

MCQOPTIONS
Saved Bookmarks
This section includes 1690 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
351. |
Restricting the child process to a subset of the parent’s resources prevents any process from |
A. | overloading the system by using a lot of secondary storage |
B. | under-loading the system by very less cpu utilization |
C. | overloading the system by creating a lot of sub-processes |
D. | crashing the system by utilizing multiple resources |
Answer» D. crashing the system by utilizing multiple resources | |
352. |
The register context and stacks of a thread are deallocated when the thread? |
A. | terminates |
B. | blocks |
C. | unblocks |
D. | spawns |
Answer» B. blocks | |
353. |
The signal operation of the semaphore basically works on the basic system call. |
A. | continue() |
B. | wakeup() |
C. | getup() |
D. | start() |
Answer» C. getup() | |
354. |
To ensure difficulties do not arise in the readers – writers problem are given exclusive access to the shared object. |
A. | readers |
B. | writers |
C. | readers and writers |
D. | none of the mentioned |
Answer» C. readers and writers | |
355. |
In information is recorded magnetically on platters. |
A. | magnetic disks |
B. | electrical disks |
C. | assemblies |
D. | cylinders |
Answer» B. electrical disks | |
356. |
Which of the following need not necessarily be saved on a context switch between processes? |
A. | general purpose registers |
B. | translation lookaside buffer |
C. | program counter |
D. | all of the mentioned |
Answer» C. program counter | |
357. |
Binding of instructions and data to memory addresses can be done at |
A. | compile time |
B. | load time |
C. | execution time |
D. | all of the mentioned |
Answer» E. | |
358. |
The FCFS algorithm is particularly troublesome for |
A. | time sharing systems |
B. | multiprogramming systems |
C. | multiprocessor systems |
D. | operating systems |
Answer» C. multiprocessor systems | |
359. |
Resource sharing helps |
A. | share the memory and resources of the process to which the threads belong |
B. | an application have several different threads of activity all within the same address space |
C. | reduce the address space that a process could potentially use |
D. | all of the mentioned |
Answer» E. | |
360. |
Which of the following are forms of malicious attack? |
A. | Theft of information |
B. | Modification of data |
C. | Wiping of information |
D. | All of the mentioned |
Answer» E. | |
361. |
For most computers, the bootstrap is stored in |
A. | ram |
B. | rom |
C. | cache |
D. | tertiary storage |
Answer» D. tertiary storage | |
362. |
A multilevel page table is preferred in comparison to a single level page table for translating virtual address to physical address because |
A. | it reduces the memory access time to read or write a memory location |
B. | it helps to reduce the size of page table needed to implement the virtual address space of a process |
C. | it is required by the translation lookaside buffer |
D. | it helps to reduce the number of page faults in page replacement algorithms |
Answer» C. it is required by the translation lookaside buffer | |
363. |
External fragmentation will not occur when? |
A. | first fit is used |
B. | best fit is used |
C. | worst fit is used |
D. | no matter which algorithm is used, it will always occur |
Answer» E. | |
364. |
Scheduling is done so as to |
A. | increase the waiting time |
B. | keep the waiting time the same |
C. | decrease the waiting time |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
365. |
Cost factors for process termination include |
A. | number of resources the deadlock process is not holding |
B. | cpu utilization at the time of deadlock |
C. | amount of time a deadlocked process has thus far consumed during its execution |
D. | all of the mentioned |
Answer» D. all of the mentioned | |
366. |
Which is the process of invoking the wait |
A. | transaction |
B. | operation |
C. | function |
D. | all of the mentioned |
Answer» B. operation | |
367. |
What is a Process Control Block? |
A. | process type variable |
B. | data structure |
C. | a secondary storage section |
D. | a block in memory |
Answer» C. a secondary storage section | |
368. |
A device similar to a flash drive |
A. | memory card |
B. | compact drive |
C. | compact disk |
D. | memory disk |
Answer» B. compact drive | |
369. |
If deadlocks occur frequently, the detection algorithm must be invoked |
A. | rarely |
B. | frequently |
C. | rarely & frequently |
D. | none of the mentioned |
Answer» C. rarely & frequently | |
370. |
For a deadlock to arise, which of the following conditions must hold simultaneously? |
A. | mutual exclusion |
B. | no preemption |
C. | hold and wait |
D. | all of the mentioned |
Answer» E. | |
371. |
What is Address Binding? |
A. | going to an address in memory |
B. | locating an address with the help of another address |
C. | binding two addresses together to form a new address in a different memory space |
D. | a mapping from one address space to another |
Answer» E. | |
372. |
The wait-for graph is a deadlock detection algorithm that is applicable when |
A. | all resources have a single instance |
B. | all resources have multiple instances |
C. | all resources have a single 7 multiple instances |
D. | all of the mentioned |
Answer» B. all resources have multiple instances | |
373. |
A type of middleware that allows for between the built-in applications and the real- time OS? |
A. | firmware |
B. | database middleware |
C. | portals |
D. | embedded middleware |
Answer» E. | |
