Operating System MCQ
1) Which of the following is not an operating system?
a) Windows
b) Linux
c) Oracle
d) DOS
Answer: (c) Oracle
Explanation: Oracle is an RDBMS (Relational Database
Management System). It is known as Oracle Database,
Oracle DB, or Oracle Only. The first database for
enterprise grid computing is the Oracle database.
2) What is the maximum length of the filename in DOS?
a) 4
b) 5
c) 8
d) 12
Answer: (c) 8
Explanation: The maximum length of the filename is 8
characters in the DOS operating system.
3) When was the first operating system developed?
a) 1948
b) 1949
c) 1950
d) 1951
Answer: (c) 1950
Explanation: The first operating system was
developed in the early 1950's. It was also called a
single-stream batch processing system because it
presented data in groups.
4) When were MS windows operating systems
proposed?
a) 1994
b) 1990
c) 1992
d) 1985
Answer: (d) 1985
Explanation: The first MS Windows operating system
was introduced in early 1985.
5) Which of the following is the extension of Notepad?
a) .txt
b) .xls
c) .ppt
d) .bmp
Explanation: The .txt file extension is a standard text
document extension that contains the unformatted
text. It is the default file extension for the notepad.
6) What else is a command interpreter called?
a) prompt
b) kernel
c) shell
d) command
Answer: (c) shell
Explanation: The command interpreter is also called
the shell.
7) What is the full name of FAT?
a) File attribute table
b) File allocation table
c) Font attribute table
d) Format allocation table
Answer: (b) File allocation table.
Explanation: The FAT stands for File allocation table.
The FAT is a file system architecture. It is used in
computer systems and memory cards. A FAT of the
contents of a computer disk indicates which field is
used for which file.
8) BIOS is used?
a) By operating system
b) By compiler
c) By interpreter
d) By application software
Answer: (a) By operating system
Explanation: BIOS is used by the operating system. It
is used to configure and identify the hardware in a
system such as the hard drive, floppy drive, optical
drive, CPU, and memory.
9) What is the mean of the Booting in the operating
system?
a) Restarting computer
b) Install the program
c) To scan
d) To turn off
Answer: (a) Restarting computer
Explanation: Booting is a process of the restart the
computer. After restarting it, there is no software in the
computer's main memory.
10) When does page fault occur?
a) The page is present in memory.
b) The deadlock occurs.
c) The page does not present in memory.
d) The buffering occurs
Answer: (c) The page does not present in memory.
Explanation: Page faults occur when a process tries to
access a block page of the memory and that page is
not stored in RAM (Read only memory) or memory.
11) Banker's algorithm is used?
a. To prevent deadlock
b. To deadlock recovery
c. To solve the deadlock
d. None of these
Answer: (a) To prevent deadlock
Explanation: Banker's algorithm is used to prevent the
deadlock condition. The banker algorithm is sometimes
called the detection algorithm. It is named the banker
algorithm because it is used to determine whether a
loan can be granted in the banking system or not.
12) When you delete a file in your computer, where
does it go?
a) Recycle bin
b) Hard disk
c) Taskbar
d) None of these
Answer: (a) Recycle bin
Explanation: When you delete a file on your computer
device, it is transferred to your computer system's
recycle bin or trash.
13) Which is the Linux operating system?
a) Private operating system
b) Windows operating system
c) Open-source operating system
d) None of these
Answer: (c) Open-source operating system
Explanation: The Linux operating system is an open-
source operating system made up of a kernel. It is a
very safe operating system.
14) What is the full name of the DSM?
a) Direct system module
b) Direct system memory
c) Demoralized system memory
d) Distributed shared memory
Answer: (d) Distributed shared memory
Explanation: The DSM stands for Distributed Shared
Memory
15) What is the full name of the IDL?
a) Interface definition language
b) Interface direct language
c) Interface data library
d) None of these
Answer: (a) Interface definition language
Explanation: The IDL stands for Interface Definition
Language. It is used to establish communications
between clients and servers in RPC (Remote Procedure
Call).
