Op
Op
d) None of these.
Answer» c
Answer» a
Answer» c
4) IR (Instruction register)
d) None of these.
Answer» b
15) User-Visible register Which of the following do not support GUI (Graphical User Interface)
a) DOS
b) WINDOWS
c) Linux
d) None of these.
Answer» a
Answer» c
Answer» c
d) None of these.
Answer» a
(i) Thread management is done by application, (ii) Thread management is done by kernel,
Answer» a
21) The Window 2000 (W2K) and Linux are the example of
c) A and B both
d) None of these.
Answer» b
a) Thread switching does not requires kernel mode privileges because all of the thread
d) When ULT executes a system call, not only that thread blocked, but all of the threads within
Answer» d
Answer» d
24) In semaphore the process blocked by wait operation is unblocked if
Answer» b
25) In cluster
a) Computers communicate with each other’s via fixed paths or via some network facilities
d) None of these.
Answer» a
a) Distributed memory
b) Shared memory
c) Master/slave architecture
d) Symmetric multi-processor.
Answer» a
c) Symmetric multi-processing
d) None of these.
Answer» b
a) Software
b) Hardware
d) None of these.
Answer» a
34) Which combination of the following features will suffice to characterize an OS as a multi
programmed OS?
(i) More than one program may be loaded into main memory at the same time for execution.
(ii) If a program waits for certain events such as I/O, another program is immediately scheduled
for execution.
(iii) If the execution of a program terminates, another program is immediately scheduled for
execution.
a) (i) only
Answer» d
b) A waiting time
d) None of these
Answer» a
36) The only state transition initiated by the user process itself in an operating system is
a) Block
c) Dispatch
d) Wake up
Answer» a
37) Window 98 is a
Answer» a
38) OS/390 is a
d) None of these.
Answer» b
39) Thread is
b) Can be interrupted
Answer» c
c) a is true, b is false
Answer» d
d) None is true.
Answer» a
Answer» a
c) A track of network
d) None of these.
Answer» b
44) The two state process models have the following states
Answer» a
a) Process control
b) I/O devices
c) Memory allocation
d) None of these.
Answer» a
b) Process descriptor
c) Task descriptor
Answer» d
48) The operating system control tables maintain process tables, because
d) None of these.
Answer» d
49) Windows XP is
a) Uni-programming processes
c) Hardware
d) None of these.
Answer» b
c) Single process
d) None of these.
Answer» b
d) None of these.
Answer» b
c) Operating system kernel can run on any processor either master or slave.
Answer» c
d) None of these.
Answer» a
d) None of these.
Answer» d
55) When operating system always run on a particular processor and that particular processor
a) Master/slave architecture
b) Symmetric multiprocessor
c) Cluster
d) None of these.
Answer» a
Answer» c
d) None of these.
Answer» a
Answer» a
61) In semaphore when the order of processes that are waiting to be removed from the queue is
a) Weak semaphore
b) Strong semaphore
c) Binary semaphore
d) None of these.
Answer» b
62) The compaction is the technique in memory management that is used to over come
a) Internal fragmentation
b) External fragmentation
d) None of these.
Answer» b
c) A logical address
d) None of these.
Answer» a
d) None of these.
Answer» a
a) The result of computation does not depend on the time at which computation is done.
b) The result of computation also depends on the time at which computation is done.
Answer» a
a) Replaces the page in memory that has not been referenced for the least time.
b) Replaces the page in memory that has not been referenced for the longest time.
d) None of these.
Answer» b
d) None of these.
Answer» a
d) None of these.
Answer» b
d) None of these.
Answer» a
c) A global queue of ready thread is maintained and each processor, when idle, selects a thread
from queue.
d) None of these.
Answer» c
a) The tasks that reacts to events that take place in outside world)
d) None of these.
Answer» a
a) A real time task that does not require dead line constraints.
d) None of these.
Answer» b
d) None of these.
Answer» a
d) None of these.
Answer» a
d) None of these.
Answer» b
81) Arrange the following I/O device in increasing data rate Hard disk, Floppy disk, Key board
Answer» a
d) None of these.
Answer» a
a) Virtual memory
b) Real memory
c) A and B both
d) None of these.
Answer» b
84) Memory that is located on the disk either Hard or floppy is referred as
a) Virtual memory
b) Real memory
c) Main memory
d) None of these.
Answer» a
b) The program and data references within a process do not tend to cluster.
d) None of these.
