Contact Us:

If You Have Any Problem, Wanna Help, Wanna Write Guest Post, Find Any Error Or Want To Give Us Feedback, Just Feel Free To Contact Us. We Will Reply You Soon.

Name: *

Email: *

Message: *


LiveZilla Live Help


Model Question Paper
Subject Code: MC0070
Subject Name: Operating systems with unix
Credits: 4 Marks: 140
Part A (One mark questions)

1. A sequence of instructions telling the computer what to do is called a_____________
A) program
B) language
C) translator
D) package
2. A process is _________________
A) program in main memory
B) Program in cache memory
C) program in secondary storage
D) program in execution
3. A _____________is a collection of processors that do not share memory, peripheral devices,
or a clock.
A) Computer system
B) distributed system
C) network
D) None of the above

4. PVM stands for
A) Parallel Virtual Machine
B) Parallel Virtual Message
C) Process Virtual Machine
D) Process Virtual Monitor
5. In MS-DOS, the interfaces and levels of functionality are _______________
A) not well separated.
B) well separated
C) independent
D) dependent
6. ______________approach simplifies debugging and system verification.
A) Kernel
B) Layered
C) Extended
D) Virtual machine
7. A process may create a new process by executing ___________system call.
A) init
B) fork
C) create
D) new
8. A process control block contains varies attributes required by _____________ to control a
B) virtual memory

D) Operating System
9. ______________is responsible for allocating primary memory to processes and for assisting
the programmer in loading and storing the contents of the primary memory.
A) Operating system
B) Memory manager
C) Database administrator
10. ______________ refers to the technology in which some space in hard disk is used as an
extension of main memory.
A) Cache memory
B) Paging
C) Virtual memory
D) Associative memory
11. ______________ selects a process from among the ready processes to execute on the
A) CPU Scheduler
B) Loader
C) Dispatcher
D) Compiler
12. The time taken by the Dispatcher to stop one process and start another running is known as
A) Turnaround time
B) Dispatch Latency
C) Access time
D) Response time

13. When resources have multiple instances ________ is used for deadlock Avoidance.
A) Banker’s algorithm
B) Resource Allocation Graph
C) semaphores
D) all of these
14. ______________ is a situation in which two computer programs sharing the same resource
are effectively preventing each other from accessing the resource, resulting in both programs
ceasing to function.
A) Semaphore
B) Deadlock
C) Mutual Exclusion
D) No preemption
15. _______________occurs when two or more execution flows are able to run simultaneously.
a) Deadlock
b) Concurrency
c) race condition
d) interrupt
16.______________ occurs when multiple processes or threads read and write data items so that
the final result depends on the order of execution of instructions in the multiple processes.
a) Race condition
b) Mutual exclusion
c) Exception

d) Interrupt
17. In Multics, a process could have up to 256K segments, but each segment was limited to
__________________ 64K words.
A) 64K
B) 32K
C) 1024K
18.The problem with logical dumping is ________________
A) very costly
B) very slow
C) human errors
D) all of these
19. Because the I/O devices are not synchronized with the CPU, some information must be
exchanged between the CPU and the device to ensure that the data is received reliably. This
interaction between the CPU and an I/O device is usually referred to as ____________
A) polling
B) arbitration
C) handshaking
D) interrupting
20. ____________approach can place the data directly into the memory or take the data directly
from the memory without direct intervention from the processor.
B) Daisy chain arbitration

C) polling
D) none of these
21. ____________ file system allows sharing in multiple different locations grouped under one
A) Direct
B) distributed
C) sequential
D) parallel
22. Windows 2000 supports -------------- type of file system
23. In___________, the requesting device or devices assert the signal bus_request.
A) Priority encoded arbitration
B) Distributed arbitration by self-selection
C) Priority arbitration
D) Daisy chain arbitration
24. SRM stands for
A) Security Resource Manager
B) Secret Resource Manager
C) Security Reference Monitor

D) Security Reference Manual
25. Initialization of I/O devices is part of the_________.
C) UNIX kernel
D) None of the above
26. BSD stands for_____________________
A) Basic Software Division
B) Berkeley Software Distribution
C) British Software Distribution
D) Berkeley Software data
27. Fsck conducts a check in _____ phases
A) One
B) Two
C) Five
D) Eight
28. Bootstrapping is also known as ______
A) cold-hot boot
B) hot boot
C) hot strap
D) cold boot

