0% found this document useful (0 votes)
79 views22 pages

C3 Memory Managment - Nokey

The document contains multiple choice questions related to memory management and virtual memory. 1) CPU fetches instructions from memory according to the program counter. 2) A cache is a memory buffer used to accommodate speed differences. 3) The address generated by the CPU is the logical address. 4) Run time mapping from virtual to physical addresses is done by the memory management unit.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
79 views22 pages

C3 Memory Managment - Nokey

The document contains multiple choice questions related to memory management and virtual memory. 1) CPU fetches instructions from memory according to the program counter. 2) A cache is a memory buffer used to accommodate speed differences. 3) The address generated by the CPU is the logical address. 4) Run time mapping from virtual to physical addresses is done by the memory management unit.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

1.

CPU fetches the instruction from memory according to the value of ____________
a) program counter
b) status register
c) instruction register
d) program status word

2. A memory buffer used to accommodate a speed differential is called ____________


a) stack pointer
b) cache
c) accumulator
d) disk buffer

3. Which one of the following is the address generated by CPU?


a) physical address
b) absolute address
c) logical address
d) none of the mentioned

4. Run time mapping from virtual to physical address is done by ____________


a) Memory management unit
b) CPU
c) PCI
d) None of the mentioned

5. Memory management technique in which system stores and retrieves data from
secondary storage for use in main memory is called?
a) fragmentation
b) paging
c) mapping
d) none of the mentioned

6. The address of a page table in memory is pointed by ____________


a) stack pointer
b) page table base register
c) page register
d) program counter

7. Program always deals with ____________


a) logical address
b) absolute address
c) physical address
d) relative address
8. The page table contains ____________
a) base address of each page in physical memory
b) page offset
c) page size
d) none of the mentioned

9. What is compaction?
a) a technique for overcoming internal fragmentation
b) a paging technique
c) a technique for overcoming external fragmentation
d) a technique for overcoming fatal error

10. Operating System maintains the page table for ____________


a) each process
b) each thread
c) each instruction
d) each address

1. instructions fetched by CPU according to the value of —— from memory?


A. program status word
B. status register
C. program counter
D. instruction register
E. both a and b
F. None of these

2. —– is called a memory buffer and it is used to contain a speed differential


A. cache
B. accumulator
C. disk buffer
D. stack pointer
E. both a and b
F. None of these

3. the address generated by CPU is:


A. absolute address
B. logical address
C. physical address
D. mac address
E. both a and b
F. None of these

4. Which of the following option is true for virtual to physical address run-time mapping?
A. CPU
B. Operating system
C. memory management unit
D. PCI
E. both a and b
F. None of these

5. —— is used to point the address of a page table in memory.


A. page register
B. program counter
C. stack pointer
D. page table base register
E. both a and b
F. None of these

SET 2: Memory Management Mcqs

6. ——– Address is always deal with the program.


A. absolute
B. relative
C. logical
D. physical
E. both a and b
F. None of these

7. ——- is contained by the page table.


A. page size
B. base address of every page
C. page offset
D. Page
E. both a and b
F. None of these

8.for ——– the page table is maintained by the Operating System.


A. each instruction
B. each process
C. each thread
D. each address
E. both a and b
F. None of these

9. The operating system is in?


A. high memory
B. System bus
C. either a or d (depending on the location of interrupt vector)
D. low memory
E. both a and b
F. None of these
10. relocation register are used to :
A. a different address space to processes
B. providing less address space to processes
C. to protect the address spaces of processes
D. providing more address space to processes
E. both a and b
F. None of these

SET 3: Memory Management Mcqs

11. With limit registers and relocation, each logical address must be _______ the limit
register.
A. Not equal to
B. equal to
C. greater than
D. less than
E. both b and c
F. None of these

12. The code that ——- is Transient operating system code.


A. stays in the memory always B. comes and goes as needed
C. never enters the memory space
D. is not easily accessible
E. both a and b
F. None of these

