UGC NET STUDY MATERIALS

OPERATING SYSTEM WITH UNIX

QUIZ QUESTION OF "OPERATING SYSTEM WITH UNIX"

================================================
                                      Unit 01
================================================



Question 1
 Match the following

Operating system Choose... larger capacity system software application software smaller capacity

Library system Choose... larger capacity system software application software smaller capacity

secondary storage Choose... larger capacity system software application software smaller capacity

Main memory Choose... larger capacity system software application software smaller capacity
================================================
Question 2

  A process is _____________

  a. program in main memory

b. Program in cache memory

c. program in secondary storage

d. program in execution
================================================
Question 3

 A program to be executed must be in ________________

  a. main memory

b. secondary memory

c. virtual memory

d. Read only memory
================================================
Question 4

  A sequence of instructions telling the computer what to do is called a ____________

 a. program

b. language

c. translator

d. package
================================================
Question 5

 A _______________is a collection of processors that do not share memory, peripheral devices, or a clock.

 a. Computer system

b. distributed system

c. network

d. none of the above
================================================
Question 6

  _____________are very expensive and employed for specialized applications such as weather forecasting

  a. Micro computers

b. Super computers

c. Personal computers

d. Mainframe computers
================================================
                                        UNIT=2
================================================
Question 1


  Match the following.

QNX Choose... Based on the microkernel design Bell Labs CPU Software package

MPI Choose... Based on the microkernel design Bell Labs CPU Software package

gCore Choose... Based on the microkernel design Bell Labs CPU Software package

Plan9 Operating System Choose... Based on the microkernel design Bell Labs CPU Software package
================================================
Question 2

 In layered approach each layer uses the functions and services of ______________

 a. kernel

b. lower-level layers

c. higher-level layers

d. all of these
================================================
Question 3

 In MS-DOS, the interfaces and levels of functionality are ____________

  a. not well separated.

b. well separated

c. independent

d. dependent
================================================
Question 4

  PVM stands for

  a. Parallel Virtual Machine

b. Parallel Virtual Meassage

c. Process Virtual Machine

d. Process Virtual Monitor
================================================
Question 5

Using_________________ the file subsystem of Kernal mode is responsible for file and I/O management.

  a. system calls

b. device drivers

c. modules

d. virtualization technique
================================================
Question 6

  _________________ approach simplifies debugging and system verification.

  a. Kernel

b. Layered

c. Extended

d. Virtual machine

================================================



 Question 7

  _________________is a piece of computer software that isolates the application being used by the user from the computer.

  a. Compiler

b. Modules

c. Virtual machine

d. none of these
================================================
                                                UNIT=3
================================================
Question 1


 A context is the contents of a _________ and ________ at any point of time.

  a. MDR, IR

b. CPU registers, PC

c. MDR, PC

d. CPU registers, IR
================================================
Question 2

 A process control block contains varies attributes required by ____________to control a process.

  a. RAM

b. virtual memory

c. BIOS

d. Operating System
================================================
Question 3

  A process may create a new process by executing ___________system call.

  a. init

b. fork

c. create

d. new
================================================
Question 4

  Which of these is a reason for using threads in designing operating systems

  a. Unlike processes, threads are not independent of one another

b. All threads can access every address in the task .

c. Because threads can share common data, they do not need to use interprocess communication.

d. Like processes, thread can create children.
================================================
Question 5

  ______________ are popular way to improve application through parallelism

 a. Processes

b. Threads

c. Context switching

d. None of these
================================================
                                            UNIT=4
================================================
Question 1


  Arrange the following memories in terms of increasing access time (from low to high) 1. registers 2. Main memory 3. secondary memory 4. cache

  a. 1-3-4-2

b. 1-4-2-3

c. 3-2-4-1

d. 2-4-1-3

================================================
Question 2

  Microprocessors with small internal caches often employ the ________________mechanism

 a. direct mapping

b. fully associative

c. set associative

d. sector mapping
================================================
Question 3

 __________ deals with when a modified page should be written out to secondary memory.

 a. Cleaning policy

b. Fetch policy

c. Frame locking

d. None of these
================================================
Question 4

  ____________is responsible for allocating primary memory to processes and for assisting the programmer in loading and storing the contents of the primary memory.

 a. Operating system

b. Memory manager

c. Database administrator

d. RAM
================================================
Question 5

  ________________ refers to the technology in which some space in hard disk is used as an extension of main memory.

  a. Cache memory

b. Paging

c. Virtual memory

d. page
================================================
                                                   UNIT=5
================================================
Question 1


