Unit 5
Unit 5
Unit - 5
Or
KAR ION HU
Answer: d Answer: d
Explanation: Upgrades is the right term to Explanation: The programs included in a
be used. Upgrades are installed to renew or system software package are called system
implement a new feature. Except for programs. The programmers who design
upgrades, hardware is normally one-time them and prepare them are called system
expense. programmers.
task. c) Blocked
a) Application Software d) Execution
b) System Software
Answer: c
c) Utility Software
Explanation: There is no blocked state in a
d) User
process model. The different states are
Answer: a ready, running, executing, waiting and
Explanation: An application software is terminated.
specific to solving a specific problem.
11. The language made up of binary coded
System software is designed for controlling
instructions.
the operations of a computer system.
a) Machine
8. Assembler is used as a translator for? b) C
a) Low level language c) BASIC
b) High Level Language d) High level
c) COBOL
Answer: a
d) C
Explanation: The language made up of
Answer: a binary coded instructions built into the
Explanation: Assembler is used in case of hardware of a particular computer and used
low level languages. It is generally used to directly by the computer is machine
make the binary code into an language.
understandable format. Interpreter is used
12. Binary code comprises of digits from 0
with the high level languages similarly.
to 9.
9. What do you call a program in execution? a) True
a) Command b) False
b) Process
Answer: b
c) Task
Explanation: The statement is false. Binary
d) Instruction
as the word suggests contains only 2 digits :
Answer: b 0 and 1.
Explanation: Option Process is correct. A 0 denotes false and 1 denotes a truth value.
program is a set of instructions. A program
13. The contains the address
in execution is called a process.
of the next instruction to be executed.
10. Which of the following is not a process a) IR
state? b) PC
a) Terminated c) Accumulator
b) Running d) System counter
Answer: b Answer: a
Explanation: PC stands for program counter Explanation: The statement is true.
(It contains the address of the next Advantages of using assembly language are:
instruction to be executed). • It requires less memory and execution
time.
14. A document that specifies how many
• It allows hardware-specific complex jobs
times and with what data the program must
in an easier way.
be run in order to thoroughly test it.
• It is suitable for time-critical jobs.
a) addressing plan
b) test plan 17. The data size of a word is
c) validation plan a) 2-byte
d) verification plan b) 4-byte
c) 8-byte
Answer: b
d)16-byte
Explanation: Test plan is the A document
that specifies how many times and with Answer: a
what data the program must be run in Explanation: The processor supports the
order to thoroughly test it. It comes under following data sizes:
testing. • Word: a 2-byte data item
• Double word: a 4-byte (32 bit) data item,
15. Each personal computer has a
etc.
that manages the computer‟s
arithmetical, logical and control activities. 18. A direct reference of specific location.
a) Microprocessor a) Segment Address
b) Assembler b) Absolute Address
c) Microcontroller c) Offset
d) Interpreter d) Memory Address
Answer: a Answer: b
Explanation: Microprocessor handles all Explanation: There are two kinds of
these activities. Each family of processors memory addresses:
has its own set of instructions for handling • An absolute address – a direct reference
various operations like getting input from of specific location.
keyboard, displaying information on a • The segment address (or offset) – starting
screen and performing various other jobs. address of a memory segment with the
offset value.
16. Assembly Language requires less
memory and execution time. 19. A Borland Turbo Assembler.
a) True a) nasm
b) False b) tasm
26. To access the services of operating c) to handle the files in operating system
system, the interface is provided by the d) none of the mentioned
c) RTLinux an error
d) Palm OS b) software generated interrupt caused by
an error
Answer: d
c) user generated interrupt caused by an
Explanation: None.
error
34. The OS X has d) none of the mentioned
a) monolithic kernel
Answer: b
b) hybrid kernel
Explanation: None.
c) microkernel
d) monolithic kernel with modules 38. What is an ISR?
a) Information Service Request
Answer: b
b) Interrupt Service Request
Explanation: None.
c) Interrupt Service Routine
35. The initial program that is run when the d) Information Service Routine
computer is powered up is called
Answer: c
Explanation: None.
a) boot program
b) bootloader 39. What is an interrupt vector?
c) initializer a) It is an address that is indexed to an
d) bootstrap program interrupt handler
b) It is a unique device number that is
Answer: d
indexed by an address
Explanation: None.
c) It is a unique identity given to an
36. How does the software trigger an interrupt
interrupt? d) None of the mentioned
a) Sending signals to CPU through bus
Answer: a
b) Executing a special operation called
Explanation: None.
system call
c) Executing a special program called 40. The systems which allow only one
system program process execution at a time, are called
d) Executing a special program called
interrupt trigger program a) uniprogramming systems
b) uniprocessing systems
Answer: b
c) unitasking systems
Explanation: None.
d) none of the mentioned
37. What is a trap/exception?
Answer: b
a) hardware generated interrupt caused by
Explanation: Those systems which allows
more than one process execution at a time, c) when process is using the CPU
are called multiprogramming systems. d) none of the mentioned
Uniprocessing means only one processor.