16) What is bootstrapping called?
a) Cold boot
b) Cold hot boot
c) Cold hot strap
d) Hot boot
Answer: (a) Cold boot
Explanation: Bootstrapping is also known as the cool
boot.
17) What is the fence register used for?
a) To disk protection
b) To CPU protection
c) To memory protection
d) None of these
Answer: (c) To memory protection
Explanation: The fence register is used for memory
protection on the computer. It is a way to access the
memory in the computer.
18) If the page size increases, the internal
fragmentation is also??
a) Decreases
b) Increases
c) Remains constant
d) None of these
Answer: (b) Increases
Explanation: None
19) The size of virtual memory is based on which of the
following?
a) CPU
b) RAM
c) Address bus
d) Data bus
Answer: (c) Address bus
Explanation: The size of virtual memory is based on
the address bus.
20) Which of the following is not application software?
a) Windows 11
b) WordPad
c) Photoshop
d) MS-excel
Answer: (a) Windows 11
Explanation: Windows 11 is not an application
software because it is an operating system.
21) Which of the following operating systems does not
support more than one program at a time?
a) Linux
b) Windows
c) MAC
d) DOS
Answer: (d) DOS
Explanation: DOS stands for Disk operating system.
Disk operating system is a single-user operating system
that does not support more than one program at a
time.
22) Which of the following is a condition that causes
deadlock?
a) Mutual exclusion
b) Hold and wait
c) Circular wait
d) No pre-emption
e) All of these
Answer: (e) All of these
Explanation: None
23) Who provides the interface to access the services
of the operating system?
a) API
b) System call
c) Library
d) Assembly instruction
Answer: (b) System call
Explanation: The system call provides an interface for
user programs to access the services of the operating
system through the API (Application Program Interface).
24) Where are placed the list of processes that are
prepared to be executed and waiting?
a) Job queue
b) Ready queue
c) Execution queue
d) Process queue
Answer: (b) Ready queue
Explanation: The ready queue is a set of all the
processes that processes are ready to execute and
wait.
25) Which of the following does not interrupt the
running process?
a) Timer interrupt
b) Device
c) Power failure
d) Scheduler process
Answer: (b) Scheduler process
Explanation: Scheduler process does not interrupt in
any running process. Its job is to select the processes
for long-term, short-term, and short-term scheduler.
26) What is Microsoft window?
a) Operating system
b) Graphics program
c) Word Processing
d) Database program
Answer: (a) Operating system
Explanation: Microsoft Windows is an operating
system that was developed by Microsoft company. The
Microsoft Windows is available in 32-bits and 64-bits in
the market.
27) Which program runs first after booting the
computer and loading the GUI?
a) Desktop Manager
b) File Manager
c) Windows Explorer
d) Authentication
Answer: (d) Authentication
Explanation: The authentication program is run first
after booting the computer and loading the GUI.
Authentication is a process of verifying the person or
device. For example, when you log in to Facebook, you
enter a username and password.
28) Which of the following operating systems require a
command to run?
a) Kali Linux
b) Windows
c) Mac OS
d) Single-user operating system
Answer: (a) Kali Linux
Explanation: Kali Linux is a fast operating system as
more work is done through the command line in it. This
OS is a Debian-based Linux OS.
29) Who is responsible for keeping the process from the
program?
a) Operating system
b) CPU
c) Monitor
d) All of the these
Answer: (a) Operating system
Explanation: A process is created from a program by
the operating system. The OS is software that acts as
an interface between a device and users and is also
known as system software.
30) COW stands for __________
a) Compress of write memory
b) Copy overwrites
c) Compress overwrites
d) Computer of world
Answer: (b) Copy overwrite
Explanation: COW stands for Copy-Overwrite. Initially,
it allows both the parent and child systems to share the
same page.
