KEMBAR78
Operating System MCQ | PDF | Operating System | Kernel (Operating System)
0% found this document useful (0 votes)
10 views42 pages

Operating System MCQ

The document contains a series of multiple-choice questions (MCQs) related to operating systems, covering topics such as file systems, memory management, and process control. Each question is accompanied by the correct answer and a brief explanation. Key concepts include the definition of operating systems, file extensions, booting processes, and algorithms related to deadlock and memory management.

Uploaded by

excelr743
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views42 pages

Operating System MCQ

The document contains a series of multiple-choice questions (MCQs) related to operating systems, covering topics such as file systems, memory management, and process control. Each question is accompanied by the correct answer and a brief explanation. Key concepts include the definition of operating systems, file extensions, booting processes, and algorithms related to deadlock and memory management.

Uploaded by

excelr743
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 42

Operating System MCQ

1) Which of the following is not an operating system?

a) Windows
b) Linux
c) Oracle
d) DOS

Answer: (c) Oracle

Explanation: Oracle is an RDBMS (Relational Database


Management System). It is known as Oracle Database,
Oracle DB, or Oracle Only. The first database for
enterprise grid computing is the Oracle database.

2) What is the maximum length of the filename in DOS?

a) 4
b) 5
c) 8
d) 12

Answer: (c) 8

Explanation: The maximum length of the filename is 8


characters in the DOS operating system.

3) When was the first operating system developed?

a) 1948
b) 1949
c) 1950
d) 1951

Answer: (c) 1950

Explanation: The first operating system was


developed in the early 1950's. It was also called a
single-stream batch processing system because it
presented data in groups.

4) When were MS windows operating systems


proposed?

a) 1994
b) 1990
c) 1992
d) 1985

Answer: (d) 1985

Explanation: The first MS Windows operating system


was introduced in early 1985.

5) Which of the following is the extension of Notepad?

a) .txt
b) .xls
c) .ppt
d) .bmp

Explanation: The .txt file extension is a standard text


document extension that contains the unformatted
text. It is the default file extension for the notepad.

6) What else is a command interpreter called?

a) prompt
b) kernel
c) shell
d) command

Answer: (c) shell

Explanation: The command interpreter is also called


the shell.
7) What is the full name of FAT?

a) File attribute table


b) File allocation table
c) Font attribute table
d) Format allocation table

Answer: (b) File allocation table.

Explanation: The FAT stands for File allocation table.


The FAT is a file system architecture. It is used in
computer systems and memory cards. A FAT of the
contents of a computer disk indicates which field is
used for which file.

8) BIOS is used?

a) By operating system
b) By compiler
c) By interpreter
d) By application software

Answer: (a) By operating system

Explanation: BIOS is used by the operating system. It


is used to configure and identify the hardware in a
system such as the hard drive, floppy drive, optical
drive, CPU, and memory.

9) What is the mean of the Booting in the operating


system?

a) Restarting computer
b) Install the program
c) To scan
d) To turn off

Answer: (a) Restarting computer


Explanation: Booting is a process of the restart the
computer. After restarting it, there is no software in the
computer's main memory.

10) When does page fault occur?

a) The page is present in memory.


b) The deadlock occurs.
c) The page does not present in memory.
d) The buffering occurs

Answer: (c) The page does not present in memory.

Explanation: Page faults occur when a process tries to


access a block page of the memory and that page is
not stored in RAM (Read only memory) or memory.

11) Banker's algorithm is used?

a. To prevent deadlock

b. To deadlock recovery

c. To solve the deadlock

d. None of these

Answer: (a) To prevent deadlock

Explanation: Banker's algorithm is used to prevent the


deadlock condition. The banker algorithm is sometimes
called the detection algorithm. It is named the banker
algorithm because it is used to determine whether a
loan can be granted in the banking system or not.

12) When you delete a file in your computer, where


does it go?

a) Recycle bin
b) Hard disk
c) Taskbar
d) None of these

Answer: (a) Recycle bin

Explanation: When you delete a file on your computer


device, it is transferred to your computer system's
recycle bin or trash.

