Operating System MCQ CS 2nd Year
Operating System MCQ CS 2nd Year
in
1. A Process Control Block(PCB) does not contain which of the following?
a) Code
b) Stack
c) Bootstrap program
d) Data
Answer: d
Explanation: Process Control Block (PC
b) contains information related to a process such as Process State, Program Counter, CPU Register, etc. Process Con
trol Block is also known as Task Control Block. Bootstrap program is a program which runs initially when the syste
m or computer is booted or rebooted.
a) Output
b) Throughput
c) Efficiency
d) Capacity
Answer: a
Explanation: The number of processes completed per unit time is known as Throughput. Suppose there are 4 process
es A, B, C & D they are taking 1, 3, 4 & 7 units of time respectively for their executions. For 10 units of time, throu
ghput is high if process A, B & C are running first as 3 processes can execute. If process C runs first then throughput
is low as maximum only 2 processes can execute. Throughput is low for processes which take a long time for execu
tion. Throughput is high for processes which take a short time for execution.
a) Job Queue
b) PCB queue
c) Device Queue
d) Ready Queue
Answer: c
Explanation: PCB queue does not belong to queues for processes. PCB is a process control block which contains inf
ormation related to process. Each process is represented by PCB.
5. If all processes I/O bound, the ready queue will almost always be ______ and the Short term Scheduler will have
a ______ to do.
a) full, little
b) full, lot
c) empty, little
d) empty, lot
Answer: c
Explanation: If all processes are I/O bound, the ready queue will almost empty and the short-term scheduler will hav
e a little to do. I/O bound processes spend more time doing I/O than computation.
8. The primary distinction between the short term scheduler and the long term scheduler is __________
9. The only state transition that is initiated by the user process itself is __________
a) block
b) wakeup
c) dispatch
d) none of the mentioned
Answer: c
Explanation: The only state transition that is initiated by the user process itself is block. Whenever a user process ini
tiates an I/O request it goes into block state unless and until the I/O request is not completed.
1. Restricting the child process to a subset of the parent’s resources prevents any process from __________
2. A parent process calling _____ system call will be suspended until children processes terminate.
a) wait
b) fork
c) exit
d) exec
Answer: a
Explanation: A parent process calling wait system call will be suspended until children processes terminate. A para
meter is passed to wait system call which will obtain exit status of child as well as wait system call returns PID of ter
minated process.
3. Cascading termination refers to termination of all child processes if the parent process terminates ______
a) Normally
b) Abnormally
c) Normally or abnormally
d) None of the mentioned www.aktutor.in
Answer: c
Explanation: Cascading termination refers to termination of all child processes if the parent process terminates Norm
ally or Abnormally. Some systems don’t allow child processes to exist if the parent process has terminated. Cascadin
g termination is normally initiated by the operating system.
4. With _____________ only one process can execute at a time; meanwhile all other process are waiting for the proc
essor. With ______________ more than one process can be running simultaneously each on a different processor.
a) Multiprocessing, Multiprogramming
b) Multiprogramming, Uniprocessing
c) Multiprogramming, Multiprocessing
d) Uniprogramming, Multiprocessing
Answer: d
Explanation: With Uniprogramming only one process can execute at a time; meanwhile all other processes are waiti
ng for the processor. With Multiprocessing more than one process can run simultaneously each on different processo
rs. The Uniprogramming system has only one program inside the core while the Multiprocessing system has multipl
e processes inside multiple cores. The core is one which executes instructions and stores data locally into registers.
6. In UNIX, the return value for the fork system call is _____ for the child process and _____ for the parent process.
8. The child process completes execution, but the parent keeps executing, then the child process is known as ______
____
a) Orphan www.aktutor.in
b) Zombie
c) Body
d) Dead
Answer: b
Explanation: The child process completes execution, but the parent keeps executing, then the child process is known
as Zombie. When a child process terminates, its resources get deallocated but its entry in the Process Control Block
(PC
b) remains there until its parent calls wait system call.
a) allows processes to communicate and synchronize their actions when using the same address space
b) allows processes to communicate and synchronize their actions
c) allows the processes to only synchronize their actions without communication
d) none of the mentioned
Answer: b
Explanation: Interprocess Communication allows processes to communicate and synchronize their actions. Interproc
ess Communication (IP
c) mechanism is used by cooperating processes to exchange data and information.
a) communicate with each other without sharing the same address space
b) communicate with one another by resorting to shared data
c) share data
d) name the recipient or sender of the message
Answer: a
Explanation: Message Passing system allows processes to communicate with each other without sharing the same ad
dress space.
3. Which of the following two operations are provided by the IPC facility?
a) communication link
b) message-passing link
c) synchronization link
d) all of the mentioned
Answer: a
Explanation: The link between two processes P and Q to send and receive messages is called communication link. T
wo processes P and Q want to communicate with each other; there should be a communication link that must exist b
etween these two processes so that both processes can able to send and receive messages using that link.
a) A communication link can be associated with N number of process(N = max. number of processes supported by s
ystem)
b) A communication link is associated with exactly two processes
c) Exactly N/2 links exist between each pair of processes(N = max. number of processes supported by system)
d) Exactly two link exists between each pair of processes
Answer: b
Explanation: For direct communication, a communication link is associated with exactly two processes. One commu
nication link must exist between a pair of processes.
a) there is another process R to handle and pass on the messages between P and Q
b) there is another machine between the two processes to help communication
c) there is a mailbox to help communication between P and Q
d) none of the mentioned
Answer: c
Explanation: In indirect communication between processes P and Q there is a mailbox to help communication betwe
en P and Q. A mailbox can be viewed abstractly as an object into which messages can be placed by processes and fr
om which messages can be removed.
11. Bounded capacity and Unbounded capacity queues are referred to as __________
a) Programmed buffering
b) Automatic buffering
c) User defined buffering
d) No buffering
Answer: b
Explanation: Bounded capacity and Unbounded capacity queues are referred to as Automatic buffering. Buffer capa
city of the Bounded capacity queue is finite length and buffer capacity of the Unbounded queue is infinite.
a) for communication between two processes remotely different from each other on the same system
b) for communication between two processes on the same system
c) for communication between two processes on separate systems
d) none of the mentioned
Answer: c
Explanation: None.
2. To differentiate the many network services a system supports ______ are used.
a) Variables
b) Sockets
c) Ports
d) Service names
Answer: c
Explanation: None.
3. RPC provides a(an) _____ on the client-side, a separate one for each remote procedure.
a) stub
b) identifier
c) name
d) process identifier
Answer: a
Explanation: None.
4. What is stub?
a) transmits the message to the server where the server side stub receives the message and invokes procedure on the
server side www.aktutor.in
b) packs the parameters into a form transmittable over the network
c) locates the port on the server
d) all of the mentioned
Answer: d
Explanation: None.
5. To resolve the problem of data representation on different systems RPCs define _____________
8. A process that is based on IPC mechanism which executes on different systems and can communicate with other
processes using message based communication, is called ________
1. The initial program that is run when the computer is powered up is called __________
a) boot program
b) bootloader
c) initializer
d) bootstrap program
Answer: d
Explanation: None. www.aktutor.in
2. How does the software trigger an interrupt?
3. What is a trap/exception?
4. What is an ISR?
a) the CPU uses polling to watch the control bit constantly, looping to see if a device is ready
b) the CPU writes one data byte to the data register and sets a bit in control register to show that a byte is available
c) the CPU receives an interrupt when the device is ready for the next byte
d) the CPU runs a user written code and does accordingly
Answer: b
Explanation: None. www.aktutor.in
8. In a programmed input/output(PIO) __________
a) the CPU uses polling to watch the control bit constantly, looping to see if a device is ready
b) the CPU writes one data byte to the data register and sets a bit in control register to show that a byte is available
c) the CPU receives an interrupt when the device is ready for the next byte
d) the CPU runs a user written code and does accordingly
Answer: a
Explanation: None.
a) the CPU uses polling to watch the control bit constantly, looping to see if a device is ready
b) the CPU writes one data byte to the data register and sets a bit in control register to show that a byte is available
c) the CPU receives an interrupt when the device is ready for the next byte
d) the CPU runs a user written code and does accordingly
Answer: c
Explanation: None.
a) multiprocessor systems
b) multiprogramming operating systems www.aktutor.in
c) larger memory sized systems
d) none of the mentioned
Answer: b
Explanation: None.
a) time
b) space
c) money
d) all of the mentioned
Answer: a
Explanation: None.
5. A process is selected from the ______ queue by the ________ scheduler, to be executed.
a) When a process switches from the running state to the ready state
b) When a process goes from the running state to the waiting state
c) When a process switches from the waiting state to the ready state
d) All of the mentioned
Answer: b
Explanation: There is no other choice.
7. The switching of the CPU from one process or thread to another is called ____________
a) process switch
b) task switch www.aktutor.in
c) context switch
d) all of the mentioned
Answer: d
Explanation: None.
a) the total time taken from the submission time till the completion time
b) the total time taken from the submission time till the first response is produced
c) the total time taken from submission time till the response is output
d) none of the mentioned
Answer: b
Explanation: None.
a) Non-preemptive scheduling
b) Preemptive scheduling
c) All of the mentioned
d) None of the mentioned
Answer: b
Explanation: None.
a) using very large time slices converts it into First come First served scheduling algorithm
b) using very small time slices converts it into First come First served scheduling algorithm
c) using extremely small time slices increases performance
d) using very small time slices converts it into Shortest Job First algorithm
Answer: a
Explanation: All the processes will be able to get completed.
