Operating System: True Or False Quiz!

Samy Boulos is an experienced Technology Consultant with a diverse 25-year career encompassing software development, data migration, integration, technical support, and cloud computing. He leverages his technical expertise and strategic mindset to solve complex IT challenges, delivering efficient and innovative solutions to clients.

, MSc (Computer Science) Approved & Edited by ProProfs Editorial Team

The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.

Learn about Our Editorial Process | By Mandibergeron Mandibergeron Community Contributor Quizzes Created: 1 | Total Attempts: 9,389 Questions: 40 | Attempts: 9,394 | Updated: Feb 12, 2024

Settings SettingsSettings

During the Quiz End of Quiz Quiz Flashcard

Share on Facebook

Share on Twitter Share on Whatsapp Share on Pinterest Share on Email Copy to Clipboard Embed on your website

Operating System: True Or False Quiz! - Quiz

Dive into the heart of computing with the Operating System: True or False Quiz! This exciting quiz tests your knowledge of essential operating system concepts through a series of true or false questions. Challenge yourself on topics like file management, process scheduling, and memory allocation. Explore the intricate details of popular operating systems and their functionalities, from Windows to Linux. Delve into the world of multitasking, user interfaces, and system security to determine if the statements are true or false. Whether you're a computer science enthusiast or just curious about the software that powers your devices, this quiz offers a Read more fun and informative way to test your understanding of operating systems. Are you ready to separate fact from fiction in the realm of OS?

Questions and Answers

Virtual memory space is always smaller than physical memory space.

Correct Answer
B. False

Explanation
The statement is false because virtual memory space can be larger than physical memory space. Virtual memory is a technique used by operating systems to extend the available memory beyond the physical memory. It allows programs to use more memory than is physically available by temporarily storing data in the hard disk. Therefore, the virtual memory space can be larger than the physical memory space.

Rate this question:

In a base-and-bounds model, the base tells where a segment (module) is loaded in memory.

Correct Answer
A. True

Explanation
In a base-and-bounds model, the base value indicates the starting address in memory where a segment or module is loaded. This value is used to calculate the actual memory address for each instruction or data access within the segment. Therefore, the statement "the base tells where a segment is loaded in memory" is true.

Rate this question:

Segmentation avoids external memory fragmentation.

Correct Answer
B. False

Explanation
Segmentation does not avoid external memory fragmentation. In fact, segmentation can lead to external fragmentation as it allocates memory in variable-sized segments. This can result in small gaps of unused memory between segments, making it difficult to allocate contiguous blocks of memory for new processes. To avoid external fragmentation, techniques like paging are used, which divide memory into fixed-sized blocks.

Rate this question:

The optimal (Min) page placement algorithm is not used in practice because it relies on accurately predicting future page references.

Correct Answer
A. True

Explanation
The optimal (Min) page placement algorithm is not used in practice because it relies on accurately predicting future page references. This means that the algorithm would need to know in advance which pages will be accessed in the future, which is not possible in real-world scenarios. Instead, other algorithms such as the Least Recently Used (LRU) or First-In-First-Out (FIFO) algorithms are used, which make decisions based on past page references rather than future predictions.

Rate this question:

An inverted page table keeps track of one entry per virtual page per process.

Correct Answer
B. False

Explanation
An inverted page table does not keep track of one entry per virtual page per process. Instead, it keeps track of one entry per physical page frame. This table is used to map each physical page frame to the corresponding virtual page, allowing for efficient memory management and address translation. Therefore, the correct answer is false.

Rate this question:

If a deadlock is detected, the OS should always kill the process in the deadlock.

Correct Answer
B. False

Explanation
The statement is false because killing the process in a deadlock is not always the best solution. Deadlocks occur when two or more processes are unable to proceed because each is waiting for a resource held by the other. Killing a process in a deadlock may not resolve the issue and can result in loss of data or system instability. Instead, the operating system should use techniques such as resource preemption or process termination to resolve the deadlock.

