100% found this document useful (1 vote)
109 views

Operating System Concept

This document contains a 72 question multiple choice test on operating system concepts. The test covers topics such as file permissions, file commands, vi editor commands, pipes and filters, processes and more. For each question there are 4 possible answer choices and the candidate has 2 hours to complete the test, which is out of a total of 100 marks.

Uploaded by

Ravi
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
109 views

Operating System Concept

This document contains a 72 question multiple choice test on operating system concepts. The test covers topics such as file permissions, file commands, vi editor commands, pipes and filters, processes and more. For each question there are 4 possible answer choices and the candidate has 2 hours to complete the test, which is out of a total of 100 marks.

Uploaded by

Ravi
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

February 2019-August 2019

Internal test
Module:
Operating System Concepts
Date: 29-04-2019
Total Marks: 100
Time: 2HRs

1) Which of the following is not a filter?


A. cat
B. grep
C. wc
D. sort

2) Which of the following commands is used to rename a file?


A. rename
B. remove
C. mv
D. ren

3) Which command will be used with vi editor to replace text from cursor to
right?
A. r
B. R
C. s
D. S
E. None of the above

4) Which of the following files contains information related to password aging?


A. Shadow
B. password
C. profile
D. All the three
5) Which command is used to list all the files with extension .1st?
A. ls -l *.lst
B. ls lst*
C. ls *.*
D. ls *[lst]

6) Which option is used with the chmod command recursively to all files and sub-
directories in a directory?
A. -1
B. -i
C. -x
D. -R

7) Which command is used to change directory to the file beginning with a 'p'?
A. cd p
B. cd p?
C. cd p*
D. cd [p]

8) Which commands is used to assign executable permission to all of the files


named "letter"?
A. chmod ugo+r letter
B. chmod ugo+rw letter
C. chmod u+x letter
D. chmod ugo+x letter

9) Which set option is used with vi editor to display line numbers on screen?
A. nm
B. nu
C. ic
D. li

10) Which command is used to print a file?


A. print
B. prn
C. pg
D. lp
10) Which command will be used with vi editor to replace single character under
cursor with any number of characters?
A. s
B. S
C. a
D. i

11) Which of the following features of Linux may be used for inter process
communication?

• Signals
• Pipes
• semaphore
• All of these

12) Which command is used to list out all the hidden files along with the other
files?
A. ls -l
B. ls -x
C. ls -F
D. ls -a

13) Which of the following commands is used to absolutely assign all permissions
to the owner, read and write permissions to the group and only executable
permission to the others of the file note?

A. chmod 761 note


B. chmod 671 note
C. chmod 167 note
D. chmod 4=rwx, g=rw note

14) The chmod ugo+rw note command can be represented in octal notation as
A. chmod 555 note
B. chmod 666 note
C. chmod 444 note
D. chmod 333 note

15) dev/null
• Is a file
• Has write permission for all
• Is the unix built-in dustbin
• All of these

16.) The command to count the number of files in the current directory by using
pipes, is

A. ls | wc
B. ls -l | ws -l
C. ls | wc -w
D. ls | ws -c

17) Which of the following commands is used to get directory one level up?

A. cd
B. cd ..
C. cd/
D. chdir

18) Which of the following commands is used to count the total number of lines,
words, and characters contained in a file.

A. count p
B. wc
C. wcount
D. countw
19) Which command is used to delete all files in the current directory as well as all
files and sub-directories in its subdirectories?

A. rm *
B. rm -r *
C. rm all
D. rm *.*

20. Which of the following commands is used to change the working directory?
A. cd
B. changedir
C. chdir
D. cdir

21) Which of the following commands is used to view your file 24 lines at a time?

A. pg
B. cat
C. lp
D. /p

22) The commonly used UNIX commands like date, ls, cat, etc. are stored in

A. /dev directory
B. /bin and /usr/bin directories
C. /tmp directory
D. /unix directory

23) Which of the following commands is used to summarize the disk usage?

A. chkdsk
B. fdisk
C. du
D. disk

24) Which command is used to sort the lines of data in a file in alphabetical
order?

A. sort
B. sh
C. st
D. sort -r

25) If a file has read and write permissions for the owner, then the octal
representation of the permissions will be

A. 1
B. 6
C. 5
D. 3

26) The seventh field of /etc/password is


A. password
B. login
C. shell
D. home

27) Which command is used to display the end of the file?

A. head - r
B. tail
C. eof
D. bof

28) Which command is used to create a directory?

