Os MCQ
Os MCQ
a) Windows
b) Linux
c) Oracle
d) DOS
a) 4
b) 5
c) 8
d) 12
a) .txt
b) .xls
c) .ppt
d) .bmp
e)
a) prompt
b) kernel
c) shell
d) command
6) What is the full name of FAT?
7) BIOS is used?
a) By operating system
b) By compiler
c) By interpreter
d) By application software
9) What are the services operating System provides to both the users and to
the programs?
A. Protection
B. Program execution
C. I/O operations
D. All of the above
A. Operating system does not provides the access to the I/O device
B. I/O operation means read or write operation
C. An I/O subsystem comprises of I/O devices
D. None of the above
13) To access the services of operating system, the interface is provided by the:
• A. system calls
• B. API
• C. library
• D. assembly instructions
B .system interface
c.design interface
d. both b & c
23) Which command be used to clear the screen and display the operating
system prompt on the first line of the display?
a. Cd
b. Md
c. Rename
d. cls
3. MS-DOS developed in
a. 1991
b. 1984
c. 1971
d. 1961
Correct Answer: b
44. Which command be used to clear the screen and display the operating
system prompt on the first line of the display?
a. Cd
b. Md
c. Rename
d. cls
Correct Answer: d
13. To copy the hidden system files of DOS to another disk you can use the
command
a. Copy
b. Ren
c. Sys
d. Diskcopy
Correct Answer: c
16. The command used to copy a file named temp.doc from drive C: to drive A:
is
a. Copy temp.doc to a:
b. Copy c:\temp.doc a:
c. Copy c: a:
d. Copy temp a: c:
Correct Answer: b
22. Which command be used to ask you to confirm that you want to delete the
directory?
a. Deltree
b. Deltree/f
c. Del *.*/p
d. Erase *.*
Correct Answer: c
26. The deleted file in MS-DOS can be recovered if you use the command
mention below immediately, the command is:
a. DO NOT DELETE
b. NO DELETE
c. UNDELETE
d. ONDELETE
Correct Answer: c
28. While working with MS-DOS which key is used to get the p[revious
command used:
a. F3
b. F1
c. F6
d. F9
Correct Answer: a
37. While working with MS-DOS, which command is used to copying the files to
transfer from one PC to another one?
a. Rename
b. Path
c. Dir
d. Copy
Correct Answer: d
Correct Answer: d
43) To run the script, we should make it executable first by using _____
• A. chmod +x
• B. chmod +r
• C. chmod +w
• D. chmod +rwx
44) What are positional parameters?
• A. special variables for assigning arguments from the command line
• B. pattern matching parameters
• C. special variables for reading user input
• D. special variables and patterns
45) Unix is a
• A. Single User, Single tasking OS
• 0B. Single User, Multi-tasking OS
• C. Multi-User, Multi- tasking OS
• D. None
A) Kernel services
B) Library services
2. The system of ................ generally ran one job at a time. These were called single stream batch
processing.
A) 40's
B) 50's
C) 60's
D) 70's
3. In ..............generation of operating system, operating system designers develop the concept of
multiprogramming in which several jobs are in main memory at once.
A) First
B) Second
C) Third
D) Fourth
i) In spooling high speed device like a disk is interposed between running program and low-speed device
in Input/output.
ii) By using spooling for example instead of writing directly to a printer, outputs are written to the disk.
A) i-True, ii-False
B) i-True, ii-True
C) i-False, ii-True
D) i-False, ii-False
5. Which of the following is/are the functions of operating system?
i) Sharing hardware among users. ii) Allowing users to share data among themselves.
iii) Recovering from errors. iv) Preventing users from interfering with one another.
6.executes must frequently and makes the fine grained decision of which process to
execute the next.
A) Long-term scheduling
B) Medium-term scheduling
C) Short-term scheduling
7. With ................ a page is brought into main memory only when the reference is made to a location
on that page.
A) demand paging
B) main paging
C) prepaging
D) postpaging
8.provides a larger sized of virtual memory but require virtual memory which provides
multidimensional memory.
A) Paging method
B) Segmentation method
D) None of these
9.is a large kernel containing virtually the complete operating system, including,
scheduling, file system, device drivers and memory management.
A) Multilithic kernel
B) Monolithic kernel
C) Micro kernel
D) Macro kernel
A) Multilithic kernel
B) Monolithic kernel
C) Micro kernel
D) Macro kernel
A) File management
C) Inter-process communication
i) Mutual exclusion a) A process may hold allocated resources while waiting assignment.
ii) Hold and wait b) No resource can be forcibly removed from a process holding it.
A) Mutual exclusion
C) Circular waits
D) No preemption
14. The methods or algorithms which are used to increase the performance of disk storage sub-system
is called .............
A) Disk performing
B) Disk scheduling
C) Disk storing
D) Disk extending
15.is the time required to move the disk arm to the required track.
A) Seek time
B) Rotational delay
C) Latency time
D) Access time
A) SCAN
B) C-SCAN
C) N-Step SCAN
D) Both A and B
17.policy selects the disk I/O request that requires the least movement of the disk arm
from its current position.
A) FSCAN
B) SSTF
C) SCAN
D) C-SCAN
A) Multithreading
B) Multiprocessing
C) Multiexecuting
D) Bi-threading
A) i-True, ii-False
B) i-True, ii-True
C) i-False, ii-True
D) i-False, ii-False
20.is a special type of programming language used to provide instructions to the monitor
simple batch processing schema.
21.The first batch operating system was developed in the ................ by General Motors for use on an
IBM 701.
A) mid 1940's
B) mid 1950's
C) mid 1960's
D) mid 1970's
A) A program in execution
23. is a facility that allows programmers to address memory from a logical point of view,
without regard to the main memory, physically available.
A) Visual memory
B) Real memory
C) Virtual memory
D) Secondary memory
24. is a large kernel, including scheduling file system, networking, device drivers, memory
management and more.
A) Monolithic kernel
B) Micro kernel
C) Macro kernel
D) Mini kernel
25. A .................... architecture assigns only a few essential functions to the kernel, including
address spaces, Inter process communication(IPC) and basic scheduling.
A) Monolithic kernel
B) Micro kernel
C) Macro kernel
D) Mini kernel
i) Multithreading is useful for application that perform a number of essentially independent tasks that
do not be serialized.
ii) An example of multithreading is a database server that listens for and process numerous client
request.
A) i-True, ii-False
B) i-True, ii-True
C) i-False, ii-True
D) i-False, ii-False
27. ...................... With only one process can execute at a time; meanwhile all other process are
waiting for the processer. With more than one process can be running simultaneously each on a
different processer.
A) Multiprocessing, Multiprogramming
B) Multiprogramming, Uniprocessing
C) Multiprogramming, Multiprocessing
D) Uniprogramming, Multiprocessing
D) None of above
29. ............. refers to the ability of multiple process (or threads) to share code, resources or data in
such a way that only one process has access to shared object at a time.
A) Synchronization
B) Mutual Exclusion
C) Dead lock
D) Starvation
30. .................is the ability of multiple process to co-ordinate their activities by exchange of
information
A) Synchronization
B) Mutual Exclusion
C) Dead lock
D) Starvation
31. ..............refers to a situation in which a process is ready to execute but is continuously denied
access to a processor in deference to other processes.
A) Synchronization
B) Mutual Exclusion
C) Dead lock
D) Starvation
32. Which of the following is not the approach to dealing with deadlock?
A) Prevention
B) Avoidance
C) Detection
D) Deletion
33. Which of the following are the states of a five state process model?
A) i only
B) ii only
C) i and ii only
D) None
B) Inter request
C) Timing
D) All of the above
36. The different types of tables maintained by the operating system are .............
C) Process switching
i) User data ii) System Data iii) User program iv) System stack
40. Match the following mechanisms for interrupting the execution of a process and their uses.
A) Thread
B) Lightweight process
C) Process
D) Both A and B
42. ................is a example of an operating system that support single user process and single thread.
A) UNIX
B) MS-DOS
C) OS/2
D) Windows 2000
i) Unix, support multiple user process but only support one thread per process.
ii) A java run time environment is an example of a system of one process with multiple threads.
A) True, False
B) True, True
C) False, True
D) False, False
44. are very effective because a mode switch is not required to switch from one thread to
another.
A) Kernel-level threads
B) User-level threads
C) Alterable threads
45. . is a condition in which there is a set of concurrent processes, only one of which is able to
access a given resource or perform a given function at any time.
A) Mutual Exclusion
B) Busy Waiting
C) Deadlock
D) Starvation
46. Techniques can be used to resolve conflicts, such as competition for resources, and to
synchronize processes so that they can cooperate.
A) Mutual Exclusion
B) Busy Waiting
C) Deadlock
D) Starvation
47. Can be defined as the permanent blocking of a set of processed that either complete for
system resources or communicate with each other.
A) Deadlock
B) Permanent lock
C) Starvation
D) Mutual exclusion
48. The following conditions of policy must be present for a deadlock to be possible.
A) Mutual exclusion
B) Hold and wait
C) Circular waits
D) No preemption
i) With paging, each process is divided into relatively small, fixed-size pages.
A) Partition management
B) Memory management
C) Disk management
51. ......... Involves treating main memory as a resource to be allocated to and shared among a
A) Partition management
B) Memory management
C) Disk management
52. A process that execute only in main memory is referred to as .............. and that allocated in disk is
referred to a …………….
53. In process scheduling, ................... determines when new processes are admitted to the system.
55. The sum of the seek time, and the rotational delay is called the ………………..
A) reached time
B) access time
C) arrived time
D) common time
56. The ............... policy segments the disks request queue into sub queues of the length N.
A) SCAN
B) C-SCAN
C) N-Step SCAN
D) FSCAN
59. ...................The Determines when a page should be brought into main memory.
