MCQOPTIONS
Saved Bookmarks
This section includes 1690 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
| 351. |
Restricting the child process to a subset of the parent’s resources prevents any process from |
| A. | overloading the system by using a lot of secondary storage |
| B. | under-loading the system by very less cpu utilization |
| C. | overloading the system by creating a lot of sub-processes |
| D. | crashing the system by utilizing multiple resources |
| Answer» D. crashing the system by utilizing multiple resources | |
| 352. |
The register context and stacks of a thread are deallocated when the thread? |
| A. | terminates |
| B. | blocks |
| C. | unblocks |
| D. | spawns |
| Answer» B. blocks | |
| 353. |
The signal operation of the semaphore basically works on the basic system call. |
| A. | continue() |
| B. | wakeup() |
| C. | getup() |
| D. | start() |
| Answer» C. getup() | |
| 354. |
To ensure difficulties do not arise in the readers – writers problem are given exclusive access to the shared object. |
| A. | readers |
| B. | writers |
| C. | readers and writers |
| D. | none of the mentioned |
| Answer» C. readers and writers | |
| 355. |
In information is recorded magnetically on platters. |
| A. | magnetic disks |
| B. | electrical disks |
| C. | assemblies |
| D. | cylinders |
| Answer» B. electrical disks | |
| 356. |
Which of the following need not necessarily be saved on a context switch between processes? |
| A. | general purpose registers |
| B. | translation lookaside buffer |
| C. | program counter |
| D. | all of the mentioned |
| Answer» C. program counter | |
| 357. |
Binding of instructions and data to memory addresses can be done at |
| A. | compile time |
| B. | load time |
| C. | execution time |
| D. | all of the mentioned |
| Answer» E. | |
| 358. |
The FCFS algorithm is particularly troublesome for |
| A. | time sharing systems |
| B. | multiprogramming systems |
| C. | multiprocessor systems |
| D. | operating systems |
| Answer» C. multiprocessor systems | |
| 359. |
Resource sharing helps |
| A. | share the memory and resources of the process to which the threads belong |
| B. | an application have several different threads of activity all within the same address space |
| C. | reduce the address space that a process could potentially use |
| D. | all of the mentioned |
| Answer» E. | |
| 360. |
Which of the following are forms of malicious attack? |
| A. | Theft of information |
| B. | Modification of data |
| C. | Wiping of information |
| D. | All of the mentioned |
| Answer» E. | |
| 361. |
For most computers, the bootstrap is stored in |
| A. | ram |
| B. | rom |
| C. | cache |
| D. | tertiary storage |
| Answer» D. tertiary storage | |
| 362. |
A multilevel page table is preferred in comparison to a single level page table for translating virtual address to physical address because |
| A. | it reduces the memory access time to read or write a memory location |
| B. | it helps to reduce the size of page table needed to implement the virtual address space of a process |
| C. | it is required by the translation lookaside buffer |
| D. | it helps to reduce the number of page faults in page replacement algorithms |
| Answer» C. it is required by the translation lookaside buffer | |
| 363. |
External fragmentation will not occur when? |
| A. | first fit is used |
| B. | best fit is used |
| C. | worst fit is used |
| D. | no matter which algorithm is used, it will always occur |
| Answer» E. | |
| 364. |
Scheduling is done so as to |
| A. | increase the waiting time |
| B. | keep the waiting time the same |
| C. | decrease the waiting time |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 365. |
Cost factors for process termination include |
| A. | number of resources the deadlock process is not holding |
| B. | cpu utilization at the time of deadlock |
