Nothing Special   »   [go: up one dir, main page]

hiloe

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

1.

An operating system is a program that operates between users and _____


a) Computer hardware
b) Computer software
c) The application programs
d) CPU
2) What is the register that contains the memory address of the next
instruction to be fetched?
a) Stack pointer
b) Program counter
c) Program status word
d) None of the mentioned
3) To get the default run level, which function is read by init?
a) /etc/inittab
b) /etc/kernel
c) /etc/boot
d) /etc/init
4) The main function of the command interpreter is _____
a) To provide the interface between the API and application
b) To get an execute the next user-specified command
c) To handle the files in the operating system
d) None of the mentioned
5) What is not the major objective of operating systems?
a) To act as a File server to client machines requiring service on the CPU, the
memory, and disk resources
b) To provide an uniform abstraction interface to the user
c) To act as an uniform abstract machine on top of a variety of different hardware
platforms
d) None of the mentioned
6) What are basic memory address spaces?
a) Logical and virtual address space
b) Logical and physical address space
c) Virtual and physical address space
d) None of the mentioned
7) What is the base register?
a) The basic address of the program.
b) The smallest unit of RAM.
c) The smallest amount of ROM.
d) The base address of storage.
8) Most computers have two modes of operation, these are ____
a) Kernel mode and CPU mode
b) Kernel mode and User mode
c) Kernel mode and CPU mode
d) MMU mode and CPU mode
9) A process is selected from the ____ queue by the ____ scheduler, to be executed.
a) ready, short term
b) blocked, short term
c) wait, long term
d) ready, long term
10) How many types of schedulers are mainly used? Name:
a) 2 types: Large-term scheduler, Small-term scheduler.
b) 3 types: Long-term scheduler, Medium-term scheduler, Short-term scheduler.
c) 2 types: Long-term scheduler, Short-term scheduler.
d) 3 types: Long-term scheduler, Medium-term scheduler, Small-term scheduler.
11) An entry of the Process table is called _____
a) Process control block
b) Process check block
c) Process management block
d) All of the mentioned
12) Which of the following cannot be shared among different threads?
a) File handles
b) Stack
c) Process code
d) Process data
13) A _____ is a portion of a process that can run independently.
a) Thread
b) Program
c) Miniprocess
d) Subprocess
14) Which of the following process state transitions is correct, when the external
event for which a process was waiting happens?
a) Running -> ready
b) Running -> Blocked (waiting) -> ready
c) Blocked (waiting) -> running
d) Ready -> running
15) The new process consists of a copy of the ____ of the original process.
a) Address space
b) Process number
c) Process identifiers
d) All of the mentioned
16) Using Priority Scheduling algorithm, find the average waiting time for the
following set of processes given their priorities (0 is the highest priority) in the
order:
Process : Burst Time : Priority respectively
 P1 : 10 : 3
 P2 : 1 : 1
 P3 : 2 : 4
 P4 : 1 : 5
 P5 : 5 : 2
a) 7 milliseconds
b) 7.75 milliseconds
c) 3 milliseconds
d) 8.2 milliseconds
17) An address space of 8 pages, each page is 1K in size and mapped into 32 page
frames in memory. How many bits must be used to represent the logical address of
this address space?
a) 32 bit
b) 8 bit
c) 13 bit
d) 24 bit
18) What is the best description of memory swapping?
a) A computer technology that enables an operating system to extend the storage
space when needed.
b) A computer technology that enables an operating system to provide more
memory to a running application or process than is available in physical RAM.
c) A computer technology that enables an operating system to manage physical
RAM space while installing that operating system.
d) A computer technology that enables an operating system to provide more virtual
RAM space while installing that operating system.
19) What are two ways to keep track of memory usages?
a) Bit Maps and Linked Lists.
b) Physical and Virtual Lists.
c) Virtual and Linked Lists.
d) Physical and Linked Lists.
20) What are Dynamic Storage-Allocation strategies?
a) First-fit; Next-fit; Best-fit; Worst-fit.
