Explore topic-wise MCQs in Operating System.

This section includes 60 Mcqs, each offering curated multiple-choice questions to sharpen your Operating System knowledge and support exam preparation. Choose a topic below to get started.

1.

NTFS stands for __________ and it was developed by ________.

A. New Technology File System; Apple
B. Network Technology File System; Apple
C. New Technology File System; Microsoft
D. Network Technology File System; Intel
Answer» D. Network Technology File System; Intel
2.

In MS-Word, you can use ______ to navigate a long document through small pictures of each page.

A. Document-map
B. Thumbnails
C. Outline
D. Draft
Answer» C. Outline
3.

Consider a system where each file is associated with a 16-bit number. For each file, each user should have the read and write capability. How much memory is needed to store each user’s access data?

A. 16 KB
B. 32 KB
C. 64 KB
D. 128 KB
Answer» B. 32 KB
4.

On computers where there are multiple operating system, the decision to load a particular one is done by _____.

A. PCB
B. Inode
C. File Control Block
D. Boot Loader
Answer» E.
5.

Consider the Unix i-node which uses 12 direct DBAs, 1 single indirect, 1 double indirect, 1 triple indirect. The disk block address requires 32 bits and disk block size is 1 KB. What is the maximum file size?

A. 16 GB
B. 32 GB
C. 64 GB
D. 8 GB
Answer» B. 32 GB
6.

In a file allocation system, which of the following allocation scheme(s) can be used if no external fragmentation is allowed?I. ContiguousII. LinkedIII. Indexed

A. I and III only
B. II only
C. III only
D. II and III only
Answer» E.
7.

Consider the following statements :(a) UNIX provides three types of permissions* Read* Write* Execute(b) UNIX provides three sets of permissions* permission for owner* permission for group* permission for othersWhich of the above statement/s is/are true ?

A. Only (a)
B. Only (b)
C. Both (a) and (b)
D. Neither (a) nor (b)
Answer» D. Neither (a) nor (b)
8.

Consider the following programmain(){fork() ;fork() ;fork( ) ;}How many new processes will be created ?

A. 9
B. 6
C. 7
D. 5
Answer» D. 5
9.

Consider a linear list based implementation in a file system. Each directory is a list of nodes, where each node contains the file name along with the file metadata, such as the list of pointers to the data blocks. Consider a given directory foo.Which of the following operations will necessarily require a full scan of foo for successful completion?

A. Renaming of an existing file in foo
B. Opening of an existing file in foo
C. Deletion of an existing file from foo
D. Creation of a new file in foo
Answer» B. Opening of an existing file in foo
10.

File operations that manipulate the ‘open-count’ maintained for each entry in open file table include:

A. open, write
B. read, write
C. write, close
D. open, close
Answer» E.
11.

Match the following WINDOWS system calls and UNIX system calls with reference to process control and File manipulation.WindowsUNIXA. Create-process( )I. Open( )B. WaitForSingleObject( )II. Close( )C. CreateFile( )III. Fork( )D. CloseHandle( )IV. Wait( )

A. A - III, B - IV, C - I, D - II
B. A - IV, B - III, C - I, D - II
C. A - IV, B - III, C - II, D - I
D. A - III, B - IV, C - II, D - I
Answer» B. A - IV, B - III, C - I, D - II
12.

Cortana is a Microsoft's, _______

A. Hybrid laptop-tablet device
B. Browser introduced with Windows - 10
C. Touch support Office App
D. Voice controlled digital assistant
Answer» E.
13.

The operating system reserves space on disk for storing virtual-memory pages that are not currently in main memory; this space is called

A. Latches
B. Swap Space
C. Dirty Block
D. None of the mentioned
Answer» C. Dirty Block
14.

Locks on buffer blocks are unrelated to locks used for concurrency-control of transactions, and releasing them in a non-two-phase manner does not have any implications on transaction serializability. This is

A. Latches
B. Swap Space
C. Dirty Block
D. None of the mentioned
Answer» B. Swap Space
15.

A transaction commits as soon as its commit log record is written to stable storage at the primary site. This is

A. One Safe
B. Two Safe
C. Two-very Safe
D. Very Safe
Answer» B. Two Safe
16.

_________ dump schemes have been developed that allow transactions to be active while the dump is in progress.

A. Archival
B. Fuzzy
C. SQL
D. All of the mentioned
Answer» C. SQL
17.

If a failure has occurred in the midst of a transfer, it is called as _________

A. Successful completion
B. Partial failure
C. Total failure
D. None of the mentioned
Answer» C. Total failure
18.

For correct behavior during recovery, undo and redo operation must be

A. Commutative
B. Associative
C. Idempotent
D. Distributive
Answer» D. Distributive
19.

A __________ checkpoint is a checkpoint where transactions are allowed to perform updates even while buffer blocks are being written out.

A. Temporary
B. Fuzzy
C. Permanent
D. Recovery
Answer» C. Permanent
20.

The log is a sequence of _________ recording all the update activities in the database.

A. Log records
B. Records
C. Entries
D. Redo
Answer» B. Records
21.

Which is not a desirable property of a transaction ?

A. Isolation
B. Atomicity
C. Durability
D. All are desirable
Answer» E.
22.

Which of the following can cause a transaction failure

A. Logical error
B. System error
C. More than one of the mentioned
D. None of the mentioned
Answer» D. None of the mentioned
23.

