250+ TOP MCQs on Distributed Operating System and Answers

Operating System Multiple Choice Questions on “Distributed Operating System”.

1. In distributed system, each processor has its own ___________
a) local memory
b) clock
c) both local memory and clock
d) none of the mentioned

Answer: c
Clarification: None.

2. If one site fails in distributed system then ___________
a) the remaining sites can continue operating
b) all the sites will stop working
c) directly connected sites will stop working
d) none of the mentioned

Answer: a
Clarification: None.

3. Network operating system runs on ___________
a) server
b) every system in the network
c) both server and every system in the network
d) none of the mentioned

Answer: a
Clarification: None.

4. Which technique is based on compile-time program transformation for accessing remote data in a distributed-memory parallel system?
a) cache coherence scheme
b) computation migration
c) remote procedure call
d) message passing

Answer: b
Clarification: None.

5. Logical extension of computation migration is ___________
a) process migration
b) system migration
c) thread migration
d) data migration

Answer: a
Clarification: None.

6. Processes on the remote systems are identified by ___________
a) host ID
b) host name and identifier
c) identifier
d) process ID

Answer: b
Clarification: None.

7. Which routing technique is used in a distributed system?
a) fixed routing
b) virtual routing
c) dynamic routing
d) all of the mentioned

Answer: d
Clarification: None.

8. In distributed systems, link and site failure is detected by ___________
a) polling
b) handshaking
c) token passing
d) none of the mentioned

Answer: b
Clarification: None.

9. The capability of a system to adapt the increased service load is called ___________
a) scalability
b) tolerance
c) capacity
d) none of the mentioned

Answer: a
Clarification: None.

10. Internet provides _______ for remote login.
a) telnet
b) http
c) ftp
d) rpc

Answer: a
Clarification: None.

200+ [UPDATED] Operating System MCQs

100 top Operating System multiple choice questions and answers PDF for freshers and experienced

Operating System Objective type Questions and Answers List

1 Translator for low level programming language were termed as
(A) Assembler
(B) Compiler
(C) Linker
(D) Loader
Ans: (A)

2 Analysis which determines the meaning of a statement once its grammatical structure becomes known is termed as
(A) Semantic analysis
(B) Syntax analysis
(C) Regular analysis
(D) General analysis
Ans: (A)

3 Load address for the first word of the program is called
(A) Linker address origin
(B) load address origin
(C) Phase library
(D) absolute library
Ans: (B)

4 Symbolic names can be associated with
A) Information
(B) data or instruction
(C) operand
(D) mnemonic operation
Ans: (B)

5 The translator which perform macro expansion is called a
(A) Macro processor
(B) Macro pre-processor
(C) Micro pre-processor
(D) assembler
Ans: (B)

6 Shell is the exclusive feature of
(A) UNIX
(B) DOS
(C) System software
(D) Application software
Ans: (A)

7 A program in execution is called
(A) Process
(B) Instruction
(C) Procedure
(D) Function
Ans: (A)

8 Interval between the time of submission and completion of the job is called
(A) Waiting time
(B) Turnaround time
(C) Throughput
(D) Response time
Ans: (B)

9 A scheduler which selects processes from secondary storage device is called
(A) Short term scheduler.
(B) Long term scheduler.
(C) Medium term scheduler.
(D) Process scheduler.
Ans: (C)

10 The scheduling in which CPU is allocated to the process with least CPU-burst time is called
(A) Priority Scheduling
(B) Shortest job first Scheduling
(C) Round Robin Scheduling
(D) Multilevel Queue Scheduling
Ans: (B)

11 The term ‘page traffic’ describes
(A) number of pages in memory at a given instant.
(B) number of papers required to be brought in at a given page request.
(C) the movement of pages in and out of memory.
(D) number of pages of executing programs loaded in memory.
Ans: (C)

12 The “turn-around” time of a user job is the
(A) time since its submission to the time its results become available.
(B) time duration for which the CPU is allotted to the job.
(C) total time taken to execute the job.
(D) time taken for the job to move from assembly phase to completion phase.