Answer: a
41. In operating system, each process has Explanation: When process is unable to run
its own until some task has been completed, the
a) address space and global variables process is in blocked state and if process is
b) open files using the CPU, it is in running state.
c) pending alarms, signals and signal
45. What is interprocess communication?
handlers
a) communication within the process
d) all of the mentioned
b) communication between two process
Answer: d c) communication between two threads of
Explanation: None. same process
d) none of the mentioned
42. In Unix, Which system call creates the
new process? Answer: b
a) fork Explanation: None.
b) create
46. A set of processes is deadlock if
c) new
d) none of the mentioned
a) each process is blocked and will remain
Answer: a so forever
Explanation: None. b) each process is terminated
c) all processes are trying to kill each other
43. A process can be terminated due to d) none of the mentioned
48. Which system call returns the process 52. What will happen when a process
identifier of a terminated child? terminates?
a) wait a) It is removed from all queues
b) exit b) It is removed from all, but the job queue
c) fork c) Its process control block is de-allocated
d) get d) Its process control block is never de-
allocated
Answer: a
Explanation: None. Answer: a
Explanation: None.
49. The address of the next instruction to
be executed by the current process is 53. Which process can be affected by other
provided by the processes executing in the system?
a) CPU registers a) cooperating process
b) Program counter b) child process
c) Process stack c) parent process
d) Pipe d) init process
Answer: b Answer: a
Explanation: None. Explanation: None.
50. Which of the following do not belong to 54. When several processes access the
queues for processes? same data concurrently and the outcome of
a) Job Queue the execution depends on the particular
b) PCB queue order in which the access takes place, is
c) Device Queue called?
d) Ready Queue a) dynamic condition
b) race condition
Answer: b
c) essential condition
Explanation: None.
d) critical condition
51. When the process issues an I/O request
Answer: b
Explanation: None.
a) It is placed in an I/O queue
b) It is placed in a waiting queue 55. If a process is executing in its critical
c) It is placed in the ready queue section, then no other processes can be
d) It is placed in the Job queue executing in their critical section. This
condition is called?
Answer: a
a) mutual exclusion
Explanation: None.
b) critical exclusion
c) synchronous exclusion
d) asynchronous exclusion a) priority inversion
b) priority removal
Answer: a
c) priority exchange
Explanation: None.
d) priority modification
56. Which one of the following is a
Answer: a
synchronization tool?
Explanation: None.
a) thread
b) pipe 60. Process synchronization can be done on
c) semaphore
d) socket a) hardware level
b) software level
Answer: c c) both hardware and software level
Explanation: None. d) none of the mentioned
57. A semaphore is a shared integer Answer: c
variable Explanation: None.
a) that can not drop below zero
b) that can not be more than zero 61. What is Inter process communication?
c) that can not drop below one a) allows processes to communicate and
d) that can not be more than one synchronize their actions when using the
same address space
Answer: a b) allows processes to communicate and
Explanation: None. synchronize their actions without using the
58. Mutual exclusion can be provided by the same address space
c) allows the processes to only synchronize
a) mutex locks their actions without communication
b) binary semaphores d) none of the mentioned
c) both mutex locks and binary semaphores
Answer: b
d) none of the mentioned
Explanation: None.
Answer: c
62. Message passing system allows
Explanation: Binary Semaphores are known
processes to
as mutex locks.
a) communicate with one another without
59. When high priority task is indirectly resorting to shared data
preempted by medium priority task b) communicate with one another by
effectively inverting the relative priority of resorting to shared data
the two tasks, the scenario is called c) share data
Answer: c Answer: c
Explanation: None. Explanation: None.
65. The link between two processes P and Q 68. In the non blocking send
to send and receive messages is called a) the sending process keeps sending until
the message is received
a) communication link b) the sending process sends the message
b) message-passing link and resumes operation
c) synchronization link c) the sending process keeps sending until it
d) all of the mentioned receives a message
d) none of the mentioned
Answer: a
Explanation: None. Answer: b
Explanation: None.
66. Which of the following are TRUE for
direct communication? 69. In the Zero capacity queue
a) A communication link can be associated a) the queue can store at least one message
with N number of process(N = max. number b) the sender blocks until the receiver
of processes supported by system) receives the message
c) the sender keeps sending and the
messages don‟t wait in the queue 73. The interval from the time of
d) none of the mentioned submission of a process to the time of
completion is termed as
Answer: b
a) waiting time
Explanation: None.
b) turnaround time
70. The Zero Capacity queue c) response time
a) is referred to as a message system with d) throughput
buffering
Answer: b
b) is referred to as a message system with
Explanation: None.
no buffering
c) is referred to as a link 74. Which scheduling algorithm allocates
d) none of the mentioned the CPU first to the process that requests
the CPU first?