  A solution to starvation is _____________.

 a. segmentation

b. Aging

c. Paging

d. virtual memory
================================================
Question 2

 Given four processes with Burst time P1=6, P2=8, P3=7 and P4=3 calculate average waiting time using SJF scheduling algorithm.

 a. 7.0 ms

b. 10.25 ms

c. 3.0 ms

d. 17.0 ms
================================================
Question 3

  The time taken by the Dispatcher to stop one process and start another running is known as _________________.

  a. Turnaround time

b. Dispatch Latency

c. Access time

d. Response time
================================================
Question 4

 __________ systems are required to complete a critical task within a guaranteed amount of time.

  a. Virtual

b. soft real time

c. Hard Real time

d. None of these
================================================
Question 5

 ______________ selects a process from among the ready processes to execute on the CPU.

 a. CPU Schedular

b. Loader

c. Dispatcher

d. Compiler
================================================
                              UNIT=6
================================================
Question 1


  Match the following

pipes Choose... continuously change their state WNOHANG fixed size web server

livelock Choose... continuously change their state WNOHANG fixed size web server

Killing Zombies Choose... continuously change their state WNOHANG fixed size web server

argumen Choose... continuously change their state WNOHANG fixed size web server
================================================
Question 2

 When a child dies, it sends a __________________ signal to its parent.

a. SIGCHLD

b. EDEADLK

c. WNOHANG

d. SEDECHLD
================================================
Question 3

  When resources have multiple instances _________ is used for deadlock Avoidance.

 a. Banker's algorithm

b. Resource Allocation Graph

c. semaphores

d. all of these
================================================
Question 4

  ______________ is a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function.

  a. Semaphore

b. Deadlock

c. Mutual Exclusion

d. No preemption
================================================
Question 5

  __________________refers to a strategy where whenever a resource is requested, it is only granted if it cannot result in deadlock.

  a. Deadlock Prevention

b. Livelock

c. Deadlock avoidance

d. None of these
================================================
                                        UNIT=7
================================================
Question 1


  In an interrupt driven system, context switches from one process to another can only occur on _______________

 a. predetermined time

b. interrupt

c. Busy waiting

d. all of these
================================================
Question 2

  The introduction of mutual exclusion can prevent race conditions but can lead to problems such as _______________
 a. deadlock

b. starvation

c. Both a) and b)

d. None of these
================================================
Question 3

  ____________ is a mechanism the prevents two or more processes from accessing a shared resource simultaneously.

  a. Livelock

b. Preemption

c. Semaphore

d. Either a) or b)
================================================
Question 4

 ____________ occurs when two or more execution flows are able to run simultaneously.
    a. Deadlock

b. Concurrency

c. Race condition

d. Interrupt
================================================
Question 5

 _____________ occurs when multiple processes or threads read and write data items so that the final result depends on the order of execution of instructions in the multiple processes.

  a. Race condition

b. Mutual exclusion

c. Exception

d. Interrupt
================================================
                                        UNIT=8
================================================
Question 1


  A two-byte integer called __________ is interpreted as an index into an array of inodes in a fixed, known location on disk.

  a. an inode

b. an inumber

c. an imap

d. an imark

================================================
Question 2

 A variable sized block is called ____________

 a. an extent

b. a segment

c. a page

d. a fragment
================================================
Question 3

 In Multics, a process could have up to 256K segments, but each segment was limited to ___________ words.

 a. 64K

b. 32K

c. 1024K

d. 112K
================================================
Question 4

  In ____________ the disk drive itself has a way of discovering bad blockswith extremely high probability.

 a. disk index

b. Extents

c. Bad-block forwarding

d. back-up dumps
================================================
Question 5

  The problem with logical dumping is ______________

 a. very costly

b. very slow

c. human errors

d. all of these
================================================
                                    UNIT=9
================================================
Question 1


  Match the following

Programmed controlled I/O Choose... maskable and non maskable polled I/O Cycle stealing

Interrupt controlled I/O Choose... maskable and non maskable polled I/O Cycle stealing

DMA Choose... maskable and non maskable polled I/O Cycle stealing
================================================
Question 2

