option)
a) Authentication
b) Line Trapping
c) Browsing
d) Fabrication
Ans. a) Authentication
34. Computer worm harms other programs and data. (True / False)
Ans. False
37. Password is the most commonly used scheme for protection against illegal
access. (True / False)
Ans. True
38. General design principles for protection were put forward by ___ and ___.
Ans. Saltzer, Schroeder
41. Data before encryption is called ___ text and after encryption is called ___ text.
Ans. Plain, Cipher
4
42. ___ and ___ are the two common types of encryption.
Ans. The private key, Public key
43. The ___ software on the client generates an RPC and sends it across the network.
(Pick the right option)
a) Network Management
b) Communication Management
c) Redirection
d) File / Printer Service
Ans. b) Communication Management
44. Complexity, cost, IPC and scalability are not considered in multiprocessor
interconnections. (True / False)
Ans. False
45. In ___ approach, one processor is dedicated to executing the operating system and
the remaining processors are from a pool of computational processors.
Ans. Master / Slave
46. Simultaneous access of ‘n’ processors and ‘n’ memories is possible in the case of
___. (Pick the right option)
a) Bus oriented systems
b) Crossbar interconnection systems
c) Hypercubes
d) Multistage switch-based systems
Ans. b) Crossbar Interconnection Systems
51. User mode in the Windows NT line is made of subsystems capable of passing I/O
requests to the appropriate kernel-mode software drivers by using the I/O manager.
(True / False)
Ans. True
5
52. HAL stands for ___.
Ans. Hardware Abstraction Layer
53. The ___ is responsible for tasks such as drawing lines and curves, rendering fonts
and handling palettes. (Pick the right option)
a) GDI
b) HAL
c) Window Manager
d) Power Manager
Ans. a) GDI
54. Kernel mode in Windows 2000 has full access to the hardware and system
resources of the computer.
(True / False)
Ans. False
56. The ___ Manager manages the communication between clients (the environment
subsystem) and servers (components of the executive). (Pick the right option)
a) PnP
b) IPC
c) Window
d) Power
Ans. b) IPC
57. Microsoft introduced a new feature to protect critical system files, called
Windows File Protection (WFP) in Windows 2000. (True / False)
Ans. True
59. ___ assists users with visual impairments with system messages and reads the
messages via the sound system. (Pick the right option)
a) StickyKeys b) SoundSentry
c) Narrator d) On-screen magnifier
Ans. c) Narrator
61. Distributed systems fit into the class of ___ systems. (Pick the right option)
a) Loosely coupled
b) Tightly coupled
c) Hybrid
d) Non-hybrid
Ans. a) Loosely coupled
6
http://www.treeknox.com/computer/languages/operating-system-questions-answers/
https://meritnotes.com/computer-quiz/operating-system-tutorials/1-6787/