Answer: b
a) first-come, first-served scheduling
Explanation: None.
b) shortest job scheduling
71. Which module gives control of the CPU c) priority scheduling
to the process selected by the short-term d) none of the mentioned
scheduler?
Answer: a
a) dispatcher
Explanation: None.
b) interrupt
c) scheduler 75. In priority scheduling algorithm
d) none of the mentioned
a) CPU is allocated to the process with
Answer: a highest priority
Explanation: None. b) CPU is allocated to the process with
72. The processes that are residing in main lowest priority
memory and are ready and waiting to c) Equal priority processes can not be
execute are kept on a list called scheduled
d) None of the mentioned
a) job queue
Answer: a
b) ready queue
Explanation: None.
c) execution queue
d) process queue 76. In priority scheduling algorithm, when a
process arrives at the ready queue, its
Answer: b
priority is compared with the priority of
Explanation: None.
a) all process
b) currently running process
Answer: b Answer: a
Explanation: None. Explanation: None.
77. Which algorithm is defined in Time 81. What are the two steps of a process
quantum? execution?
a) shortest job scheduling algorithm a) I/O & OS Burst
b) round robin scheduling algorithm b) CPU & I/O Burst
c) priority scheduling algorithm c) Memory & I/O Burst
d) multilevel queue scheduling algorithm d) OS & Memory Burst
Answer: b Answer: b
Explanation: None. Explanation: None.
78. Process are classified into different 82. An I/O bound program will typically
groups in have
a) shortest job scheduling algorithm a) a few very short CPU bursts
b) round robin scheduling algorithm b) many very short I/O bursts
c) priority scheduling algorithm c) many very short CPU bursts
d) multilevel queue scheduling algorithm d) a few very short I/O bursts
Answer: d Answer: c
Explanation: None. Explanation: None.
79. CPU scheduling is the basis of 83. A process is selected from the
queue by the scheduler, to be
a) multiprocessor systems executed.
b) multiprogramming operating systems a) blocked, short term
c) larger memory sized systems b) wait, long term
d) none of the mentioned c) ready, short term
d) ready, long term
Answer: b
Explanation: None. Answer: c
Explanation: None.
80. With multiprogramming is used
productively. 84. Round robin scheduling falls under the
a) time category of
b) space a) Non-preemptive scheduling
b) Preemptive scheduling
Answer: b Answer: a
Explanation: None. Explanation: Large computers are
overloaded with a greater number of
85. With round robin scheduling algorithm
processes.
in a time shared system
a) using very large time slices converts it 88. What is FIFO algorithm?
into First come First served scheduling a) first executes the job that came in last in
algorithm the queue
b) using very small time slices converts it b) first executes the job that came in first in
into First come First served scheduling the queue
algorithm c) first executes the job that needs minimal
c) using extremely small time slices processor
increases performance d) first executes the job that has maximum
d) using very small time slices converts it processor needs
into Shortest Job First algorithm
Answer: b
Answer: a Explanation: None.
Explanation: All the processes will be able
89. The strategy of making processes that
to get completed.
are logically runnable to be temporarily
86. The portion of the process scheduler in suspended is called
an operating system that dispatches a) Non preemptive scheduling
processes is concerned with b) Preemptive scheduling
a) assigning ready processes to CPU c) Shortest job first
b) assigning ready processes to waiting d) First come First served
queue
Answer: b
c) assigning running processes to blocked
Explanation: None.
queue
d) all of the mentioned 90. What is Scheduling?
a) allowing a job to use the processor
Answer: a
b) making proper use of processor
Explanation: None.
c) all of the mentioned
87. Complex scheduling algorithms d) none of the mentioned
P2 8
Answer: a Answer: c
Explanation: None. Explanation: None.
105. A minimum of variable(s) is/are 109. What are the two atomic operations
required to be shared between processes to permissible on semaphores?
solve the critical section problem. a) wait
a) one b) stop
b) two c) hold
c) three d) none of the mentioned
d) four
Answer: a
Answer: b Explanation: None.
Explanation: None.
110. What are Spinlocks?
106. An un-interruptible unit is known as a) CPU cycles wasting locks over critical
sections of programs
a) single b) Locks that avoid time wastage in context
b) atomic switches
c) static c) Locks that work better on multiprocessor
d) none of the mentioned systems
d) All of the mentioned
Answer: b
Explanation: None. Answer: d
Explanation: None.
107. TestAndSet instruction is executed
111. What is the main disadvantage of
a) after a particular process spinlocks?
b) periodically a) they are not sufficient for many process
c) atomically b) they require busy waiting
d) none of the mentioned c) they are unreliable sometimes
d) they are too complex for programmers
Answer: c
Explanation: None. Answer: b
Explanation: None.
