Operating System MCQ Set -2

Q 1. A relocate program form is one which
A) cannot be made to execute in any area of storage other than the one designated for it at the time of its coding or translation.
B) consists of a program and relevant information for its relocation.
C) can itself performs the relocation of its address-sensitive portions.
D) all of the above
E) None of the above

Show Answer

Answer: Option B
Solution: A relocate program form is one which consists of a program and relevant information for its relocation.


Q 2. If you want to execute more than one program at a time, the systems software you are using must be capable of:
A) word processing
B) virtual memory
C) compiling
D) multitasking
E) None of the above
Show Answer

Answer: Option D
Solution: If you want to execute more than one program at a time, the systems software you are using must be capable of multitasking.


Q 3. In analyzing the compilation of PL/I program, the description “resolving symbolic address (labels) and generating machine language” is associated with
A) Assembly and output
B) Code generation
C) Storage assignment
D) Syntax analysis
E) None of the above
Show Answer

Answer: Option A
No explanation is given for this question


Q 4. Round-robin scheduling
A) allows interactive tasks quicker access to the processor
B) is quite complex to implement
C) gives each task the same chance at the processor
D) allows processor-bound tasks more time in the processor
E) None of the above
Show Answer

Answer: Option C
Solution: Round-robin scheduling gives each task the same chance at the processor


Q 5. What is the name of the system which deals with the running of the actual computer and not with the programming problems?
A) Operating system
B) Systems program
C) Object program
D) Source program
E) None of the above
Show Answer

Answer: Option B
Solution: Systems program deals with the running of the actual computer and not with the programming problems.


Q 6. What is the initial value of the semaphore to allow only one of the many processes to enter their critical section?
A) 8
B) 1
C) 16
D) 0
E) None of the above
Show Answer

Answer: Option B
No explanation is given for this question


Q 7. Four necessary conditions for deadlock to exist are: mutual exclusion, no-preemption, circular wait and
A) hold and wait
B) deadlock avoidance
C) race around condition
D) buffer overflow
E) None of the above
Show Answer

Answer: Option A
No explanation is given for this question


Q 8. If you do not know which version of MS-DOS you are working with, which command will you use after having booted your operating system?
A) FORMAT command
B) DIR command
C) VER command
D) DISK command
E) None of the above
Show Answer

Answer: Option C
Solution: In computing, ver is a command in various DOS, FlexOS, OS/2 and Microsoft Windows command line interpreters such as COMMAND.COM, cmd.exe and 4DOS/4NT. It prints the name and version of the operating system or the command shell.


Q 9. A partitioned data set is most used for
A) a program or source library
B) storing program data
C) storing backup information
D) storing ISAM files
E) None of the above
Show Answer

Answer: Option A
Solution: A partitioned data set is most used for a program or source library


Q 10. Page-map table is
A) A data file
B) A directory
C) Used for address translation
D) All of the above
E) None of the above
Show Answer

Answer: Option C
Solution: Page-map table is used for address translation


Q 11. The main function of the dispatcher (the portion of the process scheduler) is
A) swapping a process to the disk
B) assigning ready process to the CPU
C) suspending some of the processes when the CPU load is high
D) bring processes from the disk to the main memory
E) None of the above
Show Answer

Answer: Option B
Solution: The main function of the dispatcher is assigning ready process to the CPU


Q 12. The errors that can be pointed out by the compiler are
A) Syntax errors
B) Semantic errors
C) Logical errors
D) Internal errors
E) None of the above
Show Answer

Answer: Option A
Solution: The errors that can be pointed out by the compiler are ‘Syntax errors’.


Q 13. When a computer is first turned on or restarted, a special type of absolute loader is executed, called a
A) “Compile and Go” loader
B) Boot loader
C) Bootstrap loader
D) Relating loader
E) None of the above
Show Answer

Answer: Option C
Solution: A bootstrap loader is a program that resides in the computer’s EPROM, ROM, or other non-volatile memory. It is automatically executed by the processor when turning on the computer.


Q 14. Which, of the following checks, cannot be carried out on the input data to a system?
A) consistency check
B) Syntax check
C) Range check
D) All of the above
E) None of the above
Show Answer

Answer: Option B
Solution: Syntax check cannot be carried out on the input data to a system.