31) Which of the following statements is correct about
virtual memory?
a) It is a combination of the logical-memory and
physical-memory
b) It is a separation of user logical memory and
physical memory
c) It is a virtual network memory
d) None of the these
Answer: (b) It is a separation of user logical memory
and physical memory
Explanation: Virtual memory is used to separate the
user's logical memory and actual physical memory.
Therefore, option (b) is the correct answer.
32) Which of the following mechanisms is a locking
mechanism?
a) Semaphore
b) PCB
c) Mutex
d) Binary Semaphore
Answer: (c) Mutex
Explanation: The mutex is a locking mechanism that
ensures that only one thread can occupy the mutex at
a time and enter the critical section.
33) Which of the following method is used to prevent
threads or processes from accessing a single resource?
a) PCB
b) Semaphore
c) Job Scheduler
d) Non-Contiguous Memory Allocation
Answer: (b) Semaphore
Explanation: Semaphore is an integer variable that is
used to prevent threads or processes from accessing a
single resource.
34) The PCB is identified by ___________.
a) Real-Number
b) Binary Number
c) Store block
d) Integer Process ID
Answer: (d) Integer Process ID
Explanation: PCB is a data structure that is used to
store the information of processes. It is identified by an
integer process ID (PID).
34) SSTF stands for ________.
a) Shortest Signal Time First
b) Shortest Seek Time First
c) System Seek Time First
d) System Shortest Time First
Answer: (b) Shortest Seek Time First
Explanation: SSTF stands for Shortest-Seek-Time-First.
In the SSTF algorithm, that request is executed first,
whose seek time is the shortest.
35) Which of the following statement is correct about
fragmentation?
a) It is software that connects the OS.
b) It is part of the software.
c) Loss the memory
d) All of the these
Answer: (c) Loss the memory
Explanation: A fragmentation is a state of a hard disk
in which the most important parts of a single file are
stored at different places in the disk. Due to which
there is a loss of memory, and the working efficiency of
the operating system is also affected.
34) Which of the following binary formats support the
Linux operating system?
a) 0 and 1
b) Binary Number Format
c) ELF Binary Format
d) None of the these
Answer: (c) ELF Binary Format
Explanation: ELF stands for "Executable-and-Linkable-
Format". The ELF format is used for libraries and
executable files in Linux operating systems.
35) What is Kali Linux?
a) Network device
b) Operating system
c) Server name
d) Computer name
Answer: (b) Operating system
Explanation: Kali Linux is an operating system similar
to Windows, Unix, and macOS. Kali operating system
was designed for reverse engineering, security,
computer forensics, etc.
36) Which of the following operating systems supports
only real-time applications?
a) Batch OS
b) Distributed OS
c) Real-time OS
d) Network OS
Answer: (c) Real-time OS
Explanation: The real-time OS supports real-time
applications. This OS is used for industrial and scientific
work. It completes the tasks in a given time.
37) Buffer is a ___________.
a) Permanent area
b) Temporary area
c) Small area
d) Large area
Answer: (b) Temporary area
Explanation: Buffer is a temporary area where data is
stored for some time before being transferred to the
main memory.
38) Which of the following method is used to improve
the main memory utilization?
a) Swapping
b) Operating system
c) Memory stack
d) None of these.
Answer: (a) Swapping
Explanation: Swapping is a technique in which the
process is removed from the main memory and stored
in secondary memory. It is used to improve the main
memory utilization.
39) How many types of buffer overflow in the operating
system?
a) Two
b) Six
c) Seven
d) Five
Answer: (a) Two
Explanation: There are two types of buffer-overflows:
heap-based and stack-based.
40) In which allocation method does the user size the
file before creating the file?
a) Contiguous
b) Linked
c) Indexed
d) None of the these
Answer: (a) Contiguous
Explanation: In the contiguous allocation method, the
user has to give the size of the file before creating the
file so that the operating system can give contiguous
blocks in the disk-based on the size of that file.