Rate this question:

An error is reported when the compiler cannot resolve the address when compiling a code module.

Correct Answer
B. False

Explanation
When compiling a code module, an error is not reported when the compiler cannot resolve the address. Instead, the compiler will report an error when it encounters syntax errors, semantic errors, or other issues that prevent it from properly compiling the code. The inability to resolve an address typically occurs at runtime, not during the compilation process. Therefore, the correct answer is false.

Rate this question:

In a non-distributed system, deadlock is rare enough that most systems just ignore it.

Correct Answer
A. True

Explanation
In a non-distributed system, deadlock is rare because it occurs when multiple processes are unable to proceed because each is waiting for a resource that another process holds. In a non-distributed system, there is usually a single central processing unit (CPU) and a limited number of resources. Therefore, the chances of multiple processes getting into a deadlock situation are low. As a result, most non-distributed systems do not prioritize detecting and resolving deadlocks, hence they ignore them.

Rate this question:

The second chance cyclic (aka clock) algorithm selects the oldest page as its victim.

Correct Answer
B. False

Explanation
The second chance cyclic algorithm does not select the oldest page as its victim. Instead, it selects the page that has been in memory the longest without being referenced. This algorithm uses a circular queue to keep track of the order in which pages are referenced, and when a page is referenced, its reference bit is set to 1. The algorithm starts at the front of the queue and checks the reference bit of each page. If the reference bit is 0, the page is considered a victim and is replaced. If the reference bit is 1, the reference bit is set to 0 and the page is moved to the back of the queue. Therefore, the algorithm does not solely rely on the age of the page to determine the victim.

Rate this question:

In the working set model, exceeding the balance set leads to thrashing.

Correct Answer
A. True

Explanation
In the working set model, the balance set refers to the set of pages that are currently in use by a process. Thrashing occurs when the system is constantly swapping pages in and out of memory, which can significantly degrade performance. If the balance set is exceeded, it means that the number of pages required by the process exceeds the available memory, leading to frequent page faults and excessive disk I/O. Therefore, it is true that exceeding the balance set in the working set model can result in thrashing.

Rate this question:

Run time binding is used for Microsoft Dynamic link libraries.

Correct Answer
A. True

Explanation
Run time binding is used for Microsoft Dynamic link libraries. This means that the binding between the function call and the function definition happens at runtime, allowing the program to access the functions in the DLL dynamically. This enables flexibility and the ability to load and use functions from DLLs as needed during program execution. Therefore, the given statement is true.

Rate this question:

If an OS designer does not like page size he/she just picks a new one.

Correct Answer
B. False

Explanation
The statement is false because an OS designer cannot simply pick a new page size. The page size is a fundamental aspect of the operating system and changing it requires significant modifications to the memory management system. The page size affects various aspects of the system's performance, including memory utilization and disk I/O. Therefore, changing the page size is a complex decision that involves careful analysis and consideration of various factors.

Rate this question:

Interrupts can be shut off by user processes.

Correct Answer
B. False

Explanation
User processes do not have the ability to shut off interrupts. Interrupts are a mechanism used by the operating system to handle events and perform tasks in a timely manner. They can only be controlled by the operating system and are essential for managing hardware devices and handling critical events. Therefore, the statement that interrupts can be shut off by user processes is false.

Rate this question:

Processes in a microkernel architecture operating system usually communicate using shared memory protected by mutexes.

Correct Answer
B. False

Explanation
In a microkernel architecture operating system, processes usually communicate using message passing rather than shared memory. This is because the microkernel approach aims to keep the kernel as small and simple as possible, delegating most functionalities to user-level processes. Message passing allows for better isolation and protection between processes, as they can only communicate through well-defined interfaces provided by the microkernel. Shared memory, on the other hand, introduces the risk of one process accessing or modifying the memory of another process directly, which goes against the principles of the microkernel design. Therefore, the statement is false.

Rate this question:

By default, threads share global memory.

