Operating System Imp Questions
Operating System Imp Questions
Join us at:
Youtube:- https://www.youtube.com/@infeepedia
Facebook group:- facebook.com/groups/infeetripathi/?ref=share’
Telegram group:- t.me/ xCW17MS0Hn41NDI9
Telegram channel:- t.me/infeepedia1
Instagram:- https://www.instagram.com/infeepedia/
Whatsapp channel:- https://whatsapp.com/channel/0029Va9TFe6DOQIfuYcVeY0g
Twitter:- https://twitter.com/infeepedia
Operating System important questions by Infee Ma’am
1. What is an operating system?
a) collection of programs that manages hardware resources
b) system service provider to the application programs
c) interface between the hardware and application programs
d) all of the mentioned
2. The initial program that is run when the computer is powered up is called __________
a) boot program
b) bootloader
c) initializer
d) bootstrap program
51. Which module gives control of the CPU to the process selected by the short-term scheduler?
a) dispatcher
b) interrupt
c) scheduler
d) none of the mentioned
52. The interval from the time of submission of a process to the time of completion is termed as ________.
a) waiting time
b) turnaround time
c) response time
d) throughput
53. Which scheduling algorithm allocates the CPU first to the process that requests the CPU first?
Operating System important questions by Infee Ma’am
a) first-come, first-served scheduling
b) shortest job scheduling
c) priority scheduling
d) none of the mentioned
54. In priority scheduling algorithm, when a process arrives at the ready queue, its priority is compared with the priority of ____________
a) all process
b) currently running process
c) parent process
d) init process
66. With round robin scheduling algorithm in a time shared system ______.
a) using very large time slices converts it into First come First served scheduling algorithm
b) using very small time slices converts it into First come First served scheduling algorithm
c) using extremely small time slices increases performance
d) using very small time slices converts it into Shortest Job First algorithm
67. The strategy of making processes that are logically runnable to be temporarily suspended is called _________.
Operating System important questions by Infee Ma’am
a) Non preemptive scheduling
b) Preemptive scheduling
c) Shortest job first
d) First come First served
68. Under multiprogramming, turnaround time for short jobs is usually ________ and that for long jobs is slightly _____.
a) Lengthened; Shortened
b) Shortened; Lengthened
c) Shortened; Shortened
d) Shortened; Unchanged
69. Which of the following statements are true? I. Shortest remaining time first scheduling may cause starvationII. Preemptive scheduling may cause
starvationIII. Round robin is better than FCFS in terms of response time a) I only
b) I and III only
c) II and III only
d) I, II and III
70. The real difficulty with SJF in short term scheduling is ______.
a) it is too good an algorithm
b) knowing the length of the next CPU request
c) it is too complex to understand
d) none of the mentioned
Operating System important questions by Infee Ma’am
71. The FCFS algorithm is particularly troublesome for _____.
a) time sharing systems
b) multiprogramming systems
c) multiprocessor systems
d) operating systems
72. An SJF algorithm is simply a priority algorithm where the priority is ________.
a) the predicted next CPU burst
b) the inverse of the predicted next CPU burst
c) the current CPU burst
d) anything the user wants
73. What is ‘Aging’?
a) keeping track of cache contents
b) keeping track of what pages are currently residing in memory
c) keeping track of how many times a given page is referenced
d) increasing the priority of jobs to ensure termination in a finite time
74. A solution to the problem of indefinite blockage of low – priority processes is _________.
a) Starvation
b) Wait queue
c) Ready queue
d) Aging
75. The segment of code in which the process may change common variables, update tables, write into files is known as _______.
a) program
b) critical section
c) non – critical section
d) synchronizing
Operating System important questions by Infee Ma’am
76. Which of the following conditions must be satisfied to solve the critical section problem?
a) Mutual Exclusion
b) Progress
c) Bounded Waiting
d) All of the mentioned
83. The wait operation of the semaphore basically works on the basic _______ system call.
a) stop()
b) block()
c) hold()
d) wait()
84. The signal operation of the semaphore basically works on the basic _______ system call.
a) continue()
b) wakeup()
c) getup()
d) start()
86. What will happen if a non-recursive mutex is locked more than once?
a) Starvation
b) Deadlock
c) Aging
d) Signaling
87. Semaphores are mostly used to implement __________.
a) System calls
b) IPC mechanisms
c) System protection
d) None of the mentioned
88. The bounded buffer problem is also known as _______.
a) Readers – Writers problem
b) Dining – Philosophers problem
c) Producer – Consumer problem
d) None of the mentioned
89. To ensure difficulties do not arise in the readers – writers problem _______ are given exclusive access to the shared object.
a) readers
b) writers
c) readers and writers
d) none of the mentioned
Operating System important questions by Infee Ma’am
90. The dining – philosophers problem will occur in case of ______.
a) 5 philosophers and 5 chopsticks
b) 4 philosophers and 5 chopsticks
c) 3 philosophers and 5 chopsticks
d) 6 philosophers and 5 chopsticks
99. Which of the following concurrency control protocols ensure both conflict serializability and freedom from deadlock?
Operating System important questions by Infee Ma’am
I) 2-phase locking
II) Timestamp ordering a) I only
b) II only
c) Both I and II
d) Neither I nor II
105. A problem encountered in multitasking when a process is perpetually denied necessary resources is called __________.
