Which of the following is not a task performed by an operating system ✅ Đã Test
Mẹo về Which of the following is not a task performed by an operating system Chi Tiết
An Sơn Hà đang tìm kiếm từ khóa Which of the following is not a task performed by an operating system được Cập Nhật vào lúc : 2022-10-01 18:50:27 . Với phương châm chia sẻ Bí quyết Hướng dẫn trong nội dung bài viết một cách Chi Tiết 2022. Nếu sau khi Read Post vẫn ko hiểu thì hoàn toàn có thể lại phản hồi ở cuối bài để Mình lý giải và hướng dẫn lại nha.1) Which of the following is not an operating system?
Nội dung chính- Which task is not performed by an operating system?Which of the following is a task performed by an operating system?Which of the following is not an operation operating system?
Answer: (c) Oracle
Explanation: Oracle is an RDBMS (Relational Database Management System). It is known as Oracle Database, Oracle DB, or Oracle Only. The first database for enterprise grid computing is the Oracle database.
2) What is the maximum length of the filename in DOS?
45812Answer: (c) 8
Explanation: The maximum length of the filename is 8 characters in the DOS operating system. It is commonly known as an 8.3 filename.
3) When was the first operating system developed?
1948194919501951Answer: (c) 1950
Explanation: The first operating system was developed in the early 1950's. It was also called a single-stream batch processing system because it presented data in groups.
4) When were MS windows operating systems proposed?
1994199019921985Answer: (d) 1985
Explanation: The first MS Windows operating system was introduced in early 1985.
5) Which of the following is the extension of Notepad?
.txt.xls.ppt.bmpAnswer: (a) .txt
Explanation: The .txt file extension is a standard text document extension that contains the unformatted text. It is the default file extension for the notepad.
6) What else is a command interpreter called?
promptkernelshellcommandAnswer: (c) shell
Explanation: The command interpreter is also called the shell.
7) What is the full name of FAT?
File attribute tableFile allocation tableFont attribute tableFormat allocation tableAnswer: (b) File allocation table.
Explanation: The FAT stands for File allocation table. The FAT is a file system architecture. It is used in computer systems and memory cards. A FAT of the contents of a computer disk indicates which field is used for which file.
8) BIOS is used?
By operating systemBy compilerBy interpreterBy application softwareAnswer: (a) By operating system
Explanation: BIOS is used by the operating system. It is used to configure and identify the hardware in a system such as the hard drive, floppy drive, optical drive, CPU, and memory.
9) What is the mean of the Booting in the operating system?
Restarting computerInstall the programTo scanTo turn offAnswer: (a) Restarting computer
Explanation: Booting is a process of the restart the computer. After restarting it, there is no software in the computer's main memory.
10) When does page fault occur?
The page is present in memory.The deadlock occurs.The page does not present in memory.The buffering occurs.Answer: (c) The page does not present in memory.
Explanation: Page faults occur when a process tries to access a block page of the memory and that page is not stored in RAM (Read only memory) or memory.
11) Banker's algorithm is used?
To prevent deadlockTo deadlock recoveryTo solve the deadlock None of theseAnswer: (a) To prevent deadlock
Explanation: Banker's algorithm is used to prevent the deadlock condition. The banker algorithm is sometimes called the detection algorithm. It is named the banker algorithm because it is used to determine whether a loan can be granted in the banking system or not.
12) When you delete a file in your computer, where does it go?
Recycle binHard diskTaskbarNone of theseAnswer: (a) Recycle bin
Explanation: When you delete a file on your computer device, it is transferred to your computer system's recycle bin or trash.
13) Which is the Linux operating system?
Private operating systemWindows operating systemOpen-source operating systemNone of theseAnswer: (c) Open-source operating system
Explanation: The Linux operating system is an open-source operating system made up of a kernel. It is a very safe operating system.
14) What is the full name of the DSM?
Direct system moduleDirect system memoryDemoralized system memoryDistributed shared memoryAnswer: (d) Distributed shared memory
Explanation: The DSM stands for Distributed Shared Memory.
15) What is the full name of the IDL?
Interface definition languageInterface direct languageInterface data libraryNone of theseAnswer: (a) Interface definition language
Explanation: The IDL stands for Interface Definition Language. It is used to establish communications between clients and servers in RPC (Remote Procedure Call).
16) What is bootstrapping called?
Cold bootCold hot bootCold hot strapHot bootAnswer: (a) Cold boot
Explanation: Bootstrapping is also known as the cool boot.
17) What is the fence register used for?
To disk protectionTo CPU protectionTo memory protectionNone of theseAnswer: (c) To memory protection
Explanation: The fence register is used for memory protection on the computer. It is a way to access the memory in the computer.
18) If the page size increases, the internal fragmentation is also?..?
DecreasesIncreasesRemains constantNone of theseAnswer: (b) Increases
Explanation: None
19) Which of the following is a single-user operating system?
WindowsMACMs-DosNone of theseAnswer: (c) Ms-Dos
Explanation: The single-user operating system is the operating system in which only one user can access the computer system a time, and Ms-DOS is the best example of a single-user operating system.
20) The size of virtual memory is based on which of the following?
