Operating Systems MCQs

Operating Systems MCQs

Try to answer these 200+ Operating Systems MCQs and check your understanding of the Operating Systems subject. Scroll down and let's begin!

1: Another term for a zombie is a(n) ____.

A.   Plain text

B.   Hotspot

C.   Piconet

D.   Port

E.   Bot

2: Google play is an example of a(n) ______.

A.   Firmware

B.   Graphical

C.   App Store

D.   None of these

3: Questionnaires can be used to ask questions that _______.

A.   To probe to get sufficient details

B.   Determine user opinions

C.   Interview stakeholders

D.   Technical stakeholders

4: The ______________ imaging tool produces three proprietary formats:

A.   Idif

B.   Irbf

C.   Ieif

D.   Ilookix

5: ____ a data item means you override incorrect data by setting the variable to a specific value.

A.   Forcing

B.   Incrementing

C.   Initializing

D.   Terminating

6: ____ are software applications that run automated tasks over the internet.

A.   Bots

B.   BES

C.   Brick


7: ____ can protect against someone accessing your pc via the internet.

A.   Uninstall

B.   Virtual

C.   Firewall

D.   Firewalls

8: ____ development is the systematic process of transforming an idea into functional software.

A.   SDK

B.   Execution

C.   Model

D.   Software

9: ____ disks are commonly used with sun solaris systems.

A.   Filtering



D.   False

10: ____ describes how instances of one entity relate to instances of another entity.

A.   Scalability

B.   Compatibility

C.   Cardinality

D.   Functionality

11: ____ has gained popularity as an open-source operating system.

A.   Python

B.   Windows 8

C.   Mac OS X

D.   Linux

12: ____ is a term for software that is run directly from the internet.

A.   DOS (disk operating system)

B.   Increased stability

C.   SaaS (software as a service)

D.   Shareware

13: ____ is an open-platform mobile operating system.

A.   Android

B.   IPhone OS

C.   BlackBerry OS

D.   Palm

14: ____ is one of the most widely-used versions of linux.

A.   Uhuru

B.   Chrome

C.   Cisco

D.   Ubuntu

15: ____ is the policy of allowing only one process to have access to a dedicated resource.

A.   Mutex

B.   Mutual exclusion

C.   Bytecodes

D.   Loosely coupled

16: ____ is where the data and instructions of a computer must reside to be processed.

A.   CPU

B.   Main memory

C.   Read-only memory

D.   I/O memory

17: ____ memory allows you to use more memory than is physically available on your computer.

A.   Firewall

B.   Search Tools

C.   Multitasking

D.   Virtual

18: ____ peripheral devices are assigned to only one job at a time.

A.   Dedicated

B.   Shared

C.   Virtual

D.   Static

19: ____ set the original standard for graphical user interfaces.

A.   Android

B.   Virtual memory

C.   SaaS

D.   Mac OS

20: _____ is free storage space provided on microsoft’s server.

A.   Docs

B.   ICloud

C.   SkyDrive

D.   Pitfall

21: ______ allows a thread to run on only one processor.


B.   Load balancing

C.   Processor affinity

D.   Processor set

22: ________ is necessary to protect the host against attacks.

A.   Host hardening

B.   Host bulwarking

C.   Host shielding

D.   None of the above

23: __________ was the first operating system to integrate security as its core functions.


B.   DOS




24: A ____ of processing must be handled as a single unit.

A.   Master/slave

B.   Critical region

C.   Loosely coupled

D.   Machine cycle

25: A _____ is an example of a systems program.

A.   Command interpreter

B.   Web browser

C.   Text formatter

D.   Database system

26: A ______ controls how computer hardware communicates with the operating system.

A.   Command line interface

B.   Device driver

C.   GUI

D.   Power switch

27: A _________ is a program that is written to use a particular operating system.

A.   Web application

B.   Client

C.   Web browser

D.   Native application

28: A clustered system ____.

A.   It creates an environment within which other programs can do useful work.

B.   Gathers together multiple CPUs to accomplish computational work

C.   The difference in storage capacity between a mobile device and laptop is shrinking.

D.   Clients and servers are not distinguished from one another

29: A computer cannot function without a(n) _____.

A.   User interface

B.   Operating system

C.   Operating system and utility programs

D.   All of these

30: A computer with a domain name is called a ________.

A.   Website

B.   Network

C.   Webpage

31: A disadvantage of segmented memory allocation is ____.

A.   Earliest Deadline First

B.   External fragmentation


D.   Variable time quantum per queue

32: A file containing data or programs belonging to users is known as a(n) ____.

A.   Symbolic link

B.   Special file

C.   Ordinary file

D.   Named pipe.

33: A file that stays in memory after it executes is a(n) _____________.

A.   Terminate and Stay Resident program

B.   Executable

C.   Text file

34: A file’s ____ filename includes all path information for that file.

A.   Absolute

B.   Short-form

C.   Relative

D.   Directory

35: A process control block ____.

A.   Includes information on the process's state

B.   Stores the address of the next instruction to be processed by a different process

C.   Determines which process is to be executed next

D.   Is an example of a process queue

36: An industrial operating system works with a large computer system requiring a(n) ____.

A.   Receivers

B.   Shrunk

C.   Defragmentation

D.   Server

37: An optional file identifier that is separated from a main file name by a period is a ____.

A.   File conversion

B.   File extension

C.   File path

D.   File folder


B.   ARM

C.   True

D.   Bottom

39: Automated driver updates on a mac are accomplished by the _____ feature.

A.   All of the above

B.   Motherboard.

C.   Software Update

D.   Locate files; Mac

40: A ____ dynamic volume can only be created with three or more dynamic disks.

A.   RAID 0

B.   Simple

C.   RAID 5

D.   RAID 1

41: By default, windows creates a ___________ every time new software is installed.

A.   Autorun.inf

B.   Local snapshots

C.   Disk Cleanup

D.   Restore point

42: Chapter 4 describes the utilities included in an operating system package as _____ but not _____.

A.   Useful; essential

B.   Cold boot

C.   Bus

D.   Command-line

43: Clicking and double-clicking are two of the five _____.

A.   Moving

B.   Windows search

C.   Pointing device actions

D.   USB flash drive

44: Cloud computing is not possible without _____.

A.   Virtual machine (VM)

B.   Special-purpose

C.   An Internet connection

D.   Web server

45: Cloud computing provides _____, which matches resources to needs at any given time.

A.   Wiki

B.   Thin

C.   Physical

D.   Scaling

46: Computers represent data using binary digits, called ________.

A.   Dots

B.   Pixels

C.   Tags

D.   Bits

47: Deployment software falls into two groups: ____ software.

A.   Agent-based and agentless


C.   Cat chapt1 chapt2 > section_a

D.   Least recently used

48: Desktop apps are also known as ____ apps

A.   Traditional

B.   Mobile

C.   Web

49: Each memory page in virtual memory management is called a ____.

A.   Hardware

B.   Page frame

C.   Page hit

D.   Swap space

50: Electronic devices such as card readers use ___________ operating systems.

A.   Multipurpose

B.   Personal or desktop

C.   Embedded

D.   Network