1.
_________ is the interface between user and hardware.
Correct Answer
A. Operating system
Explanation
The operating system acts as the interface between the user and the hardware. It provides a platform for users to interact with the computer system and manages the hardware resources. It allows users to run applications, access files, and perform various tasks on the computer. The operating system also handles input and output operations, manages memory, and schedules tasks for efficient execution. Therefore, the operating system serves as the bridge between the user and the underlying hardware components of the computer system.
2.
When executable file is loaded into a memory it becomes ________.
Correct Answer
A. Process
Explanation
When an executable file is loaded into memory, it becomes a process. A process is an instance of a program that is being executed. It has its own memory space, resources, and execution context. Multiple processes can run concurrently on a computer system, each with its own set of instructions and data. Therefore, when an executable file is loaded into memory, it is transformed into a process that can be executed by the operating system.
3.
___________ mode is also called as system mode.
Correct Answer
A. Kernel
Explanation
The correct answer is kernel. The kernel mode is also referred to as the system mode. The kernel is the core component of an operating system that manages system resources and provides essential services for other software. In kernel mode, the operating system has unrestricted access to the hardware and can execute privileged instructions. This mode is reserved for the operating system and trusted system processes.
4.
For kernel mode the bit is ___.
Correct Answer
A. 0
Explanation
In kernel mode, the bit is set to 0. Kernel mode is a privileged mode in which the operating system has complete control over the system resources. It allows direct access to hardware and unrestricted execution of privileged instructions. By setting the bit to 0, it indicates that the system is operating in kernel mode, ensuring that only trusted and authorized processes can access and modify critical system resources.
5.
Each process is represented in the Operating System by a _________
Correct Answer
A. PCB
Explanation
A process control block (PCB) is used to represent each process in the operating system. It contains important information about the process, such as its current state, program counter, register values, and memory allocation. The PCB allows the operating system to manage and control the execution of processes, including scheduling, resource allocation, and context switching. It serves as a data structure that holds all the necessary information about a process, enabling the operating system to efficiently manage and track the execution of multiple processes simultaneously.
6.
In many to one model many ________ level threads are connected to the one ______ level thread.
Correct Answer
A. User-kernel
Explanation
In the many-to-one model, multiple user-level threads are connected to a single kernel-level thread. This means that the user-level threads are managed by the kernel thread, which handles their scheduling and execution. This model allows for concurrency at the user level while relying on the kernel for thread management and resource allocation.
7.
In zero capacity queue has a maximum length of _____
Correct Answer
A. 0
Explanation
A zero capacity queue has a maximum length of 0 because it cannot hold any elements. This means that no items can be added to the queue, and therefore it will always have a length of 0.
8.
When process enter into the system they are put into a ________ queue.
Correct Answer
A. Job
Explanation
When a process enters the system, it is put into a "job" queue. This queue holds all the processes that are waiting to be executed by the system. Once a process is in the job queue, it will be scheduled and allocated resources to be executed. Therefore, the correct answer is "job".
9.
In layered approach operating system is broken into a number of layers and the bottom layer is _______
Correct Answer
A. Hardware
Explanation
In the layered approach, the operating system is divided into several layers, with each layer performing specific functions. The bottom layer, which is the hardware layer, is responsible for interacting directly with the physical components of the computer system. It provides the necessary interface and communication between the software and the actual hardware devices. Therefore, the correct answer is hardware.
10.
Operating system can use ______ to prevent a user program from running too long.
Correct Answer
A. Timer
Explanation
The operating system can use a timer to prevent a user program from running too long. By setting a specific time limit, the operating system can interrupt the execution of the program when the timer expires. This ensures that no single program monopolizes the system's resources for an extended period, allowing other programs to have a fair share of the CPU's processing time. The timer interrupt helps in maintaining system stability and responsiveness by enforcing time limits on user programs.
11.
_________ booting is the using operating system to restart the computer.
Correct Answer
A. Warm
Explanation
Warm booting refers to restarting a computer using the operating system, without turning off the power. This allows the computer to quickly restart and resume its operations. In contrast, a cool boot refers to starting the computer from a powered-off state, while a shut boot refers to turning off the computer completely and then turning it on again. The term "flush boot" is not commonly used in computer terminology and does not relate to restarting the computer.
