250+ TOP MCQs on Memory Management – Swapping Processes

Operating System Questions on “Swapping Processes” and will also be useful for interview preparations for experienced people.

1. The address generated by the CPU is referred to as ____________
a) Physical address
b) Logical address
c) Neither physical nor logical
d) None of the mentioned

Answer: b
Clarification: None.

2. The address loaded into the memory address register of the memory is referred to as ____________
a) Physical address
b) Logical address
c) Neither physical nor logical
d) None of the mentioned

Answer: a
Clarification: None.

3. The run time mapping from virtual to physical addresses is done by a hardware device called the ____________
a) Virtual to physical mapper
b) Memory management unit
c) Memory mapping unit
d) None of the mentioned

Answer: b
Clarification: None.

4. The base register is also known as the ____________
a) basic register
b) regular register
c) relocation register
d) delocation register

Answer: c
Clarification: None.

5. The size of a process is limited to the size of ____________
a) physical memory
b) external storage
c) secondary storage
d) none of the mentioned

Answer: a
Clarification: None.

6. If execution time binding is being used, then a process ______ be swapped to a different memory space.
a) has to be
b) can never
c) must
d) may

Answer: d
Clarification: None.

7. Swapping requires a _________
a) motherboard
b) keyboard
c) monitor
d) backing store

Answer: d
Clarification: None.

8. The backing store is generally a ____________
a) fast disk
b) disk large enough to accommodate copies of all memory images for all users
c) disk to provide direct access to the memory images
d) all of the mentioned

Answer: d
Clarification: None.

9. The ________ consists of all processes whose memory images are in the backing store or in memory and are ready to run.
a) wait queue
b) ready queue
c) cpu
d) secondary storage

Answer: b
Clarification: None.

10. The _________ time in a swap out of a running process and swap in of a new process into the memory is very high.
a) context – switch
b) waiting
c) execution
d) all of the mentioned

Answer: a
Clarification: None.

11. The major part of swap time is _______ time.
a) waiting
b) transfer
c) execution
d) none of the mentioned

Answer: b
Clarification: None.

12. Swapping _______ be done when a process has pending I/O, or has to execute I/O operations only into operating system buffers.
a) must
b) can
c) must never
d) maybe

Answer: c
Clarification: None.

13. Swap space is allocated ____________
a) as a chunk of disk
b) separate from a file system
c) into a file system
d) all of the mentioned

Answer: a

250+ TOP MCQs on Multimedia System – Compression and Answers

Operating System Multiple Choice Questions on “Compression”.

1. The major difference between a multimedia file and a regular file is ___________
a) the size
b) the attributes
c) the ownership
d) the rate at which the file must be accessed

Answer: d
Clarification: Multimedia files must be accessed at a specific rate whereas accessing regular files requires no special timings.

2. Video is represented as a series of images formally known as ___________
a) pics
b) shots
c) frames
d) snaps

Answer: c
Clarification: None.

3. The faster the frames are displayed, ___________
a) the rougher the video appears
b) the smoother the video appears
c) it gets blurry
d) none of the mentioned

Answer: b
Clarification: None.

4. The characteristic of the eye to retain the image for a short time after it has been presented is known as ___________
a) persistence of vision
b) learning power
c) memory mapped input
d) none of the mentioned

Answer: a
Clarification: None.

5. When will Local playback be used?
a) the multimedia data are delivered from a local file system
b) a computer next to you is playing something
c) a multimedia file is being played on a system in the local network
d) none of the mentioned

Answer: a
Clarification: None.

6. Multimedia files stored on a remote server are delivered to a client across the network using a technique known as ___________
a) download
b) streaming
c) flowing
d) leaking

Answer: b
Clarification: None.

7. What are the two types of streaming techniques?
a) progressive download & real time streaming
b) regular download & real time streaming
c) real time & virtual time streaming
d) virtual time streaming

Answer: a
Clarification: None.

8. A media file containing audio or video is downloaded and stored on the client’s local file system in ___________
a) progressive download
b) regular download
c) real time streaming
d) virtual time streaming

Answer: a
Clarification: As the file is being downloaded, the client is able to play back the media file without having to wait for the file to be downloaded in its entirety.

9. Progressive download is most useful for ___________
a) short video clips
b) long video clips
c) extremely long and high quality videos
d) none of the mentioned

Answer: a
Clarification: None.

10. The media file is streamed to the client but is only played and not stored by the client in ___________
a) progressive download
b) regular download
c) real time streaming
d) virtual time streaming

Answer: c
Clarification: None.

11. Real time streaming is most useful for ___________
a) short video clips
b) long video clips
c) extremely short and low quality videos
d) none of the mentioned

Answer: b

250+ TOP MCQs on Thread Cancellation and Answers

Operating System Multiple Choice Questions on “Thread Cancellation”.

1. What is Thread cancellation?
a) the task of destroying the thread once its work is done
b) the task of removing a thread once its work is done
c) the task of terminating a thread before it has completed
d) none of the mentioned

Answer: c
Clarification: None.