CPU RAMAddress busData busAnswer: (c) Address bus
Explanation: The size of virtual memory is based on the address bus.
21) If a page number is not found in the translation lookaside buffer, then it is known as a?
Translation Lookaside Buffer missBuffer missTranslation Lookaside Buffer hitAll of the mentionedAnswer: (a) Translation Lookaside Buffer miss
Explanation: A Translation Lookaside Buffer miss arises when the page table entry needed to translate a virtual address to a physical address is not available in the translation lookaside buffer.
22) Which of the following is not application software?
Windows 7WordPadPhotoshopMS-excelAnswer: (a) Windows 7
Explanation: Windows 7 is not an application software because it is a operating system.
23) Which of the following supports Windows 64 bit?
Window XPWindow 2000Window 1998None of theseAnswer: (a) Window XP
Explanation: Windows XP supports the 64-bits. Windows XP is designed to expand the memory address space. Its original name is Microsoft Windows XP Professional x64 and it is based on the x86-64 architecture.
24) Which of the following windows does not have a start button?
Windows 7Windows 8Windows XPNone of theseAnswer: (b) Windows 8
Explanation: Windows 8 does not have a start button because it uses the tablet mode, but windows 8.1 has a start button.
25) Which of the following operating systems does not support more than one program a time?
LinuxWindowsMACDOSAnswer: (d) DOS
Explanation: DOS stands for Disk operating system. Disk operating system is a single-user operating system that does not support more than one program a time.
26) Which of the following is a condition that causes deadlock?
Mutual exclusionHold and waitCircular waitNo preemption All of theseAnswer: (e) All of these
Explanation: None
27) Who provides the interface to access the services of the operating system?
APISystem callLibraryAssembly instructionAnswer: (b) System call
Explanation: The system call provides an interface for user programs to access the services of the operating system through the API (Application Program Interface).
28) Where are placed the list of processes that are prepared to be executed and waiting?
Job queueReady queueExecution queueProcess queueAnswer: (b) Ready queue
Explanation: The ready queue is a set of all the processes that processes are ready to execute and wait.
29) Who among the following can block the running process?
ForkReadDownAll of theseAnswer: (d) All of these
Explanation: None
30) Which of the following does not interrupt the running process?
Timer interruptDevicePower failureScheduler processAnswer: (b) Scheduler process
Explanation: Scheduler process does not interrupt in any running process. Its job is to select the processes for long-term, short-term, and short-term scheduler.
31) What is Microsoft window?
Operating systemGraphics programWord ProcessingDatabase programAnswer: (a) Operating system
Explanation: Microsoft Windows is an operating system that was developed by Microsoft company. The Microsoft Windows is available in 32-bits and 64-bits in the market.
32) Which of the following is group of programs?
AccessoriesPaintWordAll of aboveAnswer: (a) Accessories
Explanation: The windows accessories are a group of programs in the operating system. Windows XP offers many accessories or software that you can use to help with your work. The accessories are not full features programs, but it is useful for a specific task in the operating systems. It provides many programs such as a painting program, a calculator, a word processor, a notepad, and Internet software.
33) Which of the following is an example of a Real Time Operating System?
MACMS-DOSWindows 10Process ControlAnswer: (d) Process Control
Explanation: Process control is a best example of a Real time operating system.
34) Which of the following operating systems do you use for a client-server network?
MACLinuxWindows XPWindows 2000Answer: (d) Windows 2000
Explanation: Windows 2002 operating systems were used to implement a client Server Network. It is a server OS that was developed by Microsoft in April 24, 2002. It includes some features of Windows XP.
35) Which windows was introduced to My Computer?
Windows 10Windows XPWindows 95Windows 98Answer: (c) Windows 95
Explanation: Windows 95 was first window to introduced the My Computer.
36) What type of commands are required to perform various tasks in DOS?
Internal commandsExternal commandsValuable commandsPrimary commandsAnswer: (b) External commands
Explanation: External commands are required to perform various tasks in DOS.
37) What is the number of characters contained in the primary name of the file of MS-DOS?
Up to 8 characters3 charactersUp to 10 charactersNone of the aboveAnswer: (a) Up to 8 characters
Explanation: MS-DOS operating system uses the file system that supports the 8.3 characters. The eight characters are used to the filename, and three characters are used to the extension.
38) Which command is used to fetch a group (.doc) of files that have just been deleted?
UndeleteUndelete/allUndelete *.docAll of aboveAnswer: (c) Undelete *.doc
Explanation: Undelete *.doc command is used to fetch a group (.doc) of files that have just been deleted.
39) Which of the following is system software?
Operating systemCompilerUtilitiesAll of the aboveAnswer: (d) All of the above
Explanation: The system software is a type of computer program designed to run hardware and software programs on a computer.
According to some definitions, system software also includes system utilities, system restore, development tools, compilers, and debuggers.
40) Which program runs first after booting the computer and loading the GUI?
Desktop ManagerFile ManagerWindows ExplorerAuthenticationAnswer: (d) Authentication
Explanation: The authentication program is run first after booting the computer and loading the GUI. Authentication is a process of verifying the person or device. For example, when you log in to Meta, you enter a username and password.