3. The portion of the process scheduler in an operating system that dispatches processes is concerned with ________
____
6. The strategy of making processes that are logically runnable to be temporarily suspended is called ____________
7. What is Scheduling?
8. There are 10 different processes running on a workstation. Idle processes are waiting for an input event in the inp
ut queue. Busy processes are scheduled with the Round-Robin time sharing method. Which out of the following qua
ntum times is the best value for small response times, if the processes have a short runtime, e.g. less than 10ms?
a) tQ = 15ms
b) tQ = 40ms
c) tQ = 45ms
d) tQ = 50ms
Answer: a
Explanation: None.
9. Orders are processed in the sequence they arrive if _______ rule sequences the jobs.
10. Which of the following algorithms tends to minimize the process flow time?
11. Under multiprogramming, turnaround time for short jobs is usually ________ and that for long jobs is slightly _
__________
a) Lengthened; Shortened
b) Shortened; Lengthened
c) Shortened; Shortened
d) Shortened; Unchanged
Answer: b
Explanation: None.
a) I only
b) I and III only
c) II and III only
d) I, II and III
Answer: d
Explanation: I) Shortest remaining time first scheduling is a preemptive version of shortest job scheduling. It may ca
use starvation as shorter processes may keep coming and a long CPU burst process never gets CPU.
4. Consider the following set of processes, the length of the CPU burst time given in milliseconds.
8. What is ‘Aging’?
a) i only
b) i and iii only
c) ii and iii only
d) i, ii and iii
Answer: d
Explanation: None.
11. Which of the following scheduling algorithms gives minimum average waiting time?
a) FCFS
b) SJF
c) Round – robin
d) Priority
Answer: b
Explanation: None.
a) data consistency
b) data insecurity
c) data inconsistency
d) none of the mentioned
Answer: c
Explanation: None.
2. A situation where several processes access and manipulate the same data concurrently and the outcome of the exe
cution depends on the particular order in which access takes place is called ____________
a) data consistency
b) race condition
c) aging
d) starvation
Answer: b
Explanation: None.
3. The segment of code in which the process may change common variables, update tables, write into files is known
as ____________
a) program
b) critical section
c) non – critical section
d) synchronizing www.aktutor.in
Answer: b
Explanation: None.
4. Which of the following conditions must be satisfied to solve the critical section problem?
a) Mutual Exclusion
b) Progress
c) Bounded Waiting
d) All of the mentioned
Answer: d
Explanation: None.
a) if a process is executing in its critical section, then no other process must be executing in their critical sections
b) if a process is executing in its critical section, then other processes must be executing in their critical sections
c) if a process is executing in its critical section, then all the resources of the system must be blocked until it finishes
execution
d) none of the mentioned
Answer: a
Explanation: None.
6. Bounded waiting implies that there exists a bound on the number of times a process is allowed to enter its critical
section ____________
a) after a process has made a request to enter its critical section and before the request is granted
b) when another process is in its critical section
c) before a process has made a request to enter its critical section
d) none of the mentioned
Answer: a
Explanation: None.
7. A minimum of _____ variable(s) is/are required to be shared between processes to solve the critical section proble
m.
a) one
b) two
c) three
d) four
Answer: b
Explanation: None.
a) single
b) atomic
c) static
d) none of the mentioned
Answer: b
Explanation: None.
a) wait
b) stop
c) hold
d) none of the mentioned
Answer: a
Explanation: None.
a) stop()
b) block()
c) hold()
d) wait()
Answer: b
Explanation: None.
8. The signal operation of the semaphore basically works on the basic _______ system call.
a) continue()
b) wakeup()
c) getup()
d) start()
Answer: b
Explanation: None.
10. The code that changes the value of the semaphore is ____________
11. The following program consists of 3 concurrent processes and 3 binary semaphores. The semaphores are initializ
ed as S0 = 1, S1 = 0, S2 = 0.
a) At least twice
b) Exactly twice
c) Exactly thrice
d) Exactly once
Answer: a
Explanation: None.
a) 1
b) 2
c) 3
d) None of the mentioned
Answer: c
www.aktutor.in
Explanation: Any one of the 9 processes can get into critical section after executing P(mutex) which decrements the
mutex value to 0. At this time P10 can enter critical section by incrementing the value to 1. Now any of the 9 proces
ses can enter the critical section by again decrementing the mutex value to 0. None of the remaining processes can g
et into their critical sections.
13. Two processes, P1 and P2, need to access a critical section of code. Consider the following synchronization cons
truct used by the processes.
a) Starvation
b) Deadlock
c) Aging
d) Signaling
Answer: b
Explanation: If a thread which had already locked a mutex, tries to lock the mutex again, it will enter into the waitin
g list of that mutex, which results in a deadlock. It is because no other thread can unlock the mutex.
2. What is a semaphore?
a) is a binary mutex
b) must be accessed from only one process
c) can be accessed from multiple processes
d) none of the mentioned
Answer: c
Explanation: None.
4. What is a mutex?
a) is a binary mutex
b) must be accessed from only one process
c) can be accessed from multiple processes
d) none of the mentioned
Answer: b
Explanation: None.
www.aktutor.in
5. At a particular time of computation the value of a counting semaphore is 7.Then 20 P operations and 15 V operati
ons were completed on this semaphore. The resulting value of the semaphore is? (GATE 1987)
a) 42
b) 2
c) 7
d) 12
Answer: b
Explanation: P represents Wait and V represents Signal. P operation will decrease the value by 1 every time and V
operation will increase the value by 1 every time.
a) 1
b) -1
c) 0.8
d) 0.5
Answer: a
Explanation: None.
a) two
b) three
c) four
d) eight
Answer: c
Explanation: Here are the possible ways in which statements from A and B can be interleaved.
a) one
b) two
c) three
d) four
Answer: a
Explanation: The semaphore T ensures that all the statements from A finish execution before B begins. So now there
is only one way in which statements from A and B can be interleaved:
a) System calls
b) IPC mechanisms
c) System protection
d) None of the mentioned
Answer: b
Explanation: None.
a) Mutual Exclusion
b) Bounded Waiting
c) Aging
d) Progress www.aktutor.in
Answer: b
Explanation: None.
2. In the bounded buffer problem, there are the empty and full semaphores that ____________
4. To ensure difficulties do not arise in the readers – writers problem _______ are given exclusive access to the shar
ed object.
a) readers
b) writers
c) readers and writers
d) none of the mentioned
Answer: b
Explanation: None.
7. All processes share a semaphore variable mutex, initialized to 1. Each process must execute wait(mutex) before e
ntering the critical section and signal(mutex) afterward.
8. All processes share a semaphore variable mutex, initialized to 1. Each process must execute wait(mutex) before e
ntering the critical section and signal(mutex) afterward.
9. Consider the methods used by processes P1 and P2 for accessing their critical sections whenever needed, as given
below. The initial values of shared boolean variables S1 and S2 are randomly assigned. (GATE 2010)
a) semaphore
b) low level synchronization construct
c) high level synchronization construct
d) none of the mentioned
Answer: c
Explanation: None.
3. A procedure defined within a ________ can access only those variables declared locally within the _______ and i
ts formal parameters.
a) process, semaphore
b) process, monitor
c) semaphore, semaphore
d) monitor, monitor
Answer: d
Explanation: None.
a) transaction
b) operation
c) function
d) all of the mentioned
Answer: a
Explanation: None.
2. A terminated transaction that has completed its execution successfully is ____________ otherwise it is ________
__
a) committed, destroyed
b) aborted, destroyed
c) committed, aborted
d) none of the mentioned
Answer: c
Explanation: None.
3. The state of the data accessed by an aborted transaction must be restored to what it was just before the transaction
started executing. This restoration is known as ________ of transaction.
a) safety
b) protection
c) roll – back
d) revert – back
Answer: c
Explanation: None.
a) to ensure atomicity
b) to keep data consistent
c) that records data on stable storage
d) all of the mentioned
Answer: d
Explanation: None.
a) a memory
b) a system
c) a disk
d) a log record
Answer: d
Explanation: None.
a) idempotent
b) easy
c) protected
d) all of the mentioned
Answer: a
Explanation: Idempotent – Multiple executions of an operation have the same result as does one execution.
8. The system periodically performs checkpoints that consists of the following operation(s) ____________
a) Putting all the log records currently in main memory onto stable storage
b) putting all modified data residing in main memory onto stable storage
c) putting a log record onto stable storage
d) all of the mentioned
Answer: d
Explanation: None.
9. Consider a transaction T1 that committed prior to checkpoint. The <T1 commits> record appears in the log before
the <checkpoint> record. Any modifications made by T1 must have been written to the stable storage either with th
e checkpoint or prior to it. Thus at recovery time ____________
15. Which of the following concurrency control protocols ensure both conflict serializability and freedom from dead
lock?
a) I only
b) II only
c) Both I and II
d) Neither I nor II
Answer: b
Explanation: None.
a) must always be less than the total number of resources available in the system
b) must always be equal to the total number of resources available in the system
c) must not exceed the total number of resources available in the system
d) must exceed the total number of resources available in the system
Answer: c
Explanation: None.