Ans: (C)
13 Which of the following can be used as a criterion for classification of data structures used in language processing.
(A) nature of a data structure
(B) purpose of a data structure
(C) lifetime of a data structure
(D) all of the above.

Ans: (D)
14 Memory utilization factor shall be computed as follows
(A) memory in use/allocated memory.
(B) memory in use/total memory connected.
(C) memory allocated/free existing memory.
(D) memory committed/total memory available.
Ans: (B)

15 Program ‘preemption’ is
(A) forced de allocation of the CPU from a program which is executing on the CPU.
(B) release of CPU by the program after completing its task.
(C) forced allotment of CPU by a program to itself.
(D) a program terminating itself due to detection of an error.
Ans: (A)

16 An assembler is
(A) programming language dependent.
(B) syntax dependant.
(C) machine dependant.
(D) data dependant.
Ans: (C)

17 Which of the following is not a fundamental process state
(A) ready
(B) terminated
(C) executing
(D) blocked
Ans: (D)

18 ‘LRU’ page replacement policy is
(A) Last Replaced Unit.
(B) Last Restored Unit.
(C) Least Recently Used.
(D) Least Required Unit.
Ans: (C)

19 Which of the following is true?
(A) Block cipher technique is an encryption technique.
(B) Steam cipher technique is an encryption technique.
(C) Both (A) and (B).
(D) Neither of (A) and (B).
Ans: (C)

20 Which of the following approaches do not require knowledge of the system state?
(A) deadlock detection.
(B) deadlock prevention.
(C) deadlock avoidance.
(D) none of the above.
Ans: (D)

21 Program generation activity aims at
(A) Automatic generation of program
(B) Organize execution of a program written in PL
(C) Skips generation of program
(D) Speedens generation of program
Ans: (A)

22 Which amongst the following is not an advantage of Distributed systems?
(A) Reliability
(B) Incremental growth
(C) Resource sharing
(D) None of the above
Ans: (A)

23 An imperative statement
(A) Reserves areas of memory and associates names with them
(B) Indicates an action to be performed during execution of assembled program
(C) Indicates an action to be performed during optimization
(D) None of the above
Ans: (B)

24 Which of the following loader is executed when a system is first turned on or restarted
(A) Boot loader
(B) Compile and Go loader
(C) Bootstrap loader
(D) Relating loader
Ans: (C)

25 Poor response time is usually caused by
(A) Process busy
(B) High I/O rates
(C) High paging rates
(D) Any of the above
Ans: (D)

26 “Throughput” of a system is
(A) Number of programs processed by it per unit time
(B) Number of times the program is invoked by the system
(C) Number of requests made to a program by the system
(D) None of the above
Ans: (A)

27 The “blocking factor” of a file is
(A) The number of blocks accessible to a file
(B) The number of blocks allocated to a file
(C) The number of logical records in one physical record
(D) None of the above
Ans: (C)

28 Which of these is a component of a process precedence sequence?
(A) Process name
(B) Sequence operator ‘;’
(C) Concurrency operator ‘,’
(D) All of the above
Ans: (D)

29 Which amongst the following is valid syntax of the Fork and Join Primitive?
(A) Fork

30 Nested Macro calls are expanded using the
(A) FIFO rule (First in first out)
(B) LIFO (Last in First out)
(C) FILO rule (First in last out)
(D) None of the above
Ans: (B)

31 A parser which is a variant of top-down parsing without backtracking is
(A) Recursive Descend.
(B) Operator Precedence.
(C) LL(1) parser.
(D) LALR Parser.
Ans: (A)

32 The expansion of nested macro calls follows
(A) FIFO rule.
(B) LIFO rule.
(C) LILO rule.
(D) priority rule.
Ans: (B)

33. In a two-pass assembler, the task of the Pass II is to
(A) separate the symbol, mnemonic opcode and operand fields.
(B) build the symbol table.
(C) construct intermediate code.
(D) synthesize the target program.
Ans: (D)

