POP2
POP2
FALSE
TRUE
TRUE
TRUE
TRUE
6. Most of the mordern operating systems today are the hybrid systems
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
TRUE
13. Claim edge converts to request edge when a process requests a resource
TRUE
TRUE
15. In Linux, ASCII text file can be saved without any extension
TRUE
16. With virtualization software, computer users can work with 2 operating systems simultaneously
TRUE
17. If a deadlock is detected, operating system should always kill the process in the deadlock
FALSE
TRUE
FALSE
TRUE
TRUE
ALL
2. To ensure that the hold and wait condition never occurs in the system, it must be ensured that
________
7. The switching of the CPU from one process or thread to another is called
10. Advantage(s) of using assembly language rather than machine language is (are):
12. For a deadlock to arise, which of the following conditions must hold simultaneously?
c. All of the mentioned
15. How can you add Amit, a new user, to your system?
16. The process to be aborted is chosen on the basis of the following factors?
a. assembles
b. compilers
d. interpreters
19. Which one of the following error will be handle by the operating system?
22. Which of the following command(s) is/are used to reboot a Linux system?
DEF
1. Virtual memory is
2. A linker
3. Paging
c. is a method of memory allocation by which the program is subdivided into equal portions, or pages
4. Multiprogramming
5. Scheduling is
7. Turnaround time is
b. the total time from the completion till the submission of a process
8. Trojan-Horse programs
9. System maintenance
10. Swapping
12. Assembler is
a. a program that automate the translation of assembly language into machine language.
16. A Processor
a. are variations in the use of fundamental addressing structures, or some associated actions which are
related to addressing.
a. is a group of electrical circuits (hardware), that performs the intent of instructions fetched from
memory.
a. the time to stop one process and start running another one
22. Scheduling is :
a. allowing a job to use the processor
a. A resource that can be used by one process at a time and is not depleted by that use
27. A program
c. is a sequence of instructions
computation.
b. defines the electrical characteristics of signals passed between the computer and communication
c. rm
2. In Linux, which command is used to list all the files in your current directory (including
hidden)?
b. ls -a
d. Kernel
4. In Linux, which command is used see the list of users who are currently logged-in?
a. login
5. In Linux, which among the following interacts directly with system hardware?
c. Kernel
c. x
7. Which directory in Linux contains all the config file of the system?
b. /etc
time?
c. last
10. In Linux, to the response time and throughput, the kernel minimizes the frequency of disk
a. Buffer cache
11. In Linux, what file specifies the order in which to use specified name services?
c. /etc/nsswitch.conf
c. rmdir
a. rmdir or rm -r
d. BSD
15. Which of the following command can be used as an alternative to echo command in Linux?
c. printf
16. In Linux, what command is used to count the total number of lines, words, and characters
contained in a file?
a. wc
c. uname – r
d. Ctrl + d
20. Which command is used to change password of your Linux system?
d. passwd
b. cache memory
c. Testing checks for logical errors in the programs, while debugging is a process of correcting those
5. ‘m’ processes share ‘n’ resources of the same type. The maximum need of each process
doesn’t exceed ‘n’ and the sum of all their maximum needs is always less than m + n. In this
6. A disk scheduling algorithm in an operating system causes the disk arm to move back and
forth across the disk surface in order to service all requests in its path. This is a
a. Scan
called
b. Preemptive scheduling
9. There are 10 different processes running on a workstation. Idle processes are waiting for an
input event in the input queue. Busy processes are scheduled with the Round-Robin time
sharing method. Which out of the following quantum times is the best value ?
c. tQ = 15ms
a. Loading
13. To differentiate the many network services a system supports ______ are used.
d. Ports
a. time
c. Preemptive scheduling
c. a system software
a. banker’s algorithm
19. The most common security failure is
b. carelessness by users
21. A development strategy whereby the executive control modules of a system are coded and
b. Top-down development
22. A computer system has 6 tape drives, with ‘n’ processes competing for them. Each process
may need 3 tape drives. The maximum value of ‘n’ for which the system is guaranteed to be
a. 2
a. A process must be holding at least one resource and waiting to acquire additional resources that are
a. must not exceed the total number of resources available in the system
25. Which of the following software types is used to simplify using systems software?
c. timesharing
27. What is the name given to all the programs inside the computer with makes it usable?
d. System software
28. The state transition initiated by the user process itself in an operating system is
b. block
32. Which of the following filename extension suggests that the file is a backup copy of another
file?
