You are on page 1of 5

Unit - 5

1. In a time - sharing operating system, when the time slot given to a process is completed, the process goes from the
RUNNING state to the
(A) BLOCKED state (B) READY state
(C) SUSPENDED state (D)TERMINATED state
2. Supervisor call
(A) is a call made by the supervisor of the system
(B) is a call with control functions
(C) are privileged calls that are used to perform resource management functions, which are controlled by the
operating system
(D) is a call made by someone working in root directory
3. Mutual exclusion problem occurs between
(A) two disjoint processes that do not interact
(B) processes that share resources
(C) processes that do not use the same resource
(D) none of these
4. Some computer systems support dual mode operation - the user mode and the supervisor or monitor mode. These
refer to the modes
(A) by which user programs handle their data
(B) by which the operating system executes user programs
(C) in which the processor and the associated hardware operate
(D) of memory access
5. At a particular time, the value of a counting semaphore is 10. It will become 7 after
(A) 3 V operations
(B) 3 P operations
(C) 5 V operations and 2 P operations
(D) 13 P operations and 10 V operations
6. Pre-emptive scheduling is the strategy of temporarily suspending a running process
(A) before the CPU time slice expires(B) to allow starving processes to run
(C) when it requests I/O (D)none of these
7. Dijkstra's banking algorithm in an operating system, solves the problem of
(A) deadlock avoidance (B) deadlock recovery
(C) mutual exclusion (D)context switching
8. With a single resource, deadlock occurs
(A) if there are more than two processes competing for that resource
(B) if there are only two processes competing for that resource
(C) if there is a single process competing for that resource
(D) none of these
Common Data 9 to 13
Consider a set of 5 processes whose arrival time, CPU time needed and the priority are given below.
Process Arrival Time (in ms) CPU Time Needed Priority
Priority (in ms)
P1 0 10 5
P2 0 5 2
P3 2 3 1
P4 5 20 4
P5 10 2 3
smaller the number, higher the priority
9. If the CPU scheduling policy is FCFS, the average waiting time will be
(A) 12.8 ms (B) 8 ms
(C) 6 ms (D)none of these
10. If the CPU scheduling policy is SJF, the average waiting time (without pre-emption) will be
(A) 16 ms (B) 12.8
(C) 5.6 ms (D)none of these
11. If the CPU scheduling policy is SJF with pre-emption, the average waiting time will be
(A) 8 ms (B) 14 ms
(C) 5.6 ms (D)none of these
12. If the CPU schedulig policy is priority scheduling with out pre-emption, the average waiting time will be
(A) 12.8ms (B) 11.8 ms
(C) 10.8 ms (D)none of these
13. If the CPU scheduling policy is priority scheduling with pre-emption the average waiting time will be
(A) 19 ms (B) 7.6 ms
(C) 6.8 ms (D)none of these
14. At a particular time of computation, the value of a counting semaphore is 7. Then 20 P operations and 'x' V
operations were completed on this semaphore. If the final value of the semaphore is 5, x will be
(A) 22 (B) 18
(C) 15 (D)13
15. A computer system has 6 tape drives, with 'n' processes competing for them. Each process may need 3 tape drives.
The maximum value of 'n' for which the system is guaranteed to be deadlock free is
(A) 4 (B) 3
(C) 2 (D)1
16. In Round Robin CPU scheduling as the time quantum is increased, the average turn around time
(A) increases (B) decreases
(C) remains constant (D)varies irregularly
17. Cascading termination refers to termination of all child processes before the parent terminates
(A) normally (B) abnormally
(C) normally or abnormally (D)none of these
18. A state is safe if the system can allocate resources to each process in some order and still aviod deadlock. Then
(A) deadlocked state is unsafe
(B) unsafe state may laed to a deadlock situation
(C) deadlocked state is a subset of unsafe state
(D) all of these
19. Dirty bit is used to show the
(A) page with corrupted data
(B) the wrong page in the memory
(C) page that is modified after being loaded into cache memory
(D) page that is less frequently accessed
20. Fence register is used for
(A) CPU protection (B) memory protection
(C) file protection (D)all of these
21. 'm' processes share 'n' resources of the same type. The maximum need of each process doesn't exceed 'n'and the
sum all the their maximum needs is always less than m + n. In this set up
(A) deadlock can never occur (B) deadlock may occur
(C) deadlock has to occur (D)none of these
22. The methods for dealing with the deadlock problem is
(A) Use a protocol to make sure that the system never enters in to the deadlock state
(B) Allow the sytem to enter a deadlock state and then recover
(C) Ignore the problem, and pretend that deadlocks never occur in the sytem. The UNIX operating system uses