34 A linker program
(A) places the program in the memory for the purpose of execution.
(B) relocates the program to execute from the specific memory area allocated to it.
(C) links the program with other programs needed for its execution.
(D) interfaces the program with the entities generating its input data.
Ans: (C)

35 Which scheduling policy is most suitable for a time-shared operating system
(A) Shortest-job First.
(B) Elevator.
(C) Round-Robin.
(D) First-Come-First-Serve.
Ans: (C)

36 A critical section is a program segment
(A) which should run in a certain specified amount of time.
(B) which avoids deadlocks.
(C) where shared resources are accessed.
(D) which must be enclosed by a pair of semaphore operations, P and V.
Ans: (C)

37 An operating system contains 3 user processes each requiring 2 units of resource R. The minimum number of units of R such that no deadlocks will ever arise is
(A) 4.
(B) 3.
(C) 5.
(D) 6.
Ans: (A)

38 Locality of reference implies that the page reference being made by a process
(A) will always be to the page used in the previous page reference.
(B) is likely to be the one of the pages used in the last few page references.
(C) will always be to one of the pages existing in memory.
(D) will always lead to a page fault.
Ans: (B)

39 Which of these is not a part of Synthesis phase
(A) Obtain machine code corresponding to the mnemonic from the Mnemonics table
(B) Obtain address of a memory operand from the symbol table
(C) Perform LC processing
(D) Synthesize a machine instruction or the machine form of a constant
Ans: (C)

40 The syntax of the assembler directive EQU is
(A) EQU

(B) EQU

(C) EQU
(D) None of the above
Ans: (B)

41 The following features are needed to implement top down parsing
(A) Source string marker
(B) Prediction making mechanism
(C) Matching and Backtracking mechanism
(D) All of the above
Ans: (D)

42 A macro definition consists of
(A) A macro prototype statement
(B) One or more model statements
(C) Macro pre-processor statements
(D) All of the above
Ans: (D)

43 The main reason to encrypt a file is to _________.
(A) Reduce its size
(B) Secure it for transmission
(C) Prepare it for backup
(D) Include it in the start-up sequence
Ans: (B)

44 Which of the following is not a key piece of information, stored in single page table entry, assuming pure paging and virtual memory
(A) Frame number
(B) A bit indicating whether the page is in physical memory or on the disk
(C) A reference for the disk block that stores the page
(D) None of the above
Ans: (C)

45 A UNIX device driver is
(A) Structured into two halves called top half and bottom half
(B) Three equal partitions
(C) Unstructured
(D) None of the above
Ans: (A)

46 The following is not a layer of IO management module
(A) PIOCS (Physical Input Output Control System)
(B) LIOCS (Logical Input Output Control System)
(C) FS (File System)
(D) MCS (Management Control System)
Ans: (D)

47 Which amongst the following is not a valid page replacement policy?
(A) LRU policy (Least Recently Used)
(B) FIFO policy (First in first out)
(C) RU policy (Recurrently used)
(D) Optimal page replacement policy
Ans: (C)

48 Consider a program with a linked origin of 5000. Let the memory area allocated to it have the start address of 70000. Which amongst the following will be the value to be loaded in relocation register?
(A) 20000
(B) 50000
(C) 70000
(D) 90000
Ans: (None of the above choice in correct. )

49 An assembly language is a
(A) low level programming language
(B) Middle level programming language
(C) High level programming language
(D) Internet based programming language
Ans: (A)

50 TII stands for
(A) Table of incomplete instructions
(B) table of information instructions
(C) translation of instructions information
(D) translation of information instruction
Ans: (A)

51 An analysis, which determines the syntactic structure of the source statement, is called
(A) Sementic analysis
(B) process analysis
(C) Syntax analysis
(D) function analysis
Ans: (C)

52 Action implementing instruction’s meaning are a actually carried out by
(A) Instruction fetch
(B) Instruction decode
(C) instruction execution
(D) Instruction program
Ans: (C)

53 The field that contains a segment index or an internal index is called
(A) target datum
(B) target offset
(C) segment field
(D) fix dat
Ans: (A)