108. Semaphore is a/an to solve
the critical section problem.
c) all deadlocked processes must be 137. For a deadlock to arise, which of the
aborted following conditions must hold
d) inversion technique can be used simultaneously?
a) Mutual exclusion
Answer: a
b) No preemption
Explanation: None.
c) Hold and wait
134. The number of resources requested by d) All of the mentioned
a process
Answer: d
a) must always be less than the total
Explanation: None.
number of resources available in the system
b) must always be equal to the total 138. For Mutual exclusion to prevail in the
number of resources available in the system system
c) must not exceed the total number of a) at least one resource must be held in a
resources available in the system non sharable mode
d) must exceed the total number of b) the processor must be a uniprocessor
resources available in the system rather than a multiprocessor
c) there must be at least one resource in a
Answer: c
sharable mode
Explanation: None.
d) all of the mentioned
135. The request and release of resources
Answer: a
are
Explanation: If another process requests
a) command line statements
that resource (non – shareable resource),
b) interrupts
the requesting process must be delayed
c) system calls
until the resource has been released.
d) special programs
139. For a Hold and wait condition to
Answer: c
prevail
Explanation: None.
a) A process must be not be holding a
136. What are Multithreaded programs? resource, but waiting for one to be freed,
a) lesser prone to deadlocks and then request to acquire it
b) more prone to deadlocks b) A process must be holding at least one
c) not at all prone to deadlocks resource and waiting to acquire additional
d) none of the mentioned resources that are being held by other
processes
Answer: b c) A process must hold at least one resource
Explanation: Multiple threads can compete and not be waiting to acquire additional
for shared resources. resources
d) None of the mentioned
a) rarely Answer: c
b) frequently Explanation: None.
being checked against the relocation and 179. If relocation is static and is done at
limit registers assembly or load time, compaction
Answer: a Answer: c
Explanation: None. Explanation: None.
183. Logical memory is broken into blocks 187. The size of a page is typically
of the same size called
a) frames a) varied
b) pages b) power of 2
c) backing store c) power of 4
d) none of the mentioned d) none of the mentioned
Answer: b Answer: b
Explanation: None. Explanation: None.
184. Every address generated by the CPU is 188. Each entry in a translation lookaside
divided into two parts. They are buffer (TLB) consists of
a) key
a) frame bit & page number b) value
b) page number & page offset c) bit value
c) page offset & frame bit d) constant
d) frame offset & page offset
Answer: a
Answer: b Explanation: None.
Explanation: None.
189. If a page number is not found in the
185. The is used as an index TLB, then it is known as a
into the page table. a) TLB miss
a) frame bit b) Buffer miss
b) page number c) TLB hit
c) page offset d) All of the mentioned
d) frame offset
Answer: a
Answer: b Explanation: None.
Explanation: None.
190. An uniquely identifies
186. The table contains the base processes and is used to provide address
address of each page in physical memory. space protection for that process.
a) process a) address space locator
b) memory b) address space identifier
c) page c) address process identifier
d) frame d) none of the mentioned
a) protection algorithm with each page 196. Each entry in a segment table has a
b) restricted access rights to users
c) restriction on page visibility a) segment base
d) protection bit with each page b) segment peak
c) segment value
Answer: d d) none of the mentioned
Explanation: None.
Answer: a
193. When the valid – invalid bit is set to Explanation: None.
valid, it means that the associated page
197. The segment base contains the
a) is in the TLB
b) has data in it a) starting logical address of the process
c) is in the process‟s logical address space b) starting physical address of the segment
d) is the system‟s physical address space in memory
c) segment length
Answer: c d) none of the mentioned
Explanation: None.
Answer: b
194. In segmentation, each address is Explanation: None.
specified by
a) a segment number & offset 198. The segment limit contains the
b) an offset & value
a) starting logical address of the process
b) starting physical address of the segment 202. The protection bit is 0/1 based on
in memory
c) segment length a) write only
d) none of the mentioned b) read only
c) read – write
Answer: c d) none of the mentioned
Explanation: None.
Answer: c
199. The offset „d‟ of the logical address Explanation: None.
must be
a) greater than segment limit 203. If there are 32 segments, each of size
b) between 0 and segment limit 1Kb, then the logical address should have
c) between 0 and the segment number
d) greater than the segment number a) 13 bits
b) 14 bits
Answer: b c) 15 bits
Explanation: None. d) 16 bits
200. If the offset is legal Answer: a
a) it is used as a physical memory address Explanation: To specify a particular
itself segment, 5 bits are required. To select a
b) it is subtracted from the segment base to particular byte after selecting a page, 10
produce the physical memory address more bits are required. Hence 15 bits are
c) it is added to the segment base to required.
produce the physical memory address
d) none of the mentioned 204. If one or more devices use a common
set of wires to communicate with the
Answer: a computer system, the connection is called
Explanation: None.
