MCQS Os
MCQS Os
2. To access the services of operating system, the interface is provided by the ___________
a) System calls
b) API
c) Library
d) Assembly instructions
4. Which one of the following error will be handle by the operating system?
a) power failure
b) lack of paper in printer
c) connection failure in the network
d) all of the mentioned
7. If a process fails, most operating system write the error information to a ______
a) log file
b) another running process
c) new file
d) none of the mentioned
8. Which facility dynamically adds probes to a running system, both in user processes and in the
kernel?
a) DTrace
b) DLocate
c) DMap
d) DAdd
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Processes”.
1. The systems which allow only one process execution at a time, are called __________
a) uniprogramming systems
b) uniprocessing systems
c) unitasking systems
d) none of the mentioned
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Process
Control Block”.
1. A Process Control Block(PCB) does not contain which of the following?
a) Code
b) Stack
c) Bootstrap program
d) Data
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Process
Scheduling Queues”.
1. Which of the following do not belong to queues for processes?
a) Job Queue
b) PCB queue
c) Device Queue
d) Ready Queue
5. If all processes I/O bound, the ready queue will almost always be ______ and the Short term
Scheduler will have a ______ to do.
a) full, little
b) full, lot
c) empty, little
d) empty, lot
8. The primary distinction between the short term scheduler and the long term scheduler is
__________
a) The length of their queues
b) The type of processes they schedule
c) The frequency of their execution
d) None of the mentioned
9. The only state transition that is initiated by the user process itself is __________
a) block
b) wakeup
c) dispatch
d) none of the mentioned
10. In a time-sharing operating system, when the time slot given to a process is completed, the
process goes from the running state to the __________
a) Blocked state
b) Ready state
c) Suspended state
d) Terminated state
12. Suppose that a process is in “Blocked” state waiting for some I/O service. When the service
is completed, it goes to the __________
a) Running state
b) Ready state
c) Suspended state
d) Terminated state
13. The context of a process in the PCB of a process does not contain __________
a) the value of the CPU registers
b) the process state
c) memory-management information
d) context switch time
14. Which of the following need not necessarily be saved on a context switch between
processes?
a) General purpose registers
b) Translation lookaside buffer
c) Program counter
d) All of the mentioned
3. Which of the following two operations are provided by the IPC facility?
a) write & delete message
b) delete & receive message
c) send & delete message
d) receive & send message
11. Bounded capacity and Unbounded capacity queues are referred to as __________
a) Programmed buffering
b) Automatic buffering
c) User defined buffering
d) No buffering
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “CPU
Scheduling”.
1. Which module gives control of the CPU to the process selected by the short-term scheduler?
a) dispatcher
b) interrupt
c) scheduler
d) none of the mentioned
2. The processes that are residing in main memory and are ready and waiting to execute are kept
on a list called _____________
a) job queue
b) ready queue
c) execution queue
d) process queue
3. The interval from the time of submission of a process to the time of completion is termed as
____________
a) waiting time
b) turnaround time
c) response time
d) throughput
4. Which scheduling algorithm allocates the CPU first to the process that requests the CPU first?
a) first-come, first-served scheduling
b) shortest job scheduling
c) priority scheduling
d) none of the mentioned
6. In priority scheduling algorithm, when a process arrives at the ready queue, its priority is
compared with the priority of ____________
a) all process
b) currently running process
c) parent process
d) init process
7. Which algorithm is defined in Time quantum?
a) shortest job scheduling algorithm
b) round robin scheduling algorithm
c) priority scheduling algorithm
d) multilevel queue scheduling algorithm
10. Which one of the following can not be scheduled by the kernel?
a) kernel level thread
b) user level thread
c) process
d) none of the mentioned
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “CPU
Scheduling Benefits”.
1. CPU scheduling is the basis of ___________
a) multiprocessor systems
b) multiprogramming operating systems
c) larger memory sized systems
d) none of the mentioned
5. A process is selected from the ______ queue by the ________ scheduler, to be executed.
a) blocked, short term
b) wait, long term
c) ready, short term
d) ready, long term
7. The switching of the CPU from one process or thread to another is called ____________
a) process switch
b) task switch
c) context switch
d) all of the mentioned
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “CPU
Scheduling Algorithms-1”.
