1. If deadlocks occur frequently, the detection algorithm must be invoked
-
rarely
frequently
rarely & frequently
2. The functions of execution and sequencing are performed by using
-
input signals
output signals
control signals
3. Causing the CPU to step through a series of micro operations is called
4. A system with multiple CUP’s is called
5. What is the disadvantage of invoking the detection algorithm for every request?
6. Bootstrap loader is always stored in
7. A process is thrashing if
8. A deadlock eventually cripples system throughput and will cause the CPU utilization to
9. If there are 32 segments, each of size 1 k bytes, then the logical address should have
10. Virtual memory is normally implemented by
11. Every time a request for allocation cannot be granted immediately, the detection algorithm is invoked. This will help identify
12. Segment replacement algorithms are more complex than page replacement algorithms because
13. Which of the following operating system does not implement multitasking truly?
14. A computer system has 6 tape drives, with ‘n’ processes competing for them. Each process may need 3 tape drives. The maximum value of ‘n’ for which the system is guaranteed to be deadlock free is?
15. The backing store is generally a
16. A system has 3 processes sharing 4 resources. If each process needs a maximum of 2 units then, deadlock
17. ‘m’ processes share ‘n’ resources of the same type. The maximum need of each process doesn’t exceed ‘n’ and the sum of all their maximum needs is always less than m+n. In this setup, deadlock
18. Which of the following is independent of the address bus?
19. A deadlock can be broken by
20. A deadlock can be broken by
21. The two ways of aborting processes and eliminating deadlocks are
22. Schedulers could be anyone the following;
23. Those processes should be aborted on occurrence of a deadlock, the termination of which?
24. Cost factors for process termination include
25. The operation that does not involves clock cycles is
26.Memory management technique in which system stores and retrieves data from secondary storage for use in main
27. If we preempt a resource from a process, the process cannot continue with its normal execution and it must be
28. Two basic types of operating systems are
29. To .........................to a safe state, the system needs to keep more information about the states of processes.
30. If the resources are always preempted from the same process .................................can occur.
Post a Comment
0 Comments