13) Which is the Linux operating system?

a) Private operating system


b) Windows operating system
c) Open-source operating system
d) None of these

Answer: (c) Open-source operating system

Explanation: The Linux operating system is an open-


source operating system made up of a kernel. It is a
very safe operating system.

14) What is the full name of the DSM?

a) Direct system module


b) Direct system memory
c) Demoralized system memory
d) Distributed shared memory

Answer: (d) Distributed shared memory

Explanation: The DSM stands for Distributed Shared


Memory

15) What is the full name of the IDL?


a) Interface definition language
b) Interface direct language
c) Interface data library
d) None of these

Answer: (a) Interface definition language

Explanation: The IDL stands for Interface Definition


Language. It is used to establish communications
between clients and servers in RPC (Remote Procedure
Call).

16) What is bootstrapping called?

a) Cold boot
b) Cold hot boot
c) Cold hot strap
d) Hot boot

Answer: (a) Cold boot

Explanation: Bootstrapping is also known as the cool


boot.

17) What is the fence register used for?

a) To disk protection
b) To CPU protection
c) To memory protection
d) None of these

Answer: (c) To memory protection

Explanation: The fence register is used for memory


protection on the computer. It is a way to access the
memory in the computer.
18) If the page size increases, the internal
fragmentation is also??

a) Decreases
b) Increases
c) Remains constant
d) None of these

Answer: (b) Increases

Explanation: None

19) The size of virtual memory is based on which of the


following?

a) CPU
b) RAM
c) Address bus
d) Data bus

Answer: (c) Address bus

Explanation: The size of virtual memory is based on


the address bus.

20) Which of the following is not application software?

a) Windows 11
b) WordPad
c) Photoshop
d) MS-excel

Answer: (a) Windows 11

Explanation: Windows 11 is not an application


software because it is an operating system.
21) Which of the following operating systems does not
support more than one program at a time?

a) Linux
b) Windows
c) MAC
d) DOS

Answer: (d) DOS

Explanation: DOS stands for Disk operating system.


Disk operating system is a single-user operating system
that does not support more than one program at a
time.

22) Which of the following is a condition that causes


deadlock?

a) Mutual exclusion
b) Hold and wait
c) Circular wait
d) No pre-emption
e) All of these

Answer: (e) All of these

Explanation: None

23) Who provides the interface to access the services


of the operating system?

a) API
b) System call
c) Library
d) Assembly instruction

Answer: (b) System call


Explanation: The system call provides an interface for
user programs to access the services of the operating
system through the API (Application Program Interface).

24) Where are placed the list of processes that are


prepared to be executed and waiting?

a) Job queue
b) Ready queue
c) Execution queue
d) Process queue

Answer: (b) Ready queue

Explanation: The ready queue is a set of all the


processes that processes are ready to execute and
wait.

25) Which of the following does not interrupt the


running process?

a) Timer interrupt
b) Device
c) Power failure
d) Scheduler process

Answer: (b) Scheduler process

Explanation: Scheduler process does not interrupt in


any running process. Its job is to select the processes
for long-term, short-term, and short-term scheduler.

26) What is Microsoft window?

a) Operating system
b) Graphics program
c) Word Processing
d) Database program
Answer: (a) Operating system

Explanation: Microsoft Windows is an operating


system that was developed by Microsoft company. The
Microsoft Windows is available in 32-bits and 64-bits in
the market.

27) Which program runs first after booting the


computer and loading the GUI?

a) Desktop Manager
b) File Manager
c) Windows Explorer
d) Authentication

Answer: (d) Authentication

Explanation: The authentication program is run first


after booting the computer and loading the GUI.
Authentication is a process of verifying the person or
device. For example, when you log in to Facebook, you
enter a username and password.