Answer» a
determines when a modified page should be written out to secondary memory) 2- It determines
when a page should be bought into main memory) 3- It determines where in real memory a
Answer» c
a) A modified page is written before their page frames are needed to so that pages can be written
out in batches.
b) A page is written out to secondary memory only when it has been selected for replacement.
d) None of these.
Answer» b
b) Modified pages are written before their page frames are needed so that can be written out in
batches.
d) None of these.
Answer» b
d) None of these.
Answer» a
90) In defining page table structure in virtual memory, A page number portion of a virtual
address is mapped into a hash table using simple hash function, where hash table contains a
pointer to the inverted page table, which contains page table entries, this approach is referred as
d) None of these.
Answer» c
d) The page in memory that is not been referenced for long time.
Answer» a
92) When process is swapped out of main memory and put in a suspended state
b) All of the pages that were previously in main memory are returned to main memory.
c) Pages other than the one demanded by a page fault are bought in main memory.
d) None of these.
Answer» a
93) Statement A: The placement policy determines where in real memory a process piece is to
reside
Statement B: The fetch policy determines when a page should be bought into main memory.
c) A is true, B is false
d) A is false, B is true
Answer» a
d) None of these.
Answer» b
95) Statement A: In memory management, the replacement policy deals with the selection of
the policy the fetch policy determines when a page should be bought into main memory.
c) A is true, B is false
d) A is false, B is true
Answer» b
a) The page frames are allocated to a process as circular buffer and pages are removed in
random order.
b) The page frames are allocated to a process as circular buffer and pages are removed in round
robin order.
Answer» b
a) The page replaced in memory is least likely to be referenced in the near future.
b) The page replaced in memory is most likely to be referenced in the near future.
d) None of these.
Answer» a
98) In First-In-First-out (FIFO) replacement policy used in memory management, the page
d) None of these
Answer» b
d) None of these
Answer» b
Answer» c
110) In File system architecture which is the correct arrangement from lower level to higher.
d) None of these.
Answer» a
111)In file management system the following communicate directly with perishing I/O devices.
a) Device drives
d) Logical I/O.
Answer» a
a) Disk drivers
b) Tape drivers
c) A and B both
d) None of these.
Answer» c
113) In file management, the primary interface of computer system with external environment is
done through
a) Device drivers
d) Logical I/O.
Answer» b
a) Physical I/O
c) Logical I/O
d) None of these.
Answer» c
d) None of these.
Answer» a
118) In file management, in the following record blocking method, the optional use of space is
a) Fixed blocking
d) None of these.
Answer» b
119) In secondary storage management, “If allocation of file is made on an individual block
basis and each block contains a pointer to the next block in the chain” then it is referred as
a) Contiguous allocation
b) Chained allocation
c) Indexed allocation
d) None of these.
Answer» b
120) In secondary storage management, bit table, for each block on disk a vector contains
Answer» a
121) In bit table used for Free space management in secondary storage
d) None of these
Answer» a
122) The amount of memory (in bytes) required for a block bitmap is
a) Disk size × 8
d) None of these.
Answer» b
123) In 16 G byte disk with 512-bit block, the bit table requires
a) 1 M bytes
b) 2 M bytes
c) 3 M bytes
d) 4 M bytes.
Answer» d
a) A set of function and call programs that allows clients and servers to intercommunicate.
b) A database, where information access is limited to the selection of rows that satisfy all search
criteria)
d) None of these.
Answer» a
125) If in a computer networking environment when all the processing is done on single
d) None of these.
Answer» a
c) Macintosh
d) None of these.
Answer» a
128) UNIX is a
a) Operating system
b) Hardware
c) Programming language
d) None of these.
Answer» a
135) Semaphores
Answer» c
a) using very large time slices degenerates into First-Come First Served Algorithm
Answer» a
139) The portion of the process scheduler in an operating system that dispatches processes is
concerned with
Answer» c
140) Following is the correct definition of a valid process transition within an operating system
Answer» b
145) A disk scheduling algorithm in an operating system causes the disk arm to seek back and
forth access the disc surface servicing all request in its path, this is a
c) scan
d) None of these
Answer» c
Answer» d
147) Situations where two or more processes are reading or writing some shared data and the
final result depends on who runs precisely which are called
a) race condition
b) critical sections
c) mutual exclusions
d) message passing
Answer» a
a) Semaphores
b) Event counters
c) Monitors
Answer» d
157) Windows is an
a) operating system
b) operating environment
c) user interface
d) programming platform
Answer» c
a) MS-DOS
b) OS/2
c) UNIX
Answer» d
a) UNIX
b) DOS
c) ULTRIX
d) XENIX
Answer» b
Answer» b
171) Which is the correct definition of a valid process transition in an operating system?
