Operating System MCQ (Multiple Choice Questions) - SchoolingAxis

Operating System MCQ (Multiple Choice Questions)

 Que- How is are collisions avoided in network ? 

a. Carrier sense with multiple access (CSMA); collision detection (CD) 

b. Carrier sense multiple access with collision avoidance 

c. Message slots 

d. All of the mentioned 


Answer- All of the mentioned        


Que- What is common problem found in distributed system ? 

a. Process Synchronization 

b. Communication synchronization 

c. Deadlock problem 

d. Power failure 


Answer- Deadlock problem        


Que- How many layers does Internet model ISO consists of ? 

a. Three 

b. Five 

c. Seven 

d. Eight 


Answer- Seven        


Que- Which layer is responsible for The process-to-process delivery ? 

a. Network 

b. Transport 

c. Application 

d. Physical 


Answer- Transport        


Que- Which layer is the layer closest to the transmission medium ? 

a. Physical 

b. Data link 

c. Network 

d. Transport 


Answer- Physical        


Que- Header are ______ when data packet moves from upper to the lower layers ? 

a. Modified 

b. Removed 

c. Added 

d. All of the mentioned 


Answer- Added        


Que- Which layer lies between transport layer and data link layer ? 

a. Physical 

b. Network 

c. Application 

d. Session 


Answer- Network        


Que- Which of the following is an application layer service ? 

a. Mail service 

b. File transfer 

c. Remote access 

d. All of the mentioned 


Answer- All of the mentioned        


Que- What are different ways distributed may suffer ? 

a. Failure of a link 

b. Failure of a site 

c. Loss of message 

d. All of the mentioned 


Answer- All of the mentioned        


Que- What are design issues in distributed system structure ? 

a. Scalability 

b. Fault-tolerance 

c. Clustering 

d. All of the mentioned 


Answer- All of the mentioned        


Que- In which OSI layer encryption and decryption happens ? 

a. Application 

b. Presentation 

c. Transport 

d. Data Link 


Answer- Presentation        


Que- What are important step followed when recovery from failure happens ? 

a. Post repairing integration with main system should happen smoothly and gracefully 

b. Upon link failure both parties at end must not be notified 

c. Fault recovery system must me adjusted 

d. Failures are logged systematically 


Answer- Post repairing integration with main system should happen smoothly and gracefully        


Que- What are the different ways in which clients and servers are dispersed across machines ? 

a. Servers may not run on dedicated machines 

b. Servers and clients can be on same machines 

c. Distribution cannot be interposed between a OS and the file system 

d. OS cannot be distributed with the file system a part of that distribution 


Answer- Servers and clients can be on same machines        


Que- What are not the characteristics of a DFS ? 

a. login transparency and access transparency 

b. Files need not contain information about their physical location 

c. No Multiplicity of users 

d. No Multiplicity if files 


Answer- No Multiplicity of users        


Que- What are characteristic of a DFS ? 

a. Fault tolerance 

b. Scalability 

c. Heterogeneity of the system 

d. Upgradation 


Answer- Upgradation        


Que- What are the different ways file accesses take place ? 

a. sequential access 

b. direct access 

c. indexed sequential access 

d. all of the mentioned 


Answer- all of the mentioned        


Que- Which is not a major components of file system ? 

a. Directory service 

b. Authorization service 

c. Shadow service 

d. System service 


Answer- Shadow service        


Que- What are the different ways mounting of file system ? 

a. boot mounting 

b. auto mounting 

c. explicit mounting 

d. all of the mentioned 


Answer- all of the mentioned        


Que- What is the advantage of caching in remote file access ? 

a. Reduced network traffic by retaining recently accessed disk blocks 

b. Faster network access 

c. Copies of data creates backup automatically 

d. None of the mentioned 


Answer- Reduced network traffic by retaining recently accessed disk blocks        


Que- What is networked virtual memory ? 

a. Caching 

b. Segmentation 

c. RAM disk 

d. None of the mentioned 


Answer- Caching        


Que- What are examples of state information ? 

a. opened files and their clients 

b. file descriptors and file handles 

c. current file position pointers 

d. all of the mentioned 


Answer- all of the mentioned        


Que- Which is not an examples of state information ? 