28) Which of the following operating systems require a


command to run?

a) Kali Linux
b) Windows
c) Mac OS
d) Single-user operating system

Answer: (a) Kali Linux

Explanation: Kali Linux is a fast operating system as


more work is done through the command line in it. This
OS is a Debian-based Linux OS.
29) Who is responsible for keeping the process from the
program?

a) Operating system
b) CPU
c) Monitor
d) All of the these

Answer: (a) Operating system

Explanation: A process is created from a program by


the operating system. The OS is software that acts as
an interface between a device and users and is also
known as system software.

30) COW stands for __________

a) Compress of write memory


b) Copy overwrites
c) Compress overwrites
d) Computer of world

Answer: (b) Copy overwrite

Explanation: COW stands for Copy-Overwrite. Initially,


it allows both the parent and child systems to share the
same page.

31) Which of the following statements is correct about


virtual memory?

a) It is a combination of the logical-memory and


physical-memory
b) It is a separation of user logical memory and
physical memory
c) It is a virtual network memory
d) None of the these
Answer: (b) It is a separation of user logical memory
and physical memory

Explanation: Virtual memory is used to separate the


user's logical memory and actual physical memory.
Therefore, option (b) is the correct answer.

32) Which of the following mechanisms is a locking


mechanism?

a) Semaphore
b) PCB
c) Mutex
d) Binary Semaphore

Answer: (c) Mutex

Explanation: The mutex is a locking mechanism that


ensures that only one thread can occupy the mutex at
a time and enter the critical section.

33) Which of the following method is used to prevent


threads or processes from accessing a single resource?

a) PCB
b) Semaphore
c) Job Scheduler
d) Non-Contiguous Memory Allocation

Answer: (b) Semaphore

Explanation: Semaphore is an integer variable that is


used to prevent threads or processes from accessing a
single resource.

34) The PCB is identified by ___________.

a) Real-Number
b) Binary Number
c) Store block
d) Integer Process ID

Answer: (d) Integer Process ID

Explanation: PCB is a data structure that is used to


store the information of processes. It is identified by an
integer process ID (PID).

34) SSTF stands for ________.


a) Shortest Signal Time First
b) Shortest Seek Time First
c) System Seek Time First
d) System Shortest Time First

Answer: (b) Shortest Seek Time First

Explanation: SSTF stands for Shortest-Seek-Time-First.


In the SSTF algorithm, that request is executed first,
whose seek time is the shortest.

35) Which of the following statement is correct about


fragmentation?

a) It is software that connects the OS.


b) It is part of the software.
c) Loss the memory
d) All of the these

Answer: (c) Loss the memory

Explanation: A fragmentation is a state of a hard disk


in which the most important parts of a single file are
stored at different places in the disk. Due to which
there is a loss of memory, and the working efficiency of
the operating system is also affected.
34) Which of the following binary formats support the
Linux operating system?

a) 0 and 1
b) Binary Number Format
c) ELF Binary Format
d) None of the these

Answer: (c) ELF Binary Format

Explanation: ELF stands for "Executable-and-Linkable-


Format". The ELF format is used for libraries and
executable files in Linux operating systems.

35) What is Kali Linux?

a) Network device
b) Operating system
c) Server name
d) Computer name

Answer: (b) Operating system

Explanation: Kali Linux is an operating system similar


to Windows, Unix, and macOS. Kali operating system
was designed for reverse engineering, security,
computer forensics, etc.

36) Which of the following operating systems supports


only real-time applications?

a) Batch OS
b) Distributed OS
c) Real-time OS
d) Network OS
Answer: (c) Real-time OS

Explanation: The real-time OS supports real-time


applications. This OS is used for industrial and scientific
work. It completes the tasks in a given time.

37) Buffer is a ___________.

a) Permanent area
b) Temporary area
c) Small area
d) Large area

Answer: (b) Temporary area

Explanation: Buffer is a temporary area where data is


stored for some time before being transferred to the
main memory.

38) Which of the following method is used to improve


the main memory utilization?

a) Swapping
b) Operating system
c) Memory stack
d) None of these.

