Operating System MCQ Set-3

Q 1. The process of transferring data intended for a peripheral device into a disk (or intermediate store) so that it can be transferred to peripheral at a more convenient time or in bulk, is known as
A) multiprogramming
B) spooling
C) caching
D) virtual programming
E) None of the above

Show Answer

Answer: Option B
Solution: The process of transferring data intended for a peripheral device into a disk (or intermediate store) so that it can be transferred to peripheral at a more convenient time or in bulk, is known as ‘spooling’.


Q 2. Block caches or buffer caches are used
A) to improve disk performance
B) to handle interrupts
C) to increase the capacity of the main memory
D) to speed up main memory read operation
E) None of the above
Show Answer

Answer: Option A
Solution: Block caches or buffer caches are used to improve disk performance


Q 3. Which of the following statements is false?
A) a small page size causes large page tables
B) internal fragmentation is increased with small pages
C) a large page size causes instructions and data that will not be referenced brought into primary storage
D) I/O transfers are more efficient with large pages
E) None of the above
Show Answer

Answer: Option B
No explanation is given for this question


Q 4. The action of parsing the source program into the proper syntactic classes is known as
A) syntax analysis
B) lexical analysis
C) interpretation analysis
D) general syntax analysis
E) None of the above
Show Answer

Answer: Option B
Solution: The action of parsing the source program into the proper syntactic classes is known as lexical analysis


Q 5. Which, of the following is not true about the description of a decision table?
A) A decision table is easy to modify
B) A decision table is directly understood by the computer
C) A decision table is easy to understand
D) All of the above
E) None of the above
Show Answer

Answer: Option B
Solution: A decision table is directly understood by the computer is not true about the description of a decision table


Q 6. Trojan-Horse programs
A) are legitimate programs that allow unauthorized access
B) do not usually work
C) are hidden programs that do not show up on the system
D) usually are immediately discovered
E) None of the above
Show Answer

Answer: Option A
Solution: Trojan-Horse programs are legitimate programs that allow unauthorized access


Q 7. When did IBM release the first version of disk operating system DOS version 1.0?
A) 1981
B) 1982
C) 1983
D) 1984
E) None of the above
Show Answer

Answer: Option A
Solution: In 1981 IBM release the first version of disk operating system DOS version 1.0.


Q 8. Which of the following is false about disk when compared to main memory?
A) non-volatile
B) longer storage capacity
C) lower price per bit
D) faster
E) None of the above
Show Answer

Answer: Option D
No explanation is given for this question


Q 9. Producer consumer problem can be solved using
A) semaphores
B) event counters
C) monitors
D) all of the above
E) None of the above
Show Answer

Answer: Option D
No explanation is given for this question


Q 10. Most of the microcomputer’s operating systems like Apple DOS, MS DOS and PC DOS etc. are called disk operating systems because
A) they are memory resident
B) they are initially stored on disk
C) they are available on magnetic tapes
D) they are partly in primary memory and partly on disk
E) None of the above
Show Answer

Answer: Option B
Solution: Microcomputer’s operating systems like Apple DOS, MS DOS and PC DOS etc. are called disk operating systems because they are initially stored on disk


Q 11. The CPU, after receiving an interrupt from an I/O device
A) halts for a predetermined time
B) hands over control of address bus and data bus to the interrupting device
C) branches off to the interrupt service routine immediately
D) branches off to the interrupt service routine after completion of the current instruction
E) None of the above
Show Answer

Answer: Option D
No explanation is given for this question


Q 12. Seeks analysis
A) is used for analyzing paging problems
B) is used for analyzing device busy problems
C) is used for analyzing control-unit busy problems
D) is only shown on real-time displays
E) None of the above
Show Answer

Answer: Option B
Solution: Seeks analysis is used for analyzing device busy problems


Q 13. Which is a permanent database in the general model of the compiler?
A) Literal Table
B) Identifier Table
C) Terminal Table
D) Source code
E) None of the above
Show Answer

Answer: Option C
Solution: Terminal Table is a permanent database in the general model of the compiler


Q 14. What is the name of the technique in which the operating system of a computer executes several programs concurrently by switching back and forth between them?
A) Partitioning
B) Multitasking
C) Windowing
D) Paging
E) None of the above
Show Answer

Answer: Option B
Solution: In Multitasking the operating system of a computer executes several programs concurrently by switching back and forth between them.


