You are on page 1of 51

1

ADITYA
OPERATING SYSTEMS

1. Explain the concept of Reentrancy.
It is a useful, memory-saving technique for multiprogrammed timesharing systems. A
Reentrant Procedure is one in which multiple users can share a single copy of a program during the
same period. Reentrancy has 2 key aspects: The program code cannot modify itself, and the local data
for each user process must be stored separately. Thus, the permanent part is the code, and the
temporary part is the pointer back to the calling program and local variables used by that program.
Each execution instance is called activation. It executes the code in the permanent part, but has its own
copy of local variables/parameters. The temporary part associated with each activation is the activation
record. Generally, the activation record is kept on the stack.
Note: A reentrant procedure can be interrupted and called by an interrupting program, and still execute
correctly on returning to the procedure.

2. Explain Belady's Anomaly.
Also called FIFO anomaly. Usually, on increasing the number of frames allocated to a process'
virtual memory, the process execution is faster, because fewer page faults occur. Sometimes, the
reverse happens, i.e., the execution time increases even when more frames are allocated to the process.
This is Belady's Anomaly. This is true for certain page reference patterns.

3. What is a binary semaphore? What is its use?
A binary semaphore is one, which takes only 0 and 1 as values. They are used to implement
mutual exclusion and synchronize concurrent processes.

4. What is thrashing?
It is a phenomenon in virtual memory schemes when the processor spends most of its time
swapping pages, rather than executing instructions. This is due to an inordinate number of page faults.

5. List the Coffman's conditions that lead to a deadlock.
Mutual Exclusion: Only one process may use a critical resource at a time.
Hold & Wait: A process may be allocated some resources while waiting for others.
No Pre-emption: No resource can be forcible removed from a process holding it.
Circular Wait: A closed chain of processes exist such that each process holds at least one
resource needed by another process in the chain.

6. What are short-, long- and medium-term scheduling?
Long term scheduler determines which programs are admitted to the system for processing. It
controls the degree of multiprogramming. Once admitted, a job becomes a process.
Medium term scheduling is part of the swapping function. This relates to processes that are in a
blocked or suspended state. They are swapped out of real-memory until they are ready to execute. The
swapping-in decision is based on memory-management criteria.
Short term scheduler, also know as a dispatcher executes most frequently, and makes the finest-
grained decision of which process should execute next. This scheduler is invoked whenever an event
occurs. It may lead to interruption of one process by preemption.

7. What are turnaround time and response time?
Turnaround time is the interval between the submission of a job and its completion. Response
time is the interval between submission of a request, and the first response to that request.

2
ADITYA

8. What are the typical elements of a process image?
User data: Modifiable part of user space. May include program data, user stack area, and
programs that may be modified.
User program: The instructions to be executed.
System Stack: Each process has one or more LIFO stacks associated with it. Used to store
parameters and calling addresses for procedure and system calls.
Process control Block (PCB): Info needed by the OS to control processes.

9. What is the Translation Lookaside Buffer (TLB)?
In a cached system, the base addresses of the last few referenced pages is maintained in
registers called the TLB that aids in faster lookup. TLB contains those page-table entries that have
been most recently used. Normally, each virtual memory reference causes 2 physical memory
accesses-- one to fetch appropriate page-table entry, and one to fetch the desired data. Using TLB in-
between, this is reduced to just one physical memory access in cases of TLB-hit.

10. What is the resident set and working set of a process?
Resident set is that portion of the process image that is actually in real-memory at a particular
instant. Working set is that subset of resident set that is actually needed for execution. (Relate this to
the variable-window size method for swapping techniques.)

11. When is a system in safe state?
The set of dispatchable processes is in a safe state if there exists at least one temporal order in
which all processes can be run to completion without resulting in a deadlock.

12. What is cycle stealing?
We encounter cycle stealing in the context of Direct Memory Access (DMA). Either the DMA
controller can use the data bus when the CPU does not need it, or it may force the CPU to temporarily
suspend operation. The latter technique is called cycle stealing. Note that cycle stealing can be done
only at specific break points in an instruction cycle.

13. What is meant by arm-stickiness?
If one or a few processes have a high access rate to data on one track of a storage disk, then
they may monopolize the device by repeated requests to that track. This generally happens with most
common device scheduling algorithms (LIFO, SSTF, C-SCAN, etc). High-density multisurface disks
are more likely to be affected by this than low density ones.


14. What is busy waiting?
The repeated execution of a loop of code while waiting for an event to occur is called busy-
waiting. The CPU is not engaged in any real productive activity during this period, and the process
does not progress toward completion.

3
ADITYA

15. Explain the popular multiprocessor thread-scheduling strategies.
Load Sharing: Processes are not assigned to a particular processor. A global queue of threads is
maintained. Each processor, when idle, selects a thread from this queue. Note that load
balancing refers to a scheme where work is allocated to processors on a more permanent basis.
Gang Scheduling: A set of related threads is scheduled to run on a set of processors at the same
time, on a 1-to-1 basis. Closely related threads / processes may be scheduled this way to reduce
synchronization blocking, and minimize process switching. Group scheduling predated this
strategy.
Dedicated processor assignment: Provides implicit scheduling defined by assignment of threads
to processors. For the duration of program execution, each program is allocated a set of
processors equal in number to the number of threads in the program. Processors are chosen
from the available pool.
Dynamic scheduling: The number of thread in a program can be altered during the course of
execution.

16. When does the condition 'rendezvous' arise?
In message passing, it is the condition in which, both, the sender and receiver are blocked until
the message is delivered.

17. What is a trap and trapdoor?
Trapdoor is a secret undocumented entry point into a program used to grant access without
normal methods of access authentication. A trap is a software interrupt, usually the result of an error
condition.

18. What are local and global page replacements?
Local replacement means that an incoming page is brought in only to the relevant process'
address space. Global replacement policy allows any page frame from any process to be replaced. The
latter is applicable to variable partitions model only.

19. Define latency, transfer and seek time with respect to disk I/O.
Seek time is the time required to move the disk arm to the required track. Rotational delay or
latency is the time it takes for the beginning of the required sector to reach the head. Sum of seek time
(if any) and latency is the access time. Time taken to actually transfer a span of data is transfer time.

20. Describe the Buddy system of memory allocation.
Free memory is maintained in linked lists, each of equal sized blocks. Any such block is of size
2^k. When some memory is required by a process, the block size of next higher order is chosen, and
broken into two. Note that the two such pieces differ in address only in their kth bit. Such pieces are
called buddies. When any used block is freed, the OS checks to see if its buddy is also free. If so, it is
rejoined, and put into the original free-block linked-list.

21. What is time-stamping?
It is a technique proposed by Lamport, used to order events in a distributed system without the
use of clocks. This scheme is intended to order events consisting of the transmission of messages. Each
system 'i' in the network maintains a counter Ci. Every time a system transmits a message, it
increments its counter by 1 and attaches the time-stamp Ti to the message. When a message is
received, the receiving system 'j' sets its counter Cj to 1 more than the maximum of its current value
and the incoming time-stamp Ti. At each site, the ordering of messages is determined by the following
rules: For messages x from site i and y from site j, x precedes y if one of the following conditions
holds....(a) if Ti<Tj or (b) if Ti=Tj and i<j.

4
ADITYA

22. How are the wait/signal operations for monitor different from those for semaphores?
If a process in a monitor signal and no task is waiting on the condition variable, the signal is
lost. So this allows easier program design. Whereas in semaphores, every operation affects the value of
the semaphore, so the wait and signal operations should be perfectly balanced in the program.

23. In the context of memory management, what are placement and replacement algorithms?
Placement algorithms determine where in available real-memory to load a program. Common
methods are first-fit, next-fit, best-fit. Replacement algorithms are used when memory is full, and one
process (or part of a process) needs to be swapped out to accommodate a new program. The
replacement algorithm determines which are the partitions to be swapped out.

24. In loading programs into memory, what is the difference between load-time dynamic
linking and run-time dynamic linking?
For load-time dynamic linking: Load module to be loaded is read into memory. Any reference
to a target external module causes that module to be loaded and the references are updated to a relative
address from the start base address of the application module.
With run-time dynamic loading: Some of the linking is postponed until actual reference during
execution. Then the correct module is loaded and linked.

25. What are demand- and pre-paging?
With demand paging, a page is brought into memory only when a location on that page is
actually referenced during execution. With pre-paging, pages other than the one demanded by a page
fault are brought in. The selection of such pages is done based on common access patterns, especially
for secondary memory devices.

26. Paging a memory management function, while multiprogramming a processor
management function, are the two interdependent?
Yes.

27. What is page cannibalizing?
Page swapping or page replacements are called page cannibalizing.

28. What has triggered the need for multitasking in PCs?
Increased speed and memory capacity of microprocessors together with the support fir
virtual memory and
Growth of client server computing

29. What are the four layers that Windows NT have in order to achieve independence?
Hardware abstraction layer
Kernel
Subsystems
System Services.

30. What is SMP?
To achieve maximum efficiency and reliability a mode of operation known as symmetric
multiprocessing is used. In essence, with SMP any process or threads can be assigned to any processor.

31. What are the key object oriented concepts used by Windows NT?
Encapsulation
Object class and instance


5
ADITYA

32. What is a drawback of MVT?
It does not have the features like
ability to support multiple processors
virtual storage
source level debugging

33. What is process spawning?
When the OS at the explicit request of another process creates a process, this action is called
process spawning.

34. How many jobs can be run concurrently on MVT?
15 jobs

35. List out some reasons for process termination.
Normal completion
Time limit exceeded
Memory unavailable
Bounds violation
Protection error
Arithmetic error
Time overrun
I/O failure
Invalid instruction
Privileged instruction
Data misuse
Operator or OS intervention
Parent termination.

36. What are the reasons for process suspension?
swapping
interactive user request
timing
parent process request

37. What is process migration?
It is the transfer of sufficient amount of the state of process from one machine to the target
machine

38. What is mutant?
In Windows NT a mutant provides kernel mode or user mode mutual exclusion with the notion
of ownership.

39. What is an idle thread?
The special thread a dispatcher will execute when no ready thread is found.

40. What is FtDisk?
It is a fault tolerance disk driver for Windows NT.

6
ADITYA

41. What are the possible threads a thread can have?
Ready
Standby
Running
Waiting
Transition
Terminated.

42. What are rings in Windows NT?
Windows NT uses protection mechanism called rings provides by the process to implement
separation between the user mode and kernel mode.

43. What is Executive in Windows NT?
In Windows NT, executive refers to the operating system code that runs in kernel mode.

44. What are the sub-components of I/O manager in Windows NT?
Network redirector/ Server
Cache manager.
File systems
Network driver
Device driver

45. What are DDks? Name an operating system that includes this feature.
DDks are device driver kits, which are equivalent to SDKs for writing device drivers. Windows
NT includes DDks.

46. What level of security does Windows NT meets?
C2 level security.
























7
ADITYA

1. Information about a process is maintained in a _________.
a) Stack. b) Translation lookaside buffer.
c) Process control block. d) Program control block.


2. Identify the odd thing in the services of operating system?
a) Accounting. b) Protection.
c) Virus detection. d) Dead lock handling.


3. Which of the following is not advantage of multiprogramming?
a) Increased throughput. b) Shorter response time.
c) Decreased operating system overhead. d)Ability to assign priorities to jobs.

4. Real time systems are ________.
a) primarily used on mainframe computers. b) used for monitoring events as they occur.
c) used for program development. d) used for real time interactive users.