4. For a deadlock to arise, which of the following conditions must hold simultaneously?
a) Mutual exclusion
b) No preemption
c) Hold and wait
d) All of the mentioned
Answer: d
Explanation: None.
a) A process must be not be holding a resource, but waiting for one to be freed, and then request to acquire it
b) A process must be holding at least one resource and waiting to acquire additional resources that are being held by
other processes
c) A process must hold at least one resource and not be waiting to acquire additional resources
d) None of the mentioned
Answer: b
Explanation: None.
a) must exist
b) must not exist
c) may exist
d) none of the mentioned
Answer: a www.aktutor.in
Explanation: A printer cannot be simultaneously shared by several processes.
a) is required
b) is not required
c) may be or may not be required
d) none of the mentioned
Answer: b
Explanation: They do not require mutually exclusive access, and hence cannot be involved in a deadlock.
10. To ensure that the hold and wait condition never occurs in the system, it must be ensured that ____________
11. The disadvantage of a process being allocated all its resources before beginning its execution is ____________
12. To ensure no preemption, if a process is holding some resources and requests another resource that cannot be im
mediately allocated to it ____________
13. One way to ensure that the circular wait condition never holds is to ____________
a) impose a total ordering of all resource types and to determine whether one precedes another in the ordering
b) to never let a process acquire resources that are held by other processes
c) to let a process wait for only one resource at a time
d) all of the mentioned
Answer: a
Explanation: None.
1. Each request requires that the system consider the _____________ to decide whether the current request can be sa
www.aktutor.in
tisfied or must wait to avoid a future possible deadlock.
2. Given a priori information about the ________ number of resources of each type that maybe requested for each pr
ocess, it is possible to construct an algorithm that ensures that the system will never enter a deadlock state.
a) minimum
b) average
c) maximum
d) approximate
Answer: c
Explanation: None.
3. A deadlock avoidance algorithm dynamically examines the __________ to ensure that a circular wait condition ca
n never exist.
a) safe allocation
b) safe resource
c) safe sequence
d) all of the mentioned
Answer: c
Explanation: None.
a) deadlocks
b) not deadlocks
c) fatal
d) none of the mentioned
Answer: b www.aktutor.in
Explanation: None.
7. A system has 12 magnetic tape drives and 3 processes : P0, P1, and P2. Process P0 requires 10 tape drives, P1 req
uires 4 and P2 requires 9 tape drives.
a) P0, P1, P2
b) P1, P2, P0
c) P2, P0, P1
d) P1, P0, P2
Answer: d
Explanation: None.
10
a) less efficient
b) more efficient
c) equal
d) none of the mentioned
Answer: a
Explanation: None.
9. The resource allocation graph is not applicable to a resource allocation system ____________
a) Available
b) Need
c) Allocation
d) All of the mentioned
Answer: d
Explanation: None.
10. The Banker’s algorithm is _____________ than the resource allocation graph algorithm.
a) Allocation – Available
b) Max – Available
c) Max – Allocation
d) Allocation – Max www.aktutor.in
Answer: c
Explanation: None.
11. The data structures available in the Banker’s algorithm are ____________
a) an unsafe state
b) a safe state
c) a protected state
d) a deadlock
Answer: b
Explanation: None.
1. The wait-for graph is a deadlock detection algorithm that is applicable when ____________
a) rarely
b) frequently
c) rarely & frequently
d) none of the mentioned
Answer: b
Explanation: None.
5. What is the disadvantage of invoking the detection algorithm for every request?
www.aktutor.in
a) overhead of the detection algorithm due to consumption of memory
b) excessive time consumed in the request to be allocated memory
c) considerable overhead in computation time
d) all of the mentioned
Answer: c
Explanation: None.
6. A deadlock eventually cripples system throughput and will cause the CPU utilization to ______
a) increase
b) drop
c) stay still
d) none of the mentioned
Answer: b
Explanation: None.
7. Every time a request for allocation cannot be granted immediately, the detection algorithm is invoked. This will h
elp identify ____________
8. A computer system has 6 tape drives, with ‘n’ processes competing for them. Each process may need 3 tape drive
s. The maximum value of ‘n’ for which the system is guaranteed to be deadlock free is?
a) 2
b) 3
c) 4
d) 1
Answer: a
Explanation: None.
9. A system has 3 processes sharing 4 resources. If each process needs a maximum of 2 units then, deadlock ______
______
10. ‘m’ processes share ‘n’ resources of the same type. The maximum need of each process doesn’t exceed ‘n’ and t
he sum of all their maximum needs is always less than m+n. In this setup, deadlock ____________
2. The two ways of aborting processes and eliminating deadlocks are ____________
6. If we preempt a resource from a process, the process cannot continue with its normal execution and it must be ___
_________
a) aborted
b) rolled back www.aktutor.in
c) terminated
d) queued
Answer: b
Explanation: None.
7. To _______ to a safe state, the system needs to keep more information about the states of processes.
8. If the resources are always preempted from the same process __________ can occur.
a) deadlock
b) system crash
c) aging
d) starvation
Answer: d
Explanation: None.
a) Compile time
b) Load time
c) Execution time
d) All of the mentioned
Answer: d
Explanation: None.
www.aktutor.in
3. If the process can be moved during its execution from one memory segment to another, then binding must be ___
_________
a) programmer
b) system architect
c) system designer
d) none of the mentioned
Answer: a
Explanation: None.
a) Memory manager
b) CPU
c) CPU manager
d) User
Answer: a
Explanation: None.
www.aktutor.in
9. If a higher priority process arrives and wants service, the memory manager can swap out the lower priority proces
s to execute the higher priority process. When the higher priority process finishes, the lower priority process is swap
ped back in and continues execution. This variant of swapping is sometimes called?
a) priority swapping
b) pull out, push in
c) roll out, roll in
d) none of the mentioned
Answer: c
Explanation: None.
10. If binding is done at assembly or load time, then the process _____ be moved to different locations after being s
wapped out and in again.
a) can
b) must
c) can never
d) may
Answer: c
Explanation: None.
a) Physical address
b) Logical address
c) Neither physical nor logical
d) None of the mentioned
Answer: b
Explanation: None.
2. The address loaded into the memory address register of the memory is referred to as ____________
a) Physical address www.aktutor.in
b) Logical address
c) Neither physical nor logical
d) None of the mentioned
Answer: a
Explanation: None.
3. The run time mapping from virtual to physical addresses is done by a hardware device called the ____________
a) basic register
b) regular register
c) relocation register
d) delocation register
Answer: c
Explanation: None.
a) physical memory
b) external storage
c) secondary storage
d) none of the mentioned
Answer: a
Explanation: None.
6. If execution time binding is being used, then a process ______ be swapped to a different memory space.
a) has to be
b) can never
c) must
d) may
Answer: d
Explanation: None.
a) motherboard
b) keyboard
c) monitor
d) backing store
Answer: d
Explanation: None.
9. The ________ consists of all processes whose memory images are in the backing store or in memory and are read
y to run.
a) wait queue
b) ready queue
c) cpu
d) secondary storage
Answer: b
Explanation: None.
10. The _________ time in a swap out of a running process and swap in of a new process into the memory is very hi
gh.
a) context – switch
b) waiting
c) execution
d) all of the mentioned
Answer: a
Explanation: None.
a) waiting
b) transfer
c) execution
d) none of the mentioned
Answer: b
Explanation: None.
12. Swapping _______ be done when a process has pending I/O, or has to execute I/O operations only into operating
system buffers.
a) must
b) can
c) must never
d) maybe
Answer: c
Explanation: None.
a) as a chunk of disk
b) separate from a file system
c) into a file system
d) all of the mentioned
Answer: a
Explanation: None.
www.aktutor.in
********** Join:- https://t.me/AKTU_Notes_Books_Quantum **********
a) operating system
b) cpu
c) user processes
d) all of the mentioned
Answer: a
Explanation: None.
5. With relocation and limit registers, each logical address must be _______ the limit register.
a) less than
b) equal to
c) greater than
d) none of the mentioned
Answer: a
Explanation: None.
6. The operating system and the other processes are protected from being modified by an already running process be
cause ____________
8. Using transient code, _______ the size of the operating system during program execution.
a) increases
b) decreases
c) changes
d) maintains
Answer: c
Explanation: None.
9. When memory is divided into several fixed sized partitions, each partition may contain ________
11. The first fit, best fit and worst fit are strategies to select a ______
a) is being used
b) is not being used
c) is always used
d) none of the mentioned
Answer: b
Explanation: None.
a) compaction
b) larger memory space
c) smaller memory space
d) none of the mentioned
Answer: a
Explanation: None.
a) cannot be done
b) must be done
c) must not be done
d) can be done
Answer: a
Explanation: None.
5. The disadvantage of moving all process to one end of memory and all holes to the other direction, producing one l
arge hole of available memory is ____________
10. When the memory allocated to a process is slightly larger than the process, then ____________
a) frames
b) pages
c) backing store
d) none of the mentioned
Answer: a
Explanation: None.
2. Logical memory is broken into blocks of the same size called _________
a) frames
b) pages
c) backing store
d) none of the mentioned www.aktutor.in
Answer: b
Explanation: None.
3. Every address generated by the CPU is divided into two parts. They are ____________
a) frame bit
b) page number
c) page offset
d) frame offset
Answer: b
Explanation: None.
5. The _____ table contains the base address of each page in physical memory.
a) process
b) memory
c) page
d) frame
Answer: c
Explanation: None.
a) varied
b) power of 2
c) power of 4
d) none of the mentioned
Answer: b
Explanation: None.
