Unix-and-Windows
Unix-and-Windows
com
Unix and Windows
1. Match the following for Unix rue system:
List-I List-II
a. Boot block i. Information about file system,
free block list, free inode list etc.
b. Super block ii. Contains operating system files
as well as program and data files
created by users.
c. Inode block iii. Contains boot program and
partition table.
d. Data block iv. Contains a table for every file in
the file system. Attributes of files
are stored here.
Codes:
a b c d
(1) iii i ii iv
(2) iii i iv ii
(3) iv iii ii i
(4) iv iii i ii
Answer: 2
(UGCNET-DEC2016-III-51)
2. Unix command to change the case of first three lines of file “shortlist” from lower to upper
(1) $ tr ‘[a-z]’ ‘[A-Z]’ shortlist | head-3
(2) $ head-3 shortlist | tr ‘[a-z]’ ‘[A-Z]’
(3) $ tr head-3 shortlist ‘[A-Z]’ ‘[a-z]’
(4) $ tr shortlist head-3 ‘[a-z]’ ‘[A-Z]’
Answer: 2
(UGCNET-DEC2016-III-74)
www.estudyindia.com
www.estudyindia.com
(3) iii iv i ii
(4) iii i iv ii
Answer: 4
(UGCNET-DEC2016-III-75)
6. Which of the following statement(s) is/are True regarding ‘nice’ command of UNIX?
I. It is used to set or change the priority of a process.
II. A process’s nice value can be set at the time of creation.
III. ‘nice’ takes a command line as an argument.
(A) I, II only (B) II, III only
(C) I, II, III (D) I, III only
Answer: C
(UGCNET-AUG2016-III-69)
7. The Unix Operating System Kernel maintains two key data structures related to processes, the
process table and the user structure. Now, consider the following two statements:
I. The process table is resident all the time and contain information needed for all processes, even
those that are not currently in memory.
II. The user structure is swapped or paged out when its associated process is not in memory, in
order not to waste memory on information that is not needed.
Which of the following options is correct with reference to above statements ?
(A) Only (I) is correct.
(B) Only (II) is correct.
(C) Both (I) and (II) are correct.
(D) Both (I) and (II) are wrong.
Answer: C
www.estudyindia.com
www.estudyindia.com
(UGCNET-AUG2016-III-49)
8. In UNIX, processes that have finished execution but have not yet had their status collected are
known as ................
(A) Sleeping processes (B) Stopped Processes
(C) Zombie Processes (D) Orphan Processes
Answer: C
(UGCNET-June2016-III-49)
9. In UNIX operating system, when a process creates a new process using the fork() system call,
which of the following state is shared between the parent process and child process?
(A) Heap (B) Stack
(C) Shared memory segments (D) Both Heap and Stack
Answer: C
(UGCNET-June2016-III-50)
10. Which of the following information about the UNIX file system is not correct?
(A) Super block contains the number of i-nodes, the number of disk blocks, and the start of the
list of free disk blocks.
(B) An i-node contains accounting information as well as enough information to locate all the
disk blocks that holds the file’s data.
(C) Each i-node is 256-bytes long.
(D) All the files and directories are stored in data blocks.
Answer: C
UGCNET-June2016-III-51
11. Which of the following option with reference to UNIX operating system is not correct?
(A) INT signal is sent by the terminal driver when one types <Control-C> and it is a request to
terminate the current operation.
(B) TERM is a request to terminate execution completely. The receiving process will clean up its
state and exit.
(C) QUIT is similar to TERM, except that it defaults to producing a core dump if not caught.
(D) KILL is a blockable signal.
Answer: D
UGCNET-June2016-III-52
13. Which of the following statement is not correct with reference to cron daemon in UNIX O.S?
(A) The cron daemon is the standard tool for running commands on a pre-determined schedule.
(B) It starts when the system boots and runs as long as the system is up.
(C) Cron reads configuration files that contain list of command lines and the times at which they
invoked.
(D) Crontab for individual users are not stored.
Answer: D
UGCNET-June2016-III-68
14. In Unix, files can be protected by assigning each one a 9-bit mode called rights bits. Now,
consider the following two statements:
I. A mode of 641 (octal) means that the owner can read and write the file, other members of the
owner’s group can read it, and users can execute only.
II. A mode of 100 (octal) allows the owner to execute the file, but prohibits all other access.
Which of the following options is correct with reference to above statemenrs?
(A) Only I is correct (B) Only II is correct
(C) Both I and II are correct (D) Both I and II are incorrect
Answer: C
UGCNET-June2016-III-69
17. The character set used in Windows 2000 operating system is ...............
(A) 8 bit ASCII (B) Extended ASCII
www.estudyindia.com
www.estudyindia.com
(C) 16 bit UNICODE (D) 12 bit UNICODE
Answer: C
UGCNET-Dec2015-III-55
18. In Unix, the command to enable execution permission for file “mylife” by all is ................
(A) Chmod ugo+X myfile (B) Chmod a+X myfile
(C) Chmod +X myfile (D) All of the above
Answer: D
UGCNET-Dec2015-III-56
22. WOW32 is a:
(A) Win 32 API library for creating processes and threads.
