Explore topic-wise MCQs in Technical Programming.

This section includes 1690 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.

351.

Restricting the child process to a subset of the parent’s resources prevents any process from

A. overloading the system by using a lot of secondary storage
B. under-loading the system by very less cpu utilization
C. overloading the system by creating a lot of sub-processes
D. crashing the system by utilizing multiple resources
Answer» D. crashing the system by utilizing multiple resources
352.

The register context and stacks of a thread are deallocated when the thread?

A. terminates
B. blocks
C. unblocks
D. spawns
Answer» B. blocks
353.

The signal operation of the semaphore basically works on the basic                system call.

A. continue()
B. wakeup()
C. getup()
D. start()
Answer» C. getup()
354.

To ensure difficulties do not arise in the readers – writers problem                are given exclusive access to the shared object.

A. readers
B. writers
C. readers and writers
D. none of the mentioned
Answer» C. readers and writers
355.

In                information is recorded magnetically on platters.

A. magnetic disks
B. electrical disks
C. assemblies
D. cylinders
Answer» B. electrical disks
356.

Which of the following need not necessarily be saved on a context switch between processes?

A. general purpose registers
B. translation lookaside buffer
C. program counter
D. all of the mentioned
Answer» C. program counter
357.

Binding of instructions and data to memory addresses can be done at

A. compile time
B. load time
C. execution time
D. all of the mentioned
Answer» E.
358.

The FCFS algorithm is particularly troublesome for

A. time sharing systems
B. multiprogramming systems
C. multiprocessor systems
D. operating systems
Answer» C. multiprocessor systems
359.

Resource sharing helps

A. share the memory and resources of the process to which the threads belong
B. an application have several different threads of activity all within the same address space
C. reduce the address space that a process could potentially use
D. all of the mentioned
Answer» E.
360.

Which of the following are forms of malicious attack?

A. Theft of information
B. Modification of data
C. Wiping of information
D. All of the mentioned
Answer» E.
361.

For most computers, the bootstrap is stored in

A. ram
B. rom
C. cache
D. tertiary storage
Answer» D. tertiary storage
362.

A multilevel page table is preferred in comparison to a single level page table for translating virtual address to physical address because

A. it reduces the memory access time to read or write a memory location
B. it helps to reduce the size of page table needed to implement the virtual address space of a process
C. it is required by the translation lookaside buffer
D. it helps to reduce the number of page faults in page replacement algorithms
Answer» C. it is required by the translation lookaside buffer
363.

External fragmentation will not occur when?

A. first fit is used
B. best fit is used
C. worst fit is used
D. no matter which algorithm is used, it will always occur
Answer» E.
364.

Scheduling is done so as to

A. increase the waiting time
B. keep the waiting time the same
C. decrease the waiting time
D. none of the mentioned
Answer» D. none of the mentioned
365.

Cost factors for process termination include

A. number of resources the deadlock process is not holding
B. cpu utilization at the time of deadlock
C. amount of time a deadlocked process has thus far consumed during its execution
D. all of the mentioned
Answer» D. all of the mentioned
366.

Which is the process of invoking the wait

A. transaction
B. operation
C. function
D. all of the mentioned
Answer» B. operation
367.

What is a Process Control Block?

A. process type variable
B. data structure
C. a secondary storage section
D. a block in memory
Answer» C. a secondary storage section
368.

A device similar to a flash drive

A. memory card
B. compact drive
C. compact disk
D. memory disk
Answer» B. compact drive
369.

If deadlocks occur frequently, the detection algorithm must be invoked

A. rarely
B. frequently
C. rarely & frequently
D. none of the mentioned
Answer» C. rarely & frequently
370.

For a deadlock to arise, which of the following conditions must hold simultaneously?

A. mutual exclusion
B. no preemption
C. hold and wait
D. all of the mentioned
Answer» E.
371.

What is Address Binding?

A. going to an address in memory
B. locating an address with the help of another address
C. binding two addresses together to form a new address in a different memory space
D. a mapping from one address space to another
Answer» E.
372.

The wait-for graph is a deadlock detection algorithm that is applicable when

A. all resources have a single instance
B. all resources have multiple instances
C. all resources have a single 7 multiple instances
D. all of the mentioned
Answer» B. all resources have multiple instances
373.

A type of middleware that allows for between the built-in applications and the real- time OS?

A. firmware
B. database middleware
C. portals
D. embedded middleware
Answer» E.
374.

When the valid – invalid bit is set to valid, it means that the associated page

A. is in the tlb
B. has data in it
C. is in the process’s logical address space
D. is the system’s physical address space
Answer» D. is the system’s physical address space
375.

