Operating System Architecture Set 12

On This Page

This set of Operating System Architecture Multiple Choice Questions & Answers (MCQs) focuses on Operating System Architecture Set 12

Q1 | Which command is used to terminate the process?
  • wait
  • sleep
  • kill
  • none
Q2 | Which commaand is use for the copy in unix?
  • copy
  • cp
  • cpy
  • none
Q3 | What is stand for IPC?
  • inter procedure communication
  • inter process communication
  • inter part compare
  • none
Q4 | Which one is best in action between fork() and vfork()?
  • fork()
  • vfork()
  • both
  • none
Q5 | fork system call…..
  • control the size of memory allocated to a process
  • create a new process
  • overlay image of a program onto the running process
  • finish executing a process
Q6 | exec system call……..
  • create a new process
  • finish executing a process
  • control the size of memory allocated to a process
  • overlay image of a program onto the running process
Q7 | wait system call…………
  • finish executing a process
  • control the size of memory allocated to a process
  • synchronize process execution with exit of previously forked process
  • overlay image of a program onto the running process
Q8 | brk system call…………
  • synchronize process execution with exit of previously forked process
  • control the size of memory allocated to a process
  • finish executing a process
  • overlay image of a program onto the running process
Q9 | signal system call…………
  • control process response to extraordinary events
  • control the size of memory allocated to a process
  • synchronize process execution with exit of previously forked process
  • overlay image of a program onto the running process
Q10 | Two policies for managing memory are……………
  • swaping and demand paging
  • semaphore and deadlock
  • scheduling and wait
  • none
Q11 | Schedular module allocate …..
  • processes to cpu
  • cpu to processes
  • processes to kernel
  • none
Q12 | The file subsystem accesses file data using a buffering mechanism that regulates ….
  • data flow between the kernel and secondary storage devices.
  • data flow between secondary storage devices to kernel
  • data flow of kernel
  • none
Q13 | The internal representation of a file is given by ……..
  • an inode
  • semaphore
  • pipes
  • none
Q14 | Every file in unix has …..
  • two inode
  • one inode
  • no inode
  • none
Q15 | inode name is also called……
  • file
  • link
  • file
  • file descriptors
Q16 | When a process creates a new file, the kernel assigns it an ……...
  • used inode
  • unused inode
  • integer number
  • file number
Q17 | With inode, the kernel contains two data structures………….
  • file table and user file descriptor table
  • file system and kernel
  • file and semaphore
  • none
Q18 | Which of the following is not A system calls?
  • chmod
  • open
  • lseek
  • getc
Q19 | Mounting a file system results in the loading of
  • boot block
  • super block
  • i-node table
  • all of these
Q20 | If cat x ,prints garbage ,then x is probably a
  • data file
  • binary file
  • text file
  • source file
Q21 | An attempt to read from locked file,results in
  • prematured termination
  • a deadlock
  • an indefinite wait
  • none of the above
Q22 | To allow only one user to work with a particular file at a particular time ,one has to …..
  • semaphore
  • critical region
  • locking
  • dedicated mode
Q23 | Which of the following are character special files?
  • terminal
  • printer
  • modem
  • tape drive
Q24 | Which of the following sections of an executable binary file has all uninitialized data items?
  • bss
  • data
  • header
  • symbol
Q25 | Which of the following files contains information related to password aging?
  • shadow
  • profile
  • password
  • all of these