7. If the size of logical address space is 2 to the power of m, and a page size is 2 to the power of n addressing units, t
hen the high order _____ bits of a logical address designate the page number, and the ____ low order bits designate t
he page offset.
a) m, n
b) n, m
c) m – n, m
d) m – n, n
Answer: d
Explanation: None.
a) internal
b) external www.aktutor.in
c) either type of
d) none of the mentioned
Answer: b
Explanation: None.
9. The operating system maintains a ______ table that keeps track of how many frames have been allocated, how ma
ny are there, and how many are available.
a) page
b) mapping
c) frame
d) memory
Answer: c
Explanation: None.
a) waiting
b) execution
c) context – switch
d) all of the mentioned
Answer: c
Explanation: None.
a) queues
b) stacks
c) counters
d) registers
Answer: d
Explanation: None.
13. For larger page tables, they are kept in main memory and a __________ points to the page table.
a) extended by a factor of 3
b) extended by a factor of 2
c) slowed by a factor of 3
d) slowed by a factor of 2
Answer: d
Explanation: None.
a) key
b) value
c) bit value
d) constant
Answer: a
Explanation: None.
a) TLB miss
b) Buffer miss
c) TLB hit
d) All of the mentioned
Answer: a
Explanation: None.
3. An ______ uniquely identifies processes and is used to provide address space protection for that process.
4. The percentage of times a page number is found in the TLB is known as ____________
a) miss ratio
b) hit ratio
c) miss percent
d) none of the mentioned
Answer: b
Explanation: None. www.aktutor.in
5. Memory protection in a paged environment is accomplished by ____________
6. When the valid – invalid bit is set to valid, it means that the associated page ____________
a) is in the TLB
b) has data in it
c) is in the process’s logical address space
d) is the system’s physical address space
Answer: c
Explanation: None.
a) error
b) protection
c) valid – invalid
d) access
Answer: c
Explanation: None.
8. When there is a large logical address space, the best way of paging would be ____________
a) not to page
b) a two level paging algorithm
c) the page table itself
d) all of the mentioned
Answer: b
Explanation: None.
9. In a paged memory, the page hit ratio is 0.35. The required to access a page in secondary memory is equal to 100
ns. The time required to access a page in primary memory is 10 ns. The average time required to access a page is?
a) 3.0 ns
b) 68.0 ns
c) 68.5 ns
d) 78.5 ns
Answer: c
Explanation: None.
10. To obtain better memory utilization, dynamic loading is used. With dynamic loading, a routine is not loaded unti
l it is called. For implementing dynamic loading ____________
11. In paged memory systems, if the page size is increased, then the internal fragmentation generally ____________
a) becomes less
b) becomes more
c) remains constant
d) none of the mentioned
Answer: b
Explanation: None.
2. In paging the user provides only ________ which is partitioned by the hardware into ________ and ______
a) segment base
b) segment peak
c) segment value
d) none of the mentioned
Answer: a
Explanation: None.
8. When the entries in the segment tables of two different processes point to the same physical location __________
__
a) write only
b) read only
c) read – write
d) none of the mentioned
Answer: c
Explanation: None.
10. If there are 32 segments, each of size 1Kb, then the logical address should have ____________
a) 13 bits
b) 14 bits
c) 15 bits
d) 16 bits
Answer: a
Explanation: To specify a particular segment, 5 bits are required. To select a particular byte after selecting a page, 1
0 more bits are required. Hence 15 bits are required.
www.aktutor.in
11. Consider a computer with 8 Mbytes of main memory and a 128K cache. The cache block size is 4 K. It uses a di
rect mapping scheme for cache management. How many different main memory blocks can map onto a given physic
al cache block?
a) 2048
b) 256
c) 64
d) 8
Answer: c
Explanation: None.
12. A multilevel page table is preferred in comparison to a single level page table for translating virtual address to ph
ysical address because ____________
1. If one or more devices use a common set of wires to communicate with the computer system, the connection is cal
led ______
a) CPU
b) Monitor
c) Wirefull
d) Bus
Answer: d
Explanation: None.
2. A ____ a set of wires and a rigidly defined protocol that specifies a set of messages that can be sent on the wires.
a) port
b) node
c) bus
d) none of the mentioned
Answer: c
Explanation: None.
3. When device A has a cable that plugs into device B, and device B has a cable that plugs into device C and device
C plugs into a port on the computer, this arrangement is called a _________
a) port
b) daisy chain
c) bus
d) cable
Answer: b
Explanation: None.
4. The _________ present a uniform device-access interface to the I/O subsystem, much as system calls provide a st
andard interface between the application and the www.aktutor.in
operating system.
a) Devices
b) Buses
c) Device drivers
d) I/O systems
Answer: c
Explanation: None.
a) controller
b) driver
c) host
d) bus
Answer: a
Explanation: None.
6. An I/O port typically consists of four registers status, control, ________ and ________ registers.
a) flow in
b) flow out
c) data in
d) data out
Answer: c
Explanation: None.
a) status
b) control
c) data in
d) data out
Answer: d
Explanation: None.
9. The hardware mechanism that allows a device to notify the CPU is called _______
a) polling
b) interrupt
c) driver
d) controlling
Answer: b
Explanation: None.
www.aktutor.in
10. The CPU hardware has a wire called __________ that the CPU senses after executing every instruction.
11. The _________ determines the cause of the interrupt, performs the necessary processing and executes a return fr
om the interrupt instruction to return the CPU to the execution state prior to the interrupt.
13. The _________ are reserved for events such as unrecoverable memory errors.
1. The ________ can be turned off by the CPU before the execution of critical instruction sequences that must not b
e interrupted.
a) nonmaskable interrupt
b) blocked interrupt
c) maskable interrupt
d) none of the mentioned
Answer: c
Explanation: None.
a) nonmaskable interrupt
b) blocked interrupt
c) maskable interrupt www.aktutor.in
d) none of the mentioned
Answer: c
Explanation: None.
a) the interrupts
b) the memory addresses of specialized interrupt handlers
c) the identifiers of interrupts
d) the device addresses
Answer: b
Explanation: None.
4. Division by zero, accessing a protected or non existent memory address, or attempting to execute a privileged inst
ruction from user mode are all categorized as ________
a) errors
b) exceptions
c) interrupt handlers
d) all of the mentioned
Answer: b
Explanation: None.
a) dma
b) programmed I/O
c) controller register
d) none of the mentioned
Answer: a
Explanation: None.
a) block stream
b) set of blocks
c) character stream
d) none of the mentioned
Answer: c
Explanation: None.
3. Caching ____________
4. Spooling ____________
5. The ________ keeps state information about the use of I/O components.
a) CPU
b) OS
c) kernel
d) shell
Answer: c
Explanation: None.
a) process table
b) open file table
c) close file table
d) all of the mentioned
Answer: b
Explanation: None.
a) message – passing
b) draft – passing
c) secondary memory
d) cache
Answer: a
Explanation: None.
www.aktutor.in
8. A ________ is a full duplex connection between a device driver and a user level process.
a) Bus
b) I/O operation
c) Stream
d) Flow
Answer: c
Explanation: None.
a) major factor
b) minor factor
c) does not matter
d) none of the mentioned
Answer: a
Explanation: None.
10. If the number of cycles spent busy – waiting is not excessive, then ____________
a) preemptive kernels
b) non preemptive kernels
c) preemptive kernels or non preemptive kernels
d) neither preemptive nor non preemptive kernelswww.aktutor.in
Answer: a
Explanation: None.
a) the amount of time an event takes to occur from when the system started
b) the amount of time from the event occurrence till the system stops
c) the amount of time from event occurrence till the event crashes
d) the amount of time that elapses from when an event occurs to when it is serviced.
Answer: d
Explanation: None.
a) minimize
b) maximize
c) not bother about
d) none of the mentioned
Answer: a
Explanation: None.
7. The amount of time required for the scheduling dispatcher to stop one process and start another is known as ____
__________
a) event latency
b) interrupt latency
c) dispatch latency
d) context switch
Answer: c
Explanation: None.
3. Antilock brake systems, flight management systems, pacemakers are examples of ____________
4. In a ______ real time system, it is guaranteed that critical real time tasks will be completed within their deadlines.
a) soft
b) hard
c) critical
d) none of the mentioned
Answer: b
Explanation: None.
a) single purpose
b) inexpensively mass produced
c) small size
d) all of the mentioned
Answer: d
Explanation: None.
9. The technique in which the CPU generates physical addresses directly is known as ____________
a) periods
b) deadlines
c) burst times
d) none of the mentioned
Answer: b
Explanation: None.
2. A process P1 has a period of 50 and a CPU burst of t1 = 25, P2 has a period of 80 and a CPU burst of 35. The tota
l CPU utilization is ____________
a) 0.90
b) 0.74
c) 0.94
d) 0.80
Answer: c www.aktutor.in
Explanation: None.
3. A process P1 has a period of 50 and a CPU burst of t1 = 25, P2 has a period of 80 and a CPU burst of 35., the prio
rities of P1 and P2 are?
4. A process P1 has a period of 50 and a CPU burst of t1 = 25, P2 has a period of 80 and a CPU burst of 35., can the
two processes be scheduled using the EDF algorithm without missing their respective deadlines?
a) Yes
b) No
c) Maybe
d) None of the mentioned
Answer: a
Explanation: None.
5. Using EDF algorithm practically, it is impossible to achieve 100 percent utilization due to __________
6. T shares of time are allocated among all processes out of N shares in __________ scheduling algorithm.
a) rate monotonic
b) proportional share
c) earliest deadline first
d) none of the mentioned
Answer: b
Explanation: None.