41) Which of the following algorithms is used to avoid
deadlock?
a) Dynamic Programming algorithm
b) Primality algorithms
c) Banker's algorithm
d) Deadlock algorithm
Answer: (c) Banker's algorithm
Explanation: Banker's algorithm is a deadlock
avoidance and resource allocation algorithm. This
algorithm was developed by Edger Dijkstra. It is also
called a detection algorithm.
42) Which of the following component does not belong
to PCB (Process Control Block)?
a) CPU registers
b) CPU scheduling information
c) Operating System information
d) Accounting information
Answer: (c) Operating System information
Explanation: The operating system information is not
the component of the PCB, so PCB belongs to
Accounting Information
43) Which of the following scheduling reduces process
flow time?
a) FCFS
b) LIFO
c) SJF
d) All of the these
Answer: (b) SJF
Explanation: Shortest job first scheduling is non-pre-
emptive scheduling. In this scheduling algorithm, the
process which takes the least time to complete
executes that process first.
44)Which of the following is not a type of directory
structure?
a) Acyclic-graph directory structure
b) Single-level directory structure
c) Tree directory structure
d) Stack directory structure
Answer: (d) Stack directory structure
Explanation: Acyclic-graph, Single-level, and Tree
directory structures are a type of directory structure in
the operating system. But the stack is a linear data
structure, so option (d) is correct answer.
45) Which of the following backup methods is quickest
and requires the least amount of backup space?
a) Complete backups
b) Incremental
c) Differential
d) None of the these
Answer: (b) Incremental
Explanation: Incremental backups take less time and
space than differential and complete backups.
46)Which of the following programs is loaded first when
starting a computer?
a) Window desktop
b) Network connection program
c) Operating system
d) CMD
Answer: (c) Operating system
Explanation: When the computer is powered on, the
first operating system program is loaded into the
computer. The OS's job is to control the computer's
hardware and help other computer programs work.
47) What is the paging in the operating system?
a) Memory management scheme
b) Network management scheme
c) Internet management scheme
d) None of the these
Answer: (a) Memory management scheme
Explanation: In the operating system, paging is a
memory management scheme (MMS) in which memory
is divided into pages of fixed size.
48)The operating system work between
a) User and Computer
b) Network and User
c) One user to another user
d) All of the these
Answer: (a) User and Computer
Explanation: The OS is software that acts as an
interface between a device and users and is also known
as system software.
49)Which method is the best among file allocation
methods?
a) Linked
b) Contiguous
c) Indexed
d) None of the these
Answer: (c) Indexed
Explanation: The indexed allocation method is the
best file allocation method because it removes the
problem of contiguous and linked allocation.
50) Which of the following operating system does not
require a command to run?
a) Kali Linux
b) Windows
c) Unix
d) All of the these
Answer: (b) Windows
Explanation: Windows is a GUI operating system. This
operating system does not require a command to run.
Only one mouse is required to run this operating
system.
51) In which directory the local user profile settings are
stored by default in windows 11?
a) C: \ USERS
b) C: \ NETLOGON
c) C: \ WIN NTUSER.DAT
d) C: \ Documents and settings
Answer: (a) C: \ USERS
Explanation: When a user logs in with an account for
the first time, Windows 11 automatically creates a
user's profile in the "C:\Users”
52)What type of memory stores data in a swap file on
a hard drive?
a) Secondary memory
b) Virtual memory
c) Low memory
d) RAM
Answer: (b) Virtual memory
Explanation: A swap file is a type of file that stores
the data retrieved from Read-Only-Memory (RAM) or
main memory. It is also a virtual memory because it is
not stored in physical RAM.
53)Which of the following operating system runs on the
server?
a) Batch OS
b) Distributed OS
c) Real-time OS
d) Network OS
Answer: (d) Network OS
Explanation: The network operating system runs on a
server. This operating system has some functions that
work to connect local area networks and computers.