Q 15. Operating system
A) links a program with the subroutines it references
B) provides a layered, user-friendly interface
C) enables the programmer to draw a flowchart
D) all of the above
E) None of the above
Show Answer

Answer: Option B
Solution: Operating system provides a layered, user-friendly interface


Q 16. Software that measures, monitors, analyzes, and controls real-world events is called:
A) system software
B) real-time software
C) scientific software
D) business software
E) None of the above
Show Answer

Answer: Option B
Solution: Software that measures, monitors, analyzes, and controls real-world events is called real-time software


Q 17. The details of all external symbols and relocation formation (relocation list or map) is provided to linker by
A) Macro processor
B) Translator
C) Loader
D) Editor
E) None of the above
Show Answer

Answer: Option B
Solution: The details of all external symbols and relocation formation (relocation list or map) is provided to linker by Translator


Q 18. The macro processor must perform
A) recognize macro definitions and macro calls
B) save the macro definitions
C) expand macros calls and substitute arguments
D) all of the above
E) None of the above
Show Answer

Answer: Option D
No explanation is given for this question


Q 19. A development strategy whereby the executive control modules of a system are coded and tested first, is known as
A) Bottom-up development
B) Top-down development
C) Left-Right development
D) All of the above
E) None of the above
Show Answer

Answer: Option B
Solution: A development strategy whereby the executive control modules of a system are coded and tested first, is known as Top-down development.


Q 20. Which of the following is helpful in evaluating applications software what will best suit your needs?
A) recommendations by other users
B) computer magazines
C) objective software reviews
D) all of the above
E) None of the above
Show Answer

Answer: Option D
No explanation is given for this question


Q 21. What problem is solved by Dijkstra’s banker’s algorithm?
A) mutual exclusion
B) deadlock recovery
C) deadlock avoidance
D) cache coherence
E) None of the above
Show Answer

Answer: Option C
Solution: Deadlock avoidance problem is solved by Dijkstra’s banker’s algorithm


Q 22. The dispatcher
A) actually schedules the tasks into the processor
B) puts tasks in I/O wait
C) is always small and simple
D) never changes task priorities
E) None of the above
Show Answer

Answer: Option A
Solution: The dispatcher actually schedules the tasks into the processor.


Q 23. System programs such as Compilers are designed so that they are
A) reenterable
B) non reusable
C) serially usable
D) recursive
E) None of the above
Show Answer

Answer: Option A
Solution: System programs such as Compilers are designed so that they are reenterable


Q 24. IBM released its first PC in 1981. Can you name the operating system which was most popular at that time?
A) MS-DOS
B) PC-DOS
C) OS/360
D) CP/M
E) None of the above
Show Answer

Answer: Option D
Solution: CP/M, originally standing for Control Program/Monitor and later Control Program for Microcomputers, is a mass-market operating system created for Intel 8080/85-based microcomputers by Gary Kildall of Digital Research, Inc. Initially confined to single-tasking on 8-bit processors and no more than 64 kilobytes of memory, later versions of CP/M added multi-user variations and were migrated to 16-bit processors. CP/M was displaced by DOS soon after the 1981 introduction of the IBM PC.


Q 25. If the number of bits in a virtual address of a program is 16 and the page size is 0.5 K bytes, the number of pages in the virtual address space is
A) 16
B) 32
C) 64
D) 128
E) None of the above
Show Answer

Answer: Option D
Solution: If the number of bits in a virtual address of a program is 16 and the page size is 0.5 K bytes, the number of pages in the virtual address space is 128.


Q 26. Which table is a permanent database that has an entry for each terminal symbol.
A) Terminal table
B) Literal table
C) Identifier table
D) Reductions
E) None of the above
Show Answer

Answer: Option A
Solution: Terminal table is a permanent database that has an entry for each terminal symbol.


Q 27. The function(s) of the Syntax phase is(are)
A) to recognize the major constructs of the language and to call the appropriate action routines that will generate the intermediate form or matrix for these constructs.
B) to build a literal table and an identifier table
C) to build a uniform symbol table
D) to parse the source program into the basic elements or tokens of the language.
E) None of the above
Show Answer

Answer: Option A
Solution: The functions of the Syntax phase are to recognize the major constructs of the language and to call the appropriate action routines that will generate the intermediate form or matrix for these constructs.