Q 15. A program that converts a high-level language program to a set of instructions that can run on a computer is called a
A) Compiler
B) Debugger
C) Editor
D) All of the above
E) None of the above
Show Answer

Answer: Option A
Solution: A compiler is computer software that transforms computer code written in one programming language (the source language) into another programming language (the target language). Compilers are a type of translator that support digital devices, primarily computers. The name compiler is primarily used for programs that translate source code from a high-level programming language to a lower level language.
Source : wikipedia.org


Q 16. Which of the following is characteristic of an operating system?
A) resource management
B) error recovery
C) memory management
D) All the above
E) None of the above
Show Answer

Answer: Option D
No explanation is given for this question


Q 17. In MS-DOS, relocatable object files and load modules have extensions
A) .OBJ and .COM or .EXE, respectively
B) .COM and .OBJ, respectively
C) .EXE and .OBJ, respectively
D) .DAS and .EXE, respectively
E) None of the above
Show Answer

Answer: Option A
Solution: In MS-DOS, relocatable object files and load modules have extensions is .OBJ and .COM or .EXE, respectively.
.OBJ : OBJ is a geometry definition file format first developed by Wavefront Technologies for its Advanced Visualizer animation package. The file format is open and has been adopted by other 3D graphics application vendors.
.COM : The domain name com is a top-level domain in the Domain Name System of the Internet. Its name is derived from the word commercial, indicating its original intended purpose for domains registered by commercial organizations. Later, the domain opened for general purposes.
.EXE : EXE is a file extension for an executable file format. An executable is a file that contains a program – that is, a particular kind of file that is capable of being executed or run as a program in the computer. An executable file can be run by a program in Microsoft DOS or Windows through a command or a double click.


Q 18. The state transition initiated by the user process itself in an operating system is
A) block
B) dispatch
C) wake up
D) timer run out
E) None of the above
Show Answer

Answer: Option A
Solution: The state transition initiated by the user process itself in an operating system is block.


Q 19. Which of the following program is not a utility?
A) Debugger
B) Editor
C) Spooler
D) All of the above
E) None of the above
Show Answer

Answer: Option C
No explanation is given for this question


Q 20. The function(s) of file system is (are):
A) to provide complete file naming freedom to the users and to permit controlled sharing of files
B) to provide for long and short term storage of files with appropriate economic tradeoffs.
C) to provide security against loss of information due to system failure
D) all of the above
E) None of the above
Show Answer

Answer: Option D
No explanation is given for this question


Q 21. A public key encryption system
A) allows anyone to decode the transmission
B) allows only the correct sender to decode the data
C) allows only the correct receiver to decode the data
D) does not encode the data before transmitting it
E) None of the above
Show Answer

Answer: Option C
Solution: A public key encryption system allows only the correct receiver to decode the data.


Q 22. Feed back queue
A) are very easy to implement
B) dispatch tasks according to execution characteristics
C) are used to favor real-time tasks
D) require manual intervention to implement properly
E) None of the above
Show Answer

Answer: Option B
Solution: Feed back queue dispatch tasks according to execution characteristics.


Q 23. In which addressing mode the operand is given explicitly in the instruction?
A) absolute mode
B) immediate mode
C) indirect mode
D) index mode
E) None of the above
Show Answer

Answer: Option B
No explanation is given for this question


Q 24. The technique, for sharing the time of a computer among several jobs. Which switches jobs so rapidly such that each job appears to have the computer to itself:
A) time sharing
B) time out
C) time domain
D) FIFO
E) None of the above
Show Answer

Answer: Option A
No explanation is given for this question


Q 25. Capacity planning
A) requires detailed system performance information
B) is independent of the operating system
C) does not depend on the monitoring tools available
D) is not needed in small installations
E) None of the above
Show Answer

Answer: Option B
Solution: Capacity planning is independent of the operating system


Q 26. Poor response times are caused by
A) Processor busy
B) High I/O rate
C) High paging rates
D) Any of the above
E) None of the above
Show Answer

Answer: Option D
No explanation is given for this question


Q 27. Link encryption
A) is more secure than end-to-end encryption
B) is less secure than end-to-end encryption
C) can not be used in a public network
D) is used only to debug
E) None of the above
Show Answer

Answer: Option B
Solution: Link encryption is less secure than end-to-end encryption.
Link encryption is an approach to communications security that encrypts and decrypts all traffic at each network routing point (e.g. network switch, or node through which it passes) until arrival at its final destination.


