C3 Memory Managment - Nokey
C3 Memory Managment - Nokey
CPU fetches the instruction from memory according to the value of ____________
a) program counter
b) status register
c) instruction register
d) program status word
5. Memory management technique in which system stores and retrieves data from
secondary storage for use in main memory is called?
a) fragmentation
b) paging
c) mapping
d) none of the mentioned
9. What is compaction?
a) a technique for overcoming internal fragmentation
b) a paging technique
c) a technique for overcoming external fragmentation
d) a technique for overcoming fatal error
4. Which of the following option is true for virtual to physical address run-time mapping?
A. CPU
B. Operating system
C. memory management unit
D. PCI
E. both a and b
F. None of these
11. With limit registers and relocation, each logical address must be _______ the limit
register.
A. Not equal to
B. equal to
C. greater than
D. less than
E. both b and c
F. None of these
13. the size of the operating system during program execution is ——— while using
transient code.
A. changed
B. increased
C. maintained
D. decreased
E. both a, b and c
F. None of these
14. Each partition may contain ________ when memory is divided into several fixed sized
partitions.
A. multiple processes at once
B. exactly one process
C. Two process
D. at least one process
E. both a and b
F. None of these
15. the degree of multiprogramming is bounded to which extent In fixed-sized partition?
A. All of these
B. the memory size
C. the CPU utilization
D. the number of partitions
E. both a and b
F. None of these
16. The strategies like the first fit, best fit and worst fit are used to select a ______.
A. process from a queue to put in storage
B. process from a queue to put in memory
C. processor to run the next process
D. free hole from a set of available holes
E. both c and b
F. None of these
17. The number of ——- can be granted by the Owner of address space.
A. Computers
B. Modules
C. Pages
D. Devices
E. both c and b
F. None of these
18. To load and store the system data from memory ——- is used.
A. register
B. RAM
C. ROM
D. Buses
E. both c and b
F. None of these
4. Which one of the following does not allow the approach to Deadlocks Handling?
(a) Detect & Recover
(b) Virtual Memory
(c) Deadlock Prevention
(d) Deadlock Avoidance
(e) All of these
(f) None of these
6. What is the initial value of the Semaphore that allows only one of the many
processes to enter their critical sections?
(a) 0
(b) 16
(c) 1
(d) 8
(e) All of these
(f) None of these
7. In which one of the following the Memory allocation policy allocates the largest
hole to the process?
(a) Worst-Fit
(b) First-Fit
(c) Best-Fit
(d) C and D
(e) All of these
(f) None of these
11. Which one of the given above is not a real-time operating system?
(a) Palm OS
(b) Windows CE
(c) VxWorks
(d) RTLinux
(e) All of these
(f) None of these
12. Which one of the following is a Block device?
(a) Disk
(b) Terminals
(c) Printer
(d) Mouse
(e) All of these
(f) None of these
2.a process is copied into the main memory from the secondary memory
a) Swapping
b) Paging
c) Segmentation
d) Demand paging
3. process is trash
a) it spends more time paging than executing
b) it spends less time paging than executing
c) page fault occurs
d)swapping can not take place
5. When a program tries to access a page that is mapped in address space but not loaded
in physical memory, then what occurs
a) page fault occurs
b) fatal error occurs
c) segmentation fault occurs
d) no error occurs
6. Effective access time is directly proportional to
a) memory access time
b)page-fault rate
c) hit ratio
d) none of the mentioned
7.In FIFO page replacement algorithm, when a page must be replaced what is chosen
a) oldest page is chosen
b) newest page is chosen
c) median page is chosen
d) none of the mentioned
8. whenever the page required to be replaced which algorithm chooses the page that has
not been used for the longest period of time?
a) additional reference bit algorithm
b) least recently used algorithm
c) counting based page replacement algorithm
d) first in first out algorithm
10. Working set model for page replacement is based on the assumption of
a)globalization
b) random access
c) modularity
d) locality
11. what memory is called separation of user logical memory and physical memory
a) Memory sharing
b)Virtual memory
c)Memory management
d) Memory control
12.Is logical Address space can be larger than physical address space?
a) True
b) False
13. Virtual Memory can be implemented via?
a) Simple division
b) Logical paging
c) Demand Paging
d) Complex division
16. What allocation uses a proportional allocation scheme using priorities rather than size.
a) Simple allocation
b) File allocation
c) Priority allocation
d)Preference allocation
17. Which a process selects a replacement frame from the set of all frames.
a) Global replacement
b) Local replacement
c) Module replacement
d)Block replacement
18. Any program, no matter how small, occupies an entire partition. known as
a) fragmentation
b) external fragmentation
c) internal fragmentation
d)prior fragmentation
3. Choose one of the best options from the following. Dump of memory of the computer
system is examined by the ___?
