Operating Systems MCQs
Operating Systems MCQs
7. BIOS is used?
a. By operating system
b. By compiler
c. By interpreter
d. By application Software
10. When you delete a file in your computer, where does it go?
a. Recycle bin
b. Hard disk
c. Taskbar
d. None of these
18. Which of the following windows does not have a start button?
a. Windows 7
b. Windows 8
c. Windows XP
d. None of these
19. Which of the following operating systems does not support more than one program at a
time?
a. Linux
b. Windows
c. MAC
d. DOS
21. Who provides the interface to access the services of the operating system?
a. API
b. System call
c. Library
d. Assembly instruction
22. Where are placed the list of processes that are prepared to be executed and waiting?
a. Job queue
b. Ready queue
c. Execution queue
d. Process queue
23. Who among the following can block the running process?
a. Fork
b. Read
c. Down
d. All of these
24. Which of the following does not interrupt the running process?
a. Timer interrupt
b. Device
c. Power failure
d. Scheduler process
28. What type of commands are required to perform various tasks in DOS?
a. Internal commands
b. External commands
c. Valuable commands
d. Primary commands
29. What is the number of characters contained in the primary name of the file of MS-DOS?
a. Up to 8 characters
b. 3 characters
c. Up to 10 characters
d. None of the above
30. Which command is used to fetch a group (.doc) of files that have just been deleted?
a. Undelete
b. Undelete/all
c. Undelete *.doc
d. All of above
32. Which program runs first after booting the computer and loading the GUI?
a. Desktop Manager
b. File Manager
c. Windows Explorer
d. Authentication
49. Time duration required for scheduling dispatcher to stop one process and start another is
known as ____________
a. process latency
b. dispatch latency
c. execution latency
d. interrupt latency
50. Time required to synchronous switch from the context of one thread to the context of
another thread is called?
a. threads fly-back time
b. jitter
c. context switch time
d. none of the mentioned
59. The amount of time required for the scheduling dispatcher to stop one process and start
another is known as ______________
a. event latency
b. interrupt latency
c. dispatch latency
d. context switch
60. The most effective technique to keep dispatch latency low is to ____________
a. provide non preemptive kernels
b. provide preemptive kernels
c. make it user programmed
d. run less number of processes at a time
64. Antilock brake systems, flight management systems, pacemakers are examples of
____________
a. safety critical system
b. hard real time system
c. soft real time system
d. safety critical system and hard real time system
65. In a ______ real time system, it is guaranteed that critical real time tasks will be completed
within their deadlines.
a. Soft
b. Hard
c. Critical
d. none of the mentioned
70. The technique in which the CPU generates physical addresses directly is known as
____________
a. relocation register method
b. real addressing
c. virtual addressing
d. none of the mentioned
72. A process P1 has a period of 50 and a CPU burst of t1 = 25, P2 has a period of 80 and a
CPU burst of 35. The total CPU utilization is ____________
a. 0.90
b. 0.74
c. 0.94
d. 0.80
73. A process P1 has a period of 50 and a CPU burst of t1 = 25, P2 has a period of 80 and a
CPU burst of 35., the priorities of P1 and P2 are?
a. remain the same throughout
b. keep varying from time to time
c. may or may not be change
d. none of the mentioned
74. A process P1 has a period of 50 and a CPU burst of t1 = 25, P2 has a period of 80 and a
CPU burst of 35., can the two processes be scheduled using the EDF algorithm without
missing their respective deadlines?
a. Yes
b. No
c. Maybe
d. None of the mentioned
75. Using EDF algorithm practically, it is impossible to achieve 100 percent utilization due to
__________
a. the cost of context switching
b. interrupt handling
c. power consumption
d. all of the mentioned
76. T shares of time are allocated among all processes out of N shares in __________
scheduling algorithm.
a. rate monotonic
b. proportional share
c. earliest deadline first
d. none of the mentioned
77. If there are a total of T = 100 shares to be divided among three processes, A, B and C. A is
assigned 50 shares, B is assigned 15 shares and C is assigned 20 shares.
A will have ______ percent of the total processor time.
a. 20
b. 15
c. 50
d. none of the mentioned
78. If there are a total of T = 100 shares to be divided among three processes, A, B and C. A is
assigned 50 shares, B is assigned 15 shares and C is assigned 20 shares.
B will have ______ percent of the total processor time.
a. 20
b. 15
c. 50
d. none of the mentioned
79. If there are a total of T = 100 shares to be divided among three processes, A, B and C. A is
assigned 50 shares, B is assigned 15 shares and C is assigned 20 shares.