2. When a web page is loading, and the user presses a button on the browser to stop loading the page?
a) the thread loading the page continues with the loading
b) the thread loading the page does not stop but continues with another task
c) the thread loading the page is paused
d) the thread loading the page is cancelled

Answer: d
Clarification: None.

3. When one thread immediately terminates the target thread, it is called ____________
a) Asynchronous cancellation
b) Systematic cancellation
c) Sudden Termination
d) Deferred cancellation

Answer: a
Clarification: None.

4. When the target thread periodically checks if it should terminate and terminates itself in an orderly manner, it is called?
a) Asynchronous cancellation
b) Systematic cancellation
c) Sudden Termination
d) Deferred cancellation

Answer: d
Clarification: None.

5. Cancelling a thread asynchronously ____________
a) frees all the resources properly
b) may not free each resource
c) spoils the process execution
d) none of the mentioned

Answer: b
Clarification: None.

6. Cancellation point is the point where ____________
a) the thread can be cancelled – safely or otherwise doesn’t matter
b) the thread can be cancelled safely
c) the whole process can be cancelled safely
d) none of the mentioned

Answer: b
Clarification: None.

7. If multiple threads are concurrently searching through a database and one thread returns the result then the remaining threads must be ____________
a) continued
b) cancelled
c) protected
d) none of the mentioned

Answer: b

250+ TOP MCQs on File System Interface Protection and Answers

Operating System Multiple Choice Questions on “File System Interface Protection”.

1. Reliability of files can be increased by _____________
a) keeping the files safely in the memory
b) making a different partition for the files
c) by keeping them in external storage
d) by keeping duplicate copies of the file
Answer: d
Clarification: None.

2. Protection is only provided at the _____ level.
a) lower
b) central
c) higher
d) none of the mentioned
Answer: a
Clarification: None.

3. What is the main problem with access control lists?
a) their maintenance
b) their length
c) their permissions
d) all of the mentioned
Answer: b
Clarification: None.

4. Many systems recognize three classifications of users in connection with each file (to condense the access control list).
a) Owner
b) Group
c) Universe
d) All of the mentioned
Answer: d
Clarification: None.

5. All users in a group get _______ access to a file.
a) different
b) similar
c) same
d) none of the mentioned
Answer: b
Clarification: None.

6. Universe consists of _____________
a) all users that aren’t included in the group or owners
b) all users that are not owners
c) all users in the system
d) none of the mentioned
Answer: c
Clarification: None.

7. In UNIX, groups can be created and modified by?
a) superuser
b) any user
c) a programmer only
d) the people in the group only
Answer: a
Clarification: None.

8. To control access the three bits used in UNIX are represented by _____________
a) r
b) w
c) x
d) all of the mentioned
Answer: d
Clarification: None.

9. If each access to a file is controlled by a password, then what is the disadvantage?
a) user will need to remember a lot of passwords
b) it is not reliable
c) it is not efficient
d) all of the mentioned
Answer: a
Clarification: None.

10. What will happen in a multi level directory structure?
a) the same previous techniques will be used as in the other structures
b) a mechanism for directory protection will have to applied
c) the subdirectories do not need protection once the directory is protected
d) none of the mentioned
Answer: b
Clarification: None.

11. In UNIX, the directory protection is handled _________ to the file protection.
a) different
b) similar
c) it is not handled at all
d) none of the mentioned
Answer: b
Clarification: None.

12. Disks are segmented into one or more partitions, each containing a file system or ______
a) left ‘raw’
b) made into swap space
c) made into backup space
d) left ‘ripe’
Answer: a
Clarification: None.

Global Education & Learning Series – Operating System.

Participate in the Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

250+ TOP MCQs on Protection – Access Matrix and Answers

Operating System Multiple Choice Questions on “Protection – Access Matrix”.

1. In domain structure what is Access-right equal to?
a) Access-right = object-name, rights-set
b) Access-right = read-name, write-set
c) Access-right = read-name, execute-set
d) Access-right = object-name, execute-set

Answer: a

2. What is meaning of right-set?
a) It is a subset consist of read and write
b) It is a subset of all valid operations that can be performed on the object
c) It is a subset consist of read, write and execute
d) None of the mentioned

Answer: b

3. What is Domain?
a) Domain = Set of all objects
b) It is a collection of protection policies
c) Domain= set of access-rights
d) None of the mentioned

Answer: c

4. What does the access matrix represent?
a) Rows-Domains, Columns-Objects
b) Rows-Objects, Columns-Domains
c) Rows-Access List, Columns-Domains
d) Rows-Domains, Columns-Access list

Answer: a
Clarification: None.

5. What are the three additional operations to change the contents of the access-matrix?
a) copy
b) Owner
c) control
d) all of the mentioned

Answer: d
Clarification: None.

6. Who can add new rights and remove some rights?
a) copy
b) transfer
c) limited copy
d) owner

Answer: d
Clarification: None.

7. What are the three copyrights?
a) copy
b) transfer
c) limited copy
d) all of the mentioned

Answer: d
Clarification: None.

8. Which two rights allow a process to change the entries in a column?
a) copy and transfer
b) copy and owner
c) owner and transfer
d) deny and copy

Answer: a
Clarification: None.

