Dr. Baba Saheb Ambedkar Marathwada University, Aurangabad
operating system computer science bsc Ist year semester II paper V
operating system computer science bsc Ist year semester II paper V
Quiz
What is the swap space in the disk used for?
Saving temporary html pages
Saving process data
Storing the super-block
Storing device
Increasing the RAM of a computer typically improves performance because
Virtual memory increases
Larger RAMs are faster
Fewer page faults occur
Fewer segmentation faults occur
More than one word are put in one chache block to
Exploit the temporal locality of reference in a program
Exploit the spatial locality of reference in a program
Reduce the miss penalty
None of the above
Which of the following statements is false?
Virtual memory implements the translation of a program’s address space into physical memory address space
Virtual memory allows each program to exceed the size of the primary memory
Virtual memory increases the degree of multiprogramming
Virtual memory reduces the context switching overhead
Which of the following requires a device driver?
Register
Chache
Main memory
Disk
Which of the following is NOT a valid deadlock prevention scheme?
Release all resource before requesting a new resource
Number the resources uniquely and never request a lower numbered resource than the last one requested
Never request a resource after releasing any resource
Request and all required resources be allocated before execution
Which of the following is NOT a valid deadlock prevention scheme?
Release all resources before requesting a new resource
Number the resources uniquely and never request a lower numbered resource than the last one requested.
Never request a resource after releasing any resource
Request and all required resources be allocated before execution
Normally user programs are prevented from handling I/0 directly by I/0 instruction in them. For CPUs having explicit I/0 instructions, such I/0 protection is ensured by having the I/0 instructions privileged. In a CPU with memory mapped I/0, there is no explicit I/0 instruction. Which one of the following is true for a CPU with memory mapped I/0?
I/0 protection is ensured by operating system routine
I/0 protection is ensured by a hardware trap
I/0 protection is ensured during system configuration
I/0 protection is not possible
What is the swap space in the disk used for?
Saving temporary html pages
Saving process data
Storing the super-block
Storing device drives
Increasing the RAM of a computer typically improves performance because:
Virtual memory increases
Larger RAMs are faster
Fewer page faults occur
None of these
Which of the following is not a system tool?
Scandisk
Drive space
Backup
Skin disk
Which program would you use to create copies of important information stored on your fixed disk drive?
Scan disk
Copy disk
Backup
None of above
Which of the following is not an advantage of open source operating system over proprietary version?
Free to use and distribution
Availability of technical support
Availability of source code
Ability to modify code
DOS uses a special batch file named?
Autoexec.bat
Autoexe.bat
Autoexecute.bat
Auto.bat
Where can you define the permanent path for DOS?
Io.sys
Config.sys
Autoexec.sys
Command .com
What should be the extension to execute automatically when OS is started?
Command.com
Any batch file
Autoexec.bat
Config.sys
Where you can define permanent path in DOS?
I0.sys
Config.sys
Autoexec.bat
Command.com
Which file keeps command to execute automatically when OS is started?
Command.com
Config.sys
Autoexec.bat
Command.com
Which of the following is a correct association between a vendor and an operating system
Redhat Linux
Microsoft Unix
AT & DOS
Novell Linux
……..controls the way in which the computer system functions and provides a means by which users can interact with the computer
The platform
The operating system
Application software
The motherboard
Which one of the following is not a layer of the operating system?
Kernel
Shell
Application program
Critical selection
Which is not the function of the operating system?
Memory management
Disk management
Application management
Virus protection
Which is not the function of the operating system?
Memory management
Disk management
Application management
Virus protection
The virtual memory is
An extremely large main memory
An extremely large secondary memory
An illusion of extremely large main memory
A type of memory used in super computer
Internet explorer is
An internet browser
Provided by windows OS
An access point for word wide web
All of the above
Which of the following command is used to close the active window?
Ctrl+F4
Ctrl+F5
Alt+F6
None of the above
The shortcut key is used to open properties window of selected item is
Ctrl+Enter
Shift+Enter
Alt+Enter
None of above
The shortcut key is used to open a task manager is:
Alt+F1
Alt+Ctrl+Delete
Alt+Tab
F1
The collection of processes on the disk that is waiting to be brought into memory for execution forms the------
Ready queue
Device queue
Input queue
Priority queue
Demand paged memory allocation
Allows the virtual address space to be independent of the physical memory
Allows the virtual address space to be a multiple of the physical memory size
Allows deadlock tobe detected in paging scheme
Is present only in windows NT
Which is not an Operating system?
Windows 95
MS-DOS
Windows 3.1
Windows 2000
The operating system manages------
Memory
Processor
Disk and I/0 devices
All of the above
------begins at the root and follows a path down to the specified file
Relative path name
Absolute path name
Standalone name
All of the above
Who is called a supervisor of computer activity?