(B) Special kind of file system to the NT name space.
(C) Kernel - mode objects accessible through Win32 API
(D) Special execution environment used to run 16 bit Windows applications on 32 - bit
machines.
Answer: D
UGCNET-June2015-III-74
24. Which of the following versions of Windows O.S. contain built-in partition manager which
allows us to shrink and expand pre-defined drives ?
(A) Windows Vista (B) Windows 2000
(C) Windows NT (D) Windows 98
Answer: A
UGCNET-Dec2014-III-73
25. ................. maintains the list of free disk blocks in the Unix file system.
(A) I-node
(B) Boot block
(C) Super block
(D) File allocation table
Answer: C
UGCNET-June2014-III-37
26. A part of Windows 2000 operating system that is not portable is
(A) Device Management
(B) Virtual Memory Management
(C) Processor Management
(D) User Interface
Answer: B
UGCNET-June2014-III-38
30. Which statement is not true about process 0 in the Unix operating system?
(A) Process 0 is called init process.
(B) Process 0 is not created by fork system call.
(C) After forking process 1, process 0 becomes swapper process.
(D) Process 0 is a special process created when system boots.
Answer: A
UGCNET-Dec2013-III-73
31. Which of the following commands would return process_id of sleep command?
(A) Sleep 1 and echo $?
(B) Sleep 1 and echo $#
(C) Sleep 1 and echo $x
(D) Sleep 1 and echo $!
Answer: D
UGCNET-Dec2013-III-74
34. In windows 2000 operating system all the processor-dependent code is isolated in a dynamic
link library called
A. NTFS file system
B. Hardware abstraction layer
C. Microkernel
D. Process Manger
Answer B
UGCNET-Dec2013-III-68
35. Which of the following statements is not true for UNIX Operating System?
(A) Major strength of UNIX Operating System is its open standards which enabled large number
of organizations ranging from academicia to industries to participate in its development.
(B) UNIX kernel uses modules with well specified interfaces and provides advantages like
simplified testing and maintenance of kernel. It has better extensibility as the kernel is not
monolithic.
(C) UNIX is kernel based operating system with two main components viz. process management
subsystem and file management subsystem.
(D) All devices are represented as files which simplify the management of I/O devices and files.
The directories structure used is directed acyclic graph.
Answer: B
UGCNET-Sep2013-III-75
36. Match the following for Windows Operating System :
List - I
(a) Hardware abstraction layer
(b) Kernel
(c) Executive
(d) Win32 subsystem
List - II
(i) Starting all processes, emulation of different operating systems, security functions,
transform character based applications to graphical representation.
(ii) Export a virtual memory interface, support for symmetric multiprocessing,
administration, details of mapping memory, configuring I/O buses, setting up DMA.
(iii) Thread scheduling, interrupt and exception handling, recovery after power failure.
(iv) Object manager, virtual memory manager, process manager, plug and-play and
power manager.
Codes :
(a) (b) (c) (d)
(A) (i) (iii) (ii) (iv)
(B) (iv) (iii) (ii) (i)
(C) (ii) (iii) (iv) (i)
www.estudyindia.com
www.estudyindia.com
(D) (iii) (ii) (i) (iv)
Answer: C
UGCNET-Sep2013-III-74
37. Which of the following shell scripts will produce the output “my first script”?
(A) for i in my first script { echo –i $i}
(B) for my first script; do echo –n; done
(C) for i in my first script; do echo –i $i; done
(D) for n in my first script; do echo –i $i; done
Answer: C
UGCNET-Sep2013-III-72
38. The portion of Windows 2000 operating system which is not portable is
(A) processor management
(B) user interface
(C) device management
(D) virtual memory management
Answer: D
UGCNET-June2014-III-38
39. (I)Each object in the active directory of windows 2000 has an access control list.
(II) The scheme is a blueprint of all objects in the domain of windows 2000.
Which of the following is true?
(A) only (I)
(B) only (II)
(C) both (I) and (II)
(D) none of the above
Answer: C
UGCNET-dec2008-ii-50
40. In Unix, the login prompt can be changed by changing the contents of the file ...............
(A) contrab (B) init
(C) gettydefs (D) inittab
Answer: C
UGCNET-Dec2015-II-30
41. A unix file system has 1-KB blocks and 4-byte disk addresses. What is the maximum file size
if i-nodes contain 10 direct entries and one single, double and triple indirect entry each?
(A) 32 GB (B) 64 GB
(C) 16 GB (D) 1 GB
Answer: C
UGCNET-June2013-III-64, UGCNET-Dec2015-II-49
43. The Unix Kernel maintains two key data structures related to processes, the process table and
the user structure. Which of following information is not the part of user structure?