Q 28. A form of code that uses more than one process and processor, possibly of different type, and that may on occasions have more than one process or processor active at the same time, is known as
A) multiprogramming
B) multithreading
C) broadcasting
D) time sharing
E) None of the above
Show Answer

Answer: Option B
Solution: A form of code that uses more than one process and processor, possibly of different type, and that may on occasions have more than one process or processor active at the same time, is known as multithreading


Q 29. The table created by lexical analysis to describe all literals used in the source program is
A) Terminal table
B) Literal table
C) Identifier table
D) Reductions
E) None of the above
Show Answer

Answer: Option B
Solution: The table created by lexical analysis to describe all literals used in the source program is Literal table.


Q 30. The term ‘polling’ in a computer means a process by which a computer system
A) detects/corrects errors
B) multiplexes the inputs and updates the memory accordingly
C) decides correct alternative by analysing several ones
D) inquires to see if a terminal has any transaction to send
E) None of the above
Show Answer

Answer: Option D
No explanation is given for this question


Q 31. In which addressing mode, the address of the location of the operand is given explicitly as a part of the instruction.
A) absolute mode
B) immediate mode
C) index mode
D) modulus mode
E) None of the above
Show Answer

Answer: Option A
No explanation is given for this question


Q 32. Under virtual storage,
A) a single program is processed by two or more CPUs
B) two or more programs are stored concurrently in primary storage
C) only the active pages of a program are stored in primary storage
D) interprogram interference may occur
E) None of the above
Show Answer

Answer: Option C
Solution: Under virtual storage only the active pages of a program are stored in primary storage.


Q 33. A base register table
A) allows the programmer to write base registers and displacements explicitly in the source program.
B) is used to remember which of the general-purpose registers are currently available as base registers, and what base addresses they contain.
C) allows multiple programs to reside in separate areas of core at the same time.
D) is a term that refers to the control programs of an operating system.
E) None of the above
Show Answer

Answer: Option B
Solution: A base register table is used to remember which of the general-purpose registers are currently available as base registers, and what base addresses they contain.


Q 34. File record length
A) should always be fixed
B) Should always be variable
C) depends upon the size of the file
D) should be chosen to match the data characteristics
E) None of the above
Show Answer

Answer: Option D
Solution: File record length should be chosen to match the data characteristics.


Q 35. A relationship between processes such that each has some part (critical section) which must not be executed while the critical section of another is being executed, is known as
A) semaphore
B) mutual exclusion
C) multiprogramming
D) multitasking
E) None of the above
Show Answer

Answer: Option B
Solution: A relationship between processes such that each has some part (critical section) which must not be executed while the critical section of another is being executed, is known as mutual exclusion


Q 36. What is the name of the operating system which was originally designed by scientists and engineers for use by scientists and engineers?
A) XENIX
B) UNIX
C) OS/2
D) MS DOS
E) None of the above
Show Answer

Answer: Option B
No explanation is given for this question


Q 37. The most common security failure is
A) carelessness by users
B) depending on passwords
C) too much emphasis on preventing physical access
D) insufficient technology used to prevent breaches
E) None of the above
Show Answer

Answer: Option A
No explanation is given for this question


Q 38. Terminal Table
A) contains all constants in the program
B) a permanent table of decision rules in the form of patterns for matching with the uniform symbol table to discover syntactic structure.
C) consists of a full or partial list of the token’s as they appear in the program. Created by Lexical analysis and used for syntax analysis and interpretation
D) a permanent table which lists all key words and special symbols of the language in symbolic form.
E) None of the above
Show Answer

Answer: Option D
No explanation is given for this question


Q 39. Block or buffer caches are used
A) to improve disk performance
B) to handle interrupts
C) to increase the capacity of main memory
D) to speed up main memory read operation
E) None of the above
Show Answer

Answer: Option A
Solution: Block or buffer caches are used to improve disk performance.