A.programmer
B. debugger
C.designer
D.engineer
E. None of these
4.Indicate one of the best options from the following. CloseHandle() call function in windows
operating system is a UNIX’s function called for
A. fork()
B. close()
C. read()
D. open()
E. None of these
A
29. What is an abbreviation of MAC operating system ___
A. main operating system
B. memory operating system
C. Macintosh operating system
D. mainframe operating system
E. None of these
30. Indicate the best option. The common desktop environment program of an operating
system is a _____?
A. command-line interface
B. device interface
C. batch interface
D. graphical user interface
E. None of these
31. Local desktop environment program of the operating system is a___?
A. batch interface
B. graphical user interface
C. command line interface
D. device interface
E. None of these
32.Indicate best option. In graphical user interface users uses____
A. file based interface
B. mouse based Pointing
C. command line interface
D. voice based interface
E. None of these
33.Date of computer system and getting time is ___
A. process control
B. information maintenance
C. device management
D. file management
E. None of these
34.Choose best option from the following. Readfile() function of operating system is for
reading_____
A. command
B. processes
C. files
D. programs
E. None of these
35.When error appear, program of operating system automatically gets _____?
A. Executed
B. stored
C. aborted
D. Declined
36. Which number of the byte read during the last read of program/memory is ______
A. DWORD bytes to read
B. LPDWORD bytes to read
C. LPDWORD bytes to write
D. DWORD bytes to write
E. None of these
37. Communication between devices of the system is provided by ___
A. graphical user interfacing
B. message passing
C. shared memory
D. both b and c
E. None of these
38. Indicate the best option from the following. System calls of an operating system provide
an interface to
A. programs
B. processes
C. Utilities
D. services
E. None of these
39. KornShell of operating system program is used by the_____?
A. Linux
B. UNIX
C. windows
D. both a and b
E. None of these
40. Choose one of the best options. one that is not a system call category of the program is
_____
A. process control
B. protection
C. file generation
D. communication
E. None of these
41.GNOME is a project that was created by _____?
A. GNU
B. windows
C. UNIX
D. Linux
E. None of these
42. In the local interpreter environment of the operating system, commands are executed by
____?
A. windows
B. Linux
C. itself
D. UNIX
E. None of these
43.Delete file of programs and create are ____
A. process control
B. device management
C. file management
D. information maintenance
E. None of these
44. Allocation of output and input devices are provided by
A. Mediators
B. operating system
C. Moderators
D. Processors
E. None of these
45. In Linux rm file.text commend is used for ____?
A. remove graphics
B. remove the text file
C. remove image
D. remove video
E. None of these
46. Between application programming interface and system calls, there present a/an ___
A. relationship
B. interface
C. correlation
D. Dependency
E. None of these
47. A Logical extension of multiprogramming operating system is
A. single programing
B. multi-tasking
C. Time-sharing
D. both b and c
E. None of these
48. Multiprogramming of computer system increases ____?
A. memory
B. CPU utilization
C. storage
D. cost of computation
E. None of these
49. The environment in which programs of the system are executed is called _____?
A. nodes
B. operating system
C. clustered system
D. both a and b
E. None of these
50. Every user of computer system that uses computer services has at least ____
A. 2programs
B. 1program
C. 3programs
D. 4programs
E. None of these
51. System resources of computer can be utilized better in ____?
A. single program environment
B. multi program environment
C. core environment
D. dual program environment
E. None of these
52. Win32 application programming interfaces is for _____?
A. Solaris
B. UNIX
C. Linux
D. windows
E. None of these
53. Run time support system is a system that is provided by _____?
A. System call routines are mostly written in
B. system programs
C. processes system
D. calls interface
E. None of these
54. Getting device attributes of the computer is a ___?
A. process control
B. information maintenance
C. device management
D. file management
E. None of these
55. Environment for execution of programs is provided by _____?
A. inputs
B. operating system
C. outputs
D. memory
E. None of these
56.Indicate best option interfaces of operating system provides ____
A. portability
B. designing
C. Reusability
D. Optimization
E. None of these
57. Aqua user interface was appeared with_____?
A. windows
B. shells
C. Bourne shell
D. MAC OS
E. None of these
58. Choose one of the best options. directories in Linux are known as
A. commands
B. graphics
C. folders
D. text
E. None of these
59. In command rm file.text of operating system program, file.txt is a _____?
A. file type
B. file name
C. format
D. both a and b
E. None of these
60. System call routines of the operating systems are mostly written in ____?
A. java
B. C++
C. C
D. both b and c
E. None of these
61.Operating System is responsible for transferring data to____?
A. memory
B. monitor
C. ALU
D. I/O devices
E. None of these
62.Parameters of programs on stack are_____?
A. copied
B. pushed
C. popped
D. both b and c
E. None of these
63. One that is not a type of user interface of the operating system is _____?
A. command-line interface
B. device interface
C. batch interface
D. graphical user interface
E. None of these
64. Communication, operating system moves ____
A. processes
B. programs
C. packets
D. Modules
E. None of these
65. To point a folder or file a Graphical User Interface uses ___?
A. voice based interface
B. common line interface
C. file based interface
D. pointer
E. None of these