a. Mounting information 

b. Description of HDD space 

c. Session keys 

d. Lock status 


Answer- Description of HDD space        


Que- What is a stateless file server ? 

a. It keeps tracks of states of different objects 

b. It maintains internally no state information at all 

c. It maintains some information in them 

d. None of the mentioned 


Answer- It maintains internally no state information at all        


Que- What are the characteristics of stateless server ? 

a. Easier to implement 

b. They are not fault-tolerant upon client or server failures 

c. They store all information file server 

d. They are redundant to keep data safe 


Answer- Easier to implement        


Que- Implementation of a stateless file server must not follow ? 

a. Idempotency requirement 

b. Encryption of keys 

c. File locking mechanism 

d. Cache consistency 


Answer- Encryption of keys        


Que- What are the advantages of file replication ? 

a. Improves availability & performance 

b. Decreases performance 

c. They are consistent 

d. Improves speed 


Answer- Improves availability & performance        


Que- What are characteristic of NFS protocol ? 

a. Search for file within directory 

b. Read a set of directory entries 

c. Manipulate links and directories 

d. All of the mentioned 


Answer- All of the mentioned        


Que- What is coherency of replicated data ? 

a. All replicas are identical at all times 

b. Replicas are perceived as identical only at some points in time 

c. Users always read the most recent data in the replicas 

d. All of the mentioned 


Answer- All of the mentioned        


Que- What are the three popular semantic modes ? 

a. Unix, Coherent & Session semantics 

b. Unix, Transaction & Session semantics 

c. Coherent, Transaction & Session semantics 

d. Session, Coherent semantics 


Answer- Unix, Transaction & Session semantics        


Que- What are the characteristics of Unix semantics ? 

a. Easy to implement in a single processor system 

b. Data cached on a per process basis using write through case control 

c. Write-back enhances access performance 

d. All of the mentioned 


Answer- All of the mentioned        


Que- What are the characteristics of transaction semantics ? 

a. Suitable for applications that are concerned about coherence of data 

b. The users of this model are interested in the atomicity property for their transaction 

c. Easy to implement in a single processor system 

d. Write-back enhances access performance 


Answer- The users of this model are interested in the atomicity property for their transaction        


Que- What are non characteristics of session semantics ? 

a. Each client obtains a working copy from the server 

b. When file is closed, the modified file is copied to the file server 

c. The burden of coordinating file sharing is ignored by the system 

d. Easy to implement in a single processor system 


Answer- Easy to implement in a single processor system        


Que- The file once created can not be changed is called 

a. immutable file 

b. mutex file 

c. mutable file 

d. none of the mentioned  


Answer- immutable file        


Que- ______ of the distributed file system are dispersed among various machines of distributed system. 

a. Clients 

b. Servers 

c. Storage devices 

d. All of the mentioned  


Answer- All of the mentioned         


Que- _______ is not possible in distributed file system. 

a. File replication 

b. Migration 

c. Client interface 

d. Remote access  


Answer- Migration        


Que- Which one of the following hides the location where in the network the file is stored? 

a. transparent distributed file system 

b. hidden distributed file system 

c. escaped distribution file system 

d. spy distributed file system  


Answer- transparent distributed file system        


Que- In distributed file system, when a file's physical storage location changes 

a. file name need to be changed 

b. file name need not to be changed 

c. file's host name need to be changed 

d. file's local name need to be changed  


Answer- file name need not to be changed        


Que- In distributed file system, _______ is mapping between logical and physical objects. 

a. client interfacing 

b. naming 

c. migration 

d. heterogeneity  


Answer- naming        


Que- In distributed file system, a file is uniquely identified by 

a. host name 

b. local name 

c. the combination of host name and local name 

d. none of the mentioned  


Answer- the combination of host name and local name        


Que- There is no need to establish and terminate a connection through open and close operation in 

a. stateless file service 

b. stateful file service 

c. both stateless and stateful file service 

d. none of the mentioned  


Answer- stateless file service        


Que- In distributed file system, file name does not reveal the file's 

a. local name 

b. physical storage location 

c. both local name and physical storage location 

d. none of the mentioned  


Answer- physical storage location        


Que- Which one of the following is a distributed file system? 