1. Round robin scheduling falls under the category of ____________
a) Non-preemptive scheduling
b) Preemptive scheduling
c) All of the mentioned
d) None of the mentioned
3. The portion of the process scheduler in an operating system that dispatches processes is
concerned with ____________
a) assigning ready processes to CPU
b) assigning ready processes to waiting queue
c) assigning running processes to blocked queue
d) all of the mentioned
4. Complex scheduling algorithms ____________
a) are very appropriate for very large computers
b) use minimal resources
c) use many resources
d) all of the mentioned
6. The strategy of making processes that are logically runnable to be temporarily suspended is
called ____________
a) Non preemptive scheduling
b) Preemptive scheduling
c) Shortest job first
d) First come First served
7. What is Scheduling?
a) allowing a job to use the processor
b) making proper use of processor
c) all of the mentioned
d) none of the mentioned
8. There are 10 different processes running on a workstation. Idle processes are waiting for an
input event in the input queue. Busy processes are scheduled with the Round-Robin time sharing
method. Which out of the following quantum times is the best value for small response times, if
the processes have a short runtime, e.g. less than 10ms?
a) tQ = 15ms
b) tQ = 40ms
c) tQ = 45ms
d) tQ = 50ms
9. Orders are processed in the sequence they arrive if _______ rule sequences the jobs.
a) earliest due date
b) slack time remaining
c) first come, first served
d) critical ratio
10. Which of the following algorithms tends to minimize the process flow time?
a) First come First served
b) Shortest Job First
c) Earliest Deadline First
d) Longest Job First
11. Under multiprogramming, turnaround time for short jobs is usually ________ and that for
long jobs is slightly ___________
a) Lengthened; Shortened
b) Shortened; Lengthened
c) Shortened; Shortened
d) Shortened; Unchanged
4. Consider the following set of processes, the length of the CPU burst time given in
milliseconds.
Process Burst time
P1 6
P2 8
P3 7
P4 3
Assuming the above process being scheduled with the SJF scheduling algorithm.
a) The waiting time for process P1 is 3ms
b) The waiting time for process P1 is 0ms
c) The waiting time for process P1 is 16ms
d) The waiting time for process P1 is 9ms
11. Which of the following scheduling algorithms gives minimum average waiting time?
a) FCFS
b) SJF
c) Round – robin
d) Priority
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Deadlock”.
1. What is a reusable resource?
a) that can be used by one process at a time and is not depleted by that use
b) that can be used by more than one process at a time
c) that can be shared between various threads
d) none of the mentioned
9. Which one of the following is a visual ( mathematical ) way to determine the deadlock
occurrence?
a) resource allocation graph
b) starvation graph
c) inversion graph
d) none of the mentioned
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Deadlock
Prevention”.
1. The number of resources requested by a process ____________
a) must always be less than the total number of resources available in the system
b) must always be equal to the total number of resources available in the system
c) must not exceed the total number of resources available in the system
d) must exceed the total number of resources available in the system
10. To ensure that the hold and wait condition never occurs in the system, it must be ensured that
____________
a) whenever a resource is requested by a process, it is not holding any other resources
b) each process must request and be allocated all its resources before it begins its execution
c) a process can request resources only when it has none
d) all of the mentioned
11. The disadvantage of a process being allocated all its resources before beginning its execution
is ____________
a) Low CPU utilization
b) Low resource utilization
c) Very high resource utilization
d) None of the mentioned
12. To ensure no preemption, if a process is holding some resources and requests another
resource that cannot be immediately allocated to it ____________
a) then the process waits for the resources be allocated to it
b) the process keeps sending requests until the resource is allocated to it
c) the process resumes execution without the resource being allocated to it
d) then all resources currently being held are preempted
13. One way to ensure that the circular wait condition never holds is to ____________
a) impose a total ordering of all resource types and to determine whether one precedes another in
the ordering
b) to never let a process acquire resources that are held by other processes
c) to let a process wait for only one resource at a time
d) all of the mentioned
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Deadlock
Avoidance”.