C will have ______ percent of the total processor time.
a. 20
b. 15
c. 50
d. none of the mentioned
80. If there are a total of T = 100 shares to be divided among three processes, A, B and C. A is
assigned 50 shares, B is assigned 15 shares and C is assigned 20 shares.
If a new process D requested 30 shares, the admission controller would __________
a. allocate 30 shares to it
b. deny entry to D in the system
c. all of the mentioned
d. none of the mentioned
Operating System MCQs
Chapter No 02:- Processes and CPU Scheduling
01. Which module gives control of the CPU to the process selected by the short-term
scheduler?
a. Dispatcher
b. Interrupt
c. Scheduler
d. none of the mentioned
02. The processes that are residing in main memory and are ready and waiting to execute
are kept on a list called _____________
a. job queue
b. ready queue
c. execution queue
d. process queue
03. The interval from the time of submission of a process to the time of completion is
termed as ____________
a. waiting time
b. turnaround time
c. response time
d. throughput
04. Which scheduling algorithm allocates the CPU first to the process that requests the CPU
first?
a. first-come, first-served scheduling
b. shortest job scheduling
c. priority scheduling
d. none of the mentioned
10. Which one of the following can not be scheduled by the kernel?
a. kernel level thread
b. user level thread
c. process
d. none of the mentioned
15. A process is selected from the ______ queue by the ________ scheduler, to be executed.
a. blocked, short term
b. wait, long term
c. ready, short term
d. ready, long term
17. The switching of the CPU from one process or thread to another is called ____________
a. process switch
b. task switch
c. context switch
d. all of the mentioned
27. With round robin scheduling algorithm in a time shared system ____________
a. using very large time slices converts it into First come First served scheduling
algorithm
b. using very small time slices converts it into First come First served scheduling
algorithm
c. using extremely small time slices increases performance
d. using very small time slices converts it into Shortest Job First algorithm
28. The portion of the process scheduler in an operating system that dispatches processes is
concerned with ____________
a. assigning ready processes to CPU
b. assigning ready processes to waiting queue
c. assigning running processes to blocked queue
d. all of the mentioned
31. The strategy of making processes that are logically runnable to be temporarily
suspended is called ____________
a. Non preemptive scheduling
b. Preemptive scheduling
c. Shortest job first
d. First come First served
32. What is Scheduling?
a. allowing a job to use the processor
b. making proper use of processor
c. all of the mentioned
d. none of the mentioned
33. There are 10 different processes running on a workstation. Idle processes are waiting for
an input event in the input queue. Busy processes are scheduled with the Round-Robin
time sharing method. Which out of the following quantum times is the best value for
small response times, if the processes have a short runtime, e.g. less than 10ms?
a. tQ = 15ms
b. tQ = 40ms
c. tQ = 45ms
d. tQ = 50ms
34. Orders are processed in the sequence they arrive if _______ rule sequences the jobs.
a. earliest due date
b. slack time remaining
c. first come, first served
d. critical ratio
35. Which of the following algorithms tends to minimize the process flow time?
a. First come First served
b. Shortest Job First
c. Earliest Deadline First
d. Longest Job First
36. Under multiprogramming, turnaround time for short jobs is usually ________ and that
for long jobs is slightly ___________
a. Lengthened; Shortened
b. Shortened; Lengthened
c. Shortened; Shortened
d. Shortened; Unchanged
39. The real difficulty with SJF in short term scheduling is ____________
a. it is too good an algorithm
b. knowing the length of the next CPU request
c. it is too complex to understand
d. none of the mentioned
41. Consider the following set of processes, the length of the CPU burst time given in
milliseconds.
43. An SJF algorithm is simply a priority algorithm where the priority is ____________
a. the predicted next CPU burst
b. the inverse of the predicted next CPU burst
c. the current CPU burst
d. anything the user wants
47. Which of the following scheduling algorithms gives minimum average waiting time?
a. FCFS
b. SJF
c. Round – robin
d. Priority
61. Which of the following is false regarding First Come First Serve (FCFS)?
a. FCFS performance is high
b. average wait time is high.
c. Its implementation is based on FIFO queue.
d. FCFS is easy to understand and implement.
