Select Category
All Categories
Accounting
Agriculture
Astrobiology
Banking & Finance
Business World
Civilizations
Commerce & Economics
Competitive exams
Computer Science & IT
Current affairs
Earth Science
Education
Environment
Explore the Animal World
Food chain
General Knowledge
Geography Map
Green Life
History
Human Health
Journalism
Law
Science
Social Science
TAX
About Us
Contact Us
Login
Operating System - part 4
1
of
25
💡
Hints:
3
Q1. Roundrobin scheduling falls under the category of
A. Non-preemptivescheduling
B. Preemptivescheduling
C. All of thementioned
D. None ofthe mentioned
Q2. A student in a school has full read / write permission on the shared rer- sources drive
A. TRUE
B. FALSE
Q3. In what year did Microsoft create the Windows operating system?
A. 1975
B. 1985
C. 1995
D. 2005
Q4. In priority scheduling algorithm:
A. CPU is allocated to the process with highest priority
B. CPU is allocated to the process with lowest priority
C. equal priority processes can not be scheduled
D. none of the mentioned
Q5. What does the Operating System manage by communicating with and sendingdataoutputtoaprinter,mon- itor etc?
A. manages input and output devices
B. manages spooling
C. manages the backing store
D. manages memory (RAM)
Q6. What is ’defragmenting’?
A. Breaking up files to fit them on a hard disk that is nearly full
B. Rearranging data stored on a hard disk to keep parts of files together
C. Encrypting the contents on a disk
D. Hacking encrypted files
Q7. Consider thease two statements"The operatingsystemisstoredonthecom- puter’srROM""The operating system software is loaded into RAM & exe- a cuted as the final stage of boot up"
A. The first statement is FALSE and the second statement is FALSE
B. The first statement is FALSE and the second statement is TRUE
C. The first statement is TRUE and the second statement is FALSE
D. The first statement is TRUE and the second statement is TRUE
Q8. refers to any person working with the computer
A. hardware
B. humanware
C. software
Q9. Operating systems make the com- puter run
A. smoothly
B. faster
C. slower
D. better
Q10. Which is the best advantage of using Windows?
A. The price
B. The security
C. Availability of Software
D. the people
Q11. The advantages of multiprocessor systems
A. Increased throughput
B. Economy of scale
C. Increased reliability
D. All the above
Q12. A ___ is a more powerful version of a cell phone because it can connect to the internet using WIFI. n
A. cell phone
B. laptop
C. smartphone
D. dumbphone
Q13. When data is stored on or loaded from any device, buffers will be used. There is a specific ___ used to deal with buffers and interrupts when sav ing data to a slower device
A. algorithm
B. interrupts
C. buffer
Q14. The action an application takes in response to a gesture is called a ___ ?
A. touchlist
B. touch event
C. tap
D. double tap
Q15. What is this image
×
A. input
B. output
Q16. Windows is an example of an OPEN SOURCE operating system
A. True
B. False
Q17. Which of the following OS is preloaded on a computer such as a Macbook?
A. Apple Mac OS X
B. Microsoft Windows
C. Linux
Q18. A type of software used to create and g manipulate documents that contain text and graphics.
A. Database
B. Spareadsheet
C. Word Processor
D. Graphics and Multimedia Software
Q19. What is the program counters job?
A. To count the programs
B. It contains the memory address of the next instruction to be loaded
C. It stores instructions
D. It carries out the calculations
Q20. What type of operating system is Win dows 10?
A. Mobile
B. Multi-Tasking
C. Batch
D. Network
Q21. The Close button is present at the left corner of the taskbar.
A. TRUE
B. FALSE
Q22. Disk management window gives you details on the amount of hard drive space on your system, including the totalspacesetasideforthatdriveand how much is not being used currently.
A. True
B. False
Q23. The operating system and the other processes are protected from being modified by an alreadyrunning pro- cess because:
A. they are different in memory spaces
B. they are different in logical ad dresses
C. they have a protection algorithm
D. every address generated by the CPU is being checked against the re location and limit register
Q24. Which Interface is this an example of?
×
A. Command Line
B. Graphical
C. Voice Command
D. Menu Interface
Q25. Which type of server maintains a database called agzone file, which it uses to provide clients with requested informationn?
A. Authentication server
B. DNS server
C. DHCP server
D. Proxy server
Submitting Your Quiz...
Please wait while we process your answers