29. Creation of a semaphore set is done using the _______system call.
A) semget()
B) semsget()
C) mknod()
D) sempget()
30. A shared memory segment first needs to be allocated (created), using
the__________ system call.
A) semget()
B) msgrcv()
C) shmget()
D) mknod()
31. The _________takes any characters from standard input, and then echoes them to
standard output.
A) kill character
B) cat command
C) cate command
D) control command
32. Pick the wrong statement from the following.
A) UNIX systems originally came with a command interpreter called the Bourne Shell.
B) The cat command takes any characters from standard input, and then echoes them to
standard output.
C) A pipe is a means of taking the output of one command and directing it as another command.

D) The manual entry is called a man page, even though it is often more than one page long.
33. Which one of the following statements is true?
The cat command cares which file it receives as input or where the input goes.
B) Relative pathnames begin with something other than the slash character
C) UNIX shells never remember their current working directory (CWD).
D) The cat command interprets -X as an option character rather than a pathname.
34. When copying more than one file at a time, you must specify an existing directory as the
A) Source
B) Sub directory
C) Destination.
D) Path name
35. The find command is different from most UNIX commands in that each of the
argument expressions following the beginning path name is considered a
A) action expression
B) Boolean expression.
C) Boolean constant
D) Search qualifiers
36. One of the wonderful things about UNIX is its ___________names.
A) Unlimited path
B) Unlimited directory

C) Limited path
D) Limited file
37. RPN stands for
A) Reverse Polish Notation
B) Record Police Notation
C) Record Polish Notation
D) Reverse Police Negation
38. The usual su command syntax is
A) su-pwd
B) su-pd
C) su - userID
D) Sue- ID
39. ___________variable is not automatically created on all UNIX systems but is used by so
many programs that it is considered a standard environment variable.
40.Choose the correct statement from the following.
A) In computer terminology, variables are symbols which stand for some value.
B) An alternative method for executing the commands in the file backup is to make the file as

C) The restricted shell gives more control to the system administrator and restricts the options of
the user.
D) The decision making done by computer programs is in the form of conditional execution.
Part B (Two mark questions)
41. A program to be executed must be in ---------------
A) main memory
B) secondary memory
C) virtual memory
D) Read only memory
42. In layered approach each layer uses the functions and services of ------------------
A) kernel
B) lower-level layers
C) higher-level layers
D) all of these
43. ______________ are popular way to improve application through parallelism.
A) Processes
B) Threads
C) Context switching
D) none of these
44.__________ deals with when a modified page should be written out to secondary memory.
A) Cleaning policy
B) Fetch policy
C) Frame locking
D) None of these

45. A solution to starvation is _____________.
A) segmentation
B) Aging
C) Paging
D) virtual memory
46. _______________refers to a strategy where whenever a resource is requested, it is only
granted if it cannot result in deadlock.
A) Deadlock Prevention
B) Livelock
C) Deadlock avoidance
D) none of these
47. When a child dies, it sends a _______________signal to its parent.
48. ______________is a mechanism the prevents two or more processes from accessing a
shared resource simultaneously.
A) Livelock
C) Semaphore
D) either a) or b)
49. A two-byte integer called ____________is interpreted as an index into an array of inodes in
a fixed, known location on disk.

A) an inode
B) an inumber
C) an imap
D) an imark
50. A SCSI device can transfer up to----------- of information per second.
A) 40 Mbytes
B) 60 Mbytes
C) 40 Gbytes
D) 60 Gbytes
51. The controller can access memory in memory cycles which are not used by the particular
bank of memory into which the DMA controller is writing data. This approach, called _________
A) interrupting
B) cycle stealing
C) swapping
D) paging
52. The two sub systems of user mode layer of windows 2000 are _________ and __________
A) excel, executive
B) environment, integral
C) orbit , kernel
D) Kernel , executive
53. A standard UNIX system includes a set of ___________ and a set of ___________.
A) Commands ,files
B) Libraries, Applications