54 A program in execution is called
(A) process
(B) function
(C) CPU
(D) Memory
Ans: (A)

55 Jobs which are admitted to the system for processing is called
(A) long-term scheduling
(B) short-term scheduling
(C) medium-term scheduling
(D) queuing
Ans: (A)

56 A set of techniques that allow to execute a program which is not entirely in memory is called
(A) demand paging
(B) virtual memory
(C) auxiliary memory
(D) secondary memory
Ans: (B)

57 SSTF stands for
(A) Shortest-Seek-time-first scheduling
(B) small – small-time-first
(C) simple-seek-time-first
(D) small-simple-time-first scheduling
Ans: (A)

58 Before proceeding with its execution, each process must acquire all the resources it needs is called
(A) hold and wait
(B) No pre-emption
(C) circular wait
(D) starvation
Ans: (A)

59 Virtual memory is
(A) simple to implement
(B) used in all major commercial operating systems
(C) less efficient in utilization of memory
(D) useful when fast I/O devices are not available
Ans: (B)

60 Relocation bits used by relocating loader are specified by
(A) Relocating loader itself
(B) Assembler or Translator
(C) Macro processor
(D) Both (A) and (B)
Ans: (B)

61 Resolution of externally defined symbols is performed by
(A) Linker
(B) Loader
(C) Compiler
(D) Editor
Ans: (A)

62 Relocatable programs
(A) cannot be used with fixed partitions
(B) can be loaded almost anywhere in memory
(C) do not need a linker
(D) can be loaded only at one specific location
Ans: (B)

63 Page stealing
(A) is a sign of efficient system
(B) is taking page frames other working sets
(C) should be the tuning goal
(D) is taking larger disk spaces for pages paged out
Ans: (B)

64 The total time to prepare a disk drive mechanism for a block of data to be read from is its
(A) latency
(B) latency plus transmission time
(C) latency plus seek time
(D) latency plus seek time plus transmission time
Ans: (C)

65 To avoid race condition, the maximum number of processes that may be simultaneously inside the critical section is
(A) zero
(B) one
(C) two
(D) more than two
Ans: (B)

66 The memory allocation scheme subject to “external” fragmentation is
(A) segmentation
(B) swapping
(C) pure demand paging
(D) multiple fixed contiguous partitions
Ans: (A)

67 Page fault frequency in an operating system is reduced when the
(A) processes tend to the I/O-bound
(B) size of pages is reduced
(C) processes tend to be CPU-bound
(D) locality of reference is applicable to the process
Ans: (D)

68 In which of the following page replacement policies Balady’s anomaly occurs?
(A) FIFO
(B) LRU
(C) LFU
(D) NRU
Ans: (A)

69 Which of the following are language processors?
(A) Assembler
(B) Compiler
(C) Interpreter
(D) All of the above
Ans: (D)

70 Virtual memory can be implemented with
(A) Segmentation
(B) Paging
(C) None
(D) all of the above
Ans: (D)

71. Round robin scheduling is essentially the preemptive version of ________.
A. FIFO
B. Shortest job first
C. Shortes remaining
D. Longest time first
Ans: A

72. A page fault occurs
A. when the page is not in the memory
B. when the page is in the memory
C. when the process enters the blocked state
D. when the process is in the ready state
Ans: A

73. Which of the following will determine your choice of systems software for your computer ?
A. Is the applications software you want to use compatible with it ?
B. Is it expensive ?
C. Is it compatible with your hardware ?
D. Both A. and C.
Ans: D

74. Let S and Q be two semaphores initialized to A., where P0 and PA. processes the following statements wait(S);wait(Q); —; signal(S);signal(Q) and wait(Q); wait(S);—;signal(Q);signal(S); respectively. The above situation depicts a _________ .
A. Semaphore
B. Deadlock
C. Signal
D. Interrupt
Ans: B

75. What is a shell ?
A. It is a hardware component
B. It is a command interpreter
C. It is a part in compiler
D. It is a tool in CPU scheduling
Ans: B