Answer: (a) Swapping

Explanation: Swapping is a technique in which the


process is removed from the main memory and stored
in secondary memory. It is used to improve the main
memory utilization.
39) How many types of buffer overflow in the operating
system?

a) Two
b) Six
c) Seven
d) Five

Answer: (a) Two

Explanation: There are two types of buffer-overflows:


heap-based and stack-based.

40) In which allocation method does the user size the


file before creating the file?

a) Contiguous
b) Linked
c) Indexed
d) None of the these

Answer: (a) Contiguous

Explanation: In the contiguous allocation method, the


user has to give the size of the file before creating the
file so that the operating system can give contiguous
blocks in the disk-based on the size of that file.

41) Which of the following algorithms is used to avoid


deadlock?

a) Dynamic Programming algorithm


b) Primality algorithms
c) Banker's algorithm
d) Deadlock algorithm

Answer: (c) Banker's algorithm


Explanation: Banker's algorithm is a deadlock
avoidance and resource allocation algorithm. This
algorithm was developed by Edger Dijkstra. It is also
called a detection algorithm.

42) Which of the following component does not belong


to PCB (Process Control Block)?
a) CPU registers
b) CPU scheduling information
c) Operating System information
d) Accounting information

Answer: (c) Operating System information

Explanation: The operating system information is not


the component of the PCB, so PCB belongs to
Accounting Information

43) Which of the following scheduling reduces process


flow time?

a) FCFS
b) LIFO
c) SJF
d) All of the these

Answer: (b) SJF

Explanation: Shortest job first scheduling is non-pre-


emptive scheduling. In this scheduling algorithm, the
process which takes the least time to complete
executes that process first.
44)Which of the following is not a type of directory
structure?

a) Acyclic-graph directory structure


b) Single-level directory structure
c) Tree directory structure
d) Stack directory structure

Answer: (d) Stack directory structure

Explanation: Acyclic-graph, Single-level, and Tree


directory structures are a type of directory structure in
the operating system. But the stack is a linear data
structure, so option (d) is correct answer.

45) Which of the following backup methods is quickest


and requires the least amount of backup space?

a) Complete backups
b) Incremental
c) Differential
d) None of the these

Answer: (b) Incremental

Explanation: Incremental backups take less time and


space than differential and complete backups.

46)Which of the following programs is loaded first when


starting a computer?

a) Window desktop
b) Network connection program
c) Operating system
d) CMD

Answer: (c) Operating system

Explanation: When the computer is powered on, the


first operating system program is loaded into the
computer. The OS's job is to control the computer's
hardware and help other computer programs work.

47) What is the paging in the operating system?

a) Memory management scheme


b) Network management scheme
c) Internet management scheme
d) None of the these

Answer: (a) Memory management scheme

Explanation: In the operating system, paging is a


memory management scheme (MMS) in which memory
is divided into pages of fixed size.

48)The operating system work between

a) User and Computer


b) Network and User
c) One user to another user
d) All of the these

Answer: (a) User and Computer

Explanation: The OS is software that acts as an


interface between a device and users and is also known
as system software.

49)Which method is the best among file allocation


methods?
a) Linked
b) Contiguous
c) Indexed
d) None of the these

Answer: (c) Indexed

Explanation: The indexed allocation method is the


best file allocation method because it removes the
problem of contiguous and linked allocation.

50) Which of the following operating system does not


require a command to run?

a) Kali Linux
b) Windows
c) Unix
d) All of the these

Answer: (b) Windows

Explanation: Windows is a GUI operating system. This


operating system does not require a command to run.
Only one mouse is required to run this operating
system.

51) In which directory the local user profile settings are


stored by default in windows 11?

a) C: \ USERS
b) C: \ NETLOGON
c) C: \ WIN NTUSER.DAT
d) C: \ Documents and settings

Answer: (a) C: \ USERS

Explanation: When a user logs in with an account for


the first time, Windows 11 automatically creates a
user's profile in the "C:\Users”

52)What type of memory stores data in a swap file on


a hard drive?

a) Secondary memory
b) Virtual memory
c) Low memory
d) RAM

Answer: (b) Virtual memory

Explanation: A swap file is a type of file that stores


the data retrieved from Read-Only-Memory (RAM) or
main memory. It is also a virtual memory because it is
not stored in physical RAM.