62. Shortest Job Next is also known as?
a. Batch job
b. Advance job
c. shortest job first
d. shortest job last
63. Which of the following is non-preemptive algorithm?
a. Priority Based Scheduling
b. Shortest Remaining Time
c. FCFS
d. shortest job first
64. In Round Robin Scheduling, Each process is provided a fix time to execute, it is called
a?
a. Batch Time
b. Job Time
c. Quantum
d. Period
65. Which of the following is preemptive algorithm?
a. Round Robin Scheduling
b. Shortest Remaining Time
c. Multiple-Level Queues Scheduling
d. Both A and B
66. __________ is used to save states of preempted processes.
a. Context switching
b. Quantam
c. Process Period
d. Batch Jobs
67. In Priority Based Scheduling, if Processes have same priority then which Scheduling
algorithm is used?
a. SJN
b. FCFS
c. SRT
d. Round Robin
01. Which process can be affected by other processes executing in the system?
a. cooperating process
b. child process
c. parent process
d. init process
02. When several processes access the same data concurrently and the outcome of the
execution depends on the particular order in which the access takes place is called
_______
a. dynamic condition
b. race condition
c. essential condition
d. critical condition
03. If a process is executing in its critical section, then no other processes can be executing in
their critical section. What is this condition called?
a. mutual exclusion
b. critical exclusion
c. synchronous exclusion
d. asynchronous exclusion
07. When high priority task is indirectly preempted by medium priority task effectively
inverting the relative priority of the two tasks, the scenario is called __________
a. priority inversion
b. priority removal
c. priority exchange
d. priority modification
12. A situation where several processes access and manipulate the same data concurrently
and the outcome of the execution depends on the particular order in which access takes
place is called ____________
a. data consistency
b. race condition
c. aging
d. starvation
13. The segment of code in which the process may change common variables, update tables,
write into files is known as ____________
a. Program
b. critical section
c. non – critical section
d. synchronizing
14. Which of the following conditions must be satisfied to solve the critical section problem?
a. Mutual Exclusion
b. Progress
c. Bounded Waiting
d. All of the mentioned
16. Bounded waiting implies that there exists a bound on the number of times a process is
allowed to enter its critical section ____________
a. after a process has made a request to enter its critical section and before the
request is granted
b. when another process is in its critical section
c. before a process has made a request to enter its critical section
d. none of the mentioned
17. A minimum of _____ variable(s) is/are required to be shared between processes to solve
the critical section problem.
a. One
b. Two
c. Three
d. Four
18. In the bakery algorithm to solve the critical section problem ____________
a. each process is put into a queue and picked up in an ordered manner
b. each process receives a number (may or may not be unique) and the one with the
lowest number is served next
c. each process gets a unique number and the one with the highest number is served next
d. each process gets a unique number and the one with the lowest number is served next
25. The wait operation of the semaphore basically works on the basic _______ system call.
a. stop()
b. block()
c. hold()
d. wait()
26. The signal operation of the semaphore basically works on the basic _______ system call.
a. continue()
b. wakeup()
c. getup()
d. start()
28. The code that changes the value of the semaphore is ___________
a. remainder section code
b. non – critical section code
c. critical section code
d. none of the mentioned
29. The following program consists of 3 concurrent processes and 3 binary semaphores. The
semaphores are initialized as S0 = 1, S1 = 0, S2 = 0.
Process P0
while(true)
{
wait(S0);
print '0';
release(S1);
release(S2);
}
Process P1
wait(S1);
release(S0);
Process P2
wait(S2);
release(S0);
How many times will P0 print ‘0’?
a. At least twice
b. Exactly twice
c. Exactly thrice
d. Exactly once
31. Two processes, P1 and P2, need to access a critical section of code. Consider the
following synchronization construct used by the processes.
Process P1 :
while(true)
{
w1 = true;
while(w2 == true);
Critical section
w1 = false;
}
Remainder Section
Process P2 :
while(true)
{
w2 = true;
while(w1 == true);
Critical section
w2 = false;
}
Remainder Section
Here, w1 and w2 have shared variables, which are initialized to false. Which one of the
following statements is TRUE about the above construct?
32. What will happen if a non-recursive mutex is locked more than once?
a. Starvation
b. Deadlock
c. Aging
d. Signaling
Process A
int Y;
A1: Y = X*2;
A2: X = Y;
Process B
int Z;
B1: Z = X+1;
B2: X = Z;
X is set to 5 before either process begins execution. As usual, statements within a process are
executed sequentially, but statements in process A may execute in any order with respect to
statements in process B.
How many different values of X are possible after both processes finish executing?
a. Two
b. Three
c. Four
d. eight
Process B
int Z;
B1: wait(T);
B2: Z = X+1;
X = Z;
T is set to 0 before either process begins execution and, as before, X is set to 5.