Correct Answer
A. True

Explanation
Threads in a program can access and modify global memory by default. Global memory is a shared memory space that is accessible by all threads in a program. This allows threads to communicate and share data with each other. Therefore, the given statement "By default, threads share global memory" is true.

Rate this question:

In the remote procedure call (RPC) paradigm, data is not translated if the client and the server are running on the same architecture and using the same operation.

Correct Answer
B. False

Explanation
In the remote procedure call (RPC) paradigm, data is actually translated even if the client and the server are running on the same architecture and using the same operation. This is because RPC allows communication between different systems with potentially different architectures and data representations. Therefore, data translation is necessary to ensure compatibility and proper communication between the client and server.

Rate this question:

Usually, there's one I/O queue for the system.

Correct Answer
B. False

Explanation
The statement suggests that there is only one I/O queue for the system, which is not true. In most computer systems, there are multiple I/O queues to handle different types of input/output operations. This allows for better organization and prioritization of tasks, improving overall system performance and efficiency.

Rate this question:

The medium-term scheduler only runs in times of high resource contention, as when physical memory is full.

Correct Answer
A. True

Explanation
The medium-term scheduler is responsible for managing the movement of processes between main memory and secondary storage. It is invoked during times of high resource contention, such as when physical memory is full. This scheduler helps in freeing up memory by swapping out some processes to the secondary storage, allowing other processes to be loaded into memory. Therefore, the given statement is true.

Rate this question:

One way to evaluate a scheduling algorithm is to use it on a script that creates a predefined mix of jobs, then tracks one or more statistics about the algorithm's performance.

Correct Answer
A. True

Explanation
This statement is true because evaluating a scheduling algorithm using a script that creates a predefined mix of jobs and tracking statistics about the algorithm's performance allows for a systematic and objective assessment of its effectiveness. By analyzing the data collected from the script, one can determine how well the algorithm handles different job scenarios and make informed decisions about its suitability for specific applications. This approach helps in identifying any potential flaws or areas of improvement in the scheduling algorithm.

Rate this question:

In multicore systems, symmetric multiprocessing uses one core to handle the scheduling for all the other cores.

Correct Answer
B. False

Explanation
Symmetric multiprocessing (SMP) is a type of multiprocessing where each processor in the system performs the same tasks and has equal access to resources. In SMP systems, the scheduling of tasks is typically distributed among all the available cores, rather than being handled by a single core. Therefore, the given statement is false as SMP does not use one core to handle scheduling for all other cores, but rather distributes the scheduling among all the cores in the system.

Rate this question:

A segmented memory model is good for separating code from data.

Correct Answer
A. True

Explanation
A segmented memory model is a memory management technique where the memory is divided into segments, allowing for the separation of code and data. This separation is beneficial as it helps in organizing and managing the memory efficiently. Code segments contain instructions that the processor executes, while data segments store variables and data used by the program. By separating code from data, it becomes easier to maintain and modify the program, as well as protect the code from unauthorized access or modification. Therefore, the statement "A segmented memory model is good for separating code from data" is true.

Rate this question:

Using a larger page size makes page tables larger.

Correct Answer
B. False

Explanation
Using a larger page size does not necessarily make page tables larger. Page tables are data structures used by the operating system to map virtual memory addresses to physical memory addresses. The size of the page tables depends on the total amount of virtual memory in use, not on the page size. Increasing the page size can actually reduce the size of the page tables, as larger pages require fewer entries in the tables to cover the same amount of memory. Therefore, the statement is false.

Rate this question:

One of the four conditions necessary for deadlock is that a process acquires a resource and holds onto it while it acquires other resources.

Correct Answer
A. True

Explanation
This statement is true because one of the conditions necessary for deadlock is when a process acquires a resource and holds onto it while it tries to acquire other resources. This can lead to a situation where multiple processes are waiting for each other's resources, causing a deadlock.

Rate this question:

If a deadlock is detected, the OS should always kill the process holding the most resources in the deadlock.

