Sei sulla pagina 1di 13

Multiple Choice Questions Operating System

History of Unix
1.
Which symbol will be used with grep command to match the pattern pat at the beginning of a
line?
A. ^pat
B. $pat
C. pat$
D. pat^
E. None of the above


2.
Which command is used to sort the lines of data in a file in reverse order
A. Sort
B. Sh
C. St
D. sort r
E. None of the above


3.
Which command is used to display the top of the file?
A. Cat
B. Head
C. More
D. Grep
E. None of the above


4.
Which command is used to copy all files having the string chap and any two characters after that
to the progs directory?
A. cp chap?? Progs
B. cp chap* progs
C. cp chap[12] /progs/*.*
D. cp chap?? /progs/*
E. None of the above


5.
Which command is used to change protection mode of files starting with the string emp and
ending with 1,2, or 3?
A. chmod u+x emp[l-3]
B. chmod 777 emp*
C. chmod u+r ??? emp
D. chmod 222 emp?
E. None of the above

6.
Which of the following files contains information related to password aging?
A. Shadow
B. Password
C. Profile
D. All the three
E. None of the above


7.
Which command will be used with vi editor to replace text from cursor to right?
A. R
B. R
C. S
D. S
E. None of the above


8.
Which of the following commands is used to rename a file?
A. Rename
B. Remove
C. Mv
D. Ren
E. None of the above


9.
Which of the following is not a filter?
A. Cat
B. Grep
C. Wc
D. Sort
E. None of the above


10.
Which of the following commands is used to copy a file wb from the programs directory into a file called
wbx in the misc directory?
A. Copy programs/wb misc/wbx
B. cp programs/wb misc/wbx
C. tar programs/wb misc/wbx
D. copy a:programs/wb b:misc/wbx
E. None of the above


11.
Which of the following special shell variables is used to process number of the current shell?
A. $!
B. $$
C. $0
D. $*
E. None of the above


12.
Which option is used with cmp command to give a detailed list of the byte number and the
differing bytes in octal for each character that differs in both the files?
A. -l
B. -d
C. -r
D. -b
E. None of the above


13.
Which command is used with vi editor scroll half page backward?
A. [Control-d]
B. [Control - u]
C. [Control-c]
D. [Control -P]
E. None of the above


14.
Which command is used with vi editor to move cursor forward to first occurence of character
'ch' in the current line?
A. Tch
B. Fch
C. Rch
D. Ech
E. None of the above


15.
Which of the following keys is used to delete the character beneath the cursor?
A. X
B. X
C. Dd
D. D
E. None of the above

System Structure
1) A large number of disks in a system improves the rate at which data can be read or written :
a) if the disks are operated on sequentially
b) if the disks are operated on selectively
c) if the disks are operated in parallel
d) All of these
2) RAID stands for :
a) Redundant Allocation of Inexpensive Disks
b) Redundant Array of Important Disks
c) Redundant Allocation of Independent Disks
d) Redundant Array of Independent Disks
3) If the mean time to failure of a single disk is 100,000 hours, then the mean time to failure of
some disk in an array of 100 disks will be :
a) 100 hours
b) 10 days
c) 10 hours
d) 1000 hours
4) The solution to the problem of reliability is the introduction of __________.
a) aging
b) scheduling
c) redundancy
d) disks
5) RAID level ________ refers to disk arrays with striping at the level of blocks, but without any
redundancy.
a) 0
b) 1
c) 2
d) 3
6) To access the services of operating system, the interface is provided by the
a) system calls
b) API
c) library
d) assembly instructions
7) Which one of the following is not true?
a) kernel is the program that constitutes the central core of the operating system
b) kernel is the first part of operating system to load into memory during booting
c) kernel is made of various modules which can not be loaded in running operating system
d) kernel remains in the memory during the entire computer session
8) The main function of the command interpreter is
a) to get and execute the next user-specified command
b) to provide the interface between the API and application program
c) to handle the files in operating system
d) none of the mentioned
9) By operating system, the resource management can be done via
a) time division multiplexing
b) space division multiplexing
c) both (a) and (b)
d) none of the mentioned
10) If a process fails, most operating system write the error information to a
a) log file
b) another running process
c) new file
d) none of the mentioned
Operating system services
1) Routine is not loaded until it is called. All routines are kept on disk in a relocatable load
format. The main program is loaded into memory & is executed. This type of loading is
called _________
1. Static loading
2. Dynamic loading
3. Dynamic linking
4. Overlays
2) Which of the following is crucial time while accessing data on the disk?
1. Seek time
2. Rotational time
3. Transmission time
4. Waiting time
3) Unix Operating System is a __________.
1. Time Sharing Operating System
2. Multi-User Operating System
3. Multi-tasking Operating System
4. All the Above
4) Which of the following memory allocation scheme suffers from External fragmentation?
1. Segmentation
2. Pure demand paging
3. Swapping
4. Paging
5) The program is known as _________ which interacts with the inner part of called kernel.
1. Compiler
2. Device Driver
3. Protocol
4. Shell
6) The time taken by the disk arm to locate the specific address of a sector for getting
information is called __________.
1. Rotational Latency
2. Seek Time
3. Search Time
4. Response Time
7) Identify the odd thing in the services of operating system.
1. Accounting
2. Protection
3. Error detection and correction
4. Dead lock handling
8) Which of the following is not advantage of multiprogramming?
1. Increased throughput
2. Shorter response time
3. Decreased operating system overhead
4. Ability to assign priorities to jobs
9) In ______ OS, the response time is very critical.
1. Multitasking
2. Batch
3. Online
4. Real-time
10) In Priority Scheduling a priority number (integer) is associated with each process. The
CPU is allocated to the process with the highest priority (smallest integer = highest
priority). The problem of, Starvation ? low priority processes may never execute, is
resolved by __________.
1. Terminating the process.
2. Aging
3. Mutual Exclusion
4. Semaphore
Assumptions about Hardware
1. ..system is built directly on the hardware
a. Environment
b. System
c. Operating
d. None