7. If there are a total of T = 100 shares to be divided among three processes, A, B and C. A is assigned 50 shares, B i
s assigned 15 shares and C is assigned 20 shares.
a) 20
b) 15
c) 50
d) none of the mentioned
Answer: c
Explanation: None.
8. If there are a total of T = 100 shares to be divided among three processes, A, B and C. A is assigned 50 shares, B
is assigned 15 shares and C is assigned 20 shares.
a) 20 www.aktutor.in
b) 15
c) 50
d) none of the mentioned
Answer: b
Explanation: None.
9. If there are a total of T = 100 shares to be divided among three processes, A, B and C. A is assigned 50 shares, B
is assigned 15 shares and C is assigned 20 shares.
a) 20
b) 15
c) 50
d) none of the mentioned
Answer: a
Explanation: None.
10. If there are a total of T = 100 shares to be divided among three processes, A, B and C. A is assigned 50 shares,
B is assigned 15 shares and C is assigned 20 shares.
a) allocate 30 shares to it
b) deny entry to D in the system
c) all of the mentioned
d) none of the mentioned
Answer: b
Explanation: None.
a) infinitely long
b) periodic
c) heavy weight
d) light weight
Answer: b
Explanation: None.
2. If the period of a process is ‘p’, then what is the rate of the task?
a) p2
b) 2*p
c) 1/p
d) p
Answer: c
Explanation: None.
4. The ____________ scheduling algorithm schedules periodic tasks using a static priority policy with preemption.
a) a higher priority
b) a lower priority
c) higher & lower priority
d) none of the mentioned
Answer: a
Explanation: None.
7. There are two processes P1 and P2, whose periods are 50 and 100 respectively. P1 is assigned higher priority than
P2. The processing times are t1 = 20 for P1 and t2 = 35 for P2. Is it possible to schedule these tasks so that each me
ets its deadline using Rate monotonic scheduling?
a) yes
b) no
c) maybe
d) none of the mentioned
Answer: a
Explanation: None.
8. If a set of processes cannot be scheduled by rate monotonic scheduling algorithm, then __________
9. A process P1 has a period of 50 and a CPU burst of t1 = 25, P2 has a period of 80 and a CPU burst of 35. The tota
l CPU utilization is?
a) 0.90
b) 0.74 www.aktutor.in
c) 0.94
d) 0.80
Answer: c
Explanation: None.
10. A process P1 has a period of 50 and a CPU burst of t1 = 25, P2 has a period of 80 and a CPU burst of 35. Can th
e processes be scheduled without missing the deadlines?
a) Yes
b) No
c) Maybe
d) None of the mentioned
Answer: b
Explanation: None.
1. The major difference between a multimedia file and a regular file is ___________
a) the size
b) the attributes
c) the ownership
d) the rate at which the file must be accessed
Answer: d
Explanation: Multimedia files must be accessed at a specific rate whereas accessing regular files requires no special
timings.
a) pics
b) shots
c) frames
d) snaps
Answer: c
Explanation: None.
4. The characteristic of the eye to retain the image for a short time after it has been presented is known as ________
___
a) persistence of vision
b) learning power
c) memory mapped input
d) none of the mentioned www.aktutor.in
Answer: a
Explanation: None.
6. Multimedia files stored on a remote server are delivered to a client across the network using a technique known as
___________
a) download
b) streaming
c) flowing
d) leaking
Answer: b
Explanation: None.
8. A media file containing audio or video is downloaded and stored on the client’s local file system in ___________
a) progressive download
b) regular download
c) real time streaming
d) virtual time streaming
Answer: a
Explanation: As the file is being downloaded, the client is able to play back the media file without having to wait for
the file to be downloaded in its entirety.
10. The media file is streamed to the client but is only played and not stored by the client in ___________
a) progressive download
b) regular download www.aktutor.in
c) real time streaming
d) virtual time streaming
Answer: c
Explanation: None.
a) buffering
b) random access
c) access
d) sequential access
Answer: b
Explanation: None.
a) live streaming
b) dead streaming
c) static streaming
d) on demand streaming
Answer: a
Explanation: None.
a) live streaming
b) dead streaming
c) static streaming
d) on demand streaming
Answer: d
Explanation: None.
www.aktutor.in
5. For a computer to deliver continuous media it must guarantee the specific rate and timing requirements, also kno
wn as ___________
a) deadline
b) quality of service
c) period
d) burst time
Answer: b
Explanation: None.
a) file systems must be efficient to meet the rate requirements of continuous media
b) network protocols must support bandwidth requirements while minimizing delay and jitter
c) all of the mentioned
d) none of the mentioned
Answer: c
Explanation: None.
4. The level that treats different types of traffics in different ways, giving certain traffic streams higher priority than
other streams and with best efforts, but no guarantees are made ___________
a) Throughput
b) Jitter
c) Delay www.aktutor.in
d) All of the mentioned
Answer: d
Explanation: None.
a) the time from when a request is first submitted to when the desired result is produced
b) the delay that occurs during playback of the stream
c) how the errors are handled during the transmission and processing of continuous media
d) none of the mentioned
Answer: a
Explanation: None.
a) processor
b) memory location
c) resource manager
d) all of the mentioned
Answer: c
Explanation: None.
a) static, still
b) static, dynamic
c) live, dead
d) none of the mentioned
Answer: b
Explanation: None.
2. The priority of a process will ______________ if the scheduler assigns it a static priority.
www.aktutor.in
a) change
b) remain unchanged
c) depends on the operating system
d) none of the mentioned
Answer: b
Explanation: None.
3. As disks have relatively low transfer rates and relatively high latency rates, disk schedulers must reduce latency ti
mes to ___________
4. Servicing requests strictly according to deadline using EDF may result in ___________
5. The hybrid algorithm that combines EDF with SCAN algorithm is known as ___________
a) EDS
b) SDF
c) SCAN-EDF
d) None of the mentioned
Answer: c
Explanation: None.
6. If several requests have different deadlines that are relatively close together, then using the SCAN – EDF algorith
m ___________
7. Multimedia systems require _________ scheduling to ensure critical tasks will be serviced within timing deadline
s.
a) stack
b) disks
c) queue
d) none of the mentioned
Answer: c
Explanation: None.
9. In SCAN – EDF, requests with the same deadlines are ordered according to ___________
a) SCAN policy
b) EDF policy
c) FCFS policy
d) FIFO policy
Answer: a
Explanation: None.
1. The three general methods for delivering content from a server to a client across a network are ___________
a) unicasting
b) multicasting
c) broadcasting
d) all of the mentioned
Answer: d
Explanation: None.
a) a single client
b) all clients, regardless whether they want the content or not
c) a group of receivers who indicate they wish to receive the content
d) none of the mentioned
Answer: a
Explanation: None.
a) a single client
b) all clients, regardless whether they want the content or not
c) a group of receivers who indicate they wish to receive the content
d) none of the mentioned
Answer: b
Explanation: None.
a) a single client
b) all clients, regardless whether they want the content or not
c) a group of receivers who indicate they wish to www.aktutor.in
receive the content
d) none of the mentioned
Answer: c
Explanation: None.
6. HTTP is __________
a) a stateful protocol
b) a stateless protocol
c) a protocol that maintains the status of its connection with the client
d) a stateless protocol that does not maintain the status of its connection with the client
Answer: d
Explanation: None.
a) SETUP
b) PLAY
c) PAUSE
d) All of the mentioned
Answer: d
Explanation: None.
a) the server breaks down the connection and releases the resources allocated for the session
b) the client breaks down the connection and releases the resources allocated for the session
c) the system crashes
d) none of the mentioned
Answer: a
Explanation: None.
12. The difficulty with multicasting from a practical point of view is ___________
13. To let a client have random access to a media stream with ___________
a) Theft of information
b) Modification of data
c) Wiping of information
d) All of the mentioned
Answer: d
Explanation: None.
a) File Shredding
b) File sharing and permission
c) File corrupting
d) File integrity
Answer: b
Explanation: Sharing and associated permissions are usual exploits which can compromise the system.
a) Key card
b) fingerprint
c) retina pattern
d) Password
Answer: d
Explanation: Passwords can be compromised more easily than to replicate a physical thing like key card, fingerprint
or retina.
a) 19thAugust88
b) Delhi88
c) P@assw0rd
d) !augustdelhi
Answer: c
Explanation: It has a combination of Alphabet both capital and small along with number and special character. Thus
always use complex password with a combination of all these.
a) It is easy to generated
b) It cannot be shared
c) It is different for every access
d) It is a complex encrypted password
Answer: c
Explanation: One time password is safe since it is generated per access and thus cannot be brute forced or deduced.
www.aktutor.in
9. What does Light Directory Access Protocol (LDAP) doesn’t store?
a) Users
b) Address
c) Passwords
d) Security Keys
Answer: b
Explanation: None.
a) Authorization
b) Authentication
c) Authorization & Authentication are same
d) None of the mentioned
Answer: a
Explanation: None.
a) Default behavior of OS
b) Part of AES encryption practice
c) Devices being accessed forces the user
d) Account administrator
Answer: d
Explanation: Its administrator’s job to ensure that password of the user remains private and is known only to user. B
ut while making a new user account he assigns a random general password to give it to user. Thus even administrato
r cannot access a particular users account.
a) Trap door
b) Fake process
c) Spawn Process
d) VAX process
Answer: c
Explanation: None.