Correct Answer
B. False

Explanation
The statement is false because killing the process holding the most resources in a deadlock may not always be the best solution. It can lead to loss of important data or disruption of critical tasks. Instead, the OS should use techniques like resource preemption, where resources are temporarily taken away from a process to break the deadlock and allow other processes to progress. Killing a process should be the last resort when all other options have been exhausted.

Rate this question:

The linker can resolve all addresses not resolved by the compiler.

Correct Answer
B. False

Explanation
The statement is false because the linker is responsible for resolving external references and symbols in a program, not addresses. The compiler is responsible for generating the machine code and assigning addresses to instructions and data. The linker then links different object files together and resolves any unresolved symbols.

Rate this question:

Since an inverted page table must be searched on each page reference, it is useful to organize it as a hash table.

Correct Answer
A. True

Explanation
An inverted page table needs to be searched on each page reference in order to translate virtual addresses to physical addresses. Organizing it as a hash table allows for efficient searching, as the hash function can quickly locate the desired page entry. This helps to improve the overall performance of the system by reducing the time taken for address translation.

Rate this question:

An error is reported when a compiler cannot resolve an address when compiling a code module.

Correct Answer
B. False

Explanation
When compiling a code module, an error is not reported when a compiler cannot resolve an address. Instead, this type of error is known as a linker error, which occurs during the linking phase after the compilation process. The linker is responsible for resolving addresses and linking different modules together to create an executable program. Therefore, the correct answer is false.

Rate this question:

A paging scheme does not suffer from external fragmentation.

Correct Answer
A. True

Explanation
A paging scheme does not suffer from external fragmentation because it divides the memory into fixed-sized pages and allocates memory to processes in these fixed-sized units. This eliminates the problem of external fragmentation where free memory blocks are scattered throughout the memory, making it difficult to allocate contiguous blocks of memory to processes. With paging, each process can be allocated non-contiguous pages, allowing for efficient memory allocation and utilization.

Rate this question:

In a base-and-bounds model, the base tells where a segment (module) is loaded in memory.

Correct Answer
A. True

Explanation
In a base-and-bounds model, the base is used to determine the starting address of a segment or module in memory. It provides the reference point from which the memory allocation for the segment begins. Therefore, the statement that the base tells where a segment is loaded in memory is true.

Rate this question:

Virtual memory space is always bigger than physical memory space.

Correct Answer
B. False

Explanation
Virtual memory is a memory management technique that allows a computer to compensate for the limited physical memory by temporarily transferring data from the RAM to the hard disk. In this technique, the virtual memory space is divided into pages, and the physical memory is divided into frames. The virtual memory space can be larger than the physical memory space, but it is not always the case. The size of the virtual memory depends on the system's architecture and the operating system's settings. Therefore, the statement that virtual memory space is always bigger than physical memory space is false.

Rate this question:

A system that uses segmentation and paging just means that the pages are grouped into logical statements.

Correct Answer
A. True

Explanation
A system that uses segmentation and paging does indeed mean that the pages are grouped into logical segments. Segmentation involves dividing the memory into logical segments such as code segment, data segment, and stack segment, while paging involves dividing the memory into fixed-size pages. This combination allows for efficient memory management and access control in operating systems. Therefore, the statement is true.

Rate this question:

In Java RMI, data must be translated between the caller and the callee.

Correct Answer
B. False

Explanation
In Java RMI, data does not need to be translated between the caller and the callee. Java RMI handles the translation of data automatically, allowing objects to be passed between different Java Virtual Machines (JVMs) without the need for manual translation or serialization. This simplifies the process of remote method invocation and makes it easier for developers to work with distributed systems in Java.

Rate this question:

The medium-term scheduler's job is to suspend jobs if the system is under heavy load.

Correct Answer
A. True

Explanation
The medium-term scheduler's job is to suspend jobs if the system is under heavy load. This is true because the medium-term scheduler is responsible for managing the degree of multiprogramming in the system. If the system is under heavy load, suspending jobs can help alleviate the load and improve overall system performance. By suspending jobs, the medium-term scheduler can prioritize and manage the execution of processes, ensuring that the system operates efficiently and effectively.