76. Routine is not loaded until it is called. All routines are kept on disk in a relocatable load format. The main program is loaded into memory & is executed. This type of loading is called _________
A. Static loading
B. Dynamic loading
C. Dynamic linking
D. Overlays
Ans: C

77. In the blocked state
A. the processes waiting for I/O are found
B. the process which is running is found
C. the processes waiting for the processor are found
D. none of the above
Ans: A

78. What is the memory from A.K – 6D.0K called ?
A. Extended Memory
B. Normal Memory
C. Low Memory
D. Conventional Memory
Ans: D

79. Virtual memory is __________.
A. An extremely large main memory
B. An extremely large secondary memory
C. An illusion of extremely large main memory
D. A type of memory used in super computers.
Ans: C

80. The process related to process control, file management, device management, information about system and communication that is requested by any higher level language can be performed by __________.
A. Editors
B. Compilers
C. System Call
D. Caching
Ans: C

81. Multiprogramming systems ________.
A. Are easier to develop than single programming systems
B. Execute each job faster
C. Execute more jobs in the same time
D. Are used only on large main frame computers
Ans: C

82. Which is not the state of the process ?
A. Blocked
B. Running
C. Ready
D. Privileged
Ans: D

83. The solution to Critical Section Problem is : Mutual Exclusion, Progress and Bounded Waiting.
A. The statement is false
B. The statement is true.
C. The statement is contradictory.
D. None of the above
Ans: B

84. The problem of thrashing is effected scientifically by ________.
A. Program structure
B. Program size
C. Primary storage size
D. None of the above
Ans: A

85. The state of a process after it encounters an I/O instruction is __________.
A. Ready
B. Blocked/Waiting
C. Idle
D. Running
Ans: B

86. The number of processes completed per unit time is known as __________.
A. Output
B. Throughput
C. Efficiency
D. Capacity
Ans: B

87. _________ is the situation in which a process is waiting on another process,which is also waiting on another process … which is waiting on the first process. None of the processes involved in this circular wait are making progress.
A. Deadlock
B. Starvation
C. Dormant
D. None of the above
Ans: A

88. Which of the following file name extension suggests that the file is Backup copy of another file ?
A. TXT
B. COM
C. BAS
D. BAK
Ans: D

89. Which technique was introduced because a single job could not keep both the CPU and the I/O devices busy?
A. Time-sharing
B. SPOOLing
C. Preemptive scheduling
D. Multiprogramming
Ans: D

90. A critical region
A. is a piece of code which only one process executes at a time
B. is a region prone to deadlock
C. is a piece of code which only a finite number of processes execute
D. is found only in Windows NT operation system
Ans: A

91. The mechanism that bring a page into memory only when it is needed is called ______.
A. Segmentation
B. Fragmentation
C. Demand Paging
D. Page Replacement
Ans: C

92. PCB =
A. Program Control Block
B. Process Control Block
C. Process Communication Block
D. None of the above
Ans: B

93. FIFO scheduling is ________.
A. Preemptive Scheduling
B. Non Preemptive Scheduling
C. Deadline Scheduling
D. Fair share scheduling
Ans: B

94. Switching the CPU to another Process requires to save state of the old process and loading new process state is called as __________.
A. Process Blocking
B. Context Switch
C. Time Sharing
D. None of the above
Ans: B

95. Which directory implementation is used in most Operating System?
A. Single level directory structure
B. Two level directory structure
C. Tree directory structure
D. Acyclic directory structure
Ans: C

96. ______ is a high level abstraction over Semaphore.
A. Shared memory
B. Message passing
C. Monitor
D. Mutual exclusion
Ans: C

97. A tree sturctured file directory system
A. allows easy storage and retrieval of file names
B. is a much debated unecessary feature
C. is not essential when we have millions of files
D. none of the above
Ans: A

98. Which of the following is not a fundamental process state
A. ready
B. terminated
C. executing
D. blocked
Ans: D

250+ TOP MCQs on Semaphores and Answers

Operating System Interview Questions and Answers for freshers on “Semaphores” and will also be useful for interview preparations for freshers.