d. BAK
c. the system can allocate resources to each process in some order and still avoid a deadlock
d. kernel is made of various modules which can not be loaded in running operating system
37. A system has 12 magnetic tape drives and 3 processes P0, P1, and P2. Process P0 requires 10
Process
P0
P1
P2
Maximum needs (process-wise P0 through P2 top to bottom)
10
4
9
Currently allocated (process-wise)
5
2
2
Which of the following sequence is a safe sequence?
d. P1, P0, P2
c. Spooler
39. Which of the following statements is not true about the FORTRAN language?
a. A FORTRAN program, written for the IBM-PC, is totally different from a FORTRAN program written
40. A compiler for a high-level language that runs on one machine and produces code for a
d. cross compiler
41. A system has 3 processes sharing 4 resources. If each process needs a maximum of 2 units
42. The main function of the dispatcher (the portion of the process scheduler) is
44. Which of the following capabilities is required for a system program to execute more than one
program at a time?
a. multitasking
47. The working set theory of programming behaviour of processes running within an operating
system involves
b. garbage
49. A system program that combines the separately compiled modules of a program into a form
c. linking loader
50. In which of the storage placement strategies a program is placed in the largest available hole
a. worst fit
c. uses very large time slices converts it into First come First served scheduling algorithm
55. Which of the following addressing modes, facilitates access to an operand whose location is
a. index
c. passwords
c. Sun Microsystems
59. A system with 5 processes P0 through P4 and three resource types A, B, C have A with 10
instances, B with 5 instances, and C with 7 instances. At time t0, the following snapshot has
been taken
Process
P0
P1
P2
P3
P4
Allocation (process-wise P0 through P4 top TO bottom)
A B C
0 1 0
2 0 0
3 0 2
2 1 1
0 0 2
MAX (process-wise P0 through P4 top TO bottom)
A B C
7 5 3
3 2 2
9 0 2
2 2 2
4 3 3
Available
A B C
3 3 2
The sequence <P1, P3, P4, P2, P0> leads the system to ____________
b. a safe state
61. What is the disadvantage of invoking the detection algorithm for every request?
a. Processor
63. The processes that are residing in main memory and are ready and waiting to execute are kept
on a list called
a. ready queue
64. Which, of the following checks, cannot be carried out on the input data to a system?
a. Syntax check
65. If the resources are always preempted from the same process __________ can occur.
d. starvation
66. With MS-DOS which command will divide the surface of the blank floppy disk into sectors
a. FORMAT command
68. If you want to execute more than one program at a time, the systems software you are using
must be capable of
a. multitasking
69. The higher versions of the operating systems are so written that programs designed for earlier
d. Upward compatibility
70. Which one of the following can not be scheduled by the kernel?
71. The interval from the time of submission of a process to the time of completion is termed as
c. turnaround time
a. branches off to the interrupt service routine after completion of the current instruction
c. Max – Allocation
c. not deadlocks
c. C
77. The resource allocation graph is not applicable to a resource allocation system ____________
78. Which of the following system program forgoes the production of object code to generate
absolute machine code and load it into the physical main storage location from which it will
b. load-and-go assembler
79. Each request requires that the system consider the _____________ to decide whether the
current request can be satisfied or must wait to avoid a future possible deadlock.