1. Each request requires that the system consider the _____________ to decide whether the
current request can be satisfied or must wait to avoid a future possible deadlock.
a) resources currently available
b) processes that have previously been in the system
c) resources currently allocated to each process
d) future requests and releases of each process
2. Given a priori information about the ________ number of resources of each type that maybe
requested for each process, it is possible to construct an algorithm that ensures that the system
will never enter a deadlock state.
a) minimum
b) average
c) maximum
d) approximate
7. A system has 12 magnetic tape drives and 3 processes : P0, P1, and P2. Process P0 requires 10
tape drives, P1 requires 4 and P2 requires 9 tape drives.
Process
P0
P1
P2
Maximum needs (process-wise: P0 through P2 top to bottom)
10
4
9
Currently allocated (process-wise)
5
2
2
Which of the following sequence is a safe sequence?
a) P0, P1, P2
b) P1, P2, P0
c) P2, P0, P1
d) P1, P0, P2
9. The resource allocation graph is not applicable to a resource allocation system ____________
a) with multiple instances of each resource type
b) with a single instance of each resource type
c) single & multiple instances of each resource type
d) none of the mentioned
10. The Banker’s algorithm is _____________ than the resource allocation graph algorithm.
a) less efficient
b) more efficient
c) equal
d) none of the mentioned
11. The data structures available in the Banker’s algorithm are ____________
a) Available
b) Need
c) Allocation
d) All of the mentioned
13. A system with 5 processes P0 through P4 and three resource types A, B, C have A with 10
instances, B with 5 instances, and C with 7 instances. At time t0, the following snapshot has been
taken:
Process
P0
P1
P2
P3
P4
Allocation (process-wise : P0 through P4 top TO bottom)
A B C
0 1 0
2 0 0
3 0 2
2 1 1
0 0 2
MAX (process-wise: P0 through P4 top TO bottom)
A B C
7 5 3
3 2 2
9 0 2
2 2 2
4 3 3
Available
A B C
3 3 2
The sequence <P1, P3, P4, P2, P0> leads the system to ____________
a) an unsafe state
b) a safe state
c) a protected state
d) a deadlock
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Deadlock
Detection”.
1. The wait-for graph is a deadlock detection algorithm that is applicable when ____________
a) all resources have a single instance
b) all resources have multiple instances
c) all resources have a single 7 multiple instances
d) all of the mentioned
2. An edge from process Pi to Pj in a wait for graph indicates that ____________
a) Pi is waiting for Pj to release a resource that Pi needs
b) Pj is waiting for Pi to release a resource that Pj needs
c) Pi is waiting for Pj to leave the system
d) Pj is waiting for Pi to leave the system
5. What is the disadvantage of invoking the detection algorithm for every request?
a) overhead of the detection algorithm due to consumption of memory
b) excessive time consumed in the request to be allocated memory
c) considerable overhead in computation time
d) all of the mentioned
6. A deadlock eventually cripples system throughput and will cause the CPU utilization to
______
a) increase
b) drop
c) stay still
d) none of the mentioned
7. Every time a request for allocation cannot be granted immediately, the detection algorithm is
invoked. This will help identify ____________
a) the set of processes that have been deadlocked
b) the set of processes in the deadlock queue
c) the specific process that caused the deadlock
d) all of the mentioned
8. A computer system has 6 tape drives, with ‘n’ processes competing for them. Each process
may need 3 tape drives. The maximum value of ‘n’ for which the system is guaranteed to be
deadlock free is?
a) 2
b) 3
c) 4
d) 1
9. A system has 3 processes sharing 4 resources. If each process needs a maximum of 2 units
then, deadlock ____________
a) can never occur
b) may occur
c) has to occur
d) none of the mentioned
10. ‘m’ processes share ‘n’ resources of the same type. The maximum need of each process
doesn’t exceed ‘n’ and the sum of all their maximum needs is always less than m+n. In this
setup, deadlock ____________
a) can never occur
b) may occur
c) has to occur
d) none of the mentioned
Operating System Questions and Answers for Experienced people focuses on “Deadlock
Recovery” and will also be useful for interview preparations for experienced people.