1. What will happen if a non-recursive mutex is locked more than once?
a) Starvation
b) Deadlock
c) Aging
d) Signaling

Answer: b
Clarification: If a thread which had already locked a mutex, tries to lock the mutex again, it will enter into the waiting list of that mutex, which results in a deadlock. It is because no other thread can unlock the mutex.

2. What is a semaphore?
a) is a binary mutex
b) must be accessed from only one process
c) can be accessed from multiple processes
d) none of the mentioned

Answer: c
Clarification: None.

3. What are the two kinds of semaphores?
a) mutex & counting
b) binary & counting
c) counting & decimal
d) decimal & binary

Answer: b
Clarification: None.

4. What is a mutex?
a) is a binary mutex
b) must be accessed from only one process
c) can be accessed from multiple processes
d) none of the mentioned

Answer: b
Clarification: None.

5. At a particular time of computation the value of a counting semaphore is 7.Then 20 P operations and 15 V operations were completed on this semaphore. The resulting value of the semaphore is? (GATE 1987)
a) 42
b) 2
c) 7
d) 12

Answer: b
Clarification: P represents Wait and V represents Signal. P operation will decrease the value by 1 every time and V operation will increase the value by 1 every time.

6. A binary semaphore is a semaphore with integer values ____________
a) 1
b) -1
c) 0.8
d) 0.5

Answer: a
Clarification: None.

7. The following pair of processes share a common variable X.

Process A
int Y;
A1: Y = X*2;
A2: X = Y;   
 
Process B
int Z;
B1: Z = X+1;
B2: X = Z;

X is set to 5 before either process begins execution. As usual, statements within a process are executed sequentially, but statements in process A may execute in any order with respect to statements in process B.
How many different values of X are possible after both processes finish executing?
a) two
b) three
c) four
d) eight

Answer: c
Clarification: Here are the possible ways in which statements from A and B can be interleaved.
A1 A2 B1 B2: X = 11
A1 B1 A2 B2: X = 6
A1 B1 B2 A2: X = 10
B1 A1 B2 A2: X = 10
B1 A1 A2 B2: X = 6
B1 B2 A1 A2: X = 12.

8. The program follows to use a shared binary semaphore T.

Process A  
int Y;            
A1: Y = X*2;      
A2: X = Y;        
signal(T);        
 
Process B
int Z;
B1: wait(T);
B2: Z = X+1;
X = Z;

T is set to 0 before either process begins execution and, as before, X is set to 5.
Now, how many different values of X are possible after both processes finish executing?
a) one
b) two
c) three
d) four

Answer: a
Clarification: The semaphore T ensures that all the statements from A finish execution before B begins. So now there is only one way in which statements from A and B can be interleaved:
A1 A2 B1 B2: X = 11.

9. Semaphores are mostly used to implement ____________
a) System calls
b) IPC mechanisms
c) System protection
d) None of the mentioned

Answer: b
Clarification: None.

10. Spinlocks are intended to provide __________ only.
a) Mutual Exclusion
b) Bounded Waiting
c) Aging
d) Progress

Answer: b

250+ TOP MCQs on Memory Management – Segmentation and Answers

Operating System MCQs on “Memory Management – Segmentation”

1. In segmentation, each address is specified by ____________
a) a segment number & offset
b) an offset & value
c) a value & segment number
d) a key & value

Answer: a
Clarification: None.

2. In paging the user provides only ________ which is partitioned by the hardware into ________ and ______
a) one address, page number, offset
b) one offset, page number, address
c) page number, offset, address
d) none of the mentioned

Answer: a
Clarification: None.

3. Each entry in a segment table has a ____________
a) segment base
b) segment peak
c) segment value
d) none of the mentioned

Answer: a
Clarification: None.

4. The segment base contains the ____________
a) starting logical address of the process
b) starting physical address of the segment in memory
c) segment length
d) none of the mentioned

Answer: b
Clarification: None.

5. The segment limit contains the ____________
a) starting logical address of the process
b) starting physical address of the segment in memory
c) segment length
d) none of the mentioned

Answer: c
Clarification: None.