13. the size of the operating system during program execution is ——— while using
transient code.
A. changed
B. increased
C. maintained
D. decreased
E. both a, b and c
F. None of these

14. Each partition may contain ________ when memory is divided into several fixed sized
partitions.
A. multiple processes at once
B. exactly one process
C. Two process
D. at least one process
E. both a and b
F. None of these
15. the degree of multiprogramming is bounded to which extent In fixed-sized partition?
A. All of these
B. the memory size
C. the CPU utilization
D. the number of partitions
E. both a and b
F. None of these

SET 3: Memory Management Mcqs

16. The strategies like the first fit, best fit and worst fit are used to select a ______.
A. process from a queue to put in storage
B. process from a queue to put in memory
C. processor to run the next process
D. free hole from a set of available holes
E. both c and b
F. None of these

17. The number of ——- can be granted by the Owner of address space.
A. Computers
B. Modules
C. Pages
D. Devices
E. both c and b
F. None of these

18. To load and store the system data from memory ——- is used.
A. register
B. RAM
C. ROM
D. Buses
E. both c and b
F. None of these

19. The stack pointer is a register that points to the:


A. Push of the stack
B. Bottom of the stack
C.Top of the stack
D. Pop of the stack
E. both a and b
F. None of these

20. To read the———— I/O instruction transfer is used.


A. Information
B. Instructions
C. Description
D. Data
E. both c and b
F. None of these

1. Where the Paging is implemented ……


(a) Software
(b) Operating System
(c) Hardware
(d) B and C
(e) All of these
(f) None of these
2. Which one of the following is not true about Kernel?
(a) The kernel is made of various modules which can not be loaded in the running operating
system
(b) Kernel remains in the memory during the entire computer session
(c) the kernel is the program that constitutes the central core of the operating system
(d) the kernel is the first part of the operating system to load into memory during booting
(e) All of these
(f) None of these

3. The page fault is the ……


(a) error in a specific page
(b) Reference to a page belonging to another program
(c) Access to a page not currently in memory
(d) When a program is not currently in memory
(e) All of these
(f) None of these

4. Which one of the following does not allow the approach to Deadlocks Handling?
(a) Detect & Recover
(b) Virtual Memory
(c) Deadlock Prevention
(d) Deadlock Avoidance
(e) All of these
(f) None of these

5. What do you mean by “Operating System”?


(a) Link to interface the hardware and application programs
(b) system service provider to the application programs
(c) collection of programs that manages hardware resources
(d) C and D
(e) All of these
(f) None of these

6. What is the initial value of the Semaphore that allows only one of the many
processes to enter their critical sections?
(a) 0
(b) 16
(c) 1
(d) 8
(e) All of these
(f) None of these

7. In which one of the following the Memory allocation policy allocates the largest
hole to the process?
(a) Worst-Fit
(b) First-Fit
(c) Best-Fit
(d) C and D
(e) All of these
(f) None of these

8. What is the main function of the command interpreter?


(a) To handle the files in the operating system
(b) to provide the interface between the API and application program
(c) To get and execute the next user-specified command
(d) A and D
(e) All of these
(f) None of these

9. How we can describe the Algorithm?


(a) A step by step procedure for solving a problem
(b) A branch of mathematics
(c) A computer language
(d) C and A
(e) All of these
(f) None of these

10. Which of the following is also known as the Chunks of a memory?


(a) Page
(b) Frame
(c) Sector
(d) Offset
(e) All of these
(f) None of these

11. Which one of the given above is not a real-time operating system?
(a) Palm OS
(b) Windows CE
(c) VxWorks
(d) RTLinux
(e) All of these
(f) None of these
12. Which one of the following is a Block device?
(a) Disk
(b) Terminals
(c) Printer
(d) Mouse
(e) All of these
(f) None of these

SET 1: Virtual Memory MCQs

1. What a virtual-memory miss is called?


a)Hit miss
b)Page hit
c)Page miss
d)Page fault

2.a process is copied into the main memory from the secondary memory
a) Swapping
b) Paging
c) Segmentation
d) Demand paging