54) Which of the following scheduling algorithms is pre-
emptive scheduling?
a) FCFS Scheduling
b) SJF Scheduling
c) Network Scheduling
d) SRTF Scheduling
Answer: (d) SRTF Scheduling
Explanation: Shortest Remaining Time First (SRTF)
scheduling is pre-emptive scheduling. In this
scheduling, the process that has the shortest
processing time left is executed first
55) Which of the following keys does the user use to
switch between applications running simultaneously in
the Windows operating system?
a) FN + TAB
b) ALT + TAB
c) CTRL + TAB
d) SHIFT + TAB
Answer: (b) ALT + TAB
Explanation: The user uses the Alt + Tab button to
switch from one window to another in the Windows
operating system. Also, the user can use the Ctrl + Tab
button to switch from tab to tab in internet explorer.
56)Which of the following file systems is supported by
the windows OS?
a) NTFS
b) FAT32
c) exFAT
d) All of the these
Answer: (d) All of the these
Explanation: The following are the types of file
systems that support the Windows operating system,
such as NTFS, FAT, exFAT, HFS Plus, and EXT.
57)Which of the following options is correct about the
windows operating system?
a) Windows is a CUI operating system.
b) Windows is based on CUI.
c) Windows is a GUI operating system.
d) None of the these
Answer: (c) Windows is a GUI operating system.
Explanation: Windows is a GUI operating system.
Windows OS does not require a command to run. Only
one mouse is required to run the windows operating
system.
58) Which conditions must be satisfied to solve a
critical section problem?
a) Bounded Waiting
b) Progress
c) Mutual Exclusion
d) All of these.
Answer: (d) All of the these
Explanation: A critical-section is a code segment that
can be accessed by a signal mechanism at a given
point of time. The segment consists of shared data
services that are need to be used by other systems.
The critical section problem must satisfy the three
conditions: Mutual Exclusion, Bounded Waiting, and
Progress.
59) What type of scheduling is round-robin scheduling?
a) Linear data scheduling
b) Non-linear data scheduling
c) Pre-emptive scheduling
d) Non-pre-emptive scheduling
Answer: (c) Pre-emptive scheduling
Explanation: Round-robin scheduling is a pre-emptive
scheduling algorithm in which a specific time is
provided to execute each process. This specific time is
called time-slice.
60) What is the use of directory structure in the
operating system?
a) The directory structure is used to solve the problem
of the network connection in OS.
b) It is used to store folders and files hierarchically.
c) It is used to store the program in file format.
d) All of the these
Answer: (b) It is used to store folders and files
hierarchically.
Explanation: In the OS, a directory structure is a
container that is used to store folders and files in a
hierarchical manner.
61)What is the most used computer operating system?
a) Linux
b) Windows
c) Chrome os
d) Android
Answer: b) Windows
Explanation: as windows seems to be the only
operating system on which most applications are built
and are built for. Windows has been one of the most
used operating systems as it has evolved completely
from its earlier versions that were released decades
ago.
62) What does an operating system do?
a) An interface that regulates hardware and software
programs
b) A hardware device
c) A program that operates the hardware devices
d) All of the above
Answer: a) an interface that regulates hardware and
software programs.
Explanation: The operating system seems to be a
software program that links all the hardware and
software devices to produce an interface that will help
in managing all the devices in a proper manner.
63)What is the full form of BIOS?
a) Between input-output system
b) Binary input-output system
c) Basic input/output system
d) All of the above
Answer: c) Basic input/output system.
Explanation: The bios seem to be referred to as basic
input and output system as it is used to start startup
procedures that are important for an operating system
to run properly.
64) What does FAT mean?
a) File format attribute
b) Font allocation tree
c) File allocation table
d) Font attribute table
Answer: c) File allocation table.
Explanation: The file allocation table, which is full of
FAT, is a file system that seems to be maintained on
the hard drive that has clusters of all the files located
on it.
