Operating Systems MCQs

Operating Systems MCQs

Try to answer these 200+ Operating Systems MCQs and check your understanding of the Operating Systems subject. Scroll down and let's begin!

1: Another term for a zombie is a(n) ____.

A.   Plain text

B.   Hotspot

C.   Piconet

D.   Port

E.   Bot

2: Google play is an example of a(n) ______.

A.   Firmware

B.   Graphical

C.   App Store

D.   None of these

3: Questionnaires can be used to ask questions that _______.

A.   To probe to get sufficient details

B.   Determine user opinions

C.   Interview stakeholders

D.   Technical stakeholders

4: The ______________ imaging tool produces three proprietary formats:

A.   Idif

B.   Irbf

C.   Ieif

D.   Ilookix

5: ____ a data item means you override incorrect data by setting the variable to a specific value.

A.   Forcing

B.   Incrementing

C.   Initializing

D.   Terminating

6: ____ are software applications that run automated tasks over the internet.

A.   Bots

B.   BES

C.   Brick

D.   GPRS

7: ____ can protect against someone accessing your pc via the internet.

A.   Uninstall

B.   Virtual

C.   Firewall

D.   Firewalls

8: ____ development is the systematic process of transforming an idea into functional software.

A.   SDK

B.   Execution

C.   Model

D.   Software

9: ____ disks are commonly used with sun solaris systems.

A.   Filtering

B.   SPARC

C.   AXIOM

D.   False

10: ____ describes how instances of one entity relate to instances of another entity.

A.   Scalability

B.   Compatibility

C.   Cardinality

D.   Functionality

11: ____ has gained popularity as an open-source operating system.

A.   Python

B.   Windows 8

C.   Mac OS X

D.   Linux

12: ____ is a term for software that is run directly from the internet.

A.   DOS (disk operating system)

B.   Increased stability

C.   SaaS (software as a service)

D.   Shareware

13: ____ is an open-platform mobile operating system.

A.   Android

B.   IPhone OS

C.   BlackBerry OS

D.   Palm

14: ____ is one of the most widely-used versions of linux.

A.   Uhuru

B.   Chrome

C.   Cisco

D.   Ubuntu

15: ____ is the policy of allowing only one process to have access to a dedicated resource.

A.   Mutex

B.   Mutual exclusion

C.   Bytecodes

D.   Loosely coupled

16: ____ is where the data and instructions of a computer must reside to be processed.

A.   CPU

B.   Main memory

C.   Read-only memory

D.   I/O memory

17: ____ memory allows you to use more memory than is physically available on your computer.

A.   Firewall

B.   Search Tools

C.   Multitasking

D.   Virtual

18: ____ peripheral devices are assigned to only one job at a time.

A.   Dedicated

B.   Shared

C.   Virtual

D.   Static

19: ____ set the original standard for graphical user interfaces.

A.   Android

B.   Virtual memory

C.   SaaS

D.   Mac OS

20: _____ is free storage space provided on microsoft’s server.

A.   Docs

B.   ICloud

C.   SkyDrive

D.   Pitfall

21: ______ allows a thread to run on only one processor.

A.   NUMA

B.   Load balancing

C.   Processor affinity

D.   Processor set

22: ________ is necessary to protect the host against attacks.

A.   Host hardening

B.   Host bulwarking

C.   Host shielding

D.   None of the above

23: __________ was the first operating system to integrate security as its core functions.

A.   UNIX

B.   DOS

C.   MULTICS

D.   ARPANET

E.   MULTICS

24: A ____ of processing must be handled as a single unit.

A.   Master/slave

B.   Critical region

C.   Loosely coupled

D.   Machine cycle

25: A _____ is an example of a systems program.

A.   Command interpreter

B.   Web browser

C.   Text formatter

D.   Database system

26: A ______ controls how computer hardware communicates with the operating system.

A.   Command line interface

B.   Device driver

C.   GUI

D.   Power switch

27: A _________ is a program that is written to use a particular operating system.

A.   Web application

B.   Client

C.   Web browser

D.   Native application

28: A clustered system ____.

A.   It creates an environment within which other programs can do useful work.

B.   Gathers together multiple CPUs to accomplish computational work

C.   The difference in storage capacity between a mobile device and laptop is shrinking.

D.   Clients and servers are not distinguished from one another

29: A computer cannot function without a(n) _____.

A.   User interface

B.   Operating system

C.   Operating system and utility programs

D.   All of these

30: A computer with a domain name is called a ________.

A.   Website

B.   Network

C.   Webpage

31: A disadvantage of segmented memory allocation is ____.

A.   Earliest Deadline First

B.   External fragmentation

C.   RUNNING to FINISHED

D.   Variable time quantum per queue

32: A file containing data or programs belonging to users is known as a(n) ____.

A.   Symbolic link

B.   Special file

C.   Ordinary file

D.   Named pipe.

33: A file that stays in memory after it executes is a(n) _____________.

A.   Terminate and Stay Resident program

B.   Executable

C.   Text file

34: A file’s ____ filename includes all path information for that file.