3. process is trash
a) it spends more time paging than executing
b) it spends less time paging than executing
c) page fault occurs
d)swapping can not take place

4. in which Swap space exists


a) cpu
b) primary memory
c) secondary memory
d) none of the mentioned

SET 2: Virtual Memory MCQs

5. When a program tries to access a page that is mapped in address space but not loaded
in physical memory, then what occurs
a) page fault occurs
b) fatal error occurs
c) segmentation fault occurs
d) no error occurs
6. Effective access time is directly proportional to
a) memory access time
b)page-fault rate
c) hit ratio
d) none of the mentioned

7.In FIFO page replacement algorithm, when a page must be replaced what is chosen
a) oldest page is chosen
b) newest page is chosen
c) median page is chosen
d) none of the mentioned

8. whenever the page required to be replaced which algorithm chooses the page that has
not been used for the longest period of time?
a) additional reference bit algorithm
b) least recently used algorithm
c) counting based page replacement algorithm
d) first in first out algorithm

SET 3: Virtual Memory MCQs

9. The pager concerns with the


a) entire thread
b) first page of a process
c) individual page of a process
d) entire process

10. Working set model for page replacement is based on the assumption of
a)globalization
b) random access
c) modularity
d) locality

11. what memory is called separation of user logical memory and physical memory
a) Memory sharing
b)Virtual memory
c)Memory management
d) Memory control

12.Is logical Address space can be larger than physical address space?
a) True
b) False
13. Virtual Memory can be implemented via?
a) Simple division
b) Logical paging
c) Demand Paging
d) Complex division

14. COW stands for?


a) Convert overwrite
b) Copy overwrite
c) Cut overwrite
d) Copy overwrite

15. LRU stands for?


a) Less Recently used
b) Least Recurrently used
c) Least Randomly used
d)Least Recently used

16. What allocation uses a proportional allocation scheme using priorities rather than size.
a) Simple allocation
b) File allocation
c) Priority allocation
d)Preference allocation

17. Which a process selects a replacement frame from the set of all frames.
a) Global replacement
b) Local replacement
c) Module replacement
d)Block replacement

SET 4: Virtual Memory MCQs

18. Any program, no matter how small, occupies an entire partition. known as
a) fragmentation
b) external fragmentation
c) internal fragmentation
d)prior fragmentation

19. Which process is busy swapping pages in and out.


a) Division
b)External Fragmentation
c) Thrashing
d) Compaction
20. select the most nearest answer for one or more physically contiguous pages.
a) Allocator
b) Object
c) Slab
d) Cache

21.technique is implemented by magnetic disk for secondary memory is called


a)Main memory
b)Cache
c)Buffer
d)Virtual memory

22. The memory can be shared among ,because of virtual memory


a) threads
b) processes
c) instructions
d) none of the mentioned

1.operating system called a thousand systems are executed per


A. hour
B. day
C. min
D. sec
E. None of these

2. A web-based computing system, the computer used are normally _____?


A. servers
B. personal computers
C. tablets
D. network computers
E. None of these

3. Choose one of the best options from the following. Dump of memory of the computer
system is examined by the ___?
A.programmer
B. debugger
C.designer
D.engineer
E. None of these
4.Indicate one of the best options from the following. CloseHandle() call function in windows
operating system is a UNIX’s function called for
A. fork()
B. close()
C. read()
D. open()
E. None of these

