Saturday, September 12, 2020

Operating system MCQ

Q.1 Translator for low level programming language were termed as

(A) Assembler 

(B) Compiler

(C) Linker 

(D) Loader

Ans: (A)


Q.2 Analysis which determines the meaning of a statement once its grammatical structure

becomes known is termed as

(A) Semantic analysis 

(B) Syntax analysis

(C) Regular analysis 

(D) General analysis

Ans: (A)


Q.3 Load address for the first word of the program is called

(A) Linker address origin 

(B) load address origin

(C) Phase library 

(D) absolute library

Ans: (B)


Q.4 Symbolic names can be associated with

(A) Information 

(B) data or instruction

(C) operand 

(D) mnemonic operation

Ans: (B)


Q.5 The translator which perform macro expansion is called a

(A) Macro processor 

(B) Macro pre-processor

(C) Micro pre-processor 

(D) assembler

Ans: (B)


Q.6 Shell is the exclusive feature of

(A) UNIX 

(B) DOS

(C) System software 

(D) Application software

Ans: (A)


Q.7 A program in execution is called

(A) Process 

(B) Instruction

(C) Procedure 

(D) Function

Ans: (A)


Q.8 Interval between the time of submission and completion of the job is called

(A) Waiting time 

(B) Turnaround time

(C) Throughput 

(D) Response time

Ans: (B)


Q.9 A scheduler which selects processes from secondary storage device is called

(A) Short term scheduler. 

(B) Long term scheduler.

(C) Medium term scheduler. 

(D) Process scheduler.

Ans: (C)


Q.10 The scheduling in which CPU is allocated to the process with least CPU-burst time is called

(A) Priority Scheduling 

(B) Shortest job first Scheduling

(C) Round Robin Scheduling 

(D) Multilevel Queue Scheduling

Ans: (B)


Q.11 The term ‘page traffic’ describes

(A) number of pages in memory at a given instant.

(B) number of papers required to be brought in at a given page request.

(C) the movement of pages in and out of memory.

(D) number of pages of executing programs loaded in memory.

Ans: (C)


Q.12 The “turn-around” time of a user job is the

(A) time since its submission to the time its results become available.

(B) time duration for which the CPU is allotted to the job.

(C) total time taken to execute the job.

(D) time taken for the job to move from assembly phase to completion phase.

Ans: (C)


Q.13 Which of the following can be used as a criterion for classification of data

structures used in language processing.

(A) nature of a data structure 

(B) purpose of a data structure

(C) lifetime of a data structure 

(D) all of the above.

Ans: (D)


Q.14 Memory utilization factor shall be computed as follows

(A) memory in use/allocated memory.

(B) memory in use/total memory connected.

(C) memory allocated/free existing memory.

(D) memory committed/total memory available.

Ans: (B)


Q.15 Program ‘preemption’ is

(A) forced de allocation of the CPU from a program which is executing on the CPU.

(B) release of CPU by the program after completing its task.

(C) forced allotment of CPU by a program to itself.

(D) a program terminating itself due to detection of an error.

Ans: (A)


Q.16 An assembler is

(A) programming language dependent.

(B) syntax dependant.

(C) machine dependant.

(D) data dependant.

Ans: (C)


Q.17 Which of the following is not a fundamental process state

(A) ready 

(B) terminated

(C) executing 

(D) blocked

Ans: (D)


Q.18 ‘LRU’ page replacement policy is

(A) Last Replaced Unit. 

(B) Last Restored Unit.

(C) Least Recently Used. 

(D) Least Required Unit.

Ans: (C)


Q.19 Which of the following is true?

(A) Block cipher technique is an encryption technique.

(B) Steam cipher technique is an encryption technique.

(C) Both (A) and (B).

(D) Neither of (A) and (B).

Ans: (C)


Q.20 Which of the following approaches do not require knowledge of the system state?

(A) deadlock detection. 

(B) deadlock prevention.

(C) deadlock avoidance. 

(D) none of the above.

Ans: (D)


Q.21 Program generation activity aims at

(A) Automatic generation of program

(B) Organize execution of a program written in PL

(C) Skips generation of program

(D) Speedens generation of program

Ans: (A)


Q.22 Which amongst the following is not an advantage of Distributed systems?

(A) Reliability 

(B) Incremental growth

(C) Resource sharing 

(D) None of the above

Ans: (A)


Q.23 An imperative statement

(A) Reserves areas of memory and associates names with them

(B) Indicates an action to be performed during execution of assembled program

(C) Indicates an action to be performed during optimization

(D) None of the above

Ans: (B)


Q.24 Which of the following loader is executed when a system is first turned on or restarted

(A) Boot loader 

(B) Compile and Go loader

(C) Bootstrap loader 

(D) Relating loader

Ans: (C)


Q.25 Poor response time is usually caused by

(A) Process busy

(B) High I/O rates

(C) High paging rates

(D) Any of the above

Ans: (D)


Q.26 “Throughput” of a system is

(A) Number of programs processed by it per unit time

(B) Number of times the program is invoked by the system

(C) Number of requests made to a program by the system

(D) None of the above

Ans: (A)

Monday, June 22, 2020

Advance Operating System Quiz

1. Which of the following is the reason that the least recently used (LRU) algorithm is usually not used as a page replacement algorithm?