Q 40. The practice of “bundling” refers to
A) selling computers alone
B) selling peripheral devices with computer
C) selling software to run on computers
D) giving away software with a computer purchase
E) None of the above
Show Answer

Answer: Option D
No explanation is given for this question


Q 41. Special software to create a job queue is called a
A) Drive
B) Spooler
C) Interpreter
D) Linkage editor
E) None of the above
Show Answer

Answer: Option B
Solution: Special software to create a job queue is called a spooler


Q 42. All the time a computer is switched on, its operating system software has to stay in
A) main storage
B) primary storage
C) floppy disk
D) disk drive
E) None of the above
Show Answer

Answer: Option B
Solution: All the time a computer is switched on, its operating system software has to stay in primary storage


Q 43. Can you name of the major Operating System used in computers?
A) MS DOS
B) OS/2
C) UNIX
D) All of the above
E) None of the above
Show Answer

Answer: Option D
No explanation is given for this question


Q 44. Which of the following is not an advantage of multiprogramming?
A) increased throughput
B) shorter response time
C) decreased operating-system overhead
D) ability to assign priorities to jobs
E) None of the above
Show Answer

Answer: Option C
No explanation is given for this question


Q 45. Virtual Memory
A) is a method of memory allocation by which the program is subdivided into equal portions, or pages and core is subdivided into equal portions or blocks.
B) consists of those addresses that may be generated by a processor during execution of a computation.
C) is a method of allocating processor time.
D) allows multiple programs to reside in separate areas of core at the time.
E) None of the above
Show Answer

Answer: Option B
Solution: Virtual Memory consists of those addresses that may be generated by a processor during execution of a computation.


Q 46. In a magnetic disk, data is recorded in a set of concentric tracks which are subdivided into
A) periods
B) sectors
C) zones
D) groups
E) None of the above
Show Answer

Answer: Option B
Solution: In a magnetic disk, data is recorded in a set of concentric tracks which are subdivided into sectors


Q 47. The total time to prepare a disk drive mechanism for a block of data to be read from it is
A) latency
B) latency plus transmission time
C) latency plus seek time
D) latency plus seek time plus transmission time
E) None of the above
Show Answer

Answer: Option C
Solution: The total time to prepare a disk drive mechanism for a block of data to be read from it is latency plus seek time


Q 48. Part of a program where the shared memory is accessed and which should be executed invisibly is called
A) semaphores
B) directory
C) critical section
D) mutual exclusion
E) None of the above
Show Answer

Answer: Option C
Solution: Part of a program where the shared memory is accessed and which should be executed invisibly is called critical section


Q 49. Indicate which, of the following, is not true about Nassi-Shneiderman charts
A) These charts are type of graphical design tool
B) These charts cannot represent CASE constructs
C) These charts can represent three fundamental control structures
D) All of the above
E) None of the above
Show Answer

Answer: Option B
No explanation is given for this question


Q 50. What is the name of the operating system that reads and reacts in terms of actual time.
A) Batch system
B) Quick response system
C) Real time system
D) Time sharing system
E) None of the above
Show Answer

Answer: Option C
No explanation is given for this question


Q 51. An incremental backup
A) should be done each month
B) uses more tapes
C) saves all files
D) saves only files that have recently changed
E) None of the above
Show Answer

Answer: Option D
Solution: An incremental backup saves only files that have recently changed


Q 52. The powerful text editor called PC-Write can be used by anybody by paying a small fee. Such programs are called
A) Software
B) Shareware
C) Firmware
D) Mindware
E) None of the above
Show Answer

Answer: Option B
Solution: The powerful text editor called PC-Write can be used by anybody by paying a small fee. Such programs are called Shareware


Q 53. The disadvantages of “Compile and Go” loading scheme is (are):
A) a portion of memory is wasted because the core occupied by the assembler is unavailable to the object program.
B) it is necessary to retranslate the user’s program deck every time it is run.
C) it is very difficult to handle multiple segments, especially if the source programs are in different languages, and to produce orderly modular programs.
D) all of the above
E) None of the above
Show Answer

Answer: Option D
No explanation is given for this question


Q 54. The operating system of a computer serves as a software interface between the user and
A) hardware
B) peripheral
C) memory
D) screen
E) None of the above
Show Answer

Answer: Option A
Solution: The operating system of a computer serves as a software interface between the user and hardware


Q 55. Which of the following statement is true.
A) The LRU algorithm pages out pages that have been used recently
B) Thrashing is a natural consequence of virtual memory systems.
C) Seek analysis is used for analysing control-unit busy problems.
D) All of the above
E) None of the above
Show Answer