  A SCSI device can transfer up to____________ of information per second.
   a. 40 Mbytes

b. 60 Mbytes

c. 40 Gbytes

d. 60 Gbytes
================================================
Question 3

  Because the I/O devices are not synchronized with the CPU, some information must be exchanged between the CPU and the device to ensure that the data is received reliably. This interaction between the CPU and an I/O device is usually referred to as ____________________

  a. polling

b. arbitration

c. handshaking

d. interrupting
================================================
Question 4

  In___________, the requesting device or devices assert the signal bus_request.

  a. Priority encoded arbitration

b. Distributed arbitration by self-selection

c. Priority arbitration

d. Daisy chain arbitration
================================================
Question 5

  The controller can access memory in memory cycles which are not used by the particular bank of memory into which the DMA controller is writing data. This approach, called ________________

 a. interrupting

b. cycle stealing

c. swapping

d. paging
================================================
Question 6

  ______________ approach can place the data directly into the memory or take the data directly from the memory without direct intervention from the processor.

  a. DMA

b. Daisy chain arbitration

c. polling

d. none of these
================================================
                                         UNIT=10
================================================
Question 1


  Match the following

Process manager Choose... Device detection and installation Drawing windows and menus Communication between clients. Thread creation

IPC manager Choose... Device detection and installation Drawing windows and menus Communication between clients. Thread creation

PNP manager Choose... Device detection and installation Drawing windows and menus Communication between clients. Thread creation

Window manager Choose... Device detection and installation Drawing windows and menus Communication between clients. Thread creation
================================================
 Question 2

  SRM stands for

  a. Security Resource Manager

b. Secret Resource Manager

c. Security Reference Monitor

d. Security Reference Manual
================================================
Question 3

  The two sub systems of user mode layer of windows 2000 are _______ and _______

  a. excel, executive

b. environment, integral

c. orbit, kernel

d. Kernel, executive
================================================
Question 4

  Windows 2000 supports _______________ type of file system

  a. NTFS

b. EFS

c. FEFS

d. EFFS
================================================
Question 5

  Windows NT operating system architecture consists of _______ and __________layers.

 a. physical, data link

b. Micro , Macro

c. user mode, Kernel mode

d. Physical , Micro
================================================
Question 6

 ___________ file system allows sharing in multiple different locations grouped under one folder.

  a. Direct

b. distributed

c. sequential

d. parallel
================================================
                                  UNIT=1(B)
================================================
Question 1


 Match the following

kernel Choose... Case sensitive: Switches between processes Initialization of I/O devices Sells UnixWare

Operating system Choose... Case sensitive: Switches between processes Initialization of I/O devices Sells UnixWare

Unix commands Choose... Case sensitive: Switches between processes Initialization of I/O devices Sells UnixWare

Novell Choose... Case sensitive: Switches between processes Initialization of I/O devices Sells UnixWare
================================================
Question 2

  A standard UNIX system includes a set of ___________ and a set of ___________.

 a. Commands ,files

b. Libraries, Applications

c. Libraries, files

d. Files, Applications
================================================
Question 3

 BSD stands for_____.

  a. Basic Software Division

b. Berkeley Software Distribution

c. British Software Distribution

d. Berkeley Software data
================================================
Question 4

 Initialization of I/O devices is part of the_________.

 a. CPU

b. MSDOS

c. UNIX kernel

d. None of the above
================================================
Question 5

 UNIX operating system is a layer between the ________ and the __________that run on the computer.

  a. Process, File

b. Word processor, Application

c. Hardware, Applications

d. Process,Hardware
================================================
                                   UNIT=2(B)
================================================
Question 1


  Ext2 is the standard file system of _______ and uses a block size of_____bytes

  a. MS DOS,8K

b. Linux ,1024

c. Linux, 512

d. Unix, 512
================================================
Question 2

  Match the following

Bootstrap Choose... Hardware dependent not readable to every user Runs as process 0 on SVR5 Does not easily support random access

Shadow file Choose... Hardware dependent not readable to every user Runs as process 0 on SVR5 Does not easily support random access

Tape media Choose... Hardware dependent not readable to every user Runs as process 0 on SVR5 Does not easily support random access

sched Choose... Hardware dependent not readable to every user Runs as process 0 on SVR5 Does not easily support random access
================================================
Question 3

 Fsck conducts a check in _____ phases

  a. One

b. Two

c. Five

d. Eight
================================================
Question 4

 Bootstrapping is also known as ______

 a. cold-hot boot

b. hot boot

c. hot strap

d. cold boot
================================================
Question 5

  Removal cartridge drives have _____capacity and _______cost per megabyte

 a. Higher,lower

b. lower,cheaper

c. higher,higher

d. lower, higher
================================================
                                            UNIT=3(B)
================================================
Question 1