1. A deadlock can be broken by ____________
a) abort one or more processes to break the circular wait
b) abort all the process in the system
c) preempt all resources from all processes
d) none of the mentioned
2. The two ways of aborting processes and eliminating deadlocks are ____________
a) Abort all deadlocked processes
b) Abort all processes
c) Abort one process at a time until the deadlock cycle is eliminated
d) All of the mentioned
6. If we preempt a resource from a process, the process cannot continue with its normal
execution and it must be ____________
a) aborted
b) rolled back
c) terminated
d) queued
7. To _______ to a safe state, the system needs to keep more information about the states of
processes.
a) abort the process
b) roll back the process
c) queue the process
d) none of the mentioned
8. If the resources are always preempted from the same process __________ can occur.
a) deadlock
b) system crash
c) aging
d) starvation
9. What is the solution to starvation?
a) the number of rollbacks must be included in the cost factor
b) the number of resources must be included in resource preemption
c) resource preemption be done instead
d) all of the mentioned
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Swapping
Processes – 1”.
1. What is Address Binding?
a) going to an address in memory
b) locating an address with the help of another address
c) binding two addresses together to form a new address in a different memory space
d) a mapping from one address space to another
3. If the process can be moved during its execution from one memory segment to another, then
binding must be ____________
a) delayed until run time
b) preponed to compile time
c) preponed to load time
d) none of the mentioned
9. If a higher priority process arrives and wants service, the memory manager can swap out the
lower priority process to execute the higher priority process. When the higher priority process
finishes, the lower priority process is swapped back in and continues execution. This variant of
swapping is sometimes called?
a) priority swapping
b) pull out, push in
c) roll out, roll in
d) none of the mentioned
10. If binding is done at assembly or load time, then the process _____ be moved to different
locations after being swapped out and in again.
a) can
b) must
c) can never
d) may
2. The address loaded into the memory address register of the memory is referred to as
____________
a) Physical address
b) Logical address
c) Neither physical nor logical
d) None of the mentioned
3. The run time mapping from virtual to physical addresses is done by a hardware device called
the ____________
a) Virtual to physical mapper
b) Memory management unit
c) Memory mapping unit
d) None of the mentioned
6. If execution time binding is being used, then a process ______ be swapped to a different
memory space.
a) has to be
b) can never
c) must
d) may
10. The _________ time in a swap out of a running process and swap in of a new process into
the memory is very high.
a) context – switch
b) waiting
c) execution
d) all of the mentioned
12. Swapping _______ be done when a process has pending I/O, or has to execute I/O operations
only into operating system buffers.
a) must
b) can
c) must never
d) maybe
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Memory
Management”.
1. CPU fetches the instruction from memory according to the value of ____________
a) program counter
b) status register
c) instruction register
d) program status word
5. Memory management technique in which system stores and retrieves data from secondary
storage for use in main memory is called?
a) fragmentation
b) paging
c) mapping
d) none of the mentioned
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Memory
Management – Memory Allocation – 1”.
1. The main memory accommodates ____________
a) operating system
b) cpu
c) user processes
d) all of the mentioned
5. With relocation and limit registers, each logical address must be _______ the limit register.
a) less than
b) equal to
c) greater than
d) none of the mentioned
6. The operating system and the other processes are protected from being modified by an already
running process because ____________
a) they are in different memory spaces
b) they are in different logical addresses
c) they have a protection algorithm
d) every address generated by the CPU is being checked against the relocation and limit registers
9. When memory is divided into several fixed sized partitions, each partition may contain
________
a) exactly one process
b) at least one process
c) multiple processes at once
d) none of the mentioned
11. The first fit, best fit and worst fit are strategies to select a ______
a) process from a queue to put in memory
b) processor to run the next process
c) free hole from a set of available holes
d) all of the mentioned
5. The disadvantage of moving all process to one end of memory and all holes to the other
direction, producing one large hole of available memory is ____________
a) the cost incurred
b) the memory used
c) the CPU used
d) all of the mentioned
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Paging – 1”.