Q 28. Swapping
A) works best with many small partitions
B) allows many programs to use memory simultaneously
C) allows each program in turn to use the memory
D) does not work with overlaying
E) None of the above
Show Answer

Answer: Option C
Solution: Swapping is allows each program in turn to use the memory


Q 29. A disk scheduling algorithm in an operating system causes the disk arm to move back and forth across the disk surface in order to service all requests in its path. This is a
A) First come first served
B) Shortest Seek Time First (SSTE)
C) Scan
D) FIFO
E) None of the above
Show Answer

Answer: Option C
No explanation is given for this question


Q 30. A translator is best described as
A) an application software
B) a system software
C) a hardware component
D) all of the above
E) None of the above
Show Answer

Answer: Option B
Solution: A translator is best described as a system software


Q 31. Data encryption
A) is mostly used by public networks
B) is mostly used by financial networks
C) cannot be used by private installations
D) is not necessary, since data cannot be intercepted
E) None of the above
Show Answer

Answer: Option B
Solution: Data encryption is mostly used by financial networks
Data encryption translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it. Encrypted data is commonly referred to as ciphertext, while unencrypted data is called plaintext.


Q 32. What is the name given to the process of initializing a microcomputer with its operating system?
A) Cold booting
B) Booting
C) Warm booting
D) Boot recording
E) None of the above
Show Answer

Answer: Option B
No explanation is given for this question


Q 33. The function(s) of the Storage Assignment is (are)
A) to assign storage to all variables referenced in the source program.
B) to assign storage to all temporary locations that are necessary for intermediate results.
C) to assign storage to literals, and to ensure that the storage is allocate and appropriate locations are initialized.
D) all of the above
E) None of the above
Show Answer

Answer: Option D
No explanation is given for this question


Q 34. A Processor
A) is a device that performs a sequence of operations specified by instructions in memory.
B) is the device where information is stored
C) is a sequence of instructions
D) is typically characterized by interactive processing and time of the CPU
E) None of the above
Show Answer

Answer: Option A
Solution: A Processor is a device that performs a sequence of operations specified by instructions in memory.


Q 35. With MS-DOS which command will divide the surface of the blank floppy disk into sectors and assign a unique address to each one?
A) FORMAT command
B) FAT command
C) VER command
D) CHKDSK command
E) None of the above
Show Answer

Answer: Option A
No explanation is given for this question


Q 36. Multiprogramming
A) is a method of memory allocation by which the program is subdivided into equal portions, or pages and core is subdivided into equal portions or blocks.
B) consists of those addresses that may be generated by a processor during execution of a computation.
C) is a method of allocating processor time.
D) allows multiple programs to reside in separate areas of core at the time.
E) None of the above
Show Answer

Answer: Option D
Solution: Multiprogramming allows multiple programs to reside in separate areas of core at the time.


Q 37. A translator which reads an entire programme written in a high level language and converts it into machine language code is:
A) assembler
B) translator
C) compiler
D) system software
E) None of the above
Show Answer

Answer: Option C
No explanation is given for this question


Q 38. The advantage(s) inherent to using high level languages is (are)
A) Fewer people, less management and shorter transition in learning time
B) Improved debugging capability, and superior documentation
C) A greater degree of machine independence
D) All of the above
E) None of the above
Show Answer

Answer: Option D
No explanation is given for this question


Q 39. Addressing modes
A) defines the fundamental method of determining effective operand addresses
B) are variations in the use of fundamental addressing structures, or some associated actions which are related to addressing.
C) performs indicated operations on two fast registers of the machine and leave the result in one of the registers.
D) all of the above
E) None of the above
Show Answer

Answer: Option B
Solution: Addressing modes are variations in the use of fundamental addressing structures, or some associated actions which are related to addressing.


Q 40. In which way(s) a macro processor for assembly language can be implemented:
A) independent two-pass processor
B) independent one-pass processor
C) processor incorporated into pass 1 of a standard two-pass assembler
D) all of the above
E) None of the above
Show Answer

Answer: Option D
No explanation is given for this question


Q 41. Which of the following is a type of systems software used on microcomputers?
A) MS-DOS
B) PC-DOS
C) Unix
D) All of the above
E) None of the above
Show Answer

Answer: Option D
No explanation is given for this question


Q 42. The working set theory of programming behaviour of processes running within an operating system involves
A) the collection of pages that a process accesses
B) disk scheduling mechanisms
C) coalescing holes in memory
D) assigning the CPU to processes
E) None of the above
Show Answer

Answer: Option A
Solution: The working set theory of programming behaviour of processes running within an operating system involves the collection of pages that a process accesses


Q 43. Operating system is
A) A collection of hardware components
B) A collection of input-output devices
C) A collection of software routines
D) All of the above
E) None of the above
Show Answer

Answer: Option C
Solution: Operating system is a collection of software routines


Q 44. A file organization component of a VSAM file is:
A) relative record data set
B) keyed sequential data set
C) entry sequential data set
D) all of the above
E) None of the above
Show Answer

Answer: Option D
No explanation is given for this question


Q 45. What is the name given to the software which can be legally compiled and often used for free?
A) Shareware program
B) Public domain program
C) Firmware program
D) Mindware
E) None of the above
Show Answer

Answer: Option B
Solution: Public-domain software (program) refers to any program that is not copyrighted. Public-domain software (program) is free and can be used without restrictions. The term public-domain software is often used incorrectly to include freeware, free software that is nevertheless copyrighted.