5. Which is not an Operating System?
a)Windows 95. b) MS-DOS.
c) Windows 3.1. d) Windows 2000.

8
ADITYA
6. Who is called a supervisor of computer activity?
a)CPU. b) Operating system.
c) Control unit. d)Application Program.

7. The process related to process control, file management, device management, information
about system and communication that is requested by any higher level language can be
performed by ___
a) Editors. b) Compilers
c) System call. d) Caching.

8. Multiprocessing ________.
a) Make the operating system simpler.
b) Allows multiple processes to run simultaneously.
c) Is completely understood by all major computer vendors.
d) Allows the same computer to have the multiple processors.

9. _______ operating system pays more attention on the meeting of the time limits.
a) Distributed. b)Network.
c) Real time. d) Online.

10. Which of the following is an example of a SPOOLED device?
a) The terminal used to enter the input data for a program being executed.
b)The secondary memory device in a virtual memory system.
c) A line printer used to print the output of a number of jobs.
d) The terminal used to store data permanently.

11. Overlay is _______________.
a) A part of an operating system.
b) A specific memory location.
c) A single contiguous memory that was used in the olden days for running large.
d) Overloading the system with many user files.

12. Working set(t,k) at an instance of time t, is the set of _______.
a) A k future references that the operating system will make.
b) B. future references that the operating system will make in the next k time units.
c) C. k references with high frequency.
d) D. pages that have been referenced in the last k time units.


9
ADITYA

13. Kernel is _______.
a) Considered as the critical part of the operating system.
b) The software which monitors the operating system.
c) The software which protects all programs.
d) The set of primitive functions upon which the rest of operating system functions are built up.

14. Supervisor call _______.
a) Is a call made by the supervisor of the system.
b) Is a call with control functions.
c) Are privileged calls that are used to perform resource management functions which are
Controlled by the operating system.
d) Is a call made by someone working in root directory?

15. Memory protection is used in a ________.
a) single user system. b) Multiprogramming system.
c) Multitasking system. d) Real time systems.

16. Some computer systems support dual mode operation-the user mode and the supervisor
or monitor mode. These refer to the modes ______.
a) by which user programs handle their data.
b) by which the operating system executes user programs.
c) in which the processor and the associated hardware operate.
d) by memory access.

17. Which of the following is a service not supported by the operating system?
a)Protection. b) Accounting.
c) Compilation. d) I/O operation.

18. Which of the following are single user operating system?
a) MS-DOS. b) UNIX. c) LINUX. d) OS/2.

19. Which of the following are true?
a. A re-entrant procedure can be called any number of times.
b. A re-entrant procedure can be called finite number of times.
c. A re-entrant procedure cannot be called recursively.
d. A re-entrant procedure can be called recursively.

20. In a multi-user operating system, 20 requests are made to use a particular resource per
hour, on an average. The probability that no requests are made in 45 minutes is ____
a) e-15. b) e-5. c) 1 - e-5. d)1 - e-10.
21. To obtain better memory utilization, dynamic loading is used. With dynamic loading, a
routine is not loaded until it is called for. For implementing dynamic loading, _______.
a) special support from hardware is essential.
b) special support from operating system is essential.
c) special support from both hardware and operating system is essential.
d) user programs can implement dynamic loading without any special support from the
operating system or the hardware.

10
ADITYA

22. Which of the following is true?
a) The linkage editor is used to edit programs which have to be later linked together.
b) The linkage editor links object modules during compiling or assembling.
c) The linkage editor links object modules and resolves external references between them
before loading.
d) The linkage editor resolves external references between the object modules during
execution time.

23. Distributed systems should ________.
a) Meet prescribed time constraints. b) Aim better resource sharing.
c) Aim better system utilization. d) Aim low system overhead.

24. Memory protection is normally done by the ________.
a) Processor and the associated hardware. b) Operating system.
c) Compiler. d)user program.

25. When an interrupt occurs, an operating system __________.
a) ignores the interrupt.
b) always changes the state of the interrupted process after processing the interrupt.
c) always resumes execution of the interrupted process after processing the interrupt.
d) may change the state of the interrupted process to blocked and schedule another process.

26. Protection can improve _____.
a) Reliability. b)Maintenance. c) Starvation. d)Deadlock.

27. A system consists of collection of ______.
a) Processes. b) software. c) Database. d)Printer.

28. The startup routine runs, when machine boots up is known as ______.
a) POST b) BOOT up . c) Operating Routine . d)I/O operation .

29. What is the maximum length allowed for primary name of a computer file under DOS?
a) 8 b)12 c)15 d)30

30. Which of the following could be a valid DOS file specification?
a) NOSFILE.POST. b)NOSFILE.P.OST.
c)NOSFILE.DOC. d)NOST.FILEDOC.

31. How many characters form a secondary name for a file?
a) 8. b)12. c) 13. d)25.

32. What is the name given to something that the computer will automatically use unless you
tell itotherwise?
a) A Specification. b)A Wildcard. c)A Default. d)A Rule.

33. The batch file uses the extension _______.
a) BAT b)DOC c) PRG d)DOS

11
ADITYA

34. To display the list of all the file of the disk you would type _______.
a) DIR. b)COPY. c)DIR FILES. d)DIR AUTOEXEC.BAT.

35. ______runs on computer hardware and serve as platform for other software to run on.
a) Operating system. b)Application software.
c)System software. d)Compiler

36. The primary purpose of an operating system is _____.
a) to make the most efficient use of the computer hardware.
b) to allow people to use the computer.
c) to keep systems programmers employed.
d) to make computers easier to use.

37. _______transforms one interface into another interface.
a) Program. b)Software. c)Data. d)Hardware.

38. __ interface consists of things like program counter, registers, interrupts and terminals.
a) Hardware. b)Software. c)Data. d)Application.

39. PID is used by the system to identify _______.
a) a process. b)the file name. c)the i-node. d)The hardware.

40. _____is used in operating system to separate mechanism from policy.
a) Single level implementation. b) Two level implementation.
c) Multi level implementation. d)Hierarchical implementation.

41. The operating system creates ____ from the physical computer.
a) Virtual space. b)Virtualcomputers.
c)Virtual device. d)Virtual memory.

42. Which of the following operating does not implement multitasking truly?
a) Windows 98 b) Windows NT.
c) Windows XP. d) MS DOS.

43. What is the name of the latest server operating system developed by Microsoft?
a) Windows NT. b)Windows 2000
c) Windows XP. d) Windows Server 2012 R2

44. Where do you find user.dat?
a) C:\windows. b)C:\windows\system32.
c)C:\windows\system. d)C:\.

45. MSD.exe does not have information on _______.
a) Cache b) Video.
c) Operating system. d)Com or port.

12
ADITYA

46. Which file in MSDOS contain internal command that is loaded during booting process?
a) IO.sys. b)MSDOS.sys.
c)Command.com. d)Config.sys.

47. Which is valid extension that user creates on operating system?
a) Exe b)Com
b) Sys d)Bat

48. Which of the following file names are invalid in MSDOS?
a) MYFILE.DOS. b)CHECK$.(1).
c)Verified.###. d)Qwerty.1?3.

49. Which of the following statements in regard to directories is false?
a) Directories can exist inside directories.
b) Directory is always at the highest level.
c) Directories with files can be deleted.
d) Directories cannot be renamed.

50. The request and release of resources are ___________.
a) command line statements. b)interrupts.
c)system calls. d)special programs.


99.The Hardware mechanism that enables a device to notify the CPU is called ____
a) Polling. b)Interrupt.
c) System Call. d) System request.

100. The operating system manages ________.
a) Memory. b)Processor.
c)Disk and I/O devices. d)All of the above.

101. The primary job of the operating system of a computer is to ________.
a) Command Resources. b) Manage Resources.
c) Provide Utilities. d) Be user friendly.

102.CPU performance is measured through ________.
a) Throughput. b) Mhz.
c) Flaps. d) Flips.

103.Technique to discover hardware status by repeatedly testing each device is _______.
a) Piping . b) Polling.
c)dispatching. d)interrupting.

104. _____ indicate that an error has occurred, either is hardware or as a result of a software
instruction.
a) Quantum. b)Exception.
c) Interrupt. d)Dispatching.

105. ________ correspond to conditions such as overflows or breakpoints.
a) Fault. b)Trap.
c) Abort. d)Error.

13
ADITYA
106. ______ indicate errors from which the process cannot recover, such as hardware failure.
a) Fault .b)Trap. c) Abort. d)Exception.

107. A kernel code that is executed in response to an interrupt is _____.
a) Interrupt handler. b) interrupt vector.
c) interval timer. d) interrupting clock.

108. The part of machine level instruction, which tells the central processor what has to be
done, is
a) Operation code b)Address
c)Locator d)Flip-Flop
e) None of the above

109. Which of the following refers to the associative memory?
a) the address of the data is generated by the CPU
b) the address of the data is supplied by the users
c) there is no need for an address i.e. the data is used as an address
d) the data are accessed sequentially
e) None of the above

110. A system program that combines the separately compiled modules of a program into a
form suitable for execution
a) Assembler b)linking loader
c)cross compiler d)load and go e)None of the above

111. A computer cannot "boot" if it does not have the
a) Compiler b)Loader c)Operating system
d)Assembler e)None of the above

112. Which of the following functions is(are) performed by the loader
a) allocate space in memory for the programs and resolve symbolic references between object
decks
b) adjust all address dependent locations, such as address constants, to correspond to the allocated
space.
c) physically place the machine instructions and data into memory.
d) All of the above
e) None of the above

113. User-Friendly Systems are:
a) required for object-oriented programming
b) easy to develop
c) common among traditional mainframe operating systems
d) becoming more common
e) None of the above

114. What is the name given to the organized collection of software that controls the overall
operation of a computer?
a) Working system b)Peripheral system c)Operating system
d)Controlling system e)None of the above


14
ADITYA
115. Which of the following are(is) Language Processor(s)

a) assembles b)compilers c)interpreters
d)All of the above e)None of the above
116. Bug means

a) A logical error in a program
b) A difficult syntax error in a program
c) Documenting programs using an efficient documentation tool
d) All of the above
e) None of the above

117. An algorithm is best described as
a) A computer language b)A step by step procedure for solving a problem
c) A branch of mathematics d)All of the above
e) None of the above

118. Trojan-Horse programs
a) are legitimate programs that allow unauthorized access
b) do not usually work
c) are hidden programs that do not show up on the system
d) usually are immediately discovered
e) None of the above

119. When did IBM release the first version of disk operating system DOS version 1.0?
a) 1981 b)1982 c)1983 d)1984 e)None of the above

120. Most of the microcomputer's operating systems like Apple DOS, MS DOS and PC DOS
etc. are called disk operating systems because
a) they are memory resident b)they are initially stored on disk
b) they are available on magnetic tapes
c) they are partly in primary memory and partly on disk
d) None of the above

121. Operating system
a) links a program with the subroutines it references
b) provides a layered, user-friendly interface
c) enables the programmer to draw a flowchart
d) all of the above
e) None of the above

122. Software that measures, monitors, analyzes, and controls real-world events is called:
a) system software b)real-time software
c) Scientific software d)business software e)None of the above
123. The details of all external symbols and relocation formation (relocation list or map) is
provided to linker by
a) Macro processor b)Translator c)Loader
d)Editor e)None of the above

124. The macro processor must perform
a) recognize macro definitions and macro calls
b) save the macro definitions
c) expand macros calls and substitute arguments
d) all of the above
e) None of the above
15
ADITYA