a) CPU
201. When the entries in the segment
b) Monitor
tables of two different processes point to
c) Wirefull
the same physical location
d) Bus
a) the segments are invalid
b) the processes get blocked Answer: d
c) segments are shared Explanation: None.
d) all of the mentioned
205. A a set of wires and a rigidly
Answer: c defined protocol that specifies a set of
Explanation: None. messages that can be sent on the wires.
a) port
b) node Answer: a
c) bus Explanation: None.
d) none of the mentioned
209. An I/O port typically consists of four
Answer: c registers status, control, and
Explanation: None. registers.
a) system in, system out
206. When device A has a cable that plugs
b) data in, data out
into device B, and device B has a cable that
c) flow in, flow out
plugs into device C and device C plugs into a
d) input, output
port on the computer, this arrangement is
called a Answer: b
a) port Explanation: None.
b) daisy chain
210. The register is read by the host
c) bus
to get input.
d) cable
a) flow in
Answer: b b) flow out
Explanation: None. c) data in
d) data out
207. The present a uniform
device-access interface to the I/O Answer: c
subsystem, much as system calls provide a Explanation: None.
standard interface between the application
211. The register is written by the
and the operating system.
host to send output.
a) Devices
a) status
b) Buses
b) control
c) Device drivers
c) data in
d) I/O systems
d) data out
Answer: c
Answer: d
Explanation: None.
Explanation: None.
208. A is a collection of
212. The hardware mechanism that allows a
electronics that can operate a port, a bus,
device to notify the CPU is called
or a device.
a) polling
a) controller
b) interrupt
b) driver
c) driver
c) host
d) controlling
d) bus
Answer: a a) errors
Explanation: None. b) exceptions
c) interrupt handlers
234. The can be turned off by the
d) all of the mentioned
CPU before the execution of critical
instruction sequences that must not be Answer: b
interrupted. Explanation: None.
a) nonmaskable interrupt
238. For large data transfers, is
b) blocked interrupt
used.
c) maskable interrupt
a) dma
d) none of the mentioned
b) programmed I/O
Answer: c c) controller register
Explanation: None. d) none of the mentioned
Answer: b Answer: b
Explanation: None. Explanation: None.
Answer: c Answer: b
Explanation: None. Explanation: None.
252. For most computers, the bootstrap is 256. The set of tracks that are at one arm
stored in position make up a
a) RAM a) magnetic disks
b) ROM b) electrical disks
c) Cache c) assemblies
d) Tertiary storage d) cylinders
Answer: b Answer: d
Explanation: None. Explanation: None.
253. A disk that has a boot partition is called 257. The time taken to move the disk arm
a to the desired cylinder is called the
a) start disk
b) end disk a) positioning time
c) boot disk b) random access time
d) all of the mentioned c) seek time
d) rotational latency
Answer: c
Explanation: None. Answer: c
Explanation: None.
254. In information is recorded
magnetically on platters.
258. Whenever a process needs I/O to or Considering SSTF (shortest seek time first)
from a disk it issues a scheduling, the total number of head
a) system call to the CPU movements is, if the disk head is initially at
b) system call to the operating system 53 is?
c) a special procedure a) 224
d) all of the mentioned b) 236
c) 245
Answer: b
d) 240
Explanation: None.
Answer: b
259. If a process needs I/O to or from a disk,
Explanation: None.
and if the drive or controller is busy then
262. Random access in magnetic tapes is
a) the request will be placed in the queue of compared to magnetic disks.
pending requests for that drive a) fast
b) the request will not be processed and will b) very fast
be ignored completely c) slow
c) the request will be not be placed d) very slow
d) none of the mentioned
Answer: d
Answer: a Explanation: None.
Explanation: None.
263. I/O hardware contains
260. Consider a disk queue with requests a) Bus
for I/O to blocks on cylinders. b) Controller
98 183 37 122 14 124 65 67 c) I/O port and its registers
Considering FCFS (first cum first served) d) All of the mentioned
scheduling, the total number of head
Answer: d
movements is, if the disk head is initially at
Explanation: None.
53 is?
a) 600 264. The data-in register of I/O port is
b) 620
c) 630 a) Read by host to get input
d) 640 b) Read by controller to get input
c) Written by host to send output
Answer: d
d) Written by host to start a command
Explanation: None.
Answer: a
261. Consider a disk queue with requests
Explanation: None.
for I/O to blocks on cylinders.