1. Physical memory is broken into fixed-sized blocks called ________
a) frames
b) pages
c) backing store
d) none of the mentioned
2. Logical memory is broken into blocks of the same size called _________
a) frames
b) pages
c) backing store
d) none of the mentioned
3. Every address generated by the CPU is divided into two parts. They are ____________
a) frame bit & page number
b) page number & page offset
c) page offset & frame bit
d) frame offset & page offset
4. The __________ is used as an index into the page table.
a) frame bit
b) page number
c) page offset
d) frame offset
5. The _____ table contains the base address of each page in physical memory.
a) process
b) memory
c) page
d) frame
7. If the size of logical address space is 2 to the power of m, and a page size is 2 to the power of
n addressing units, then the high order _____ bits of a logical address designate the page number,
and the ____ low order bits designate the page offset.
a) m, n
b) n, m
c) m – n, m
d) m – n, n
13. For larger page tables, they are kept in main memory and a __________ points to the page
table.
a) page table base register
b) page table base pointer
c) page table register pointer
d) page table base
4. The percentage of times a page number is found in the TLB is known as ____________
a) miss ratio
b) hit ratio
c) miss percent
d) none of the mentioned
6. When the valid – invalid bit is set to valid, it means that the associated page ____________
a) is in the TLB
b) has data in it
c) is in the process’s logical address space
d) is the system’s physical address space
8. When there is a large logical address space, the best way of paging would be ____________
a) not to page
b) a two level paging algorithm
c) the page table itself
d) all of the mentioned
9. In a paged memory, the page hit ratio is 0.35. The required to access a page in secondary
memory is equal to 100 ns. The time required to access a page in primary memory is 10 ns. The
average time required to access a page is?
a) 3.0 ns
b) 68.0 ns
c) 68.5 ns
d) 78.5 ns
10. To obtain better memory utilization, dynamic loading is used. With dynamic loading, a
routine is not loaded until it is called. For implementing dynamic loading ____________
a) special support from hardware is required
b) special support from operating system is essential
c) special support from both hardware and operating system is essential
d) user programs can implement dynamic loading without any special support from hardware or
operating system
11. In paged memory systems, if the page size is increased, then the internal fragmentation
generally ____________
a) becomes less
b) becomes more
c) remains constant
d) none of the mentioned
2. In paging the user provides only ________ which is partitioned by the hardware into
________ and ______
a) one address, page number, offset
b) one offset, page number, address
c) page number, offset, address
d) none of the mentioned
8. When the entries in the segment tables of two different processes point to the same physical
location ____________
a) the segments are invalid
b) the processes get blocked
c) segments are shared
d) all of the mentioned
9. The protection bit is 0/1 based on ____________
a) write only
b) read only
c) read – write
d) none of the mentioned
10. If there are 32 segments, each of size 1Kb, then the logical address should have
____________
a) 13 bits
b) 14 bits
c) 15 bits
d) 16 bits
11. Consider a computer with 8 Mbytes of main memory and a 128K cache. The cache block
size is 4 K. It uses a direct mapping scheme for cache management. How many different main
memory blocks can map onto a given physical cache block?
a) 2048
b) 256
c) 64
d) 8
12. A multilevel page table is preferred in comparison to a single level page table for translating
virtual address to physical address because ____________
a) it reduces the memory access time to read or write a memory location
b) it helps to reduce the size of page table needed to implement the virtual address space of a
process
c) it is required by the translation lookaside buffer
d) it helps to reduce the number of page faults in page replacement algorithms
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Disk
Scheduling – 1”.
1. In _______ information is recorded magnetically on platters.
a) magnetic disks
b) electrical disks
c) assemblies
d) cylinders
2. The heads of the magnetic disk are attached to a _____ that moves all the heads as a unit.
a) spindle
b) disk arm
c) track
d) none of the mentioned
3. The set of tracks that are at one arm position make up a ___________
a) magnetic disks
b) electrical disks
c) assemblies
d) cylinders
4. The time taken to move the disk arm to the desired cylinder is called the ____________
a) positioning time
b) random access time
c) seek time
d) rotational latency
5. The time taken for the desired sector to rotate to the disk head is called ____________
a) positioning time
b) random access time
c) seek time
d) rotational latency
9. ______ controller sends the command placed into it, via messages to the _____ controller.