Rate this question:

When a new process is forked in UNIX, it retains access to the parent's open files.

Correct Answer
A. True

Explanation
When a new process is forked in UNIX, it retains access to the parent's open files. This means that the child process created through forking will have the same open files as the parent process. This allows the child process to read from or write to the same files that the parent process has open, providing a way for communication and sharing of data between the parent and child processes.

Rate this question:

In dual-mode processing, a user process does I/O by accessing the I/O device directly.

Correct Answer
B. False

Explanation
In dual-mode processing, a user process does not perform I/O by accessing the I/O device directly. Instead, it makes requests to the operating system, which then handles the I/O operations on behalf of the user process. This is done to ensure security and prevent unauthorized access to the I/O devices. Therefore, the statement that a user process does I/O by accessing the I/O device directly is false.

Rate this question:

Every I/O device typically has a waiting queue associated with it.

Correct Answer
A. True

Explanation
It is true that every I/O device typically has a waiting queue associated with it. This waiting queue is used to manage and prioritize the incoming requests from different processes or users. When a process or user makes a request to an I/O device, it is added to the waiting queue until the device becomes available to serve the request. This ensures that the requests are handled in a fair and orderly manner, preventing any process or user from monopolizing the device's resources.

Rate this question:

Which of the following statements best defines the concept of data skewness in statistical analysis?

Data skewness measures the spread or variability of a dataset. Data skewness indicates the presence of outliers or extreme values in a dataset. Data skewness quantifies the asymmetry or lack of symmetry in the distribution of data. Data skewness represents the degree of association between two variables in a dataset.

Correct Answer
C. Data skewness quantifies the asymmetry or lack of symmetry in the distribution of data.

Explanation
Data skewness is a statistical measure used to quantify the asymmetry or lack of symmetry in the distribution of data points within a dataset. It indicates whether the data is evenly distributed around the mean or if it is skewed towards one end of the distribution. A positively skewed dataset has a longer tail on the right side, while a negatively skewed dataset has a longer tail on the left side. Understanding data skewness is crucial for analyzing the shape and characteristics of a dataset, as it provides insights into the distribution's behavior and potential outliers.

Rate this question:

Kernel level threads, when blocking doing a system call, block all the threads associated with that process.

Correct Answer
B. False

Explanation
Kernel level threads, also known as kernel threads or lightweight processes, are managed by the operating system kernel. Unlike user-level threads, kernel level threads are visible to the operating system and can be scheduled independently. When a kernel level thread blocks while performing a system call, only that specific thread is blocked, not all the threads associated with the process. Therefore, the given statement is false.

Rate this question:

The kernel uses the Process Control Block to keep track of bookkeeping information about processes, such as the program counter.

Correct Answer
A. True

Explanation
The kernel is the central component of an operating system that manages various resources and processes. One of the key tasks of the kernel is to keep track of bookkeeping information about processes. This information includes important details such as the program counter, which keeps track of the next instruction to be executed in a process. Therefore, the statement that the kernel uses the Process Control Block to keep track of bookkeeping information about processes, including the program counter, is true.

Rate this question:

In multicore systems, systematic multiprocessing uses one core to handle the scheduling for all the other cores.

Correct Answer
B. False

Explanation
Systematic multiprocessing does not use one core to handle the scheduling for all the other cores in multicore systems. In fact, systematic multiprocessing involves distributing the workload across multiple cores, with each core having its own scheduler to handle its own tasks. This allows for better utilization of resources and improved performance in multicore systems.

Rate this question:

Samy Boulos | MSc (Computer Science) | Data Engineer

Samy Boulos is an experienced Technology Consultant with a diverse 25-year career encompassing software development, data migration, integration, technical support, and cloud computing. He leverages his technical expertise and strategic mindset to solve complex IT challenges, delivering efficient and innovative solutions to clients.

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

Current Version Feb 12, 2024

Quiz Edited by
ProProfs Editorial Team

Expert Reviewed by
Samy Boulos