C) Libraries, files
D) Files, Applications
54. Ext2 is the standard file system of _______ and uses a block size of_____bytes
B) Linux ,1024
C)Linux, 512
D)Unix, 512
55. An orphan process is automatically inherited by the _____and becomes a
_______ of this process.
A) 'init' process, father
B) 'init' process, child
C) 'initial’ process, father
D) 'it' process, child
56. An option commonly takes the form of a _____followed by __________characters.
A) dot, one or more
B) dash, only one
C) dash, one or more
D) dot,only two
57. Which of the following statements are true?
i. Filenames can be as long as 255 characters in System V Release 4 UNIX.
ii. Like cp, mv can handle multiple files if the destination is a file.

iii. To change your umask, enter mask and a two digit number that specifies your new
iv. Named pipes enable you to communicate with a running program by reference to a file.
A) ii and iii
B) ii and iv
C) i and iv
D) i and iii
58.One reason why UNIX is so flexible is that each program is automatically assigned three
standard files. They are
A) The standard input file, the standard output file, and the standard error file.
B) The backup file, the standard output file, and the standard error file.
C) The standard input file, the standard output file, and the standard hidden file.
D) The standard input file, the standard search file, and the standard error file.
59. The id command reports four things. They are
A) The user ID number, login name, login password, and group name of the person who
invokes it.
B) The user password, login name, single ID number, and names of the persons who
invokes it.
C) The user password, login name, path number, and name of the person who
invokes it.
D) The user ID number, login name, group ID number, and group name of the person who

invokes it.
60. Which of the following statements are true?
i. Normally, a looping construct executes all the commands between the do statement and
the done statement.
ii. In most higher level programming languages, variables are typed, meaning that they are
not restricted to certain kinds of data, such as numbers or characters.
iii. A program can get data in two ways: either it is passed to the program when it is executed
as arguments, or the program gets data interactively.
iv. Using the echo command in your program, you can determine whether a file exists,
whether it can be written to, and several other conditions.
A) i and iv
B) iii and iv
C) i, ii and iii
D) i and iii
Part C (Four mark questions)
61. Match the following
1. Operating system i). application software
2. Library system ii) system software
3. secondary storage iii) smaller capacity
4. Main memory iv) larger capacity
A) 1-ii, 2-i, 3-iv, 4-iii
B) 1-iv, 2-ii, 3-I, 4-iii

C) 1-ii, 2-i, 3-iii, 4-iv
D) 1-iv, 2-I, 3-ii, 4-iii
62. Match the following.
a) QNX i. Bell Labs
b) MPI ii. CPU
c) gCore iii. Software package
D) Plan9 Operating System iv . Based on the microkernel design
A) a-i, b-iii, c-iv, d-ii
B) a-ii, b-iii, c-iv, d-i
C) a-iii, b-i, c-ii, d-iv
D) a-iv, b-iii, c-ii, d-i
63. Which of these is a reason for using threads in designing operating systems?
A) Unlike processes, threads are not independent of one another
B) All threads can access every address in the task .
C) Because threads can share common data, they do not need to use interprocess
D) Like processes, thread can create children.
64. Arrange the following memories in terms of increasing access time (from low to high)
1. Registers
2. Main memory
3. Secondary memory
4. Cache

A) 1-3 -4 -2
B) 1-4-2-3
C) 3-2-4-1
D) 2-4-1-3
65. Match the following
1. pipes i) continuously change their state
2. livelock ii) WNOHANG
3. Killing Zombies iii) fixed size
4. argument iv) web server
A) 1-iv, 2-iii, 3-I, 4- ii
B) 1-iii, 2-i , 3-iv, 4- ii
C) 1-ii , 2- I, 3-iv, 4-iii
D) 1-iii, 2-iv ,3-ii, 4- i
66. The introduction of mutual exclusion can prevent race conditions but can lead to problems
such as________________
A) deadlock
B) starvation
C) both a) and b)
D) none of these

67. Match the following
1. Programmed controlled I/O i. polled I/O
2. Interrupt controlled I/O ii. Cycle stealing
3. DMA iii. maskable and non maskable
A) 1-i, 2-iii, 3-ii
B) 1-ii, 2-iii, 3-i
C) 1-iii, 2-ii, 3-i
D) 1-i , 2-ii , 3-iii
68. Match the following
1. Process manager i. Device detection and installation
2. IPC manager ii. Thread creation
3. PNP manager iii. Drawing windows and menus
4. Window manager iv . communication between clients.
A) 1- iv, 2-iii, 3- ii, 4- i
B) 1-ii, 2-iv, 3- i, 4-iii
C) 1- iii, 2-ii, 3-iv, 4- i
D) 1- iv , 2-ii, 3-iii, 4- i
69. Match the following
a) kernel i) Switches between processes
b) Operating system ii) Initialization of I/O devices
c) Unix commands iii) Sells UnixWare
d) Novell iv) Case sensitive