10. Who unleashed famous worm attack in 1988 which effected UNIX systems and caused losses in millions?
a) Robert Morris
b) Bob Milano
c) Mark zuckerberg
d) Bill Gates
Answer: a
Explanation: None.
a) ACK scanning
b) Window scanning
c) IGMP scan
d) FIN scanning
Answer: c
Explanation: None.
16. With regard to DOS attack what is not true from below options?
a) A trusted antivirus
b) 24 hours scanning for virus
c) Firewall to separate trusted and untrusted network
d) Deny users access to websites which can potentially cause security leak
Answer: c
Explanation: Firewall create a protective barrier to secure internal network. An antivirus can only detect harmful vir
uses but cannot stop illegal access by remote attacker.
a) Buffer overflows
b) Unexpected combinations and unhandled input
c) Race conditions
d) All of the mentioned
Answer: d
Explanation: None.
a) Analysis Engine
b) Event provider
c) Alert Database
d) All of the mentioned
Answer: d
Explanation: None.
a) anomaly detection
b) signature based misuse
c) stack based
d) all of the mentioned
Answer: d
Explanation: None.
4. What are the different ways to classify an IDS?www.aktutor.in
a) Zone based
b) Host & Network based
c) Network & Zone based
d) Level based
Answer: b
Explanation: None.
a) Attack verification
b) System specific activity
c) No additional hardware required
d) All of the mentioned
Answer: d
Explanation: None.
a) They are integrated closely with the TCP/IP stack and watch packets
b) The host operating system logs in the audit information
c) It is programmed to interpret a certain series of packets
d) It models the normal usage of network as a noise characterization
Answer: a
Explanation: None.
a) AES
b) TES
c) Triple DES
d) DES
Answer: b
Explanation: None.
a) Two fish
b) RC5
c) RC4
d) TBONE
Answer: d
Explanation: None.
a) 128
b) 150 www.aktutor.in
c) 160
d) 112
Answer: a
Explanation: None.
a) 128
b) 160
c) 150
d) 112
Answer: b
Explanation: None.
a) MAC
b) AES
c) DAS
d) Digital-signature
Answer: a
Explanation: None.
2. A thread shares its resources(like data section, code section, open files, signals) with ___________
a) share the memory and resources of the process to which the threads belong
b) an application have several different threads of activity all within the same address space
c) reduce the address space that a process could potentially use
d) all of the mentioned
Answer: d
Explanation: None.
a) decreases concurrency
b) increases concurrency
c) doesn’t affect the concurrency
d) can increase or decrease the concurrency
Answer: b
Explanation: None.
a) a part of
b) the creator of
c) unaware of
d) aware of
Answer: c
Explanation: None.
www.aktutor.in
9. If the kernel is single threaded, then any user level thread performing a blocking system call will ___________
a) cause the entire process to run along with the other threads
b) cause the thread to block with the other threads running
c) cause the entire process to block even if the other threads are available to run
d) none of the mentioned
Answer: c
Explanation: None.
10. Because the kernel thread management is done by the Operating System itself ___________
a) the kernel can schedule another thread in the application for execution
b) the kernel cannot schedule another thread in the same application for execution
c) the kernel must schedule another thread of a different application for execution
d) the kernel must schedule another thread of the same application on a different processor
Answer: a
Explanation: None.
a) Context switch time is longer for kernel level threads than for user level threads
b) User level threads do not need any hardware support
c) Related kernel level threads can be scheduled on different processors in a multiprocessor system
d) Blocking one kernel level thread blocks all other related threads
Answer: d
Explanation: None.
1. The model in which one kernel thread is mapped to many user-level threads is called ___________
2. The model in which one user-level thread is mapped to many kernel level threads is called ___________
3. In the Many to One model, if a thread makes a blocking system call ___________
4. In the Many to One model, multiple threads are unable to run in parallel on multiprocessors because of ________
___
a) increased concurrency
b) decreased concurrency
c) increased or decreased concurrency
d) concurrency equivalent to other models
Answer: a
Explanation: None.
6. In the One to One model when a thread makes a blocking system call ___________
9. In the Many to Many model true concurrency cannot be gained because ___________
10. In the Many to Many models when a thread performs a blocking system call ___________
1. Signals that occur at the same time, are presented to the process ____________
a) physical memory
b) logical memory
c) physical & logical memory
d) none of the mentioned
Answer: a
Explanation: None.
4. The ability to execute a program that is only partially in memory has benefits like ____________
a) demand paging
b) buses
c) virtualization
d) all of the mentioned
Answer: a
Explanation: None.
7. Segment replacement algorithms are more complex than page replacement algorithms because ____________
10. The valid – invalid bit, in this case, when valid indicates?
12. When a page fault occurs, the state of the interrupted process is ____________
a) disrupted
b) invalid
c) saved
d) none of the mentioned
Answer: c
Explanation: None.
16. Locality of reference implies that the page reference being made by a process ____________
1. Which of the following page replacement algorithms suffers from Belady’s Anomaly?
a) Optimal replacement
b) LRU
c) FIFO
d) Both optimal replacement and FIFO
Answer: c
Explanation: None.
a) 8
b) 10
c) 9
d) 7
Answer: c
Explanation: None.
3. In question 2, if the number of page frames is increased to 4, then the number of page transfers ____________
a) decreases
b) increases www.aktutor.in
c) remains the same
d) none of the mentioned
Answer: b
Explanation: None.
4. A memory page containing a heavily used variable that was initialized very early and is in constant use is remove
d, then the page replacement algorithm used is ____________
a) LRU
b) LFU
c) FIFO
d) None of the mentioned
Answer: c
Explanation: None.
5. A virtual memory system uses First In First Out (FIFO) page replacement policy and allocates a fixed number of f
rames to a process. Consider the following statements.
a) are aware
b) are unaware
c) may unaware
d) none of the mentioned
Answer: b
Explanation: None.
a) one
b) two
c) three
d) four
Answer: b
Explanation: None.
8. When a page is selected for replacement, and its modify bit is set ____________
10. A FIFO replacement algorithm associates with each page the _______
a) Replace the page that has not been used for a long time
b) Replace the page that has been used for a long time
c) Replace the page that will not be used for a long time
d) None of the mentioned
Answer: c
Explanation: None.
13. LRU page – replacement algorithm associates with each page the ______
a) 10
b) 15
c) 11
d) 12
Answer: d
Explanation: None.
15. What are the two methods of the LRU page replacement policy that can be implemented in hardware?
www.aktutor.in
a) Counters
b) RAM & Registers
c) Stack & Counters
d) Registers
Answer: c
Explanation: None.
1. When using counters to implement LRU, we replace the page with the ____________
2. In the stack implementation of the LRU algorithm, a stack can be maintained in a manner ____________
a) whenever a page is used, it is removed from the stack and put on bottom
b) the bottom of the stack is the LRU page
c) the top of the stack contains the LRU page and all new pages are added to the top
d) none of the mentioned
Answer: b
Explanation: None.
3. There is a set of page replacement algorithms that can never exhibit Belady’s Anomaly, called ____________
a) queue algorithms
b) stack algorithms
c) string algorithms
d) none of the mentioned
Answer: b
Explanation: None.
a) 2
b) 3
c) 4
d) 5
Answer: c
Explanation: None.
7. The minimum number of page frames that must be allocated to a running process in a virtual memory environmen
t is determined by ____________
8. What is the reason for using the LFU page replacement algorithm?
9. What is the reason for using the MFU page replacement algorithm?
10. The implementation of the LFU and the MFU algorithm is very uncommon because ____________
3. Consider a machine in which all memory reference instructions have only one memory address, for them we need
at least _____ frame(s).
a) one
b) two
c) three
d) none of the mentioned
Answer: b
Explanation: At least one frame for the instruction and one for the memory reference.
5. The algorithm in which we split m frames among n processes, to give everyone an equal share, m/n frames is kno
wn as ____________
6. The algorithm in which we allocate memory to each process according to its size is known as ____________
a) greater than
b) same as
c) lesser than
d) none of the mentioned
Answer: b
Explanation: None.
8. _________ replacement allows a process to select a replacement frame from the set of all frames, even if the fram
e is currently allocated to some other process.
a) Local
b) Universal
c) Global
d) Public
Answer: c
Explanation: None.
9. _________ replacement allows each process to only select from its own set of allocated frames.
a) Local
b) Universal
c) Global
d) Public
Answer: a
Explanation: None.
10. One problem with the global replacement algorithm is that ____________
a) it is very expensive
b) many frames can be allocated to a process
c) only a few frames can be allocated to a process
d) a process cannot control its own page – fault rate
Answer: d
Explanation: None.
a) Local
b) Global
c) Universal
d) Public
Answer: b
Explanation: None.
a) increases
b) keeps constant
c) decreases
d) none of the mentioned
Answer: c
Explanation: None.
3. What is a locality?
a) may
b) must
c) do not
d) must not
Answer: a
Explanation: None.
a) {1, 2, 4, 5, 6}
b) {2, 1, 6, 7, 3}
c) {1, 6, 5, 7, 2}
d) {1, 2, 3, 4, 5}
Answer: c
Explanation: None.
10. If the sum of the working – set sizes increases, exceeding the total number of available frames ____________
a) 10
b) 14
c) 8
d) 11
Answer: a
Explanation: None.
a) 10
b) 14
c) 8
d) 11
Answer: c
Explanation: None.
a) 16
b) 15
c) 14
d) 11 www.aktutor.in
Answer: a
Explanation: None.
a) 16
b) 15
c) 14
d) 11
Answer: c
Explanation: None.
a) 16
b) 15
c) 14
d) 11
Answer: d
Explanation: None.
a) file
b) swap space
c) directory
d) text format
Answer: a
Explanation: None.
a) name
b) type
c) identifier
d) all of the mentioned
Answer: d
Explanation: None.
a) swap space
b) operating system
c) seperate directory structure
d) none of the mentioned
Answer: c
Explanation: None.