CPU
Operating system
Control unit
Application program
Consider the two statements. (A) protection is an internal problem. (B) security is considered as an external environment within which the system works. Which of the statement is not true?
Only A
Only B
Both A and B
None of the above
The process related to process control, file management, device management, information about system and communication that is requested by any higher level language can be performed by-----
Editors
Compilers
System call
Catching
Mutual exclusion
If one process is in a critical region others are excluded
Prevents deadlock
Requires semaphores to implement
Is found only in the windows NT operating system
Which scheduler controls the degree of multiprogramming?
Short term scheduler
Long term scheduler
Middle term scheduler
None of the above
What is the name of the software which can be legally compiled and often used for free?
Shareware program
Public domain program
Firmware program
Mind ware
The problem of fragmentation arises in-------
Static storage allocation
Stack allocation storage
Stack allocation with dynamic binding
Heap allocation
In interactive environments such as time-sharing systems, the primary requirement is to provide reasonably good response time and in general, to share system resources equitably. In such situations, the scheduling algorithm that is most popularly applied is------
Shortest remaining Time Next (SRTN) scheduling
Priority based preemptive scheduling
Round robin scheduling
None of the above
Thrashing occurs-----
When excessive swapping takes place
When you thrash your computer
Whenever deadlock occurs
When no swapping takes place
Boundary registers ------
Are available in temporary program variable storage
Are only necessary with fixed partition
Track the beginning and ending the program
Track page boundaries
The principal of locality of reference justifies the use of -------
Virtual memory
Interrupts
Main memory
Chache memory
The section of code which accesses shared variables is called as
Critical section
Block
Procedure
Semaphore
Thrashing occur ------
Reduces page I/0
Decreases the degree of multiprogramming
Implies excessive page I/0
Improve the system performance
In memory management, a technique called as paging, physical memory is broken into fixed-sized blocks called-----
Pages
Frames
Blocks
Segments
The state of process after it encounters an I/0 instructions is------
Ready
Blocked/waiting
Idle
Running
In one of the deadlock prevention methods, impose a total ordering of all resource types, and require that each process requests resources in an increasing order of enumeration. This violates the-----condition of deadlock.
Mutual exclusion
Hold and wait
Circular wait
No preemption
Which of the following file name extension suggest that the file is backup copy of another file?
TXT
COM
BAS
BAK
The degree of multiprogramming is controlled by
CPU schedular
Context switching
Long-term schedular
Medium term schedular
The higher versions of operating systems are so written that programs designed for earlier versions can still be run. What is it called?
Up gradeability
Upward mobility
Universality
Upward compatibility
A scheduling algorithm is fair
If no process faces starvation
If a process is starved, detect it and run it with high priority
If it uses semaphoes
Only if a queue is used for scheduling
A critical region
Is a piece of code which only one process executes at a time
Is a region prone to deadlock
Is a piece of code which only a finite number of process execute
Is found only in windows NT operation system
Semaphores can be used for solving --------
Wait & signal
Deadlock
Synchronization
Priority
The operating systems of a computer serves as a software interface between the user and the ------
Hardware
Peripheral
Memory
Screen
What is the name of the software which deals with the running of the actual computer and not with the programming problems?
Operating system
System program
Object program
Source program
The systems which allows only one process execution at a time, are called
Uniprogramming systems
Uniprocessing systems
Unitasking system
None of mentioned
In operating system, each process has its own
Address space and global variables
Open files
Pending alarms, signals and signal handlers
All of the mentioned
A process can be terminated due to
Normal exit
Fatal error
Killed by another process
All of the mentioned
What is the ready state of a process?
When process is scheduled to run after some execution
When process is unable to run until some task has been completed
When process is using the CPU
None of the mentioned
What is interprocess communication?
Communication within the process
Communication between two process
Commnication between two threads of same process
None of the mentioned
A set of process is deadlock if
Each process is blocked and will remain so forever
Each process is terminated
All process are trying to kill each other
None of the mentioned
A process stack does not contain
Function parameters
Local variables
Return address
PID of child process
Which system call returns the process identifier of a terminated child?
Wait
Exit
Fork
Get
The address of the next instruction to be executed by the current process is provided by the
CPU registers
Program counter
Process stack
Pipe
Round robin scheduling is essentially the preemptive version of -
FIFO
Shortest job first
Shortest remaining
Longest time first
A page fault occurs
When the page is not in the memory
When the page is in the memory
When the process enters the blocked state
When the process is in the ready state
Which of the following will determine your choice of systems software for your computer?
Is the applications software you want to use compatible with it?
0 Comments