65)Who needs a BIOS to function properly?
a) A mobile device
b) An operating system
c) Hardware devices
d) All of the above
Answer: b) an operating system.
Explanation: The operating system has a requirement
of BIOS that handles all the basic input and output as
the bios helps in starting important hardware processes
before the operating system boots up properly. BIOS
are intrinsic to the functioning of the complete OS as
they help in maintaining a proper link between the
hardware and software.
66) What does restarting an operating system do?
a) Restarts all the processes
b) Shuts down the operating system completely
c) Terminates all running programs completely
d) All of the above
Answer. a) restarts all the processes.
Explanation: When the restart button is hit on an
operating system, the operating system receives a
command to restart all the processes completely by
restarting the whole operating system. When the
computer is restarted, all the processes running within
the system are terminated effectively so that the
operating system can reboot.
67) Where are the errors and bugs recorded?
a) notepad
b) New program
c) Running process
d) Logfile
Answer. d) Logfile.
Explanation: The operating system will always record
the generated bugs or errors on a log file when an
operating system finds any kinds of errors. The log file
acts as a record for all the errors caused consciously or
unconsciously by the user or the operating system.
These log files can later be used to fix unknown bugs
and errors by the developers.
68) Which one of the following isn’t considered a real-
time operating system?
a) PSOS
b) linuxRT
c) VRTX
d) Windows
Answer. d) Windows.
Explanation: The window operating system isn’t
considered a real-time operating system as it can
remain unresponsive completely from durations which
isn’t a property that real-time operating systems have.
All other three Operating systems mentioned can
operate in real time without pausing and are hence
used in major technical scenarios that need constant
computing power on a daily basis.
69) What is FIFO scheduling?
a) First input-output scheduling
b) First in first out scheduling
c) Free input free output
d) All of the above
Answer. b) First in first out scheduling.
Explanation: First in first out scheduling seems to be a
type of algorithm used to group processes in queues
and order them in a way that the first process that
comes in is the first one that gets processed and is
outputted immediately for the other process to run.
70) The ...... program compresses large files into a
smaller file.
a) WinZip
b) Win Shrink
c) Win Style
d) None of above
Answer: a) WinZip
Explanation: WinZip is a Windows program that lets
you archive and compress files so that you can store or
distribute them more efficiently.
71) The part of machine level instruction, which tells
the central processor what has to be done, is
a) Operation code
b) Address
c) Locator
d) Flip-Flop
Answer: a) Operation code
Explanation: The operation code component of
machine-level instruction instructs the central
processor on what has to be done. The processor reads
machine instructions from the main memory one by
one and conducts one machine operation for each
machine instruction. Hence the correct answer is
Operation code.
72) Which component of an operating system is
responsible for managing files?
a) File System Manager
b) Memory Manager
c) Process Manager
d) Device Driver
Answer: File System Manager
Explanation: The File System Manager is a component
of an operating system that manages files and
directories in the storage. It provides mechanisms for
storage, retrieval, naming, sharing, and protection of
files.
73) An operating system's primary function includes
which of the following?
a) Providing user interface
b) Managing hardware resources
c) Running applications
d) All of the above
Answer: All of the above
Explanation: An operating system's primary functions
include providing a user interface, managing hardware
resources, and running applications, making it the
fundamental software that allows a computer to
operate efficiently.
74) The kernel of an operating system is:
a) The user interface
b) The part that manages hardware interactions
c) An application software
d) A type of virus
Answer: The part that manages hardware
interactions
Explanation: The kernel is the core part of an
operating system that manages hardware interactions,
including memory, CPU time, disk space, and peripheral
devices.
75)A process is:
a) An instance of a program in execution
b) A set of instructions stored on disk
c) The same as a thread
d) A type of computer virus
Answer: An instance of a program in execution
Explanation: A process is an instance of a computer
program that is being executed. It contains the
program code and its current activity. Depending on
the operating system (OS), a process may be made up
of multiple threads of execution that execute
instructions concurrently.