2. Multiprogramming system
a. Are easier to develop than single programming system
b. Execute each job faster
c. Execute more jobs in the same time period
d. Are used only one large mainframe computers

3. is the first program run on a computer when the computer boots up
a. System software
b. Operating system
c. System operations
d. None

4. ..interface consists of things like program counter, registers, interrupts and terminals
a. Hardware
b. Software
c. Data
d. None

5. The operating system creates . from the physical computer
a. Virtual space
b. Virtual computers
c. Virtual device
d. None

6. Which of the following operating does not implement multitasking truly?
a. Windows 98
b. Windows NT
c. Windows XP
d. MS DOS

User Perspective

1. A public key encryption system
(A) Allows only the correct receiver to decode the data
(B) Allows only one to decode the transmission.
(C) Allows only the correct sender to decode the data.
(D) Does not encode the data before transmitting it.
2. File record length
(A) Should always be fixed
(B) Should always be variable
(C) Depends upon the size of file
(D) Should be chosen to match the data characteristics.
3. Relocatable programs
(A) cannot be used with fixed partitions
(B) can be loaded almost anywhere in memory
(C) do not need a linker
(D) can be loaded only at one specific location
4. Virtual memory is
(A) simple to implement
(B) used in all major commercial operating systems
(C) less efficient in utilization of memory
(D) useful when fast I/O devices are not available
5. Action implementing instructions meaning are a actually carried out by
(A) Instruction fetch
(B) Instruction decode
(C) instruction execution
(D) Instruction program
6. A UNIX device driver is
(A) Structured into two halves called top half and bottom half
(B) Three equal partitions
(C) Unstructured
(D) None of the above
7. An operating system contains 3 user processes each requiring 2 units of resource R .The
minimum number of units of R such that no deadlocks will ever arise is
(A) 4
(B) 3
(C) 5
(D) 6
8. Which scheduling policy is most suitable for a time-shared operating system
(A) Shortest-job First
(B) Elevator
(C) Round-Robin
(D) First-Come-First-Serve
9. An assembler is
(A) programming language dependent.
(B) syntax dependant.
(C) machine dependant.
(D) data dependant
10. Program preemption is
(A) forced de allocation of the CPU from a program which is executing on the CPU.
(B) release of CPU by the program after completing its task.
(C) forced allotment of CPU by a program to itself.
(D) a program terminating itself due to detection of an error.



