Explore topic-wise MCQs in Technical Questions.

This section includes 487 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Questions knowledge and support exam preparation. Choose a topic below to get started.

151.

Secure system concerned with protecting the system against

A. User
B. Security
C. Interruption
D. Damage
Answer» D. Damage
152.

Operating system is mainly comprised of

A. user programs
B. system programs
C. third party programs
D. both a and b
Answer» E.
153.

Technique that effectively doubles capacity of a disk is known to be

A. Data compression utility
B. Disk compression utility
C. System compression utility
D. Block compression utility
Answer» B. Disk compression utility
154.

Systems designed for multiprogramming must provide some type of

A. Authorization
B. Algorithms
C. Memory Protection
D. Functions
Answer» D. Functions
155.

Files often used with sequential access storage media are called

A. Linear access files
B. Procedural access files
C. Sequential access files
D. Structural access files
Answer» D. Structural access files
156.

New disk is formatted according to requirements of associated operating system with utility program of

A. Disk formatting utility
B. Data formatting utility
C. Disk compression utility
D. Data compression utility
Answer» B. Data formatting utility
157.

Operating system provides System access function to protect

A. I/O Modules
B. Computer
C. Memory
D. Data and Resources
Answer» E.
158.

Getting device attributes of computer system is a

A. process control
B. file management
C. device management
D. information maintenance
Answer» E.
159.

According to definition, primary objectives of an operating system can be classified into

A. Two types
B. Three types
C. Four types
D. Five types
Answer» B. Three types
160.

The approach in which one thread immediately terminates the target thread is known as ___________ cancellation

A. Deferred
B. Asynchronous
C. Synchronous
D. Multithread
Answer» C. Synchronous
161.

Operating system's module that is responsible for protection of files is known to be

A. File management
B. Command interpretation
C. Security
D. Process management
Answer» B. Command interpretation
162.

The hardware part of the computer system includes

A. CPU
B. memory
C. user
D. both a and b
Answer» E.
163.

A control card is a ________ system concept

A. time-sharing
B. network
C. batch
D. distributed
Answer» D. distributed
164.

The number of bytes read during the last read is known as _______ bytesRead

A. HANDLE
B. DWORD
C. LPDWORD
D. LPOVERLAPPED
Answer» D. LPOVERLAPPED
165.

The basic unit of computer storage is

A. byte
B. nibble
C. bit
D. word
Answer» D. word
166.

Records are stored in a determined order one after another by key field value, in process of

A. Sequential files
B. Structured files
C. Procedural files
D. Absolute files
Answer» B. Structured files
167.

All current data relevant to an application is stored in

A. Transaction file
B. Master file
C. Run time file
D. Processing file
Answer» C. Run time file
168.

Time sharing of the operating system provides direct communication between

A. users
B. systems
C. nodes
D. both a and b
Answer» E.
169.

Multiprocessing systems require sophisticated operating system to schedule and coordinate

A. Input activities
B. Output activities
C. Processing activities
D. All of the Above
Answer» E.
170.

A _______ is a technique for passing information from one program process to another

A. job
B. pipe
C. user
D. network
Answer» C. user
171.

Operating system programs that are manipulated are asked by the

A. programmer
B. open source
C. operating system
D. user
Answer» E.
172.

Power failure of the computer system is one of the kinds of

A. inputs
B. outputs
C. error
D. memory
Answer» D. memory
173.

Memory that is between the main memory and register of the computer system is

A. cache
B. ROM
C. RAM
D. CD
Answer» B. ROM
174.

Linux runs on a very large range of

A. Network Architecture
B. Hardware Architecture
C. Software Architecture
D. Processor Architecture
Answer» E.
175.

Programs of the operating system usually end

A. normally
B. abnormally
C. by default
D. when error occurs
Answer» B. abnormally
176.

The system structure of the Linux is

A. Microsoft Windows
B. UNIX
C. Window Vista
D. Monolithic Kernel
Answer» E.
177.

User interface of operating system programs is provided by

A. inputs
B. outputs
C. operating system
D. memory
Answer» D. memory
178.

The OS is responsible for transferring data to

A. memory
B. I/O devices
C. ALU
D. monitor
Answer» C. ALU
179.

_______ searches for smallest block. The fragment left behind is small as possible.

A. best fit
B. first fit
C. next fit
D. last fit
Answer» B. first fit
180.

The portion where monitor must always be in main memory and available is referred as

A. Direct Memory Access DMA
B. Monitor
C. Control Monitor
D. Resident Monitor
Answer» E.
181.

In a computer system, sharing of files is key task of

A. Resource management
B. File management
C. Operation management
D. Process management
Answer» C. Operation management
182.

Privileged mode of the operating system mode is a

A. user code
B. kernel mode
C. system mode
D. both b and c
Answer» C. system mode
183.

Depending on CPU utilization during course of processing, jobs can be classified into

A. Two types
B. Three types
C. Four types
D. Five types
Answer» B. Three types
184.

Many user terminals are connected simultaneously to same computer in process of

A. Loosely coupled systems
B. Loosely coupled systems
C. Time sharing systems
D. Threaded systems
Answer» D. Threaded systems
185.

Interfaces of the operating system provides

A. creation
B. designing
C. deletion
D. portability
Answer» E.
186.

Beowulf clusters of the computer system uses

A. close source softwares
B. open source softwares
C. dedicated softwares
D. both a and b
Answer» C. dedicated softwares
187.

Application developers have no direct access to system calls but they can access through

A. memory
B. Computer Interface
C. application programming interface (API).
D. registers
Answer» D. registers
188.

Data integrity protect data from unauthorized

A. Access
B. Control
C. Modification
D. Interruption
Answer» D. Interruption
189.

User data are stored in

A. cache
B. Secondary storage
C. indexes
D. Main memory
Answer» C. indexes
190.

At operating system level, file access methods can be classified into

A. Two types
B. Three types
C. Four types
D. Five types
Answer» B. Three types
191.

Master slave relationship in the computer system is used by

A. symmetric multiprocessor
B. asymmetric multiprocessor
C. symmetric multiprocessing
D. asymmetric multiprocessing
Answer» E.
192.

Software which controls general operations of computer system is classified as

A. dump programs
B. function system
C. operating system
D. inquiry system
Answer» D. inquiry system
193.

Readfile() function of the operating system is for reading

A. command
B. processes
C. programs
D. files
Answer» E.
194.

Solaris operating system is the operating system that provides

A. symmetric multiprocessor
B. slave relationship
C. symmetric multiprocessing
D. asymmetric multiprocessing
Answer» D. asymmetric multiprocessing
195.

Each job executed simultaneously, occupies space in main memory, which is known as

A. Memory sector
B. Memory packet
C. Memory partition
D. Memory slack
Answer» D. Memory slack
196.

Concurrent execution of multiple jobs in a single-user system is known to be

A. Multitasking
B. Multischeduling
C. Multiprogramming
D. Multiprocessing
Answer» B. Multischeduling
197.

Frequently used functions and operations are stored in

A. Library programs
B. Utility programs
C. Formatting programs
D. Compressed programs
Answer» B. Utility programs
198.

Operation to change a user settable attributes of a file, is named to be

A. declare attribute
B. define attribute
C. get attribute
D. set attribute
Answer» E.
199.

Process to exit from computer by giving correct instructions such as 'EXIT' is classified as

A. log in
B. process out
C. process in
D. log out
Answer» E.
200.

With the use of multiprogramming batch processing work can be

A. Efficient
B. Rigid
C. Expensive
D. Flexible
Answer» B. Rigid