Operating System Mcqs

Table of Contents

Which of the following scheduling algorithm is non-preemptive scheduling?

  1. SJF scheduling
  2. Round-Robin scheduling
  3. SRTF scheduling
  4. None of these.

Shortest job first scheduling is non-preemptive scheduling. In this scheduling algorithm, the process which takes the least time to complete executes that process first.

Which of the following scheduling reduces process flow time?

  1. FCFS
  2. LIFO
  3. SJF
  4. All of the these

Shortest job first scheduling is non-preemptive scheduling. In this scheduling algorithm, the process which takes the least time to complete executes that process first.

Consider the following three processes in the FCFS.

Process ID.Brust-time.Arrival-time
P133
P266
P399

What is the average waiting time?

  1. 2
  2. 3
  3. 4
  4. 5

TA Time = CT – AT

Waiting Time = TA – BT

How many types of buffer overflow in the operating system?

  1. Two
  2. Six
  3. Seven
  4. Five

There are two types of buffer-overflows: heap-based and stack-based.

In which allocation method does the user size the file before creating the file?

  1. Contiguous
  2. Linked
  3. Indexed
  4. None of the these

In the contiguous allocation method, the user has to give the size of the file before creating the file so that the operating system can give contiguous blocks in the disk-based on the size of that file.

Which of the following algorithms is used to avoid deadlock?

  1. Dynamic Programming algorithm
  2. Primality algorithms
  3. Banker’s algorithm
  4. Deadlock algorithm

Banker’s algorithm is a deadlock avoidance and resource allocation algorithm. This algorithm was developed by Edger Dijkstra. It is also called a detection algorithm.

27) Which of the following component does not belong to PCB (Process Control Block)?

  1. CPU registers
  2. CPU scheduling information
  3. Operating System information
  4. Accounting information

The operating system information is not the component of the PCB, so option (d) is the correct answer.

Which of the following method is used to improve the main memory utilization?

  1. Swapping
  2. Operating system
  3. Memory stack
  4. None of these.

Swapping is a technique in which the process is removed from the main memory and stored in secondary memory. It is used to improve the main memory utilization.

Buffer is a ___________.

  1. Permanent area
  2. Temporary area
  3. Small area
  4. Large area

Buffer is a temporary area where data is stored for some time before being transferred to the main memory.

Which of the following operating systems supports only real-time applications?

  1. Batch OS
  2. Distributed OS
  3. Real-time OS
  4. Network OS

The real-time OS supports real-time applications. This OS is used for industrial and scientific work. It completes the tasks in a given time.

Which of the following binary formats support the Linux operating system?

  1. 0 and 1
  2. Binary Number Format
  3. ELF Binary Format
  4. None of the these

ELF stands for “Executable-and-Linkable-Format”. The ELF format is used for libraries and executable files in Linux operating systems.

What is Kali Linux?

  1. Network device
  2. Operating system
  3. Server name
  4. Computer name

Kali Linux is an operating system similar to Windows, Unix, and macOS. Kali operating system was designed for reverse engineering, security, computer forensics, etc.

Which of the following statement is correct about fragmentation?

  1. It is software that connects the OS.
  2. It is part of the software.
  3. Loss the memory
  4. All of the these

A fragmentation is a state of a hard disk in which the most important parts of a single file are stored at different places in the disk. Due to which there is a loss of memory, and the working efficiency of the operating system is also affected.

SSTF stands for ________.

  1. Shortest Signal Time First
  2. Shortest Seek Time First
  3. System Seek Time First
  4. System Shortest Time First

SSTF stands for Shortest-Seek-Time-First. In the SSTF algorithm, that request is executed first, whose seek time is the shortest.

The PCB is identified by ___________.

  1. Real-Number
  2. Binary Number
  3. Store block
  4. Integer Process ID

PCB is a data structure that is used to store the information of processes. It is identified by an integer process ID (PID).

Which of the following method is used to prevent threads or processes from accessing a single resource?

  1. PCB
  2. Semaphore
  3. Job Scheduler
  4. Non-Contiguous Memory Allocation

Semaphore is an integer variable that is used to prevent threads or processes from accessing a single resource.

Which of the following mechanisms is a locking mechanism?

  1. Semaphore
  2. PCB
  3. Mutex
  4. Binary Semaphore

The mutex is a locking mechanism that ensures that only one thread can occupy the mutex at a time and enter the critical section.

Which of the following statements is correct about virtual memory?

  1. It is a combination of the logical-memory and physical-memory
  2. It is a separation of user logical memory and physical memory
  3. It is a virtual network memory
  4. None of the these

Virtual memory is used to separate the user’s logical memory and actual physical memory. Therefore, option (b) is the correct answer.

COW stands for __________

  1. Compress of write memory
  2. Copy overwrite
  3. Compress overwrites
  4. Computer of world

COW stands for Copy-Overwrite. Initially, it allows both the parent and child systems to share the same page.

Who is responsible for keeping the process from the program?

  1. Operating system
  2. CPU
  3. Monitor
  4. All of the these

A process is created from a program by the operating system. The OS is software that acts as an interface between a device and users and is also known as system software.

Which of the following operating systems require a command to run?

  1. Kali Linux
  2. Windows
  3. Mac OS
  4. Single-user operating system

Kali Linux is a fast operating system as more work is done through the command line in it. This OS is a Debian-based Linux OS.

Pages ( 2 of 2 ): « Previous1 2
error: Content is protected !!