Operating Systems (CSE 31530
Operating Systems (CSE 31530
* Required
* This form will record your name, please fill your name.
1/4/2022
1
STUDENT NAME *
REGiSTRATION NUMBER *
Section *
1/4/2022
4
Roll No *
memory limits
process state
program counter
Partition information
1/4/2022
6
(1 Point)
1/4/2022
7
To ensure the integrity of the data being shared, operating systems often provide system calls allowing
a process to _________shared data. Then, no other process can access the data until the _____is released
(1 Point)
LOCK,LOCK
KEY, KEY
LOCK,KEY
KEY, LOCK
The multilevel queue scheduling algorithm does not consist queue of____________
(1 Point)
system processes
interactive processes
Student Processes
sequential process
1/4/2022
9
Turnaround time is not the best criterion for the selection of scheduling algorithms in _________________.
(1 Point)
Interactive systems
batch systems
10
Register
Cache
Disk
RAM
1/4/2022
11
(1 Point)
128
16
1/4/2022
12
iv only
ii only
iii only
i and ii
1/4/2022
13
14
A paging scheme uses a TLB. A TLB access takes 10ns and main memory access takes 50ns. What is the effective
access time (in ns) if the TLB hit ratio is 90%?
(1 Point)
50
65
70
55
1/4/2022
15
What is the waiting time of process P0 for the following snapshot of processes , using FCFS CPU scheduling
algorithm
1/4/2022
16
(1 Point)
Only i) is correct
1/4/2022
17
What is the number of page faults if the page reference string is 4,5,4,5,4,5,5,4 using FCFS with 1 frame which is
initially empty?
(1 Point)
18
command-line interface
shell-script
system call
1/4/2022
19
_______________specifies group of functions that are available to an application programmer, including the parameters
that are passed to each function and the return values the programmer can expect.
(1 Point)
Utility software
Kernel
Shell-script
20
Which among the following does not belong to critical section of process synchronization?
(1 Point)
kernel section
remainder section
exit section
entry section
1/4/2022
21
The resulting list for each object consists of ordered pairs <domain, access-rigth> , which define all domains with a
nonempty set of access rights for that object. This statement is TRUE with respect to which of the following
methods of access matrix implementation.
(1 Point)
Global Table
lock-key scheme
1/4/2022
22
i) Duplicate directory entries, however, make the original and the copy indistinguishable
ii) A major problem with duplicate directory entries is maintaining consistency when a file is modified
iii) A simple tree structure is more flexible than a simple acyclic-graph directory structure
iv) An acyclic graph —that is, a graph with no cycles—allows directories to share subdirectories and files
(1 Point)
ii & iii
i & ii
i,ii and iv
i, ii and iii
23
Choose the one that is not a file attribute from the following.
(1 Point)
Protection
Size
Name
bytes in file
1/4/2022
24
Which among the following is not a necessary condition for the occurrence of deadlock
(1 Point)
Mutual exclusion
Cirrcular wait
full Preemption
1/4/2022
25
Bits Purpose
(1 Point)
1/4/2022
26
Which one of the following is a visual way to determine the deadlock occurrence?
(1 Point)
access matrix
Acyclic graph
27
cooperating Processes
Independent processes
1/4/2022
28
In critical section problem, ______________limits number of times that other processes are allowed to enter their critical
sections after a process has made a request to enter its critical section and before that request is granted.
(1 Point)
unbounded waiting
mutual exclusion
progress
bounded waiting
29
Which of the page replacement algorithm sometimes leads to more page faults when the number of frames in
main memory increases ?
(1 Point)
FIFO
LRU
Optimal
1/4/2022
30
A counting semaphore has a value of 5 at a given time. On this semaphore, 11 wait operations and 9 signal
operations were completed. What is the semaphore's resultant value?
(1 Point)
25
31
process identifier
process descriptor
file identifier
file descriptor
1/4/2022
32
iv) removing a process from main memory and reintroducing into main memory is called swapping
(1 Point)
1/4/2022
33
is deadlock free
always deadlocked
34
SCAN
LOOK
FCFS
SSTF
1/4/2022
This content is neither created nor endorsed by Microsoft. The data you submit will be sent to the form owner.
Microsoft Forms
1/4/2022
Reg. No.
(30/12/2021)
Time: 2.20 PM – 3.35 PM MAX. MARKS: 20
Instructions to Candidates:
Answer ALL the questions.
Missing data may be suitably assumed.
1A. Describe the FOUR events in which CPU-scheduling decisions may take place. 5M
Consider the following set of processes, arriving at the given times and having the following CPU
burst time and priorities:
Process Arrival Burst Time Priority
Time(ms) (ms)
A 0 8 3
B 3 4 1
C 5 7 4
D 8 3 2
Draw a Gantt chart and calculate average waiting time and turn-around time of each process using
SJF, Priority and Round Robin (quantum 3 ms) CPU scheduling algorithms. Assume pre-emptive
scheduling policy for SJF and Priority scheduling. Consider higher the priority value, lower the
priority of the process
1B. Suppose that a disk drive has 200 cylinders, numbered from 0 to 199. The drive is currently serving 3M
a request at cylinder 60 and the queue of pending requests is: 86, 159, 39, 139, 35, 71, 65, and 14.
Starting from current head position, what is the total distance (in cylinders) that the disk arm moves
to satisfy all pending requests for each of the following disk-scheduling algorithms?
Show clearly all the steps.
i. FCFS
ii. SSTF
iii. LOOK
1C. Compare and contrast the differences between shared memory model and message-passing model 2M
2A. Apply FIFO , LRU and OPTIMAL page replacement algorithms for following page reference 5M
string 3,4,2,3,4,3,4,5,7,6,4,3,2,3,4,5,4 . Assume 3 frames and all frames are initially empty.
Show all the steps.
2B. A system has 12 resources of A type, 14 resources of B type and 15 resources of C type. Apply 3M
Banker’s algorithm and check whether the system is safe using Bankers algorithm. Also write the
safe sequence if the system is deadlock free.
2C. Discuss any two file access methods and mention their advantages and disadvantages. 2M
********************************