A.   Absolute

B.   Short-form

C.   Relative

D.   Directory

35: A process control block ____.

A.   Includes information on the process's state

B.   Stores the address of the next instruction to be processed by a different process

C.   Determines which process is to be executed next

D.   Is an example of a process queue

36: An industrial operating system works with a large computer system requiring a(n) ____.

A.   Receivers

B.   Shrunk

C.   Defragmentation

D.   Server

37: An optional file identifier that is separated from a main file name by a period is a ____.

A.   File conversion

B.   File extension

C.   File path

D.   File folder

A.   DBMS

B.   ARM

C.   True

D.   Bottom

39: Automated driver updates on a mac are accomplished by the _____ feature.

A.   All of the above

B.   Motherboard.

C.   Software Update

D.   Locate files; Mac

40: A ____ dynamic volume can only be created with three or more dynamic disks.

A.   RAID 0

B.   Simple

C.   RAID 5

D.   RAID 1

41: By default, windows creates a ___________ every time new software is installed.

A.   Autorun.inf

B.   Local snapshots

C.   Disk Cleanup

D.   Restore point

42: Chapter 4 describes the utilities included in an operating system package as _____ but not _____.

A.   Useful; essential

B.   Cold boot

C.   Bus

D.   Command-line

43: Clicking and double-clicking are two of the five _____.

A.   Moving

B.   Windows search

C.   Pointing device actions

D.   USB flash drive

44: Cloud computing is not possible without _____.

A.   Virtual machine (VM)

B.   Special-purpose

C.   An Internet connection

D.   Web server

45: Cloud computing provides _____, which matches resources to needs at any given time.

A.   Wiki

B.   Thin

C.   Physical

D.   Scaling

46: Computers represent data using binary digits, called ________.

A.   Dots

B.   Pixels

C.   Tags

D.   Bits

47: Deployment software falls into two groups: ____ software.

A.   Agent-based and agentless

B.   MTBF / (MTBF + MTTR)

C.   Cat chapt1 chapt2 > section_a

D.   Least recently used

48: Desktop apps are also known as ____ apps

A.   Traditional

B.   Mobile

C.   Web

49: Each memory page in virtual memory management is called a ____.

A.   Hardware

B.   Page frame

C.   Page hit

D.   Swap space

50: Electronic devices such as card readers use ___________ operating systems.

A.   Multipurpose

B.   Personal or desktop

C.   Embedded

D.   Network

51: Failure to lock database records before updating them may result in a ____ between processes.

A.   Struggle

B.   Race

C.   Timeout

D.   Livelock

52: File management capabilities available from application software include ____ files.

A.   File extension

B.   Synchronization

C.   All of the above

D.   Multithreading

53: For multiprogramming systems, most unix operating systems use either ____ management techniques.

A.   Indirect paging and hot swapping

B.   Virtual memory and swapping

C.   Simple memory and paging

D.   Swapping or demand paging memory

54: If you are using a touch screen _____ pointer appears on the screen.

A.   No

B.   Esc

C.   Alt

D.   70

55: In ________ process, a server hosts many versions of desktop operating systems.

A.   PC virtualization

B.   Server virtualization

C.   Desktop virtualization

56: In a multitasking operating system, ______ programs are running but not in use.

A.   Platform

B.   Fire OS

C.   Command Line

D.   Background

57: In a network operating system (nos), ____.

A.   Exchanging messages among site operating systems

B.   With the smallest number of hops

C.   Resources are owned by local nodes

D.   Log on to the local network

58: In common usage, the term “pc” refers to computers that ____.

A.   Use external keyboards

B.   Are manufactured by Apple, Inc

C.   Use Microsoft Windows

59: In demand paging, pages are ____ between main memory and secondary storage.

A.   Static

B.   Thrashing

C.   Swapped

D.   Page set

60: In dos, the command ____ displays the files and folders in the current location.

A.   DIR

B.   Firewall

C.   Android

D.   DOS (Disk Operating System)

61: In game theory, strategies include _______.

A.   Creates both moral hazard and adverse selection.

B.   All possible actions of each player

C.   Only lemons being available for sale.

D.   Strategic behavior

62: In linux, ____ devices cannot host a file system.

A.   Write

B.   Block

C.   Read

D.   Char

63: Lock and key synchronization must take place within a single ____.

A.   Instruction

B.   Processor

C.   Computer

D.   Machine cycle

64: Mac os and ios applications are constructed using ________ programming language.

A.   C#

B.   Objective C

C.   VB.Net

D.   Java

65: Memory compaction is also referred to as ____.

A.   Defragmentation

B.   Collection

C.   Reallocation

D.   Dynamic allocation

66: Microsoft’s share of the total personal computer operating system market is about ____.

A.   10% *

B.   90% *

C.   89% *

D.   100%

67: Most operating systems are now distributed on ____.

A.   All of these

B.   CD or DVD disks

C.   Isopropyl alcohol

D.   Desktop ATX case

68: Most operating systems today primarily use a ____.