| C. | amount of time a deadlocked process has thus far consumed during its execution |
| D. | all of the mentioned |
| Answer» D. all of the mentioned | |
| 366. |
Which is the process of invoking the wait |
| A. | transaction |
| B. | operation |
| C. | function |
| D. | all of the mentioned |
| Answer» B. operation | |
| 367. |
What is a Process Control Block? |
| A. | process type variable |
| B. | data structure |
| C. | a secondary storage section |
| D. | a block in memory |
| Answer» C. a secondary storage section | |
| 368. |
A device similar to a flash drive |
| A. | memory card |
| B. | compact drive |
| C. | compact disk |
| D. | memory disk |
| Answer» B. compact drive | |
| 369. |
If deadlocks occur frequently, the detection algorithm must be invoked |
| A. | rarely |
| B. | frequently |
| C. | rarely & frequently |
| D. | none of the mentioned |
| Answer» C. rarely & frequently | |
| 370. |
For a deadlock to arise, which of the following conditions must hold simultaneously? |
| A. | mutual exclusion |
| B. | no preemption |
| C. | hold and wait |
| D. | all of the mentioned |
| Answer» E. | |
| 371. |
What is Address Binding? |
| A. | going to an address in memory |
| B. | locating an address with the help of another address |
| C. | binding two addresses together to form a new address in a different memory space |
| D. | a mapping from one address space to another |
| Answer» E. | |
| 372. |
The wait-for graph is a deadlock detection algorithm that is applicable when |
| A. | all resources have a single instance |
| B. | all resources have multiple instances |
| C. | all resources have a single 7 multiple instances |
| D. | all of the mentioned |
| Answer» B. all resources have multiple instances | |
| 373. |
A type of middleware that allows for between the built-in applications and the real- time OS? |
| A. | firmware |
| B. | database middleware |
| C. | portals |
| D. | embedded middleware |
| Answer» E. | |
| 374. |
When the valid – invalid bit is set to valid, it means that the associated page |
| A. | is in the tlb |
| B. | has data in it |
| C. | is in the process’s logical address space |
| D. | is the system’s physical address space |
| Answer» D. is the system’s physical address space | |
| 375. |
If the memory access time is denoted by ‘ma’ and ‘p’ is the probability of a page fault (0 |
| A. | p x ma + (1-p) x page fault time |
| B. | ma + page fault time |
| C. | (1-p) x ma + p x page fault time |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 376. |
If binding is done at assembly or load time, then the process be moved to different locations after being swapped out and in again. |
| A. | can |
| B. | must |
| C. | can never |
| D. | may |
| Answer» D. may | |
| 377. |
Caching |
| A. | holds a copy of the data |
| B. | is fast memory |
| C. | holds the only copy of the data |
| D. | holds output for a device |
| Answer» B. is fast memory | |
| 378. |
A solution to the problem of external fragmentation is |
| A. | compaction |
| B. | larger memory space |
| C. | smaller memory space |
| D. | none of the mentioned |
| Answer» B. larger memory space | |
| 379. |
A process is selected from the queue by the scheduler, to be executed. |
| A. | blocked, short term |
| B. | wait, long term |
| C. | ready, short term |
| D. | ready, long term |
| Answer» D. ready, long term | |
| 380. |
The kernel data structures include |
| A. | process table |
| B. | open file table |
| C. | close file table |
| D. | all of the mentioned |
| Answer» C. close file table | |
| 381. |
What will happen when a process terminates? |
| A. | it is removed from all queues |
| B. | it is removed from all, but the job queue |
| C. | its process control block is de-allocated |
| D. | its process control block is never de- allocated |
| Answer» B. it is removed from all, but the job queue | |
| 382. |