80. The operating system of a computer serves as a software interface between the user and
c. hardware
81. System programs such as Compilers are designed so that they are
d. reenterable
82. To _______ to a safe state, the system needs to keep more information about the states of
processes.
c. UNIX
84. Which of the following might be used to convert high-level language instructions into
machine language?
b. an interpreter
b. Terminal Table
86. To resolve the problem of data representation on different systems RPCs define ___________
87. Under multiprograming, turnaround time for short jobs is usually _____ and that for long jobs
is slightly _____.
c. shortened; lengthened
b. GOTO
d. Amount of time a deadlocked process has thus far consumed during its execution
90. Orders are processed in the sequence they arrive if _______ rule sequences the jobs.
a. system calls
92. Which of the following is not true about the memory management?
a. magnetic disk
96. The Banker’s algorithm is _____________ than the resource allocation graph algorithm.
c. less efficient
97. The register or main memory location which contains the effective address of the operand is
known as
c. pointer
c. Spooler
d. assembly language version of the program which is created by the code generation phase and is input
d. Linker
103. A process that is based on IPC mechanism which executes on different systems and
can communicate with other processes using message based communication, is called
________
104. The powerful text editor called PC-Write can be used by anybody by paying a small
b. Shareware
105. Which of the following terms refers to the degree to which data in a database system
d. data integrity
106. The initial program that is run when the computer is powered up is called __________
c. bootstrap program
107. The computational technique used to compute the disk storage address of individual
records is called
c. hashing
b. Reallocation
110. The total time to prepare a disk drive mechanism for a block of data to be read from it
is
111. Which of the following scheduling algorithms gives minimum average waiting time ?
d. SJF
112. In which addressing mode the operand is given explicitly in the instruction?
c. immediate mode
113. The errors that can be pointed out by the compiler are
a. Syntax errors
114. Which of the following algorithms tends to minimize the process flow time ?
a. the system can allocate resources to each process in some order and still avoid a deadlock
116. What scheduling algorithm allows processes that are logical runnable to be
temporarily suspended?
b. preemptive scheduling
117. What is the name of the operating system that reads and reacts in terms of actual time?
118. When a computer is first turned on or restarted, a special type of absolute loader is
executed, called a
b. Bootstrap loader
119. A translator which reads an entire programme written in a high level language and
d. compiler
120. Consider the following set of processes, the length of the CPU burst time given in
milliseconds :
Processe Burst
s Time
P1 6
P2 8
P3 7
P4 3
Assuming the above process being scheduled with the SJF scheduling algorithm :
121. The two ways of aborting processes and eliminating deadlocks are ____________
122. Which scheduling algorithm allocates the CPU first to the process that requests the
CPU first?
a. Linker
124. Object modules generated by assemblers that contain unresolved external references
d. linker
125. One way to ensure that the circular wait condition never holds is to ____________
b. impose a total ordering of all resource types and to determine whether one precedes another in the
ordering
126. The wait-for graph is a deadlock detection algorithm that is applicable when
____________
127. In which addressing mode, the address of the location of the operand is given
c. absolute mode
128. In a magnetic disk, data is recorded in a set of concentric tracks which are subdivided
into
b. sectors
129. The portion of the process scheduler in an operating system that dispatches processes
is concerned with :
130. Which one of the following is not a real time operating system?
b. Palm OS
131. Which one of the following is a visual ( mathematical ) way to determine the deadlock
occurrence?
132. A sequence of instructions, in a computer language, to get the desired result, is known
as
b. Program
133. Which facility dynamically adds probes to a running system, both in user processes
d. DTrace
134. Part of a program where the shared memory is accessed and which should be executed
invisibly, is called
b. critical section
135. A program that converts a high-level language program to a set of instructions that can
a. Compiler
137. What is the name of the operating system which was originally designed by scientists
c. UNIX
139. If deadlocks occur frequently, the detection algorithm must be invoked ________
b. frequently
140. To access the services of operating system, the interface is provided by the
d. System calls
141. If we preempt a resource from a process, the process cannot continue with its normal
d. rolled back
b. to recognize the major constructs of the language and to call the appropriate action routines that will
143. The disadvantage of a process being allocated all its resources before beginning its
execution is ____________
145. A deadlock avoidance algorithm dynamically examines the __________ to ensure that
146. Given a priori information about the ________ number of resources of each type that
maybe requested for each process, it is possible to construct an algorithm that ensures that the
b. maximum
c. manage resources
149. A relationship between processes such that each has some part (critical section) which
must not be executed while the critical section of another is being executed, is known as
a. mutual exclusion
150. A form of code that uses more than one process and processor, possibly of different
type, and that may on occasions have more than one process or processor active at the same
time, is known as
a. multi threading
151. What is the name given to the process of initializing a microcomputer with its
operating system?