A.   DOS

B.   Burning

C.   GUI

D.   UNIX

69: Most smartphones use operating systems developed by ________.

A.   Google and Apple

B.   Apple and Microsoft

C.   Microsoft and Google

D.   Symbian and Apple

70: Ms-dos first used a(n) ________ interface.

A.   Graphical user

B.   Command-driven

C.   Directories

D.   Time Machine

71: One major disadvantage of encryption is that ____.

A.   It increases the system's overhead

B.   The slower processing time of legitimate work

C.   Create a new directory or subdirectory

D.   LAN with Internet

72: One of the disadvantages of proprietary software is that ______________.

A.   It can take a long time and significant resources to develop the required software features

B.   The software provides a company a competitive advantage by solving problems in a unique manner

C.   GPS

D.   The initial cost is lower because the software firm can spread the development costs over many customers

73: Operating system software, also called a(n) _____, manages computer hardware and software.

A.   Malware

B.   Device drivers

C.   Utility

D.   Platform

E.   Trojan horses

74: Operating systems installed on a single computer are called __________ operating systems.

A.   Embedded

B.   Multipurpose

C.   Personal or desktop

D.   Network

75: Operating systems provide file organization tools called ___________.

A.   Software

B.   Public domain

C.   Mobile

D.   File management utilities

76: Operating systems used with personal computers are typically referred to as ____ operating systems.

A.   Desktop

B.   CorelDRAW

C.   Interface

D.   Kernel

77: Optimal page replacement ____.

A.   Can suffer from Belady's anomaly

B.   Is used mostly for comparison with other page-replacement schemes

C.   Is the page-replacement algorithm most often implemented

D.   Requires that the system keep track of previously used pages

78: Primitive types serve as the building blocks for more complex data types, called ____ types.

A.   Reference

B.   Private access

C.   Debugging

D.   Arguments

79: The overall responsibility of keeping an organization’s software up to date ____.

A.   Data replication

B.   Layered

C.   105 ms

D.   Depends upon the organization

80: Windows server is an example of a(n) _____ operating system.

A.   Windows Update

B.   Clean up

C.   Network

D.   Drivers

81: Ultraportables conforming to intel's standards can be marketed as ____.

A.   IntelBooks

B.   Ultrabooks

C.   Hybrids

D.   Smallframe computers

82: In ____ systems, deadlocks can cause critical situations.

A.   Batch

B.   Interactive

C.   Real-time

D.   General purpose

83: Embedded systems can be found in all of the following except _____.

A.   Special-purpose

B.   Device driver

C.   Cloud computers

D.   Graphical user

84: A(n)________ is an example of storage hardware in computers.

A.   Overhead projector

B.   Keyboard

C.   Magnetic disk

D.   Barcode scanner

85: Access is a ____.

A.   Word processing software

B.   Workbook management system

C.   Database management system

D.   File management system

86: In linux, runlevel ____ is also known as multiuser mode.

A.   2

B.   3

C.   4

D.   5

87: In linux, the command _________________________ displays currently logged-in users.

A.   Whoami

B.   USR

C.   DVD

D.   Who

88: Magnetic disks are a _____ access storage medium

A.   Storage

B.   Direct

C.   Indirect

D.   Permanently

89: ____ storage allocation allows files to use any storage space available on the disk.

A.   Contiguous storage

B.   Noncontiguous storage

C.   Fragmented storage

90: ____ storage is not lost when a computer loses power.

A.   Temporary.

B.   Intermediate.

C.   Permanent.

D.   Variable

91: ____ technique is also known as disk mirroring.

A.   Disk mirroring

B.   Shadowing

C.   Redundancy

92: ____ uses multiple sources of information and provides multidimensional analysis.

A.   OLAP

B.   SQL

C.   QBE

D.   OLTP

93: All of the following are examples of network operating systems except ________.

A.   MS-DOS

B.   Windows 8

C.   OS X

D.   Linux

94: ________ is the process whereby multiple operating systems share the same hardware.

A.   Application software

B.   Vertical-market application

C.   Virtualization

D.   Thick client

95: A client-server application that requires nothing more than a browser is called ________.

A.   Desktop application

B.   Thick-client application

C.   Thin-client application

D.   Firmware

96: A thin-client application is designed to run within a program such as ________.

A.   Microsoft Excel

B.   Internet Explorer

C.   Microsoft Word

D.   Adobe Photoshop

97: Under direct memory access, a device called a ____ is attached to the bus and to main memory.

A.   Controller

B.   DMA master

C.   DMA controller

D.   DRM controller

98: The windows ________ utility rearranges files on a hard drive in order to improve efficiency.

A.   Check Disk

B.   Optimizing Drives

C.   Error Checking

D.   None of these

99: Video cards have their own _____.

A.   Diagonally

B.   Memory

C.   Pointing

D.   None of these

100: With the ____, the statements in the loop are repeated as long as a certain condition is false.

A.   Low-level languages

B.   Do until structure

C.   False

D.   Control structure