98 183 37 122 14 124 65 67
c) the entire process will run 275. When is the Many to One model at an
d) none of the mentioned advantage?
a) When the program does not need
Answer: a
multithreading
Explanation: None.
b) When the program has to be multi-
273. In the Many to One model, multiple threaded
threads are unable to run in parallel on c) When there is a single processor
multiprocessors because of d) None of the mentioned
a) only one thread can access the kernel at
Answer: a
a time
Explanation: None.
b) many user threads have access to just
one kernel thread 276. In the Many to Many model true
c) there is only one kernel thread concurrency cannot be gained because
d) none of the mentioned
a) the kernel can schedule only one thread
Answer: a at a time
Explanation: None. b) there are too many threads to handle
273. The One to One model allows c) it is hard to map threads with each other
d) none of the mentioned
a) increased concurrency
Answer: a
b) decreased concurrency
Explanation: None.
c) increased or decreased concurrency
d) concurrency equivalent to other models 277. In the Many to Many models when a
thread performs a blocking system call
Answer: a
Explanation: None. a) other threads are strictly prohibited from
274. In the One to One model when a running
thread makes a blocking system call b) other threads are allowed to run
c) other threads only from other processes
a) other threads are strictly prohibited from are allowed to run
running d) none of the mentioned
b) other threads are allowed to run
Answer: b
c) other threads only from other processes
Explanation: None.
are allowed to run
d) none of the mentioned 278. 1. Thread pools are useful when
286. What are routing strategies which is 290. If one site fails in distributed system
not used in distributed systems? then
a) Fixed routing a) the remaining sites can continue
b) Token routing operating
c) Virtual circuit b) all the sites will stop working
d) Dynamic routing c) directly connected sites will stop working
d) none of the mentioned
Answer: c
Explanation: None. Answer: a
Explanation: None.
287. What are the connection strategies not
used in distributed systems? 291. Network operating system runs on
a) Circuit switching
b) Message switching a) server
c) Token switching b) every system in the network
d) Packet switching c) both server and every system in the
network
Answer: c d) none of the mentioned
Explanation: None.
Answer: a
288. How is are collisions avoided in Explanation: None.
network?
a) Carrier sense with multiple access 292. Which technique is based on compile-
(CSMA); collision detection (CD) time program transformation for accessing
b) Carrier sense multiple access with remote data in a distributed-memory
collision avoidance parallel system?
c) Message slots a) cache coherence scheme
d) All of the mentioned b) computation migration
c) remote procedure call
Answer: d d) message passing
Explanation: None.
Answer: b
289. In distributed system, each processor Explanation: None.
has its own
a) local memory 293. Logical extension of computation
b) clock migration is
c) both local memory and clock a) process migration
d) none of the mentioned b) system migration
c) thread migration
Answer: c d) data migration
Explanation: None.
Answer: a Answer: b
Explanation: None. Explanation: None.
294. Processes on the remote systems are 298. What are the characteristics of
identified by processor in distributed system?
a) host ID a) They vary in size and function
b) host name and identifier b) They are same in size and function
c) identifier c) They are manufactured with single
d) process ID purpose
d) They are real-time devices
Answer: b
Explanation: None. Answer: a
Explanation: None.
295. Which routing technique is used in a
distributed system? 299. What are the characteristics of a
a) fixed routing distributed file system?
b) virtual routing a) Its users, servers and storage devices are
c) dynamic routing dispersed
d) all of the mentioned b) Service activity is not carried out across
the network
Answer: d
c) They have single centralized data
Explanation: None.
repository
296. In distributed systems, link and site d) There are multiple dependent storage
failure is detected by devices
a) polling
Answer: a
b) handshaking
Explanation: None.
c) token passing
d) none of the mentioned 300. What is not a major reason for building
distributed systems?
Answer: b
a) Resource sharing
Explanation: None.
b) Computation speedup
297. What is not true about a distributed c) Reliability
system? d) Simplicity
a) It is a collection of processor
Answer: d
b) All processors are synchronized
Explanation: None.
c) They do not share memory
d) None of the mentioned 301. What are the types of distributed
operating system?
a) Network Operating system
Answer: d Answer: a
Explanation: None. Explanation: None.
317. Which is not a major component of a 321. What are characteristic of NFS
file system? protocol?
a) Directory service a) Search for file within directory
b) Authorization service b) Read a set of directory entries
c) Shadow service c) Manipulate links and directories
d) System service d) All of the mentioned
Answer: c Answer: d
Explanation: None. Explanation: None.
318. What are the different ways mounting 322. The file once created can not be
of the file system? changed is called
a) boot mounting a) immutable file
b) auto mounting b) mutex file
c) explicit mounting c) mutable file
d) all of the mentioned d) none of the mentioned
Answer: d Answer: a
Explanation: None. Explanation: None.