6. The offset ‘d’ of the logical address must be ____________
a) greater than segment limit
b) between 0 and segment limit
c) between 0 and the segment number
d) greater than the segment number

Answer: b
Clarification: None.

7. If the offset is legal ____________
a) it is used as a physical memory address itself
b) it is subtracted from the segment base to produce the physical memory address
c) it is added to the segment base to produce the physical memory address
d) none of the mentioned

Answer: a
Clarification: None.

8. When the entries in the segment tables of two different processes point to the same physical location ____________
a) the segments are invalid
b) the processes get blocked
c) segments are shared
d) all of the mentioned

Answer: c
Clarification: None.

9. The protection bit is 0/1 based on ____________
a) write only
b) read only
c) read – write
d) none of the mentioned

Answer: c
Clarification: None.

10. If there are 32 segments, each of size 1Kb, then the logical address should have ____________
a) 13 bits
b) 14 bits
c) 15 bits
d) 16 bits

Answer: a
Clarification: To specify a particular segment, 5 bits are required. To select a particular byte after selecting a page, 10 more bits are required. Hence 15 bits are required.

11. Consider a computer with 8 Mbytes of main memory and a 128K cache. The cache block size is 4 K. It uses a direct mapping scheme for cache management. How many different main memory blocks can map onto a given physical cache block?
a) 2048
b) 256
c) 64
d) 8

Answer: c
Clarification: None.

12. A multilevel page table is preferred in comparison to a single level page table for translating virtual address to physical address because ____________
a) it reduces the memory access time to read or write a memory location
b) it helps to reduce the size of page table needed to implement the virtual address space of a process
c) it is required by the translation lookaside buffer
d) it helps to reduce the number of page faults in page replacement algorithms

Answer: b

250+ TOP MCQs on Security – Program and System Threats and Answers

Operating System Multiple Choice Questions on “Security – Program and System Threats”.

1. What is the breach of integrity?
a) This type of violation involves unauthorized reading of data
b) This violation involves unauthorized modification of data
c) This violation involves unauthorized destruction of data
d) This violation involves unauthorized use of resources

Answer: b
Clarification: None.

2. What is breach of confidentiality?
a) This type of violation involves unauthorized reading of data
b) This violation involves unauthorized modification of data
c) This violation involves unauthorized destruction of data
d) This violation involves unauthorized use of resources

Answer: a
Clarification: None.

3. What is theft of service?
a) This type of violation involves unauthorized reading of data
b) This violation involves unauthorized modification of data
c) This violation involves unauthorized destruction of data
d) This violation involves unauthorized use of resources

Answer: d
Clarification: None.

4. What is breach of availability?
a) This type of violation involves unauthorized reading of data
b) This violation involves unauthorized modification of data
c) This violation involves unauthorized destruction of data
d) This violation involves unauthorized use of resources

Answer: c
Clarification: None.

5. What is Trojan horse?
a) It is a useful way to encrypt password
b) It is a user which steals valuable information
c) It is a rogue program which tricks users
d) It’s a brute force attack algorithm

Answer: c
Clarification: None.

6. What is trap door?
a) IT is trap door in WarGames
b) It is a hole in software left by designer
c) It is a Trojan horse
d) It is a virus which traps and locks user terminal

Answer: b
Clarification: None.

7. Which mechanism is used by worm process?
a) Trap door
b) Fake process
c) Spawn Process
d) VAX process

Answer: c
Clarification: None.

8. Which of the following is not a characteristic of a virus?
a) Virus destroy and modify user data
b) Virus is a standalone program
c) Virus is a code embedded in a legitimate program
d) Virus cannot be detected

Answer: d
Clarification: Virus can be detected by having an antivirus program.

9. What is known as masquerading?
a) When one participant in communication pretends to be someone else
b) When attacker modifies data in communication
c) When attack is of fraudulent repeat of a valid data
d) When attack gains access to remote systems

Answer: a
Clarification: None.