53)Which of the following operating system runs on the


server?

a) Batch OS
b) Distributed OS
c) Real-time OS
d) Network OS

Answer: (d) Network OS


Explanation: The network operating system runs on a
server. This operating system has some functions that
work to connect local area networks and computers.

54) Which of the following scheduling algorithms is pre-


emptive scheduling?

a) FCFS Scheduling
b) SJF Scheduling
c) Network Scheduling
d) SRTF Scheduling

Answer: (d) SRTF Scheduling

Explanation: Shortest Remaining Time First (SRTF)


scheduling is pre-emptive scheduling. In this
scheduling, the process that has the shortest
processing time left is executed first

55) Which of the following keys does the user use to


switch between applications running simultaneously in
the Windows operating system?

a) FN + TAB
b) ALT + TAB
c) CTRL + TAB
d) SHIFT + TAB

Answer: (b) ALT + TAB

Explanation: The user uses the Alt + Tab button to


switch from one window to another in the Windows
operating system. Also, the user can use the Ctrl + Tab
button to switch from tab to tab in internet explorer.
56)Which of the following file systems is supported by
the windows OS?

a) NTFS
b) FAT32
c) exFAT
d) All of the these

Answer: (d) All of the these

Explanation: The following are the types of file


systems that support the Windows operating system,
such as NTFS, FAT, exFAT, HFS Plus, and EXT.

57)Which of the following options is correct about the


windows operating system?

a) Windows is a CUI operating system.


b) Windows is based on CUI.
c) Windows is a GUI operating system.
d) None of the these

Answer: (c) Windows is a GUI operating system.

Explanation: Windows is a GUI operating system.


Windows OS does not require a command to run. Only
one mouse is required to run the windows operating
system.

58) Which conditions must be satisfied to solve a


critical section problem?

a) Bounded Waiting
b) Progress
c) Mutual Exclusion
d) All of these.

Answer: (d) All of the these


Explanation: A critical-section is a code segment that
can be accessed by a signal mechanism at a given
point of time. The segment consists of shared data
services that are need to be used by other systems.
The critical section problem must satisfy the three
conditions: Mutual Exclusion, Bounded Waiting, and
Progress.

59) What type of scheduling is round-robin scheduling?

a) Linear data scheduling


b) Non-linear data scheduling
c) Pre-emptive scheduling
d) Non-pre-emptive scheduling

Answer: (c) Pre-emptive scheduling

Explanation: Round-robin scheduling is a pre-emptive


scheduling algorithm in which a specific time is
provided to execute each process. This specific time is
called time-slice.

60) What is the use of directory structure in the


operating system?

a) The directory structure is used to solve the problem


of the network connection in OS.
b) It is used to store folders and files hierarchically.
c) It is used to store the program in file format.
d) All of the these

Answer: (b) It is used to store folders and files


hierarchically.
Explanation: In the OS, a directory structure is a
container that is used to store folders and files in a
hierarchical manner.

61)What is the most used computer operating system?

a) Linux
b) Windows
c) Chrome os
d) Android

Answer: b) Windows

Explanation: as windows seems to be the only


operating system on which most applications are built
and are built for. Windows has been one of the most
used operating systems as it has evolved completely
from its earlier versions that were released decades
ago.

62) What does an operating system do?

a) An interface that regulates hardware and software


programs
b) A hardware device
c) A program that operates the hardware devices
d) All of the above

Answer: a) an interface that regulates hardware and


software programs.

Explanation: The operating system seems to be a


software program that links all the hardware and
software devices to produce an interface that will help
in managing all the devices in a proper manner.
63)What is the full form of BIOS?

a) Between input-output system


b) Binary input-output system
c) Basic input/output system
d) All of the above

Answer: c) Basic input/output system.

Explanation: The bios seem to be referred to as basic


input and output system as it is used to start startup
procedures that are important for an operating system
to run properly.