5. The operating system keeps a small table containing information about all open files called ____________
a) system table
b) open-file table
c) file table
d) directory table
Answer: b
Explanation: None.
7. System wide table in UNIX contains process independent information such as ____________
8. The open file table has a/an _______ associated with each file.
a) file content
b) file permission
c) open count
d) close count
Answer: c
Explanation: open count indicates the number of processes that have the file open.
9. Which of the following are the two parts of the file name?
1. The UNIX sytem uses a/an ________ stored at the beginning of a some files to indicate roughly the type of file.
a) identifier
b) extension
c) virtual number
d) magic number
Answer: d
Explanation: None.
2. The larger the block size, the ______ the internal fragmentation.
a) greater
b) lesser
c) same
d) none of the mentioned
Answer: a
Explanation: None.
a) works well
b) doesnt work well
c) maybe works well and doesnt work well
d) none of the mentioned
Answer: a
Explanation: None.
5. The direct access method is based on a ______ model of a file, as _____ allow random access to any file block.
9. For large files, when the index itself becomes too large to be kept in memory?
a) index is called
b) an index is created for the index file
c) secondary index files are created
d) all of the mentioned
Answer: b
Explanation: None.
2. The directory can be viewed as a _________ that translates file names into their directory entries.
a) symbol table
b) partition
c) swap space
d) cache
Answer: a
Explanation: None.
a) All files are contained in different directories all at the same level
b) All files are contained in the same directory
c) Depends on the operating system www.aktutor.in
d) None of the mentioned
Answer: b
Explanation: None.
6. When a user job starts in a two level directory system, or a user logs in _____________
10. The current directory contains, most of the files that are _____________
a) leaf
b) stem
c) current directory
d) root
Answer: d
Explanation: None.
a) leaf
b) stem
c) current directory
d) root
Answer: c
Explanation: None.
a) tree structure
b) cyclic graph directory structure
c) two level directory structure
d) acyclic graph directory
Answer: d
Explanation: None.
a) allows
b) may restrict
c) restricts
d) none of the mentioned
Answer: c
Explanation: None.
a) a directory entry
b) a pointer to another file or subdirectory
c) implemented as an absolute or relative path name
d) all of the mentioned
Answer: d
Explanation: None.
8. The operating system _______ the links when traversing directory trees, to preserve the acyclic structure of the sy
stem.
a) considers
b) ignores
c) deletes
d) none of the mentioned
Answer: b
Explanation: None.
a) deletes
b) affects
c) does not affect
d) none of the mentioned
Answer: c
Explanation: None.
www.aktutor.in
10. When keeping a list of all the links/references to a file, and the list is empty, implies that _____________
11. When a cycle exists, the reference count maybe non zero, even when it is no longer possible to refer to a director
y or file, due to _______
2. When a file system is mounted over a directory that is not empty then _____________
3. In UNIX, exactly which operations can be executed by group members and other users is definable by _________
____
4. A process _____ lower the priority of another process if both are owned by the same owner.
a) must
b) can www.aktutor.in
c) cannot
d) none of the mentioned
Answer: b
Explanation: None.
5. In distributed file system ________________ directories are visible from the local machine.
a) protected
b) local
c) private
d) remote
Answer: d
Explanation: None.
6. In the world wide web, a ____ is needed to gain access to the remote files, and separate operations are used to tran
sfer files.
a) laptop
b) plugin
c) browser
d) player
Answer: c
Explanation: None.
8. The machine containing the files is the _______ and the machine wanting to access the files is the ______
a) master, slave
b) memory, user
c) server, client
d) none of the mentioned
Answer: c
Explanation: None.
11. To recover from failures in the network operations _____________ information may be maintained.
a) ip address
b) state
c) stateless
d) operating system
Answer: b
Explanation: None.
12. The series of accesses between the open and close operations is a _____________
a) transaction
b) procedure
c) program
d) file session
Answer: d
Explanation: None.
a) lower
b) central
c) higher
d) none of the mentioned
Answer: a
Explanation: None.
a) their maintenance
b) their length
c) their permissions
d) all of the mentioned
Answer: b
Explanation: None.
www.aktutor.in
4. Many systems recognize three classifications of users in connection with each file (to condense the access control
list).
a) Owner
b) Group
c) Universe
d) All of the mentioned
Answer: d
Explanation: None.
a) different
b) similar
c) same
d) none of the mentioned
Answer: b
Explanation: None.
a) superuser
b) any user
c) a programmer only
d) the people in the group only
Answer: a
Explanation: None.
8. To control access the three bits used in UNIX are represented by _____________
a) r
b) w
c) x
d) all of the mentioned
Answer: d
Explanation: None.
11. In UNIX, the directory protection is handled _________ to the file protection.
a) different
b) similar
c) it is not handled at all
d) none of the mentioned
Answer: b
Explanation: None.
12. Disks are segmented into one or more partitions, each containing a file system or ______
a) left ‘raw’
b) made into swap space
c) made into backup space
d) left ‘ripe’
Answer: a
Explanation: None.
1. The three major methods of allocating disk space that are in wide use are _____________
a) contiguous
b) linked
c) indexed
d) all of the mentioned
Answer: d
Explanation: None.
5. On systems where there are multiple operating system, the decision to load a particular one is done by _________
____
a) boot loader
b) bootstrap
c) process control block
d) file control block
Answer: a
Explanation: None.
6. The VFS (virtual file system) activates file system specific operations to handle local requests according to their _
______
a) size
b) commands
c) timings
d) file system types
Answer: d
Explanation: None.
10. _______ and ________ are the most common strategies used to select a free hole from the set of available holes.
11. The first fit and best fit algorithms suffer from _____________
a) internal fragmentation
b) external fragmentation
c) starvation
d) all of the mentioned
Answer: b
Explanation: None.
12. To solve the problem of external fragmentation ________ needs to be done periodically.
a) compaction
b) check
c) formatting
d) replacing memory
Answer: a
Explanation: None.
1. A device driver can be thought of like a translator. Its input consists of _____ commands and output consists of _
______ instructions.
a) files
b) logical blocks of files
c) physical blocks of files
d) all of the mentioned
Answer: d
Explanation: None.
4. For each file there exists a ___________ that contains information about the file, including ownership, permission
s and location of the file contents.
a) metadata
b) file control block
c) process control block
d) all of the mentioned
Answer: b
Explanation: None.
a) can
b) cannot
c) is
d) none of the mentioned
Answer: b
Explanation: None.
a) the contents of the file have to be copied to a new space, a larger hole
b) the file gets destroyed
c) the file will get formatted and lost all its data
d) none of the mentioned
Answer: a www.aktutor.in
Explanation: None.
a) I only
b) II only
c) Both I and II
d) Neither I nor II
Answer: c
Explanation: None.
a) internal fragmentation
b) external fragmentation
c) starvation
d) all of the mentioned
Answer: b
Explanation: None.
a) internal fragmentation
b) external fragmentation
c) there is no sequential access
d) there is only sequential access
Answer: d
Explanation: None.
a) the same
b) increased
c) decreased
d) not affected
Answer: c www.aktutor.in
Explanation: None.
2. If the extents are too large, then what is the problem that comes in?
a) internal fragmentation
b) external fragmentation
c) starvation
d) all of the mentioned
Answer: a
Explanation: None.
a) stack
b) linked list
c) data
d) pointer
Answer: b
Explanation: None.
4. A section of disk at the beginning of each partition is set aside to contain the table in _____________
a) fat
b) linked allocation
c) hashed allocation
d) indexed allocation
Answer: a
Explanation: None.
5. Contiguous allocation has two problems _________ and _________ that linked allocation solves.
a) partition
b) address www.aktutor.in
c) file
d) all of the mentioned
Answer: c
Explanation: None.
a) supports
b) does not support
c) is not related to
d) none of the mentioned
Answer: a
Explanation: None.
8. The pointer overhead of indexed allocation is generally _________ the pointer overhead of linked allocation.
a) less than
b) equal to
c) greater than
d) keeps varying with
Answer: c
Explanation: None.
9. For any type of access, contiguous allocation requires ______ access to get a disk block.
a) only one
b) at least two
c) exactly two
d) none of the mentioned
Answer: a
Explanation: We can easily keep the initial address of the file in memory and calculate immediately the disk address
of the ith block and read it directly.
10. Consider a disk where blocks 2, 3, 4, 5, 8, 9, 10, 11, 12, 13, 17, 18, 25, 26 and 27 are free and the rest of the bloc
ks are allocated. Then the free space bitmap would be _____________
a) 10000110000001110011111100011111…
b) 110000110000001110011111100011111…
c) 01111001111110001100000011100000…
d) 001111001111110001100000011100000…
Answer: d
Explanation: None.
a) CPUs
b) Disks
c) Programs
d) I/O
Answer: b
Explanation: None. www.aktutor.in
2. In UNIX, even an ’empty’ disk has a percentage of its space lost to ______
a) programs
b) inodes
c) virtual memory
d) stacks
Answer: b
Explanation: None.
3. By preallocating the inodes and spreading them across the volume, we ___________ the system performance.
a) improve
b) decrease
c) maintain
d) do not affect
Answer: a
Explanation: None.