76)Size of the memory mainly depends on the size of
the address bus.
a) Main
b) Virtual
c) Secondary
d) Cache
Answer: a) Main
Explanation: The size of the main memory depends
on the size of the address bus of the CPU. The main
memory mainly consists of RAM and ROM, where RAM
contains the current data and programs and ROM
contains permanent programs like BIOS
77)What kind of language can computer understand?
a) Normal language
b) Computer language
c) Assembly language
d) High-level language
Answer: (a) Assembly language
An assembly language is a scripting
Explanation:
language capable of telling the computer explicitly
what to do.
78) Which utility is useful in identifying a program that is
hogging the processor?
a) Task Manager
b) Device Manager
c) Action Centre
d) System Information
Answer: a) Task Manager
Task Manager will very quickly identify a
Explanation:
program that is hogging the processor.
79)Which Windows utility uses points in time that enable
you to return your system to a previous date and state?
a) System Configuration utility
b) Snapshot Manager
c) System Restore
d) GRUB or LILO
Answer: c) System Restore
System Restore uses restore points—
Explanation:
snapshots of a system at a given point of time—a quick
and handy way to return your system to a previous
state.
80)Your computer has just suffered from a Stop event
(also known as the Blue Screen of Death). You are trying
to decide what has caused the error. What is the most
likely possibility?
a) A multimedia application
b) A background application
c) A network errors
d) A system device driver
Answer: d) A system device driver
Incompatible driver updates, or hardware
Explanation:
problems, like a hard drive that needs formatting or
overheating caused by overclocking your CPU.
81) _____ is a Window utility program that locates and
eliminates unnecessary fragments and rearranges files
and unused disk space to optimize operations.
a) Disk Defragmenter
b) Restore
c) Disk Cleanup
d) Backup
Answer: a) Disk Defragmenter
Disk defragmenter is a Windows utility
Explanation:
program that helps optimize the performance of a
computer by rearranging files and eliminating
unnecessary fragments to free up disk space and
improve file access speed.
82)The input device to be used to get a printed diagram
into a computer, is
a) Touch pad
b) Scanner
c) Mouse
d) Printer
Answer: b) Scanner
The input device to be used to get the
Explanation:
printed diagram into a computer is the scanner.
83) Which part of the computer helps to store
information?
a) Printer
b) Disk drive
c) Keyboard
d) Monitor
Answer: b) Disk drive
Explanation:A hard disk drive or solid-state drive holds
all of the data; files, photos, programs, music, and
movies, that the user wants to keep.
84) The fastest small memory is ___
a) Virtual
b) Cache
c) Associate
d) Main
Answer: b) Cache
Cache memory is the fastest system
Explanation:
memory, required to keep up with the CPU as it fetches
and executes instructions.
85) In _______ view of Windows Explorer, one can see
miniature images of graphics and HTML files and
previews of File contents.
a) tiles
b) filmstrip
c) list
d) thumbnails
Answer: d) thumbnails
Explanation:In the thumbnails view of windows explorer,
one can see miniature images of graphics and HTML
files and previews of file contents.
86)The Windows sound file has the extension
a) .wav
b) .sit
c) .wpd
d) .dif
Answer: a) .wav
Explanation: WAV or Waveform Audio File Format was developed jointly by
Microsoft and IBM as an audio file standard for storing digital audio on a PC.
87)In windows, we go to option in control panel to
uninstall a program from our computer.
a) Default Programs
b) Action Centre
c) Device Manager
d) Programs and Features
Answer: d) Programs and Features
Explanation:
Uninstall from the Control Panel (for programs)
i. In the search box on the taskbar, type Control
Panel and select it from the results.
ii. Select Programs > Programs and Features.
iii. Press and hold (or right-click) on the program
you want to remove and
select Uninstall or Uninstall/Change. Then follow
the directions on the screen.