a) host, host
b) disk, disk
c) host, disk
d) disk, host
10. What is the disk bandwidth?
a) the total number of bytes transferred
b) total time between the first request for service and the completion on the last transfer
c) the total number of bytes transferred divided by the total time between the first request for
service and the completion on the last transfer
d) none of the mentioned
2. If a process needs I/O to or from a disk, and if the drive or controller is busy then
____________
a) the request will be placed in the queue of pending requests for that drive
b) the request will not be processed and will be ignored completely
c) the request will be not be placed
d) none of the mentioned
6. Magnetic tape drives can write data at a speed ________ disk drives.
a) much lesser than
b) comparable to
c) much faster than
d) none of the mentioned
7. On media that use constant linear velocity (CLV), the _____________ is uniform.
a) density of bits on the disk
b) density of bits per sector
c) the density of bits per track
d) none of the mentioned
9. In the ______ algorithm, the disk arm starts at one end of the disk and moves toward the other
end, servicing requests till the other end of the disk. At the other end, the direction is reversed
and servicing continues.
a) LOOK
b) SCAN
c) C-SCAN
d) C-LOOK
10. In the _______ algorithm, the disk head moves from one end to the other, servicing requests
along the way. When the head reaches the other end, it immediately returns to the beginning of
the disk without servicing any requests on the return trip.
a) LOOK
b) SCAN
c) C-SCAN
d) C-LOOK
11. In the ______ algorithm, the disk arm goes as far as the final request in each direction, then
reverses direction immediately without going to the end of the disk.
a) LOOK
b) SCAN
c) C-SCAN
d) C-LOOK
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Disk
Management”.
1. The process of dividing a disk into sectors that the disk controller can read and write, before a
disk can store data is known as ____________
a) partitioning
b) swap space creation
c) low-level formatting
d) none of the mentioned
3. The header and trailer of a sector contain information used by the disk controller such as
_________ and _________
a) main section & disk identifier
b) error correcting codes (ECC) & sector number
c) sector number & main section
d) disk identifier & sector number
4. The two steps the operating system takes to use a disk to hold its files are _______ and
________
a) partitioning & logical formatting
b) swap space creation & caching
c) caching & logical formatting
d) logical formatting & swap space creation
5. The _______ program initializes all aspects of the system, from CPU registers to device
controllers and the contents of main memory, and then starts the operating system.
a) main
b) bootloader
c) bootstrap
d) rom
10. The scheme used in the above question is known as _______ or ________
a) sector sparing & forwarding
b) forwarding & sector utilization
c) backwarding & forwarding
d) sector utilization & backwarding
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Swap Space
Management”.
1. Virtual memory uses disk space as an extension of _________
a) secondary storage
b) main memory
c) tertiary storage
d) none of the mentioned
2. Using swap space significantly _________ system performance.
a) increases
b) decreases
c) maintains
d) does not affect
5. If the swap space is simply a large file, within the file system, ____________ used to create it,
name it and allocate its space.
a) special routines must be
b) normal file system routines can be
c) normal file system routines cannot be
d) swap space storage manager is
6. For swap space created in a separate disk partition where no file system or directory structure
is placed, _____________ used to allocate and deallocate the blocks.
a) special routines must be
b) normal file system routines can be
c) normal file system routines cannot be
d) swap space storage manager is
7. When a fixed amount of swap space is created during disk partitioning, more swap space can
be added only by?
I) repartitioning of the disk
II) adding another swap space elsewhere
a) only I
b) only II
c) both I and II
d) neither I nor II
8. In UNIX, two per process ________ are used by the kernel to track swap space use.
a) process tables
b) swap maps
c) memory maps
d) partition maps
9. It is __________ to reread a page from the file system than to write it to swap space and then
to reread it from there.
a) useless
b) less efficient
c) more efficient
d) none of the mentioned
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “RAID
Structure – 1”.