125. Which of the following is helpful in evaluating applications software what will best suit
your needs?
a) recommendations by other users b)computer magazines
c) Objective software reviews d) all of the above
e) None of the above

126. System programs such as Compilers are designed so that they are
a) reenterable b)non reusable
c) serially usable d)recursive
e) None of the above

127. IBM released its first PC in 1981. Can you name the operating system which was most
popular at that time?
a) MS-DOS b)PC-DOS
c) OS/360 d)CP/M e)None of the above

128. A translator is best described as
a) an application software b)a system software
c) a hardware component d)all of the above e)None of the above

129. Data encryption
a) is mostly used by public networks
b) is mostly used by financial networks
c) cannot be used by private installations
d) is not necessary, since data cannot be intercepted
e) None of the above
130. What is the name given to the process of initializing a microcomputer with its operating
system?
a) Cold booting b)Booting c)Warm bootin d)Boot recording
e) None of the above

131. The function(s) of the Storage Assignment is (are)
a) to assign storage to all variables referenced in the source program.
b) to assign storage to all temporary locations that are necessary for intermediate results.
c) to assign storage to literals, and to ensure that the storage is allocate and appropriate locations
are initialized.
d) all of the above
e) None of the above

132. A Processor
a) is a device that performs a sequence of operations specified by instructions in memory.
b) is the device where information is stored
c) is a sequence of instructions
d) is typically characterized by interactive processing and time of the CPU's time to allow quick
response to each user.
e) None of the above

16
ADITYA

133. With MS-DOS which command will divide the surface of the blank floppy disk into
sectors and assign a unique address to each one?
a) FORMAT command b)FAT command c)VER command
d) CHKDSK command e)None of the above

134. Multiprogramming
a) is a method of memory allocation by which the program is subdivided into equal portions, or
pages and core is subdivided into equal portions or blocks.
b) consists of those addresses that may be generated by a processor during execution of a
computation.
c) is a method of allocating processor time.
d) allows multiple programs to reside in separate areas of core at the time.
e) None of the above

135. A translator which reads an entire programme written in a high level language and
converts it into machine language code is:
a) Assembler b)translator c)compiler
d) system software e)None of the above

136. The advantage(s) inherent to using high level languages is (are)
a) Fewer people, less management and shorter transition in learning time
b) Improved debugging capability, and superior documentation
c) A greater degree of machine independence
d) All of the above
e) None of the above

137. ______________ do not change.
a) Dynamic priority. b) Static ram. c) Static priority. d) Dynamic ram.

138. Dynamic priority mechanisms are responsive to ____.
a) no change. b)change. c)rapid attention. d)low attention.

139. The action of parsing the source program into the proper syntactic classes is known as
a) syntax analysis b)lexical analysis c)interpretation analysis
d)general syntax analysis e)None of the above

140. Which, of the following is not true about the description of a decision table?
a) A decision table is easy to modify
b) A decision table is directly understood by the computer
c) A decision table is easy to understand
d) All of the above
e) None of the above

141. Which is a permanent database in the general model of compiler?
a) Literal Table b)Identifier Table
c)Terminal Table d)Source code d)None of the above

17
ADITYA

142. What is the name of the technique in which the operating system of a computer executes
several programs concurrently by switching back and forth between them?
a) Partitioning b)Multitasking c)Windowing d)Paging
e) None of the above

143. A development strategy whereby the executive control modules of a system are coded and
tested first, is known as
a) Bottom-up development b)Top-down development c)Left-Right development
d) All of the above e)None of the above

144. Which table is a permanent database that has an entry for each terminal symbol.
a) Terminal table b)Literal table c)Identifier table
d) Reductions e)None of the above

145. The function(s) of the Syntax phase is(are)
a) to recognize the major constructs of the language and to call the appropriate action routines that
will generate the intermediate form or matrix for these constructs.
b) to build a literal table and an identifier table
c) to build a uniform symbol table
d) to parse the source program into the basic elements or tokens of the language.
e) None of the above

146. Inter process communication can be done through __________.
a) Mails. b) Messages. c) System calls. d) Traps.

147. A process is starved if __________.
a) it is permanently waiting for a resource. b)semaphores are not used.
c) a queue is not used for scheduling. d)demand paging is not properly implemented.

148. CPU performance is measured through ________.
a) throughput. b)mhz. c)flaps. d)hz.

149. A program under execution is called ________.
a) dynamic program. b)static program. c)binded program. d)a process.

150. Process said to be in ___________ state if it was waiting for an event that will never occur.
a) safe. b)unsafe. c)starvation. d)dead lock.

151. The removal of process from active contention of CPU and reintroduce them into memory
later is known as ____________.
a) Interrupt. b)Swapping. c)Signal. d)Thread.

152. Which technique was introduced because a single job could not keep both the CPU and the
I/O devices busy?
a) Time-sharing. b)Spooling.
c)Preemptive scheduling. d)Multiprogramming.

153. The state of a process after it encounters an I/O instruction is __________.
a) ready. b) blocked/waiting c)idle. d)running.


18
ADITYA
154. CPU Scheduling is the basis of _________ operating system.
a) Batch. b) real time.
c) Multiprogramming. d)monoprogramming.

155. The technique, for sharing the time of a computer among several jobs, which switches jobs
so rapidly such that each job appears to have the computer to itself, is called _______________.
a) time sharing. b)time out.
c)time domain. d)multitasking.
156. The strategy of making processes that are logically runnable to be temporarily suspended is
called__________
a) Non preemptive scheduling b)Preemptive scheduling
c) Shortest job first d) First come First served

157. Situations where two or more processes are reading or writing some shared data and the
final results depend on the order of usage of the shared data, are called ________.
a) Race conditions. b) Critical section.
c) Mutual exclusion. d) Dread locks.

158. Which technique was introduced because a single job could not keep both the CPU and the
I/O devices busy?
a) Time-sharing. b) Spooling.
c) Preemptive scheduling. d)Multiprogramming.

159. In the multi-programming environment, the main memory consisting of _________ number
of process.
a) Greater than 100. b)Only one. c) Greater than 50. d) More than one.

160. Which of the following system calls transforms an executable binary file into a process?
a) Fork. b)Exec. c) Ioct1. d)Longjmp.

161. Concurrent processes are processes that ____________.
a) do not overlap in time.
b) overlap in time.
c) are executed by a processor at the same time.
d) are executed by a processor at the variable time period.

162. The only state transition that is initiated by the user process itself is _______.
a) block. b)dispatch. c)wakeup. d)batch.

163. An operating system contains 3 user processes each requiring 2 units of resource R. the
minimum number of units of R such that no deadlock will ever occur is ______.
a) 3. b)4. c)5. d)7.
164. In a time-sharing operating system, when the time slot given to a process is completed, the
process goes from the RUNNING state to the ______.
a) BLOCKED state. b)READY state.
c) SUSPENDED state. d)TERMINATED state.

165. Which of the following algorithms tends to minimize the process flow time ?
a) First come First serve b)Shortest Job First
c) Earliest Deadline First d)Longest Job First

19
ADITYA

166. Which of the following algorithms tends to minimize the process flow time ?
a) First come First served b)Shortest Job First
c) Earliest Deadline First d)Longest Job First
167. Under multiprogramming, turnaround time for short jobs is usually ________ and that for
long jobs is slightly ___________.
a) Lengthened; Shortened b)Shortened; Unchanged
c) Shortened; Shortened d)Shortened; Lengthened

168. Pre-emptive scheduling, is the strategy of temporarily suspending a running process ______.
a) Before the cpu time slice expires. b) To allow starving processes to run.
c) When it requests i/o. d) When overflow occurs.

169. If we preempt a resource from a process, the process cannot continue with its normal
execution and it must be ____________.
a) Aborted b)queued
c) rolled back d)terminated

170. In round-robin CPU scheduling, as the time quantum is increased, the average turn around
time_________.
a) increases. b)decreases.
c)remains constant. d) varies irregularly.

171. In a multiprogramming environment _______. .
a) the processor executes more than one process at a time.
b) the programs are developed by more than one program.
c) more than one process resides in the memory.
d) a single user can execute many programs at the same time

172. In which of the following scheduling policies does context switching never take place?
a) Round-robin. b) Shortest job first.
c)Pre-emptive. d) Optimal based.

173. Suppose that a process is in BLOCKED state waiting for some I/O service. Which the
service is completed, it goes to the _______.
a) RUNNING state. b) READY state.
c) SUSPENDED state. d)TERMINATED state.

174. Cascading termination refers to termination of all child processes before the parent
terminates ___
a) Normally. b)Abnormally.
c) Normally or abnormally. d)In middle of its execution.

175. For implementing a multiprogramming operating system ________.
a) Special support from processor is essential.
b) Special support from processor is not essential.
c) Cache memory must be available.
d) More than one processor must be available.


20
ADITYA
176. Consider a system having m resources of the same type. These resources are shared by 3
processes A,B, C, which have peak time demands of 3, 4, 6 respectively. The minimum value of m
that ensures that deadlock will never occur is ________.
a) 11 b)12 c)13 d)14
177. A system has 3 processes sharing 4 resources. If each process needs a maximum of 2 units
then,deadlock ______.
a) can never occur. b)may occur. c)has to occur. d)chance of occurrence.

178. If the resources are always preempted from the same process, __________ can occur.
a) deadlock b)system crash c)aging d)starvation

179. Which of the following scheduling algorithm gives minimum average waiting time?
a) FCFS. b)SJF. c)Round-robin. d)Priority.

180.An optimal scheduling algorithm in terms of minimizing the average waiting time of a given
set of processes is ________.
a) FCFS scheduling algorithm.
b) round robin scheduling algorithm.
c) shortest job - first scheduling algorithm.
d) shortest job - last scheduling algorithm.

181. Which of the following scheduling policy is well suited for a time-shared operating system?
a) Shortest job first. b)Round robin. c)First come first serve. d)Elevator.

182 A computer installation has 1000 k of main memory. The jobs arrive and finish in the
following sequence. Job1 requiring 200k arrives Job2 requiring 350k arrives Job3 requiring
300k arrives Job1 finishes Job4 requiring 120k arrives Job5 requiring 150k arrives Job6
requiring 80k arrives Among best fit and first fit, which performs better for this sequence?
a) First fit. b)Best fit. c)Both perform the same. d)Worst fit.

183.Which of the following applications are well suited for batch processing?
a) Process control. b)Video game control.
c) Preparing inventory. d)Preparing mailing addresses.

184. Locality of reference implies that the page reference being made by a process ______.
a) Will always be to the page used in the previous page reference.
b) likely to be one of the pages used in the last few page references.
c) Will always be one of the pages existing in the memory.
d) Will always leads to a page fault.

185. The primary distinction between long term scheduler and short term scheduler is the
frequency of their________.
a) compilation. b)frequency of execution.
c)debugging. d)loading.

186. An edge from process Pi to Pj in a wait for graph indicates that _____________.
a) Pi is waiting for Pj to release a resource that Pi needs.
b) Pj is waiting for Pi to release a resource that Pj needs.
c) Pi is waiting for Pj to leave the system.
d) Pj is waiting for Pi to leave the system


21
ADITYA
187. Suspended processes are written onto a _______.
a) swap area. b)dedicated area. c)rom. d)critical area.

188. Which of the following system calls, does not return control to the calling point, on
termination?
a) fork. b)exec. c)ioct1. d)longjmp.

189.Which of the following are shared between a parent process and a child process?
a) External Variables.b)Registers. c)Pointer variables. d)Pipes.

