Operating System MCQ (Multiple Choice Questions) - SchoolingAxis

Operating System MCQ (Multiple Choice Questions)

 Que- What is all-or-nothing situation for sharing in memory ? 

a. Program makes all its data available to be accessed 

b. It prohibits access to some 

c. It creates rules who can access program memory 

d. It separates program memory and data memory 


Answer- Program makes all its data available to be accessed        


Que- How is disadvantage of all-or-nothing approach overcome ? 

a. Base/Bound 

b. Relocation technique 

c. Fence method 

d. Tagged architecture 


Answer- Tagged architecture        


Que- What is true regarding tagged architecture ? 

a. Every word of machine memory has one or more extra bits 

b. Extra bits are used to do padding 

c. Extra bits are not used to identify rights to that word 

d. It is very compatible to code upgrades 


Answer- Every word of machine memory has one or more extra bits        


Que- What is best solution to have effect of unbounded number if base/bound registers? 

a. Tagged architecture 

b. Segmentation 

c. Fence method 

d. None of the mentioned 


Answer- Segmentation        


Que- What is major feature of segmentation ? 

a. Program is divided in data memory and program memory 

b. Program is executed in segments 

c. Program is divided into pieces having different access rights 

d. It has effect of an unbounded architecture 


Answer- Program is divided into pieces having different access rights        


Que- What is correct way the segmentation program address is stored ? 

a. name, offset 

b. start, stop 

c. access, rights 

d. offset, rights 


Answer- name, offset        


Que- What is main objective of protection ? 

a. Ensure all objects are protected individually 

b. Objects have different priority and thus different levels of protection 

c. Ensure that each object is accessed correctly and only by allowed processes 

d. None of the mentioned 


Answer- Ensure that each object is accessed correctly and only by allowed processes        


Que- What is principle of least privilege ? 

a. Less privileges provide difficulty in executing admin tasks 

b. Users can get temporary high privilege access 

c. Users should be given just enough privileges to perform their tasks 

d. None of the mentioned 


Answer- Users should be given just enough privileges to perform their tasks        


Que- What is  need of protection ? 

a. Prevent mischievous violation 

b. Prevent and intentional 

c. Ensure that each program component uses resources allotted to it only 

d. All of the mentioned 


Answer- All of the mentioned        


Que- What is incorrect methods of revocation of access rights ? 

a. Immediate/Delayed 

b. Selective/General 

c. Partial/total 

d. Crucial 


Answer- Crucial        


Que- Why is it difficult to revoke capabilities ? 

a. They are too many 

b. They are not defined precicely 

c. They are distributed throughout the system 

d. None of the mentioned 


Answer- They are distributed throughout the system        


Que- What is the reacquisition scheme to revoke capability ? 

a. When a process capability is revoked then it won't be able to reacquire it 

b. Pointers are maintained for each object which can be used to revoke 

c. Indirect pointing is done to revoke object's capabilities 

d. Master key can be used compare and revoke. 


Answer- When a process capability is revoked then it won't be able to reacquire it        


Que- What is false regarding Back-Pointers scheme to revoke capability ? 

a. List of pointers is maintained with each object 

b. When revocation is required these pointers are followed 

c. This scheme is not adopted in MULTICS system 

d. These point to all capabilities associated with that object 


Answer- This scheme is not adopted in MULTICS system        


Que- What is true about Indirection to revoke capability ? 

a. Capabilities point indirectly to the objects 

b. Each capability will not have a unique entry in global 

c. Table entries cannot be reused for other capabilities 

d. This system was adopted in MULTICS system 


Answer- Capabilities point indirectly to the objects        


Que- How can Keys be defined or replaced ? 

a. create [keyname] [bits]. 

b. set-key 

c. Key 

d. MAKE [Key Name]. 


Answer- set-key        


Que- What are characteristics of Hydra system ? 

a. It consist of known access rights and interpreted by the system 

b. A user can of protection system can declare other rights 

c. Hydra system is not flexible 

d. Hydra doesn't provide rights amplification 


Answer- It consist of known access rights and interpreted by the system        


Que- What are characteristics of rights amplification in Hydra ? 

a. This scheme allows a procedure to be certified as trustworthy 

b. Amplification of rights cannot be stated explicitly in declaration 

c. It includes kernel rights such as read 

d. All of the mentioned 


Answer- This scheme allows a procedure to be certified as trustworthy        


Que- What is the problem of mutually suspicious subsystem ? 

a. Service program can steal users data 

b. Service program can malfunction and retain some rights of data provided by user 

c. Calling program can get access to restricted portion from service program 

d. Calling program gets unrestricted access 


Answer- Service program can malfunction and retain some rights of data provided by user        


Que- What are characteristics of Cambridge CAP system as compared to Hydra system ? 

a. It is simpler and less powerful than hydra system 

b. It is more powerful than hydra system 

c. It is powerful than hydra system 

d. It is not as secure as Hydra system 


Answer- It is simpler and less powerful than hydra system        


Que- What are two capabilities defined in CAP system ? 