374. |
When the valid – invalid bit is set to valid, it means that the associated page |
A. | is in the tlb |
B. | has data in it |
C. | is in the process’s logical address space |
D. | is the system’s physical address space |
Answer» D. is the system’s physical address space | |
375. |
If the memory access time is denoted by ‘ma’ and ‘p’ is the probability of a page fault (0 |
A. | p x ma + (1-p) x page fault time |
B. | ma + page fault time |
C. | (1-p) x ma + p x page fault time |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
376. |
If binding is done at assembly or load time, then the process be moved to different locations after being swapped out and in again. |
A. | can |
B. | must |
C. | can never |
D. | may |
Answer» D. may | |
377. |
Caching |
A. | holds a copy of the data |
B. | is fast memory |
C. | holds the only copy of the data |
D. | holds output for a device |
Answer» B. is fast memory | |
378. |
A solution to the problem of external fragmentation is |
A. | compaction |
B. | larger memory space |
C. | smaller memory space |
D. | none of the mentioned |
Answer» B. larger memory space | |
379. |
A process is selected from the queue by the scheduler, to be executed. |
A. | blocked, short term |
B. | wait, long term |
C. | ready, short term |
D. | ready, long term |
Answer» D. ready, long term | |
380. |
The kernel data structures include |
A. | process table |
B. | open file table |
C. | close file table |
D. | all of the mentioned |
Answer» C. close file table | |
381. |
What will happen when a process terminates? |
A. | it is removed from all queues |
B. | it is removed from all, but the job queue |
C. | its process control block is de-allocated |
D. | its process control block is never de- allocated |
Answer» B. it is removed from all, but the job queue | |
382. |
You have written a shell script that must be run as root in order to work properly. What is the most secure way to give a normal user the ability to run this program? |
A. | Set permissions to 777 on the script |
B. | Make the user a member of the root group |
C. | Make the user the owner of the script |
D. | Set the SUID bit on the script |
Answer» B. Make the user a member of the root group | |
383. |
Which of the following has greater market share of Linux SW/HW |
A. | Linux on z10 |
B. | Linux HP integrity server |
C. | Linux on AS/400 servers locate |
D. | Linux on DELL Xeon |
Answer» B. Linux HP integrity server | |
384. |
What command allows you to logout of the system? |
A. | lgt |
B. | logout |
C. | logot |
D. | out |
Answer» C. logot | |
385. |
What is the purpose of the following operator? >> |
A. | It is used to send the output of one command so it becomes the input of a second command. |
B. | It is used to send both input and output to the same file. |
C. | It is used to overwrite the contents of a file. |
D. | It appends data to a file without overwriting it. |
Answer» E. | |
386. |
Which of the following command can be used to rename a file in LINUX? |
A. | ren |
B. | mv |
C. | remove |
D. | change |
Answer» C. remove | |
387. |
How would you remove a directory that is not empty? |
A. | rm -r |
B. | rm -f |
C. | rmdir -f |
D. | rmdir -le |
Answer» B. rm -f | |
388. |
How do you copy an entire directory structure? E.g. from Project to Project.backup |
A. | cp -r Project Project.backup |
B. | cp -e Project Project.backup |
C. | cp -d Project Project.backup |
D. | cp -s Project Project.backup |
Answer» B. cp -e Project Project.backup | |
389. |
How do you display the kernel release? |
A. | kernel -r |
B. | uname -r |
C. | cat /proc/etc/kernel/release |
D. | cat /etc/config/kernel/release |
Answer» C. cat /proc/etc/kernel/release | |
390. |
What is the full path for grub's configuration file |
A. | /boot/grub/lsof.conf |
B. | /boot/grub/menu.lst |
C. | /etc/grub/grub.conf |
D. | /etc/grub/grub.txt |
Answer» C. /etc/grub/grub.conf | |
391. |
You want to change the permissions on the file named “fifteen” so that root has all permissions and they are denied all other users. Which command should you use? |
A. | chmod fifteen 700 |
B. | chmod 100 fifteen |
C. | chmod 700 fifteen |
D. | chmod fifteen 100 |
Answer» D. chmod fifteen 100 | |
392. |
Which of the following modes of operation exist in vi? |
A. | insert |
B. | type |
C. | search |
D. | remove |
Answer» B. type | |
393. |
.............is the command used to create new directory. |
A. | mkdir |
B. | newdir |
C. | dir |
D. | mk/dir |
Answer» B. newdir | |
394. |
How would you switch to virtual terminal 1? |
A. | Ctrl+Alt+F1 |
B. | Alt+F1 |
C. | Ctrl+F1 |
D. | Shift+Ctrl+F1 |
Answer» B. Alt+F1 | |
395. |
55. Which of the following is the main Apache configuration file? |
A. | httpd.conf |
B. | apache.con |
C. | /etc/profile |
D. | system.ini |
Answer» B. apache.con | |
396. |
Which command to use for complete details of a command on the shell? |
A. | help |
B. | ? |
C. | man |
D. | hlp |
Answer» D. hlp | |
397. |
Which file determines what will be run at each runlevel? |
A. | /etc/init/runlevels |
B. | /etc/levels/fstab |
C. | /etc/fstab |
D. | /etc/inittab |
Answer» E. | |
398. |
How do you create a crontab entry? |
A. | crontab --create |
B. | crontab -make |
C. | crontab -e |
D. | crontab –c |
Answer» D. crontab –c | |
399. |
What command, followed by the directory name is used to access that specific directory? |
A. | cp |
B. | cd |
C. | access |
D. | acs |
Answer» C. access | |
400. |
How do you see hidden files in your home directory? |
A. | ls -h |
B. | ls -la |
C. | ls -hn |
D. | ls -R |
Answer» C. ls -hn | |