A) Fetch policy
B) Placement policy
C) Replacement policy
60. With.................... A page is written out to secondary memory only when it has been selected for
replacement.
A) pre-cleaning
B) demand cleaning
C) required cleaning
D) fast cleaning
B) a program only
C) a processor state
62. The mechanism that brings a page into memory only when it is needed is called.....
A) segmentation
B) fragmentation
C) demand paging
D) page replacement
A) call, reply
C) send, receive
B) spontaneous
C) active
D) impulse
A) preemptive scheduling
66. ………. ensures that once transaction completes successively, the results of the operations become
permanent.
A) serializability
B) synchronizability
C) atomicity
D) durability
A) ready queue
B) device queue
C) i/o queue
D) waiting queue
B) Serializability
C) Durability
D) Atomicity
A) task
B) process
C) program
71. The interval from the fine submission of a process to the time of completion is the......
A) waiting time
B) blocked time
C) turnaround time
D) response time
74. To ensure that the ......... condition never occurs in the system, we must guarantee that, whenever a
process requests a resource, it does not have any other resource.
A) mutual exclusion
B) no-preemption
C) circular waits
76. A program responsible for assigning the CPU to the process that has been selected by the short
term scheduler is known as.........
A) scheduler
B) dispatcher
C) debugger
D) compiler
77. The ..........instruct Kernel to do various operations of the calling program and exchange data
between the Kernel at the program.
A) shell
B) editors
C) system calls
D) commands
78. Which of the following buffering strategies are used in interprocess communication?
A) null pointer
79. The process of splitting of data into equal size partitions over multiple disks is known as .....
A) data stripping
B) array of disks
C) RAID
D) SCAN
80. Pipes allow transfer of data between processor in a ........ manner.
C) multilevel queue
81. The process of storing extra or duplicate information used for rebuilding the lost information in
event of disks failure is known as...
A. stripping
B. redundancy
C. disk array
D. RAID
A. target thread
B. thread cancellation
C. asynchronous cancellation
D. defined cancellation
83. ......... ensures the every message sent to a group of receivers will be delivered to either all of them
or none of them.
A. Ordered delivery
B. Atomicity
B. Survivability
D. Reliability
A. pile
B. file
C. disk
D. directory
A. User mode
B. System mode
C. Unprivileged mode
D. Process mode
86. The technique, for sharing the time of a computer among several jobs, which switches jobs so
rapidly such that each job appears to have the computer to itself, is called........
A. time sharing
B. time out
C. time domain
D. multitasking
87. For batch and payroll applications which of the following file organization is better........
A. random file
B. sequential file
C. indexed file
D. hashed file
88. Name the scheduler that selects among the processes that are ready to execute and allocates
the CPU to one of them.
C. Job scheduler
C. multidatagram messages
D. message passing
90. The process of direct mapping by using some faster algorithms is called as.........
A. hashing
B. searching
C. sorting
D. indexing
91. Name the system in which the processors do not share memory and each processor that its
own local memory.
92. Which technique was introduced because a single job could not keep both the CPU and I/O
devices busy?
A. Time-sharing
B. Spooling
C. preemptive scheduling
D. Multiprogramming
93. Those directories in which the root directory has all system file and no other sub-directory is
known as ...
A. flat directory
B. single directory
C. hierarchical directory
D. indexed directory
94. Which is responsible for maintaining all the important abstractions of the operating system?
A. Kernel
B. System libraries
C. System utilities
D. Daemons
95. A four message reliable IPC protocol for client server communication works as........
A. absolute
B. relative
C. hybrid
D. hierarchical
D. Heap allocation
A. reliability
B. repeatability
C. Survivability
D. flexibility
99. All path names are specified relative to the working directory........
A. absolute path name
100. The time taken by the disk arm to locate the specific address of a sector for getting information
is called........
A. rotational latency
B. seek time
C. search time
D. response time
Sub: OSY Unit-3 Process management
1. A Process Control Block(PCB) does not contain which of the following?
a) Code
b) Stack
c) Bootstrap program
d) Data
a) Output
b) Throughput
c) Efficiency
d) Capacity
a) New
b) Old
c) Waiting
d) Running
b) Data Structure
d) A Block in memory
Sub: OSY Unit-3 Process management
6. The entry of all the PCBs of the current processes is in __________
a) Process Register
b) Program Counter
c) Process Table
d) Process Unit
B. Job queue
C. Ready queue
D. Device queues
10. The processes which are blocked due to unavailability of an I/O device constitute this
queue.
B. Job queue
C. Ready queue
D. Device queues
Sub: OSY Unit-3 Process management
11) Two-state process model refers to?
A. running states
B. non-running states
C. Both A and B
A. Long-Term Scheduler
B. Short-Term Scheduler
C. Medium-Term Scheduler
A. Long-Term Scheduler
B. Short-Term Scheduler
C. Medium-Term Scheduler
14.When the suspended process is moved to the secondary storage. This process is called?
A. process mix.
B. swapping
C. Swap-In
D. Swap-Out
A. Long-Term Scheduler
B. Short-Term Scheduler
C. Medium-Term Scheduler
Sub: OSY Unit-3 Process management
D. Swapping
A. Long-Term Scheduler
B. Short-Term Scheduler
C. Medium-Term Scheduler
D. Swapping
A. PCB
B. Program Counter
C. Scheduling information
D. context switch
a) allows processes to communicate and synchronize their actions when using the same
address space
b) allows processes to communicate and synchronize their actions without using the same
address space
c) share data
22. The link between two processes P and Q to send and receive messages is called __________
a) communication link
b) message-passing link
c) synchronization link
c) Exactly N/2 links exist between each pair of processes(N = max. number of processes
supported by system)
a) there is another process R to handle and pass on the messages between P and Q
25. Bounded capacity and Unbounded capacity queues are referred to as __________
a) Programmed buffering
b) Automatic buffering
d) No buffering
a) program counter
b) stack
a) single threaded
b) multithreaded
28. If one thread opens a file with read privileges then ___________
a) other threads in the another process can also read from that file
b) other threads in the same process can also read from that file
Sub: OSY Unit-3 Process management
c) any other thread can not read from that file
28. The time required to create a new thread in an existing process is ___________
c) thread completes
a) running
Sub: OSY Unit-3 Process management
b) parsing
c) ready
d) blocked
32 The register context and stacks of a thread are deallocated when the thread?
a) terminates
b) blocks
c) unblocks
d) spawns
a) program counter
b) stack
a) single threaded
b) multithreaded
36.If one thread opens a file with read privileges then ___________
a) other threads in the another process can also read from that file
b) other threads in the same process can also read from that file
39 BIOS is used?
By operating system
By compiler
By interpreter
By application softwar
41 .A thread shares its resources(like data section, code section, open files, signals) with
___________
a) other process similar to the one that the thread belongs to
b) other threads that belong to similar processes
c) other threads that belong to the same process
d) all of the mentioned
43 The systems which allows only one process execution at a time, are called:
• A. uniprogramming systems
• B. uniprocessing systems
• C. unitasking systems
• B. open files
• A. fork
• B. create
• C. new
• A. normal exit
• B. fatal error
• B. when process is unable to run until some task has been completed
• A. function parameters
• B. local variables
• C. return addresses
Sub: OSY Unit-3 Process management
• D. PID of child process
51. Which system call returns the process identifier of a terminated child?
• A. wait
• B. exit
• C. fork
• D. get
52. The address of the next instruction to be executed by the current process is provided by
the:
• A. CPU registers
• B. program counter
• C. process stack
• D. pipe
53. . A Process Control Block(PCB) does not contain which of the following :
• A. code
• B. stack
• C. Process State
• E. bootstrap program
54. The number of processes completed per unit time is known as __________.
• A. output
• B. Throughput
Sub: OSY Unit-3 Process management
• C. Efficiency
• D. Capacity
• A. new
• B. old
• C. Waiting
• D. Running
• E. Terminate
• B. Data Structure
• D. a Block in memory
• B. Program Counter
• C. Process Table
• D. Process Unit
• C. All of these
• A. Job Queue
• B. PCB queue
• C. Device Queue
• D. Ready Queue
• D. No
64 .If all processes I/O bound, the ready queue will almost always be ______, and the Short
term Scheduler will have a ______ to do.
• A. full,little
• B. full,lot
• C. empty,little
• D. empty,lot
• D. None of these
Sub: OSY Unit-3 Process management
• D. None of these
67 The primary distinction between the short term scheduler and the long term scheduler is
:
• D. None of these
68 The only state transition that is initiated by the user process itself is :
• A. block
• B. wakeup
• C. dispatch
• D. None of these
69 In a time-sharing operating system, when the time slot given to a process is completed, the
process goes from the running state to the :
• A. Blocked state
• B. Ready state
• C. Suspended state
Sub: OSY Unit-3 Process management
• D. Terminated state
70 In a multi-programming environment :
71. Suppose that a process is in “Blocked” state waiting for some I/O service. When the
service is completed, it goes to the :
• A. Running state
• B. Ready state
• C. Suspended state
• D. Terminated state
• C. memory-management information
• A. A device
• B. Timer
Sub: OSY Unit-3 Process management
• C. Scheduler process
• D. Power failure
74 .Several processes access and manipulate the same data concurrently and the outcome of
the execution depends on the particular order in which the access takes place, is called a(n)
____.
• B. Entry Section
• C. Race condition
• D. Process Synchronization
• A. blocked to running
• B. ready to running
• C. blocked to ready
• D. running to blocked
• A. program counter
• B. stack
• A. single threaded
• B. multithreaded
• A. other threads in the another process can also read from that file
• B. other threads in the same process can also read from that file
• C. thread completes
• A. running
• B. parsing
• C. ready
• D. blocked
83 .The register context and stacks of a thread are deallocated when the thread:
• A. terminated
• B. blocks
Sub: OSY Unit-3 Process management
• C. unblocks
• D. spawns
• C. process
• D. None of these
86 .A thread shares its resources(like data section, code section, open files, signals) with :
• D. All of these
• D. None of these
• D. None of these
• D. None of these
• A. decreases concurrency
• B. increases concurrency
• A. a part of
• B. the creator of
• C. unaware of
• D. aware of
93 . If the kernel is single threaded, then any user level thread performing a blocking system call
will :
• A. cause the entire process to run along with the other threads
• C. cause the entire process to block even if the other threads are available to run
• D. None of these
94 . Because the kernel thread management is done by the Operating System itself :
• C. kernel threads are easier to manage as well as create then user threads
• D. None of these
• A. the kernel can schedule another thread in the application for execution.