9. Which is an unsolvable problem in access-matrix?
a) Owner override
b) Brute force
c) Access denied
d) Confinement

Answer: d
Clarification: None.

10. Which of the following objects require protection?
a) CPU
b) Printers
c) Motherboard
d) All of the mentioned

Answer: b
Clarification: None.

11. What is ‘separation’ in security of Operating systems?
a) To have separate login for different users
b) To have separate Hard disk drive/partition for different users
c) It means keeping one user’s objects separate from other users
d) None of the mentioned

Answer: c
Clarification: None.

12. Which of the following statements are correct?
i) Physical separation – in which process use different physical objects like separate printers
ii) Physical separation – in which process having different security requirement at different times
iii) Logical separation – In which users operate under illusion that no other processes exist
iv) Logical separation – In which processes conceal their data and computations
a) i
b) i and iii
c) ii and iii
d) iii and iv

Answer: b
Clarification: None.

13. Which of the following statements are correct?
i) Physical separation – in which process use different physical objects like separate printers
ii) Temporal separation – in which process having different security requirement at different times
iii) Physical separation – In which users operate under illusion that no other processes exist
iv) Temporal separation – In which processes conceal their data and computations
a) i
b) i and ii
c) ii and iii
d) iii and iv

Answer: b
Clarification: None.

14. Which of the following statements are correct?
i) logical separation – in which process use different physical objects like separate printers
ii) cryptographic separation – in which process having different security requirement at different times
iii) Logical separation – In which users operate under illusion that no other processes exist
iv) cryptographic separation – In which processes conceal their data and computations
a) i
b) i and ii
c) ii and iii
d) iii and iv
View Answer

Answer: d
Clarification: None.

15. What are the various roles of protection?
a) It is used to detect errors which can prevent contamination of system
b) It is used used to accelerate a process
c) It is used to optimize system downtime
d) None of the mentioned

Answer: a
Clarification: None.

16. Which of the following objects require protection?
a) Memory
b) Monitor
c) Power supply unit
d) All of the mentioned

Answer: a

250+ TOP MCQs on CPU Scheduling Benefits and Answers

Operating System Multiple Choice Questions on “CPU Scheduling Benefits”.

1. CPU scheduling is the basis of ___________
a) multiprocessor systems
b) multiprogramming operating systems
c) larger memory sized systems
d) none of the mentioned

Answer: b
Clarification: None.

2. With multiprogramming ______ is used productively.
a) time
b) space
c) money
d) all of the mentioned

Answer: a
Clarification: None.

3. What are the two steps of a process execution?
a) I/O & OS Burst
b) CPU & I/O Burst
c) Memory & I/O Burst
d) OS & Memory Burst

Answer: b
Clarification: None.

4. An I/O bound program will typically have ____________
a) a few very short CPU bursts
b) many very short I/O bursts
c) many very short CPU bursts
d) a few very short I/O bursts

Answer: c
Clarification: None.

5. A process is selected from the ______ queue by the ________ scheduler, to be executed.
a) blocked, short term
b) wait, long term
c) ready, short term
d) ready, long term

Answer: c
Clarification: None.

6. In the following cases non – preemptive scheduling occurs?
a) When a process switches from the running state to the ready state
b) When a process goes from the running state to the waiting state
c) When a process switches from the waiting state to the ready state
d) All of the mentioned

Answer: b
Clarification: There is no other choice.

7. The switching of the CPU from one process or thread to another is called ____________
a) process switch
b) task switch
c) context switch
d) all of the mentioned

Answer: d
Clarification: None.

8. What is Dispatch latency?
a) the speed of dispatching a process from running to the ready state
b) the time of dispatching a process from running to ready state and keeping the CPU idle
c) the time to stop one process and start running another one
d) none of the mentioned

Answer: c
Clarification: None.

9. Scheduling is done so as to ____________
a) increase CPU utilization
b) decrease CPU utilization
c) keep the CPU more idle
d) none of the mentioned

Answer: a
Clarification: None.

10. Scheduling is done so as to ____________
a) increase the throughput
b) decrease the throughput
c) increase the duration of a specific amount of work
d) none of the mentioned

Answer: a
Clarification: None.

11. What is Turnaround time?
a) the total waiting time for a process to finish execution
b) the total time spent in the ready queue
c) the total time spent in the running queue
d) the total time from the completion till the submission of a process

Answer: d
Clarification: None.

12. Scheduling is done so as to ____________
a) increase the turnaround time
b) decrease the turnaround time
c) keep the turnaround time same
d) there is no relation between scheduling and turnaround time

Answer: b
Clarification: None.

13. What is Waiting time?
a) the total time in the blocked and waiting queues
b) the total time spent in the ready queue
c) the total time spent in the running queue
d) the total time from the completion till the submission of a process

Answer: b
Clarification: None.

14. Scheduling is done so as to ____________
a) increase the waiting time
b) keep the waiting time the same
c) decrease the waiting time
d) none of the mentioned

Answer: c
Clarification: None.

15. What is Response time?
a) the total time taken from the submission time till the completion time
b) the total time taken from the submission time till the first response is produced
c) the total time taken from submission time till the response is output
d) none of the mentioned

Answer: b