Now, how many different values of X are possible after both processes finish executing?
a. One
b. Two
c. three
d. four
40. Semaphores are mostly used to implement ____________
a. System calls
b. IPC mechanisms
c. System protection
d. None of the mentioned
43. In the bounded buffer problem, there are the empty and full semaphores that
____________
a. count the number of empty and full buffers
b. count the number of empty and full memory spaces
c. count the number of empty and full queues
d. none of the mentioned
45. To ensure difficulties do not arise in the readers – writers problem _______ are given
exclusive access to the shared object.
a. Readers
b. Writers
c. readers and writers
d. none of the mentioned
50. Consider the methods used by processes P1 and P2 for accessing their critical sections
whenever needed, as given below. The initial values of shared boolean variables S1 and
S2 are randomly assigned. (GATE 2010)
Method used by P1 :
while(S1==S2);
Critical section
S1 = S2;
Method used by P2 :
while(S1!=S2);
Critical section
S2 = not(S1);
Which of the following statements describes properties achieved?
53. A procedure defined within a ________ can access only those variables declared locally
within the _______ and its formal parameters.
a. process, semaphore
b. process, monitor
c. semaphore, semaphore
d. monitor, monitor
55. What are the operations that can be invoked on a condition variable?
a. wait & signal
b. hold & wait
c. signal & hold
d. continue & signal
58. Which of the following variable wait within the to enable a process
a. a condition is defined by a condition variable
b. objects Boolean objects can be used by condition variables
c. semaphore must be used
d. all of the mentioned
e. both a and b
f. None of these
59. In which the access takes place when different processes try to access the same data
concurrently and the outcome of the execution depends on the specific order, is called
a. dynamic condition
b. race condition
c. essential condition
d. critical condition
e. both a and b
f. None of these
60. Which of the following option is suitable when a process is executing in its critical
section, then no other processes can be executing in their critical section
a. mutual exclusion
b. critical exclusion
c. synchronous exclusion
d. d asynchronous exclusion
e. e. both a and b
f. f. none of these
63. Which of the following for Mutual exclusion can be provided by the
a. mutex locks
b. binary semaphores
c. both mutex locks and binary semaphores
d. none of the mentioned
e. both a and b
f. None of these
64. When high priority task is indirectly preempted by medium priority the scenario is called
a. priority inversion
b. priority removal
c. priority exchange
d. priority modification
e. both a and b
f. None of these
66. A monitor is a module and monitor which of the following can encapsulates
a. shared data structures
b. procedures that operate on shared data structure
c. synchronization between concurrent procedure invocation
d. all of the mentioned
e. both a and b
f. none of these
67. Which of the following process can be affected by other processes during execution in
the system?
a. init process
b. child process
c. parent process
d. cooperating process
e. both a and b
f. None of these
02. An edge from process Pi to Pj in a wait for graph indicates that ____________
a. Pi is waiting for Pj to release a resource that Pi needs
b. Pj is waiting for Pi to release a resource that Pj needs
c. Pi is waiting for Pj to leave the system
d. Pj is waiting for Pi to leave the system
04. If deadlocks occur frequently, the detection algorithm must be invoked ________
a. Rarely
b. Frequently
c. rarely & frequently
d. none of the mentioned
05. What is the disadvantage of invoking the detection algorithm for every request?
a. overhead of the detection algorithm due to consumption of memory
b. excessive time consumed in the request to be allocated memory
c. considerable overhead in computation time
d. all of the mentioned
06. A deadlock eventually cripples system throughput and will cause the CPU utilization to
______
a. Increase
b. Drop
c. stay still
d. none of the mentioned
07. Every time a request for allocation cannot be granted immediately, the detection
algorithm is invoked. This will help identify ____________
a. the set of processes that have been deadlocked
b. the set of processes in the deadlock queue\
c. the specific process that caused the deadlock
d. all of the mentioned
08. A computer system has 6 tape drives, with ‘n’ processes competing for them. Each
process may need 3 tape drives. The maximum value of ‘n’ for which the system is
guaranteed to be deadlock free is?
a. 2
b. 3
c. 4
d. 1
09. A system has 3 processes sharing 4 resources. If each process needs a maximum of 2
units then, deadlock ____________
a. can never occur
b. may occur
c. has to occur
d. none of the mentioned
10. ‘m’ processes share ‘n’ resources of the same type. The maximum need of each process
doesn’t exceed ‘n’ and the sum of all their maximum needs is always less than m+n. In
this setup, deadlock ____________
a. can never occur
b. may occur
c. has to occur
d. none of the mentioned
19. Which one of the following is a visual ( mathematical ) way to determine the deadlock
occurrence?