88) A person is called computer literate if he/she is just
able to
a) Run need-based applications
b) Create anti-virus software
c) Write programs
d) Hack another computer
Answer: a) Run need-based applications
Computer literacy is defined as the
Explanation:
knowledge and ability to use computers and related
technology efficiently, with skill levels ranging from
elementary use to computer programming and
advanced problem-solving.
89)The process of starting an operating system when
the user turns on a computer is known as
a) Starting
b) Loading
c) Booting
d) Turn On
Answer: c) Booting
Explanation: Booting is a startup sequence that starts
the operating system of a computer when it is turned
on
90)A database used by Microsoft Windows for storing
configuration information is known as:
a) Registry
b) Record
c) Cookie
d) Cache
Answer: a) Registry
Explanation: The Windows System Registry is a
system-defined database used by the Windows
operating system to store configuration information.
Most Windows applications write data to the registry
during installation, and system components store and
retrieve configuration data through the registry.
91)The OS X has a
a) monolithic kernel
b) hybrid kernel
c) microkernel
d) monolithic kernel with modules
Answer: b) hybrid kernel
Explanation: A hybrid kernel is a combination of a
monolithic kernel and a microkernel. It incorporates the
strengths of both types of kernels and aims to provide a
balance between performance and modularity.
92) Operating system is the most common type of
________ software.
a) System
b) Application
c) Utility
d) Symbian
Answer: a) System
Explanation: The operating system is the most
common type of System software. System software is a
set of computer programs that are designed to manage
system resources.
93) _________is a computer program that translate and
executes program at run time line by line.
a) Compiler
b) Assembler
c) Language converter
d) interpreter
Answer: d) Interpreter
Explanation: An interpreter is a program that reads a
high-level program and does what it says. In effect, it
translates the program line-by-line, alternately reading
lines and carrying out commands
94)Where does the minimized application reside in
windows?
a) Taskbar
b) My computer
c) My Document
d) Recent documents
Answer: a) Taskbar
Explanation: When the program is minimized in
Windows, that program goes to the taskbar at the
bottom of the desktop. The minimized program is
hidden from the display, but it can be maximized again
by clicking on that application from the taskbar.
95) To recover from failures in the network operations
__ information may be maintained.
a) operating system
b) IP address
c) stateless
d) state
Answer: d) state
Explanation:
96)A small figure which depicts some application on the
screen is called
a. Menu
b. Photo
c. Modem
d. Icon
Answer: d) Icon
Explanation: Icons are small pictures which shows on the
desktop in computer screen.
97) With a shared file
a) actual file exists
b) there are two copies of the file
c) the changes made by one person are not reflected to
the other
d) the changes made by one person are reflected to the
other
Answer: d) the changes made by one person are
reflected to the other
Explanation: Yes, that's the essence of collaborative
editing or real-time collaboration. Shared files, often
hosted on platforms like Google Drive, Microsoft
OneDrive, or collaborative editing tools like Google
Docs or Microsoft Office Online, allow multiple users to
simultaneously edit a document, spreadsheet,
presentation, etc. When one person makes changes,
those changes are instantly reflected for all other users
who have access to the file. This facilitates teamwork
and makes it easier for multiple people to work on the
same document without the need for constant version
control or manual merging of changes.
98) The main memory of a computer system is?
a) Non-Volatile
b) Volatile
c)Restricted
d)Unrestricted
Answer: b) Volatile
Explanation: RAM is volatile memory used to hold
instructions and data of currently running programs.
99) What are modern computers based on?
a) Microchip
b) Microprocessor
c) I\O Devices
d) Both a and b
Answer: d) Both a and b
Explanation: Modern computers are based on both
microchips and microprocessors.
100) Which of the following is a single-user operating
system?
a) Windows
b) DOS
c)MAC
d)None
Answer: b) DOS
Explanation: The correct answer is MS-DOS. A Single-
User Single-Tasking Operating System is an operating
system that allows a single user to complete only one
task at a time.