A. crdir
B. md
C. mkdir
D. cr
29) Which command is used to display the device name of the terminal you are
using?

A. who
B. ls
C. tty
D. stty

30) The ls -l command tells


A. who the owner of the file is
B. the name of the group owner of the file
C. how large the file is and when the file was last modified.
D. All of the above

31) Which option will be used with disk free command to include the total
amount of disk space in the file system?
A. -t
B. -tt
C. -4
D. -i

32) Which command is used to set the three permissions for all the three
categories of users of a file?
A. chgrp
B. chown
C. chmod
D. chusr

33) Which of the following commands can be used to get information about
yourself?
A. who am i
B. i /4
C. pwd
D. which
34) Which of the following commands can be used to get information about all
users who are currently logged into the system?
A. which
B. who
C. who am i
D. 1 /u

35) Which of the following keys is used to overstrike a whole line?


A. R
B. v
C. C
D. u

36) Which command is used to locate all the .profile files in the system?
A. ls profile
B. find /-name profile -print
C. cd /.profile
D. l -u .profile

37) Which command is used to extract specific columns from the file ?
A. cat
B. grep
C. cut
D. paste

38) Which command is used with the vi editor to save file and exit the editing
mode ?
A. :wq
B. q!
C. w
D. :x

39) Which command is used to change the owenership of a file?


A. changeown
B. Chown
C. chgrp
D. chmod

40) Which of the following option is used to enter text in vi editor?


• n
• i
• $
• j
41) The Commands used to compare the files is known as ?
A. comp
B. du
C. cmp
D. ccp
E.
42) Which of the following command is used with vi editor to delete a single
character ?
A. z
B. y
C. a
D. x
43) Which command is used with vi editor to move the cursor one row up ?
A. i
B. j
C. h
D. k

44) The File that contains a set of instructions which are performed when a user
logs in, is

A. .exrc
B. .profile
C. .autoexec
D. autoexec.bat

45) Which of the following command is used to count just the number of lines
contained in a file?

A. wc -l
B. wc -c
C. wc -w
D. wc -r

46. Which of the following command is used to go to home directory?

A. cd..
B. cd/
C. cd
D. cd HOME.

47) Which command is used to move all files to the bin sub-directory of the
parent directory?
A. mv *.* /bin/
B. mv * /bin/*
C. mv * ../bin
D. mv * ../bin *.*

48) Which command is used to save the standard output in a file, as well as
display it on the terminal?

A. more
B. cat
C. grep
D. tee

49) The command that can be used to restrict incoming messages to a user is

A. mesg
B. grep
C. halt
D. sleep

50) Which of the following commands is used to copy directory structures in and
out
A. cp
B. cpio
C. cp - p
D. copy

51) Which of following commands is used for an automatic reminder service?

A. write
B. mesg
C. calendar
D. mail

52) Which command allows you to view your file 24 lines at a time?

A. more
B. pg
C. cat
D. lp
53) Which command is used to bring the background process to foreground?
• Bg
• Fg
• Background
• Foreground

54) Users primary group id is listed in which file at the time of creation of user
• /etc/passwd
• /etc/groups
• /etc/login
• /etc/profile

55) The command used to remove the directory is;

A. rmdir
B. rd
C. remove
D. rdir
56) Which of the following commands is used to remove files?

• erase
• delete
• rm
• dm

57) In UNIX which of the following command is used to set the the task priority?
• init
• nice
• kill
• PS

58 ) Which of the following feature of UNIX may be used for inter-process


communication?
• Signals
• Pipes
• Semaphores
• All of these

59 ) The advantage of binary files over text files is


• It is compact
• It can be accessed faster
• They are more reliable
• All of these

60 ) The default permission bits of a file when it is created for the first time is
controlled by
• chmod value
• fmask value
• umask value
• None of the above

61) The encrypted password of a user is stored in


• /etc/shadow
• /etc/enpasswd
• /etc/.passwd
• /etc/passwd

62) Which is the only partition mounted on single user mode?


• Boot
• User
• Root
• tmp

63) The (.dot) shell command


• can take command line argument
• will fork a child shell to execute the named shell script
• can be used to change the environment of the current shell
• All of the above

64) If 7 terminals are currently logged on, then the command


date ; who|wc -l displays
• Date followed by 7
• Date followed by 8
• Date followed by 1
• An error message

65) A user can change the default shell by which of the following command?
• Chmod
• Chsh
• Rmsh
• tchsh

66) Which of the following is not a system call?


• chmod
• open
• lseek
• getc

67) The PID of the kernel process is


• undefined
• 0
• 1
• 3

68) Which command is used to sort the lines of data in a file in reverse order
• sort
• sh
• st
• sort -r

69) Which command is used to display the top of the file?


a) cat
b) head
c) more
d) grep

70) Which of the following commands is used to update access and modification
times of a file?
a) grep
b) wc
c) touch
d) cat

71) Which of the following commands is used to obtain a list of all files by
modification time?
a) ls -1
b) ls -t
c) ls -i
d) ls –r

72) Which of the following files contains information related to password aging?
a) shadow
b) password
c) profile
d) All the three

73) Which command will be used with vi editor to replace text from cursor to
right?
a) r
b) R
c) s
d) S

74) Which command is used with vi editor to search a pattern in the forward
direction?
a) /
b) ?
c) //
d) ??