Sub: OSY Unit-3 Process management
• B. the kernel cannot schedule another thread in the same application for execution.
• C. the kernel must schedule another thread of a different application for execution.
• D. the kernel must schedule another thread of the same application on a different
processor.
• A. Context switch time is longer for kernel level threads than for user level threads
• D. Blocking one kernel level thread blocks all other related threads
97 The model in which one kernel thread is mapped to many user-level threads is called :
98 The model in which one user-level thread is mapped to many kernel level threads is called
:
Sub: OSY Unit-3 Process management
• A. Many to One model
. 99. In the Many to One model, if a thread makes a blocking system call :
• B. a part of the process will stay blocked, with the rest running
• D. None of these
100 . In the Many to One model, multiple threads are unable to run in parallel on
multiprocessors because :
• D. None of these
• A. increased concurrency
• B. decreased concurrency
102 In the One to One model when a thread makes a blocking system call :
• D. None of these
103 . Which of the following is the drawback of the One to One Model ?
• D. None of these
105 . in the Many to Many model when a thread performs a blocking system call :
• D. None of these
107 . When a web page is loading, and the user presses a button on the browser to stop loading
the page :
• B. the thread loading the page does not stop, but continues with another task
108 . When one thread immediately terminates the target thread, it is called :
• A. Asynchronous cancellation
• B. Systematic cancellation
• C. Sudden Termination
• D. Deferred cancellation
Sub: OSY Unit-3 Process management
Sub: OSY Unit-3 Process management
Sub: OSY Unit-4 CPU Scheduling & Algorithm
Answer: B
49.
Answer: A
Sub: OSY Unit-4 CPU Scheduling & Algorithm
50.
Answer: C
51.
Answer: E
52.
Answer: D
Sub: OSY Unit-4 CPU Scheduling & Algorithm
53.
Answer: C
54.
Answer: C
55.
Answer: B
Sub: OSY Unit-5 Memory Management
Chapter no 5
9. What is compaction?
a) a technique for overcoming internal fragmentation
b) a paging technique
c) a technique for overcoming external fragmentation
d) a technique for overcoming fatal error
11.In Process Address Space, The loader generates these addresses at the time
when a program is loaded into main memory is ?
A. Symbolic addresses
B. Relative addresses
C. Physical addresses
D. None of the above
12 In Process Address Space, The variable names, constants, and instruction labels
are the basic elements of ____________.
A. Symbolic addresses
B. Relative addresses
C. Physical addresses
D. None of the above
Sub: OSY Unit-5 Memory Management
13. The set of all physical addresses corresponding to these logical addresses is
referred to as?
14. With ________, the absolute program (and data) is loaded into memory in
order for execution to start.
A. Static loading
B. Dynamic Loading
C. Static Linking
D. Dynamic Linking
15. when ________ is used, the linker combines all other modules needed by a
program into a single executable program to avoid any runtime dependency.
A. Static loading
B. Dynamic Loading
C. Static Linking
D. Dynamic Linking
A. 2
B. 3
C. 4
D. 5
View Answer
A. External fragmentation
B. Internal fragmentation
C. Both A and B
D. None of the above
View Answer
A. Fragmentation
B. Frames
C. Paging
D. Address Translation
View Answer
20. A computer can address more memory than the amount physically installed
on the system. This extra memory is actually called ______________.
A. Virtual Memory
B. Physical Memory
C. Logical Memory
D. Secondary Memory
Sub: OSY Unit-5 Memory Management
22. While executing a program, if the program references a page which is not
available in the main memory then it is known as?
A. Demand Paging
B. Frame Fault
C. page fault
D. processor fault
24. Which algorithm is based on the argument that the page with the smallest
count?
A. Primary Memory
B. secondary memory
C. virtual memory
D. CPU
26. Because of virtual memory, the memory can be shared among ____________
a) processes
b) threads
c) instructions
d) none of the mentioned
27._____ is the concept in which a process is copied into the main memory from
the secondary memory according to the requirement.
a) Paging
b) Demand paging
c) Segmentation
d) Swapping.
30. When a program tries to access a page that is mapped in address space but
not loaded in physical memory, then ____________
a) segmentation fault occurs
b) fatal error occurs
c) page fault occurs
d) no error occurs
35 .a process is copied into the main memory from the secondary memory
a) Swapping
b) Paging
c) Segmentation
d) Demand paging
a.segmentation
B Swapping
c. Demand Paging
39.
a.
a)Virtual Memory
b)Interrupts
c)Main memory
D)Cache memory
40. The mechanism that bring a page into memory only when it is needed is called
_____________
A Segmentation
B Fragmentation
Sub: OSY Unit-5 Memory Management
C Demand Paging
D Page Replacement
• A. processes
• B. threads
• C. instructions
• D. none of the mentioned
42 _____ is the concept in which a process is copied into main memory from the
secondary memory according to the requirement.
• A. Paging
• B. Demand paging
• C. Segmentation
• D. Swapping
43 . The pager concerns with the:
• A. primary memory
Sub: OSY Unit-5 Memory Management
• B. secondary memory
• C. CPU
• D. none of the mentioned
45. When a program tries to access a page that is mapped in address space but
not loaded in physical memory, then?
• A. page-fault rate
• B. hit ratio
• C. memory access time
• D. none of the mentioned
47. In FIFO page replacement algorithm, when a page must be replaced:
49. Working set model for page replacement is based on the assumption of:
• A. modularity
• B. locality
• C. globalization
• D. random access
50. Fragmentation is
51 . When using counters to implement LRU, we replace the page with the
Sub: OSY Unit-5 Memory Management
____________
a) smallest time value
b) largest time value
c) greatest size
d) none of the mentioned
53 . There is a set of page replacement algorithms that can never exhibit Belady’s
Anomaly, called ____________
a) queue algorithms
b) stack algorithms
c) string algorithms
d) none of the mentioned
58 . What is the reason for using the LFU page replacement algorithm?
a) an actively used page should have a large reference count
b) a less used page has more chances to be used again
c) it is extremely efficient and optimal
d) all of the mentioned
59 . What is the reason for using the MFU page replacement algorithm?
a) an actively used page should have a large reference count
b) a less used page has more chances to be used again
c) it is extremely efficient and optimal
d) all of the mentioned
60 . The implementation of the LFU and the MFU algorithm is very uncommon
because ____________
a) they are too complicated
b) they are optimal
c) they are expensive
d) all of the mentioned
61. Which of the following page replacement algorithms suffers from Belady’s
Anomaly?
a) Optimal replacement
Sub: OSY Unit-5 Memory Management
b) LRU
c) FIFO
d) Both optimal replacement and FIFO
62. A process refers to 5 pages, A, B, C, D, E in the order : A, B, C, D, A, B, E, A, B, C,
D, E. If the page replacement algorithm is FIFO, the number of page transfers with
an empty internal store of 3 frames is?
a) 8
b) 10
c) 9
d) 7
63. In question 62, if the number of page frames is increased to 4, then the
number of page transfers ____________
a) decreases
b) increases
c) remains the same
d) none of the mentioned
64. A memory page containing a heavily used variable that was initialized very
early and is in constant use is removed, then the page replacement algorithm
used is ____________
a) LRU
b) LFU
c) FIFO
d) None of the mentioned
65. A virtual memory system uses First In First Out (FIFO) page replacement policy
and allocates a fixed number of frames to a process. Consider the following
statements.
P : Increasing the number of page frames allocated to a process sometimes
increases the page fault rate
Q : Some programs do not exhibit locality of reference
Which of the following is TRUE?
a) Both P and Q are true, and Q is the reason for P
b) Both P and Q are true, but Q is not the reason for P
Sub: OSY Unit-5 Memory Management
c) P is false but Q is true
d) Both P and Q are false
66. Users _______ that their processes are running on a paged system.
a) are aware
b) are unaware
c) may unaware
d) none of the mentioned
67. If no frames are free, _____ page transfer(s) is/are required.
a) one
b) two
c) three
d) four
68. When a page is selected for replacement, and its modify bit is set
____________
a) the page is clean
b) the page has been modified since it was read in from the disk
c) the page is dirty
d) the page has been modified since it was read in from the disk & page is dirty
68. The aim of creating page replacement algorithms is to ____________
a) replace pages faster
b) increase the page fault rate
c) decrease the page fault rate
d) to allocate multiple pages to processes
69. A FIFO replacement algorithm associates with each page the _______
a) time it was brought into memory
b) size of the page in memory
c) page after and before it
d) all of the mentioned
70. What is the Optimal page – replacement algorithm?
a) Replace the page that has not been used for a long time
b) Replace the page that has been used for a long time
Sub: OSY Unit-5 Memory Management
c) Replace the page that will not be used for a long time
d) None of the mentioned
71. Optimal page – replacement algorithm is difficult to implement, because
____________
a) it requires a lot of information
b) it requires future knowledge of the reference string
c) it is too complex
d) it is extremely expensive
72. LRU page – replacement algorithm associates with each page the ______
a) time it was brought into memory
b) the time of that page’s last use
c) page after and before it
d) all of the mentioned
73. For 3 page frames, the following is the reference string:
70120304230321201701
How many page faults does the LRU page replacement algorithm produce?
