0

Operating System

Description: This test includes the questions related to Operating system concept for the UGC net aspirants as well as gate aspirants.
Number of Questions: 15
Created by:
Tags: Os cs UGC net Operating Systems
Attempted 0/15 Correct 0 Score 0

Which of the following operations is/are involved in process management in the operating system?

  1. Suspending and resuming process

  2. Deadlock handling

  3. Process synchronisation

  4. Process communication

  5. All of the above


Correct Option: E
Explanation:

All of the above are the task of process management in the operating system.

Which of the following is/are the cause(s) of Belady's anomaly in operating system?

  1. Decreasing the number of frames

  2. Increasing the number of frames

  3. Increase in number of page faults

  4. Both (2) and (3)

  5. Both (1) and (3)


Correct Option: D
Explanation:

Both the options are true.

Which of the following schedulers is mostly used in time sharing systems?

  1. Medium Term Scheduler

  2. Short Term Scheduler

  3. Long Term Scheduler

  4. Both (1) and (2)

  5. None of the above


Correct Option: A
Explanation:

Yes, Medium term scheduler mostly used in time sharing systems.

Which of the following describes throughput in CPU scheduling?

  1. The measurement of work done by completion of number of processes per unit time.

  2. The amount of time that a process spends waiting in the ready queue.

  3. It is the sum of the time spent in waiting in the ready queue, executing by the CPU and doing I/O.

  4. It is the measure of time from the submission of a request till the first response is produced.

  5. None of the above


Correct Option: A
Explanation:

Yes, this is known as the 'Throughput' in CPU scheduling.

Which of the following statements is/are false for File Allocation Table (FAT) in operating system?

  1. It is a technique used in linked allocation method of files.

  2. It is a technique of contiguous allocation of files.

  3. It solves the external fragmentation problem in contiguous allocation.

  4. Both (1) and (2)

  5. None of the above


Correct Option: E
Explanation:

Yes, all the three statements are true.

Which of the following describes caching in operating system?

  1. In this mechanism, the information is stored in the virtual memory.

  2. In this mechanism, the information is copied in the faster storage system and can be retrieved further.

  3. In this mechanism, the information is copied in the temporary files.

  4. In this mechanism, the information is stored in the main memory.

  5. Both (2) and (3)


Correct Option: E
Explanation:

Yes, both are true statements for the caching mechanism.

Which of the following comes under the system call in operating system?

  1. File management

  2. Process control

  3. Information management

  4. Communication

  5. All of the above


Correct Option: E
Explanation:

Yes, all of the above are the categories of system calls.

Which of the following is/are the example(s) of multi-tasking system?

  1. MS-DOS

  2. Windows-NT server

  3. MacOS unix

  4. All of the above

  5. Only (2) and (3)


Correct Option: E
Explanation:

Both are the examples of Multi-tasking system.

Why a separate command interpreter is given more preference than the associated with the kernel?

  1. We can easily change the interface of command interpreter, if it is separate from the kernel.

  2. A separate command interpreter prevents the malicious process to gain access to certain part of the kernel.

  3. A separate command interpreter is used for better execution of commands.

  4. All of the above

  5. Only (1) and (2) are true


Correct Option: E
Explanation:

Yes, both are the true statements.

Which of the following is the cause of external fragmentation?

  1. If the allocated is slightly larger than the requested memory

  2. If the allocated memory is smaller than the requested memory

  3. If the available memory is not contiguous

  4. If the program's address does not end on a page boundary

  5. Both (3) and (4)


Correct Option: C
Explanation:

The memory available is partitioned and the memory is not contiguous because it is fragmented in to little pieces.

What is the need of context switch in the operating system?

  1. To provide multitasking for CPU

  2. To provide resource sharing for the processes

  3. To provide security to the operating system

  4. All of the above

  5. Only (1) and (2)


Correct Option: E
Explanation:

Both are true for the context switch in the operating system.

Which of the following is/are the cause(s) of viruses in the operating system?

  1. Downloading viral program form internet

  2. Emails

  3. Spamming

  4. All of the above

  5. Both (1) and (2)


Correct Option: D
Explanation:

Yes, all of the above are the causes of virus in the operating system.

Which of the following is not a program threat?

  1. Trap door

  2. Logic bomb

  3. Trojan horse

  4. Stack and buffer overflow

  5. None of the above


Correct Option: E
Explanation:

All of the above are called the program threat.

Which of the following situations requires the context switching in operating system?

  1. When the CPU needs in and out process from the memory

  2. When the switching needed from user mode to kernel mode

  3. When the CPU is interrupted to return data from a disk read

  4. All of the above

  5. Both (2) and (3)


Correct Option: D
Explanation:

Yes, all of the above are the necessary conditions when there is a need of context switch in the operating system.

Which of the following best describes the denial of service attack?

  1. It prevent legitimate use of the system.

  2. It involves unauthorised use of resources.

  3. It involves unauthorised modification of data.

  4. It involves unauthorised reading of data.

  5. Both (1) and (2)


Correct Option: A
Explanation:

Yes, it is called 'Denial of service attack'. This is an accidental attack due to failure of bug's rapid spread.

- Hide questions