190. Choose the correct answer:
a) Interrupts are caused by events that are internal to a process.
b) An exception condition is caused by an event external to a process.
c) An exception condition happens in the middle of the exception of an instruction.
d) An interrupt happens in the middle of the execution of an instruction.

191. Using Priority Scheduling algorithm, find the average waiting time for the following set of
processes given with their priorities in the order: Process : Burst Time : Priority respectively . P1
: 10 : 3 , P2 : 1 : 1 ,P3 : 2 : 4 , P4 : 1 : 5 , P5 : 5 : 2.
a) 8 milliseconds. b)8.2 milliseconds. c)7.75 milliseconds. d)3 milliseconds.

192. Which of the following is contained in Process Control Block (PCB)?
a) Process Number. b)List of Open files. c)Memory Limits. d)All of the Above.

193. Which of the following is a criterion to evaluate a scheduling algorithm?
a) CPU Utilization: Keep CPU utilization as high as possible.
b) Throughput: number of processes completed per unit time.
c) Waiting Time: Amount of time spent ready to run but not running.
d) All of the above.

194. The round robin CPU scheduling in a time-shared system is done ________.
a) using very large time slice degenerates in to first come first served algorithm.
b) using extremely small time slices improve performance.
c) using extremely small time slices degenerate in to last in first out algorithm.
d) using medium sized time slices leads to shortest request time first algorithm.

195. What is PCB?
a) Program Control Block. b)Process Control Block.
c) Process Communication Block. d)Process Common Block.

196. In Priority Scheduling a priority number (integer) is associated with each process. The CPU
is allocated to the process with the highest priority (smallest integer = highest priority). The
problem of, Starvation a low priority processes may never execute, is resolved by __________.
a) terminating the process. b)aging.
c) mutual exclusion. d)semaphore.

197. The amount of work performed per unit time is _______.
a) Process time. b) Output time.
c) Throughput time. d) Input time.


22
ADITYA
198. A process is said to be ________ if it is executing on a process.
b) running state. b)ready state.
c) blocked state. d)completed state.

199.The act of assigning the first process to the first processor on the ready list is _______.
a) dispatcher. b)dispatching.
c) dispatched. d)quantum.

200 An action performed by the OS to remove a process from a processor and replace it with
another is_____.
a) interrupting. b) Control switching.
c) multiprocessor d)Fragmentation

201. Removing a process from a suspended state is called ____.
a) ready. b)running c)resume. d)finish.

202. An unit of time during which a process can execute before it is removed from the processor
is _____.
a) spavn. b)quartz. c)quantum. d)trap.

203 Process is
a) program in High level language kept on disk
b) contents of main memory
c) a program in execution
d) a job in secondary memory
e) None of the above

204 The strategy of allowing processes that are logically runnable to be temporarily suspended is
called
a) preemptive scheduling b)non preemptive scheduling
c) shortest job first d)first come first served e)None of the above

205. The LRU algorithm
a) pages out pages that have been used recently
b) pages out pages that have not been used recently
c) pages out pages that have been least used recently
d) pages out the first page in a given area
e) None of the above

206. Thrashing
a) is a natural consequence of virtual memory systems
b) can always be avoided by swapping
c) always occurs on large computers
d) can be caused by poor paging algorithms
e) None of the above

207. Which of the following statements is false?
a) the technique of storage compaction involves moving all occupied areas of storage to one end
or other of main storage
b) compaction does not involve relocation of programs
c) compaction is also know as garbage collection
d) the system must stop everything while it performs the compaction
e) None of the above
23
ADITYA

208. Interprocess communication
a) is required for all processes b)is usually done via disk drives
c) is never necessary, d)allows processes to synchronize activity

209 The CPU, after receiving an interrupt from an I/O device
a) halts for a predetermined time
b) hands over control of address bus and data bus to the interrupting device
c) branches off to the interrupt service routine immediately
d) branches off to the interrupt service routine after completion of the current instruction
e) None of the above

210 Seeks analysis
a) is used for analyzing paging problems
b) is used for analyzing device busy problems
c) is used for analyzing control-unit busy problems
d) is only shown on real-time displays
e) None of the above

211 Consider a set of n tasks with known runtimes r1, r2, rn to be run on a uniprocessor
mmachine. Which of the following processor scheduling algorithms will result in the maximum
throughput?

a) Round-Robin b)Shortest-Job-First
c)Highest-Response-Ratio-Next d)First-Come-First-Served

212. A process executes the code
fork ();
fork ();
fork ();
213.The total number of child processes created is

a) 3 b) 4 c) 7 d) 8

214. consider the 3 processes, P1, P2 and P3 shown in the table
process Arrival time Time unit required
P1 0 5
P2 1 7
P3 3 4
215.The completion order of the 3 processes under the policies FCFS and RRS (round r robin
scheduling with CPU quantum of 2 time units) are

a) FCFS: P1, P2, P3 RR2: P1, P2, P3
b) FCFS: P1, P3, P2 RR2: P1, P3, P2
c) FCFS: P1, P2, P3 RR2: P1, P3, P2
d) FCFS: P1, P3, P2 RR2: P1, P2, P3


24
ADITYA
216. A thread is usually defined as a light weight process because an operating system (OS)
maintains smaller data structures for a thread than for a process. In relation to this, hich of the
followings is TRUE?

a) On per-thread basis, the OS maint ains only CPU register state
b)The OS does not maintain a separate stack for each thread
c)On per-thread basis, the OS does not maintain virtual memory state
d)On per thread basis, the OS maintains only scheduling and accounting information.

217. Let the page fault service time be 10ms in a computer with average memory access time
being 20ns. If one page fault is generated for every 10^6 memory accesses, what is the effective
a access time for the memory?
a) 21ns b) 30ns c) 23ns d) 35ns

218. An application loads 100 libraries at startup. Loading each library requires exactly one disk
a access. The seek time of the disk to a random location is given as 10ms. Rotational speed
of d disk is 6000rpm. If all 100 libraries are loaded from random locations on the disk, how
long d does it take to load all libraries? (The time to transfer data from the disk block once the
head has been positioned at the start of the block may be neglected)
a) 0.50s b) 1.50s c) 1.25s d) 1.00s

219. Consider the following table of arrival time and burst time for three processes P0, P 1 and
P2.
Process Arrival time Burst Time
P0 0 ms 9 ms
P1 1 ms 4 ms
P2 2 ms 9 ms
220. The pre-emptive shortest job first scheduling algorithm is used. Scheduling is c carried out
only at arrival or completion of processes. What is the average waiting t time for the three
processes?
a) 5.0 ms b) 4.33 ms c) 6.33 ms d) 7.33 ms

221. Let the time taken to switch between user and kernel modes of execution be t1 while the
time taken to switch between two processes be t2. Which of the following is TRUE?
a) t1 > t2 b) t1 = t2 c) t1 < t2 d) Nothing can be said about
the relation between t1 and t2

222.A system uses FIFO policy for page replacement. It has 4 page frames with no pages loaded
to begin with. The system first accesses 100 distinct pages in some order and then accesses
the s same 100 pages but now in the reverse order. How many page faults will occur?

a) 196 b) 192 c) 197 d) 195

223. Which of the following statements are true?
I.Shortest remaining time first scheduling may cause starvation
II.Preemptive scheduling may cause starvation
III.Round robin is better than FCFS in terms of response time

a) I only b) I and III only
c) II and III only d) I, II and III


25
ADITYA
224. Consider the methods used by processes P1 and P2 for accessing their critical s
sections whenever needed, as given below. The initial values of shared boolean v
variables S1 and S2 are randomly assigned.
Method Used by P1
while (S1 == S2) ;
Critica1 Section
S1 = S2;
Method Used by P2
while (S1 != S2) ;
Critica1 Section
S2 = not (S1);
225.Which one of the following statements describes the properties achieved?

a) Mutual exclusion but not progress
b) Progress but not mutual exclusion
c) Neither mutual exclusion nor progress
d)Both mutual exclusion and progress


226. In the following process state transition diagram for a uniprocessor system, assume that
there are always some processes in the ready state: Now consider the following statements:
I. If a process makes a transition D, it would result in another process making transition
A I immediately. II. A process P2 in blocked state can make transition E while another process
P1 is in running s state. III. The OS uses preemptive scheduling. IV. The OS uses non-
preemptive scheduling. which of the above statements are TRUE?

a) I and II b) I and III c) II and III d) II and IV


227. The enter_CS() and leave_CS() functions to implement critical section of a process a are
realized using test-and-set instruction as follows:
void enter_CS(X)
{
while test-and-set(X) ;
}
void leave_CS(X)
{
X = 0;
}
228.In the above solution, X is a memory location associated with the CS and is I initialized to
0. Now consider the following statements: 1. The above solution to CS problem is deadlock-free
2.The solution is starvation free. 3.The processes enter CS in FIFO order. 4.More than
one process can enter CS at the same time. Which of the above statements is TRUE?

a) I only b) I and II c) II and III d) IV only


229. Two processes, P1 and P2, need to access a critical section of code. Consider the following
s synchronization construct used by the processes:Here, wants1 and wants2 are shared
vvariables, which are initialized to false. Which one of the following statements is TRUE about t
the above construct?/* P1 */ while (true) { wants1 = true; while (wants2 == true); /* Critical Section
*/ wants1=false; } /* Remainder section */ /* P2 */ while (true) { wants2 = true; while (wants1==true);
/* Critical Section */ wants2 = false; } /* Remainder section */
26
ADITYA
a) It does not ensure mutual exclusion.
b) It does not ensure bounded waiting.
c) It requires that processes enter the critical section in strict alternation.
d) It does not prevent deadlocks, but ensures mutual exclusion.


230. Consider three processes (process id 0, 1, 2 respectively) with compute time bursts 2, 4 and 8
time units. All processes arrive at time zero. Consider the longest remaining time first (LRTF)
sscheduling algorithm. In LRTF ties are broken by giving priority to the process with the lowest
process id. The average turn around time is:

a) 13 units b) 14 units c) 15 units d) 16 units


231. Consider three processes, all arriving at time zero, with total execution time of 10, 20 and
30 u units, respectively. Each process spends the first 20% of execution time doing I/O, the
next 70% of time doing computation, and the last 10% of time doing I/O again. The operating
s system uses a shortest remaining compute time first scheduling algorithm and schedules a
nnew process either when the running process gets blocked on I/O or when the running pprocess
finishes its compute burst. Assume that all I/O operations can be overlapped as much as possible.
For what percentage of time does the CPU remain idle?

a) 0% b) 10.6% c) 30.0% d) 89.4%

232. The atomic fetch-and-set x, y instruction unconditionally sets the memory location x to 1
and fetches the old value of x in y without allowing any intervening access to the memory
location x. consider the following implementation of P and V functions on a binary semaphore .
void P (binary_semaphore *s) {
unsigned y;
unsigned *x = &(s->value);
do {
fetch-and-set x, y;
} while (y);
}

void V (binary_semaphore *s) {
S->value = 0;
}
Which one of the following is true?
a) The implementation may not work if context switching is disabled in P.
b) Instead of using fetch-and-set, a pair of normal load/store can be used
c) The implementation of V is wrong
d) The code does not implement a binary semaphore

233 Consider the following snapshot of a system running n processes. Process i is holding Xi
Iinstances of a resource R, 1 <= i <= n. currently, all instances of R are occupied. Further, for all
I process i has placed a request for an additional Yi instances while holding the Xi instances it
aalready has. There are exactly two processes p and q such that Yp = Yq = 0. Which one of the
following can serve as a necessary condition to guarantee that the system is not approaching a
deadlock?