 Match the following

shared memory Choose... allows two related processes Random access. to view open files of processes attribute that directly affect execution

lsof command Choose... allows two related processes Random access. to view open files of processes attribute that directly affect execution

pipe Choose... allows two related processes Random access. to view open files of processes attribute that directly affect execution

UID Choose... allows two related processes Random access. to view open files of processes attribute that directly affect execution
================================================
Question 2

  A shared memory segment first needs to be allocated (created), using the__________ system call.

  a. semget()

b. msgrcv()

c. shmget()

d. mknod()
================================================
Question 3

 An orphan process is automatically inherited by the _____and becomes a _______ of this process.

 a. 'init' process, father

b. 'init' process, child

c. 'initial' process, father

d. 'it' process, child
================================================
Question 4

  Creation of a semaphore set is done using the _______system call.

  a. semget()

b. semsget()

c. mknod()

d. sempget()
================================================
Question 5

 The msgget() system call accepts two parameters , ________and _______

 a. key, pid

b. queue key, pid

c. queue key, flags.

d. call,flags
================================================
                                             UNIT=4(B)
================================================

 Question 1


  Match the following

exit Choose... Control character version of C shell Environment variable Normal way to logout

tcsh Choose... Control character version of C shell Environment variable Normal way to logout

eof Choose... Control character version of C shell Environment variable Normal way to logout

TERM Choose... Control character version of C shell Environment variable Normal way to logout
================================================
Question 2

  An option commonly takes the form of a _____followed by __________characters.

  a. dot, one or more

b. dash, only one

c. dash, one or more

d. dot,only two
================================================
Question 3

  The _________takes any characters from standard input, and then echoes them to standard output.

 a. kill character

b. cat command

c. cate command

d. control command
================================================
Question 4

  UNIX systems originally came with a command interpreter called the________

 a. Bourne Shell

b. Born Shell

c. POSIX shell

d. korn shell
================================================
Question 5

  ^S and ^Q are the normal values of control characters _____and ______respectively.

 a. start,exit

b. Stop, Start

c. set, stop

d. state,start
================================================
                                             UNIT=5(B)
================================================
Question 1


 State whether the following statements are True (T) or False (F) a. When you copy a file into a directory, cp creates the new file with the different name. b. The name cat derives from the word gatecate, which means to connect in a series or to link together. c. UNIX is a multiuser operating system, which means that you share the system with other users. d. There are no differences between hard and symbolic links.

 a. a-T, b-T c-T, d-F

b. a-F, b-F, c-T d-T

c. a-T b-F, c-T ,d-F

d. a-F, b-F, c-T, d-F
================================================
Question 2

  When copying more than one file at a time, you must specify an existing directory as the ___________

  a. Source

b. Sub directory

c. Destination.

d. Path name
================================================
Question 3

  Which of the following statements are true i. Filenames can be as long as 255 characters in System V Release 4 UNIX. ii. Like cp, mv can handle multiple files if the destination is a file. iii. To change your umask, enter mask and a two digit number that specifies your new umask. iv. Named pipes enable you to communicate with a running program by reference to a file.

  a. ii and iii

b. ii and iv

c. i and iv

d. i and iii
================================================
Question 4

 Which one of the following statements is true?

  a. The cat command cares which file it receives as input or where the input goes.

b. Relative pathnames begin with something other than the slash character

c. UNIX shells never remember their current working directory (CWD).

d. The cat command interprets -X as an option character rather than a pathname.
================================================
Question 5

  _____________enables you to examine the contents of files with commands such as cat, write permission enables you to alter the contents of a file or truncate it, and execute permission is necessary to run a file as a____________.

  a. Read permission, command

b. Write permission, command

c. Read permission, tree

d. Write permission, pathname
================================================
                                          UNIT=6(b)
================================================
Question 1


 One of the wonderful things about UNIX is its ___________names.

  a. Unlimited path

b. Unlimited directory

c. Limited path

d. Limited file
================================================
Question 2

 One reason why UNIX is so flexible is that each program is automatically assigned three standard files. They are

  a. The standard input file, the standard output file, and the standard error file.

b. The backup file, the standard output file, and the standard error file.

c. The standard input file, the standard output file, and the standard hidden file.