Answer: Option C
No explanation is given for this question


Q 56. Which of the following is a phase of a compilation process
A) Lexical analysis
B) Code generation
C) Both of the above
D) Static analysis
E) None of the above
Show Answer

Answer: Option C
No explanation is given for this question


Q 57. Which are the most important features of Microsoft Windows program?
A) Windows
B) Pull-down menus
C) Icons
D) All of the above
E) None of the above
Show Answer

Answer: Option D
No explanation is given for this question


Q 58. Which of the following system program forgoes the production of object code to generate absolute machine code and load it into the physical main storage location from which it will be executed immediately upon completion of the assembly?
A) two pass assembler
B) load-and-go assembler
C) macroprocessor
D) compiler
E) None of the above
Show Answer

Answer: Option B
No explanation is given for this question


Q 59. Virtual memory is
A) simple to implement
B) used in all major commercial operating systems
C) less efficient in utilization of memory
D) useful when fast I/O devices are not available
E) None of the above
Show Answer

Answer: Option B
Solution: Virtual memory is used in all major commercial operating systems


Q 60. Object code
A) is ready to execute
B) is the output of compilers, but not assemblers
C) must be “loaded” before execution
D) must be rewritten before execution
E) None of the above
Show Answer

Answer: Option C
Solution: Object code must be “loaded” before execution


Q 61. The term “operating system” means
A) a set of programs which controls computer working
B) the way a computer operator works
C) conversion of high level language into machine code
D) the way a floppy disk drive operates
E) None of the above
Show Answer

Answer: Option A
Solution: The term “operating system” means a set of programs which controls computer working.


Q 62. Which of the following might be used to convert high-level language instructions into machine language?
A) system software
B) applications software
C) an operating environment
D) an interpreter
E) None of the above
Show Answer

Answer: Option D
No explanation is given for this question


Q 63. Indicate which is a pre-emptive scheduling algorithm
A) Round-robin
B) Shortest-job-next
C) Priority-based
D) All of the above
E) None of the above
Show Answer

Answer: Option A
Solution: Round-robin is a pre-emptive scheduling algorithm.


Q 64. Which of the following, is necessary to work on a computer
A) Compiler
B) Operating system
C) Assembly
D) Interpreter of the above
E) None of the above
Show Answer

Answer: Option B
Solution: Operating system is necessary to work on a computer.


Q 65. Access time is the highest in the case of
A) floppy disk
B) cache
C) swapping devices
D) magnetic disk
E) None of the above
Show Answer

Answer: Option D
Solution: Access time is the highest in the case of magnetic disk


Q 66. Which of the following is not a characteristic of a daisy chaining priority control scheme?
A) priority is programmable
B) it is relatively easy to add more devices to the chain
C) the failure of one device may affect other devices on the chain
D) the number of control lines is independent of the number of devices on the chain
E) None of the above
Show Answer

Answer: Option A
No explanation is given for this question


Q 67. Assembler is
A) a program that places programs into memory and prepares them for execution.
B) a program that automate the translation of assembly language into machine language.
C) a program that accepts a program written in a high level language and produces an object program.
D) is a program that appears to execute a source program as if it were machine language.
E) None of the above
Show Answer

Answer: Option B
No explanation is given for this question


Q 68. Indicate which, of the following, in not true about an interpreter
A) Interpreter generates an object program from the source program
B) Interpreter is a kind of translator
C) Interpreter analyses each source statement every time it is to be executed
D) All of the above
E) None of the above
Show Answer

Answer: Option A
No explanation is given for this question


Q 69. Object modules generated by assemblers that contain unresolved external references are resolved for two or more object modules by a/an
A) operating system
B) loader
C) linker
D) compiler
E) None of the above
Show Answer

Answer: Option C
No explanation is given for this question


Q 70. The advantage of a command processor running only built-in commands is:
A) flexibility to the users in running lists of commands by simply collecting them in named batch command files
B) the command set being common across different hardware configurations
C) users can create system programs and run them as commands
D) the processing is much faster than would other-wise be the case when user defined commands are used
E) None of the above
Show Answer

Answer: Option B
Solution: The advantage of a command processor running only built-in commands is the command set being common across different hardware configurations.

Related Posts

If you like CBSEToaday and would like to contribute, you can also write an article using submit article or mail your article to contribute@cbsetoday.com See your article appearing on the cbsetoday.com main page and help other students/teachers.