Operating System – Set 4 January 28, 2025 by aasi 0% Report a question What’s wrong with this question? You cannot submit an empty report. Please add some details. 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950 Operating System – Set 4 Dear ! This is Operating System – Set 4 Quiz and it contains 50 questions. Keep Learning! 1 / 50 1) Linux is a/n …….. operating system? Mac windows Embedded Open source 2 / 50 2) Bootstrap or vector is called? Primary storage Grappling hook program Secondary program Main program 3 / 50 3) Which of the following refers to the associative memory? The address of the data is supplied by the users The data are accessed sequentially There is no need for an address i.e the data is used as an address The address of the data is generated by the CPU 4 / 50 4) All of the following are examples of real security and privacy risks except? Hacker Virus Spam Theft 5 / 50 5) To avoid the race condition, the number of processes that may be simultaneously inside their critical section is? 8 16 1 6 / 50 6) Memory management is? Critical for even the simplest operating systems Not used on multiprogramming systems Replaced with virtual memory on on current systems Not used in modern operating system 7 / 50 7) What is the name given to the database management system which is able to handle full text data, image data, audio & video? Video Full media Picture Multimedia 8 / 50 8) It is not possible to have a deadlock involving only a single process. Why? This holds mutual exclusion,hold-and-wait and non-preemption This follows directly from the hold-and-wait condition Because single process not always in safe state None of these 9 / 50 9) A system program that combines the separately compiled modules of a program into a form suittable for execution? Load and go Linking loader Assembler Cross compiler 10 / 50 10) A computer system that permits multiple users to run programs at same time ? Multi-tasking system Time sharing Real time system Multi-processing 11 / 50 11) FIFO scheduling is_____? Deadline scheduling Fair share scheduling Non preemptive scheduling Preemptive scheduling 12 / 50 12) Every file must have a………? Data Field File name Records 13 / 50 13) The…..program compresses large files into a smaller file? WinZip None of these WinStyle WinShrink 14 / 50 14) The bankers algorithm is used? To rectify a deadlocked state To prevent deadlock in operating sys None of these To detect deadlock in operating systems 15 / 50 15) Which of the following commands is goven to reboot the computer? Ctrl + Alt + Del Ctrl + Alt + Shift Ctrl + Shift + Del Ctrl + Alt + TAB 16 / 50 16) Memory management is? Not used in modern operating system Replaced with virtual memory on current systems Critical for even the simplest operating systems Not used on multiprogramming systems 17 / 50 17) Which is not application software? Photoshop Winword XP Windows NT Page Maker 18 / 50 18) The DIR command in DOS operating system? Extracts a list of file names Erases file Copies files None of these 19 / 50 19) A public key encryption system? Does not encode the data before transmitting it Allows only the correct receiver to decode the data Allows only on to decode the transmission Allows only the correct sender to decode the data 20 / 50 20) How many characters form a secondary name for a file? 12 None of these 8 3 21 / 50 21) Which of the following scheduling policy is well suited for time shared operating system? Round robin Shortest job first First com first serve Elevator 22 / 50 22) The simplest way to break a deadlock is to? Kill one of the processes Lock one of the processes Preempt a resource Roll back 23 / 50 23) The startup routine runs, when mechine boots up is known as? I/O operation POST BOOT up Operating Routine 24 / 50 24) Which of following approaches do not require knowledge of the system state? Deadlock detection Deadlock prevention Deadlock avoidance None of these 25 / 50 25) Process is? Program in execution Contets of main memory A job in secondary memory Program in high level language kept on disk 26 / 50 26) Which of the following is the process by which a users privileges risks except? Authorization None of these Authentication Access control 27 / 50 27) A major security problem for operating system is? Physical problem Authentication problem Human problem None of these 28 / 50 28) Security violation due to? None of these Both A and B Malicious Accidental 29 / 50 29) _______Is a high level abstraction over semaphore? Monitor Mutual exclusion Shared memory None of these 30 / 50 30) Operating system is also known as? System software Printer Hardware Database 31 / 50 31) Resolution of externally defined sumbols is performed by? Loader Assembler Compiler Linker 32 / 50 32) A microsoft windows is……..a(n? Graphic program Database Word processing Operating system 33 / 50 33) Which command is used to see the sub-directory structure of drive? Tree None of these Subtree List 34 / 50 34) Dead-lock in an Operating System is? ALL Undesirable process Desirable process Definite waiting process 35 / 50 35) A device that forwards data packet from one network to another is called a? Bridge Hub Gateway Switch 36 / 50 36) A computer communication technology that provides a way to interconnect multiple computer across short distance is? WAN Wireless Network MAN LAN 37 / 50 37) Which directory implementation is used in most Operating System? Tree directory structure Single level directory structure Acyclic directory structure Two level directory structure 38 / 50 38) The maximum amount of information that is available in one portion of the disk access arm for a removal disk pack(without further movement of the arm with multiple heads)? A cylinder of data A track of data A block of data A plate of data 39 / 50 39) What is the maximum length allowed for primary name of a computer file under DOS? 3 12 None of these 8 40 / 50 40) The part of machine level instruction, which tells the Central processor what has to be done,is? Flip-Flop Locator Operating code Address 41 / 50 41) In wildcard specification ‘?’ Is used as replacement for? Three character Two character One character None of these 42 / 50 42) The batch file uses the extension? Bach DOS DOC BAT 43 / 50 43) Which of the following is program group? Paint All of above Accessories Word 44 / 50 44) With DOS, you may use the ‘*’ and ‘?’: In the extension but not in the drive name or the file name To represent unspecified characters in a filename When changing the default setting Instead of wildcard characters 45 / 50 45) Which of the following topologies consists of multiple CPU connected single communication line running the length of the network? Tree Star Bus Ring 46 / 50 46) To protect system, there are how many security levels? 4 3 1 2 47 / 50 47) MS_DOS is a …… operating system ? User-friendly GUI command-driven Popular 48 / 50 48) Using windows explorer, a plus(+ sign in front of a folder indicates……..? None of these The folder contains subfolder The text file An open folder 49 / 50 49) Telnet is a service that runs? Telivision on net Telnet Cable tv network Remote program 50 / 50 50) A tree structured file directory system ? Is a much debated unecessary feature Is not essential when we have millions of files None of these Allows easy storage and retrieval of file names Your score isThe average score is 0%🎉 Challenge alert! 💡 Share this quiz with your friends and see who scores the highest! 🏆🤩🔥 LinkedIn Facebook Follow Us @ 0% Restart quiz Exit We’d love to hear your thoughts! 📝 Share your valuable review with us. 🙌 🌟 Thank you for your support! Your feedback means the world to us. 🙏💖 Send feedback