this solution
(D) all or these
23. Determine the number of page faults when references to pages occur in the following order: 1, 2, 4, 5, 2, 1, 2, 4.
Assume that the main memory can accommodate 3 pages and the main memory already has the pages 1 and 2, with
page 1 having been brought earlier than page 2
(A) 3 (B) 5 (C) 4 (D) none of these
24. Working set (t,k) at an instant of time, t, is
(A) the set of k future references that the operating system will make
(B) the set of future references that the operating system will make in the next k time units
(C) the set of k reference with high frequency
(D) the set of pages that have been referenced in the last k time units
25. Consider a system having 'm' resources of the same type. These resources are shared by 3 processes A,B,C which
have peak time demands of 3,4,6 respectively. The minimum value of 'm' that ensures that deadlock will never
occur is
(A) 11 (B) 12
(C) 13 (D)14
26. A system has 3 processes sharing 4 resources. If each process needs a maximum of 2 units, then
(A) deadlock can never occur (B) deadlock may occur
(C) deadlock has to occur (D)none of these
27. A demand paging system, will page table held in resgisters, takes 5 ms to service a page fault if an empty page is
available, or if the page to be replaced is not dirty. It takes 15 ms if the replaced page is dirty. Memory access time
is 1ms. Assume we want an effective access time of 2ms and that the page to be replaced is dirty 60% of the time.
What is the approximate maximum acceptable page fault rate to meet this acces time requirement ?
(A) 0.1 % (B) 1.0 %
(C) 2.5 % (D)0.01 %
28. Consider a computer with 8 Mbytes of main memory and a 128 K cache. The cache block size is 4 K. It uses a direct
mapping scheme for cache management. How many different main memory blocks can map onto a given physical
cache block ?
(A) 2048 (B) 256
(C) 64 (D)None of these
29. Fixed partitions
(A) are very common in current operating systems
(B) are very efficient in memory utilization
(C) are very inefficient in memory utilization
(D) are most used on large mainframe operating systems
30. Access to moving haead disks requires three periods of delay before information is brought into memory. The
response that correctly lists the three time delays for the physical access of data in the order of the relative speed
from the slowest to the fastest is
(A) latency time, cache overhead time, seek time
(B) transmission time, latency time, seek time
(C) seek time, latency time, transmission time
(D) cache overhead time, latency time, seek time
31. An unpaged or read-ahead cache associates disk domains with the address of the read and continues for a specific
length. The major disadvantage of unpaged cache is that
(A) it allows cache domain to contain redundant data
(B) it does not allow writes to be cached
(C) its access time is greater than that of paged caching
(D) read ahead cache domain blocks are necessarily fixed in size
32. Disk requests are received by a disk drive for cylinders 5, 25, 18, 3, 39,8 and 35 in that oreder. 4 seek takes 5 m
sec per cylinder moved. How much seek time is needed to serve these requests for a Shortest Seek First (SSF)
algorithm ? Assume that the arm is at cylinder 20 when the last of these reefuests is made with none of the
requests yet served
(A) 125 msec (B) 295 msec
(C) 575 msec (D)750 msec
33. Which of the following statements is false ?
(A) Segmentation suffers from external fragmentation
(B) Paging suffers from internal fragmentation
(C) Segmented memory can be paged
(D) Virtual memory is used only in multi-user systems
34. If a virtual memory system has 4 pages in real memory and the rest must be swapped to disk. Which of the
following is the hit ratio for the following page address stream. Assume that memory starts emply. Use the First
In First Out (FIFO) algorithm.