A) a-iv, b-ii, c-iii, d-i
B) a-ii, b-i, c-iv, d-iii
C) a-iii, b-i, c-ii ,d-iv
D) a-i, b-iii, c-iv, d-ii
70. State whether True (T) or False (F)
a. System files should be kept separate from data files created by users, and hence a
separate file system is usually made for them.
b. SVR5 systems define various run levels in which a specific set of processes are allowed
to run.
c. Login name identifies the user and computer hardware names.
d. Passwords are normally represented by a special encrypted format and are stored in the
A) a-F, b-F, c-T, d-T
B) a-F, b- T, c- F, d-T
C) a-T, b-T, c-F, d-T
D) a-T, b-T, c-F, d-F
71. Match the following
a) A named pipe i. FIFO
b) renice command ii. A resource that contains an integer value
c) child process iii. Change the priority of a process,
d) semaphore iv. zombie
A) a-iv, b-ii, c-iii, d-I
B) a-ii, b-i, c-iv, d-iii

C) a-iii, b-i, c-ii ,d-iv
D) a-i, b-iii, c-iv, d-ii
72. Match the following
a) exit i. version of C shell
b) tcsh ii. Control character
c) eof iii. Normal way to logout
d) TERM iv. Environment variable
A) a-iv, b-ii, c-iii, d-i
B) a-ii, b-i, c-iv, d-iii
C) a-iii, b-i, c-ii ,d-iv
D) a-i, b-iii, c-iv, d-ii
73. State whether the following statements are True (T) or False (F)
a. When you copy a file into a directory, cp creates the new file with the different name.
b. The name cat derives from the word gatecate, which means to connect in a series or to
link together.
c. UNIX is a multiuser operating system, which means that you share the system with
other users.
d. There are no differences between hard and symbolic links.
A) a-T, b-T c-T, d-F
B) a-F, b-F, c-T d-T
C) a-T b-F, c-T ,d-F
D) a-F, b-F, c-T, d-F

74. State whether the following statements are True (T) or False (F)
a. The ls command can also accept a filename as a command line parameter.
b. When a file is created, the path can inadvertently acquire printable numbers.
c. The -size n expression is a good example of a search criterion that is evaluated
d. A program that takes standard file and creates standard input is sometimes called a
A) a-T,b-T,c-F,d-F
B) a-F,b-F,c-T,d-T
C) a-T,b-F,c-F,d-T
D )a-T,b-F,c-T,d-F
75. Match the following
a) getty program i. Default value is $.
b) PS1 ii. The default value is >.
c) PS2 iii. Displays a login prompt
d) Shell variables iv. Always stored as characters
A) a-iv, b-ii, c-iii, d-i
B) a-ii, b-i, c-iv, d-iii
C) a-iii, b-i, c-ii ,d-iv
D) a-i, b-iii, c-iv, d-ii

Answer Keys
Part - A Part - B Part - C
Q. No. Ans. Key Q. No. Ans. Key Q. No. Ans. Key Q. No. Ans. Key
1 A 21 B 41 A 61 A
2 D 22 A 42 B 62 D
3 B 23 D 43 B 63 C
4 A 24 C 44 A 64 B
5 A 25 C 45 B 65 B
6 B 26 B 46 C 66 C
7 B 27 C 47 A 67 A
8 D 28 D 48 C 68 B
9 B 29 A 49 B 69 B
10 C 30 C 50 A 70 D
11 A 31 B 51 B 71 D
12 B 32 C 52 B 72 C
13 A 33 B 53 B 73 D
14 B 34 C 54 B 74 D
15 B 35 B 55 B 75 C
16 A 36 A 56 C
17 A 37 A 57 C
18 B 38 C 58 A
19 C 39 C 59 D
20 A 40 C 60 D
Like the Post? Share with your Friends:-

Team SB
Posted By: DG Group

Contact Us


Email *

Message *


Latest post

Recent Comment

Copyright © . DG-Mission-UGC-NET. All Rights Reserved.
Designed by :-Way2themes