a. andrew file system 

b. network file system 

c. novel network 

d. all of the mentioned  


Answer- all of the mentioned         


Que- What are the characteristics of tightly coupled system ?i) Different clockii) Use communication linksiii) Same clockiv) Distributed systems 

a. i 

b. i and iv 

c. i, ii and iii 

d. ii, iii and iv 


Answer- ii, iii and iv        


Que- What are the characteristics of mutual exclusion using centralized approach ? 

a. One processor as coordinator which handles all requests 

b. It requires request,reply and release per critical section entry 

c. The method is free from starvation 

d. All of the mentioned 


Answer- All of the mentioned        


Que- What are the advantages of token (with rings) passing approach ? (i) One processor as coordinator which handles all requests (ii) No starvation if the ring is unidirectional (iii) There are many messages passed per section entered if few users want to get in section (iv) One processor as coordinator which handles all requests (v) Only one message/entry if everyone wants to get in 

a. i 

b. ii and iii 

c. i, ii and iii 

d. i, ii and iv 


Answer- i, ii and iv        


Que- What is the characteristics of atomicity ? 

a. All operations associated are executed to completion or none are performed 

b. One processor as coordinator which handles all requests 

c. When responses are received from all processes, then  process can enter its Critical Section 

d. Use communication links 


Answer- All operations associated are executed to completion or none are performed        


Que- What things are transaction coordinator is responsible for ? 

a. Starting the execution of the transaction 

b. Breaking transaction into a number of subtransactions 

c. Coordinating the termination of the transaction 

d. All of the mentioned 


Answer- All of the mentioned        


Que- Single coordinator approach has the following advantages : 

a. Simple implementation 

b. Simple deadlock handling 

c. bottleneck 

d. All of the mentioned 


Answer- All of the mentioned        


Que- Single coordinator approach has the following disadvantages : 

a. Bottleneck 

b. Slow response 

c. Deadlock 

d. One request per second 


Answer- Bottleneck        


Que- What are the disadvantages of majority protocol ? 

a. Complicated implementation 

b. Deadlock cannot occur easily 

c. Bottleneck 

d. All of the mentioned 


Answer- Complicated implementation        


Que- What are the parts of global unique identifier ? 

a. Local unique timestamp 

b. Remote timestamp 

c. Clock number 

d. All of the mentioned 


Answer- Local unique timestamp        


Que- Which are the two complementary deadlock-prevention schemes using timestamps ? 

a. The wait-die & wound-wait scheme 

b. The wait-n-watch scheme 

c. The wound-wait scheme 

d. The wait-wound & wound-wait scheme 


Answer- The wait-die & wound-wait scheme        


Que- In distributed systems, a logical clock is associated with 

a. each instruction 

b. each process 

c. each register 

d. none of the mentioned  


Answer- each process        


Que- If timestamps of two events are same, then the events are 

a. concurrent 

b. non-concurrent 

c. monotonic 

d. non-monotonic  


Answer- concurrent        


Que- If a process is executing in its critical section 

a. any other process can also execute in its critical section 

b. no other process can execute in its critical section 

c. one more process can execute in its critical section 

d. none of the mentioned  


Answer- no other process can execute in its critical section        


Que- A process can enter into its critical section 

a. anytime 

b. when it receives a reply message from its parent process 

c. when it receives a reply message from all other processes in the system 

d. none of the mentioned  


Answer- when it receives a reply message from all other processes in the system        


Que- For proper synchronization in distributed systems 

a. prevention from the deadlock is must 

b. prevention from the starvation is must 

c. prevention from the deadlock & starvation is must 

d. none of the mentioned  


Answer- prevention from the deadlock & starvation is must        


Que- In the token passing approach of distributed systems, processes are organized in a ring structure 

a. logically 

b. physically 

c. both logically and physically 

d. none of the mentioned  


Answer- logically        


Que- In distributed systems, transaction coordinator 

a. starts the execution of transaction 

b. breaks the transaction into number of sub transactions 

c. coordinates the termination of the transaction 

d. all of the mentioned  


Answer- all of the mentioned         


Previous Post Next Post