Multi choice questions on topical issues
1. Which one of the following is NOT true about OS’s kernel?
2013:
2014:
17. Which one of the following is NOT TRUE about an OS’s kernel?
a. Kernel is located between software applications and shells
b. Kernel is the lowest level of software in the OS
c. Kernel communicates with shells and hardware
d. Kernel manages the hardware resources
2015: NO QUESTION
2016:
1. Which one of the followings is NOT true about OS’s kernel?
a) Kernel is the lowest level program running on the computer
b) Kernel manages the hardware resources
c) Kernel is located between the software applications and shells
d) Kernel communicates with shells and hardware
2017
7. Which one of the following is NOT true about OS’s kernel?
a. Kernel is the lowest level program running on the computer
b. Kernel manages the hardware resources
c. Kernel is located between the software applications and shells
d. Kernel communicates with shells and hardware
2. Which one of the followings is NOT true about OS’s Command Interpreter?
2013 NO QUESTION
2015 :
Which one of the followings is NOT true about OS’s Command Interpreter?
a) A command interpreter is a program that processes the command entered by the user in the terminal
b) A command interpreter is located between the software applications and the kernel
c) A command interpreter can communicate with the kernel by calling API
d) Only one type of command interpreters can be running at a time
2016
3. Which one of the followings is NOT true about OS’s Command Interpreter?
a) A command interpreter is a program that processes the command entered by the user in the terminal
b) A command interpreter is located between the software applications and the kernel
c) A command interpreter can communicate with the kernel by calling API
d) Only one type of command interpreters can be running at a time
2017
NO QUESTION
2013
5. Which one of the following statements is not true about system calls?
a. A system call is a request made by any program to the operating system for performing tasks
b. System calls are a part of application software
c. I/O device communication requires the use of system calls.
d. System calls provide the interface between a process and the operating system
e. None of the above
2014
No
2015: 3. Which one of the followings is NOT true about System Calls in OS?
a) System calls are functions (procedures) that you/applications use to interact with the kernel
b) System call is a program for passing messages between software applications
c) With API, programmers does not need to know the details of how the service is done
d) Open() is an example of system call for opening a file
2016
4. Which one of the followings is NOT true about System Calls in OS?
a) System calls are functions (procedures) that you/applications use to interact with the kernel
b) System call is a program for passing messages between software applications
c) With API, programmers does not need to know the details of how the service is done
d) Open() is an example of system call for opening a file
2017
8. Which one of the following is NOT true about System Calls in OS?
a. System calls are functions (procedures) that you/applications use to interact with the kernel
b. System call is a program for passing messages between software applications
c. With API, programmers do not need to know the details of how the service is done
d. Open() is an example of system call for opening a file
1. An Operating System
2013: An Operating System
a) is a suite of programs
b) provides an interface between the hardware and the applications
c) coordinates activities and sharing of resources
d) provides services to users and applications
e) is all of the above
2013
NO
2014
2. Which of the following is NOT TRUE about Process Control Block (PCB)?
a) Process number (PID) and state, program counter, CPU-related information, memory management information, accounting information and I/O status information are stored in the PCB
b) Each process has its own process control block
c) When a CPU switches to another process, the system must first load the PCB of the new process before saving the state of the old process
d) The context of a process is stored in a PCB
2015
5. Which of the following is NOT true about Process Control Block (PCB)?
a. Context switching is a situation where the CPU is switching from running the current process to another process
b. When a CPU switches to another process, the system must first load the PCB of the new process before saving the state of the old process
c. Program counter indicates the location of instruction that the CPU needs to execute next
d. A process contains text section, current activity, stack, data section and heap
2016
8. Which of the following is NOT true about Process Control Block (PCB)?
a. Context switching is a situation where the CPU is switching from running the current process to another process
b. When a CPU switches to another process, the system must first load the PCB of the new process before saving the state of the old process
c. Program counter indicates the location of instruction that the CPU needs to execute next
d. A process contains text section, current activity, stack, data section and heap