Answer» b
a) is a low percentage of number of records that are added to or deleted from a file
c) refers to how closely the files fit into the allocated space
d) is a measure of the number of records added or deleted from a file compassed with the
Answer» a
a) The number of records added or deleted from a file composed to the original number of
c) The extent where the records of the file "are contiguous and in proximity to others
Answer» a
a) random files
b) contiguous sequential file
Answer» b
c) The linkage editor or loader win in turn bind these relocatable addresses to absolute addresses
Answer» d
a) where the process will reside in memory, then absolute code can be generated
b) where the process will reside in memory, then the compiler must generate relocatable code
c) if the process can be moved during its execution from one memory segment to another, the
Answer» a
a) where the process will reside in memory, then absolute code can be generated
b) where the process will reside in memory, then the compiler must generate relocatable
memory
c) if the process can be moved during its execution from one memory segment to another, then
Answer» b
Answer» c
197) Stub
b) is small piece of code that indicates how to locate the appropriate memory resident library
routine
Answer» d
a) allows a process to select a replacement frame from the set of all frames
b) requires that each process selects from only its own set of allocated frames
Answer» b
199) Thrashing
Answer» c
a) segmentation
b) swapping
Answer» a
215) In a two-level scheme for the page table, assuming byte-level addressing and a 4-KByte
(212 bytes) page size, how many pages are there in a 4-GByte (232 bytes) virtual address
space?
a) 210 pages
b) 220 pages
c) 230 pages
d) 240 pages
Answer» b
217) The memory management, y one clock policy is applied then the page first loaded into a frame
a) Zero
b) One
c) Two
d) Three
Answer» b)
218) A policy in memory management is referred to as the "clock policy" because one can
a) Straight line
b) Rectangle
c) Circle
d) Square
Answer» c
d) None is true
Answer» a
d) None of these
Answer» a
a) Printer
b) Mouse
c) Communication modules
d) Disk/tape
Answer» d
222) In which of the following RAID scheme, redundancy is achieved by the simple expedient
a) RAID level 0
b) RAID level 1
c) RAID level 2
d) RAID level 3
Answer» b
223) Which of the following RAID levels uses independent access technique and distributes the
a) Two
b) Three
c) Four
d) Five
Answer» d
224) The amount of memory (in bytes) required for a block bitmap is
a) Disk size × 8
d) None of these.
Answer» b
225) In 16 G byte disk with 512-bit block, the bit table requires
a) 1 M bytes
b) 2 M bytes
c) 3 M bytes
d) 4 M bytes
Answer» d
a) Two
b) Nine
c) Eight
d) Seven
Answer» b
227) A set of resources allocations such that the system can allocate resources to each process
a) unsafe state
b) safe state
c) Starvation
d) Greedy allocation
Answer» b
a) deadlock prevention
b) deadlock avoidance
c) deadlock recovery
d) mutual exclusion
Answer» b
252) If normalized turnaround time of different process are given) Then Highest response ratio
Answer» b
a) When processes are assigned priorities and scheduling policy favor higher priority processes.
c) Here currently running process can be interrupted and moved to ready state by the operating
system.
d) None of these.
Answer» a
Midterm
1) Suspicious Content Which one of the following is not true?
b) kernel is made of various modules which cannot be loaded in running operating system
c) kernel is the first part of the operating system to load into memory during booting
d) kernel is the program that constitutes the central core of the operating system
Answer: b
2) .................) used when source CPU type different from target type.
a) Interpretation
b) Virtualization
c) Hosting
d) Emulation
Answer: d
3) .................) maintains a table indexed according to numbers number is associated with each
system call
a) API
b) System-call interface
c) OS interface
d) Application Binary Interface
Answer: b
a) Linux
b) Unix
c) Mach
d) Windows
Answer: c
a) True
b) False
Answer: b
6) Ready queue => set of all processes residing in source code, ready and waiting to execute.
a) True
b) False
Answer: b
a) True
b) False
Answer: a
8) Many-to-Many Model Allows the operating system to create a sufficient number of kernel
threads.
a) True
b) False
Answer: a