b) First-fit; Second-fit; Best-fit; Worst-fit.
c) First-fit; Second-fit; First-fit; Last-fit.
d) First-fit; Next-fit; Last-fit; Worst-fit.
21) What is the virtual memory?
a) A part of hard disk.
b) A part of RAM.
c) A part of USB device.
d) A part of ROM BIOS.
22) What methods can virtual memory be implemented via?
a) Paging and fragmentation.
b) Paging and segmentation.
c) Fragmentation and defragmentation.
d) Fragmentation and segmentation.
23) File type can be represented by _____
a) file extension
b) file name
c) file identifier
d) None of the mentioned
24) What is the mounting of file system?
a) creating of a filesystem
b) attaching portion of the file system into a directory structure
c) deleting a filesystem
d) removing the portion of the file system into a directory structure
25) Mapping of file system is managed by _____
a) file metadata
b) page table
c) virtual memory
d) file system
26) Mapping of network file system protocol to local file system is done by _____
a) network file system
b) local file system
c) volume manager
d) remote mirror
27) _____ are special files with listings of filenames and their attributes.
a) Directories
b) Data files
c) Databases
28) Which part of a HDD disk is used to boot the computer?
a) Super block
b) MBR
c) Root block
d) None of the mentioned
29) Which class of I/O devices that HDD belong to?
a) Block devices
b) Character devices
c) Network devices
d) None of the mentioned
30) Which class of I/O devices does the keyboard belong to?
a) Block devices
b) Character devices
c) Network devices
d) None of the mentioned
31) In the hierarchical structure for managing I/O, which layer is closest to the
hardware?
a) Interrupt handlers
b) Device drivers
c) Device-independent OS software
d) None of the mentioned
32) Consider a disk queue with requests for I/O to blocks on cylinders: 98, 183, 37,
122, 14, 124, 65, 67. Using SSTF (shortest seek time first) scheduling, the 183
number of tracks traversed is:
a) 240
b) 245
c) 226
d) 230
33) What is the software interrupt required by an error?
a) Trap/exception interrupt
b) User generated interrupt executed by the processor
c) Software interrupt required by the processor
d) None of the mentioned
34) Obtain system services, which need execution privilege.
a) Return from the interrupt service
b) System services, which need execution privilege
c) Implement and reference
d) None of the mentioned
35) If the page is faulted and it is empty, in order 1 2 3 4 2 3 2 1 5 4 3 2 consider
the replacement is FIFO, the total number of page faults caused is:
a) 8
b) 11
c) 9
d) 10
36) Deadlock prevention is a set of methods _____
a) to ensure that all of the necessary conditions do not hold
b) to ensure that the necessary conditions cannot hold
c) to decide if the requested resources for a process can be allocated
d) to avoid deadlock
37) Which important things do the Inter-Process Communication (IPC) involve?
a) Race condition, Critical Region, and Dedicated device
b) Critical Region, Critical Region, and Dedicated device
c) Deadlock Problem, Race Condition, and Mutual Exclusion
d) Scheduling, Critical Region, and Dedicated device
38) Which strategy is used in the Banker's algorithm for dealing with deadlocks?
a) Deadlock ignorance
b) Deadlock avoidance
c) Deadlock detection
d) None of the mentioned
39) An example of preemptable resources is _____
a) Memory
b) CD-ROM Drive
c) DVD device
d) None of the mentioned
40) The permanent blocking of a set of processes that compete for system
resources is called _____
a) Starvation
b) Deadlock
c) Prioritization
d) None of the mentioned
41) What is the virtual memory?
a) A part of hard disk.
b) A part of RAM.
c) A part of USB device.
d) A part of ROM BIOS.
42) What method can virtual memory be implemented via?
a) Paging and fragmentation.
b) Paging and segmentation.
c) Fragmentation and defragmentation.
d) Fragmentation and segmentation.
43) File type can be represented by _____
a) file extension
b) file name
c) file content
d) None of the mentioned
44) What is the mounting of the filesystem?
a) creating a filesystem
b) attaching portion of the file system into a directory structure
c) deleting a filesystem
d) removing the portion of the file system into a directory structure
45) Mapping of file is managed by _____
a) file metadata
b) file type
c) virtual memory
d) file system

You might also like