2017
11. Which of the following is NOT true about Process Control Block?
a. Context switching is a situation where the CPU is switching from running the current process to another process
b. When a CPU switches to another process, the system must first load the PCB of the new process before saving the state of the old process
c. Program counter indicates the location of instruction that the CPU needs to execute next
d. A process contains text section, current activity, stack, data section and heap
2014
16. Which one of the following is NOT TRUE about OS’s shells?
a. A shell is a command interpreter
b. A shell accepts commands that users enter and passes them on to the kernel
c. A shell is located between the software applications and the kernel
d. Only one shell can run at the same time
2015
No
2016
2017
2016
2017
3. Which one of the followings is NOT true about User interfaces in OS?
a) CLI and GUI stand for Command Line Interface (or Interpreter) and Graphical User Interface, respectively
b) An OS may have both GUI and CLI, and in a multi-tasking mode both types can run at the same time
c) Both GUI and CLI are implemented below the Kernel
d) Apple Mac OS X’s GUI interface is called Aqua
2016
2. Which one of the followings is NOT true about User interfaces in OS?
a) Both GUI and CLI are implemented below the Kernel
b) CLI and GUI stand for Command Line Interface (or Interpreter) and Graphical User Interface, respectively
c) Apple Mac OS X’s GUI interface is called Aqua
d) An OS may have both GUI and CLI, and in a multi-tasking mode both types can run at the same time
2016
12. Which component converts logical memory addresses to physical addresses?
a. CPU
b. FPU
c. ALU
d. MMU
2017
4. Which component converts logical memory addresses to physical addresses?
a. ALU
b. MMU
c. CPU
d. FPU
2015
12. Which component converts logical memory addresses to physical addresses?
a. ALU
b. MMU
c. CPU
d. FPU
2014
15. Which of the following is NOT TRUE about Process Scheduling?
a. In multilevel queue scheduling, foreground processes have higher priority over background processes
b. CPU process scheduling criteria are: CPU utilization maximization, throughput maximization, waiting time minimization, response time minimization and turnaround time maximization
c. The goal of a CPU scheduler is to ensure that each process has a fair share of the CPU
d. Throughput is the number of processes that are completed per time unit
2015
6. Which of the following is NOT true about Process Scheduling?
a. CPU process scheduling criteria are CPU utilisation maximisation, throughput minimisation, waiting time minimisation, response time minimisation and turnaround time minimisation
b. Turnaround time = Execution time + Waiting time
c. In multilevel queue scheduling, foreground processes have a higher priority over the background processes
d. The goal of a CPU scheduler is to ensure that each process has a fair share of the CPU
2016
No
2017
No
2016
5. Which of following is NOT true about Process Creation and Termination?
a. Parent may temporarily halt the execution of a child process via wait()
b. Parent may terminate a child process via abort()
c. exec() system call replaces the process’ memory with a new program
d. Exit() is a system call used to indicate OS that the process has finished executing all of its program and OS may delete it from RAM
2017
2. Which of the following is NOT true about Process Creation and Termination?
a) Parent may temporarily halt the execution of a child process via wait()
b) Parent may terminate a child process via abort()
c) exec() system call replaces the process’ memory with a new program
d) Exit() is a system call used to indicate OS that the process has finished executing all of its program and OS may delete it from RAM
2015
10. Which of following is NOT true about Process Creation and Termination?
a. Parent may temporarily halt the execution of a child process via wait()
b. Parent may terminate a child process via abort()
c. fork() system call creates a new process
d. exit() is a system call used to indicate OS that the process has finished executing all of its instructions and OS may delete it from RAM
2014
14. Which one of following is NOT TRUE about Process Creation and Termination?
a. If no parent is waiting, the terminated child process is called an orphan
b. A parent may terminate its child process because the child has exceeded its usage of the allocated resources
c. A parent may terminate its child process via abort()
d. In Unix, exec() system call replaces the current process’ memory with a new program