12.
___________ programs help the user to perform a particular task.
Correct Answer
A. Application software
Explanation
Application software programs are designed to assist users in performing specific tasks. Unlike system software, which manages and controls computer hardware and provides a platform for running other software, application software is focused on providing functionality and features for specific purposes. Examples of application software include word processors, spreadsheets, graphic design programs, and web browsers. These programs are user-friendly and intended to meet the needs and requirements of users in a particular domain or field.
13.
In peer to peer computing every client and servers are not distinguished from each other they act as all nodes and considered as ______
Correct Answer
A. Peers
Explanation
In peer to peer computing, every client and server are not distinguished from each other. They all act as equal nodes and are considered as peers. In this decentralized network architecture, each node can function both as a client and a server, sharing resources and services with other nodes in the network. This allows for a more efficient and distributed system where each node has equal capabilities and responsibilities.
14.
Browser-based computing is a term denoting use of the _________ to perform computing tasks.
Correct Answer
A. Web browsers
Explanation
Browser-based computing refers to the use of web browsers to perform computing tasks. Web browsers are software applications that allow users to access and interact with information on the internet. They provide a platform for running web-based applications and executing tasks such as displaying websites, running scripts, and handling user input. Therefore, web browsers are the correct answer as they are the primary tool used for browser-based computing.
15.
A part of a computer program that performs a well-defined task is known as an ______
Correct Answer
A. Algorithm
Explanation
An algorithm is a well-defined set of instructions or steps that a computer program follows to perform a specific task. It is a part of a computer program that outlines the logical and sequential order in which operations need to be executed. Algorithms are essential in solving complex problems and are used in various applications, such as sorting data, searching for information, or performing mathematical calculations. The other options, software, hardware, and system, are broader terms that encompass different components or aspects of a computer program or system, but do not specifically refer to a well-defined task.
16.
______ processes are waiting to have the processor allocated to them by the operating system so that they can run.
Correct Answer
A. Ready
Explanation
The term "ready" in the context of operating systems refers to processes that are waiting to be allocated the processor by the operating system in order to execute their tasks. These processes are in a state where they are prepared and capable of running, but are waiting for their turn to be scheduled by the operating system.
17.
The PCB is identified by an integer ______
Correct Answer
A. PID
Explanation
The acronym "PID" stands for "Process Identifier." In the context of a PCB (Process Control Block), the PID is an integer value that uniquely identifies a running process in an operating system. It is used by the operating system to keep track of various process-related information, such as process state, priority, and resource allocation. Therefore, the correct answer is PID.
18.
The ___________ is the activity of the process manager that handles the removal of the running process from the CPU and the selection of another process on the basis of a particular strategy.
Correct Answer
A. Process scheduling
Explanation
Process scheduling is the activity of the process manager that handles the removal of the running process from the CPU and the selection of another process on the basis of a particular strategy. This involves determining which process should be given access to the CPU next, based on factors such as priority, time quantum, and scheduling algorithms. By efficiently managing the allocation of CPU time to different processes, process scheduling helps optimize the overall performance and utilization of the system.
19.
Long term scheduler is also known as _______
Correct Answer
A. Job scheduler
Explanation
The long term scheduler is also known as the job scheduler because its main task is to select which processes from the job queue will be brought into the main memory for execution. It determines which processes are admitted to the system and allocates resources to them. The job scheduler plays a crucial role in managing the overall system performance by making decisions about process admission and resource allocation based on various criteria such as priority, memory availability, and system load.
20.
Medium term scheduler is nothing but the _______
Correct Answer
A. Swapping
Explanation
The medium-term scheduler is responsible for swapping processes from main memory to secondary storage. This allows for efficient memory management by temporarily removing processes that are not actively running from the main memory, freeing up space for other processes to be loaded. This swapping process helps prevent memory congestion and ensures that the system runs smoothly by balancing the number of processes in memory. Therefore, the correct answer is "swapping".
21.