a. resource allocation graph
b. starvation graph
c. inversion graph
d. none of the mentioned
24. For a deadlock to arise, which of the following conditions must hold simultaneously?
a. Mutual exclusion
b. No preemption
c. Hold and wait
d. All of the mentioned
28. For non sharable resources like a printer, mutual exclusion ____________
a. must exist
b. must not exist
c. may exist
d. none of the mentioned
30. To ensure that the hold and wait condition never occurs in the system, it must be ensured
that ____________
a. whenever a resource is requested by a process, it is not holding any other resources
b. each process must request and be allocated all its resources before it begins its
execution
c. a process can request resources only when it has none
d. all of the mentioned
31. The disadvantage of a process being allocated all its resources before beginning its
execution is ____________
a. Low CPU utilization
b. Low resource utilization
c. Very high resource utilization
d. None of the mentioned
32. To ensure no preemption, if a process is holding some resources and requests another
resource that cannot be immediately allocated to it ___________
a. then the process waits for the resources be allocated to it
b. the process keeps sending requests until the resource is allocated to it
c. the process resumes execution without the resource being allocated to it
d. then all resources currently being held are preempted
33. One way to ensure that the circular wait condition never holds is to ____________
a. impose a total ordering of all resource types and to determine whether one
precedes another in the ordering
b. to never let a process acquire resources that are held by other processes
c. to let a process wait for only one resource at a time
d. all of the mentioned
34. Each request requires that the system consider the _____________ to decide whether the
current request can be satisfied or must wait to avoid a future possible deadlock.
a. resources currently available
b. processes that have previously been in the system
c. resources currently allocated to each process
d. future requests and releases of each process
35. Given a priori information about the ________ number of resources of each type that
maybe requested for each process, it is possible to construct an algorithm that ensures
that the system will never enter a deadlock state.
a. Minimum
b. average
c. maximum
d. approximate
36. A deadlock avoidance algorithm dynamically examines the __________ to ensure that a
circular wait condition can never exist.
a. resource allocation state
b. system storage state
c. operating system
d. resources
40. A system has 12 magnetic tape drives and 3 processes : P0, P1, and P2. Process P0
requires 10 tape drives, P1 requires 4 and P2 requires 9 tape drives.
Process
P0
P1
P2
Maximum needs (process-wise: P0 through P2 top to bottom)
10
4
9
Currently allocated (process-wise)
5
2
2
Which of the following sequence is a safe sequence?
a. P0, P1, P2
b. P1, P2, P0
c. P2, P0, P1
d. P1, P0, P2
42. The resource allocation graph is not applicable to a resource allocation system
____________
a. with multiple instances of each resource type
b. with a single instance of each resource type
c. single & multiple instances of each resource type
d. none of the mentioned
43. The Banker’s algorithm is _____________ than the resource allocation graph algorithm.
a. less efficient
b. more efficient
c. equal
d. none of the mentioned
44. The data structures available in the Banker’s algorithm are ____________
a. Available
b. Need
c. Allocation
d. All of the mentioned
46. A system with 5 processes P0 through P4 and three resource types A, B, C have A with
10 instances, B with 5 instances, and C with 7 instances. At time t0, the following
snapshot has been taken:
Process
P0
P1
P2
P3
P4
Available
A B C
3 3 2
The sequence <P1, P3, P4, P2, P0> leads the system to ____________
a. an unsafe state
b. a safe state
c. a protected state
d. a deadlock
47. A deadlock can be broken by ____________
a. abort one or more processes to break the circular wait
b. abort all the process in the system
c. preempt all resources from all processes
d. none of the mentioned
48. The two ways of aborting processes and eliminating deadlocks are ____________
a. Abort all deadlocked processes
b. Abort all processes
c. Abort one process at a time until the deadlock cycle is eliminated
d. All of the mentioned
50. The process to be aborted is chosen on the basis of the following factors?
a. priority of the process
b. process is interactive or batch
c. how long the process has computed
d. all of the mentioned
52. If we preempt a resource from a process, the process cannot continue with its normal
execution and it must be ____________
a. Aborted
b. rolled back
c. terminated
d. queued
53. To _______ to a safe state, the system needs to keep more information about the states of
processes.
a. abort the process
b. roll back the process
c. queue the process
d. none of the mentioned
54. If the resources are always preempted from the same process __________ can occur.
a. Deadlock
b. system crash
c. aging
d. starvation
55. What is the solution to starvation?
a. the number of rollbacks must be included in the cost factor
b. the number of resources must be included in resource preemption
c. resource preemption be done instead
d. all of the mentioned
Operating System MCQs
Chapter No 05:- Memory Management
01. CPU fetches the instruction from memory according to the value of ____________
a. program counter
b. status register
c. instruction register
d. program status word
04. Run time mapping from virtual to physical address is done by ____________
a. Memory management unit
b. CPU
c. PCI
d. None of the mentioned
05. Memory management technique in which system stores and retrieves data from
secondary storage for use in main memory is called?
a. Fragmentation
b. Paging
c. Mapping
d. none of the mentioned
12. Binding of instructions and data to memory addresses can be done at ____________
a. Compile time
b. Load time
c. Execution time
d. All of the mentioned
13. If the process can be moved during its execution from one memory segment to another,
then binding must be ____________
a. delayed until run time
b. preponed to compile time
c. preponed to load time
d. none of the mentioned
17. The ___________ must design and program the overlay structure.
a. Programmer
b. system architect
c. system designer
d. none of the mentioned
19. If a higher priority process arrives and wants service, the memory manager can swap out
the lower priority process to execute the higher priority process. When the higher priority
process finishes, the lower priority process is swapped back in and continues execution.