2013
2016
10. Which of the following is NOT true about CPU Scheduling?
a. Ready queue is a set of all processes in RAM that are ready and waiting to be executed
b. In multilevel queue scheduling, ready queue is partitioned into multiple queue and each queue has its own priority
c. CPU Bound Program is a program that has short CPU burst and short I/O wait
d. CPU Scheduler selects which process in ready queue needs to be executed next by the CPU
2017
13. Which of the following is NOT true about CPU Scheduling?
a. Ready queue is a set of all processes in RAM that are ready and waiting to be executed
b. In multilevel queue scheduling, ready queue is partitioned into multiple queue and each queue has its own priority
c. CPU Bound Program is a program that has short CPU burst and short I/O wait
d. CPU Scheduler selects which process in ready queue needs to be executed next by the CPU
2015
7. Which of the following is NOT true about CPU Scheduling?
a. Ready queue is a set of all processes in RAM that are ready and waiting to be executed
b. In multilevel queue scheduling, ready queue is partitioned into multiple queue and each queue has its own priority
c. CPU Bound Program is a program that has short CPU burst and short I/O wait
d. CPU Scheduler selects which process in ready queue needs to be executed next by the CPU
2014
No
2014
3. Which of the following is NOT TRUE about the component of a Hard Disk Drive (HDD)?
a) A track is a concentric circular strip on the surface of a disc platter
b) A spindle is a part of the HDD that holds and rotates the platters
c) A sector is a set of tracks that are located at the same head position
Each disk platter has the same amount of sectors and tracks
2015
No
2016
2017
2014
4. Which of the following is NOT TRUE about logical formatting?
a) A directory file contains the name of the directory and the names of all of its children (files and sub-directories)
b) A File is an abstract data type and it is logically contiguous but may be physically fragmented on a disk
c) A Master Boot Record (MBR) contains the code to boot OS from a disk
A Cluster is a contiguous group of tracks that are located at the same head position
2015
No
2016
No
2017
No
2014
5. Which of the following is NOT TRUE about Process Execution?
a. All threads in a process share the same program counter, registers, stack, signals and signal handlers
b. Process execution consists of a cycle of CPU execution and I/O wait and it is called CPU-I/O Burst cycle
c. The ready queue contains a set of processes that are in either ready or waiting state
d. Threads are entities within a process and they are used to schedule program execution on CPU
2015
2016
2017
2017
1. Which one is NOT among the deadlock recovery solutions?
a. Kill all deadlocked processes
b. Roll back
c. Kill one or more processes
d. Reallocating current processes in memory
2015
15. Which one is NOT among the deadlock recovery solutions?
a. Kill all deadlocked processes
b. Roll back
c. Kill one or more processes
d. Reallocating current processes in memory
2014
2013
2016
17. Which one is NOT among the deadlock recovery solutions?
a. Reallocating current processes in memory
b. Kill all deadlocked processes
c. Roll back
d. Kill one or more processes
2014
6. Which of the following is NOT TRUE about File/Directory permissions?
a. You do not need to set a script file (e.g. bat, sh, php, cgi) or a program file to be executable. You would only need to set it to be readable to run the file.
b. Directory read permission is the permission to read the name of a directory
c. File write permission is the permission to modify the content of a file
d. Directory execute permission is the permission to open a directory
2014
7. Which of the following is NOT TRUE about Secondary Storage?
a. RAM is an example of a Secondary Storage device
b. A Hard Disk Drive contains rapidly rotating rigid metallic platters with magnetic heads to read and write data from the platters
c. Solid State Drives are more durable and have faster writing speeds than Hard Disk Drives