64) What does FAT mean?

a) File format attribute


b) Font allocation tree
c) File allocation table
d) Font attribute table

Answer: c) File allocation table.

Explanation: The file allocation table, which is full of


FAT, is a file system that seems to be maintained on
the hard drive that has clusters of all the files located
on it.

65)Who needs a BIOS to function properly?

a) A mobile device
b) An operating system
c) Hardware devices
d) All of the above
Answer: b) an operating system.

Explanation: The operating system has a requirement


of BIOS that handles all the basic input and output as
the bios helps in starting important hardware processes
before the operating system boots up properly. BIOS
are intrinsic to the functioning of the complete OS as
they help in maintaining a proper link between the
hardware and software.

66) What does restarting an operating system do?

a) Restarts all the processes


b) Shuts down the operating system completely
c) Terminates all running programs completely
d) All of the above

Answer. a) restarts all the processes.

Explanation: When the restart button is hit on an


operating system, the operating system receives a
command to restart all the processes completely by
restarting the whole operating system. When the
computer is restarted, all the processes running within
the system are terminated effectively so that the
operating system can reboot.

67) Where are the errors and bugs recorded?

a) notepad
b) New program
c) Running process
d) Logfile

Answer. d) Logfile.
Explanation: The operating system will always record
the generated bugs or errors on a log file when an
operating system finds any kinds of errors. The log file
acts as a record for all the errors caused consciously or
unconsciously by the user or the operating system.
These log files can later be used to fix unknown bugs
and errors by the developers.

68) Which one of the following isn’t considered a real-


time operating system?

a) PSOS
b) linuxRT
c) VRTX
d) Windows

Answer. d) Windows.

Explanation: The window operating system isn’t


considered a real-time operating system as it can
remain unresponsive completely from durations which
isn’t a property that real-time operating systems have.
All other three Operating systems mentioned can
operate in real time without pausing and are hence
used in major technical scenarios that need constant
computing power on a daily basis.

69) What is FIFO scheduling?

a) First input-output scheduling


b) First in first out scheduling
c) Free input free output
d) All of the above

Answer. b) First in first out scheduling.


Explanation: First in first out scheduling seems to be a
type of algorithm used to group processes in queues
and order them in a way that the first process that
comes in is the first one that gets processed and is
outputted immediately for the other process to run.

70) The ...... program compresses large files into a


smaller file.

a) WinZip
b) Win Shrink
c) Win Style
d) None of above

Answer: a) WinZip

Explanation: WinZip is a Windows program that lets


you archive and compress files so that you can store or
distribute them more efficiently.

71) The part of machine level instruction, which tells


the central processor what has to be done, is
a) Operation code
b) Address
c) Locator
d) Flip-Flop

Answer: a) Operation code

Explanation: The operation code component of


machine-level instruction instructs the central
processor on what has to be done. The processor reads
machine instructions from the main memory one by
one and conducts one machine operation for each
machine instruction. Hence the correct answer is
Operation code.

72) Which component of an operating system is


responsible for managing files?
a) File System Manager

b) Memory Manager

c) Process Manager

d) Device Driver

Answer: File System Manager

Explanation: The File System Manager is a component


of an operating system that manages files and
directories in the storage. It provides mechanisms for
storage, retrieval, naming, sharing, and protection of
files.

73) An operating system's primary function includes


which of the following?

a) Providing user interface

b) Managing hardware resources

c) Running applications

d) All of the above

Answer: All of the above


Explanation: An operating system's primary functions
include providing a user interface, managing hardware
resources, and running applications, making it the
fundamental software that allows a computer to
operate efficiently.

74) The kernel of an operating system is:

a) The user interface

b) The part that manages hardware interactions

c) An application software

d) A type of virus

Answer: The part that manages hardware


interactions

Explanation: The kernel is the core part of an


operating system that manages hardware interactions,
including memory, CPU time, disk space, and peripheral
devices.