4. ____________ writes occur in the order in which the disk subsystem receives them, and the writes are not buffere
d.
a) Asynchronous
b) Regular
c) Synchronous
d) Irregular
Answer: c
Explanation: None.
a) Asynchronous
b) Regular
c) Synchronous
d) Irregular
Answer: a
Explanation: None.
6. A file being read or written sequentially should not have its pages replaced in LRU order, because ____________
_
a) it is very costly
b) the most recently used page will be used last
c) it is not efficient
d) all of the mentioned
Answer: b
Explanation: None.
7. In the optimized technique for sequential access ___________ removes a page from the buffer as soon as the next
page is requested.
a) write ahead
b) read ahead
c) free-behind www.aktutor.in
d) add-front
Answer: c
Explanation: None.
8. With _______ a requested page and several subsequent pages are read and cached.
a) write ahead
b) read ahead
c) free-behind
d) add-front
Answer: b
Explanation: None.
a) UNIX
b) Windows
c) Macintosh
d) Solaris
Answer: a
Explanation: None.
a) compares the data in the secondary storage with the data in the cache
b) compares the data in the directory structure with the data blocks on disk
c) compares the system generated output and user required output
d) all of the mentioned
Answer: b
Explanation: None.
a) program
b) code
c) transaction
d) all of the mentioned
Answer: c
Explanation: None.
5. Once the changes are written to the log, they are considered to be ________
www.aktutor.in
a) committed
b) aborted
c) completed
d) none of the mentioned
Answer: a
Explanation: None.
a) writes to the end of its space and then continues at the beginning
b) overwrites older values as it goes
c) all of the mentioned
d) none of the mentioned
Answer: a
Explanation: None.
8. All the changes that were done from a transaction that did not commit before the system crashed, have to be ____
_____
a) saved
b) saved and the transaction redone
c) undone
d) none of the mentioned
Answer: c
Explanation: None.
a) client
b) server
c) both client and server
d) neither client nor server
Answer: c
Explanation: None.
a) local, remote
b) remote, local
c) local, local
d) none of the mentioned
Answer: d www.aktutor.in
Explanation: None.
3. The _________ becomes the name of the root of the newly mounted directory.
4. ___________ mounts, is when a file system can be mounted over another file system, that is remotely mounted, n
ot local.
a) recursive
b) cascading
c) trivial
d) none of the mentioned
Answer: b
Explanation: None.
a) exhibits
b) does not exhibit
c) may exhibit
d) none of the mentioned
Answer: b
Explanation: Mounting a remote file system does not give the client access to other file systems that were, by chance
, mounted over the former file system.
7. The mount request is mapped to the corresponding __________ and is forwarded to the mount server running on t
he specific server machine.
a) IPC
b) System
c) CPU
d) RPC
Answer: b
Explanation: None.
8. The server maintains a/an ________ that specifies local file systems that it exports for mounting, along with name
s of machines that are permitted to mount them.
a) export list www.aktutor.in
b) import list
c) sending list
d) receiving list
Answer: a
Explanation: None.
a) are stateless
b) save the current state of the request
c) maybe stateless
d) none of the mentioned
Answer: a
Explanation: None.
2. Every NFS request has a _________ allowing the server to determine if a request is duplicated or if any are missi
ng.
a) name
b) transaction
c) sequence number
d) all of the mentioned
Answer: c
Explanation: None.
a) be visible
b) affect
c) be invisible
d) harm
Answer: c
Explanation: All blocks that the server is managing for the client will be intact.
a) synchronously
b) asynchronously
c) index-wise
d) none of the mentioned
Answer: a
Explanation: None. www.aktutor.in
5. A single NFS write procedure ____________
a) can be atomic
b) is atomic
c) is non atomic
d) none of the mentioned
Answer: b
Explanation: None.
a) provides
b) does not provide
c) may provide
d) none of the mentioned
Answer: b
Explanation: None.
7. _______________ in NFS involves the parsing of a path name into separate directory entries – or components.
a) Path parse
b) Path name parse
c) Path name translation
d) Path name parsing
Answer: c
Explanation: None.
8. For every pair of component and directory vnode after path name translation ____________
9. When a client has a cascading mount _______ server(s) is/are involved in a path name traversal.
a) at least one
b) more than one
c) more than two
d) more than three
Answer: b
Explanation: None.
a) magnetic disks
b) electrical disks www.aktutor.in
c) assemblies
d) cylinders
Answer: a
Explanation: None.
2. The heads of the magnetic disk are attached to a _____ that moves all the heads as a unit.
a) spindle
b) disk arm
c) track
d) none of the mentioned
Answer: b
Explanation: None.
3. The set of tracks that are at one arm position make up a ___________
a) magnetic disks
b) electrical disks
c) assemblies
d) cylinders
Answer: d
Explanation: None.
4. The time taken to move the disk arm to the desired cylinder is called the ____________
a) positioning time
b) random access time
c) seek time
d) rotational latency
Answer: c
Explanation: None.
5. The time taken for the desired sector to rotate to the disk head is called ____________
a) positioning time
b) random access time
c) seek time
d) rotational latency
Answer: d
Explanation: None.
a) disk crash
b) head crash
c) magnetic damage
d) all of the mentioned
Answer: b
Explanation: None.
a) faster
b) slower www.aktutor.in
c) at the same speed
d) none of the mentioned
Answer: b
Explanation: None.
9. ______ controller sends the command placed into it, via messages to the _____ controller.
a) host, host
b) disk, disk
c) host, disk
d) disk, host
Answer: c
Explanation: None.
2. If a process needs I/O to or from a disk, and if the drive or controller is busy then ____________
a) the request will be placed in the queue of pending requests for that drive
b) the request will not be processed and will be ignored completely
c) the request will be not be placed
d) none of the mentioned
Answer: a
Explanation: None.
www.aktutor.in
3. Consider a disk queue with requests for I/O to blocks on cylinders.
a) 600
b) 620
c) 630
d) 640
Answer: d
Explanation: None.
a) 224
b) 236
c) 245
d) 240
Answer: b
Explanation: None.
a) fast
b) very fast
c) slow
d) very slow
Answer: d
Explanation: None.
6. Magnetic tape drives can write data at a speed ________ disk drives.
7. On media that use constant linear velocity (CLV), the _____________ is uniform.
a) LOOK
b) SCAN
c) C-SCAN
d) C-LOOK
Answer: b
Explanation: None.
10. In the _______ algorithm, the disk head moves from one end to the other, servicing requests along the way. Whe
n the head reaches the other end, it immediately returns to the beginning of the disk without servicing any requests o
n the return trip.
a) LOOK
b) SCAN
c) C-SCAN
d) C-LOOK
Answer: c
Explanation: None.
11. In the ______ algorithm, the disk arm goes as far as the final request in each direction, then reverses direction im
mediately without going to the end of the disk.
a) LOOK
b) SCAN
c) C-SCAN
d) C-LOOK
Answer: a
Explanation: None.
1. The process of dividing a disk into sectors that the disk controller can read and write, before a disk can store data i
s known as ____________
a) partitioning
b) swap space creation
c) low-level formatting
d) none of the mentioned
Answer: c
Explanation: None.
a) header
b) data area
c) trailer
d) all of the mentioned
Answer: d
Explanation: None.
www.aktutor.in
3. The header and trailer of a sector contain information used by the disk controller such as _________ and _______
__
4. The two steps the operating system takes to use a disk to hold its files are _______ and ________
5. The _______ program initializes all aspects of the system, from CPU registers to device controllers and the conte
nts of main memory, and then starts the operating system.
a) main
b) bootloader
c) bootstrap
d) rom
Answer: c
Explanation: None.
a) RAM
b) ROM
c) Cache
d) Tertiary storage
Answer: b
Explanation: None.
a) start disk
b) end disk
c) boot disk
d) all of the mentioned
Answer: c
Explanation: None.
a) good blocks
b) destroyed blocks
c) bad blocks
d) none of the mentioned
Answer: c www.aktutor.in
Explanation: None.
9. In SCSI disks used in high end PCs, the controller maintains a list of _________ on the disk. The disk is initialize
d during ________ formatting which sets aside spare sectors not visible to the operating system.
10. The scheme used in the above question is known as _______ or ________
a) hard error
b) tough error
c) soft error
d) none of the mentioned
Answer: a
Explanation: None.
a) secondary storage
b) main memory
c) tertiary storage
d) none of the mentioned
Answer: b
Explanation: None.
a) increases
b) decreases
c) maintains
d) does not affect
Answer: b
Explanation: Disk access is much slower than memory access.
a) can
b) cannot
c) must not
d) none of the mentioned
Answer: a
Explanation: None.
5. If the swap space is simply a large file, within the file system, ____________ used to create it, name it and allocat
e its space.
6. For swap space created in a separate disk partition where no file system or directory structure is placed, ________
_____ used to allocate and deallocate the blocks.
7. When a fixed amount of swap space is created during disk partitioning, more swap space can be added only by?
a) only I
b) only II
c) both I and II
d) neither I nor II
Answer: c
Explanation: None.
8. In UNIX, two per process ________ are used by the kernel to track swap space use.
a) process tables
b) swap maps
c) memory maps
d) partition maps
Answer: b
Explanation: None.
9. It is __________ to reread a page from the filewww.aktutor.in
system than to write it to swap space and then to reread it from the
re.
a) useless
b) less efficient
c) more efficient
d) none of the mentioned
Answer: c
Explanation: None.