332. A heavy weight process c) reduce the address space that a process
a) has multiple threads of execution could potentially use
b) has a single thread of execution d) all of the mentioned
c) can have multiple or a single thread for
Answer: d
execution
Explanation: None.
d) none of the mentioned
336. Multithreading on a multi – CPU
Answer: b
machine
Explanation: None.
a) decreases concurrency
333. A process having multiple threads of b) increases concurrency
control implies c) doesn‟t affect the concurrency
a) it can do more than one task at a time d) can increase or decrease the concurrency
b) it can do only one task at a time, but
Answer: b
much faster
Explanation: None.
c) it has to use only one thread per process
d) none of the mentioned 337. The kernel is of user threads.
a) a part of
Answer: a
b) the creator of
Explanation: None.
c) unaware of
334. Multithreading an interactive program d) aware of
will increase responsiveness to the user by
Answer: c
a) continuing to run even if a part of it is Explanation: None.
blocked 338. is a unique tag, usually a
b) waiting for one part to finish before the number identifies the file within the file
other begins system.
c) asking the user to decide the order of a) File identifier
multithreading b) File name
d) none of the mentioned c) File type
Answer: a d) None of the mentioned
Explanation: None. Answer: a
335. Resource sharing helps Explanation: None.
a) share the memory and resources of the 339. To create a file
process to which the threads belong a) allocate the space in file system
b) an application have several different b) make an entry for new file in directory
threads of activity all within the same c) allocate the space in file system & make
address space
b) only if he accesses the system with a translations for the entire internet
guest account c) binary to hex translations for the entire
c) only if he has an account on the remote internet
system d) all of the mentioned
d) none of the mentioned
Answer: a
Answer: a Explanation: None.
Explanation: The world wide web uses
358. Reliability of files can be increased by
anonymous file exchange almost
exclusively.
a) keeping the files safely in the memory
355. The machine containing the files is the b) making a different partition for the files
and the machine wanting to access c) by keeping them in external storage
the files is the d) by keeping duplicate copies of the file
a) master, slave
Answer: d
b) memory, user
Explanation: None.
c) server, client
d) none of the mentioned 359. Protection is only provided at the
level.
Answer: c
a) lower
Explanation: None.
b) central
356. Distributed naming c) higher
services/Distributed information systems d) none of the mentioned
have been devised to
Answer: a
a) provide information about all the
Explanation: None.
systems
b) provide unified access to the information 360. What is the main problem with access
needed for remote computing control lists?
c) provide unique names to all systems in a a) their maintenance
network b) their length
d) all of the mentioned c) their permissions
d) all of the mentioned
Answer: b
Explanation: None. Answer: b
Explanation: None.
357. Domain name system provides
361. Many systems recognize three
a) host-name-to-network-address classifications of users in connection with
translations for the entire internet each file (to condense the access control
b) network-address-to-host-name
list). Answer: b
a) Owner Explanation: None.
b) Group
365. In indexed allocation
c) Universe
a) each file must occupy a set of contiguous
d) All of the mentioned
blocks on the disk
Answer: d b) each file is a linked list of disk blocks
Explanation: None. c) all the pointers to scattered blocks are
placed together in one location
362. The three major methods of allocating
d) none of the mentioned
disk space that are in wide use are
Answer: c
a) contiguous Explanation: None.
b) linked
c) indexed 366. On systems where there are multiple
d) all of the mentioned operating system, the decision to load a
particular one is done by
Answer: d a) boot loader
Explanation: None. b) bootstrap
c) process control block
363. In contiguous allocation
d) file control block
a) each file must occupy a set of contiguous Answer: a
blocks on the disk Explanation: None.
b) each file is a linked list of disk blocks
c) all the pointers to scattered blocks are 367. The VFS (virtual file system) activates
placed together in one location file system specific operations to handle
d) none of the mentioned local requests according to their
a) size
Answer: a b) commands
Explanation: None. c) timings
d) file system types
364. In linked allocation
a) each file must occupy a set of contiguous Answer: d
blocks on the disk Explanation: None.
b) each file is a linked list of disk blocks
c) all the pointers to scattered blocks are 368. A device driver can be thought of like a
placed together in one location translator. Its input consists of
d) none of the mentioned commands and output consists of
instructions.
a) high level, low level
b) low level, high level 372. For processes to request access to file
c) complex, simple contents, they need
d) low level, complex a) to run a seperate program
b) special interrupts
Answer: a
c) to implement the open and close system
Explanation: None.
calls
369. The file organization module knows d) none of the mentioned
about
Answer: c
a) files
Explanation: None.
b) logical blocks of files
c) physical blocks of files 373. A better way of contiguous allocation
d) all of the mentioned to extend the file size is
a) adding an extent (another chunk of
Answer: d
contiguous space)
Explanation: None.
b) adding an index table to the first
370. Metadata includes contiguous block
a) all of the file system structure c) adding pointers into the first contiguous
b) contents of files block
c) both file system structure and contents d) none of the mentioned
of files
Answer: a
d) none of the mentioned
Explanation: None.
Answer: c
374. If the extents are too large, then what
Explanation: None.
is the problem that comes in?
371. For each file there exists a a) internal fragmentation
that contains information b) external fragmentation
about the file, including ownership, c) starvation
permissions and location of the file d) all of the mentioned
contents.