75)A process is:

a) An instance of a program in execution

b) A set of instructions stored on disk

c) The same as a thread

d) A type of computer virus

Answer: An instance of a program in execution


Explanation: A process is an instance of a computer
program that is being executed. It contains the
program code and its current activity. Depending on
the operating system (OS), a process may be made up
of multiple threads of execution that execute
instructions concurrently.

76)Size of the memory mainly depends on the size of


the address bus.

a) Main

b) Virtual

c) Secondary

d) Cache

Answer: a) Main

Explanation: The size of the main memory depends


on the size of the address bus of the CPU. The main
memory mainly consists of RAM and ROM, where RAM
contains the current data and programs and ROM
contains permanent programs like BIOS

77)What kind of language can computer understand?


a) Normal language
b) Computer language
c) Assembly language
d) High-level language

Answer: (a) Assembly language

An assembly language is a scripting


Explanation:
language capable of telling the computer explicitly
what to do.
78) Which utility is useful in identifying a program that is
hogging the processor?

a) Task Manager
b) Device Manager
c) Action Centre
d) System Information

Answer: a) Task Manager

Task Manager will very quickly identify a


Explanation:
program that is hogging the processor.
79)Which Windows utility uses points in time that enable
you to return your system to a previous date and state?

a) System Configuration utility


b) Snapshot Manager
c) System Restore
d) GRUB or LILO

Answer: c) System Restore

System Restore uses restore points—


Explanation:
snapshots of a system at a given point of time—a quick
and handy way to return your system to a previous
state.

80)Your computer has just suffered from a Stop event


(also known as the Blue Screen of Death). You are trying
to decide what has caused the error. What is the most
likely possibility?

a) A multimedia application
b) A background application
c) A network errors
d) A system device driver

Answer: d) A system device driver

Incompatible driver updates, or hardware


Explanation:
problems, like a hard drive that needs formatting or
overheating caused by overclocking your CPU.

81) _____ is a Window utility program that locates and


eliminates unnecessary fragments and rearranges files
and unused disk space to optimize operations.

a) Disk Defragmenter
b) Restore
c) Disk Cleanup
d) Backup
Answer: a) Disk Defragmenter

Disk defragmenter is a Windows utility


Explanation:
program that helps optimize the performance of a
computer by rearranging files and eliminating
unnecessary fragments to free up disk space and
improve file access speed.

82)The input device to be used to get a printed diagram


into a computer, is

a) Touch pad
b) Scanner
c) Mouse
d) Printer
Answer: b) Scanner

The input device to be used to get the


Explanation:
printed diagram into a computer is the scanner.

83) Which part of the computer helps to store


information?

a) Printer
b) Disk drive
c) Keyboard
d) Monitor
Answer: b) Disk drive

Explanation:A hard disk drive or solid-state drive holds


all of the data; files, photos, programs, music, and
movies, that the user wants to keep.

84) The fastest small memory is ___

a) Virtual
b) Cache
c) Associate
d) Main
Answer: b) Cache

Cache memory is the fastest system


Explanation:
memory, required to keep up with the CPU as it fetches
and executes instructions.
85) In _______ view of Windows Explorer, one can see
miniature images of graphics and HTML files and
previews of File contents.

a) tiles
b) filmstrip
c) list
d) thumbnails

Answer: d) thumbnails

Explanation:In the thumbnails view of windows explorer,


one can see miniature images of graphics and HTML
files and previews of file contents.

86)The Windows sound file has the extension


a) .wav
b) .sit
c) .wpd
d) .dif

Answer: a) .wav

Explanation: WAV or Waveform Audio File Format was developed jointly by


Microsoft and IBM as an audio file standard for storing digital audio on a PC.

87)In windows, we go to option in control panel to


uninstall a program from our computer.

a) Default Programs
b) Action Centre
c) Device Manager
d) Programs and Features

Answer: d) Programs and Features


Explanation:

Uninstall from the Control Panel (for programs)

i. In the search box on the taskbar, type Control


Panel and select it from the results.
ii. Select Programs > Programs and Features.
iii. Press and hold (or right-click) on the program
you want to remove and
select Uninstall or Uninstall/Change. Then follow
the directions on the screen.

