Download as DOCX, PDF, TXT or read online from Scribd
Download as docx, pdf, or txt
You are on page 1of 7
1.
An operating system is a program that operates between users and _____
a) Computer hardware b) Computer software c) The application programs d) CPU 2) What is the register that contains the memory address of the next instruction to be fetched? a) Stack pointer b) Program counter c) Program status word d) None of the mentioned 3) To get the default run level, which function is read by init? a) /etc/inittab b) /etc/kernel c) /etc/boot d) /etc/init 4) The main function of the command interpreter is _____ a) To provide the interface between the API and application b) To get an execute the next user-specified command c) To handle the files in the operating system d) None of the mentioned 5) What is not the major objective of operating systems? a) To act as a File server to client machines requiring service on the CPU, the memory, and disk resources b) To provide an uniform abstraction interface to the user c) To act as an uniform abstract machine on top of a variety of different hardware platforms d) None of the mentioned 6) What are basic memory address spaces? a) Logical and virtual address space b) Logical and physical address space c) Virtual and physical address space d) None of the mentioned 7) What is the base register? a) The basic address of the program. b) The smallest unit of RAM. c) The smallest amount of ROM. d) The base address of storage. 8) Most computers have two modes of operation, these are ____ a) Kernel mode and CPU mode b) Kernel mode and User mode c) Kernel mode and CPU mode d) MMU mode and CPU mode 9) A process is selected from the ____ queue by the ____ scheduler, to be executed. a) ready, short term b) blocked, short term c) wait, long term d) ready, long term 10) How many types of schedulers are mainly used? Name: a) 2 types: Large-term scheduler, Small-term scheduler. b) 3 types: Long-term scheduler, Medium-term scheduler, Short-term scheduler. c) 2 types: Long-term scheduler, Short-term scheduler. d) 3 types: Long-term scheduler, Medium-term scheduler, Small-term scheduler. 11) An entry of the Process table is called _____ a) Process control block b) Process check block c) Process management block d) All of the mentioned 12) Which of the following cannot be shared among different threads? a) File handles b) Stack c) Process code d) Process data 13) A _____ is a portion of a process that can run independently. a) Thread b) Program c) Miniprocess d) Subprocess 14) Which of the following process state transitions is correct, when the external event for which a process was waiting happens? a) Running -> ready b) Running -> Blocked (waiting) -> ready c) Blocked (waiting) -> running d) Ready -> running 15) The new process consists of a copy of the ____ of the original process. a) Address space b) Process number c) Process identifiers d) All of the mentioned 16) Using Priority Scheduling algorithm, find the average waiting time for the following set of processes given their priorities (0 is the highest priority) in the order: Process : Burst Time : Priority respectively P1 : 10 : 3 P2 : 1 : 1 P3 : 2 : 4 P4 : 1 : 5 P5 : 5 : 2 a) 7 milliseconds b) 7.75 milliseconds c) 3 milliseconds d) 8.2 milliseconds 17) An address space of 8 pages, each page is 1K in size and mapped into 32 page frames in memory. How many bits must be used to represent the logical address of this address space? a) 32 bit b) 8 bit c) 13 bit d) 24 bit 18) What is the best description of memory swapping? a) A computer technology that enables an operating system to extend the storage space when needed. b) A computer technology that enables an operating system to provide more memory to a running application or process than is available in physical RAM. c) A computer technology that enables an operating system to manage physical RAM space while installing that operating system. d) A computer technology that enables an operating system to provide more virtual RAM space while installing that operating system. 19) What are two ways to keep track of memory usages? a) Bit Maps and Linked Lists. b) Physical and Virtual Lists. c) Virtual and Linked Lists. d) Physical and Linked Lists. 