(A) 10 % (B) 15 %
(C) 25 % (D)31 %
35. The maximum amout of information that is available with one position of the disk access arm for a removal disk
pack (without further movement of the arm with multiple heads) is
(A) a plate of data (B) a cylinder of data
(C) a track of data (D)a block of data
36. If a disk has a seek time of 20 ms, rotates 20 revolutions per second, has 100 words per block, and each track has
capacity of 300 words. Then the total time required to access one block is
(A) 25 (B) 30
(C) 40 (D)60
37. Consider the following heap :
JOB 1-150 FREE-150 JOB2-300 FREE-350 JOB3-600
The sequence of requests for blocks of sizes 300, 25, 125, 50 can be satisfied if we use
(A) either first fit or best fit policy (B) first fit, but not best fit
(C) best fit, but not first fit (D)none of these
38. Of the following, the safe sequence is
(A) P0, P1, P2, P3 (B) P1, P0, P3, P2
(C) P2, P0, P1, P3 (D)None of these
39. The first-fit, best-fit and the worst-fit algorithm can be used for
(A) contiguous allocation of memory
(B) linked allocation of memory
(C) indexed allocation of memory
(D) all of these
40. In a paged memory, the page hit ratio is 0.35. The time required to access a page in secondary memory is equal to
100 ns. The time required to access a page in primary memory is 10 ns. The average time required to access a page
is
(A) 3.0 ns (B) 68.0 ns
(C) 68.5 ns (D)78.5 ns
41. In a system that does not support swapping
(A) the complier normally binds symbolic addresses (variables) to relocatable addresses
(B) the compiler normally binds symbolic addresses to physical address
(C) the loader binds relocatable addresses to physical addresses
(D) binding of symbolic addresses to physifal addresses normally takes place during execution
42. To obtain better memory utilization, dynamic loading is used. With dynamic loading, a routine is not loaded until
it is called for. For implementing dynamic loading.
(A) special support from hardware is essential
(B) special support from operating system is essential
(C) special support from both hardware and operating system are essential
(D) user programs can implement dynamic loading without any special support from the operating system or the
hardware
Common Data 43 to 44
A process refers to 5 pages, A, B, C, D and E in the following orde A; B; C; D; A; B; E; A; B; C; D; E
43. If the page replacement algorithm is FIFO, the number of page transfer with an empty internal store of 3 frames
is
(A) 10 (B) 9
(C) 8 (D)7
44. If the number of available page frames is increased to 4, then the number of page transfers
(A) decreases (B) increases
(C) remains the same (D)none of these
45. Distributed systems should
(A) meet prescribed time constraints(B) aim better resource sharing
(C) aim better system utilization (D)aim low system overhead
46. In real-time opearting systems, which of the following is the most suitable scheduling scheme ?
(A) round - robin (B) first-come-first-served
(C) preemptive (D)random scheduling
47. If there are 32 segments, each of size 1 K byte, then the logical address should have
(A) 13 bits (B) 14 bits
(C) 15 bits (D)16 bits
48. A computer installation has 1000 K of main memory. The jobs arrive and finish in the following sequence :
Job 1 requiring 200 K arrives
Job 2 requiring 350 K arrives
Job 3 requiring 300 K arrives
Job 1 finishes
Job 4 requiring 120 K arrives
Job 5 requiring 150 K arrives
Job 6 requiring 80 K arrives
Among best fit and first fit, which performs better for this sequence ?
(A) First fit (B) Best fit
(C) Both perform the same (D)None of these
49. Which of the following statements is incorrect for a micro-processor system using I/O mapped I/O
(A) I/O address space is greater
(B) I/O and memory spaces are distinct
(C) Memory space available is greater
(D) Not all data transfer instructions are available
50. A DMA module is transferring characters to main memory using cycle - stealing (getting the system bus from
CPU to do DMA transfer). The device is transmitting at 1 Mbps over a Local Area Network. The CPU fetches
instructions at the rate of 1 MIPS (one million istructions per second). Assuming each memory location acces-
sible in one bus cycle can hold 16 bits, the CPU instruction fetch speed will degrade down to
(A) .9500 MIPS (B) .9250 MIPS
(C) .9375 MIPS (D).9345 MIPS
Answers
1. B 2. C 3. B 4. C 5. B 6. A 7. A 8. D 9. A 10. C
11. C 12. C 13. B 14. A 15. C 16. D 17. C 18. D 19. C 20. B
21. A 22. D 23. C 24. D 25. A 26. A 27. D 28. C 29. C 30. C
31. A 32. B 33. D 34. D 35. B 36. D 37. B 38. C 39. A 40.C
41.A, 42. D 43. B 44. B 45. B 46. C 47. C 48. A 49. A 50. C

You might also like