Chapter 6: Operating Systems Fundamentals (Set-5)

When a running process makes a system call, what controlled transition usually occurs in CPU privilege level

A Kernel to user
B Disk to RAM
C User to kernel
D Cache to disk

Which CPU protection feature ensures user programs cannot directly execute privileged hardware instructions

A Single task mode
B Dual mode operation
C Fast boot mode
D Safe mode boot

In a paged memory system, what does the MMU primarily use to translate virtual addresses

A Page tables
B Boot records
C File indexes
D Screen buffers

If the TLB does not contain a needed translation, what event occurs first before checking full page tables

A Page fault
B Disk crash
C TLB miss
D Kernel panic

In virtual memory, what is the best description of a “working set” for a process

A Total disk capacity
B CPU cache size
C Full program size
D Actively used pages

Why does thrashing severely reduce system performance in a multiprogramming environment

A Excessive paging activity
B More CPU registers
C Larger disk sectors
D Faster GUI rendering

In a preemptive OS, which event can force a running process to stop before it finishes its CPU burst

A Disk formatting
B File copying
C Timer interrupt
D GUI resizing

Which scheduling method may cause starvation if priorities are fixed and no aging is applied

A Priority scheduling
B Round robin
C FCFS scheduling
D Shortest job

In CPU scheduling, what is the main goal of the “shortest remaining time” strategy

A Maximize disk space
B Reduce boot time
C Increase screen clarity
D Minimize average waiting

Which OS mechanism prevents two threads from entering a critical section at the same time

A Disk defragment
B File compression
C Mutual exclusion
D Window snapping

A deadlock requires several conditions; which is one essential condition that must be present

A Circular wait
B High disk speed
C Fast boot mode
D GUI acceleration

Which method avoids deadlock by ensuring a safe resource allocation state before granting requests

A FIFO paging
B Disk caching
C Fast startup
D Banker’s algorithm

In memory protection, what does a base register and limit register pair mainly enforce

A Faster disk writing
B Valid address range
C More CPU cores
D Stronger Wi-Fi signal

In segmentation, what is a key difference compared to paging

A Fixed-sized blocks
B No address translation
C Variable-sized blocks
D No memory protection

Which file system concept is most directly improved by journaling after sudden power loss

A Metadata consistency
B Screen refresh rate
C CPU clock speed
D Keyboard response

In Unix-like systems, which permission combination generally allows listing filenames inside a directory

A Write only
B Execute only
C Read with execute
D Read only

Which principle reduces security risk by giving users only the minimum access needed to do their work

A Least privilege
B Full access policy
C Default admin use
D Open permissions

During boot on BIOS-based systems, which structure contains boot code and partition information at disk start

A Page table
B Swap partition
C Event log
D Master Boot Record

In UEFI systems, which feature helps block boot-time malware by allowing only trusted boot loaders

A Disk cleanup
B File indexing
C Secure Boot
D Window snapping

In OS troubleshooting, why is Safe Mode often effective for fixing driver-related boot failures

A Installs new drivers
B Loads minimal drivers
C Formats system disk
D Disables file system

Which tool is best suited to analyze long-term CPU, disk, and memory counters for bottleneck investigation

A Performance Monitor
B Disk Cleanup
C File Explorer
D Paint app

Which OS log source is typically most helpful for diagnosing repeated service crashes on startup

A Desktop shortcuts
B Browser history
C Event Viewer logs
D Clipboard entries

Which Windows feature limits unknown apps from making system-wide changes without user consent

A Screen magnifier
B Disk defragment
C File attributes
D User Account Control

Which OS concept allows a single physical machine to host isolated guest OS environments

A Virtualization
B Defragmentation
C File compression
D Spooling

Why is a Type 1 hypervisor generally preferred for enterprise servers

A Needs host OS
B Only GUI based
C Runs on bare metal
D Works offline only

Which OS tool is most appropriate to manage service startup types like Automatic or Disabled

A Services console
B Disk Management
C Taskbar settings
D Photo viewer

In multiuser systems, what does authentication confirm before granting access

A File size limit
B User identity
C Screen resolution
D CPU frequency

After authentication, what does authorization mainly determine in the OS

A Boot loader type
B Disk sector size
C Monitor brightness
D Allowed permissions

Which access control model assigns permissions based on a user’s job role, like “admin” or “operator”

A Random access model
B Open access model
C Role-based access
D Single-user model

In a CLI, which feature makes repeated administration tasks efficient across many machines

A Scripting automation
B Window snapping
C Icon sorting
D Touch gestures

Which OS concept allows a file to be accessible through a single global namespace across a distributed system

A Local text editor
B GUI theme engine
C Screen reader
D Distributed file system

Which OS approach improves reliability by keeping copies of important data on multiple machines

A Fragmentation
B Time slicing
C Replication
D Polling

In file system design, what does “mount point” specifically represent

A Directory attachment location
B Disk sector type
C CPU scheduling rule
D User account role

Which mechanism helps an OS avoid unnecessary CPU usage by reacting only when devices need attention

A Constant polling
B Interrupt-driven I/O
C Manual scheduling
D Screen buffering

Which concept temporarily stores I/O data in memory to handle speed differences between CPU and devices

A Paging
B Aging
C Booting
D Buffering

Which technique allows a printer to handle jobs one by one while programs continue working

A Spooling
B Paging
C Swapping
D Mirroring

In process synchronization, what is a common problem when two threads update shared data without locking

A Page fault
B Cold boot
C Race condition
D Disk cleanup

Which OS feature helps prevent unauthorized modification of system files by normal users

A File permissions
B Screen icons
C Desktop themes
D Window borders

Which file system behavior most directly helps prevent data loss by writing changes in an ordered, recoverable way

A Icon caching
B Journaling writes
C Theme loading
D Font smoothing

Which OS command-line concept lets a command’s output become input to another command

A GUI shortcut
B Disk mirroring
C Driver rollback
D Piping output

Which OS security approach logs sensitive actions like failed logins and permission changes for investigation

A Disk caching
B Screen scaling
C Audit logging
D File preview

What is the main risk of running daily work using an administrator account on a multiuser system

A Higher malware impact
B Lower disk capacity
C Slower mouse speed
D Less screen brightness

Which memory issue is most associated with segmentation because segments vary in size over time

A Internal fragmentation
B Page faults only
C TLB misses only
D External fragmentation

Which OS strategy reduces external fragmentation by compacting memory contents, but is costly

A Time slicing
B Spooling jobs
C Memory compaction
D Disk journaling

In paging, why does internal fragmentation occur even when external fragmentation is avoided

A Unused page space
B Disk sector gaps
C CPU cache misses
D Screen pixel waste

Which boot concept loads only essential OS components to recover from serious system issues

A Normal boot mode
B Recovery environment
C Fast startup mode
D Gaming mode

Which OS tool is used to schedule maintenance tasks like weekly backups without user interaction

A Task Scheduler
B Device Manager
C Disk Cleanup
D Control Panel

Which OS practice best reduces downtime by testing patches before deploying them widely

A Random patching
B Immediate forced patch
C Disable all updates
D Staged patch rollout

Which OS-level concept ensures that a program’s crash does not normally crash the entire system

A Disk defragment
B Screen snapping
C Process isolation
D Icon caching

Which OS feature allows switching between user and kernel space safely using controlled entry points

A System call mechanism
B Desktop shortcut
C Screen magnifier
D File explorer

Leave a Reply

Your email address will not be published. Required fields are marked *