10. Who unleashed famous worm attack in 1988 which effected UNIX systems and caused losses in millions?
a) Robert Morris
b) Bob Milano
c) Mark zuckerberg
d) Bill Gates

Answer: a
Clarification: None.

11. What is port scanning?
a) It is a software used to scan system for attack
b) It is a software application designed to probe a server or host for open ports
c) It is software used to scan system for introducing attacks by brute force
d) None of the mentioned

Answer: b
Clarification: None.

12. Which is not a port scan type?
a) TCP scanning
b) SYN scanning
c) UDP scanning
d) SYSTEM Scanning

Answer: d
Clarification: None.

13. Which is not a valid port scan type?
a) ACK scanning
b) Window scanning
c) IGMP scan
d) FIN scanning

Answer: c
Clarification: None.

14. What are zombie systems?
a) Are specific system which are designed to attack by manufacturer
b) They are network of known hacking group
c) These systems are previously compromised independent systems
d) None of the mentioned

Answer: c
Clarification: None.

15. What is known as a DOS attack?
a) It is attacked to block traffic of network
b) It is attacked to harm contents stored in HDD by worm spawn processes
c) It is an attempt to make a machine or network resource unavailable
d) None of the mentioned

Answer: c
Clarification: None.

16. With regard to DOS attack what is not true from below options?
a) We can stop DOS attack completely
b) By upgrading OS vulnerability we can stop DOS attack to some extent
c) DOS attack has to be stopped at network level
d) Such attack can last for hours

Answer: a

250+ TOP MCQs on Virtual Memory – Page Replacement Algorithms and Answers

Operating System MCQs on “Virtual Memory – Page Replacement Algorithms”.

1. When using counters to implement LRU, we replace the page with the ____________
a) smallest time value
b) largest time value
c) greatest size
d) none of the mentioned

Answer: a
Clarification: Whenever a reference to a page is made, the contents of the clock register are copied into the time-of-use field in the page-table entry for that page. In this way, we always have the time of the last reference to each page.

2. In the stack implementation of the LRU algorithm, a stack can be maintained in a manner ____________
a) whenever a page is used, it is removed from the stack and put on bottom
b) the bottom of the stack is the LRU page
c) the top of the stack contains the LRU page and all new pages are added to the top
d) none of the mentioned

Answer: b
Clarification: None.

3. There is a set of page replacement algorithms that can never exhibit Belady’s Anomaly, called ____________
a) queue algorithms
b) stack algorithms
c) string algorithms
d) none of the mentioned

Answer: b
Clarification: None.

4. Applying the LRU page replacement to the following reference string.
1 2 4 5 2 1 2 4
The main memory can accommodate 3 pages and it already has pages 1 and 2. Page 1 came in before page 2.
How many page faults will occur?
a) 2
b) 3
c) 4
d) 5

Answer: c
Clarification: None.

5. Increasing the RAM of a computer typically improves performance because ____________
a) Virtual memory increases
b) Larger RAMs are faster
c) Fewer page faults occur
d) None of the mentioned

Answer: c
Clarification: None.

6. The essential content(s) in each entry of a page table is/are ____________
a) Virtual page number
b) Page frame number
c) Both virtual page number and page frame number
d) Access right information

Answer: b
Clarification: None.

7. The minimum number of page frames that must be allocated to a running process in a virtual memory environment is determined by ____________
a) the instruction set architecture
b) page size
c) physical memory size
d) number of processes in memory

Answer: a
Clarification: None.

8. What is the reason for using the LFU page replacement algorithm?
a) an actively used page should have a large reference count
b) a less used page has more chances to be used again
c) it is extremely efficient and optimal
d) all of the mentioned

Answer: a
Clarification: None.

9. What is the reason for using the MFU page replacement algorithm?
a) an actively used page should have a large reference count
b) a less used page has more chances to be used again
c) it is extremely efficient and optimal
d) all of the mentioned

Answer: b
Clarification: None.

10. The implementation of the LFU and the MFU algorithm is very uncommon because ____________
a) they are too complicated
b) they are optimal
c) they are expensive
d) all of the mentioned

Answer: c