Unit II : Introduction to the Kernel

Architecture of Unix OS
1. In the Unix file system:
(a) Directories and ordinary files are arranged in a hierarchical tree structure
(b) Files can be accessed only by using its absolute path name
(c) A file cannot have many extensions
(d) A directory entry cannot contain a pointer to the files inode
(e) ./usr/passwd and /usr/passwd represent two different files.
2. What is not the major objective of operating systems?
(a) To act as a resource manager for multiple tasks running on the CPU, the memory and disk
resources
(b) To provide a programming interface to the user
(c) To act as an uniform abstract machine on top of a variety of different hardware platforms
(d) To act as a File server to client machines requiring such service
(e) To enable loading and execution of binary code with minimum intervention by the user.
3. A certain task is multithreaded in such a way that it is supported by two kernel threads where each
kernel thread is supporting more than one user thread. Which of the following statement isnot true about
this scenario?
(a) The task can utilize the combined power of more than one CPU, if CPUs are available
(b) If a user thread makes a blocking system call, the corresponding kernel thread blocks but the
task is still able to continue through the remaining kernel thread
(c) The task could have been programmed using a thread library such as POSIX threads or
Java threads
(d) If a user thread makes a blocking system call, the corresponding kernel thread blocks and
the task will also be blocked
(e) Kernel threads capability needs to be built into the operating system, and cannot be provided
by a system call library.
4. Demand paging and swapping are two widely used memory management techniques. Which of the
following statements is not true in this regard?
(a) Moving the whole user context of a process between the main memory and the virtual
memory is known as swapping
(b) Moving pages corresponding to the user context of a process between the main memory and
the virtual memory as and when required is known as demand paging
(c) Demand paging incurs a higher overhead than swapping
(d) If both demand paging and swapping are implemented by the memory management system,
the default mechanism resorted to is demand paging
(e) When the systems main memory space becomes comparatively smaller than the space
required to run its applications, swapping activity becomes more visible.
5. A common programming construct for implementing mutual exclusion which uses condition variables is
called
(a) Semaphore
(b) Deadlock
(c) Monitor
(d) Locking interrupts
(e) Threads.
6. Which of the following area is used to store the O.S programs in the main memory?
(a) User memory area
(b) Monitor memory area
(c) Heap area
(d) Stack area
(e) Data area.
7. In Unix which of the following system calls returns the meta data about a file?
(a) fstat
(b) mstat
(c) Metacall
(d) Sigabort
(e) fork.
8. Controlling the access of programs, processes or users to the resources defined by the system is
known as_______.
(a) Prevention
(b) Security
(c) Protection
(d) Access stop
(e) Access right.
9. The ability to execute an operation on an object is known as
(a) Access Right
(b) Access Control
(c) Domain Knowledge
(d) Control Right
(e) Protection.
10. The name of the file does not reveal any hint of the files physical storage location is called_____.
(a) Location independence
(b) Protection
(c) Location transparency
(d) File migration
(e) Inter-machine interface.

Kernel Data structure
1. Which of the following memory allocation scheme suffers from External fragmentation
(a) Segmentation
(b) Pure demand paging
(c) Swapping
(d) Paging
2. Information about a process is maintained in a
(a) Stack
(b) Translation Lookaside buffer
(c) Process Control Block
(d) Program Control Block
3. Which technique was introduced because a single job could not keep both the CPU and the I/O
device busy ?
(a) Time-sharing
(b) SPOOLING
(c) Preemptive scheduling
(d) Mutiprogramming
4. Which of the following is contained in Process Control Block (PCB)?
(a) Process Number
(b) List of open files
(c) Memory Limit
(d) All of the above
5. Super computers mostly employ?
(a) Real time operating system
(b) Multiprocessor OS
(c) Desktop OS
(d) None of the above
6. Let S & Q be two semaphores initialized to 1, where P0 and P1 processed the following statements
wait (S); wait (Q);---;signal(S); signal(Q) and wait (Q); wait (S);---;signal(Q); signal(S);
respectively. The above situation depicts?
(a) Semaphore
(b) Deadlock
(c) Signal
(d) Interrupt
7. What is the memory from 1K - 640K called ?
(a) Extended Memory
(b) Normal Memory
(c) Low Memory
(d) Conventional Memory
8. The process related to process control, file management, device management, information about
system and communication that is requested by any higher level language can be performed by?
(a) Editors
(b) Compilers
(c) System Call
(d) Caching
9. The problem of thrashing is effected scientifically by :
(a) Program structure
(b) Program size
(c) Primary storage size
(d) None of the above
10. Switching of the CPU to another process requires to save state of the old process state is called?
(a) Process Blocking
(b) Context switch
(c) Time sharing
(d) None of the above
11. A thread
(a) Is a lightweight process where the context switching is low
(b) Is a lightweight process where the context switching is high
(c) Is used to speed up paging
(d) None of the above
12. ______ is a high level abstraction from semaphore
(a) Shared Memory
(b) Message passing
(c) Monitor
(d) Mutual exclusion
13. A tree structured file directory system:
(a) Allows easy storage and retrieval of the file names
(b) Is a much debated unnecessary feature
(c) Is not essential when we have millions of files
(d) None of the above
14. The Bankers algorithm is used:
(a) To prevent deadlock in the operating system
(b) To detect deadlock in the operating system
(c) To rectify a deadlock state
(d) None of the above
15. Which directory implementation is used in most Operating System?
(a) Single level directory structure
(b) Two level directory structure
(c) Tree directory structure
(d) Acyclic directory structure

Potrebbero piacerti anche