You have written a shell script that must be run as root in order to work properly. What is the most secure way to give a normal user the ability to run this program? |
| A. | Set permissions to 777 on the script |
| B. | Make the user a member of the root group |
| C. | Make the user the owner of the script |
| D. | Set the SUID bit on the script |
| Answer» B. Make the user a member of the root group | |
| 383. |
Which of the following has greater market share of Linux SW/HW |
| A. | Linux on z10 |
| B. | Linux HP integrity server |
| C. | Linux on AS/400 servers locate |
| D. | Linux on DELL Xeon |
| Answer» B. Linux HP integrity server | |
| 384. |
What command allows you to logout of the system? |
| A. | lgt |
| B. | logout |
| C. | logot |
| D. | out |
| Answer» C. logot | |
| 385. |
What is the purpose of the following operator? >> |
| A. | It is used to send the output of one command so it becomes the input of a second command. |
| B. | It is used to send both input and output to the same file. |
| C. | It is used to overwrite the contents of a file. |
| D. | It appends data to a file without overwriting it. |
| Answer» E. | |
| 386. |
Which of the following command can be used to rename a file in LINUX? |
| A. | ren |
| B. | mv |
| C. | remove |
| D. | change |
| Answer» C. remove | |
| 387. |
How would you remove a directory that is not empty? |
| A. | rm -r |
| B. | rm -f |
| C. | rmdir -f |
| D. | rmdir -le |
| Answer» B. rm -f | |
| 388. |
How do you copy an entire directory structure? E.g. from Project to Project.backup |
| A. | cp -r Project Project.backup |
| B. | cp -e Project Project.backup |
| C. | cp -d Project Project.backup |
| D. | cp -s Project Project.backup |
| Answer» B. cp -e Project Project.backup | |
| 389. |
How do you display the kernel release? |
| A. | kernel -r |
| B. | uname -r |
| C. | cat /proc/etc/kernel/release |
| D. | cat /etc/config/kernel/release |
| Answer» C. cat /proc/etc/kernel/release | |
| 390. |
What is the full path for grub's configuration file |
| A. | /boot/grub/lsof.conf |
| B. | /boot/grub/menu.lst |
| C. | /etc/grub/grub.conf |
| D. | /etc/grub/grub.txt |
| Answer» C. /etc/grub/grub.conf | |
| 391. |
You want to change the permissions on the file named “fifteen” so that root has all permissions and they are denied all other users. Which command should you use? |
| A. | chmod fifteen 700 |
| B. | chmod 100 fifteen |
| C. | chmod 700 fifteen |
| D. | chmod fifteen 100 |
| Answer» D. chmod fifteen 100 | |
| 392. |
Which of the following modes of operation exist in vi? |
| A. | insert |
| B. | type |
| C. | search |
| D. | remove |
| Answer» B. type | |
| 393. |
.............is the command used to create new directory. |
| A. | mkdir |
| B. | newdir |
| C. | dir |
| D. | mk/dir |
| Answer» B. newdir | |
| 394. |
How would you switch to virtual terminal 1? |
| A. | Ctrl+Alt+F1 |
| B. | Alt+F1 |
| C. | Ctrl+F1 |
| D. | Shift+Ctrl+F1 |
| Answer» B. Alt+F1 | |
| 395. |
55. Which of the following is the main Apache configuration file? |
| A. | httpd.conf |
| B. | apache.con |
| C. | /etc/profile |
| D. | system.ini |
| Answer» B. apache.con | |
| 396. |
Which command to use for complete details of a command on the shell? |
| A. | help |
| B. | ? |
| C. | man |
| D. | hlp |
| Answer» D. hlp | |
| 397. |
Which file determines what will be run at each runlevel? |
| A. | /etc/init/runlevels |
| B. | /etc/levels/fstab |
| C. | /etc/fstab |
| D. | /etc/inittab |
| Answer» E. | |
| 398. |
How do you create a crontab entry? |
| A. | crontab --create |
| B. | crontab -make |
| C. | crontab -e |
| D. | crontab –c |
| Answer» D. crontab –c | |
| 399. |
What command, followed by the directory name is used to access that specific directory? |
| A. | cp |
| B. | cd |
| C. | access |
| D. | acs |
| Answer» C. access | |
| 400. |
How do you see hidden files in your home directory? |
| A. | ls -h |
| B. | ls -la |
| C. | ls -hn |
| D. | ls -R |
| Answer» C. ls -hn | |