________ process is not affected by the execution of other processes
Correct Answer
A. Independent
Explanation
The process that is not affected by the execution of other processes is referred to as independent. This means that it can run and complete its tasks without any interference or dependency on other processes. It operates autonomously and does not rely on the actions or outcomes of other processes to function properly.
22.
________ is a mechanism which allows processes to communicate each other and synchronize their actions.
Correct Answer
A. IPC
Explanation
IPC stands for Inter-Process Communication, which is a mechanism that allows processes to communicate with each other and synchronize their actions. This mechanism enables processes running on the same system or different systems to exchange data and information. IPC provides various methods such as shared memory, message passing, and pipes to facilitate communication and coordination between processes. It is an essential component in multitasking and distributed systems, where processes need to collaborate and exchange information to perform tasks efficiently.
23.
The processes which are blocked due to unavailability of an I/O device constitute this ________ queue.
Correct Answer
A. Device
Explanation
The processes that are blocked due to the unavailability of an I/O device are placed in the device queue. This queue specifically handles processes that are waiting for the I/O device to become available so that they can resume their execution.
24.
Process scheduling is a part of a _________ operating systems.
Correct Answer
A. Multiprogramming
Explanation
Process scheduling is a crucial aspect of multiprogramming operating systems. In multiprogramming, multiple processes are loaded into main memory simultaneously, and the CPU switches between them to ensure efficient utilization of system resources. The process scheduler determines the order in which processes are executed and manages their allocation of CPU time. Therefore, multiprogramming is the correct answer as it directly relates to the concept of process scheduling in operating systems.
25.
______ section contains the global and static variables.
Correct Answer
A. Data
Explanation
The data section contains the global and static variables. Global variables are accessible throughout the entire program, while static variables are limited to the scope of the function or block they are declared in. The data section is a portion of memory that is allocated for storing these variables, and it is separate from the stack and heap sections which are used for dynamic memory allocation.
26.
______ is the most common of the User interfaces, and the most user friendly.
Correct Answer
A. GUI
Explanation
GUI, or Graphical User Interface, is the most common and user-friendly interface among the options provided. GUI allows users to interact with electronic devices through graphical elements such as icons, buttons, and windows, making it easier for users to navigate and operate the system. Unlike CLI (Command Line Interface), which relies on text-based commands, GUI provides a visually intuitive experience, making it more accessible to a wider range of users, including those with limited technical knowledge. ABC and server interface are not commonly used or known as user interfaces, further supporting GUI as the correct answer.
27.
_____ is a collection of computers which are used to process and exchange the information to solve various types of computing problems.
Correct Answer
A. Computing Environment
Explanation
A computing environment refers to a collection of computers that are interconnected and work together to process and exchange information. This environment is utilized to solve various types of computing problems by utilizing the combined processing power and resources of the interconnected computers.
28.
____________ is a function of operating system.
Correct Answer
A. Memory management
Explanation
Memory management is a function of the operating system that is responsible for managing the primary memory of a computer system. It involves allocating and deallocating memory to different processes, ensuring efficient utilization of memory resources, and preventing conflicts between processes. The operating system uses memory management techniques such as paging, segmentation, and virtual memory to provide a logical and organized memory space for programs and data. Without memory management, the operating system would not be able to effectively manage and allocate memory, leading to issues such as memory leaks, fragmentation, and poor system performance.
29.
__________ communicate, control and monitor the device driver.
Correct Answer
A. Device management
Explanation
Device management is responsible for communicating, controlling, and monitoring the device driver. This involves tasks such as detecting and configuring devices, allocating system resources to them, and handling device errors and conflicts. Device management ensures that devices are properly functioning and allows the operating system to interact with them effectively. This includes managing input/output operations, device drivers, and device configurations.
30.
At system boot time, the hardware starts in ______ mode.
Correct Answer
A. Monitor
Explanation
At system boot time, the hardware starts in monitor mode. This mode allows the system to perform diagnostic tests and initialize hardware components before loading the operating system. It provides low-level access to the system's resources and allows for troubleshooting and configuration. The monitor mode is essential for the system to properly start up and ensure that all hardware components are functioning correctly before transitioning to other modes such as user or server mode.