20) What are Dynamic Storage-Allocation strategies? a) First-fit; Next-fit; Best-fit; Worst-fit. b) First-fit; Second-fit; Best-fit; Worst-fit. c) First-fit; Second-fit; First-fit; Last-fit. d) First-fit; Next-fit; Last-fit; Worst-fit. 21) What is the virtual memory? a) A part of hard disk. b) A part of RAM. c) A part of USB device. d) A part of ROM BIOS. 22) What methods can virtual memory be implemented via? a) Paging and fragmentation. b) Paging and segmentation. c) Fragmentation and defragmentation. d) Fragmentation and segmentation. 23) File type can be represented by _____ a) file extension b) file name c) file identifier d) None of the mentioned 24) What is the mounting of file system? a) creating of a filesystem b) attaching portion of the file system into a directory structure c) deleting a filesystem d) removing the portion of the file system into a directory structure 25) Mapping of file system is managed by _____ a) file metadata b) page table c) virtual memory d) file system 26) Mapping of network file system protocol to local file system is done by _____ a) network file system b) local file system c) volume manager d) remote mirror 27) _____ are special files with listings of filenames and their attributes. a) Directories b) Data files c) Databases 28) Which part of a HDD disk is used to boot the computer? a) Super block b) MBR c) Root block d) None of the mentioned 29) Which class of I/O devices that HDD belong to? a) Block devices b) Character devices c) Network devices d) None of the mentioned 30) Which class of I/O devices does the keyboard belong to? a) Block devices b) Character devices c) Network devices d) None of the mentioned 31) In the hierarchical structure for managing I/O, which layer is closest to the hardware? a) Interrupt handlers b) Device drivers c) Device-independent OS software d) None of the mentioned 32) Consider a disk queue with requests for I/O to blocks on cylinders: 98, 183, 37, 122, 14, 124, 65, 67. Using SSTF (shortest seek time first) scheduling, the 183 number of tracks traversed is: a) 240 b) 245 c) 226 d) 230 33) What is the software interrupt required by an error? a) Trap/exception interrupt b) User generated interrupt executed by the processor c) Software interrupt required by the processor d) None of the mentioned 34) Obtain system services, which need execution privilege. a) Return from the interrupt service b) System services, which need execution privilege c) Implement and reference d) None of the mentioned 35) If the page is faulted and it is empty, in order 1 2 3 4 2 3 2 1 5 4 3 2 consider the replacement is FIFO, the total number of page faults caused is: a) 8 b) 11 c) 9 d) 10 36) Deadlock prevention is a set of methods _____ a) to ensure that all of the necessary conditions do not hold b) to ensure that the necessary conditions cannot hold c) to decide if the requested resources for a process can be allocated d) to avoid deadlock 37) Which important things do the Inter-Process Communication (IPC) involve? a) Race condition, Critical Region, and Dedicated device b) Critical Region, Critical Region, and Dedicated device c) Deadlock Problem, Race Condition, and Mutual Exclusion d) Scheduling, Critical Region, and Dedicated device 38) Which strategy is used in the Banker's algorithm for dealing with deadlocks? a) Deadlock ignorance b) Deadlock avoidance c) Deadlock detection d) None of the mentioned 39) An example of preemptable resources is _____ a) Memory b) CD-ROM Drive c) DVD device d) None of the mentioned 40) The permanent blocking of a set of processes that compete for system resources is called _____ a) Starvation b) Deadlock c) Prioritization d) None of the mentioned 41) What is the virtual memory? a) A part of hard disk. b) A part of RAM. c) A part of USB device. d) A part of ROM BIOS. 42) What method can virtual memory be implemented via? a) Paging and fragmentation. b) Paging and segmentation. c) Fragmentation and defragmentation. d) Fragmentation and segmentation. 43) File type can be represented by _____ a) file extension b) file name c) file content d) None of the mentioned 44) What is the mounting of the filesystem? a) creating a filesystem b) attaching portion of the file system into a directory structure c) deleting a filesystem d) removing the portion of the file system into a directory structure 45) Mapping of file is managed by _____ a) file metadata b) file type c) virtual memory d) file system