1. What is a short-term scheduler ?
-
It selects which process has to be brought into the ready queue
It selects which process has to be executed next and allocates CPU
It selects which process to remove from memory by swapping
2. The run-time mapping from virtual to physical addresses is done by a hardware device called
-
Process Management Unit
CPU Management Unit
Memory Management Unit
3. System level security is offered by the ____ in a multi-user environment.
4.In deadlock,only one process at a time can use the resource,this condition is called
5. Which one operation signifies that the transaction has terminated its execution
6. What is a medium-term scheduler ?
7. What is a long-term scheduler ?
8. Which of the following is an efficient method of cache updating?
9. Which one is a major problem with priority scheduling algorithm
10. Which of the following is not a write policy to avoid Cache Coherence?
11. A solution to the problem of starvation of low-priority processes is
12. When the data at a location in cache is different from the data located in the main memory, the cache is called
13. Two general approaches are used to handle critical sections in operating systems which are preemptive and nonpreemptive ________
14.LRU stands for
15. The value of a binary semaphore can range between
16. Binary semaphores are also known as
17. Whenever the data is found in the cache memory it is called as
18. Which of the following scheduler reduces the degree of multiprogramming?
19. Which of the following is the solution of priority inversion problem?
20. Suppose that a process is in “Blocked” state waiting for some I/O service. When the service is completed, it goes to the :
21. Which one of the following is the address generated by CPU?
22. Swapping
23. ____ mechanism was created, which allowed transferring data to and from memory without the intervention of the CPU.
24. What is thrashing?
25.Which process can be affected by other processes executing in the system?
26. When several processes access the same data concurrently and the outcome of the execution depends on the particular order in which the access takes place, is called?
27. By operating system, the resource management can be done via
28. The OS in IBM 370 is based on the ___ approach.
29. A monitor is a module that encapsulates
30. The number of bytes read during the last read is known as _______ bytesRead
Post a Comment
0 Comments