a) 10
b) 15
c) 11
d) 12
74. What are the two methods of the LRU page replacement policy that can be
implemented in hardware?
a) Counters
b) RAM & Registers
c) Stack & Counters
d) Registers
75. __________ has the lowest fault rate of all the page replacement algorithms.
a) Optimal page replacement algorithm
b) LRU replacement algorithm
c) FIFO
d) Counting based
Sub: OSY Unit-5 Memory Management
76. Optimal page replacement algorithm is also called as __________
a) LIFO
b) NRU
c) Clairvoyant replacement algorithm
d) Page buffering
77. In a optimal page replacement algorithm, when a page is to be replaced,
which of the following pages is chosen?
a) Oldest page
b) Newest page
c) Frequently occurred page in the future
d) Not frequently occurred page in the future
78. A page that is not going to be used for the next 7 seconds will be swapped out
over a page that is going to be used within the next 0.7 seconds.
a) True
b) False
79. Analysis of the optimal paging problem has been done through___________
a) Deterministic algorithm
b) Online algorithm
c) Euclid algorithm
d) Optimal algorithm
80. Optimal page replacement algorithm is implemented in __________
a) General-purpose operating system
b) Special-purpose operating system
c) In any kind of operating system
d) In Windows only
81. Optimal page replacement algorithm is said to satisfy __________
a) Online algorithm
b) Stack algorithm
c) Queue algorithm
d) Array algorithm
82. In a stack algorithm, the set of pages in a k-frame memory is always a subset
of pages in a __________ frame memory.
Sub: OSY Unit-5 Memory Management
a) k-1
b) k
c) k+1
d) k(k+1)
83. When all software that runs on a system is known beforehand, optimal page
replacement algorithm can be used in a general-purpose operating system.
a) True
b) False
84. Consider a reference string 7,0,1,2,0,3,0,4,2,3,0,3,2,1,2,0,1,7,0,1 of frame size
3. Calculate the number of page faults using optimal page replacement algorithm.
a) 10
b) 9
c) 8
d) 7
85. Consider a reference string 7,0,1,2,0,3,0,4,2,3,0,3,2,1,2,0,1,7,0,1 of frame size
4. Calculate the number of page faults using optimal page replacement algorithm.
a) 7
b) 9
c) 8
d) 6
86. Consider a reference string 1,2,3,2,1,5,2,1,6,2,5,6,3,1,3,6,1,2,4,3 of frame size
3. Calculate the number of page faults using optimal page replacement algorithm.
a) 12
Sub: OSY Unit-5 Memory Management
b) 16
c) 14
d) 15
87. Which algorithm chooses the page that has not been used for the longest
period of time whenever the page required to be replaced?
A. first in first out algorithm
B. additional reference bit algorithm
C. least recently used algorithm
D. counting based page replacement algorithm
88. A process is thrashing if:
A. it is spending more time paging than executing
B. it is spending less time paging than executing
C. page fault occurs
D. swapping can not take place
89. Working set model for page replacement is based on the assumption of:
A. modularity
B. locality
C. globalization
D. random access
90. In FIFO page replacement algorithm, when a page must be replaced:
A. oldest page is chosen
B. newest page is chosen
C. random page is chosen
D. none of the mentioned
91. CPU fetches the instruction from memory according to the value of:
Sub: OSY Unit-5 Memory Management
A. program counter
B. status register
C. instruction register
D. program status word
92. Which one of the following is the address generated by CPU?
A. physical address
B. absolute address
C. logical address
D. none of the mentioned
93. Run time mapping from virtual to physical address is done by:
A. memory management unit
B. CPU
C. PCI
D. none of the mentioned
94. Memory management technique in which system stores and retrieves data
from secondary storage for use in main memory is called:
A. fragmentation
B. paging
C. Mapping
D. none of the mentioned
95. Program always deals with:
A. logical address
B. absolute address
C. physical address
D. relative address
Sub: OSY Unit-5 Memory Management
96. The page table contains:
A. base address of each page in physical memory
B. page offset
C. page size
D. none of the mentioned
97. What is compaction?
A. a technique for overcoming internal fragmentation
B. a paging technique
C. a technique for overcoming external fragmentation
D. a technique for overcoming fatal error
98. Operating System maintains the page table for:
A. each process
B. each thread
C. each instruction
D. each address
99. In contiguous memory allocation :
A. each process is contained in a single contiguous section of memory
B. all processes are contained in a single contiguous section of memory
C. the memory space is contiguous
D. None of these
100. In fixed sized partition, the degree of multiprogramming is bounded by
___________.
A. the number of partitions
B. the CPU utilization
C. the memory size
Sub: OSY Unit-5 Memory Management
D. All of these
Sub: OSY Unit-5 Memory Management
Sub: OSY Unit-6 File Management
1. Which of the following is/are the technique(s) for performing I/O
management function.
A) Programmed I/O
B) Interrupt driven I/O
C) Direct Memory Access
D) All of the above
9. ………………. layer deals with the logical structure of files and with the
operations that can be specified by users such as open, close, read and write.
A) Physical organization
B) File system
C) Directory management
D) Scheduling and control
10. When a user process issues an I/O request, the operating system assigns a
buffer in the system portion of main memory to the operation is called …………..
A) Double buffer
B) Single buffer
C) Linear buffer
D) Circular buffer
11. …………….. may be inadequate if the process performs rapid bursts of I/O.
A) Double buffering
B) Single buffering
C) Linear buffering
D) Circular buffering
12. On a movable head system, the time it takes to position the head at the
track is known as …………
A) seek time
Sub: OSY Unit-6 File Management
B) rotational delay
C) access time
D) Transfer time
13. The time disk controller takes for the beginning of the sector to reach the
head is known as ……………..
A) seek time
B) rotational delay
C) access time
D) Transfer time
14. The ……………….. consists of two key components: the initial startup time,
and the time taken to traverse the tracks that have to be crossed once the
access arm is up to speed.
A) seek time
B) rotational delay
C) access time
D) Transfer time
15. The ……………… policy is to select the disk I/O request that requires the least
movement of the disk arm from its current position.
A) Last in first out
B) Shortest service time first
C) Priority by process
D) Random scheduling
Sub: OSY Unit-6 File Management
16. In ………………. policy, when the last track has been visited in one direction,
the arm is returned to the opposite end of the disk and the scan begins again.
A) Last in first out
B) Shortest service time first
C) SCAN
D) Circular SCAN
17. Which of the following is/are the characteristics of RAID architecture.
i) RAID is set of physical disk drives viewed by the operating system as a single
logical drive
ii) Data are distributed across the physical drives of an array
iii) It is used to store parity information, which guarantees data recoverability
in case of disk failure.
A) i and ii only
B) ii and iii only
C) i and iiii only
D) All i, ii and iii
18. …………….. is not a true member of RAID family, because it does not include
redundancy to improve performace.
A) RAID Level 0
B) RAID Level 1
C) RAID Level 2
D) RAID Level 3
C) RAID Level 2
D) RAID Level 3
20. In the ………………… scheme, two different parity calculations are carried out
an stored in separate blocks on different disks.
A) RAID Level 4
B) RAID Level 5
C) RAID Level 6
D) RAID Level 3
21. Reliability of files can be enhanced by :
a)by keeping duplicate copies of the file
b) making a different partition for the files
c) by keeping them in external storage
d) keeping the files safely in the memory
22. security is only provided at the _____ level.
a) none of the mentioned
b) high
c) central
d) lower
23. The major issue with access control lists is :
a) their maintenance
b) all of the mentioned
c) their permissions
d) their length
a) file
b) swap space
c) directory
d) text format
a) name
b) type
c) identifier
a) swap space
b) operating system
32. RAID level 3 supports a lower number of I/Os per second, because
_______________.
D. All of these
33. RAID level _____ is also known as block interleaved parity organisation and
uses block level striping and keeps a parity block on a seperate disk.
A. 1
B. 2
C. 3
D. 4
D. None of these
D. None of these
A. low
B. very low
C. high
D. None of these
38. RAID level ____ spreads parity and data among all N+1 disks rather than
storing data in N disks and parity in 1.
A. 3
B. 4
C. 5
Sub: OSY Unit-6 File Management
D. 6
39. RAID level 0+1 is used because, RAID level 0 provides ______ whereas RAID
level 1 provides ________.
A. performance, redundancy
B. performance, reliability
C. redundancy, performance
D. None of these
40. If a disk fails in RAID level ___ rebuilding lost data is easiest.
A. 1
B. 2
C. 3
D. 4
42. RAID level ______ is also known as memory style error correcting
code(ECC) organization.
A. 1
B. 2
C. 3
D. 4
A. efficiency
B. enough storage space for data
Sub: OSY Unit-6 File Management
C. storage overhead
D. time consumption overhead View Answer
A. aging
B. scheduling
C. redundancy
D. disks
45. RAID level ________ refers to disk arrays with striping at the level of blocks,
but without any redundancy.
A. 0
B. 1
C. 2
D. 3
A. 0
B. 1
C. 2
D. 3
47. RAID level ______ is also known as bit interleaved parity organisation.
A. 0
B. 1
C. 2
D. 3
48. Data cannot be written to secondary storage unless written within a
______
a) file
b) swap space
Sub: OSY Unit-6 File Management
c) directory
d) text format
49. A file is a/an _______ data type.
a) abstract
b) primitive
c) public
d) private
50. In UNIX, what will the open system call return?
a) pointer to the entry in the open file table
b) pointer to the entry in the system wide table
c) a file to the process calling it
d) none of the mentioned
1) Which of the following is not an operating system?
a) Windows
b) Linux
c) Oracle
d) DOS
a) 4
b) 5
c) 8
d) 12
a) .txt
b) .xls
c) .ppt
d) .bmp
e)
a) prompt
b) kernel
c) shell
d) command
6) What is the full name of FAT?