A. Other practical schemes such as MIN do a better job.

B. LRU requires knowledge of the future to work correctly.

C. LRU is too inefficient to implement in practice.

D. The Clock algorithm always outperforms LRU.

 

2. Which of the following are shared between threads in the same process?

A. registers

B. page table

C. stack

D. stack pointer

E. None of these are shared

 

3. The IP service model guarantees which of the following?

A. The contents of a packet will not be corrupted

B. That at least one copy of a packet will arrive at the destination

C. That no more than one copy of a packet will arrive at the destination

D. That packets sent in order will be delivered in order

E. None of the above

 

4. Using the SCAN (a.k.a. elevator) disk scheduling algorithm, determine how far the disk head moves servicing the following outstanding requests: 150, 19, 20, 900, 99. Assume the disk's head is currently over track 100 and moving toward smaller track numbers.  Also, assume that all of these track requests have already been received.

A. 962 tracks

B. 1064 tracks

C. 1681 tracks

D. 1863 tracks

E. None of these are true

 

5. If a process has allocated every 1024th virtual page (e.g. it has allocated virtual pages 0, 1024, 2048, 3072, 4096, 5120 ... 1024000), which one of the following page table schemes will use the LEAST amount of memory?

A. A flat page table

B. A two-level page table with 1024 first level entries

C. A two-level page table with 2048 first level entries

D. An inverted page table

E. Each of the above page table will use exactly the same amount of memory


6. Making no assumptions about the processes being scheduled, which of these scheduling algorithms will prevent starvation?

I. First Come First Served  (doesn’t work if a job runs forever—infinite loop)

II. Round Robin

III. Priority

 

A. I

B. II

C. I & III

D. I, II, & III

 

7. Consider a group of RAID4 disks. This group has four data disks and one parity disk. Which of the following are true?

I. Any data disk but NOT the parity disk can be reconstructed from the other four

II. The parity disk must be read whenever one of the data disks is read

III. The parity disk must be written whenever one of the data disks is written

 

A. III

B. I & III

C. II & III

D. I, II, & III

E. None of the above

 

8. Which of the following is true about two threads running in the same process?

A. One thread can both read and write another thread's registers

B. One thread can change the other thread's program counter

C. One thread can neither read nor write the other thread's stack

D. One thread can both read and write the other thread's stack (there is no address space protection between threads in the same process)

 

9.Which disk block allocation scheme will require the most I/O operations for random access to a large file?

A. Indexed allocation

B. Linked allocation

C. Contiguous allocation

D. I-node allocation

E. Each scheme requires approximately the same number of I/O operations

 

10. Which of the following does NOT solve deadlock?

A. Acquiring all resources before using any of them   (this is not acquiring all resources or no resources.  This doesn’t eliminate hold and wait)

B. Only acquiring resources in order based on a predetermined priority

C. Acquiring a maximum of one resource at a time (can’t have hold and wait if only have one resource)

D. If a resource is unavailable, releasing all resources and waiting for all required resources to become available


11. What is the primary reason that a translation lookaside buffer (TLB) is used?

A. A TLB ensures that a process does not access memory outside of its address space

B. A TLB makes translating virtual addresses to physical addresses faster

C. A TLB allows multiple processes to share the L1 cache

D. A TLB makes translating virtual addresses to physical addresses possible

E. None of the above

 

12. Which of the following is not a solution to thrashing?

A. Running fewer processes

B. Increasing the speed of the CPU

C. Increasing the size of physical memory

D. Rewriting programs to have better locality

E. These all solve the problem of thrashing

 

13. Which of the following is NOT a way to make file systems faster?

A. Put parts of a file on many different tracks so part of it can be accessed no matter where the disk head is

B. Cache frequently used blocks in memory so they can be accessed at memory speeds instead of disk speeds

C. Use a disk scheduling algorithm to minimize the distance between seeks

D. Put frequently used files or directories near the center of the disk so on average they won't be far from the read head

E. All of these will make a file system faster

 

14. Which of the following is true about base and bounds registers?

I. They offer protection between processes

II. They lead to internal fragmentation of physical memory

III. Once a process has been started at a given memory location, it cannot be moved to another location

 

A. I

B. II

C. I & II

D. I, II, & III

E. None of the above

 

15. Which of the following can I do without knowing your private key?

A. Pretend to send a private message on your behalf

B. Decrypt messages that were intended for only you

C. Send you a message that only you can read

D. Digitally sign a message on your behalf

E.  I must know your private key to perform all of these operations

 


16. Public/private key encryption is usually avoided because

A. It is much slower than symmetric key encryption

B. It is only useful when encrypting large amounts of data

C. It is not as secure as symmetric key encryption

D. It cannot be used unless two parties can exchange their private keys securely

E. None of the above

Suppose a system has only three physical pages. Given the following sequence of virtual page references, determine the number of page faults that are required. Initially, assume that the physical pages are not being used by any virtual page.

1 2 1 1 3 2 1 4 3 1 1 2 4 1 5 6 2 1

17. Using the first in first out (FIFO) replacement policy

A. 9

B. 10

C. 11

D. 12

E.  None of the above

 

18. Using the least recently used (LRU) replacement policy

A. 9

B. 10

C. 11

D. 12

E.  None of the above

 

 

19. Which of the following is NOT a use of TCP sequence numbers?

A. To ensure that data is delivered to the application in the order it was sent

B. To distinguish duplicate packets

C. To determine how much data is left to send

D. All of these are uses

 

20. Which of the following is NOT a property of Ethernet?

A. Nodes retransmit packets if there was a collision

B. Sending packets that are too big does NOT affect collision detection

C. Nodes retransmit packets if an acknowledgement is not received

D. After a collision, both nodes wait a random amount of time before retransmitting a packet

E. These are all properties of Ethernet


Search Aptipedia