MCQOPTIONS
Saved Bookmarks
This section includes 487 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Questions knowledge and support exam preparation. Choose a topic below to get started.
| 151. |
Secure system concerned with protecting the system against |
| A. | User |
| B. | Security |
| C. | Interruption |
| D. | Damage |
| Answer» D. Damage | |
| 152. |
Operating system is mainly comprised of |
| A. | user programs |
| B. | system programs |
| C. | third party programs |
| D. | both a and b |
| Answer» E. | |
| 153. |
Technique that effectively doubles capacity of a disk is known to be |
| A. | Data compression utility |
| B. | Disk compression utility |
| C. | System compression utility |
| D. | Block compression utility |
| Answer» B. Disk compression utility | |
| 154. |
Systems designed for multiprogramming must provide some type of |
| A. | Authorization |
| B. | Algorithms |
| C. | Memory Protection |
| D. | Functions |
| Answer» D. Functions | |
| 155. |
Files often used with sequential access storage media are called |
| A. | Linear access files |
| B. | Procedural access files |
| C. | Sequential access files |
| D. | Structural access files |
| Answer» D. Structural access files | |
| 156. |
New disk is formatted according to requirements of associated operating system with utility program of |
| A. | Disk formatting utility |
| B. | Data formatting utility |
| C. | Disk compression utility |
| D. | Data compression utility |
| Answer» B. Data formatting utility | |
| 157. |
Operating system provides System access function to protect |
| A. | I/O Modules |
| B. | Computer |
| C. | Memory |
| D. | Data and Resources |
| Answer» E. | |
| 158. |
Getting device attributes of computer system is a |
| A. | process control |
| B. | file management |
| C. | device management |
| D. | information maintenance |
| Answer» E. | |
| 159. |
According to definition, primary objectives of an operating system can be classified into |
| A. | Two types |
| B. | Three types |
| C. | Four types |
| D. | Five types |
| Answer» B. Three types | |
| 160. |
The approach in which one thread immediately terminates the target thread is known as ___________ cancellation |
| A. | Deferred |
| B. | Asynchronous |
| C. | Synchronous |
| D. | Multithread |
| Answer» C. Synchronous | |
| 161. |
Operating system's module that is responsible for protection of files is known to be |
| A. | File management |
| B. | Command interpretation |
| C. | Security |
| D. | Process management |
| Answer» B. Command interpretation | |
| 162. |
The hardware part of the computer system includes |
| A. | CPU |
| B. | memory |
| C. | user |
| D. | both a and b |
| Answer» E. | |
| 163. |
A control card is a ________ system concept |
| A. | time-sharing |
| B. | network |
| C. | batch |
| D. | distributed |
| Answer» D. distributed | |
| 164. |
The number of bytes read during the last read is known as _______ bytesRead |
| A. | HANDLE |
| B. | DWORD |
| C. | LPDWORD |
| D. | LPOVERLAPPED |
| Answer» D. LPOVERLAPPED | |
| 165. |
The basic unit of computer storage is |
| A. | byte |
| B. | nibble |
| C. | bit |
| D. | word |
| Answer» D. word | |
| 166. |
Records are stored in a determined order one after another by key field value, in process of |
| A. | Sequential files |
| B. | Structured files |
| C. | Procedural files |
| D. | Absolute files |
| Answer» B. Structured files | |
| 167. |
All current data relevant to an application is stored in |
| A. | Transaction file |
| B. | Master file |
| C. | Run time file |
| D. | Processing file |
| Answer» C. Run time file | |
| 168. |
Time sharing of the operating system provides direct communication between |
| A. | users |
| B. | systems |
| C. | nodes |
| D. | both a and b |
| Answer» E. | |
| 169. |
Multiprocessing systems require sophisticated operating system to schedule and coordinate |
| A. | Input activities |
| B. | Output activities |
| C. | Processing activities |
| D. | All of the Above |
| Answer» E. | |
| 170. |
A _______ is a technique for passing information from one program process to another |
| A. | job |
| B. | pipe |
| C. | user |
| D. | network |
| Answer» C. user | |
| 171. |
Operating system programs that are manipulated are asked by the |
| A. | programmer |
| B. | open source |
| C. | operating system |
| D. | user |
| Answer» E. | |
| 172. |
Power failure of the computer system is one of the kinds of |
| A. | inputs |
| B. | outputs |
| C. | error |
| D. | memory |
| Answer» D. memory | |
| 173. |
Memory that is between the main memory and register of the computer system is |
| A. | cache |
| B. | ROM |
| C. | RAM |
| D. | CD |
| Answer» B. ROM | |
| 174. |
Linux runs on a very large range of |
| A. | Network Architecture |
| B. | Hardware Architecture |
| C. | Software Architecture |
| D. | Processor Architecture |
| Answer» E. | |
| 175. |
Programs of the operating system usually end |
| A. | normally |
| B. | abnormally |