7) BIOS is used?
a) By operating system
b) By compiler
c) By interpreter
d) By application software
9) What are the services operating System provides to both the users and to
the programs?
A. Protection
B. Program execution
C. I/O operations
D. All of the above
A. Operating system does not provides the access to the I/O device
B. I/O operation means read or write operation
C. An I/O subsystem comprises of I/O devices
D. None of the above
13) To access the services of operating system, the interface is provided by the:
• A. system calls
• B. API
• C. library
• D. assembly instructions
B .system interface
c.design interface
d. both b & c
23) Which command be used to clear the screen and display the operating
system prompt on the first line of the display?
a. Cd
b. Md
c. Rename
d. cls
3. MS-DOS developed in
a. 1991
b. 1984
c. 1971
d. 1961
Correct Answer: b
44. Which command be used to clear the screen and display the operating
system prompt on the first line of the display?
a. Cd
b. Md
c. Rename
d. cls
Correct Answer: d
13. To copy the hidden system files of DOS to another disk you can use the
command
a. Copy
b. Ren
c. Sys
d. Diskcopy
Correct Answer: c
16. The command used to copy a file named temp.doc from drive C: to drive A:
is
a. Copy temp.doc to a:
b. Copy c:\temp.doc a:
c. Copy c: a:
d. Copy temp a: c:
Correct Answer: b
22. Which command be used to ask you to confirm that you want to delete the
directory?
a. Deltree
b. Deltree/f
c. Del *.*/p
d. Erase *.*
Correct Answer: c
26. The deleted file in MS-DOS can be recovered if you use the command
mention below immediately, the command is:
a. DO NOT DELETE
b. NO DELETE
c. UNDELETE
d. ONDELETE
Correct Answer: c
28. While working with MS-DOS which key is used to get the p[revious
command used:
a. F3
b. F1
c. F6
d. F9
Correct Answer: a
37. While working with MS-DOS, which command is used to copying the files to
transfer from one PC to another one?
a. Rename
b. Path
c. Dir
d. Copy
Correct Answer: d
Correct Answer: d
43) To run the script, we should make it executable first by using _____
• A. chmod +x
• B. chmod +r
• C. chmod +w
• D. chmod +rwx
44) What are positional parameters?
• A. special variables for assigning arguments from the command line
• B. pattern matching parameters
• C. special variables for reading user input
• D. special variables and patterns
45) Unix is a
• A. Single User, Single tasking OS
• 0B. Single User, Multi-tasking OS
• C. Multi-User, Multi- tasking OS
• D. None
A) Kernel services
B) Library services
2. The system of ................ generally ran one job at a time. These were called single stream batch
processing.
A) 40's
B) 50's
C) 60's
D) 70's
3. In ..............generation of operating system, operating system designers develop the concept of
multiprogramming in which several jobs are in main memory at once.
A) First
B) Second
C) Third
D) Fourth
i) In spooling high speed device like a disk is interposed between running program and low-speed device
in Input/output.
ii) By using spooling for example instead of writing directly to a printer, outputs are written to the disk.
A) i-True, ii-False
B) i-True, ii-True
C) i-False, ii-True
D) i-False, ii-False
5. Which of the following is/are the functions of operating system?
i) Sharing hardware among users. ii) Allowing users to share data among themselves.
iii) Recovering from errors. iv) Preventing users from interfering with one another.
6.executes must frequently and makes the fine grained decision of which process to
execute the next.
A) Long-term scheduling
B) Medium-term scheduling
C) Short-term scheduling
7. With ................ a page is brought into main memory only when the reference is made to a location
on that page.
A) demand paging
B) main paging
C) prepaging
D) postpaging
8.provides a larger sized of virtual memory but require virtual memory which provides
multidimensional memory.
A) Paging method
B) Segmentation method
D) None of these
9.is a large kernel containing virtually the complete operating system, including,
scheduling, file system, device drivers and memory management.
A) Multilithic kernel
B) Monolithic kernel
C) Micro kernel
D) Macro kernel
A) Multilithic kernel
B) Monolithic kernel
C) Micro kernel
D) Macro kernel
A) File management
C) Inter-process communication
i) Mutual exclusion a) A process may hold allocated resources while waiting assignment.
ii) Hold and wait b) No resource can be forcibly removed from a process holding it.
A) Mutual exclusion
C) Circular waits
D) No preemption
14. The methods or algorithms which are used to increase the performance of disk storage sub-system
is called .............
A) Disk performing
B) Disk scheduling
C) Disk storing
D) Disk extending
15.is the time required to move the disk arm to the required track.
A) Seek time
B) Rotational delay
C) Latency time
D) Access time
A) SCAN
B) C-SCAN
C) N-Step SCAN
D) Both A and B
17.policy selects the disk I/O request that requires the least movement of the disk arm
from its current position.
A) FSCAN
B) SSTF
C) SCAN
D) C-SCAN
A) Multithreading
B) Multiprocessing
C) Multiexecuting
D) Bi-threading
A) i-True, ii-False
B) i-True, ii-True
C) i-False, ii-True
D) i-False, ii-False
20.is a special type of programming language used to provide instructions to the monitor
simple batch processing schema.
21.The first batch operating system was developed in the ................ by General Motors for use on an
IBM 701.
A) mid 1940's
B) mid 1950's
C) mid 1960's
D) mid 1970's
A) A program in execution
23. is a facility that allows programmers to address memory from a logical point of view,
without regard to the main memory, physically available.
A) Visual memory
B) Real memory
C) Virtual memory
D) Secondary memory
24. is a large kernel, including scheduling file system, networking, device drivers, memory
management and more.
A) Monolithic kernel
B) Micro kernel
C) Macro kernel
D) Mini kernel
25. A .................... architecture assigns only a few essential functions to the kernel, including
address spaces, Inter process communication(IPC) and basic scheduling.
A) Monolithic kernel
B) Micro kernel
C) Macro kernel
D) Mini kernel
i) Multithreading is useful for application that perform a number of essentially independent tasks that
do not be serialized.
ii) An example of multithreading is a database server that listens for and process numerous client
request.
A) i-True, ii-False
B) i-True, ii-True
C) i-False, ii-True
D) i-False, ii-False
27. ...................... With only one process can execute at a time; meanwhile all other process are
waiting for the processer. With more than one process can be running simultaneously each on a
different processer.
A) Multiprocessing, Multiprogramming
B) Multiprogramming, Uniprocessing
C) Multiprogramming, Multiprocessing
D) Uniprogramming, Multiprocessing
D) None of above
29. ............. refers to the ability of multiple process (or threads) to share code, resources or data in
such a way that only one process has access to shared object at a time.
A) Synchronization
B) Mutual Exclusion
C) Dead lock
D) Starvation
30. .................is the ability of multiple process to co-ordinate their activities by exchange of
information
A) Synchronization
B) Mutual Exclusion
C) Dead lock
D) Starvation
31. ..............refers to a situation in which a process is ready to execute but is continuously denied
access to a processor in deference to other processes.
A) Synchronization
B) Mutual Exclusion
C) Dead lock
D) Starvation
32. Which of the following is not the approach to dealing with deadlock?
A) Prevention
B) Avoidance
C) Detection
D) Deletion
33. Which of the following are the states of a five state process model?
A) i only
B) ii only
C) i and ii only
D) None
B) Inter request
C) Timing
D) All of the above
36. The different types of tables maintained by the operating system are .............
C) Process switching
i) User data ii) System Data iii) User program iv) System stack
40. Match the following mechanisms for interrupting the execution of a process and their uses.
A) Thread
B) Lightweight process
C) Process
D) Both A and B
42. ................is a example of an operating system that support single user process and single thread.
A) UNIX
B) MS-DOS
C) OS/2
D) Windows 2000
i) Unix, support multiple user process but only support one thread per process.
ii) A java run time environment is an example of a system of one process with multiple threads.
A) True, False
B) True, True
C) False, True
D) False, False
44. are very effective because a mode switch is not required to switch from one thread to
another.
A) Kernel-level threads
B) User-level threads
C) Alterable threads
45. . is a condition in which there is a set of concurrent processes, only one of which is able to
access a given resource or perform a given function at any time.
A) Mutual Exclusion
B) Busy Waiting
C) Deadlock
D) Starvation
46. Techniques can be used to resolve conflicts, such as competition for resources, and to
synchronize processes so that they can cooperate.
A) Mutual Exclusion
B) Busy Waiting
C) Deadlock
D) Starvation
47. Can be defined as the permanent blocking of a set of processed that either complete for
system resources or communicate with each other.
A) Deadlock
B) Permanent lock
C) Starvation
D) Mutual exclusion
48. The following conditions of policy must be present for a deadlock to be possible.
A) Mutual exclusion
B) Hold and wait
C) Circular waits
D) No preemption
i) With paging, each process is divided into relatively small, fixed-size pages.
A) Partition management
B) Memory management
C) Disk management
51. ......... Involves treating main memory as a resource to be allocated to and shared among a
A) Partition management
B) Memory management
C) Disk management
52. A process that execute only in main memory is referred to as .............. and that allocated in disk is
referred to a …………….
53. In process scheduling, ................... determines when new processes are admitted to the system.
55. The sum of the seek time, and the rotational delay is called the ………………..
A) reached time
B) access time
C) arrived time
D) common time
56. The ............... policy segments the disks request queue into sub queues of the length N.
A) SCAN
B) C-SCAN
C) N-Step SCAN
D) FSCAN
59. ...................The Determines when a page should be brought into main memory.
