Operating System – Set 4 January 28, 2025 by aasi 0% Report a question What’s wrong with this question? You cannot submit an empty report. Please add some details. 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950 Operating System – Set 4 Dear ! This is Operating System – Set 4 Quiz and it contains 50 questions. Keep Learning! 1 / 50 1) A system program that combines the separately compiled modules of a program into a form suittable for execution? Load and go Assembler Cross compiler Linking loader 2 / 50 2) A computer communication technology that provides a way to interconnect multiple computer across short distance is? MAN Wireless Network LAN WAN 3 / 50 3) MS_DOS is a …… operating system ? User-friendly Popular command-driven GUI 4 / 50 4) Dead-lock in an Operating System is? Undesirable process ALL Desirable process Definite waiting process 5 / 50 5) Which of following approaches do not require knowledge of the system state? Deadlock detection Deadlock avoidance Deadlock prevention None of these 6 / 50 6) To protect system, there are how many security levels? 1 4 3 2 7 / 50 7) A microsoft windows is……..a(n? Database Word processing Operating system Graphic program 8 / 50 8) Every file must have a………? File name Data Field Records 9 / 50 9) Process is? Contets of main memory Program in execution A job in secondary memory Program in high level language kept on disk 10 / 50 10) All of the following are examples of real security and privacy risks except? Theft Hacker Virus Spam 11 / 50 11) With DOS, you may use the ‘*’ and ‘?’: When changing the default setting In the extension but not in the drive name or the file name Instead of wildcard characters To represent unspecified characters in a filename 12 / 50 12) The bankers algorithm is used? To rectify a deadlocked state None of these To prevent deadlock in operating sys To detect deadlock in operating systems 13 / 50 13) Which directory implementation is used in most Operating System? Single level directory structure Acyclic directory structure Tree directory structure Two level directory structure 14 / 50 14) Linux is a/n …….. operating system? Embedded Mac Open source windows 15 / 50 15) Which of the following is program group? Word Accessories Paint All of above 16 / 50 16) A computer system that permits multiple users to run programs at same time ? Real time system Time sharing Multi-processing Multi-tasking system 17 / 50 17) To avoid the race condition, the number of processes that may be simultaneously inside their critical section is? 16 1 8 18 / 50 18) Memory management is? Critical for even the simplest operating systems Not used in modern operating system Not used on multiprogramming systems Replaced with virtual memory on current systems 19 / 50 19) Resolution of externally defined sumbols is performed by? Assembler Linker Compiler Loader 20 / 50 20) What is the name given to the database management system which is able to handle full text data, image data, audio & video? Multimedia Picture Full media Video 21 / 50 21) How many characters form a secondary name for a file? 12 8 3 None of these 22 / 50 22) Which is not application software? Page Maker Winword XP Photoshop Windows NT 23 / 50 23) Which of the following commands is goven to reboot the computer? Ctrl + Shift + Del Ctrl + Alt + Shift Ctrl + Alt + Del Ctrl + Alt + TAB 24 / 50 24) The simplest way to break a deadlock is to? Roll back Preempt a resource Kill one of the processes Lock one of the processes 25 / 50 25) It is not possible to have a deadlock involving only a single process. Why? None of these Because single process not always in safe state This holds mutual exclusion,hold-and-wait and non-preemption This follows directly from the hold-and-wait condition 26 / 50 26) Using windows explorer, a plus(+ sign in front of a folder indicates……..? The folder contains subfolder The text file An open folder None of these 27 / 50 27) In wildcard specification ‘?’ Is used as replacement for? One character Three character None of these Two character 28 / 50 28) The part of machine level instruction, which tells the Central processor what has to be done,is? Locator Address Flip-Flop Operating code 29 / 50 29) The DIR command in DOS operating system? Copies files Extracts a list of file names None of these Erases file 30 / 50 30) Which of the following scheduling policy is well suited for time shared operating system? Elevator Shortest job first Round robin First com first serve 31 / 50 31) The batch file uses the extension? DOS BAT Bach DOC 32 / 50 32) Which of the following refers to the associative memory? There is no need for an address i.e the data is used as an address The data are accessed sequentially The address of the data is supplied by the users The address of the data is generated by the CPU 33 / 50 33) A device that forwards data packet from one network to another is called a? Hub Gateway Bridge Switch 34 / 50 34) A tree structured file directory system ? Allows easy storage and retrieval of file names None of these Is a much debated unecessary feature Is not essential when we have millions of files 35 / 50 35) FIFO scheduling is_____? Deadline scheduling Preemptive scheduling Non preemptive scheduling Fair share scheduling 36 / 50 36) The startup routine runs, when mechine boots up is known as? Operating Routine I/O operation POST BOOT up 37 / 50 37) Bootstrap or vector is called? Grappling hook program Main program Primary storage Secondary program 38 / 50 38) Memory management is? Not used in modern operating system Critical for even the simplest operating systems Replaced with virtual memory on on current systems Not used on multiprogramming systems 39 / 50 39) _______Is a high level abstraction over semaphore? Monitor Shared memory None of these Mutual exclusion 40 / 50 40) The maximum amount of information that is available in one portion of the disk access arm for a removal disk pack(without further movement of the arm with multiple heads)? A cylinder of data A track of data A plate of data A block of data 41 / 50 41) Which of the following is the process by which a users privileges risks except? Access control Authentication None of these Authorization 42 / 50 42) Which of the following topologies consists of multiple CPU connected single communication line running the length of the network? Bus Tree Ring Star 43 / 50 43) The…..program compresses large files into a smaller file? WinShrink None of these WinZip WinStyle 44 / 50 44) Which command is used to see the sub-directory structure of drive? Subtree List None of these Tree 45 / 50 45) Operating system is also known as? Database System software Hardware Printer 46 / 50 46) What is the maximum length allowed for primary name of a computer file under DOS? 12 8 None of these 3 47 / 50 47) A public key encryption system? Allows only the correct receiver to decode the data Allows only the correct sender to decode the data Allows only on to decode the transmission Does not encode the data before transmitting it 48 / 50 48) A major security problem for operating system is? Human problem Physical problem Authentication problem None of these 49 / 50 49) Telnet is a service that runs? Cable tv network Telnet Telivision on net Remote program 50 / 50 50) Security violation due to? Accidental None of these Both A and B Malicious Your score isThe average score is 0%🎉 Challenge alert! 💡 Share this quiz with your friends and see who scores the highest! 🏆🤩🔥 LinkedIn Facebook Follow Us @ 0% Restart quiz Exit We’d love to hear your thoughts! 📝 Share your valuable review with us. 🙌 🌟 Thank you for your support! Your feedback means the world to us. 🙏💖 Send feedback