Operating Systems MCQ Questions and Answers
1. Which of the key is used to close the active window?
A. Ctrl+F4
B. Ctrl+F5
C. Alt+F6
D. None of above
2. The shortcut key to open a task manager is:
A. Alt + F1
B. Alt + Ctrl + Delete
C. Alt + Tab
D. F1
3. The windows feature is the ability of computer to automatically configure a new hardware component is that
A. Auto detect
B. Plug and play
C. Add remove hardware
D. None of above
4. Which of the following is not a part of the control panel?
A. Date and time
B. My documents
C. Add or remove program
D. Display
5. The …… provides information about hardware installation, configuration and hardware status
A. Device manager
B. Control panel
C. Add new hardware
D. Program manager
6. A relocate program form is one which
A. cannot be made to execute in any area of storage other than the one designated for it at the time of its coding or translation.
B. consists of a program and relevant information for its relocation.
C. can itself performs the relocation of its address-sensitive portions.
D. all of the above
7. If you want to execute more than one program at a time, the systems software you are using must be capable of:
A. word processing
B. virtual memory
C. compiling
D. multitasking
8. In analyzing the compilation of PL/I program, the description ” resolving symbolic address (labels) and generating machine language ” is associated with
A. Assembly and output
B. Code generation
C. Storage assignment
D. Syntax analysis
9. Round-robin scheduling
A. allows interactive tasks quicker access to the processor
B. is quite complex to implement
C. gives each task the same chance at the processor
D. allows processor-bound tasks more time in the processor
10. What is the name of the system which deals with the running of the actual computer and not with the programming problems?
A. Operating system
B. Systems program
C. Object program
D. Source program
11. The term ” operating system ” means
A. a set of programs which controls computer working
B. the way a computer operator works
C. conversion of high level language into machine code
D. the way a floppy disk drive operates
12. Which of the following might be used to convert high-level language instructions into machine language?
A. system software
B. applications software
C. an operating environment
D. an interpreter
13. Indicate which is a pre-emptive scheduling algorithm
A. Round-robin
B. Shortest-job-next
C. Priority-based
D. All of the above
14. Which of the following, is necessary to work on a computer
A. Compiler
B. Operating system
C. Assembly
D. Interpreter of the above
15. Access time is the highest in the case of
A. floppy disk
B. cache
C. swapping devices
D. magnetic disk
16. A ……. is a named location on a disk where files are stored
A. Folder
B. Pod
C. Version
D. None of the above
17. Which type of command requires additional files to perform specific operations?
A. Internal commands
B. External commands
C. Valuable commands
D. Primary commands
18. Which of the following is system software?
A. Operating system
B. Compiler
C. Utilities
D. All of the above
19. A user-interface that is easy to use is considered to be
A. User-happy
B. User-simple
C. User-friendly
D. None of the above
20. A ….. is a flash memory storage device that plugins into a USB port
A. USB snap drive
B. USB flash drive
C. USB memory maker drive
D. None of above
21. Generally quick launch toolbar is displayed on
A. the left side of taskbar
B. the right side of taskbar
C. on the middle of taskbar
D. a bar out of taskbar
22. Which is not a valid file system?
A. FAT 16
B. FAT 32
C. NTFS
D. FXZ
23. Which file system DOS typically use?
A. FAT 16
B. FAT 32
C. NTFS
D. LMFS
24. Which file system Windows 95 typically use?
A. FAT 16
B. FAT 32
C. NTFS
D. LMFS
25. Which of the following is not a mode in starting Windows?
A. Command Prompt
B. Safe Mode
C. Normal Mode
D. Turbo Mode
26. Poor response times are caused by
A. Processor busy
B. High I/O rate
C. High paging rates
D. Any of the above
27. Link encryption
A. is more secure than end-to-end encryption
B. is less secure than end-to-end encryption
C. can not be used in a public network
D. is used only to debug
28. A form of code that uses more than one process and processor, possibly of different type, and that may on occasions have more than one process or processor active at the same time, is known as
A. multiprogramming
B. multithreading
C. broadcasting
D. time sharing
29. The table created by lexical analysis to describe all literals used in the source program is
A. Terminal table
B. Literal table
C. Identifier table
D. Reductions
30. The term ‘polling’ in a computer means a process by which a computer system
A. detects/corrects errors
B. multiplexes the inputs and updates the memory accordingly
C. decides correct alternative by analysing several ones
D. inquires to see if a terminal has any transaction to send