d. DVD and Blu-Ray are examples of secondary storage devices
2014
9. Which of the following is TRUE about Bus?
a. A bus is the connection point between a device and a computer
b. A Data Bus is used to get/send signals to the I/O devices
c. A Control Bus is used to get/send physical memory addresses
d. A bus is a common set of wires used by one or more devices
2014
10. Which one of the following is NOT TRUE about OSes (Operating Systems)?
a. OSes keep track of the amount of resources used by each user
b. OSes manage memory, processors, files and devices
c. OSes serve as an intermediary between users, hardware, and software applications
d. OSes are only used to display a graphical user interface (GUI)
2015
2. Which one of the followings is NOT true about OS?
a) OS manages memory, processors, files, devices, security and communication
b) OS provides users an environment in which a user can execute programs conveniently and efficiently
c) The only purpose of OS is to interpret users/application commands to the language the hardware understands
d) OS serves as an intermediary between users, hardware, and software applications
2014
12. Which of the following is NOT TRUE about Malware?
a. A Trojan horse is a non-self-replicating malware that drops malicious payloads and creates backdoors
b. A Malware is a computer program that is used to breach computer security
c. A Spyware is a standalone malware that tries to gather and send information about the system without the user’s permission
d. A Resident virus is a type of virus that will remain in the Master Boot Record of a hard disk
2014
13. Which of the following is NOT TRUE about processes?
a. A foreground process is a process controlled via user interface and Background process is a program running in memory but it is not visually visible to the users
b. A process has 5 possible states: new, running, ready, waiting and terminated
c. Text section, program counter, stack, data section and heap are stored in a process context
d. A process is a passive entity stored on a disk
2016
11. Which of the following is NOT a true statement about Processes?
a. Processes may be idle because they are waiting for I/O to complete
b. A process may have 5 possible states: new, running, ready, waiting and terminated
c. A program is a process that is currently running in memory but is not on display
A program may create multiple almost identical processes
2014
18. Which of the following is NOT TRUE about User Authentication?
a. Compared to static passwords, one-time passwords are less prone to man-in-themiddle attacks
b. A static password is a password that a user can use at all times to login
c. User Authentication is a method for verifying the identity of a user
d. A one-time password is a password that is valid for only one login session or transaction
2014
19. Which one of the following is NOT TRUE about User interfaces in OSes (Operating Systems)?
a. In MS-DOS mode, a command prompt (e.g., C:>) is an example of CLI
b. CLI and GUI stand for Command Line Interface (or Interpreter) and Graphical User Interface, respectively
c. Both GUI and CLI are implemented below the Kernel
d. An OS may have both GUI and CLI, and in a multi-tasking mode they can run at the same time
2014
20. Which one of the following is CORRECT about System Calls in OSes?
a. System calls are functions (procedures) that you/applications use to interact with the kernel
b. Linux, Windows and Mac OS have exactly the same system calls
c. System calls are programs for passing messages between software applications
d. Windows Task Manager is an example of a system call
2014
11. Which of the following CORRECTLY describes a file that has a permission of – r-x r– —?
a. It is a file that can only be read by the user/owner and the group
b. It is a file that everyone (user, group and others) can read
c. It is a file that can only be executed by the group
d. It is a file that everyone (user, group and others) can modify/write
2014
1. The content of an /etc/passwd file is liam:x:2930:1875:A computing student:/home/liam:/bin/bash
Based on the above information, which of the following is NOT TRUE?
a) The user’s password is 1875
b) The path to the user’s shell is /bin/bash
c) The username is liam
d) The user id is 2930
2017
17. The content of a user’s /etc/passwd file is: liam:x:2930:1875:A computing student:/home/liam:/bin/bash
Based on the above information, which of the followings is NOT true?
a. The user id is 2930
b. The path to the user’s shell is /bin/bash
c. The user’s password is 1875
d. The username is liam
2014
8. Which of the following is the CORRECT command to set the permission of Test1.php?
File Name
User Group Other Read Write Execute Read Write Execute Read Write Execute Test1.php ? ? ? ? ?