b. Booting
d. When a process goes from the running state to the waiting state
155. The technique, for sharing the time of a computer among several jobs. Which switches
jobs so rapidly such that each job appears to have the computer to itself:
d. time sharing
156. RPC (Remote Procedure Call) provides a(an) _____ on the client side, a separate one
a. stub
157. Which of the following systems software does the job of merging the records from two
b. Utility program
162. What is the name given to the organized collection of software that controls the overall
operation of a computer?
b. Operating system
executes several programs concurrently by switching back and forth between them?
a. Multitasking
166. A deadlock eventually cripples system throughput and will cause the CPU utilization
to ______
a. drop
167. In priority scheduling algorithm, when a process arrives at the ready queue, its priority
168. A relationship between processes such that each has some part (critical section) which
must not be executed while the critical section of another is being executed, is known as
c. mutual exclusion
c. Aging
170. Which of the following are loaded into main memory when the computer is booted?
180. To ensure no preemption, if a process is holding some resources and requests another
181. Every time a request for allocation cannot be granted immediately, the detection
182. What is the name given to the values that are automatically provided by software to
c. Default values
183. Software that measures, monitors, analyzes, and controls real-world events is called:
d. real-time software
184. Which one is true about Multithreaded programs?
185. Which module gives control of the CPU to the process selected by the short-term
scheduler?
b. dispatcher
187. Which of the following instruction steps, would be written within the diamond-shaped
box, of a flowchart?
c. IS A<10
189. What is the name given to the software which can be legally compiled and often used
for free?
b. The language which communicates with the computer using only the binary digits 1 and 0.
192. A process is selected from the ______ queue by the ________ scheduler, to be
executed.
b. starvation
194. While working with MS-DOS, which command will you use to transfer a specific file
a. COPY
195. The details of all external symbols and relocation formation (relocation list or map) is
provided to linker by
b. Translator
196. An edge from process Pi to Pj in a wait for graph indicates that ____________
197. Which of the following is a measure to test how good or bad a modular design is
a. Module strength
c. disk
200. The process of transferring data intended for a peripheral device into a disk (or
bulk, is known as
d. spooling
202. The part of machine level instruction, which tells the central processor what has to be
done, is
b. Operation code
203. If a process fails, most operating system write the error information to a ______
a. log file
204. What is the name of the system which deals with the running of the actual computer
d. Systems program
d. macro
206. While running DOS on a PC, which command would be used to duplicate the entire
diskette?
d. DISKCOPY
207. The disadvantage of a process being allocated all its resources before beginning its
execution is _________
c. it can lead to some low priority process waiting indefinitely for the CPU
c. safe sequence
211. All the time a computer is switched on, its operating system software has to stay in
c. primary storage
212. Which of the following command is used to count number of lines in a file?
a. wc - I
213. Which of the following command is used to count number of lines in a file in Linux?
a. wc – I
219. For non sharable resources like a printer, mutual exclusion ____________
b. must exist
c. is not required
221. In which addressing mode the effective address of the operand is the contents of a
register specified in the instruction and after accessing the operand, the contents of this
b. auto increment
222. Which addressing mode the contents of a register specified in the instruction are first
decremented, and then these contents are used as the effective address of the operands?
d. auto decrement
224. The action of parsing the source program into the proper syntactic classes is known as
c. lexical analysis
225. In a memory mapped input/output __________
d. the CPU writes one data byte to the data register and sets a bit in control register to show that a
byte is available
d. the CPU receives an interrupt when the device is ready for the next byte
d. the CPU uses polling to watch the control bit constantly, looping to see if a device is ready