This variant of swapping is sometimes called?
a. priority swapping
b. pull out, push in
c. roll out, roll in
d. none of the mentioned
20. If binding is done at assembly or load time, then the process _____ be moved to different
locations after being swapped out and in again.
a. Can
b. Must
c. can never
d. may
25. The run time mapping from virtual to physical addresses is done by a hardware device
called the ___________
a. Virtual to physical mapper
b. Memory management unit
c. Memory mapping unit
d. None of the mentioned
28. If execution time binding is being used, then a process ______ be swapped to a different
memory space.
a. has to be
b. can never
c. must
d. may
31. The ________ consists of all processes whose memory images are in the backing store or
in memory and are ready to run.
a. wait queue
b. ready queue
c. cpu
d. secondary storage
32. The _________ time in a swap out of a running process and swap in of a new process
into the memory is very high.
a. context – switch
b. waiting
c. execution
d. all of the mentioned
34. Swapping _______ be done when a process has pending I/O, or has to execute I/O
operations only into operating system buffers.
a. Must
b. Can
c. must never
d. maybe
41. The operating system and the other processes are protected from being modified by an
already running process because ____________
a. they are in different memory spaces
b. they are in different logical addresses
c. they have a protection algorithm
d. every address generated by the CPU is being checked against the relocation and
limit registers
43. Using transient code, _______ the size of the operating system during program execution.
a. Increases
b. Decreases
c. Changes
d. Maintains
44. When memory is divided into several fixed sized partitions, each partition may contain
________
a. exactly one process
b. at least one process
c. multiple processes at once
d. none of the mentioned
46. The first fit, best fit and worst fit are strategies to select a ______
a. process from a queue to put in memory
b. processor to run the next process
c. free hole from a set of available holes
d. all of the mentioned
50. If relocation is static and is done at assembly or load time, compaction _________
a. cannot be done
b. must be done
c. must not be done
d. can be done
51. The disadvantage of moving all process to one end of memory and all holes to the other
direction, producing one large hole of available memory is ____________
a. the cost incurred
b. the memory used
c. the CPU used
d. all of the mentioned
58. Logical memory is broken into blocks of the same size called _________
a. Frames
b. Pages
c. backing store
d. none of the mentioned
59. Every address generated by the CPU is divided into two parts. They are ____________
a. frame bit & page number
b. page number & page offset
c. page offset & frame bit
d. frame offset & page offset
61. The _____ table contains the base address of each page in physical memory.
a. Process
b. Memory
c. Page
d. frame
63. If the size of logical address space is 2 to the power of m, and a page size is 2 to the
power of n addressing units, then the high order _____ bits of a logical address designate
the page number, and the ____ low order bits designate the page offset.
a. m, n
b. n, m
c. m – n, m
d. m – n, n
64. With paging there is no ________ fragmentation.
a. Internal
b. External
c. either type of
d. none of the mentioned
65. The operating system maintains a ______ table that keeps track of how many frames
have been allocated, how many are there, and how many are available.
a. Page
b. Mapping
c. Frame
d. memory
69. For larger page tables, they are kept in main memory and a __________ points to the
page table.
a. page table base register
b. page table base pointer
c. page table register pointer
d. page table base
73. If a page number is not found in the TLB, then it is known as a ____________
a. TLB miss
b. Buffer miss
c. TLB hit
d. All of the mentioned
74. An ______ uniquely identifies processes and is used to provide address space protection
for that process.
