Top 550+ Solved Operating System (OS) MCQ Questions Answer

From 421 to 435 of 659

Q. Which one of the following is the deadlock avoidance algorithm?

a. banker’s algorithm

b. elevator algorithm

c. karn’s algorithm

d. none of the mentioned

  • a. banker’s algorithm

Q. File type can be represented by                          

a. file name

b. file extension

c. file identifier

d. none of the mentioned

  • b. file extension

Q. Which of the following are the two parts of the file name?

a. name & identifier

b. identifier & type

c. extension & name

d. type & extension

  • c. extension & name

Q. Which of the following are forms of malicious attack?

a. Theft of information

b. Modification of data

c. Wiping of information

d. All of the mentioned

  • d. All of the mentioned

Q. From the following, which is not a common file permission?

a. Write

b. Execute

c. Stop

d. Read

  • c. Stop

Q. The backing store is generally a                          

a. fast disk

b. disk large enough to accommodate copies of all memory imagesfor all users

c. disk to provide direct access to the memory images

d. all of the mentioned

  • d. all of the mentioned

Q. Memory management technique in which system stores and retrieves data from secondary storage for use in main

a. fragmentation

b. paging

c. mapping

d. None of the mentioned

  • b. paging

Q. A Process Control Block(PCB) does not contain which of the following?

a. Code

b. Stack

c. Bootstrap Program

d. Data

  • c. Bootstrap Program

Q. Which of the following condition(s) is/are required for a deadlock to be possible?

a. mutual exclusion

b. a process may hold allocated resources while awaiting

c. no resource can be forcibly removed from a process

d. All of the mentioned

  • d. All of the mentioned

Q. To avoid deadlock                          

a. there must be a fixed number of resources to

b. resource allocation must be done only

c. all deadlocked processes must be

d. inversion technique can be used

  • a. there must be a fixed number of resources to

Q. What is the mounting of file system?

a. creating of a filesystem

b. deleting a filesystem

c. attaching portion of the file system into a directory

d. removing the portion of the file system into a directory structure

  • c. attaching portion of the file system into a directory

Q. Data cannot be written to secondary storage unless written within a              

a. file

b. swap space

c. directory

d. text format

  • a. file

Q. The larger the block size, the the internal fragmentation.

a. greater

b. lesser

c. same

d. none of the mentioned

  • a. greater

Q. With a shared file                            

a. actual file exists

b. there are two copies of the file

c. the changes made by one person are not reflected to the

d. the changes made by one person are reflected to the other

  • d. the changes made by one person are reflected to the other

Q. What is operating system?

a. collection of programs that manages hardware resources

b. system service provider to the application programs

c. link to interface the hardware and application programs

d. all of the mentioned

  • d. all of the mentioned
Subscribe Now

Get All Updates & News