a) deadlock
b) starvation
Operating System important questions by Infee Ma’am
c) inversion
d) aging
113. For non sharable resources like a printer, mutual exclusion ________.
a) must exist
b) must not exist
c) may exist
d) none of the mentioned
114. For sharable resources, mutual exclusion _________.
a) is required
b) is not required
c) may be or may not be required
d) none of the mentioned
Operating System important questions by Infee Ma’am
115. To ensure that the hold and wait condition never occurs in the system, it must be ensured that _________.
a) whenever a resource is requested by a process, it is not holding any other resources
b) each process must request and be allocated all its resources before it begins its execution
c) a process can request resources only when it has none
d) all of the mentioned
116. The disadvantage of a process being allocated all its resources before beginning its execution is ________.
a) Low CPU utilization
b) Low resource utilization
c) Very high resource utilization
d) None of the mentioned
117. To ensure no preemption, if a process is holding some resources and requests another resource that cannot be immediately al located to it _________.
a) then the process waits for the resources be allocated to it
b) the process keeps sending requests until the resource is allocated to it
c) the process resumes execution without the resource being allocated to it
d) then all resources currently being held are preempted
118. One way to ensure that the circular wait condition never holds is to _________.
a) impose a total ordering of all resource types and to determine whether one precedes another in the ordering
b) to never let a process acquire resources that are held by other processes
c) to let a process wait for only one resource at a time
d) all of the mentioned
119. Each request requires that the system consider the ______ to decide whether the current request can be satisfied or must wait to avoid a future
possible deadlock.
a) resources currently available
b) processes that have previously been in the system
c) resources currently allocated to each process
d) future requests and releases of each process
Operating System important questions by Infee Ma’am
120. Given a priori information about the ________ number of resources of each type that maybe requested for each process, it is possible to construct an
algorithm that ensures that the system will never enter a deadlock state.
a) minimum
b) average
c) maximum
d) approximate
121. A deadlock avoidance algorithm dynamically examines the ________ to ensure that a circular wait condition can never exist.
a) resource allocation state
b) system storage state
c) operating system
d) resources
122. A state is safe, if __________
a) the system does not crash due to deadlock occurrence
b) the system can allocate resources to each process in some order and still avoid a deadlock
c) the state keeps the system protected and safe
d) all of the mentioned
123. A system is in a safe state only if there exists a _________.
a) safe allocation
b) safe resource
c) safe sequence
d) all of the mentioned
124. All unsafe states are _________.
a) deadlocks
b) not deadlocks
c) fatal
d) none of the mentioned
Operating System important questions by Infee Ma’am
125. A system has 12 magnetic tape drives and 3 processes : P0, P1, and P2. Process P0 requires 10 tape drives, P1 requires 4 and P2 requires 9 tape drives.
Process Maximum needs (process-wise: P0 through P2 top to bottom) Currently allocated (process-wise)
P0 P1 10 4 9 522
P2
127. The resource allocation graph is not applicable to a resource allocation system _________.
a) with multiple instances of each resource type
b) with a single instance of each resource type
c) single & multiple instances of each resource type
d) none of the mentioned
128. The Banker’s algorithm is _____________ than the resource allocation graph algorithm.
a) less efficient
b) more efficient
c) equal
d) none of the mentioned
129. The wait-for graph is a deadlock detection algorithm that is applicable when _________.
a) all resources have a single instance
b) all resources have multiple instances
c) all resources have a single 7 multiple instances
d) all of the mentioned
130. An edge from process Pi to Pj in a wait for graph indicates that _________.
a) Pi is waiting for Pj to release a resource that Pi needs
b) Pj is waiting for Pi to release a resource that Pj needs
Operating System important questions by Infee Ma’am
c) Pi is waiting for Pj to leave the system
d) Pj is waiting for Pi to leave the system
131. What is the disadvantage of invoking the detection algorithm for every request?
a) overhead of the detection algorithm due to consumption of memory
b) excessive time consumed in the request to be allocated memory
c) considerable overhead in computation time
d) all of the mentioned
132. A deadlock eventually cripples system throughput and will cause the CPU utilization to ______.
a) increase
b) drop
c) stay still
d) none of the mentioned
133. Every time a request for allocation cannot be granted immediately, the detection algorithm is invoked. This will help identify _______.
a) the set of processes that have been deadlocked
b) the set of processes in the deadlock queue
c) the specific process that caused the deadlock
d) all of the mentioned
134. A computer system has 6 tape drives, with ‘n’ processes competing for them. Each process may need 3 tape drives. The maximum value of ‘n’ for
which the system is guaranteed to be deadlock free is?
a) 2
b) 3
c) 4
d) 1
135. ‘m’ processes share ‘n’ resources of the same type. The maximum need of each process doesn’t exceed ‘n’ and the sum of all their maximum needs is
always less than m+n. In this setup, deadlock __________.
a) can never occur
Operating System important questions by Infee Ma’am
b) may occur
c) has to occur
d) none of the mentioned
136. The two ways of aborting processes and eliminating deadlocks are _________.
a) Abort all deadlocked processes
b) Abort all processes
c) Abort one process at a time until the deadlock cycle is eliminated
d) All of the mentioned
137. The process to be aborted is chosen on the basis of the following factors?
a) priority of the process
b) process is interactive or batch
c) how long the process has computed
d) all of the mentioned
138. If we preempt a resource from a process, the process cannot continue with its normal execution and it must be _________.
a) aborted
b) rolled back
c) terminated
d) queued
146. Memory management technique in which system stores and retrieves data from secondary storage for use in main memory is called?
a) fragmentation
b) paging
c) mapping
d) none of the mentioned