d. The standard input file, the standard search file, and the standard error file.
================================================
Question 3

  State whether the following statements are True (T) or False (F) a. The ls command can also accept a filename as a command line parameter. b. When a file is created, the path can inadvertently acquire printable numbers. c. The -size n expression is a good example of a search criterion that is evaluated numerically. d. A program that takes standard file and creates standard input is sometimes called a filter.

 a. a-T,b-T,c-F,d-F

b. a-F,b-F,c-T,d-T

c. a-T,b-F,c-F,d-T

d. a-T,b-F,c-T,d-F
================================================
Question 4

 The find command is different from most UNIX commands in that each of the argument expressions following the beginning path name is considered a _____________

 a. action expression

b. Boolean expression.

c. Boolean constant

d. Search qualifiers
================================================
Question 5

  The pipe symbol () causes the __________of the program on the left side of the pipe to be passed directly to the ___________of the program on the right side of the pipe symbol.

  a. Simple output, single input

b. Standard output, standard input

c. Single input, single output

d. Standard file, standard input
================================================
                                             UNIT=7(b)
================================================
Question 1


 RPN stands for

 a. Reverse Polish Notation

b. Record Police Notation

c. Record Polish Notation

d. Reverse Police Negation
================================================
Question 2

  State whether the following statements are True (T) or False (F) a. When a system administrator creates an account for a user, that user is given a login ID and also placed in a group. b. The du command reports the number of disk blocks used for each directory and subdirectory, and the files found there. c. The y option shows the year as a four-digit value and the Y option shows the year as a number between 00 and 99. d. The FILES section shows the command's syntax by listing all possible options and arguments.

  a. a-T, b-T, c-F, d-F

b. a-F, b-F, c-T, d-T

c. a-T, b-F, c-F, d-T

d. a-T, b-F, c-T, d-F
================================================
Question 3

 The id command reports four things. They are
   a. The user ID number, login name, login password, and group name of the person who invokes it.

b. The user password, login name, single ID number, and names of the persons who invokes it.

c. The user password, login name, path number, and name of the person who invokes it.

d. The user ID number, login name, group ID number, and group name of the person who invokes it.
================================================
Question 4

  The usual su command syntax is

 a. su-pwd

b. su-pd

c. su - userID

d. Sue- ID
================================================
Question 5

 UNIX supplies information about its commands in two forms:They are

 a. Record manuals and online files

b. Normal form and online form

c. Reference manuals (printed documentation called man pages) and online files.

d. Reference manuals and off line files.
================================================
                                         UNIT=8(b)
================================================
Question 1


 State whether the following statements are True (T) or False (F) a. The continue command causes the program to exit the loop immediately, and the break command causes the program to skip the remaining commands in the loop but remain in the loop. b. The check command examines some condition and returns a zero exit status if the condition is true and a nonzero exit status if the condition is false. c. When the shell interprets the line of input, it does not make filename and variable substitutions, but it does remove excess white space. d. In the Bourne shell, you can change the default action of your program when a signal is received by using the trap command.

 a. a-T, b-T, c-F, d-F

b. a-F, b-F, c-T, d-T

c. a-T, b-F, c-F, d-T

d. a-T, b-F,c-T,d-F
================================================
Question 2

 The most common way to retrieve the value of a variable is to precede the variable name with a __________causing the value of the variable to be substituted at that point.

  a. dollar sign ($)

b. star sign(*)

c. percent sign (%)

d. equal sign(

e. )
================================================
Question 3

  Which of the following statements are true? i. Normally, a looping construct executes all the commands between the do statement and the done statement. ii. In most higher level programming languages, variables are typed, meaning that they are not restricted to certain kinds of data, such as numbers or characters. iii. A program can get data in two ways: either it is passed to the program when it is executed as arguments, or the program gets data interactively. iv. Using the echo command in your program, you can determine whether a file exists, whether it can be written to, and several other conditions.

  a. i and iv

b. iii and iv

c. i, ii and iii

d. i and iii
================================================
Question 4

  __________ Contains the number of arguments passed to the program in the form of positional variables and _________contains all the positional arguments passed to the program.

 a. $ , $*

b. $*, $

c. *$, $

d. $*,
================================================
Question 5

  ___________variable is not automatically created on all UNIX systems but is used by so many programs that it is considered a standard environment variable.

 a. IFS

b. MAIL

c. TERM

d. PATH
================================================
                                             *the end*
================================================

Popular Posts

Recent Posts