a. address space locator
b. address space identifier
c. address process identifier
d. none of the mentioned
75. The percentage of times a page number is found in the TLB is known as ____________
a. miss ratio
b. hit ratio
c. miss percent
d. none of the mentioned
77. When the valid – invalid bit is set to valid, it means that the associated page
____________
a. is in the TLB
b. has data in it
c. is in the process’s logical address space
d. is the system’s physical address space
79. When there is a large logical address space, the best way of paging would be
____________
a. not to page
b. a two level paging algorithm
c. the page table itself
d. all of the mentioned
80. In a paged memory, the page hit ratio is 0.35. The required to access a page in
secondary memory is equal to 100 ns. The time required to access a page in primary
memory is 10 ns. The average time required to access a page is
a. 3.0 ns
b. 68.0 ns
c. 68.5 ns
d. 78.5 ns
81. To obtain better memory utilization, dynamic loading is used. With dynamic loading, a
routine is not loaded until it is called. For implementing dynamic loading
____________
a. special support from hardware is required
b. special support from operating system is essential
c. special support from both hardware and operating system is essential
d. user programs can implement dynamic loading without any special support
from hardware or operating system
82. In paged memory systems, if the page size is increased, then the internal fragmentation
generally ____________
a. becomes less
b. becomes more
c. remains constant
d. none of the mentioned
84. In paging the user provides only ________ which is partitioned by the hardware into
________ and ______
a. one address, page number, offset
b. one offset, page number, address
c. page number, offset, address
d. none of the mentioned
90. When the entries in the segment tables of two different processes point to the same
physical location ____________
a. the segments are invalid
b. the processes get blocked
c. segments are shared
d. all of the mentioned
92. If there are 32 segments, each of size 1Kb, then the logical address should have
____________
a. 13 bits
b. 14 bits
c. 15 bits
d. 16 bits
93. Consider a computer with 8 Mbytes of main memory and a 128K cache. The cache
block size is 4 K. It uses a direct mapping scheme for cache management. How many
different main memory blocks can map onto a given physical cache block?
a. 2048
b. 256
c. 64
d. 8
94. A multilevel page table is preferred in comparison to a single level page table for
translating virtual address to physical address because ____________
a. it reduces the memory access time to read or write a memory location
b. it helps to reduce the size of page table needed to implement the virtual
address space of a process
c. it is required by the translation lookaside buffer
d. it helps to reduce the number of page faults in page replacement algorithms
Operating System MCQs
Chapter No 05:- I/O Hardware
01. If one or more devices use a common set of wires to communicate with the computer
system, the connection is called ______
a. CPU
b. Monitor
c. Wirefull
d. Bus
02. A ____ a set of wires and a rigidly defined protocol that specifies a set of messages that
can be sent on the wires.
a. Port
b. Node
c. Bus
d. none of the mentioned
03. When device A has a cable that plugs into device B, and device B has a cable that plugs
into device C and device C plugs into a port on the computer, this arrangement is called a
_________
a. Port
b. daisy chain
c. bus
d. cable
04. The _________ present a uniform device-access interface to the I/O subsystem, much as
system calls provide a standard interface between the application and the operating
system.
a. Devices
b. Buses
c. Device drivers
d. I/O systems
05. A ________ is a collection of electronics that can operate a port, a bus, or a device.
a. Controller
b. Driver
c. Host
d. Bus
06. An I/O port typically consists of four registers status, control, ________ and ________
registers.
a. system in, system out
b. data in, data out
c. flow in, flow out
d. input, output
07. The ______ register is read by the host to get input.
a. flow in
b. flow out
c. data in
d. data out
09. The hardware mechanism that allows a device to notify the CPU is called _______
a. Polling
b. Interrupt
c. Driver
d. Controlling
10. The CPU hardware has a wire called __________ that the CPU senses after executing
every instruction.
a. interrupt request line
b. interrupt bus
c. interrupt receive line
d. interrupt sense line
11. The _________ determines the cause of the interrupt, performs the necessary processing
and executes a return from the interrupt instruction to return the CPU to the execution
state prior to the interrupt.
a. interrupt request line
b. device driver
c. interrupt handler
d. all of the mentioned
13. The _________ are reserved for events such as unrecoverable memory errors.
a. non maskable interrupts
b. blocked interrupts
c. maskable interrupts
d. none of the mentioned
14. The ________ can be turned off by the CPU before the execution of critical instruction
sequences that must not be interrupted.