27
ADITYA
a) min (Xp, Xq) < max (Yk) where k != p and k != q
b) Xp + Xq >= min (Yk) where k != p and k != q
c) max (Xp, Xq) > 1
d) min (Xp, Xq) > 1

234. In MS-DOS 5.0, which is the number that acts as a code to uniquely identify the software
product?

a) MS b) DOS c) MS DOS c) 5.0 e) None of the above

235 Consider the following code fragment:
if (fork() == 0)
{ a = a + 5; printf(%d,%d\n, a, &a); }
else { a = a 5; printf(%d, %d\n, a, &a); }
Let u, v be the values printed by the parent process, and x, y be the values printed b y the
child process. Which one of the following is TRUE?
(a) u = x + 10 and v = y (b) u = x + 10 and v != y
(c) u + 10 = x and v = y (d) u + 10 = x and v != y

236. Fetch_And_Add(X,i) is an atomic Read-Modify-Write instruction that reads the v alue
of memory location X, increments it by the value i, and returns the old value of X. It is used
in the pseudocode shown below to implement a busy-wait lock. L is an u nsigned integer
shared variable initialized to 0. The value of 0 corresponds to lock b eing available, while any
non-zero value corresponds to the lock being not available.
AcquireLock(L){
while (Fetch_And_Add(L,1))
L = 1;
}
ReleaseLock(L){
L = 0;
}
This implementation
a) fails as L can overflow
b) fails as L can take on a non-zero value when the lock is actually available
c) works correctly but may starve some processes
d) works correctly without starvation

237 Which scheduling policy is most suitable for a time-shared operating systems?
a) Shortest Job First b) Round Robin
c) First Come First Server d)Elevator

238. Consider a set of n tasks with known runtimes r1, r2, rn to be run on a uniprocessor
machine. Which of the following processor scheduling algorithms will result in the m
maximum throughput?
a) Round-Robin b) Shortest-Job-First
c) Highest-Response-Ratio-Next d)First-Come-First-Served

239. Which of the following scheduling algorithms is non-preemptive?
(a) Round-Robin
(b) First In First Out
(c) Multilevel Queue Scheduling
(d) Multilevel Queue Scheduling with Feedback

28
ADITYA

240 Consider three CPU-intensive processes, which require 10, 20 and 30 time units and a
arrive at times 0, 2 and 6, respectively. How many context switches are needed if the
operating system implements a shortest remaining time first scheduling algorithm? Do
not count the context switches at time zero and at the end.

(a) 1 (b) 2 (c) 3 4

241. Group 1 contains some CPU scheduling algorithms and Group 2 contains some a
applications. Match entries in Group 1 to entries in Group 2.
Group I Group II
(P) Gang Scheduling (1) Guaranteed Scheduling
(Q) Rate Monotonic Scheduling (2) Real-time Scheduling
(R) Fair Share Scheduling (3) Thread Scheduling
(a) P 3 Q 2 R 1
(b) P 1 Q 2 R 3
(c) P 2 Q 3 R 1
(d P 1 Q 3 R 2

242. Assume that the following jobs are to be executed on a single processors system
-----------------------
Job-Id CPU-BurstTime
-----------------------
p 4
q 1
r 8
s 1
t 2
-----------------------
243. The jobs are assumed to have arrived at time 0 and in the order p, q, r, s, t. Calculate the
departure time (completion time) for job p if scheduling is round robin with time slice 1.
(a) 4 (b) 10 (c) 11 (d) 12


244. An operating system uses Shortest Remaining Time first (SRT) process scheduling
algorithm. Consider the arrival times and execution times for the following processes:
-------------------------------------
Process Execution time Arrival time
-------------------------------------
P1 20 0
P2 25 15
P3 10 30
P4 15 45
-------------------------------------
245. What is the total waiting time for process P2?
(a) 5 (b) 15 (c) 40 (d) 55


29
ADITYA

246. Which is the component of a file system concerned with providing the mechanisms is files to
be stored, to be referenced, shared and secured is ________.
a). File reorganization. b). File integrity mechanism
c). File management. d). File system.

247. SJF stands for _________.

a) shortest job for. b). shortest job last. c). Shortest job middle. d). shortest job first.

248. SJF is not useful in _____ environments in which reasonable response times much be
guaranteed.
a). real time. b). time sharing. c). online. d). multiprogramming.

249 _______ is the system response time to the job if the job were to be initiated.
a) Time waiting. b). Service time.
c). Time waiting + service time. d). System time.

250. Which one of the following is not a characteristic of a file system?
a) File management. b) File integrity mechanism.
c) File access methods. d). File sizing.
251. Round Robin is _______ type of scheduling.
a) Preemptive. b) Non-preemptive. c) time sharing. d). real time.


252. SRT has ____ overhead than SJF.
a). lower . b) medium. c) higher. d) none.


253. _____ is not useful in scheduling interactive uses because it cannot guarantee good response
time.
A. SJF.
B. SRT.
C. FIFO.
D. LIFO.

254. Processes are dispatched FIFO but are given a limited amount of CPU time called_____.
a). RR. b) time - slice or quantum. c) SJF. d) HRN.

255. Round Robin is _______ type of scheduling.
a) preemptive. b) non-preemptive. c) time sharing. d) real time.

256. SRT has ____ overhead than SJF.
a) lower . b)medium. c) higher. d) none.

257. In _______scheduling, certain jobs are scheduled to be completed by a specific time or
deadline.
a) processor scheduling. b) job scheduling.
c) deadline scheduling. d) real time scheduling.


258. The simplest scheduling discipline is ____________.
a) FIFO. b) RR. c). SJF. d)SRT.
30
ADITYA

259 . _______ is a non-preemptive discipline.
a) Quantum size. b). HRN c). FIFO. d) LIFO.


260. Keeping non-running programs is main storage involves______.
a) No overhead. b) page faults. c) overhead. d) page default.

261. Preemptive scheduling is useful in ______.
a.) interactive timesharing systems. b) real- time systems.
c) Multiprogramming systems. d) On-line systems.

262. The problems of determining when processors should be assigned and to which processes.
This is called_____.
a) processor scheduling b) job scheduling.
c) high-level scheduling. d) low-level scheduling.

263. A scheduling discipline is ___________ if once a process has given the CPU.
a) preemptive. b) non-preemptive.
c). real time. d) on line.


264. A scheduling discipline is _____if the CPU can be taken away.
A. non-preemptive. B. preemptive.
C. timesharing. D. multiprogramming.


265_______ contains the highest address used by the operating system.
A. Coalescing. B. Boundary register.
C. Garbage collection. D. Overlays.

266.Thrashing occurs ________.
A. when excessive swapping takes place. B. when you thrash your computer.
C. whenever deadlock occurs. D. when no swapping takes place.

267..Dijkstra banking algorithm in an operating system solves the problem of _______.
A. deadlock avoidance. B. deadlock recovery.
C. mutual exclusion. D. context switching.


268. A state is safe if the system can allocate resources to each process(up to its maximum) in
some order and still avoid deadlock ________.
A. deadlocked state is safe. B. safe state may lead to a deadlock situation.
C. unsafe state must lead to a deadlock situation. D. deadlocked state is a subset of unsafe state.

269.A state is safe, if ___________.
A. the system does not crash due to deadlock occurrence.
B. the system can allocate resources to each process in some order and still avoid a deadlock.
C. the state keeps the system protected and safe.
D. All of above.

31
ADITYA

270.If no cycle exists in the resource allocation graph ____________.
A. then the system will be in a safe state.
B. then the system will not be in a safe state.
C. either a or b.
D. None of these.

271.The Bankers algorithm is _____________ than the resource allocation graph algorithm.
A. less efficient. B. more efficient.
C. effective D. None of these.

272 .The host repeatedly checks if the controller is busy until it is not. It is in a loop that status
register &busy bit becomes clear. This is called _____________ and a mechanism for the
hardware controller tonotify the CPU that it is ready is called ___________.
A. interrupt and polling. B. polling and spooling.
C. polling and interrupt. D. deadlock and starvation.

273..If the wait for graph contains a cycle ___________.
A. then a deadlock does not exist. B. then a deadlock exists.
C. then the system is in a safe state. D. either b or c.

274 .The disadvantage of invoking the detection algorithm for every request is ____________.
A. overhead of the detection algorithm due to consumption of memory.
B. excessive time consumed in the request to be allocated memory.
C. considerable overhead in computation time.
D. All of these.

275.Deadlock prevention is a set of methods __________.
A. to ensure that at least one of the necessary conditions cannot hold.
B. to ensure that all of the necessary conditions do not hold.
C. to decide if the requested resources for a process have to be given or not.
D. to recover from a deadlock.

276 .Dijktra Barker Algorithm is an example for ____.
A. deadlock prevention. B. deadlock detection.
C. deadlock avoidance. D. deadlock recovery.

277 .What problem is solved by Dijkstra's banker's algorithm?
A) mutual exclusion B) deadlock recovery
C) deadlock avoidance D) cache coherence
E) None of the above

278.The dispatcher
A) actually schedules the tasks into the processor
B) puts tasks in I/O wait
C) is always small and simple
D) never changes task priorities
E) None of the above

32
ADITYA
279. Which of the following is NOT a valid deadlock prevention scheme?
a) Release all resources before requesting a new resource
(b) Number the resources uniquely and never request a lower numbered resource than the last one
requested.
(c) Never request a resource after releasing any resource
(d) Request and all required resources be allocated before execution.
280. Let m[0]m[4] be mutexes (binary semaphores) and P[0] . P[4] be processes.
Suppose each process P[i] executes the following:
wait (m[i]); wait(m[(i+1) mode 4]);release (m[i]); release (m[(i+1)mod 4]);
This could cause (GATE CS 2000)
a) Thrashing (b Deadlock
c) Starvation, but not deadlock d) None of the above

281. Consider Petersons algorithm for mutual exclusion between two concurrent p Processes i
and j. The program executed by process is shown below. repeat
flag [i] = true;
turn = j;
while ( P ) do no-op;
Enter critical section, perform actions, then exit critical
section
flag [ i ] = false;
Perform other non-critical section actions.
until false; For the program to guarantee mutual exclusion, the predicate P in the while loop s
should be

a) flag [j] = true and turn = i
b) flag [j] = true and turn = j
c) flag [i] = true and turn = j
d) flag [i] = true and turn = i

282.Which of the following is NOT true of deadlock prevention and deadlock avoidance
schemes?
(a) In deadlock prevention, the request for resources is always granted if the resulting state is safe
(b) In deadlock avoidance, the request for resources is always granted if the result state is safe
(c) Deadlock avoidance is less restrictive than deadlock prevention
(d) Deadlock avoidance requires knowledge of resource requirements a priori
To avoid the race condition, the number of processes that may be simultaneously inside their critical
section is
A) 8 B) 1 C) 16 D) 0
E) None of the above
283. Dijktra Barker Algorithm is an example for ____.
A. deadlock prevention. B. deadlock detection.
C. deadlock avoidance. D. deadlock recovery.

284. A binary semaphore ____________.
A. has the values one or zero. B. is essential to binary computers.
C. is used only for synchronization. D. is used only for mutual exclusion.
285.The section of code which accesses shared variables is called as __________.
A. critical section. B. block.
C. procedure. D. semaphore.

