Operating systems concept MCQ Test 18

By | October 3, 2017

UGC-NET/GATE Multiple Choice Questions for Operating System.

Question 1
What is networked virtual memory?
A
Caching
B
Segmentation
C
RAM disk
D
None of the mentioned
Question 2
Fork is
A
the dispatching of a task
B
the creation of a new job
C
the creation of a new process
D
increasing the priority of a task
Question 3
What is the name of the software which can be legally compiled and often used for free?
A
Shareware program
B
Public domain program
C
Firmware program
D
Mind Ware
Question 4
Running many operating systems on one core system is called
A
virtualization
B
clouding
C
sharing
D
both A and B
Question 5
All deadlocks involve conflicting needs for
A
Resources
B
Users
C
Computers
D
Programs
Question 6
Consider the following processes with time slice of 4 milliseconds (I/O requests are ignored): Process A B C D Arrival time 0 1 2 3 CPU cycle 8 4 9 5 The average turn around time of these processes will be
A
19.25 milliseconds
B
18.25 milliseconds
C
19.5 milliseconds
D
18.5 milliseconds
Question 7
Protection is only provided at the.......... level.
A
lower
B
central
C
higher
D
none of the mentioned
Question 8
MAC operating system is an abbreviation of
A
Macintosh operating system
B
memory operating system
C
main operating system
D
mainframe operating system
Question 9
Memory
A
is a device that performs a sequence of operations specified by instructions in memory.
B
is the device where information is stored
C
is a sequence of instructions
D
is typically characterized by interactive processing and time-slicing of the CPU's time to allow quick response to each user.
Question 10
A race condition occurs when multiple processes or threads read and write
A
Input
B
Information
C
Data Items
D
Programs
Question 11
The request and release of resources are..........
A
command line statements
B
interrupts
C
system calls
D
special programs
Question 12
What are drawbacks of the host based IDS?
A
Unselective logging of messages may increase the audit burdens
B
Selective logging runs the rish of missed attacks
C
They are very fast to detect
D
They have to be programmed for new patterns
Question 13
A FIFO replacement algorithm associates with each page the..........
A
time it was brought into memory
B
size of the page in memory
C
page after and before it
D
all of the mentioned
Question 14
Process is..........
A
A program in execution
B
An instance of a program running on a computer
C
The entity that can be assigned to and executed
D
All of the above
Question 15
Mutual exclusion can be provided by the
A
mutex locks
B
binary semaphores
C
both (a) and (b)
D
none of the mentioned
Question 16
What file contains the list of port numbers (and associated names) monitored by inetd?
A
/etc/services
B
/etc/nsorder
C
/etc/nsswitch.conf/
D
/etc/hosts
There are 16 questions to complete.

Leave a Reply

Your email address will not be published. Required fields are marked *