1. RAID level 3 supports a lower number of I/Os per second, because _______________
a) Every disk has to participate in every I/O request
b) Only one disk participates per I/O request
c) I/O cycle consumes a lot of CPU time
d) All of the mentioned
2. RAID level _____ is also known as block interleaved parity organisation and uses block level
striping and keeps a parity block on a separate disk.
a) 1
b) 2
c) 3
d) 4
3. A performance problem with _________ is the expense of computing and writing parity.
a) non-parity based RAID levels
b) parity based RAID levels
c) all RAID levels
d) none of the mentioned
8. RAID level ____ spreads parity and data among all N+1 disks rather than storing data in N
disks and parity in 1.
a) 3
b) 4
c) 5
d) 6
9. The potential overuse of a single parity disk is avoided in RAID level _______
a) 3
b) 4
c) 5
d) all of the mentioned
10. RAID level 0+1 is used because, RAID level 0 provides ______ whereas RAID level 1
provides ________
a) performance, redundancy
b) performance, reliability
c) redundancy, performance
d) none of the mentioned
11. If a disk fails in RAID level ___________ rebuilding lost data is easiest.
a) 1
b) 2
c) 3
d) 4
12. Where performance and reliability are both important, RAID level ____ is used.
a) 0
b) 1
c) 2
d) 0+1
Advanced Operating System Questions and Answers focuses on “RAID Structure – 2”.
1. A large number of disks in a system improves the rate at which data can be read or written if
____________
a) the disks are operated on sequentially
b) the disks are operated on selectively
c) the disks are operated in parallel
d) all of the mentioned
2. RAID stands for ____________
a) Redundant Allocation of Inexpensive Disks
b) Redundant Array of Important Disks
c) Redundant Allocation of Independent Disks
d) Redundant Array of Independent Disks
3. If the mean time to failure of a single disk is 100,000 hours, then the mean time to failure of
some disk in an array of 100 disks will be ____________
a) 100 hours
b) 10 days
c) 10 hours
d) 1000 hours
7. RAID level ________ refers to disk arrays with striping at the level of blocks, but without any
redundancy.
a) 0
b) 1
c) 2
d) 3
11. RAID level ______ is also known as memory style error correcting code(ECC) organization.
a) 1
b) 2
c) 3
d) 4
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Tertiary
Storage”.
1. Tertiary storage is built with ____________
a) a lot of money
b) unremovable media
c) removable media
d) secondary storage
phase change disk is coated with a material that can freeze into either _______ or ________
state.
a) crystalline, solid
b) ice, amorphous
c) crystalline, liquid
d) crystalline, amorphous
11. The surface area of tape is ________ the surface area of a disk.
a) much lesser than
b) much larger than
c) equal to
d) none of the mentioned
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Protection –
Access Matrix”.
1. In domain structure what is Access-right equal to?
a) Access-right = object-name, rights-set
b) Access-right = read-name, write-set
c) Access-right = read-name, execute-set
d) Access-right = object-name, execute-set
3. What is Domain?
a) Domain = Set of all objects
b) It is a collection of protection policies
c) Domain= set of access-rights
d) None of the mentioned
5. What are the three additional operations to change the contents of the access-matrix?
a) copy
b) Owner
c) control
d) all of the mentioned
8. For a domain _______ is a list of objects together with the operation allowed on these objects.
a) capability list
b) access list
c) both capability and access list
d) none of the mentioned
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Security”.
1. When an attempt is to make a machine or network resource unavailable to its intended users,
the attack is called _____________
a) denial-of-service attack
b) slow read attack
c) spoofed attack
d) starvation attack
3. The internal code of any software that will set of a malicious function when specified
conditions are met, is called _____________
a) logic bomb
b) trap door
c) code stacker
d) none of the mentioned
5. Which one of the following is a process that uses the spawn mechanism to revage the system
performance?
a) worm
b) trojan
c) threat
d) virus
7. Which one of the following is not an attack, but a search for vulnerabilities to attack?
a) denial of service
b) port scanning
c) memory access violation
d) dumpster diving
Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Protection –
Memory Protection”.
1. What is true regarding ‘Fence’?
a) Its a method to confine users to one side of a boundary
b) It can protect Operating system from one user
c) It cannot protect users from each other
d) All of the mentioned
10. What is best solution to have effect of unbounded number if base/bound registers?
a) Tagged architecture
b) Segmentation
c) Fence method
d) None of the mentioned
12. What is the correct way the segmentation program address is stored?
a) name, offset
b) start, stop
c) access, rights
d) offset, rights
10. What are the characteristics of Cambridge CAP system as compared to Hydra system?
a) It is simpler and less powerful than hydra system
b) It is more powerful than hydra system
c) It is powerful than hydra system
d) It is not as secure as Hydra system