A) Fetch policy
B) Placement policy
C) Replacement policy
60. With.................... A page is written out to secondary memory only when it has been selected for
replacement.
A) pre-cleaning
B) demand cleaning
C) required cleaning
D) fast cleaning
B) a program only
C) a processor state
62. The mechanism that brings a page into memory only when it is needed is called.....
A) segmentation
B) fragmentation
C) demand paging
D) page replacement
A) call, reply
C) send, receive
B) spontaneous
C) active
D) impulse
A) preemptive scheduling
66. ………. ensures that once transaction completes successively, the results of the operations become
permanent.
A) serializability
B) synchronizability
C) atomicity
D) durability
A) ready queue
B) device queue
C) i/o queue
D) waiting queue
B) Serializability
C) Durability
D) Atomicity
A) task
B) process
C) program
71. The interval from the fine submission of a process to the time of completion is the......
A) waiting time
B) blocked time
C) turnaround time
D) response time
74. To ensure that the ......... condition never occurs in the system, we must guarantee that, whenever a
process requests a resource, it does not have any other resource.
A) mutual exclusion
B) no-preemption
C) circular waits
76. A program responsible for assigning the CPU to the process that has been selected by the short
term scheduler is known as.........
A) scheduler
B) dispatcher
C) debugger
D) compiler
77. The ..........instruct Kernel to do various operations of the calling program and exchange data
between the Kernel at the program.
A) shell
B) editors
C) system calls
D) commands
78. Which of the following buffering strategies are used in interprocess communication?
A) null pointer
79. The process of splitting of data into equal size partitions over multiple disks is known as .....
A) data stripping
B) array of disks
C) RAID
D) SCAN
80. Pipes allow transfer of data between processor in a ........ manner.
C) multilevel queue
81. The process of storing extra or duplicate information used for rebuilding the lost information in
event of disks failure is known as...
A. stripping
B. redundancy
C. disk array
D. RAID
A. target thread
B. thread cancellation
C. asynchronous cancellation
D. defined cancellation
83. ......... ensures the every message sent to a group of receivers will be delivered to either all of them
or none of them.
A. Ordered delivery
B. Atomicity
B. Survivability
D. Reliability
A. pile
B. file
C. disk
D. directory
A. User mode
B. System mode
C. Unprivileged mode
D. Process mode
86. The technique, for sharing the time of a computer among several jobs, which switches jobs so
rapidly such that each job appears to have the computer to itself, is called........
A. time sharing
B. time out
C. time domain
D. multitasking
87. For batch and payroll applications which of the following file organization is better........
A. random file
B. sequential file
C. indexed file
D. hashed file
88. Name the scheduler that selects among the processes that are ready to execute and allocates
the CPU to one of them.
C. Job scheduler
C. multidatagram messages
D. message passing
90. The process of direct mapping by using some faster algorithms is called as.........
A. hashing
B. searching
C. sorting
D. indexing
91. Name the system in which the processors do not share memory and each processor that its
own local memory.
92. Which technique was introduced because a single job could not keep both the CPU and I/O
devices busy?
A. Time-sharing
B. Spooling
C. preemptive scheduling
D. Multiprogramming
93. Those directories in which the root directory has all system file and no other sub-directory is
known as ...
A. flat directory
B. single directory
C. hierarchical directory
D. indexed directory
94. Which is responsible for maintaining all the important abstractions of the operating system?
A. Kernel
B. System libraries
C. System utilities
D. Daemons
95. A four message reliable IPC protocol for client server communication works as........
A. absolute
B. relative
C. hybrid
D. hierarchical
D. Heap allocation
A. reliability
B. repeatability
C. Survivability
D. flexibility
99. All path names are specified relative to the working directory........
A. absolute path name
100. The time taken by the disk arm to locate the specific address of a sector for getting information
is called........
A. rotational latency
B. seek time
C. search time
D. response time
Sub: OSY Unit-3 Process management
1. A Process Control Block(PCB) does not contain which of the following?
a) Code
b) Stack
c) Bootstrap program
d) Data
a) Output
b) Throughput
c) Efficiency
d) Capacity
a) New
b) Old
c) Waiting
d) Running
b) Data Structure
d) A Block in memory
Sub: OSY Unit-3 Process management
6. The entry of all the PCBs of the current processes is in __________
a) Process Register
b) Program Counter
c) Process Table
d) Process Unit
B. Job queue
C. Ready queue
D. Device queues
10. The processes which are blocked due to unavailability of an I/O device constitute this
queue.
B. Job queue
C. Ready queue
D. Device queues
Sub: OSY Unit-3 Process management
11) Two-state process model refers to?
A. running states
B. non-running states
C. Both A and B
A. Long-Term Scheduler
B. Short-Term Scheduler
C. Medium-Term Scheduler
A. Long-Term Scheduler
B. Short-Term Scheduler
C. Medium-Term Scheduler
14.When the suspended process is moved to the secondary storage. This process is called?
A. process mix.
B. swapping
C. Swap-In
D. Swap-Out
A. Long-Term Scheduler
B. Short-Term Scheduler
C. Medium-Term Scheduler
Sub: OSY Unit-3 Process management
D. Swapping
A. Long-Term Scheduler
B. Short-Term Scheduler
C. Medium-Term Scheduler
D. Swapping
A. PCB
B. Program Counter
C. Scheduling information
D. context switch
a) allows processes to communicate and synchronize their actions when using the same
address space
b) allows processes to communicate and synchronize their actions without using the same
address space
c) share data
22. The link between two processes P and Q to send and receive messages is called __________
a) communication link
b) message-passing link
c) synchronization link
c) Exactly N/2 links exist between each pair of processes(N = max. number of processes
supported by system)
a) there is another process R to handle and pass on the messages between P and Q
25. Bounded capacity and Unbounded capacity queues are referred to as __________
a) Programmed buffering
b) Automatic buffering
d) No buffering
a) program counter
b) stack
a) single threaded
b) multithreaded
28. If one thread opens a file with read privileges then ___________
a) other threads in the another process can also read from that file
b) other threads in the same process can also read from that file
Sub: OSY Unit-3 Process management
c) any other thread can not read from that file
28. The time required to create a new thread in an existing process is ___________
c) thread completes
a) running
Sub: OSY Unit-3 Process management
b) parsing
c) ready
d) blocked
32 The register context and stacks of a thread are deallocated when the thread?
a) terminates
b) blocks
c) unblocks
d) spawns
a) program counter
b) stack
a) single threaded
b) multithreaded
36.If one thread opens a file with read privileges then ___________
a) other threads in the another process can also read from that file
b) other threads in the same process can also read from that file
39 BIOS is used?
By operating system
By compiler
By interpreter
By application softwar
41 .A thread shares its resources(like data section, code section, open files, signals) with
___________
a) other process similar to the one that the thread belongs to
b) other threads that belong to similar processes
c) other threads that belong to the same process
d) all of the mentioned
43 The systems which allows only one process execution at a time, are called:
• A. uniprogramming systems
• B. uniprocessing systems
• C. unitasking systems
• B. open files
• A. fork
• B. create
• C. new
• A. normal exit
• B. fatal error
• B. when process is unable to run until some task has been completed
• A. function parameters
• B. local variables
• C. return addresses
Sub: OSY Unit-3 Process management
• D. PID of child process
51. Which system call returns the process identifier of a terminated child?
• A. wait
• B. exit
• C. fork
• D. get
52. The address of the next instruction to be executed by the current process is provided by
the:
• A. CPU registers
• B. program counter
• C. process stack
• D. pipe
53. . A Process Control Block(PCB) does not contain which of the following :
• A. code
• B. stack
• C. Process State
• E. bootstrap program
54. The number of processes completed per unit time is known as __________.
• A. output
• B. Throughput
Sub: OSY Unit-3 Process management
• C. Efficiency
• D. Capacity
• A. new
• B. old
• C. Waiting
• D. Running
• E. Terminate
• B. Data Structure
• D. a Block in memory
• B. Program Counter
• C. Process Table
• D. Process Unit
• C. All of these
• A. Job Queue
• B. PCB queue
• C. Device Queue
• D. Ready Queue
• D. No
64 .If all processes I/O bound, the ready queue will almost always be ______, and the Short
term Scheduler will have a ______ to do.
• A. full,little
• B. full,lot
• C. empty,little
• D. empty,lot
• D. None of these
Sub: OSY Unit-3 Process management
• D. None of these
67 The primary distinction between the short term scheduler and the long term scheduler is
:
• D. None of these
68 The only state transition that is initiated by the user process itself is :
• A. block
• B. wakeup
• C. dispatch
• D. None of these
69 In a time-sharing operating system, when the time slot given to a process is completed, the
process goes from the running state to the :
• A. Blocked state
• B. Ready state
• C. Suspended state
Sub: OSY Unit-3 Process management
• D. Terminated state
70 In a multi-programming environment :
71. Suppose that a process is in “Blocked” state waiting for some I/O service. When the
service is completed, it goes to the :
• A. Running state
• B. Ready state
• C. Suspended state
• D. Terminated state
• C. memory-management information
• A. A device
• B. Timer
Sub: OSY Unit-3 Process management
• C. Scheduler process
• D. Power failure
74 .Several processes access and manipulate the same data concurrently and the outcome of
the execution depends on the particular order in which the access takes place, is called a(n)
____.
• B. Entry Section
• C. Race condition
• D. Process Synchronization
• A. blocked to running
• B. ready to running
• C. blocked to ready
• D. running to blocked
• A. program counter
• B. stack
• A. single threaded
• B. multithreaded
• A. other threads in the another process can also read from that file
• B. other threads in the same process can also read from that file
• C. thread completes
• A. running
• B. parsing
• C. ready
• D. blocked
83 .The register context and stacks of a thread are deallocated when the thread:
• A. terminated
• B. blocks
Sub: OSY Unit-3 Process management
• C. unblocks
• D. spawns
• C. process
• D. None of these
86 .A thread shares its resources(like data section, code section, open files, signals) with :
• D. All of these
• D. None of these
• D. None of these
• D. None of these
• A. decreases concurrency
• B. increases concurrency
• A. a part of
• B. the creator of
• C. unaware of
• D. aware of
93 . If the kernel is single threaded, then any user level thread performing a blocking system call
will :
• A. cause the entire process to run along with the other threads
• C. cause the entire process to block even if the other threads are available to run
• D. None of these
94 . Because the kernel thread management is done by the Operating System itself :
• C. kernel threads are easier to manage as well as create then user threads
• D. None of these
• A. the kernel can schedule another thread in the application for execution.