33
ADITYA
286. _____ is a high level abstraction over Semaphore.
A. Shared memory. B. Message passing.
C. Monitor. D. Mutual exclusion.

287_____ is a high level abstraction over Semaphore.
A. Shared memory. B. Message passing.
C. Monitor. D. Mutual exclusion.

288 The initial value of the semaphore that allows only one of the many processes to enter
their critical sections, is
A) 8 B) 1 C) 16 D) 0 E) None of the above

289. Producer consumer problem can be solved using
A) semaphores B) event counters C) monitors
D) all of the above E) None of the above

290.The P and V operations on counting semaphores, where s is a counting semaphore, are
defined as follows:
P(s) : s = s - 1;
if (s < 0) then wait;
V(s) : s = s + 1;
if (s <= 0) then wakeup a process waiting on s;
Assume that Pb and Vb the wait and signal operations on binary semaphores are p
provided. Two binary semaphores Xb and Yb are used to implement the semaphore
operations P(s) and V(s) as follows:
P(s) : Pb(Xb);
s = s - 1;
if (s < 0) {
Vb(Xb) ;
Pb(Yb) ;
}
else Vb(Xb);

V(s) : Pb(Xb) ;
s = s + 1;
if (s <= 0) Vb(Yb) ;
Vb(Xb) ;
The initial values of Xb and Yb are respectively
A) 0 and 0 B) 0 and 1 C) 1 and 0 D) 1 and 1

291. Which of the following statements about synchronous and asynchronous I/O is NOT
true?
(A) An ISR is invoked on completion of I/O in synchronous I/O but not in asynchronous I/O
(B) In both synchronous and asynchronous I/O, an ISR (Interrupt Service Routine) is invoked after
completion of the I/O
(C) A process making a synchronous I/O call waits until I/O is complete, but a process making an
asy nchronous I/O call does not wait for completion of the I/O
(D) In the case of synchronous I/O, the process waiting for the completion of I/O is woken up by
the ISR that is invoked after the completion of I/O


34
ADITYA

292 A process executes the following code
for (i = 0; i < n; i++) fork();
The total number of child processes created is
(A) n (B) 2^n 1 (C) 2^n (D) 2^(n+1) - 1;

293. Distributed OS works on the ________ principle.
A. file foundation. B. single system image.
C. multi system image. D. networking image.

294. Which directory implementation is used in most Operating System?
A. Single level directory structure. B. Two level directory structure.
C. Tree directory structure. D. Acyclic directory structure.

295. Boundary registers ________.
A. are available in temporary program variable storage.
B. are only necessary with fixed partitions.
C. track the beginning and ending the program.
D. track page boundaries.

296. Resource locking ________.
A. allows multiple tasks to simultaneously use resource.
B. forces only one task to use any resource at any time.
C. can easily cause a dead lock condition.
D. is not used for disk drives.

297. A tree structured file directory system ____________.
A. allows easy storage and retrieval of file names.
B. is a much debated unnecessary feature.
C. is not essential when we have millions of files.
D. allows easy storage and retrieval of directory names.

298. In the ___________ method of data transfer, the participation of the processor is eliminated
during data transfer.
A. buffering. B. caching.
C. direct memory access. D. indirect memory access.

299. Spatial locality refers to the problem that once a location is referenced, _______________.
A. it will not be referenced again. B. it will be referenced again.
C.a nearby location will be referenced soon. D. will be referenced later.

300.Sector interleaving in disks is done by ________.
A. the disk manufacturer. B. the disk controller cord.
C. the operating system. D. hardware.

301.A computer system have 6 tape drives, with n processes competing for them. Each process
may need 3 tape drives. The maximum value of n for which the system is guaranteed to be
deadlock free is _______.
A. 2 B. 3 C. 4 D. 1


35
ADITYA
302 .In which of the following directory system, is it possible to have multiple complete paths for
a file,starting from the root directory?
A. Single level directory. B. Two level directory.
C. Tree structured directory. D. Acyclic graph directory.

303. A certain moving arm disk storage with one head has following specifications: Number of
tracks/recording surface-200 Disk rotation speed = 2400 rpm Track Storage capacity = 62500
bits What is the transfer rate?
A. 2.5Mbits/s. B. 4.25Mbits/s.
C. 1.5 Mbits/s. D. 3.75Mbits/s.

304.A computer system has 4 K word cache organized in a block-set-associative manner, with 4
blocks per set, 64 words per block. The number of bits in the SET and WORD fields of the main
memory addressformat is ________.
A. 15,4. B. 6,4.
C. 7,2. D. 4,6.

305. Which is the least level partition of disk?
A. Clusters. B. Sectors.
C. Slides. D. Tracks.

306.Swapping _______.
A. works best with many small partitions.
B. allows many programs to use memory simultaneously.
C. allows each program in turn to use the memory.
D. does not work with overlaying.

307.The problem of thrashing is affected scientifically by ________.
A. program structure. B. program size.
C. primary storage size. D. secondary storage size.

308. RAID level 3 supports a lower number of I/Os per second, because _______________.
A. every disk has to participate in every I/O request.
B. only one disk participates per I/O request.
C. I/O cycle consumes a lot of CPU time.
D. All of these.

309. Name the disk scheduling strategy that next services the request that is closest to the read-
write head currents cylinder.
A. SDTP disk scheduling. B. FSCAN disk scheduling.
C. C SCAN disk scheduling. D. SSTF disk scheduling.

310.The smallest portion of a track that can be accessed by an I/O request is ____.
A. Sector. B. Partition. C. Blocks. D. Tracks.

311.The time it takes for the read/write head to move from its current cylinder to the cylinder
containing the requested data saved is _________.
A. Seek time. B. Sector queering. C. Seek operation. D. Seek interval.

36
ADITYA

312 What is the area of disk where boundaries cannot be crossed by file data?
A. Sectors. B. Partition. C. Portion. D. Blocks.

313.What is the average time a system spends waiting for a disk request is to be received?
A. Mean time to failure. B. Mean response time.
C. Response time. D. Request time.

314.In FSCAN disk scheduling, the F stands for __________.
A. Forward. B. Freezing.
C. Fragmentation. D. Frequently.

315.Which reduces unfairness and variance of response time as compare to SSTP?
A. SCAN disk scheduling. B. Look disk scheduling.
C. Disk scheduling. D. Disk processing.

316.What is the pattern that has series of request is cylinder randomly distributed access disk
surfaces?
A. Seek operating. B. Memory.
C. Random seek pattern. D. System.

317 A technique that orders disk requests is maximize throughput and minimize residence times
and the variance of seek time.
A. Disk scheduling. B. C- SCAN disk scheduling.
C. D - SCAN. D. Disk arm.

318.Name the data redundancy technique in RAID that maintains a copy of each disks contents
on separate disk.
A. Disk moving. B. Disk copying.
C. Disk mirroring. D. Disk spacing.

319. Which method can reduce access times when reading from or writing to file sequentially?
A. Data compression. B. Data recognition.
C. Fragmentation. D. Disk aim anticipation.


320_____ are set of tracks that can be accessed by read / write head.
A. Cylinder. B. Sector.
C. Boom. D. Tracks.

321____ strategy begins each search for an available hole at the point where the search ended.
A. Best-fit. B. First-fit.
C. Forward-fit. D. Next-fit.

322 The time taken by the disk arm to locate the specific address of a sector for getting
information is called__________.
A. rotational latency. B. seek time.
C. search time. D. response time.


37
ADITYA
323 Virtual memory is __________.
A. an extremely large main memory.
B. an extremely large secondary memory.
C. an illusion of extremely large main memory.
D. a type of memory used in super computers.


324. Paging _________.
A. solves the memory fragmentation problem.
B. allows modular programming.
C. allows structured programming.
D. avoids deadlock.

325. The problem of fragmentation arises in ________.
A. static storage allocation.
B. stack allocation storage.
C. stack allocation with dynamic binding.
D. heap allocation.


326. The principle of locality of reference justifies the use of ________.
A. virtual memory. B. interrupts.
C. main memory. D. cache memory.

327. In paging, physical memory is broken into fixed-sized blocks called ___________.
A. pages. B. frames.
C. blocks. D. segments.

328. Semaphore can be used for solving __________.
A. wait & signal. B. deadlock.
C. synchronization. D. priority.

329. Mechanism of bringing a page into memory when it is needed is called _______.
A. segmentation. B. fragmentation.
C. demand paging. D. page replacement.

330. _________ page replacement algorithm suffers from Belady anamoly.
A. LRU. B. MRU. C. FIFO. D. LIFO.

331. The page replacement policy that sometimes leads to more page faults when the size of the
memory increased is ______.
A. FIFO. B. LRU. C. SSTF. D. SJF.

332. In paged memory systems, if the page size is increased, then the internal fragmentation
generally _____.
A. becomes less. B. becomes more.
C. remains constant. D. not remains constant.
333. If the property of locality of reference is well pronounced in a program ____________.
A. the number of page faults will be more.
B. the number of page faults will be less.
C. the number of page faults will remain the same.
D. execution will be slower.

38
ADITYA
334. Disk scheduling involves deciding ________.
A. which disk should be accessed next.
B. the order in which disk access requests must be serviced.
C.the physical location where files should be accessed in the disk.
D. the physical location where files should be accessed in the main memory.

335. Dirty bit is used to show the ______.
A. page with corrupted data.
B. wrong page in the memory.
C. page that is modified after being loaded into cache memory.
D. page that is less frequently accessed.

336. Fence register is used for _______.
A. cpu protection. B. memory protection.
C. file protection. D. disk protection.


337. In a paged memory, the page hit ratio is 0.35, the time required to access a page in
secondary memory is equal to 100 ns. The time required to access a page in primary memory is
10ns. The average time required to access a page is ________.
A. 3.0ns. B. 68.0 ns.
C. 68.5 ns. D. 78.5 ns.

338. The size of the virtual memory depends on the size of the ______.
A. data bus. B. main memory.
C. address bus. D. secondary memory.

339. In a system that does not support swapping _________.
A. binding of symbolic addresses to physical addresses normally takes place during
compilation.
B. he compiler normally binds symbolic addresses to physical addresses.
C. the loader binds re locatable addresses to physical addresses.
D. binding of symbolic addresses to physical addresses normally takes place during execution.

340. Which of the following is true?
A. Overlays are used to increase the size of physical memory.
B. Overlays are used to increase the logical address space.
C. When overlays are used, the size of a process is not limited to the size of physical memory.
D. Overlays are used whenever the physical address space is smaller than the logical address
space.

341. In partitioned memory allocation scheme, the ________.
A. best fit algorithm is always better than the first fit algorithm.
B. first fit algorithm is always better than the best fit algorithm.
C. superiority of the first fit and best-fit algorithms depend on the sequence of memory
requests.
D. superiority of the first fit and best-fit algorithms depend on the sequence of process requests.

342. The main function of shared memory is to _________.
A. use primary memory efficiently. B. do intra process communication.
C. do inter process communication. D. use secondary memory efficiently.
39
ADITYA
343. Aging is _______.
A. keeping track of cache contents.
B. keeping track of what pages are currently residing in the memory.
C. keeping track of how many times a given page is referenced.
D. increasing the priority of jobs to ensure termination in a finite time.

344. If there are 32 segments, each of size 1 kbytes, then the logical address should have ______
A. 13 bits. B. 14 bits. C. 15 bits. D. 16 bits.


345. In a paged segmented scheme of memory management, the segment table itself must have a
page table because _______.
A. the segment table is often too large to fit in one page.
B. each segment is spread over a number of pages.
C. segment tables point to page tables and not to the physical location of the segment.
D. the processor description base register points to a page table.