?
a. chmod 764 Test1.php
b. chmod 731 Test1.php
c. chmod 761 Test1.php
d. chmod 016 Test1.php
2017
14. Which of the following is the CORRECT command to set the permission of Test1.php? File Name User Group Other Read Write Execute Read Write Execute Read Write Execute Test1.php ? ? ? ? ? ?
a. chmod 761 Test.php
b. chmod 731 Test1.php
c. chmod 764 Test1.php
d. chmod 016 Test1.php
2013
10. Which one of the commands given below is correct for changing file permission using numeric method that would grant read, write and execute permissions for owner and only read permission for the group and others to a file named myfile.txt?
a. chmod 744 myfile.txt
b. chmod 474 myfile.txt
c. chmod 747 myfile.txt
d. chmod u+rwx myfile.txt
e. chmod a+rwx myfile.txt
2017
5. Which of the following is NOT true about a parent and a child process?
a. Usually a child process only shares a subset of the parent to prevent a process overloading the system with too many child processes
b. A child process may be terminated by its parent because it has exceeded its usage of some of the allocated resources
c. A child process may be executed concurrently with the parent process
d. Interrupt is a situation where a process is terminated abruptly due to run-time errors
2016
9. Which of the following is NOT true about a parent and a child process?
a. Usually a child process only shares a subset of the parent to prevent a process overloading the system with too many child processes
b. A child process may be terminated by its parent because it has exceeded its usage of some of the allocated resources
c. A child process may be executed concurrently with the parent process
d. Interrupt is a situation where a process is terminated abruptly due to run-time errors
2017
6. Which of the following Linux commands can be used for displaying the content of a text file?
a. top
b. tasklist
c. cat
d. ls
2015
9. Which of the following Linux commands can be used for displaying the content of a text file?
a. tasklist
b. cat
c. top
d. ls
2016
7. Which of the following Linux commands can be used for displaying the content of a text file?
a. top
b. tasklist
c. cat
d. ls
2017
9. Which one is NOT among the benefits of Virtual Memory (VM)?
a. Faster deadlock detection
b. More programs can be run at the same time
c. Possibly each program can run faster
d. A program would no longer be constrained by the amount of physical memory
2015
13. Which one is NOT among the benefits of Virtual Memory (VM)?
a. Faster deadlock detection
b. More programs can be run at the same time
c. Possibly each program can run faster
d. A program would no longer be constrained by the amount of physical memory
2016
15. Which one is NOT among the benefits of Virtual Memory (VM)?
a. Faster deadlock detection
b. More programs can be run at the same time
c. Possibly each program can run faster
d. A program would no longer be constrained by the amount of physical memory
2017
10. Which of the following is NOT true about a Linux Command?
a. rmdir is a command used to remove/delete a directory
b. ps is a command used to view the list of running processes
c. echo is a command used to view the user’s password
d. rm is a command to delete a file
2017
8. Which of the following is NOT true about a Linux Command?
a. rmdir is a command used to remove/delete a directory
b. ps is a command used to view the list of running processes
c. rm is a command to delete a file
d. echo is a command used to view the user’s password
2016
6. Which of the following is NOT true about a Linux Command?
a. rmdir is a command used to remove/delete a directory
b. ps is a command used to view the list of running processes
c. echo is a command used to view the user’s password
d. rm is a command to delete a file
2017
12. Granting access control for system’s resources is the responsibility of:
a. Intruder
b. Guest user
c. Normal user
d. Root user
2015
20. Granting access control for system’s resources is the responsibility of:
a. Normal user
b. Guest user
c. Root user
2016
14. Granting access control for system’s resources is the responsibility of:
a. Intruder
b. Guest user
c. Normal user
d. Root user
2017
15. Which one of the followings is NOT considered as a benefit of Micro Kernel?
a. Use less space in the User Space as majority of codes are running in the kernel
b. Easy to construct and debug
c. Easier to port the OS to new architecture
d. Less code is running in kernel mode, therefore is more reliable
2015
4. Which one of the followings is NOT considered as a benefit of Micro Kernel?
a) Use less space in the User Space as majority of codes are running in the kernel
b) Easy to construct and debug
c) Easier to port the OS to new architecture
d) Less code is running in kernel mode, therefore is more reliable
2017
16. Which of the following is NOT a true statement about Processes?
a. Processes may be idle because they are waiting for I/O to complete
b. A process may have 5 possible states: new, running, ready, waiting and terminated
c. A program is a process that is currently running in memory but is not on display
