Operating System – Set 4 January 28, 2025 by aasi 0% Report a question What’s wrong with this question? You cannot submit an empty report. Please add some details. 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950 Operating System – Set 4 Dear ! This is Operating System – Set 4 Quiz and it contains 50 questions. Keep Learning! 1 / 50 1) Operating system is also known as? Printer Database System software Hardware 2 / 50 2) Which command is used to see the sub-directory structure of drive? Subtree Tree List None of these 3 / 50 3) Which of the following scheduling policy is well suited for time shared operating system? Shortest job first Round robin First com first serve Elevator 4 / 50 4) A public key encryption system? Allows only on to decode the transmission Allows only the correct receiver to decode the data Does not encode the data before transmitting it Allows only the correct sender to decode the data 5 / 50 5) Memory management is? Not used in modern operating system Replaced with virtual memory on on current systems Not used on multiprogramming systems Critical for even the simplest operating systems 6 / 50 6) To protect system, there are how many security levels? 3 2 4 1 7 / 50 7) The simplest way to break a deadlock is to? Lock one of the processes Preempt a resource Roll back Kill one of the processes 8 / 50 8) A computer system that permits multiple users to run programs at same time ? Multi-processing Real time system Time sharing Multi-tasking system 9 / 50 9) With DOS, you may use the ‘*’ and ‘?’: Instead of wildcard characters To represent unspecified characters in a filename When changing the default setting In the extension but not in the drive name or the file name 10 / 50 10) Security violation due to? Malicious Both A and B None of these Accidental 11 / 50 11) Which directory implementation is used in most Operating System? Single level directory structure Acyclic directory structure Two level directory structure Tree directory structure 12 / 50 12) A system program that combines the separately compiled modules of a program into a form suittable for execution? Cross compiler Linking loader Load and go Assembler 13 / 50 13) Using windows explorer, a plus(+ sign in front of a folder indicates……..? An open folder None of these The folder contains subfolder The text file 14 / 50 14) The startup routine runs, when mechine boots up is known as? I/O operation Operating Routine POST BOOT up 15 / 50 15) A major security problem for operating system is? None of these Human problem Physical problem Authentication problem 16 / 50 16) The batch file uses the extension? DOS BAT Bach DOC 17 / 50 17) What is the maximum length allowed for primary name of a computer file under DOS? None of these 12 3 8 18 / 50 18) The maximum amount of information that is available in one portion of the disk access arm for a removal disk pack(without further movement of the arm with multiple heads)? A cylinder of data A block of data A plate of data A track of data 19 / 50 19) Memory management is? Critical for even the simplest operating systems Replaced with virtual memory on current systems Not used on multiprogramming systems Not used in modern operating system 20 / 50 20) Which of following approaches do not require knowledge of the system state? Deadlock avoidance Deadlock prevention None of these Deadlock detection 21 / 50 21) FIFO scheduling is_____? Deadline scheduling Non preemptive scheduling Fair share scheduling Preemptive scheduling 22 / 50 22) Telnet is a service that runs? Telivision on net Cable tv network Remote program Telnet 23 / 50 23) All of the following are examples of real security and privacy risks except? Spam Theft Hacker Virus 24 / 50 24) Which of the following refers to the associative memory? The address of the data is generated by the CPU The data are accessed sequentially There is no need for an address i.e the data is used as an address The address of the data is supplied by the users 25 / 50 25) Dead-lock in an Operating System is? Desirable process Undesirable process Definite waiting process ALL 26 / 50 26) The bankers algorithm is used? To prevent deadlock in operating sys To rectify a deadlocked state None of these To detect deadlock in operating systems 27 / 50 27) It is not possible to have a deadlock involving only a single process. Why? This follows directly from the hold-and-wait condition Because single process not always in safe state None of these This holds mutual exclusion,hold-and-wait and non-preemption 28 / 50 28) The part of machine level instruction, which tells the Central processor what has to be done,is? Flip-Flop Operating code Address Locator 29 / 50 29) Which of the following is the process by which a users privileges risks except? Authorization Authentication None of these Access control 30 / 50 30) The…..program compresses large files into a smaller file? WinZip WinStyle WinShrink None of these 31 / 50 31) Resolution of externally defined sumbols is performed by? Linker Loader Assembler Compiler 32 / 50 32) Which of the following is program group? Word Paint Accessories All of above 33 / 50 33) A device that forwards data packet from one network to another is called a? Gateway Hub Switch Bridge 34 / 50 34) A computer communication technology that provides a way to interconnect multiple computer across short distance is? Wireless Network WAN LAN MAN 35 / 50 35) A microsoft windows is……..a(n? Graphic program Operating system Word processing Database 36 / 50 36) To avoid the race condition, the number of processes that may be simultaneously inside their critical section is? 8 16 1 37 / 50 37) Bootstrap or vector is called? Grappling hook program Secondary program Primary storage Main program 38 / 50 38) How many characters form a secondary name for a file? 12 8 None of these 3 39 / 50 39) Which of the following topologies consists of multiple CPU connected single communication line running the length of the network? Tree Ring Bus Star 40 / 50 40) _______Is a high level abstraction over semaphore? Mutual exclusion None of these Monitor Shared memory 41 / 50 41) MS_DOS is a …… operating system ? command-driven Popular GUI User-friendly 42 / 50 42) What is the name given to the database management system which is able to handle full text data, image data, audio & video? Picture Video Multimedia Full media 43 / 50 43) A tree structured file directory system ? Allows easy storage and retrieval of file names Is not essential when we have millions of files None of these Is a much debated unecessary feature 44 / 50 44) Which is not application software? Photoshop Page Maker Winword XP Windows NT 45 / 50 45) Which of the following commands is goven to reboot the computer? Ctrl + Shift + Del Ctrl + Alt + Shift Ctrl + Alt + TAB Ctrl + Alt + Del 46 / 50 46) Linux is a/n …….. operating system? windows Mac Embedded Open source 47 / 50 47) Process is? Program in execution Program in high level language kept on disk A job in secondary memory Contets of main memory 48 / 50 48) In wildcard specification ‘?’ Is used as replacement for? None of these Three character One character Two character 49 / 50 49) The DIR command in DOS operating system? Copies files None of these Erases file Extracts a list of file names 50 / 50 50) Every file must have a………? Data Field Records File name Your score isThe average score is 0%🎉 Challenge alert! 💡 Share this quiz with your friends and see who scores the highest! 🏆🤩🔥 LinkedIn Facebook Follow Us @ 0% Restart quiz Exit We’d love to hear your thoughts! 📝 Share your valuable review with us. 🙌 🌟 Thank you for your support! Your feedback means the world to us. 🙏💖 Send feedback