Answer: a
a) metadata
Explanation: None.
b) file control block
c) process control block 375. The FAT is used much as a
d) all of the mentioned a) stack
b) linked list
Answer: b
c) data
Explanation: None.
d) pointer
Answer: b Answer: a
Explanation: None. Explanation: None.
c) it is redone
d) none of the mentioned a) Compile time
b) Load time
Answer: b
c) Execution time
Explanation: None.
d) All of the mentioned
384. A machine in Network file system (NFS)
Answer: d
can be
Explanation: None.
a) client
b) server Explanation: None.
c) both client and server
388. Which one of the following is a process
d) neither client nor server
that uses the spawn mechanism to revage
Answer: c the system performance?
Explanation: None. a) worm
b) trojan
385. A directory is mounted
c) threat
over a directory of a file system.
d) virus
a) local, remote
b) remote, local Answer: a
c) local, local Explanation: None.
d) none of the mentioned
389. What is true regarding „Fence‟?
Answer: d a) Its a method to confine users to one side
Explanation: None. of a boundary
b) It can protect Operating system from one
386. What is Address Binding?
user
a) going to an address in memory
c) It cannot protect users from each other
b) locating an address with the help of
d) All of the mentioned
another address
c) binding two addresses together to form a Answer: d
new address in a different memory space Explanation: None.
d) a mapping from one address space to
390. What is not true regarding „Fence‟?
another
a) It is implemented via hardware register
View Answer
b) It doesn‟t protect users from each other
Answer: d c) It good to protect OS from abusive users
Explanation: None. d) Its implementation is unrestricted and
can take any amount of space in Operating
387. Binding of instructions and data to
system.
memory addresses can be done at
d) Give both read and write permission but 401. Which mechanism is used by worm
not execute process?
a) Trap door
Answer: c
b) Fake process
Explanation: Limited access is a key method
c) Spawn Process
to circumvent unauthorized access and
d) VAX process
exploits.
Answer: c
398. What is breach of availability?
Explanation: None.
a) This type of violation involves
unauthorized reading of data 402. Which of the following is not a
b) This violation involves unauthorized characteristic of a virus?
modification of data a) Virus destroy and modify user data
c) This violation involves unauthorized b) Virus is a standalone program
destruction of data c) Virus is a code embedded in a legitimate
d) This violation involves unauthorized use program
of resources d) Virus cannot be detected
Answer: c Answer: d
Explanation: None. Explanation: Virus can be detected by
having an antivirus program.
399. What is Trojan horse?
a) It is a useful way to encrypt password 403. What is not an important part of
b) It is a user which steals valuable security protection?
information a) Large amount of RAM to support
c) It is a rogue program which tricks users antivirus
d) It‟s a brute force attack algorithm b) Strong passwords
c) Audit log periodically
Answer: c
d) Scan for unauthorized programs in
Explanation: None.
system directories
400. What is trap door?
Answer: a
a) IT is trap door in WarGames
Explanation: RAM has no effect on security
b) It is a hole in software left by designer
of a system. System‟s protection remains
c) It is a Trojan horse
unchanged in increasing or decreasing
d) It is a virus which traps and locks user
amount of RAM.
terminal
404. What is used to protect network from
Answer: b
outside internet access?
Explanation: None.
a) A trusted antivirus
b) 24 hours scanning for virus
c) 3 multiple processes
d) 4 b) for tasks where absolute priorities are
more important than fairness
Answer: d
c) all of the mentioned
Explanation: None.
d) none of the mentioned
411. A performance problem with
Answer: a
is the expense of computing and
Explanation: None.
writing parity.
a) non-parity based RAID levels 415. The first linux kernel which supports
b) parity based RAID levels the SMP hardware?
c) all RAID levels a) linux 0.1
d) none of the mentioned b) linux 1.0
c) linux 1.2
Answer: b
d) linux 2.0
Explanation: None.
Answer: d
412. In RAID level 4, one block read,
Explanation: None.
accesses
a) only one disk 416. What is Linux?
b) all disks simultaneously a) single user, single tasking
c) all disks sequentially b) single user, multitasking
d) none of the mentioned c) multi user, single tasking
d) multi user, multitasking
Answer: a
Explanation: Other requests are allowed to Answer: d
be processed by other disks. Explanation: None.
413. The overall I/O rate in RAID level 4 is 417. Which one of the following is not a
linux distribution?
a) low a) debian
b) very low b) gentoo
c) high c) open SUSE
d) none of the mentioned d) multics
Answer: c Answer: d
Explanation: All disks can be read in parallel. Explanation: None.
414. Linux uses a time-sharing algorithm 418. In distributed systems, a logical clock is
associated with
a) to pair preemptive scheduling between a) each instruction
Answer: a
Explanation: None.
Answer: b
Explanation: None.
Answer: c
Explanation: None.