If the memory access time is denoted by ‘ma’ and ‘p’ is the probability of a page fault (0

A. p x ma + (1-p) x page fault time
B. ma + page fault time
C. (1-p) x ma + p x page fault time
D. none of the mentioned
Answer» D. none of the mentioned
376.

If binding is done at assembly or load time, then the process            be moved to different locations after being swapped out and in again.

A. can
B. must
C. can never
D. may
Answer» D. may
377.

Caching

A. holds a copy of the data
B. is fast memory
C. holds the only copy of the data
D. holds output for a device
Answer» B. is fast memory
378.

A solution to the problem of external fragmentation is

A. compaction
B. larger memory space
C. smaller memory space
D. none of the mentioned
Answer» B. larger memory space
379.

A process is selected from the               queue by the                  scheduler, to be executed.

A. blocked, short term
B. wait, long term
C. ready, short term
D. ready, long term
Answer» D. ready, long term
380.

The kernel data structures include

A. process table
B. open file table
C. close file table
D. all of the mentioned
Answer» C. close file table
381.

What will happen when a process terminates?

A. it is removed from all queues
B. it is removed from all, but the job queue
C. its process control block is de-allocated
D. its process control block is never de- allocated
Answer» B. it is removed from all, but the job queue
382.

You have written a shell script that must be run as root in order to work properly. What is the most secure way to give a normal user the ability to run this program?

A. Set permissions to 777 on the script
B. Make the user a member of the root group
C. Make the user the owner of the script
D. Set the SUID bit on the script
Answer» B. Make the user a member of the root group
383.

Which of the following has greater market share of Linux SW/HW

A. Linux on z10
B. Linux HP integrity server
C. Linux on AS/400 servers locate
D. Linux on DELL Xeon
Answer» B. Linux HP integrity server
384.

What command allows you to logout of the system?

A. lgt
B. logout
C. logot
D. out
Answer» C. logot
385.

What is the purpose of the following operator? >>

A. It is used to send the output of one command so it becomes the input of a second command.
B. It is used to send both input and output to the same file.
C. It is used to overwrite the contents of a file.
D. It appends data to a file without overwriting it.
Answer» E.
386.

Which of the following command can be used to rename a file in LINUX?

A. ren
B. mv
C. remove
D. change
Answer» C. remove
387.

How would you remove a directory that is not empty?

A. rm -r
B. rm -f
C. rmdir -f
D. rmdir -le
Answer» B. rm -f
388.

How do you copy an entire directory structure? E.g. from Project to Project.backup

A. cp -r Project Project.backup
B. cp -e Project Project.backup
C. cp -d Project Project.backup
D. cp -s Project Project.backup
Answer» B. cp -e Project Project.backup
389.

How do you display the kernel release?

A. kernel -r
B. uname -r
C. cat /proc/etc/kernel/release
D. cat /etc/config/kernel/release
Answer» C. cat /proc/etc/kernel/release
390.

What is the full path for grub's configuration file

A. /boot/grub/lsof.conf
B. /boot/grub/menu.lst
C. /etc/grub/grub.conf
D. /etc/grub/grub.txt
Answer» C. /etc/grub/grub.conf
391.

You want to change the permissions on the file named “fifteen” so that root has all permissions and they are denied all other users. Which command should you use?

A. chmod fifteen 700
B. chmod 100 fifteen
C. chmod 700 fifteen
D. chmod fifteen 100
Answer» D. chmod fifteen 100
392.

Which of the following modes of operation exist in vi?

A. insert
B. type
C. search
D. remove
Answer» B. type
393.

.............is the command used to create new directory.

A. mkdir
B. newdir
C. dir
D. mk/dir
Answer» B. newdir
394.

How would you switch to virtual terminal 1?

A. Ctrl+Alt+F1
B. Alt+F1
C. Ctrl+F1
D. Shift+Ctrl+F1
Answer» B. Alt+F1
395.

55. Which of the following is the main Apache configuration file?

A. httpd.conf
B. apache.con
C. /etc/profile
D. system.ini
Answer» B. apache.con
396.

Which command to use for complete details of a command on the shell?

A. help
B. ?
C. man
D. hlp
Answer» D. hlp
397.

Which file determines what will be run at each runlevel?

A. /etc/init/runlevels
B. /etc/levels/fstab
C. /etc/fstab
D. /etc/inittab
Answer» E.
398.

How do you create a crontab entry?

A. crontab --create
B. crontab -make
C. crontab -e
D. crontab –c
Answer» D. crontab –c
399.

What command, followed by the directory name is used to access that specific directory?

A. cp
B. cd
C. access
D. acs
Answer» C. access
400.

How do you see hidden files in your home directory?

A. ls -h
B. ls -la
C. ls -hn
D. ls -R
Answer» C. ls -hn