75) Which of the following commands is used to assign executable permission to


the owner of the file named "note"?
a) chmod g+x note
b) chmod u+w note
c) chmod u+x note
d) chmod ugo+x note

76) Which of the following best explains a process?


a) It is a program
b) It is a program in execution
c) It is an instance of a program in execution
d) It is a program that uses system calls

77)Which module gives control of the CPU to the processes selected by the short
term scheduler?
a) Scheduler
b) Dispatcher
c) Loader
d) Controller

78) Number of processor (the amount of work) that completes its execution per
unit time is called
a) Throughput
b) Turnaround time
c) Waiting Time
d) Response time

79) A process may include -------------------, which is memory that is dynamically


allocated during process runtime.
a) Stack
b) Heap
c) Virtual memory
d) Register

80) A critical section is a program segment


a) which should run in a certain specified amount of time.
b) which avoids deadlocks.
c) where shared resources are accessed.
d) which must be enclosed by a pair of semaphore operations, P and V.

81) An operating system contains 3 user processes each requiring 2 units of


resource R .The minimum number of units of R such that no deadlocks will ever
arise is
a) 4
b) 3
c) 5
d) 6.

82) ___________ is a technique of temporarily removing inactive programs from


the
memory of computer system
a) Swapping
b) Spooling
c) Semaphore
d) Scheduler

83)___________ is a technique of improving the priority of process waiting in


Queue
for CPU allocation
a) Starvation
b) Ageing
c) Revocation
d) Relocation

84) CPU burst time indicates the time, the process needs the CPU. The following
are the set of processes with their respective CPU burst time (in milliseconds).
Processes CPU-burst time
P1 10
P2 5
P3 5
What is the average waiting time if the process arrived in the order P2, P3 & P1
a) 8
b) 5
c) 3
d) 0

86) We have the following reference string


1, 2, 3, 4, 1, 2, 5, 1, 2, 3, 4, 5
Compute the no. of page faults using FIFO page replacement algorithm with 3
frames.
a) 9
b) 10
c) 11
d) 8

87) If the disk head is located initially initiated at 32, find the number of disk
moves required with FCFS if the disk queue of I/O blocks requests are:
98, 37,14,124, 65,67
a) 239
b) 310
c) 321
d) 325

88) A thread is a light weight process. In the above statement , weight refers to
a) time
b) no of resources
c) speed
d) all of the above
89) The process of starting of a computer is known as
• Boot loading
• Boot recording
• Boot strapping
• Booting

90) Which of the following is a necessary condition of deadlock?


a) Mutual exclusion
b) No pre-emption
c) Hold and wait
d) All of the above

91) Consider the following Snapshot at time T0:


Allocation Max Available
A B CD ABCD A B CD
P0 0 0 1 2 0012 1520
P1 1 0 0 0 1750
P2 1 3 5 4 2356
P3 0 6 3 2 0652
P4 0 0 1 4 0656
Which of the following sequence is in safe state using Banker’s algorithm?
a) P1, P3, P4, P2, P0
b) P0, P2, P1, P4, P3
c) P0, P2, P4, P1,P3
d) P4, P3, P1, P2, P0

92) The function of a kernel in an operating system is to?


a) Interpret the JCL commands
b) Interact with the hardware device
c) Interact with the user
d) All of above

93) A bootstrap is?


a) Hardware of computer used to check memory
b) A program to start up a computer
c) Memory device
d) An Assembler
94) What is thrashing?
a) A high paging activity is called thrashing
b) A high executing activity is called thrashing
c) An extremely long process is called thrashing
d) An extremely long virtual memory is called thrashing

95) A static partitioned memory management system has a total of six partitions.
If one is allocated to the operating system, this will allow a total of
a) five user jobs
b) six user jobs
c) thirty-two user jobs
d) thirty-six user jobs

96) Given memory partitions of 100K, 500K, 200K, 300K and 600K (in order) and
processes of 212K, 417K, 112K, and 426K (in order), using the first-fit algorithm in
which partition would the process requiring 426K be placed?
a) 100K
b) 500K
c) 600K
d) 300K

• Virtual memory is ?

• Extremely large main memory


• Extremely large secondary memory
• An illusion of an extremely large memory
• A type of memory used in super computers

• Page fault occurs when ?

• The page in corrupted by application software


• The page is in main memory
• The page is not in main memory
• One tries to divide number by 0

• Concurrent processed are processed that?


• Do not overlap in time
• Overlap in time
• Are executed by processor at the same time
• None of Above

100) Belady’s anomaly is noticed in which of the page replacement policy that
sometimes leads to more page faults when the size of the frame is increased
is ?

• FIFO
• LRU
• no such policy exists
• None of Above

You might also like