If ___________ are not obtained in undo operation it will cause problem in undo-phase.

A. Higher-level lock
B. Lower-level lock
C. Read only lock
D. Read write
Answer» C. Read only lock
24.

State true or false: Using checkpoints reduces overhead

A. True
B. False
C. May be
D. Can't say
Answer» B. False
25.

A directed graph which represents the deadlock is called :

A. cycle graph
B. deadlock graph
C. wait-for graph
D. none of the above
Answer» D. none of the above
26.

The ___________ policy, allows the system to write modified blocks to disk even if the transactions thatmade those modifications have not all committed.

A. Force
B. No-force
C. Steal
D. No-steal
Answer» D. No-steal
27.

__________ starts from a position determined during analysis, and performs a redo, repeating history, to bring the database to a state it was in before the crash.

A. Analysis pass
B. Redo pass
C. Undo pass
D. None of the mentioned
Answer» C. Undo pass
28.

A transaction commits as soon as its commit log record is written to stable storage at the primary and the backup site.This is

A. One Safe
B. Two Safe
C. Two-very Safe
D. Very Safe
Answer» D. Very Safe
29.

If only the primary is active, the transaction is allowed to commit as soon as its commit log record is written to stable storage at the primary site. This is

A. One Safe
B. Two Safe
C. Two-very Safe
D. Very Safe
Answer» C. Two-very Safe
30.

If a transaction does not modify the database until it has committed it is said to use a _______ modification technique

A. Deferred
B. Immediate
C. More than one of the mentioned
D. None of the mentioned
Answer» B. Immediate
31.

________ dump, writes out SQL DDL statements and SQL insert statements to a file, which can then be reexecuted to re-create the database.

A. Archival
B. Fuzzy
C. SQL
D. All of the mentioned
Answer» D. All of the mentioned
32.

Rollback of transactions is normally used to :

A. recover from transaction failure
B. update the transaction
C. retrieve old records
D. repeat a transaction
Answer» B. update the transaction
33.

The partitions of the database into fixed length storage units are called as __________

A. Blocks
B. Tuples
C. Relations
D. None of the mentioned
Answer» B. Tuples
34.

The blocks residing on the disk are referred to as ___________

A. Physical blocks
B. Buffer blocks
C. Disk blocks
D. Disk buffer
Answer» B. Buffer blocks
35.

If the transaction can no longer continue with its normal execution because of some internal condition, it is called as a _________

A. Logical error
B. System error
C. System crash
D. None of the mentioned
Answer» B. System error
36.

State true or false: The destination block has incorrect information in case of a total failure

A. True
B. False
C. May be
D. Can't say
Answer» C. May be
37.

If a system has entered and undesirable state due to which it is unable to continue with normal execution, it is called as _________

A. Logical error
B. System error
C. System crash
D. None of the mentioned
Answer» C. System crash
38.

If there is a hardware malfunction or a bug in the database that causes the loss of content of volatile storage, it is called as ________

A. Logical error
B. System error
C. System crash
D. None of the mentioned
Answer» D. None of the mentioned
39.

A transaction performs on the isolation level of the Read Uncommitted if :

A. A dirty read occurs
B. Non-repeatable read occurs
C. Phantom reads occurs
D. All of the above
Answer» E.
40.

....... deals with soft errors, such as power failures.

A. system recovery
B. media recovery
C. database recovery
D. failure recovery
Answer» E.
41.

The __________________ contains a list of blocks that have been updated in the database buffer.

A. Latches
B. Swap Space
C. Dirty Block
D. None of the mentioned
Answer» D. None of the mentioned
42.

___________ determines which transactions to undo,which pages were dirty at the time of the crash, and the LSN from which the redo pass should start.

A. Analysis pass
B. Redo pass
C. Undo pass
D. None of the mentioned
Answer» B. Redo pass
43.

Transaction Throughput is :

A. Elapsed Time between submitting a transaction and receiving a transaction.
B. Average no. of transaction processed per second.
C. No. of resources used by a transaction.
D. None of the above
Answer» C. No. of resources used by a transaction.
44.

A dump of the database contents is also referred to as an _____________ dump.

A. Archival
B. Fuzzy
C. SQL
D. All of the mentioned
Answer» B. Fuzzy
45.

A special redo-only log record is written to the log, where V1 is the value being restored to data item Xj during the rollback. These log records are sometimes called

A. Log records
B. Records
C. Compensation log records
D. Compensation redo records
Answer» D. Compensation redo records
46.

Which of the following is not a classification of storage

A. Volatile storage
B. Nonvolatile storage
C. Stable storage
D. None of the mentioned
Answer» E.
47.

The area of memory where blocks temporarily reside is called as ________

A. Block buffer
B. Disk buffer
C. Physical buffer
D. None of the mentioned
Answer» C. Physical buffer
48.

______________ rolls back all transactions that were incomplete at the time of crash.

A. Analysis pass
B. Redo pass
C. Undo pass
D. None of the mentioned
Answer» D. None of the mentioned
49.

Which of the following is not a recovery technique?

A. Deferred update
B. Immediate update
C. Two-phase commit
D. Recovery management
Answer» D. Recovery management
50.

Which commands are used to control which users have which privilege over which objects ?

A. QUE and QUIST
B. GRANT and REVOKE
C. CASECADE and MVD
D. None of the above
Answer» C. CASECADE and MVD