Sub: OSY Unit-3 Process management
• B. the kernel cannot schedule another thread in the same application for execution.
• C. the kernel must schedule another thread of a different application for execution.
• D. the kernel must schedule another thread of the same application on a different
processor.
• A. Context switch time is longer for kernel level threads than for user level threads
• D. Blocking one kernel level thread blocks all other related threads
97 The model in which one kernel thread is mapped to many user-level threads is called :
98 The model in which one user-level thread is mapped to many kernel level threads is called
:
Sub: OSY Unit-3 Process management
• A. Many to One model
. 99. In the Many to One model, if a thread makes a blocking system call :
• B. a part of the process will stay blocked, with the rest running
• D. None of these
100 . In the Many to One model, multiple threads are unable to run in parallel on
multiprocessors because :
• D. None of these
• A. increased concurrency
• B. decreased concurrency
102 In the One to One model when a thread makes a blocking system call :
• D. None of these
103 . Which of the following is the drawback of the One to One Model ?
• D. None of these
105 . in the Many to Many model when a thread performs a blocking system call :
• D. None of these
107 . When a web page is loading, and the user presses a button on the browser to stop loading
the page :
• B. the thread loading the page does not stop, but continues with another task
108 . When one thread immediately terminates the target thread, it is called :
• A. Asynchronous cancellation
• B. Systematic cancellation
• C. Sudden Termination
• D. Deferred cancellation
Sub: OSY Unit-3 Process management
Sub: OSY Unit-3 Process management
Sub: OSY Unit-4 CPU Scheduling & Algorithm
Answer: B
49.
Answer: A
Sub: OSY Unit-4 CPU Scheduling & Algorithm
50.
Answer: C
51.
Answer: E
52.
Answer: D
Sub: OSY Unit-4 CPU Scheduling & Algorithm
53.
Answer: C
54.
Answer: C
55.
Answer: B
Sub: OSY Unit-5 Memory Management
Chapter no 5
9. What is compaction?
a) a technique for overcoming internal fragmentation
b) a paging technique
c) a technique for overcoming external fragmentation
d) a technique for overcoming fatal error
11.In Process Address Space, The loader generates these addresses at the time
when a program is loaded into main memory is ?
A. Symbolic addresses
B. Relative addresses
C. Physical addresses
D. None of the above
12 In Process Address Space, The variable names, constants, and instruction labels
are the basic elements of ____________.
A. Symbolic addresses
B. Relative addresses
C. Physical addresses
D. None of the above
Sub: OSY Unit-5 Memory Management
13. The set of all physical addresses corresponding to these logical addresses is
referred to as?
14. With ________, the absolute program (and data) is loaded into memory in
order for execution to start.
A. Static loading
B. Dynamic Loading
C. Static Linking
D. Dynamic Linking
15. when ________ is used, the linker combines all other modules needed by a
program into a single executable program to avoid any runtime dependency.
A. Static loading
B. Dynamic Loading
C. Static Linking
D. Dynamic Linking
A. 2
B. 3
C. 4
D. 5
View Answer
A. External fragmentation
B. Internal fragmentation
C. Both A and B
D. None of the above
View Answer
A. Fragmentation
B. Frames
C. Paging
D. Address Translation
View Answer
20. A computer can address more memory than the amount physically installed
on the system. This extra memory is actually called ______________.
A. Virtual Memory
B. Physical Memory
C. Logical Memory
D. Secondary Memory
Sub: OSY Unit-5 Memory Management
22. While executing a program, if the program references a page which is not
available in the main memory then it is known as?
A. Demand Paging
B. Frame Fault
C. page fault
D. processor fault
24. Which algorithm is based on the argument that the page with the smallest
count?
A. Primary Memory
B. secondary memory
C. virtual memory
D. CPU
26. Because of virtual memory, the memory can be shared among ____________
a) processes
b) threads
c) instructions
d) none of the mentioned
27._____ is the concept in which a process is copied into the main memory from
the secondary memory according to the requirement.
a) Paging
b) Demand paging
c) Segmentation
d) Swapping.
30. When a program tries to access a page that is mapped in address space but
not loaded in physical memory, then ____________
a) segmentation fault occurs
b) fatal error occurs
c) page fault occurs
d) no error occurs
35 .a process is copied into the main memory from the secondary memory
a) Swapping
b) Paging
c) Segmentation
d) Demand paging
a.segmentation
B Swapping
c. Demand Paging
39.
a.
a)Virtual Memory
b)Interrupts
c)Main memory
D)Cache memory
40. The mechanism that bring a page into memory only when it is needed is called
_____________
A Segmentation
B Fragmentation
Sub: OSY Unit-5 Memory Management
C Demand Paging
D Page Replacement
• A. processes
• B. threads
• C. instructions
• D. none of the mentioned
42 _____ is the concept in which a process is copied into main memory from the
secondary memory according to the requirement.
• A. Paging
• B. Demand paging
• C. Segmentation
• D. Swapping
43 . The pager concerns with the:
• A. primary memory
Sub: OSY Unit-5 Memory Management
• B. secondary memory
• C. CPU
• D. none of the mentioned
45. When a program tries to access a page that is mapped in address space but
not loaded in physical memory, then?
• A. page-fault rate
• B. hit ratio
• C. memory access time
• D. none of the mentioned
47. In FIFO page replacement algorithm, when a page must be replaced:
49. Working set model for page replacement is based on the assumption of:
• A. modularity
• B. locality
• C. globalization
• D. random access
50. Fragmentation is
51 . When using counters to implement LRU, we replace the page with the
Sub: OSY Unit-5 Memory Management
____________
a) smallest time value
b) largest time value
c) greatest size
d) none of the mentioned
53 . There is a set of page replacement algorithms that can never exhibit Belady’s
Anomaly, called ____________
a) queue algorithms
b) stack algorithms
c) string algorithms
d) none of the mentioned
58 . What is the reason for using the LFU page replacement algorithm?
a) an actively used page should have a large reference count
b) a less used page has more chances to be used again
c) it is extremely efficient and optimal
d) all of the mentioned
59 . What is the reason for using the MFU page replacement algorithm?
a) an actively used page should have a large reference count
b) a less used page has more chances to be used again
c) it is extremely efficient and optimal
d) all of the mentioned
60 . The implementation of the LFU and the MFU algorithm is very uncommon
because ____________
a) they are too complicated
b) they are optimal
c) they are expensive
d) all of the mentioned
61. Which of the following page replacement algorithms suffers from Belady’s
Anomaly?
a) Optimal replacement
Sub: OSY Unit-5 Memory Management
b) LRU
c) FIFO
d) Both optimal replacement and FIFO
62. A process refers to 5 pages, A, B, C, D, E in the order : A, B, C, D, A, B, E, A, B, C,
D, E. If the page replacement algorithm is FIFO, the number of page transfers with
an empty internal store of 3 frames is?
a) 8
b) 10
c) 9
d) 7
63. In question 62, if the number of page frames is increased to 4, then the
number of page transfers ____________
a) decreases
b) increases
c) remains the same
d) none of the mentioned
64. A memory page containing a heavily used variable that was initialized very
early and is in constant use is removed, then the page replacement algorithm
used is ____________
a) LRU
b) LFU
c) FIFO
d) None of the mentioned
65. A virtual memory system uses First In First Out (FIFO) page replacement policy
and allocates a fixed number of frames to a process. Consider the following
statements.
P : Increasing the number of page frames allocated to a process sometimes
increases the page fault rate
Q : Some programs do not exhibit locality of reference
Which of the following is TRUE?
a) Both P and Q are true, and Q is the reason for P
b) Both P and Q are true, but Q is not the reason for P
Sub: OSY Unit-5 Memory Management
c) P is false but Q is true
d) Both P and Q are false
66. Users _______ that their processes are running on a paged system.
a) are aware
b) are unaware
c) may unaware
d) none of the mentioned
67. If no frames are free, _____ page transfer(s) is/are required.
a) one
b) two
c) three
d) four
68. When a page is selected for replacement, and its modify bit is set
____________
a) the page is clean
b) the page has been modified since it was read in from the disk
c) the page is dirty
d) the page has been modified since it was read in from the disk & page is dirty
68. The aim of creating page replacement algorithms is to ____________
a) replace pages faster
b) increase the page fault rate
c) decrease the page fault rate
d) to allocate multiple pages to processes
69. A FIFO replacement algorithm associates with each page the _______
a) time it was brought into memory
b) size of the page in memory
c) page after and before it
d) all of the mentioned
70. What is the Optimal page – replacement algorithm?
a) Replace the page that has not been used for a long time
b) Replace the page that has been used for a long time
Sub: OSY Unit-5 Memory Management
c) Replace the page that will not be used for a long time
d) None of the mentioned
71. Optimal page – replacement algorithm is difficult to implement, because
____________
a) it requires a lot of information
b) it requires future knowledge of the reference string
c) it is too complex
d) it is extremely expensive
72. LRU page – replacement algorithm associates with each page the ______
a) time it was brought into memory
b) the time of that page’s last use
c) page after and before it
d) all of the mentioned
73. For 3 page frames, the following is the reference string:
70120304230321201701
How many page faults does the LRU page replacement algorithm produce?