5.Which is not provided by the operating system is____


A. networking
B. user interface
C. error detection
D. program execution
E. None of these
6.Choose one of the best options from the following. Chain of the program of a computer
system is as strong as its ___
A. strongest link
B. weakest link
C. all links
D. mid link
E. None of these
7.Which is Friendly user interface provided by operating system ____
A. graphical user interface
B. command-line interface
C. batch interface
D. device interface
E. None of these
8.Indicate one of the best options from the following. Bourne-again-shell of the operating
system is used by
A. windows
B. Windows and Mac
C. Linux
D. UNIX and Linux
E. None of these
9. Which Number of byte to be read into a buffer of the system is_____
A. WORD bytes to write
B. WORD bytes to read
C. DWORD bytes to write
D. DWORD bytes to read
E. None of these
10.Which Bourne shell in command interpreter of the operating system is used by____
A. windows
B. Windows and Macintosh
C. Macintosh and LINUX
D. Linux and UNIX
E. None of these
11.Programs of the operating system end ____
A. Interval
B. Interruptedly
C. Normally
D. Erroneously
E. None of these
12.Choose the best option from the following. The main functionality of command interpreter
of the operating system is to
A. remove commands
B. execute commands
C. fetch commands
D. Decode commands
E. None of these
13.Power failure of a computer system is one of kinds of____
A. error
B. outputs
C. inputs
D. Interrupts
E. None of these
14. MAC is a ____?
A. What is the command-line interface
B. batch interface
C. graphical user interface
D. device interface
E. None of these
15. Choose one of the best options. A buffer of the system from where data will be read is
called
A. LVOID buffer
B. LPVOID buffer
C. PVOID buffer
D. VOID buffer
E. None of these
16. The buffer of the system from where data will be read is known as _____
A. LPVOID buffer
B. PVOID buffer
C. LVOID buffer
D. VOID buffer
E. None of these
17. X-windows operating system is a user’s interface that is a common version of____?
A. windows
B. MAC OS
C. Linux
D. UNIX
E. None of these
18.Indicate best answer. Operating system is mainly comprised of
A. third party programs
B. user programs
C. system programs
D. both B and C
E. None of these

19.For authentication purpose, operating system requires______


A. personal computers
B. servers
C. login authentication
D. network computers
E. None of these
20.Choose bset option. In icon based system menus are displayed on___
A. programs
B. memory
C. screen/desktop
D. Interfaces
E. None of these
21.Windows explorer program are____
A. command line interface
B. batch interface
C. graphical user interface
D. device interface
E. None of these
22.Operating system programs that are manipulated are asked by the_____?
A. programmer
B. open source
C. user
D. operating system
E. None of these
23.1st version of internet explorer was introduced in____
A. 20-Jul-90
B. 16-Aug-95
C. 16-Feb-98
D. 16-Jan-00
E. None of these
24. System calls of operating system is done by___?
A. caller
B. programmer
C. developer
D. engineer
E. None of these
25. Which is the best option? Choice of shells in command interpreters of the operating
system is chosen by
A. windows
B. users
C. processes
D. operating system
E. None of these
26. Indicate the best option. Choice of shells in command interpreters of the operating
system is chosen by___
A. operating system
B. users
C. windows
D. processes
E. None of these
27. Indicate the best option. X windows operating system is a user interface that is_____
A. command-line interface
B. device interface
C. batch interface
D. graphical user interface
E. None of these
28. For allocating resources Central Processing Unit has individual _____
A. routines
B. devices
C. programs
D. Processes
E. None of these