(A) File descriptor table (B) System call state
(C) Scheduling parameters (D) Kernel stack
Answer: C
UGC net paper II june-2015 No 40
44. In UNIX, ............ creates three subdirectories: 'PIS' and two subdirectories 'progs' and ‘data’
from just created subdirectory 'PIS'.
(A) mdkir PIS/progs PIS/data PIS
(B) mkdir PIS progs data
(C) mkdir PIS PIS/progs PIS/data
(D) mkdir PIS/progs data
Answer: C
UGCNET-June2016-II-39
45. Assume that an implementation of Unix operating system uses i-nodes to keep track of data
blocks allocated to a file. It supports 12 direct block addresses, one indirect block address and
one double indirect block address. The file system has 256 bytes block size and 2 bytes for disk
block address. The maximum possible size of a file in this system is
(A) 16 MB (B) 16 KB
(C) 70 KB (D) 71 KB
Answer: Marks given to all
UGCNET-Sep2013-II-47
46. Which of the following set of Unix commands will always display “WELCOME” ?
(A) export title=WELCOME; Echo $title
(B) title = WELCOME; export $ title ; sh –c “echo $title”
(C) title = WELCOME; export title ; sh –c “echo $title”
(D) title = WELCOME; echo $title
Answer: C
2013 September UGC NET Solved Paper II No 48
www.estudyindia.com
www.estudyindia.com
(C) Sort, taking the input from "in" and writing the output to "temp" then prints 30 lines from
temp on terminal. Finally "temp" is removed.
(D) Sort, taking the input from 'temp" and then prints 30 lines from "temp" on terminal. Finally
"temp" is removed.
Answer: C
49. In UNIX, which of the following command is used to set the task priority ?
(A) init (B) nice
(C) kill (D) PS
Answer B
UGCNET-Dec2012-II-36
50. The Unix command used to find out the number of characters in a file is
(A) nc
(B) wc
(C) chcnt
(D) lc
Answer: B
UGCNET-dec2009-ii-40
54. A UNIX file system has 1 KB block size and 4-byte disk addresses. What is the maximum file
size if the inode contains ten direct block entries, one single indirect block entry, one double
indirect block entry and one triple indirect block entry?
(A) 30 GB (C) 16 GB
(B) 64 GB (D) 1 GB
Answer: C
UGCNET-June2013-III-64, UGCNET-Dec2015-II-49
55. A UNIX file system has 1 KB block size and 4-byte disk addresses. What is the maximum file
size if the inode contains ten direct block entries, one single indirect block entry, one double
indirect block entry and one triple indirect block entry?
(A) 30 GB
(B) 64 GB
(C) 16 GB
(D) 1 GB
Answer: C
UGCNET-June2013-III-64, UGCNET-Dec2015-II-49
56. Which of the following operating system is better for implementing client-server network?
(A) Windows 95
(B) Windows 98
(C) Windows 2000
(D) All of these
Answer: C
UGCNET-Dec2012-III-40
57. A user level process in Unix traps the signal sent on a Ctrl + C input and has a signal handling
routine that saves appropriate files before terminating the process. When a Ctrl + C input is
given to this process, what is the mode in which the signal handling routine executes?
(A) User mode
(B) Kernel mode
(C) Superuser mode
(D) Privileged mode
Answer: B
GATE2005-IT-19, UGCNET-June2012-III-57
58. Which one of the following options is not a shell in UNIX system?
(A) Bourne Shell
(B) C Shell
www.estudyindia.com
www.estudyindia.com
(C) Net Shell
(D) Korn Shell
Answer: C
60. The versions of windows operating system like windows XP and window Vista uses following
file system:
(A) FAT-16
(B) FAT-32
(C) NTFS (NT File System)
(D) All of the above
Answer: D
UGCNET-June2013-III-66
61. Which command allows you to view your file 24 lines at a time ?
(A) More (B) Cat
(C) Pg (D) None of the above
Answer: A
62. Which of the following command the file names in multiple columns?
(A) IS–X
(B) IS
(C) IS–1
(D) IS–f–X
Answer: B
UGCNET-Dec2010-II-37
64. What is the size of the Unicode character in Windows Operating System ?
(A) 8-Bits (B) 16-Bits
www.estudyindia.com
www.estudyindia.com
(C) 32-Bits (D) 64-Bits
Answer: B
UGCNET-Dec2012-II-15
65. Which of the following changes permission to deny write permission to group and others?
(A) Chmod go-w filex
(B) Chmod go w filex
(C) Chmod go=w filex
(D) None of the above
Answer: A
UGCNET-june2009-ii-37
66. Variable partition memory management technique with compaction results in:
(A) Reduction of fragmentation
(B) Minimal wastage
(C) Segment sharing
(D) None of the above
Answer: A
UGCNET-june2009-ii-38
www.estudyindia.com