d. A program may create multiple almost identical processes
2017
18. Which one is mostly true about the different types of computer storage?
a. CPU registers are the most expensive, large size, and very fast type of storage
b. Cache is very expensive, small size, and very fast type of storage
c. Hard disk is expensive, large size and fast type of storage
d. RAM is expensive, small size, and fast type of storage
2015
18. Which one is mostly true about the different types of computer storage?
a. CPU registers are the most expensive, large size, and very fast type of storage
b. Cache is very expensive, small size, and very fast type of storage
c. Hard disk is expensive, large size and fast type of storage
d. RAM is expensive, small size, and fast type of storage
2016
19. Which one is mostly true about the different types of computer storage?
a. CPU registers are the most expensive, large size, and very fast type of storage
b. Cache is very expensive, small size, and very fast type of storage
c. Hard disk is expensive, large size and fast type of storage
d. RAM is expensive, small size, and fast type of storage
2017
19. How can a deadlock be prevented before occurring?
a. By having Virtual Memory program
b. By having Multi-threading
c. By having a Resource Management program
d. By having Multi-tasking
2017
20. Prevention of legitimate use by overloading the targeted computer is called:
a. Denial Of Service
b. Breach of availability
c. Theft of service
d. Masquerading
2015
19. Prevention of legitimate use by overloading the targeted computer is called:
a. Breach of availability
b. Theft of service
c. Masquerading
d. Denial Of Service
2016
20. Prevention of legitimate use by overloading the targeted computer is called:
a. Denial Of Service
b. Breach of availability
c. Theft of service
d. Masquerading
2015
11. What is the maximum number of values which can be shown in a binary (2-bit) system?
a. 2
b. 3
c. 4
d. 5
2015
14. How can a deadlock be prevented before occurring?
a. By having Multi-threading
b. By having Multi-tasking
c. By having Virtual Memory program
d. By having a Resource Management program
2016
16. How can a deadlock be prevented before occurring?
a. By having Virtual Memory program
b. By having Multi-threading
c. By having a Resource Management program
d. By having Multi-tasking
2015
16. Dividing/marking a disk into sectors that the disk controller can read and write is called:
a. Physical formatting
b. MBR
c. Partitioning
d. Logical formatting
2016
13. Dividing/marking a disk into sectors that the disk controller can read and write is called:
a. Partitioning
b. Physical formatting
c. MBR
d. Logical formatting
2015
17. Identity theft at financial services company is particularly done by:
a. Crimeware
b. Adware
c. Rootkit
d. Spyware
2016
18. Identity theft at financial services company is particularly done by:
a. Rootkit
b. Crimeware
c. Spyware
d. Adware
2. Which one of the following is not true for operating systems for hand-held devices?
a) Same as operating systems for desktop computers
b) Run in protected mode
c) 32 bits CPU
d) No hard disk drive
e) None of the above
3. Which one of the following statements is not true for file types?
a) Regular files are for user information
b) System files are for OS use
c) API files for system drivers
d) Character files are for serial I/O
e) Block special files for disk data transfer
4. Which one of the following statement is true about future possibilities in computer technology?
a) Going from PC centric to web centric
b) People login to the website and do word processing, spread sheet and other things
c) May require only web browser
d) Similar to concept of thin client
e) All the above statements
a.
6. Which one of the following statements is most appropriate for a process?
a) A program in execution
b) Processes are created and terminated
c) It contains the program code and its current activity
d) A process may have multiple threads
e) All of the above
7. CPU scheduling is a key concept in:
a) Computer multitasking
b) Multiprocessing operating system
c) Real-time operating system designs
d) Application development
e) Only A, B and C
8. File and Directory Management is a special-purpose database for the following purposes:
a) Storage
b) Organization
c) Manipulation of data
d) Retrieval of data
e) All of the above
9. Which one of the following statements is true about Windows Backup and Restore Centre?
a. Introduced in Vista
b. Replaces NTBackup
c. It does file backup
d. It does full system backup
e. All of the above