346. A memory page containing a heavily used variable that was initialized very early and is in
constant use is removed. When the page replacement algorithm used is _______.
A. LRU. B. FIFO. C. LFU. D. SJF.

347. Consider a computer with 8Mbytes of main memory and a 128K cache. The cache block size
is 4 K. it uses a direct mapping scheme for cache management. How many different main
memory blocks can map onto a given physical cache block?
A. 20. B. 25. C. 64. D. 456.

348. The content of the matrix Need is __________.
A. Allocation Available. B. Max Available.
C. Max Allocation. D. Allocation Max.

349. Virtual memory allows ___________.
A. execution of a process that may not be completely in memory.
B. a program to be larger than the cache memory.
C. a program to be larger than the secondary storage.
D. execution of a process without being in physical memory.

350. When a page fault occurs, the state of the interrupted process is ___________.
A. disrupted B. invalid C. saved D. None of these

351. When the page fault rate is low ________.
A. the turnaround time increases. B. the effective access time increases.
C. the effective access time decreases. D. a and b.

352. VirtualMemory is commonly implemented by __________.
A. segmentation. B. swapping. C. demand Paging. D. demand line.

353. Memory
A) is a device that performs a sequence of operations specified by instructions in memory.
B) is the device where information is stored
C) is a sequence of instructions
D) is typically characterized by interactive processing and time-slicing of the CPU's time to allow
quick response to each user.
40
ADITYA

354. A system program that sets up an executable program in main memory ready for
execution is
A) assembler B) linker C) loader D) compiler

355 Which of the following are loaded into main memory when the computer is booted?
A) internal command instructions B) external command instructions
C) utility programs D) word processing instructions
E) None of the above

356 The FIFO algorithm
A) executes first the job that last entered the queue
B) executes first the job that first entered the queue
C) execute first the job that has been in the queue the longest
D) executes first the job with the least processor needs
E) None of the above

357 The principal of locality of reference justifies the use of
A) reenterable B) non reusable
Cvirtual memory D) cache memory
E) None of the above

358 The register or main memory location which contains the effective address of the operand
is known as
A) pointer B) indexed register C) special location
D) scratch pad E) None of the above

359.Thrashing can be avoided if
A) the pages, belonging to the working set of the programs, are in main memory
B) the speed of CPU is increased
C) the speed of I/O processor is increased
D) all of the above
E) None of the above

360. Resolution of externally defined symbols is performed by
A) Linker B) Loader C) Compiler
D) Assembler E) None of the above

361 System generation:
A) is always quite simple B) is always very difficult C) varies in difficulty between systems
D) requires extensive tools to be understandable E) None of the above

362. The Memory Address Register

A) is a hardware memory device which denotes the location of the current instruction being executed.
B) is a group of electrical circuits (hardware), that performs the intent of instructions fetched from
memory.
C) contains the address of the memory location that is to be read from or stored into.
D) contains a copy of the designated memory location specified by the MAR after a "read" or the new
contents of the memory prior to a "write".
E) None of the above

363 In virtual memory systems, Dynamic address translation
41
ADITYA
A) is the hardware necessary to implement paging
B) stores pages at a specific location on disk
C) is useless when swapping is used
D) is part of the operating system paging algorithm
E) None of the above

364. Fragmentation of the file system
A) occurs only if the file system is used improperly
B) can always be prevented
C) can be temporarily removed by compaction
D) is a characteristic of all file systems
E) None of the above

365. A non-relocatable program is one which
A) cannot be made to execute in any area of storage other than the one designated for it at the
time of its coding or translation.
B) consists of a program and relevant information for its relocation.
C) can itself performs the relocation of its address-sensitive portions.
D) all of the above
E) None of the above

366 In which addressing mode the effective address of the operand is the contents of a register
specified in the instruction and after accessing the operand, the contents of this register is
incremented to point to the next item in the list?
A) index addressing B) indirect addressing
C) auto increment D) auto decrement
E) None of the above

367 The memory allocation scheme subject to "external" fragmentation is
A) segmentation B) swapping
C) pure demand paging D) multiple contiguous fixed partitions
E) None of the above

368. While working with MS-DOS, which command will you use to transfer a specific file from
one disk to another?

A) DISKCOPY B) COPY C) RENAME D) FORMAT
E) None of the above

369. In which addressing mode the contents of a register specified in the instruction are first
decremented, and then these contents are used as the effective address of the operands?

A) index addressing B) indirect addressing C) auto increment
D) auto decrement E) None of the above

370. Page stealing
A) is a sign of an efficient system B) is taking page frames from other working sets
C) should be the tuning goal D) is taking larger disk spaces for pages paged out
E) None of the above


42
ADITYA
371. In MS-DOS 5.0, which is the number that acts as a code to uniquely identify the software
product?
A) MS B) DOS C) MS DOS D) 5.0 E) None of the above

372 Memory management is :
A) not used in modern operating system B) replaced with virtual memory on current systems
C) not used on multiprogramming systems D) critical for even the simplest operating systems
E) None of the above

373 The Register - to - Register (RR) instructions
A) have both their operands in the main store.
B) which perform an operation on a register operand and an operand which is located in the main store,
generally leaving the result in the register, except in the case of store operation when it is also
written into the specified storage location.
C) which perform indicated operations on two fast registers of the machine and leave the result in one
of the registers.
D) all of the above
E) None of the above

374. A page fault
A) is an error is a specific page B) occurs when a program accesses a page of memory
C) is an access to a page not currently in memory
Dis a reference to a page belonging to another program
E) None of the above

375. The process of transferring data intended for a peripheral device into a disk (or
intermediate store) so that it can be transferred to peripheral at a more convenient time
or in bulk, is known as
A) multiprogramming B) spooling C) caching D) virtual programming
E) None of the above

376. Block caches or buffer caches are used
A) to improve disk performance
B) to handle interrupts
C) to increase the capacity of the main memory
D) to speed up main memory read operation
E) None of the above

377. Which of the following statements is false?
A) a small page size causes large page tables
B) internal fragmentation is increased with small pages
C) a large page size causes instructions and data that will not be referenced brought into
primary storage
D) I/O transfers are more efficient with large pages
E) None of the above

378. Which of the following is false about disk when compared to main memory?
A) non-volatile B) longer storage capacity
C) lower price per bit D) faster
E) None of the above

379. If the number of bits in a virtual address of a program is 12 and the page size is 0.5 K
bytes, the number of pages in the virtual address space is
43
ADITYA
A) 16 B) 32
C) 64 D) 128
E) None of the above

380. Swapping
A. works best with many small partitions
B.allows many programs to use memory simultaneously
C. allows each program in turn to use the memory
D.does not work with overlaying
E. None of the above

381. A disk scheduling algorithm in an operating system causes the disk arm to move back and
forth across the disk surface in order to service all requests in its path. This is a
A) First come first served B) Shortest Seek Time First (SSTE)
C) Scan D) FIFO
E) None of the above

382. Addressing modes
A) defines the fundamental method of determining effective operand addresses
B) are variations in the use of fundamental addressing structures, or some associated actions
which are related to addressing.
C) performs indicated operations on two fast registers of the machine and leave the result in
one of the registers.
D) all of the above
E) None of the above


383. In which way(s) a macro processor for assembly language can be implemented:
A) independent two-pass processor B) independent one-pass processor
C) processor incorporated into pass 1 of a standard two-pass assembler
D) all of the above E) None of the above

384. Which of the following is a type of systems software used on microcomputers?
A) MS-DOS B) PC-DOS C) Unix
D) All of the above E) None of the above

385. The working set theory of programming behaviour of processes running within an
operating system involves
A) the collection of pages that a process accesses
B) disk scheduling mechanisms
C) coalescing holes in memory
D) assigning the CPU to processes
E) None of the above

386. Operating system is
A) A collection of hardware components
B) A collection of input-output devices
C) A collection of software routines
D) All of the above
E) None of the above

387. A file organization component of a VSAM file is:
A) relative record data set
44
ADITYA
B) keyed sequential data set
C) entry sequential data set
D) all of the above
E) None of the above

388 What is the name given to the software which can be legally compiled and often used for
free?
A) Shareware program B) Public domain program
C) Firmware program D) Mindware
E) None of the above

389. The SJF algorithm executes first the job
A) that last entered the queue B) that first entered the queue
C) that has been in the queue the longest D) with the least processor needs
E) None of the above

390 A graphics card has on board memory of 1 MB. Which of the following modes can the
card n not support?
(a) 1600 x 400 resolution with 256 colours on a 17 inch monitor
(b) 1600 x 400 resolution with 16 million colours on a 14 inch monitor
(c) 800 x 400 resolution with 16 million colours on a 17 inch monitor
(d) 800 x 800 resolution with 256 colours on a 14 inch monitor


391. Consider a virtual memory system with FIFO page replacement policy. For an arbitrary
page
access pattern, increasing the number of page frames in main memory will
a) Always decrease the number of page faults
b) Always increase the number of page faults
c) Some times increase the number of page faults
d) Never affect the number of page faults

392 Consider a machine with 64 MB physical memory and a 32-bit virtual address space. If
the p page size is 4KB, what is the approximate size of the page table?
(a) 16 MB (b) 8 MB (c) 2 MB (d) 24 MB

393 More than one word are put in one cache block to
(a) exploit the temporal locality of reference in a program
(b) exploit the spatial locality of reference in a program
(c) reduce the miss penalty
(d) none of the above

394. Which of the following statements is false?
a) Virtual memory implements the translation of a programs address space into physical memory
address space
b) Virtual memory allows each program to exceed the size of the primary memory
c) Virtual memory increases the degree of multiprogramming
d) Virtual memory reduces the context switching overhead


395. Suppose the time to service a page fault is on the average 10 milliseconds, while a memory
a access takes 1 microsecond. Then a 99.99% hit ratio results in average memory access
time of
45
ADITYA
(a) 1.9999 milliseconds (b) 1 millisecond
(c) 9.999 microseconds (d) 1.9999 microseconds


396. Which of the following need not necessarily be saved on a context switch between p
processes?
(a) General purpose registers (b) Translation look-aside buffer
(c) Program counter (d) All of the above

397. Where does the swap space reside ?
(a) RAM (b) Disk
(c) ROM (d) On-chip cache

398. Which of the following does not interrupt a running process?
(a) A device (b) Timer
(c) Scheduler process (d) Power failure

399. Which of the following scheduling algorithms is non-preemptive?
a) Round Robin b) First-In First-Out
c) Multilevel Queue Scheduling d) Multilevel Queue Scheduling with Feedback


400. Using a larger block size in a fixed block size file system leads to
a) better disk throughput but poorer disk space utilization
b) better disk throughput and better disk space utilization
c) poorer disk throughput but better disk space utilization
d) poorer disk throughput and poorer disk space utilization

401. Consider the following statements with respect to user-level threads and kernel
supported t threads
context switch is faster with kernel-supported threads
for user-level threads, a system call can block the entire process
Kernel supported threads can be scheduled independently
User level threads are transparent to the kernel
which of the above statements are true?
a) (ii), (iii) and (iv) only
b) (ii) and (iii) only
c) (i) and (iii) only
d) (i) and (ii) only


402. The minimum number of page frames that must be allocated to a running process in a
virtual memory environment is determined by
a) the instruction set architecture b) page size
c) physical memory size d) number of processes in memory