a. data & software capability 

b. address & data capability 

c. hardware & software capability 

d. software capability 


Answer- data & software capability        


Que- In distributed system each processor has its own 

a. local memory 

b. clock 

c. both local memory and clock 

d. none of the mentioned  


Answer- both local memory and clock        


Que- If one site fails in distributed system 

a. the remaining sites can continue operating 

b. all the sites will stop working 

c. directly connected sites will stop working 

d. none of the mentioned  


Answer- the remaining sites can continue operating        


Que- Network operating system runs on 

a. server 

b. every system in the network 

c. both server and every system in the network 

d. none of the mentioned  


Answer- server        


Que- Which technique is based on compile-time program transformation for accessing remote data in a distributed-memory parallel system. 

a. cache coherence scheme 

b. computation migration 

c. remote procedure call 

d. message passing  


Answer- computation migration        


Que- Logical extension of computation migration is 

a. process migration 

b. system migration 

c. thread migration 

d. data migration  


Answer- process migration        


Que- Processes on the remote systems are identified by 

a. host ID 

b. host name and identifier 

c. identifier 

d. process ID  


Answer- host name and identifier        


Que- Which routing technique is used in distributed system? 

a. fixed routing 

b. virtual routing 

c. dynamic routing 

d. all of the mentioned  


Answer- all of the mentioned         


Que- In distributed systems, link and site failure is detected by 

a. polling 

b. handshaking 

c. token passing 

d. none of the mentioned  


Answer- handshaking        


Que- The capability of a system to adapt the increased service load is called 

a. scalability 

b. tolerance 

c. capacity 

d. none of the mentioned  


Answer- scalability        


Que- Internet provides _______ for remote login. 

a. telnet 

b. http 

c. ftp 

d. RPC  


Answer- telnet        


Que- What is not true about distributed system ? 

a. It is a collection of processor 

b. All processors are synchronized 

c. They do not share memory 

d. None of the mentioned 


Answer- All processors are synchronized        


Que- What are characteristics of processor in distributed system ? 

a. They vary in size and function 

b. They are same in size and function 

c. They are manufactured with single purpose 

d. They are real-time devices 


Answer- They vary in size and function        


Que- What are characteristics of distributed file system ? 

a. Its users, servers and storage devices are dispersed 

b. Service activity is not carried out across the network 

c. They have single centralized data repository 

d. There are multiple dependent storage devices 


Answer- Its users, servers and storage devices are dispersed        


Que- What is not a major reason for building distributed systems ? 

a. Resource sharing 

b. Computation speedup 

c. Reliability 

d. Simplicity 


Answer- Simplicity        


Que- What are types of distributed operating system ? 

a. Network Operating system 

b. Zone based Operating system 

c. Level based Operating system 

d. All of the mentioned 


Answer- Network Operating system        


Que- What are characteristic of Network Operating Systems ? 

a. Users are aware of multiplicity of machines 

b. They are transparent 

c. They are simple to use 

d. All of the mentioned 


Answer- Users are aware of multiplicity of machines        


Que- How are access to resources of various machines is done ? 

a. Remote logging using ssh or telnet 

b. Zone are configured for automatic access 

c. FTP is not used 

d. All of the mentioned 


Answer- Remote logging using ssh or telnet        


Que- What are characteristics of Distributed Operating system ? 

a. Users are aware of multiplicity of machines 

b. Access is done like local resources 

c. Users are aware of multiplicity of machines 

d. They have multiple zones to access files 


Answer- Access is done like local resources        


Que- What are characteristics of data migration ? 

a. transfer data by entire file or immediate portion required 

b. transfer the computation rather than the data 

c. execute an entire process or parts of it at different sites 

d. none of the mentioned 


Answer- transfer data by entire file or immediate portion required        


Que- What are characteristics of computation migration ? 

a. transfer data by entire file or immediate portion required 

b. transfer the computation rather than the data 

c. execute an entire process or parts of it at different sites 

d. none of the mentioned 


Answer- transfer the computation rather than the data        


Que- What are characteristics of process migration ? 

a. transfer data by entire file or immediate portion required 

b. transfer the computation rather than the data 

c. execute an entire process or parts of it at different sites 

d. none of the mentioned 


Answer- execute an entire process or parts of it at different sites        


Que- What are parts of network structure ? 

a. Workstation 

b. Gateway 

c. Laptop 

d. All of the mentioned 


Answer- All of the mentioned        


Que- What are valid network topology ? 

a. Multiaccess bus 

b. Ring 

c. Star 

d. All of the mentioned 


Answer- All of the mentioned        


Que- What are sites in network topology compared ? 

a. Basic cost 

b. Communication cost 

c. Reliability 

d. All of the mentioned 


Answer- All of the mentioned        


Que- Which design features of a communication network are important ? 

a. Naming and name resolution 

b. Routing strategies 

c. Connection strategies 

d. All of the mentioned 


Answer- All of the mentioned        


Que- What are characteristics of Naming and Name resolution ? 

a. name systems in the network 

b. address messages with the process-id 

c. virtual circuit 

d. message switching 


Answer- address messages with the process-id        


Que- What are routing strategies which is not used in distributed systems ? 

a. Fixed routing 

b. Token routing 

c. Virtual circuit 

d. Dynamic routing 


Answer- Virtual circuit        


Que- What are connection strategies not used in distributed systems ? 

a. Circuit switching 

b. Message switching 

c. Token switching 

d. Packet switching 


Answer- Token switching        


Previous Post Next Post