| C. | by default |
| D. | when error occurs |
| Answer» B. abnormally | |
| 176. |
The system structure of the Linux is |
| A. | Microsoft Windows |
| B. | UNIX |
| C. | Window Vista |
| D. | Monolithic Kernel |
| Answer» E. | |
| 177. |
User interface of operating system programs is provided by |
| A. | inputs |
| B. | outputs |
| C. | operating system |
| D. | memory |
| Answer» D. memory | |
| 178. |
The OS is responsible for transferring data to |
| A. | memory |
| B. | I/O devices |
| C. | ALU |
| D. | monitor |
| Answer» C. ALU | |
| 179. |
_______ searches for smallest block. The fragment left behind is small as possible. |
| A. | best fit |
| B. | first fit |
| C. | next fit |
| D. | last fit |
| Answer» B. first fit | |
| 180. |
The portion where monitor must always be in main memory and available is referred as |
| A. | Direct Memory Access DMA |
| B. | Monitor |
| C. | Control Monitor |
| D. | Resident Monitor |
| Answer» E. | |
| 181. |
In a computer system, sharing of files is key task of |
| A. | Resource management |
| B. | File management |
| C. | Operation management |
| D. | Process management |
| Answer» C. Operation management | |
| 182. |
Privileged mode of the operating system mode is a |
| A. | user code |
| B. | kernel mode |
| C. | system mode |
| D. | both b and c |
| Answer» C. system mode | |
| 183. |
Depending on CPU utilization during course of processing, jobs can be classified into |
| A. | Two types |
| B. | Three types |
| C. | Four types |
| D. | Five types |
| Answer» B. Three types | |
| 184. |
Many user terminals are connected simultaneously to same computer in process of |
| A. | Loosely coupled systems |
| B. | Loosely coupled systems |
| C. | Time sharing systems |
| D. | Threaded systems |
| Answer» D. Threaded systems | |
| 185. |
Interfaces of the operating system provides |
| A. | creation |
| B. | designing |
| C. | deletion |
| D. | portability |
| Answer» E. | |
| 186. |
Beowulf clusters of the computer system uses |
| A. | close source softwares |
| B. | open source softwares |
| C. | dedicated softwares |
| D. | both a and b |
| Answer» C. dedicated softwares | |
| 187. |
Application developers have no direct access to system calls but they can access through |
| A. | memory |
| B. | Computer Interface |
| C. | application programming interface (API). |
| D. | registers |
| Answer» D. registers | |
| 188. |
Data integrity protect data from unauthorized |
| A. | Access |
| B. | Control |
| C. | Modification |
| D. | Interruption |
| Answer» D. Interruption | |
| 189. |
User data are stored in |
| A. | cache |
| B. | Secondary storage |
| C. | indexes |
| D. | Main memory |
| Answer» C. indexes | |
| 190. |
At operating system level, file access methods can be classified into |
| A. | Two types |
| B. | Three types |
| C. | Four types |
| D. | Five types |
| Answer» B. Three types | |
| 191. |
Master slave relationship in the computer system is used by |
| A. | symmetric multiprocessor |
| B. | asymmetric multiprocessor |
| C. | symmetric multiprocessing |
| D. | asymmetric multiprocessing |
| Answer» E. | |
| 192. |
Software which controls general operations of computer system is classified as |
| A. | dump programs |
| B. | function system |
| C. | operating system |
| D. | inquiry system |
| Answer» D. inquiry system | |
| 193. |
Readfile() function of the operating system is for reading |
| A. | command |
| B. | processes |
| C. | programs |
| D. | files |
| Answer» E. | |
| 194. |
Solaris operating system is the operating system that provides |
| A. | symmetric multiprocessor |
| B. | slave relationship |
| C. | symmetric multiprocessing |
| D. | asymmetric multiprocessing |
| Answer» D. asymmetric multiprocessing | |
| 195. |
Each job executed simultaneously, occupies space in main memory, which is known as |
| A. | Memory sector |
| B. | Memory packet |
| C. | Memory partition |
| D. | Memory slack |
| Answer» D. Memory slack | |
| 196. |
Concurrent execution of multiple jobs in a single-user system is known to be |
| A. | Multitasking |
| B. | Multischeduling |
| C. | Multiprogramming |
| D. | Multiprocessing |
| Answer» B. Multischeduling | |
| 197. |
Frequently used functions and operations are stored in |
| A. | Library programs |
| B. | Utility programs |
| C. | Formatting programs |
| D. | Compressed programs |
| Answer» B. Utility programs | |
| 198. |
Operation to change a user settable attributes of a file, is named to be |
| A. | declare attribute |
| B. | define attribute |
| C. | get attribute |
| D. | set attribute |
| Answer» E. | |
| 199. |
Process to exit from computer by giving correct instructions such as 'EXIT' is classified as |
| A. | log in |
| B. | process out |
| C. | process in |
| D. | log out |
| Answer» E. | |
| 200. |
With the use of multiprogramming batch processing work can be |
| A. | Efficient |
| B. | Rigid |
| C. | Expensive |
| D. | Flexible |
| Answer» B. Rigid | |