88) A person is called computer literate if he/she is just


able to

a) Run need-based applications


b) Create anti-virus software
c) Write programs
d) Hack another computer

Answer: a) Run need-based applications

Computer literacy is defined as the


Explanation:
knowledge and ability to use computers and related
technology efficiently, with skill levels ranging from
elementary use to computer programming and
advanced problem-solving.

89)The process of starting an operating system when


the user turns on a computer is known as

a) Starting
b) Loading
c) Booting
d) Turn On
Answer: c) Booting

Explanation: Booting is a startup sequence that starts


the operating system of a computer when it is turned
on

90)A database used by Microsoft Windows for storing


configuration information is known as:

a) Registry
b) Record
c) Cookie
d) Cache

Answer: a) Registry

Explanation: The Windows System Registry is a


system-defined database used by the Windows
operating system to store configuration information.
Most Windows applications write data to the registry
during installation, and system components store and
retrieve configuration data through the registry.

91)The OS X has a

a) monolithic kernel
b) hybrid kernel
c) microkernel
d) monolithic kernel with modules

Answer: b) hybrid kernel

Explanation: A hybrid kernel is a combination of a


monolithic kernel and a microkernel. It incorporates the
strengths of both types of kernels and aims to provide a
balance between performance and modularity.
92) Operating system is the most common type of
________ software.

a) System
b) Application
c) Utility
d) Symbian

Answer: a) System

Explanation: The operating system is the most


common type of System software. System software is a
set of computer programs that are designed to manage
system resources.

93) _________is a computer program that translate and


executes program at run time line by line.
a) Compiler

b) Assembler

c) Language converter

d) interpreter

Answer: d) Interpreter

Explanation: An interpreter is a program that reads a


high-level program and does what it says. In effect, it
translates the program line-by-line, alternately reading
lines and carrying out commands

94)Where does the minimized application reside in


windows?

a) Taskbar
b) My computer
c) My Document
d) Recent documents

Answer: a) Taskbar

Explanation: When the program is minimized in


Windows, that program goes to the taskbar at the
bottom of the desktop. The minimized program is
hidden from the display, but it can be maximized again
by clicking on that application from the taskbar.

95) To recover from failures in the network operations


__ information may be maintained.
a) operating system
b) IP address
c) stateless
d) state

Answer: d) state

Explanation:
96)A small figure which depicts some application on the
screen is called

a. Menu

b. Photo

c. Modem

d. Icon

Answer: d) Icon

Explanation: Icons are small pictures which shows on the


desktop in computer screen.

97) With a shared file


a) actual file exists

b) there are two copies of the file

c) the changes made by one person are not reflected to


the other

d) the changes made by one person are reflected to the


other

Answer: d) the changes made by one person are


reflected to the other

Explanation: Yes, that's the essence of collaborative


editing or real-time collaboration. Shared files, often
hosted on platforms like Google Drive, Microsoft
OneDrive, or collaborative editing tools like Google
Docs or Microsoft Office Online, allow multiple users to
simultaneously edit a document, spreadsheet,
presentation, etc. When one person makes changes,
those changes are instantly reflected for all other users
who have access to the file. This facilitates teamwork
and makes it easier for multiple people to work on the
same document without the need for constant version
control or manual merging of changes.

98) The main memory of a computer system is?

a) Non-Volatile

b) Volatile

c)Restricted

d)Unrestricted

Answer: b) Volatile

Explanation: RAM is volatile memory used to hold


instructions and data of currently running programs.
99) What are modern computers based on?

a) Microchip

b) Microprocessor

c) I\O Devices

d) Both a and b

Answer: d) Both a and b

Explanation: Modern computers are based on both


microchips and microprocessors.

100) Which of the following is a single-user operating


system?

a) Windows

b) DOS

c)MAC

d)None

Answer: b) DOS

Explanation: The correct answer is MS-DOS. A Single-


User Single-Tasking Operating System is an operating
system that allows a single user to complete only one
task at a time.

You might also like