46
ADITYA

403. Consider the virtual page reference string
1, 2, 3, 2, 4, 1, 3, 2, 4, 1
On a demand paged virtual memory system running on a computer system that main
memory size of 3 pages frames which are initially empty. Let LRU, FIFO and OPTIMAL
denote the n number of page faults under the corresponding page replacements policy. Then
(A) OPTIMAL < LRU < FIFO (B) OPTIMAL < FIFO < LRU
(C) OPTIMAL = LRU (D) OPTIMAL = FIFO

404. A file system with 300 GByte uses a file descriptor with 8 direct block address. 1 indirect
block address and 1 doubly indirect block address. The size of each disk block is 128 Bytes and
the s size of each disk block address is 8 Bytes. The maximum possible file size in this file
system is
(A) 3 Kbytes (B) 35 Kbytes
(C) 280 Bytes (D) Dependent on the size of the disk

405 In which one of the following page replacement policies, Beladys anomaly may occur?
(A) FIFO (B) Optimal
(C) LRU (D) MRU

406 The essential content(s) in each entry of a page table is / are
(A) Virtual page number (B) Page frame number
(C) Both virtual page number and page frame number
(D) Access right information

407 Consider a system with 4 types of resources R1 (3 units), R2 (2 units), R3 (3 units), R4 (2
units). A non-preemptive resource allocation policy is used. At any given I Instance, a request
is not entertained if it cannot be completely satisfied. Three p processes P1, P2, P3 request the
sources as follows if executed independently.
Process P1:
t=0: requests 2 units of R2
t=1: requests 1 unit of R3
t=3: requests 2 units of R1
t=5: releases 1 unit of R2
and 1 unit of R1.
t=7: releases 1 unit of R3
t=8: requests 2 units of R4
t=10: Finishes

Process P2:
t=0: requests 2 units of R3
t=2: requests 1 unit of R4
t=4: requests 1 unit of R1
t=6: releases 1 unit of R3
t=8: Finishes

Process P3:
t=0: requests 1 unit of R4
t=2: requests 2 units of R1
t=5: releases 2 units of R1
t=7: requests 1 unit of R2
t=8: requests 1 unit of R3
t=9: Finishes
47
ADITYA
Which one of the following statements is TRUE if all three processes run c
concurrently starting at time t=0?
(A) All processes will finish without any deadlock
(B) Only P1 and P2 will be in deadlock.
(C) Only P1 and P3 will be in a deadlock.
(D) All three processes will be in deadlock

408 Consider a disk system with 100 cylinders. The requests to access the cylinders occur in f
following sequence:
4, 34, 10, 7, 19, 73, 2, 15, 6, 20
Assuming that the head is currently at cylinder 50, what is the time taken to satisfy all r
requests if it takes 1ms to move from one cylinder to adjacent one and shortest seek time
first policy is used?
(A) 95ms (B) 119ms (C) 233ms (D) 276ms

409. A multilevel page table is preferred in comparison to a single level page table for
translating v virtual address to physical address because
(A) It reduces the memory access time to read or write a memory location.
(B) It helps to reduce the size of page table needed to implement the virtual address space of a p
process.
(C) It is required by the translation lookaside buffer.
(D) It helps to reduce the number of page faults in page replacement algorithms.

410. The data blocks of a very large file in the Unix file system are allocated using
(A) contiguous allocation (B) linked allocation
(C) indexed allocation (D) an extension of indexed allocation

411 A processor uses 36 bit physical addresses and 32 bit virtual addresses, with a page frame
size of 4 Kbytes. Each page table entry is of size 4 bytes. A three level page table is used for
virtual to physical address translation, where the virtual address is used as follows
Bits 30-31 are used to index into the first level page table
Bits 21-29 are used to index into the second level page table
Bits 12-20 are used to index into the third level page table, and
Bits 0-11 are used as offset within the page
The number of bits required for addressing the next level page table (or page frame) in
the p page table entry of the first, second and third level page tables are respectively
(A) 20, 20 and 20 (B) 24, 24 and 24
(C) 24, 24 and 20 (D) 25, 25 and 24

412. Consider a disk pack with 16 surfaces, 128 tracks per surface and 256 sectors per track.
512 b bytes of data are stored in a bit serial manner in a sector. The capacity of the disk pack
and t the number of bits required to specify a particular sector in the disk are respectively:
(A) 256 Mbyte, 19 bits (B) 256 Mbyte, 28 bits
(C) 512 Mbyte, 20 bits (D) 64 Gbyte, 28 bits

413. Group 1 contains some CPU scheduling algorithms and Group 2 contains some a
applications. Match entries in Group 1 to entries in Group 2.
Group I Group II
(P) Gang Scheduling (1) Guaranteed Scheduling
(Q) Rate Monotonic Scheduling (2) Real-time Scheduling
(R) Fair Share Scheduling (3) Thread Scheduling
(A) P 3 Q 2 R 1
(B) P 1 Q 2 R 3
48
ADITYA
(C) P 2 Q 3 R 1
(D) P 1 Q 3 R 2

414. An operating system uses Shortest Remaining Time first (SRT) process scheduling a
algorithm. Consider the arrival times and execution times for the following p processes:
Process Execution time Arrival time
P1 20 0
P2 25 15
P3 10 30
P4 15 45
What is the total waiting time for process P2?
(A) 5
(B) 15
(C) 40
(D) 55

415. A virtual memory system uses First In First Out (FIFO) page replacement policy and
allocates a fixed number of frames to a process. Consider the following statements:
p: Increasing the number of page frames allocated to a process sometimes increases the
page fault rate.
Q: Some programs do not exhibit locality of reference. Which one of the following is
TRUE?
(A) Both P and Q are true, and Q is the reason for P
(B) Both P and Q are true, but Q is not the reason for P.
(C) P is false, but Q is true
(D) Both P and Q are false.

416. A single processor system has three resource types X, Y and Z, which are shared by three
p processes. There are 5 units of each resource type. Consider the following scenario, where
the column alloc denotes the number of units of each resource type allocated to each process,
a and the column request denotes the number of units of each resource type requested by a
p process in order to complete execution. Which of these processes will finish LAST?

alloc request X Y Z X Y Z P0 1 2 1 1 0 3 P1 2 0 1 0 1 2 P2 2 2 1 1 2 0
(A) P0 (B) P1
(C) P2 (D) None of the above, since the system is in a deadlock

417. Consider the following statements about user level threads and kernel level threads.
Which one of the following statement is FALSE?
(A) Context switch time is longer for kernel level threads than for user level threads.
(B) User level threads do not need any hardware support.
(C) Related kernel level threads can be scheduled on different processors in a multi-processor s
system.
(D) Blocking one kernel level thread blocks all related threads.
Answer (D)

49
ADITYA


418. Consider three CPU-intensive processes, which require 10, 20 and 30 time units and
arrive at t times 0, 2 and 6, respectively. How many context switches are needed if the
operating system implements a shortest remaining time first scheduling algorithm? Do not
count the context s switches at time zero and at the end.
(A) 1 (B) 2 (C) 3 (D) 4


419. A computer system supports 32-bit virtual addresses as well as 32-bit physical addresses.
SSince the virtual address space is of the same size as the physical address space, the operating
system designers decide to get rid of the virtual memory entirely. Which one of the following IIs
true?
(A) Efficient implementation of multi-user support is no longer possible
(B) The processor cache organization can be made more efficient now
(C) Hardware support for memory management is no longer needed
(D) CPU scheduling can be made more efficient now

420. A CPU generates 32-bit virtual addresses. The page size is 4 KB. The processor has a
translation look-aside buffer (TLB) which can hold a total of 128 page table entries and is 4-
way set a associative. The minimum size of the TLB tag is:
(A) 11 bits (B) 13 bits
(C) 15 bits (D) 20 bits


421 Normally user programs are prevented from handling I/O directly by I/O instructions in
them. For CPUs having explicit I/O instructions, such I/O protection is ensured by having the
I/O I instructions privileged. In a CPU with memory mapped I/O, there is no explicit I/O
instruction. Which one of the following is true for a CPU with memory mapped I/O?
(a) I/O protection is ensured by operating system routine(s)
(b) I/O protection is ensured by a hardware trap
(c) I/O protection is ensured during system configuration
(d) I/O protection is not possible

422. What is the swap space in the disk used for?
(a) Saving temporary html pages (b) Saving process data
(c) Storing the super-block (d) Storing device drivers


423. Increasing the RAM of a computer typically improves performance because:

(a) Virtual memory increases (b) Larger RAMs are faster
(c) Fewer page faults occur (d) Fewer segmentation faults occur

424. What are the two types of file system organization?
A. Encryption and decryption. B. Data hierarchical system and flat system.
C. Single level and hierarchically. D. Both (a) and (b).

425. The amount of work performed per unit time is _______.
A. process time. B. output time.
C. throughput time. D. input time.

50
ADITYA
426. In ______ a program is divided into several blocks that is placed throughout the main
storage.
A. contiguous allocation. B. non contiguous allocation.
C. variable partition. D. fixed partition.

427 In FIFO page replacement, page reference patterns cause more page faults when the
number of page frames allocated to a process is _____.
A. decreased. B. increased.
C. increased or decreased. D. no response.

428 ______ page size leads to a large number of pages and page frames.
A. Small. B. Large.
C. Medium. D. Processor.


429 The amount of internal fragmentation can be reduced by employing _____ page sizes.
A. smaller. B. larger.
C. simple. D. multiple.

430. SJF stands for _________.
A. shortest job for. B. shortest job last.
C. shortest job middle. D. shortest job first.


431. SJF is not useful in _____ environments in which reasonable response times much be
guaranteed.
A. real time. B. time sharing.
C. online. D. multiprogramming.


432. The time between page faults is called as _____ time.
A. fault. B. interfault.
C. intrafault. D. error.

433. Excess paging activity causing low processor utilization is called ____.
A. crashing. B. hashing.
C. thrashing. D. holding.


434. The referenced bit in not recently used page replacement is called ____.
A. modified bit. B. waiting bit.
C. accessed bit. D. queued bit.

435. When a process first executes, the system loads into main memory the page that contains its
first instruction. This is ___ paging. A. local paging.
A 32 of 36 8/1/2014 3:18 PM B. future paging.
C. Anticipatory. D. Demand.

436. The time between page faults is called as _____ time.
A. fault. B. interfault.
51
ADITYA
C. intrafault. D. error.
437. During ________ and ____________ the computer will be idle.
A. best fit and worst fit. B. setup time and teardown time.
C. compaction and coalescing. D. next fit and first fit.


438. Optical disks ______ magnetism.
A. use B. do not use
C. may use D. None of these


439. In _____ several users simultaneously compete for system resources.
A. batch processing B. storage allocation.
C. single stream batch processing. D. multi programming.


440. In _____ jobs would take as much space as they needed without any fixed boundaries.
A. batch processing. B. storage allocation.
C. coalescing. D. variable partition multiprogramming.


441. The technique of _______ involves moving all occupied areas of storage to one end or the
other of main storage.
A. storage compaction. B. storage swapping.
C. storage placement. D. storage replacement.


442. An incoming job is placed in the hole in main storage in which it fits more tightly in ____
strategy.
A. best-fit. B. first-fit.
C. worst-fit. D. storage.


443 ____ strategy begins each search for an available hole at the point where the search ended.
A. Best-fit. B. First-fit.
C. Forward-fit. D. Next-fit.

444. Storage compaction is also called as ____.
A. coalescing. B. overlay.
C. garbage collection. D. virtual storage.

You might also like