Q 46. The SJF algorithm executes first the job
A) that last entered the queue
B) that first entered the queue
C) that has been in the queue the longest
D) with the least processor needs
E) None of the above
Show Answer

Answer: Option D
Solution: The SJF algorithm executes first the job with the least processor needs.


Q 47. In which of the storage placement strategies a program is placed in the largest available hole in the main memory?
A) best fit
B) first fit
C) worst fit
D) buddy
E) None of the above
Show Answer

Answer: Option C
No explanation is given for this question


Q 48. Which of the following is a block device
A) mouse
B) printer
C) terminals
D) disk
E) None of the above
Show Answer

Answer: Option D
Solution: A block device is a computer data storage device that supports reading and (optionally) writing data in fixed-size blocks, sectors, or clusters. These blocks are generally 512 bytes or a multiple thereof in size.


Q 49. The problem of thrashing is affected significantly by:
A) program structure
B) program size
C) primary-storage size
D) all of the above
E) None of the above
Show Answer

Answer: Option A
Solution: The problem of thrashing is affected significantly by program structure


Q 50. Which of the following software types is used to simplify using systems software?
A) spreadsheet
B) operating environment
C) timesharing
D) multitasking
E) None of the above
Show Answer

Answer: Option C
Solution: In computing, time-sharing is the sharing of a computing resource among many users by means of multiprogramming and multi-tasking at the same time. Its introduction in the 1960s and emergence as the prominent model of computing in the 1970s represented a major technological shift in the history of computing.


Q 51. Advantage(s) of using assembly language rather than machine language is (are):
A) It is mnemonic and easy to read.
B) Addresses any symbolic, not absolute
C) Introduction of data to program is easier
D) all of the above
E) None of the above
Show Answer

Answer: Option D
No explanation is given for this question


Q 52. Which of the following is not true about the memory management?
A) virtual memory is used only in multi-user systems
B) segmentation suffers from external fragmentation
C) paging suffers from internal fragmentation
D) segmented memory can be paged
E) None of the above
Show Answer

Answer: Option A
No explanation is given for this question


Q 53. Job Control Language (JCL) statements are used to
A) Read the input from the slow-speed card reader to the high-speed magnetic disk
B) Specify, to the operating system, the beginning and end of a job in a batch
C) Allocate the CPU to a job
D) All of the above
E) None of the above
Show Answer

Answer: Option B
Solution: JCL (job control language) is a language for describing jobs (units of work) to the MVS, OS/390, and VSE operating systems, which run on IBM’s S/390 large server (mainframe) computers. These operating systems allocate their time and space resources among the total number of jobs that have been started in the computer.


Q 54. Paging
A) is a method of memory allocation by which the program is subdivided into equal portions, or pages and core is subdivided into equal portions or blocks.
B) consists of those addresses that may be generated by a processor during execution of a computation.
C) is a method of allocating processor time.
D) allows multiple programs to reside in separate areas of core at the time.
E) None of the above
Show Answer

Answer: Option A
Solution: In computer operating systems, paging is a memory management scheme by which a computer stores and retrieves data from secondary storage for use in main memory. In this scheme, the operating system retrieves data from secondary storage in same-size blocks called pages. Paging is an important part of virtual memory implementations in modern operating systems, using secondary storage to let programs exceed the size of available physical memory.


Q 55. Which of the following is not true about documentation?
A) Documentation, of a system, should be as clear and direct as possible
B) Documentation increases the maintenance time and cost
C) Documentation gives better understanding of the problem
D) All of the above
E) None of the above
Show Answer

Answer: Option B
No explanation is given for this question


Q 56. The system/370 assembler language
A) allows the programmer to write base registers and displacements explicitly in the source program.
B) is used to remember which of the general-purpose registers are currently available as base registers, and what base addresses they contain.
C) allows multiple programs to reside in separate areas of core at the same time.
D) is a term that refers to the control programs of an operating system.
E) None of the above
Show Answer

Answer: Option A
Solution: The system/370 assembler language allows the programmer to write base registers and displacements explicitly in the source program.


