Model Question Paper Subject Code: BC0042 Subject Name: Operating Systems Credits: 4 Marks: 140 Part A (One mark questions) 1. sequence of instructions telling the computer what to do is called a --------------------- a) program b)language c) translator d) package 2. A process is ------------------ a) program in main memory b) Program in cache memory c) program in secondary storage d) program in execution
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Model Question Paper
Subject Code: BC0042
Subject Name: Operating Systems
Credits: 4 Marks: 140
Part A (One mark questions)
1. sequence of instructions telling the computer what to do is called
a ---------------------
a) program
b)language
c) translator
d) package
2. A process is ------------------
a) program in main memory
b) Program in cache memory
c) program in secondary storage
d) program in execution
3. A program to be executed must be in ---------------
a) main memory
b) secondary memory
c) virtual memory
d) Read only memory
4. ------------------ are very expensive and employed for specialized applications such as weather
forecasting
a) Micro computers
b) Super computers
c) Personal computers
d) Mainframe computers
5. In MS-DOS, the interfaces and levels of functionality are ---------------
a) not well separated.
b) well separated
c) independent
d) dependent
6. --------------------- approach simplifies debugging and system verification
a) Kernel
b) Layered
c) Extended
d) Virtual machine
7. In layered approach each layer uses the functions and services of ------------------
a) kernel
b) lower-level layers
c) higher-level layers
d) all of these
8. ------------------------------is a piece of computer software that isolates the application being used by the
user from the computer.
a) compiler
b) Modules
c)virtual machine
d) none of these
9. Using---------------- the file subsystem of Kernel mode is responsible for file and I/O management.
a) system calls
b) device drivers
c) modules
d) virtualization technique
10. A process may create a new process by executing --------------- system call
a) init
b) fork
c) create
d) new
11. A process control block contains varies attributes required by --------------------- to control a process
a) RAM
b) virtual memory
c) BIOS
d) Operating System
12. ------------- are popular way to improve application through parallelism
a) Processes
b) Threads
c) Context switching
d) none of these
13. ---------------is responsible for allocating primary memory to processes and for assisting the
programmer in loading and storing the contents of the primary memory.
a) Operating system
b) Memory manager
c)database administrator
d) RAM
14. ------------------------- refers to the technology in which some space in hard disk is used as an
extension of main memory.
a) cache memory
b) paging
c) virtual memory
d) paging
15. ------------- deals with when a modified page should be written out to secondary memory.
a) cleaning policy
b) fetch policy
c) frame locking
d) none of these
16. Microprocessors with small internal caches often employ the ---------------------------
mechanism
a) direct mapping
b) fully associative
c) set associative
d) sector mapping
17. ______________ selects a process from among the ready processes to execute on the CPU.
a) CPU Schedular
b) Loader
c) Dispatcher
d) Compiler
18. The time taken by the Dispatcher to stop one process and start another running is known as
_________________.
a) Turnaround time
b) Dispatch Latency
c) Access time
d) Response time
19. __________ systems are required to complete a critical task within a guaranteed amount of
time.
a) Virtual
b) soft real time
c) Hard Real time
d) None of these
20. A solution to starvation is _____________.
a) segmentation
b) Aging
c) Paging
d) virtual memory
21. When resources have multiple instances --------------- is used for deadlock Avoidance
a) Banker’s algorithm
b) Resource Allocation Graph
c) semaphores
d) all of these
22. ---------------------------- is a situation in which two computer programs sharing the same
resource are effectively preventing each other from accessing the resource, resulting in both
programs ceasing to function.
a) Semaphore
b) Deadlock
c) Mutual Exclusion
d) No preemption
23. ---------------------------------refers to a strategy where whenever a resource is requested, it is
only granted if it cannot result in deadlock.
a) Deadlock Prevention
b) Livelock
c) Deadlock avoidance
d) none of these
24. When a child dies, it sends a ------------------------ signal to its parent.
a) SIGCHLD
b) EDEADLK
c) WNOHANG
d) SEDECHLD
25. ------------------- occurs when two or more execution flows are able to run simultaneously.
a) Deadlock
b) Concurrency
c) race condition
d) interrupt
26. ----------------------- occurs when multiple processes or threads read and write data items so that
the final result depends on the order of execution of instructions in the multiple processes.
a) Race condition
b) Mutual exclusion
c) Exception
d) Interrupt
27. --------------- is a mechanism the prevents two or more processes from accessing a shared resource
simultaneously.
a) Livelock
b)Preemption
c) Semaphore
d) either a or b
28. In an interrupt driven system, context switches from one process to another can only occur on -------
-------------
a)predetermined time
b) interrupt
c) Busy waiting
d) all of these
29. In Multics, a process could have up to 256K segments, but each segment was limited to ---------------
64K words.
a) 64K
b) 32K
c) 1024K
d)112K
30 The problem with logical dumping is --------------
a) very costly
b) very slow
c) human errors
d) all of these
31. A two-byte integer called -------------- is interpreted as an index into an array of inodes in a
fixed, known location on disk.
a) an inode
b) an inumber
c) an imap
c) an imark
32. A variable sized block is called ---------------.
a) an extent
b) a segment
c) a page
d) a fragment
33. In ------------------ the disk drive itself has a way of discovering bad blockswith extremely high
probability.
a) disk index
b) Extents
c) Bad-block forwarding
d) back-up dumps
34. Because the I/O devices are not synchronized with the CPU, some information must be
exchanged between the CPU and the device to ensure that the data is received reliably.
This interaction between the CPU and an I/O device is usually referred to as ---------------------
-------
a) polling
b) arbitration
c) handshaking
d) interrupting
35. ------------------- approach can place the data directly into the memory or take the data
directly from the memory without direct intervention from the processor.
a) DMA
b) Daisy chain arbitration
c) polling
d) none of these
36. A SCSI device can transfer up to----------- of information per second.
a) 40 Mbytes
b) 60 Mbytes
c) 40 Gbytes
d)60 Gbytes
37. ------------------- file system allows sharing in multiple different locations grouped under one folder.
a) Direct
b) distributed
c) sequential
d) parallel
38. Windows 2000 supports -------------- type of file system .
a) NTFS
b) EFS
c) FEFS
d) EFFS
39. The integral subsystem looks after operating system specific functions on behalf of the -------
-----------
a. specific program
b. environment subsystem
c. programmer
d. application
40. Kernel mode drivers exist in ------------------