a) 10
b) 15
c) 11
d) 12
74. What are the two methods of the LRU page replacement policy that can be
implemented in hardware?
a) Counters
b) RAM & Registers
c) Stack & Counters
d) Registers
75. __________ has the lowest fault rate of all the page replacement algorithms.
a) Optimal page replacement algorithm
b) LRU replacement algorithm
c) FIFO
d) Counting based
Sub: OSY Unit-5 Memory Management
76. Optimal page replacement algorithm is also called as __________
a) LIFO
b) NRU
c) Clairvoyant replacement algorithm
d) Page buffering
77. In a optimal page replacement algorithm, when a page is to be replaced,
which of the following pages is chosen?
a) Oldest page
b) Newest page
c) Frequently occurred page in the future
d) Not frequently occurred page in the future
78. A page that is not going to be used for the next 7 seconds will be swapped out
over a page that is going to be used within the next 0.7 seconds.
a) True
b) False
79. Analysis of the optimal paging problem has been done through___________
a) Deterministic algorithm
b) Online algorithm
c) Euclid algorithm
d) Optimal algorithm
80. Optimal page replacement algorithm is implemented in __________
a) General-purpose operating system
b) Special-purpose operating system
c) In any kind of operating system
d) In Windows only
81. Optimal page replacement algorithm is said to satisfy __________
a) Online algorithm
b) Stack algorithm
c) Queue algorithm
d) Array algorithm
82. In a stack algorithm, the set of pages in a k-frame memory is always a subset
of pages in a __________ frame memory.
Sub: OSY Unit-5 Memory Management
a) k-1
b) k
c) k+1
d) k(k+1)
83. When all software that runs on a system is known beforehand, optimal page
replacement algorithm can be used in a general-purpose operating system.
a) True
b) False
84. Consider a reference string 7,0,1,2,0,3,0,4,2,3,0,3,2,1,2,0,1,7,0,1 of frame size
3. Calculate the number of page faults using optimal page replacement algorithm.
a) 10
b) 9
c) 8
d) 7
85. Consider a reference string 7,0,1,2,0,3,0,4,2,3,0,3,2,1,2,0,1,7,0,1 of frame size
4. Calculate the number of page faults using optimal page replacement algorithm.
a) 7
b) 9
c) 8
d) 6
86. Consider a reference string 1,2,3,2,1,5,2,1,6,2,5,6,3,1,3,6,1,2,4,3 of frame size
3. Calculate the number of page faults using optimal page replacement algorithm.
a) 12
Sub: OSY Unit-5 Memory Management
b) 16
c) 14
d) 15
87. Which algorithm chooses the page that has not been used for the longest
period of time whenever the page required to be replaced?
A. first in first out algorithm
B. additional reference bit algorithm
C. least recently used algorithm
D. counting based page replacement algorithm
88. A process is thrashing if:
A. it is spending more time paging than executing
B. it is spending less time paging than executing
C. page fault occurs
D. swapping can not take place
89. Working set model for page replacement is based on the assumption of:
A. modularity
B. locality
C. globalization
D. random access
90. In FIFO page replacement algorithm, when a page must be replaced:
A. oldest page is chosen
B. newest page is chosen
C. random page is chosen
D. none of the mentioned
91. CPU fetches the instruction from memory according to the value of:
Sub: OSY Unit-5 Memory Management
A. program counter
B. status register
C. instruction register
D. program status word
92. Which one of the following is the address generated by CPU?
A. physical address
B. absolute address
C. logical address
D. none of the mentioned
93. Run time mapping from virtual to physical address is done by:
A. memory management unit
B. CPU
C. PCI
D. none of the mentioned
94. Memory management technique in which system stores and retrieves data
from secondary storage for use in main memory is called:
A. fragmentation
B. paging
C. Mapping
D. none of the mentioned
95. Program always deals with:
A. logical address
B. absolute address
C. physical address
D. relative address
Sub: OSY Unit-5 Memory Management
96. The page table contains:
A. base address of each page in physical memory
B. page offset
C. page size
D. none of the mentioned
97. What is compaction?
A. a technique for overcoming internal fragmentation
B. a paging technique
C. a technique for overcoming external fragmentation
D. a technique for overcoming fatal error
98. Operating System maintains the page table for:
A. each process
B. each thread
C. each instruction
D. each address
99. In contiguous memory allocation :
A. each process is contained in a single contiguous section of memory
B. all processes are contained in a single contiguous section of memory
C. the memory space is contiguous
D. None of these
100. In fixed sized partition, the degree of multiprogramming is bounded by
___________.
A. the number of partitions
B. the CPU utilization
C. the memory size
Sub: OSY Unit-5 Memory Management
D. All of these
Sub: OSY Unit-5 Memory Management
Sub: OSY Unit-6 File Management
1. Which of the following is/are the technique(s) for performing I/O
management function.
A) Programmed I/O
B) Interrupt driven I/O
C) Direct Memory Access
D) All of the above
9. ………………. layer deals with the logical structure of files and with the
operations that can be specified by users such as open, close, read and write.
A) Physical organization
B) File system
C) Directory management
D) Scheduling and control
10. When a user process issues an I/O request, the operating system assigns a
buffer in the system portion of main memory to the operation is called …………..
A) Double buffer
B) Single buffer
C) Linear buffer
D) Circular buffer
11. …………….. may be inadequate if the process performs rapid bursts of I/O.
A) Double buffering
B) Single buffering
C) Linear buffering
D) Circular buffering
12. On a movable head system, the time it takes to position the head at the
track is known as …………
A) seek time
Sub: OSY Unit-6 File Management
B) rotational delay
C) access time
D) Transfer time
13. The time disk controller takes for the beginning of the sector to reach the
head is known as ……………..
A) seek time
B) rotational delay
C) access time
D) Transfer time
14. The ……………….. consists of two key components: the initial startup time,
and the time taken to traverse the tracks that have to be crossed once the
access arm is up to speed.
A) seek time
B) rotational delay
C) access time
D) Transfer time
15. The ……………… policy is to select the disk I/O request that requires the least
movement of the disk arm from its current position.
A) Last in first out
B) Shortest service time first
C) Priority by process
D) Random scheduling
Sub: OSY Unit-6 File Management
16. In ………………. policy, when the last track has been visited in one direction,
the arm is returned to the opposite end of the disk and the scan begins again.
A) Last in first out
B) Shortest service time first
C) SCAN
D) Circular SCAN
17. Which of the following is/are the characteristics of RAID architecture.
i) RAID is set of physical disk drives viewed by the operating system as a single
logical drive
ii) Data are distributed across the physical drives of an array
iii) It is used to store parity information, which guarantees data recoverability
in case of disk failure.
A) i and ii only
B) ii and iii only
C) i and iiii only
D) All i, ii and iii
18. …………….. is not a true member of RAID family, because it does not include
redundancy to improve performace.
A) RAID Level 0
B) RAID Level 1
C) RAID Level 2
D) RAID Level 3
C) RAID Level 2
D) RAID Level 3
20. In the ………………… scheme, two different parity calculations are carried out
an stored in separate blocks on different disks.
A) RAID Level 4
B) RAID Level 5
C) RAID Level 6
D) RAID Level 3
21. Reliability of files can be enhanced by :
a)by keeping duplicate copies of the file
b) making a different partition for the files
c) by keeping them in external storage
d) keeping the files safely in the memory
22. security is only provided at the _____ level.
a) none of the mentioned
b) high
c) central
d) lower
23. The major issue with access control lists is :
a) their maintenance
b) all of the mentioned
c) their permissions
d) their length
a) file
b) swap space
c) directory
d) text format
a) name
b) type
c) identifier
a) swap space
b) operating system
32. RAID level 3 supports a lower number of I/Os per second, because
_______________.
D. All of these
33. RAID level _____ is also known as block interleaved parity organisation and
uses block level striping and keeps a parity block on a seperate disk.
A. 1
B. 2
C. 3
D. 4
D. None of these
D. None of these
A. low
B. very low
C. high
D. None of these
38. RAID level ____ spreads parity and data among all N+1 disks rather than
storing data in N disks and parity in 1.
A. 3
B. 4
C. 5
Sub: OSY Unit-6 File Management
D. 6
39. RAID level 0+1 is used because, RAID level 0 provides ______ whereas RAID
level 1 provides ________.
A. performance, redundancy
B. performance, reliability
C. redundancy, performance
D. None of these
40. If a disk fails in RAID level ___ rebuilding lost data is easiest.
A. 1
B. 2
C. 3
D. 4
42. RAID level ______ is also known as memory style error correcting
code(ECC) organization.
A. 1
B. 2
C. 3
D. 4
A. efficiency
B. enough storage space for data
Sub: OSY Unit-6 File Management
C. storage overhead
D. time consumption overhead View Answer
A. aging
B. scheduling
C. redundancy
D. disks
45. RAID level ________ refers to disk arrays with striping at the level of blocks,
but without any redundancy.
A. 0
B. 1
C. 2
D. 3
A. 0
B. 1
C. 2
D. 3
47. RAID level ______ is also known as bit interleaved parity organisation.
A. 0
B. 1
C. 2
D. 3
48. Data cannot be written to secondary storage unless written within a
______
a) file
b) swap space
Sub: OSY Unit-6 File Management
c) directory
d) text format
49. A file is a/an _______ data type.
a) abstract
b) primitive
c) public
d) private
50. In UNIX, what will the open system call return?
a) pointer to the entry in the open file table
b) pointer to the entry in the system wide table
c) a file to the process calling it
d) none of the mentioned