Q 57. Scheduling is
A) allowing jobs to use the processor
B) unrelated to performance consideration
C) not required in uniprocessor systems
D) the same regard-less of the purpose of the system
E) None of the above
Show Answer

Answer: Option A
Solution: The process scheduling is the activity of the process manager that handles the removal of the running process from the CPU and the selection of another process on the basis of a particular strategy. Process scheduling is an essential part of Multiprogramming operating systems.


Q 58. What scheduling algorithm allows processes that are logical runnable to be temporarily suspended?
A) preemptive scheduling
B) non-preemptive scheduling
C) FIFO
D) FCFS
E) None of the above
Show Answer

Answer: Option A
Solution: Preemptive Scheduling: A scheduling discipline is preemptive if, once a process has been given the CPU can taken away. The strategy of allowing processes that are logically runable to be temporarily suspended is called Preemptive Scheduling and it is contrast to the “run to completion” method.


Q 59. In an absolute loading scheme, which loader function is accomplished by the loader
A) Reallocation
B) Allocation
C) Linking
D) Loading
E) None of the above
Show Answer

Answer: Option D
Solution: In an absolute loading scheme, Loading function is accomplished by the loader


Q 60. The computational technique used to compute the disk storage address of individual records is called:
A) bubble memory
B) key fielding
C) dynamic reallocation
D) hashing
E) None of the above
Show Answer

Answer: Option D
Solution: The computational technique used to compute the disk storage address of individual records is called hashing.


Q 61. For how many processes which are sharing common data, the Dekker’s algorithm implements mutual exclusion?
A) 1
B) 2
C) 3
D) 4
E) None of the above
Show Answer

Answer: Option B
Solution: Dekker’s algorithm is the first known correct solution to the mutual exclusion problem in concurrent programming. The solution is attributed to Dutch mathematician Th. J. Dekker by Edsger W. Dijkstra in an unpublished paper on sequential process descriptions and his manuscript on cooperating sequential processes.


Q 62. The file structure that redefines its first record at a base of zero uses the term:
A) relative organization
B) key fielding
C) dynamic reallocation
D) hashing
E) None of the above
Show Answer

Answer: Option A
No explanation is given for this question


Q 63. What is the name given to all the programs inside the computer with makes it usable?
A) Application software
B) System software
C) Firm ware
D) Shareware
E) None of the above
Show Answer

Answer: Option B
No explanation is given for this question


Q 64. Semaphores
A) synchronize critical resources to prevent deadlock
B) synchronize critical resources to prevent contention
C) are used to do I/O
D) are used for memory management
E) None of the above
Show Answer

Answer: Option A
Solution: Semaphores synchronize critical resources to prevent deadlock


Q 65. The advantage(s) of incorporating the macro processor into pass 1 is(are):
A) many functions do not have to be implemented twice.
B) Functions are combined and it is not necessary to create intermediate files as output from the macros processor and input to the assembler.
C) more flexibility is available to the programmer in that he may use all the features of the assembler in conjunction with macros.
D) all of the above
E) None of the above
Show Answer

Answer: Option D
No explanation is given for this question


Q 66. In analyzing the compilation of PL/I program, the description “creation of more optimal matrix” is associated with
A) Assembly and output
B) Code generation
C) Syntax analysis
D) Machine independent optimization
E) None of the above
Show Answer

Answer: Option D
No explanation is given for this question


Q 67. In memory systems, boundary registers
A) are used for temporary program variable storage
B) are only necessary with fixed partitions
C) track page boundaries
D) track the beginning and ending of programs
E) None of the above
Show Answer

Answer: Option D
No explanation is given for this question


Q 68. Which of the following is true for machine language.
A) Repeated execution of program segments
B) Depicting flow of data in a system
C) A sequence of instructions which, when followed properly, solves a problem
D) the language which communicates with the computer using only the binary digits 1 and 0.
E) None of the above
Show Answer

Answer: Option D
Solution: The language which communicates with the computer using only the binary digits 1 and 0.


Q 69. Which of the following is not applications software?
A) Word processing
B) Spreadsheet
C) UNIX
D) Desktop publishing
E) None of the above
Show Answer

Answer: Option C
No explanation is given for this question


Q 70. Scissoring enables
A) a part of data to be displayed
B) entire data to be displayed
C) full data display on full area of screen
D) no data to be displayed
E) None of the above
Show Answer

Answer: Option A
No explanation is given for this question

Related Posts

If you like CBSEToaday and would like to contribute, you can also write an article using submit article or mail your article to contribute@cbsetoday.com See your article appearing on the cbsetoday.com main page and help other students/teachers.