A
29. What is an abbreviation of MAC operating system ___
A. main operating system
B. memory operating system
C. Macintosh operating system
D. mainframe operating system
E. None of these
30. Indicate the best option. The common desktop environment program of an operating
system is a _____?
A. command-line interface
B. device interface
C. batch interface
D. graphical user interface
E. None of these
31. Local desktop environment program of the operating system is a___?
A. batch interface
B. graphical user interface
C. command line interface
D. device interface
E. None of these
32.Indicate best option. In graphical user interface users uses____
A. file based interface
B. mouse based Pointing
C. command line interface
D. voice based interface
E. None of these
33.Date of computer system and getting time is ___
A. process control
B. information maintenance
C. device management
D. file management
E. None of these
34.Choose best option from the following. Readfile() function of operating system is for
reading_____
A. command
B. processes
C. files
D. programs
E. None of these
35.When error appear, program of operating system automatically gets _____?
A. Executed
B. stored
C. aborted
D. Declined
36. Which number of the byte read during the last read of program/memory is ______
A. DWORD bytes to read
B. LPDWORD bytes to read
C. LPDWORD bytes to write
D. DWORD bytes to write
E. None of these
37. Communication between devices of the system is provided by ___
A. graphical user interfacing
B. message passing
C. shared memory
D. both b and c
E. None of these
38. Indicate the best option from the following. System calls of an operating system provide
an interface to
A. programs
B. processes
C. Utilities
D. services
E. None of these
39. KornShell of operating system program is used by the_____?
A. Linux
B. UNIX
C. windows
D. both a and b
E. None of these
40. Choose one of the best options. one that is not a system call category of the program is
_____
A. process control
B. protection
C. file generation
D. communication
E. None of these
41.GNOME is a project that was created by _____?
A. GNU
B. windows
C. UNIX
D. Linux
E. None of these
42. In the local interpreter environment of the operating system, commands are executed by
____?
A. windows
B. Linux
C. itself
D. UNIX
E. None of these
43.Delete file of programs and create are ____
A. process control
B. device management
C. file management
D. information maintenance
E. None of these
44. Allocation of output and input devices are provided by
A. Mediators
B. operating system
C. Moderators
D. Processors
E. None of these
45. In Linux rm file.text commend is used for ____?
A. remove graphics
B. remove the text file
C. remove image
D. remove video
E. None of these
46. Between application programming interface and system calls, there present a/an ___
A. relationship
B. interface
C. correlation
D. Dependency
E. None of these
47. A Logical extension of multiprogramming operating system is
A. single programing
B. multi-tasking
C. Time-sharing
D. both b and c
E. None of these
48. Multiprogramming of computer system increases ____?
A. memory
B. CPU utilization
C. storage
D. cost of computation
E. None of these
49. The environment in which programs of the system are executed is called _____?
A. nodes
B. operating system
C. clustered system
D. both a and b
E. None of these
50. Every user of computer system that uses computer services has at least ____
A. 2programs
B. 1program
C. 3programs
D. 4programs
E. None of these
51. System resources of computer can be utilized better in ____?
A. single program environment
B. multi program environment
C. core environment
D. dual program environment
E. None of these
52. Win32 application programming interfaces is for _____?
A. Solaris
B. UNIX
C. Linux
D. windows
E. None of these
53. Run time support system is a system that is provided by _____?
A. System call routines are mostly written in
B. system programs
C. processes system
D. calls interface
E. None of these
54. Getting device attributes of the computer is a ___?
A. process control
B. information maintenance
C. device management
D. file management
E. None of these
55. Environment for execution of programs is provided by _____?
A. inputs
B. operating system
C. outputs
D. memory
E. None of these
56.Indicate best option interfaces of operating system provides ____
A. portability
B. designing
C. Reusability
D. Optimization
E. None of these
57. Aqua user interface was appeared with_____?
A. windows
B. shells
C. Bourne shell
D. MAC OS
E. None of these
58. Choose one of the best options. directories in Linux are known as
A. commands
B. graphics
C. folders
D. text
E. None of these
59. In command rm file.text of operating system program, file.txt is a _____?
A. file type
B. file name
C. format
D. both a and b
E. None of these
60. System call routines of the operating systems are mostly written in ____?
A. java
B. C++
C. C
D. both b and c
E. None of these
61.Operating System is responsible for transferring data to____?
A. memory
B. monitor
C. ALU
D. I/O devices
E. None of these
62.Parameters of programs on stack are_____?
A. copied
B. pushed
C. popped
D. both b and c
E. None of these
63. One that is not a type of user interface of the operating system is _____?
A. command-line interface
B. device interface
C. batch interface
D. graphical user interface
E. None of these
64. Communication, operating system moves ____
A. processes
B. programs
C. packets
D. Modules
E. None of these
65. To point a folder or file a Graphical User Interface uses ___?
A. voice based interface
B. common line interface
C. file based interface
D. pointer
E. None of these

You might also like