a. nonmaskable interrupt
b. blocked interrupt
c. maskable interrupt
d. none of the mentioned
17. Division by zero, accessing a protected or non existent memory address, or attempting to
execute a privileged instruction from user mode are all categorized as ________
a. Errors
b. Exceptions
c. interrupt handlers
d. all of the mentioned
30. The ________ keeps state information about the use of I/O components.
a. CPU
b. OS
c. Kernel
d. Shell
31. The kernel data structures include ____________
a. process table
b. open file table
c. close file table
d. all of the mentioned
33. A ________ is a full duplex connection between a device driver and a user level process.
a. Bus
b. I/O operation
c. Stream
d. Flow
35. If the number of cycles spent busy – waiting is not excessive, then ____________
a. interrupt driven I/O is more efficient than programmed I/O
b. programmed I/O is more efficient than interrupt driven I/O
c. both programmed and interrupt driven I/O are equally efficient
d. none of the mentioned
File Management
36. MFD stands for?
a. Main File Directory
b. Memory File Directory
c. Master File Directory
d. Master Format Directory
41. Files that maintain the hierarchical structure of the file system.
a. Descriptors
b. Directories
c. Modifiers
d. Relative files
49. Which of the following is not an appropriate criterion for file organisation?
a. Larger access time
b. ease of update
c. simple maintenance
d. economy of storage
54. When access is granted to append or update a file to more than one user, the OS or file
management system must enforce discipline. This is _________
a. Simultaneous access
b. Compaction
c. External Fragmentation
d. Division
55. The user can load and execute a program but cannot copy it. This process is?
a. Execution
b. Appending
c. Reading
d. Updating
56. A ……………….. is the basic element of data where individual field contains a single value,
such as an employees last name, a data or the value of the sensor reading.
a. Field
b. Record
c. File
d. Database
57. A ……………………. is collection of related fields that can be treated as a unit by some
application program.
a. Field
b. Record
c. File
d. Database
59. The ……………………. is responsible for all file I/O initiation and termination.
a. Device drivers
b. Physical I/O
c. Basic I/O supervisor
d. Logical I/O
60. ……………………….. provides a general purpose record I/O capability and maintains basic
data about files.
a. Device drivers
b. Physical I/O
c. Basic I/O supervisor
d. Logical I/O
61. In the ……………………… file organization, data are collected in the order in which they
arrive where each record consists of one burst of data.
a. Pile
b. Sequential
c. Indexed sequential
d. Indexed
62. In …………………….. file organization, a fixed format is used for records where all records
are of the same length, consisting of the same number of fixed length fields in a particular
order.
a. Pile
b. Sequential
c. indexed sequential
d. indexed
63. The ……………………… maintains the key characteristic of the sequential file: Records are
organized in sequence based on a key field.
a. Pile
b. sequential file
c. indexed sequential file
d. indexed file
64. The ……………………… retains one limitation of the sequential file: effective processing is
limited to that which is based on a single field of the file.
a. Pile
b. sequential file
c. indexed sequential file
d. indexed file
65. …………………… are used mostly in applications where data are rarely processed
exhaustively.
a. Pile
b. sequential file
c. indexed sequential file
d. indexed file
66. Airline reservation systems and inventory control system are the examples of
…………………….. system.
a. Pile
b. sequential file
c. indexed sequential file
d. indexed file
67. The …………………. greatly reduced the time required to access a single record, without
sacrificing the sequential nature of the file.
a. Pile
b. sequential file
c. indexed sequential file
indexed file
68. In free space management, ………………….. method has negligible space overhead because
there is no need for a disk allocation table, merely for a pointer to the beginning of the chain
and the length of the first portion.
a. Bit tables
b. Chained Free Portions
c. Indexing
d. Free Block List
70. A ………………… on free space management has the advantages that it relatively easy to find
one or a contiguous group of free blocks.
a. Bit table
b. Chained Free Portion
c. Indexing
d. Free Block List
71. In ………………………….. method, the file allocation table contains a separate one level
index for each file, the index has one entry for each portion allocated to the file.
a. Chained allocation
b. Indexed allocation
c. Contiguous allocation
d. Variable allocation
72. ………………….. is a preallocation strategy, using variable size portions where the file
allocation table needs just a single entry for each file, showing the starting block and the length
of the file.
a. Chained allocation
b. Indexed allocation
c. Contiguous allocation
d. Variable allocation
73. Typically, ………………… is on an individual block basis where each block contains a
pointer to the next block in the chain.
a. Chained allocation
b. Indexed allocation
c. Contiguous allocation
d. Variable allocation
74. Which of the following is/are the types of operations that may be performed on the directory.
i) Search ii) Create file iii) Create directory iv) List directory
a. i, ii and iii only
b. ii, iii and iv only
c. i, ii and iv only
d. All i, ii, iii and iv
75. …………………. are often used where very rapid access is required, where fixed length
records are used, and where records are always accessed one at a time.
a. Indexed files
b. Direct files
c. Sequential files
d. Indexed Sequential files
77. …………………… are typically used in batch applications and are generally optimum for
such applications if they involve the processing of all the records.
a. Indexed files
b. Direct files
c. Sequential files
d. Indexed Sequential files
78. Directories, pricing tables, schedules and name lists are the examples of ……………….
a. Indexed files
b. Direct files
c. Sequential files
d. Indexed Sequential files
79. An interactive user or a process has associated with pathname is a current directory which is
often referred to as the …………………….
a. update directory
b. list directory
c. working directory
d. create directory
80. ……………………….. are small fixed portions which provide greater flexibility which may
require large tables or complex structures for their allocation.
a. Blocks
b. Columns
c. Segments Partitions
d. create directory