1. The list of processes waiting for a particular I/0 device is called a
-
Device list
Device pool
Device queue
2. Which one of the following error will be handle by the operating system?
-
power failure
lack of paper in printer
connection failure in the network
3.If process Pi is executing in its critical section, then no other processes can be executing in their critical-sections. This is called a ___.
-
Bounded Waiting
Mutual Exclusion
Progress
4. When a web page is loading, and the user presses a button on the browser to stop loading the page?
-
the thread loading the page continues with the loading
the thread loading the page does not stop but continues with another task
the thread loading the page is paused
5. ____ give iterative usage of the particular application.
-
Interface
Icons
Files
6. The ____ attacks and discourage people to get connected to the net.
-
source program
system
virus
7. Which of the following does not interrupt a running process?
-
a device
timer
scheduler process
8. When the target thread periodically checks if it should terminate and terminates itself in an orderly manner, it is called?
-
asynchronous cancellation
systematic cancellation
sudden termination
9. Cancelling a thread asynchronously
-
frees all the resources properly
may not free each resource
spoils the process execution
10. System supports two types of file, which are ........
-
Text Files
Executable Binary Flies
Both (a) And (b)
11. Which of the following is a single-user operating system?
-
MAC
Ms-Dos
Windows
12. What is the advantage of dynamic loading?
- a used routine is used multiple times
an unused routine is never loaded
cpu utilization increases
13.The idea of overlays is to
-
data that are needed at any given time
enable a process to be larger than the amount of memory allocated to it
keep in memory only those instructions
14. TestAndSet instruction is executed
-
after a particular process
periodically
atomically
15.How many users can access a share folder simultaneously from a Windows XP Machine?
16. Which function key needs to be press during reboot to enter in safe mode of a windows machine?
-
F8
F2
F1
17. What is Dynamic loading?
-
loading multiple routines dynamically
loading a routine only when it is called
loading multiple routines randomly
18. The must design and program the overlay structure.
-
programmer
system architect
system designer
19. The swaps processes in and out of the memory.
-
memory manager
cpu
cpu manager
20. Swap space is allocated
-
as a chunk of disk
separate from a file system
into a file system
21. CPU fetches the instruction from memory according to the value of
-
program counter
status register
instruction register
22. A memory buffer used to accommodate a speed differential is called
-
stack pointer
cache
accumulator
23. The main function of the command interpreter is ..........
-
To get and execute the next user-specified command
To provide the interface between the api and application program
To handle the files in operating system
24. What is the reason for using the LFU page replacement algorithm ?
-
an actively used page should have a large reference count
a less used page has more chances to be used again
it is extremely efficient and optimal
25. In segmentation, each address is specified by
-
a segment number & offset
an offset & value
a value & segment number
26.The protection bit is 0/1 based on
-
write only
read only
read – write
27. If there are 32 segments, each of size 1Kb, then the logical address should have
28. Consider a computer with 8 Mbytes of main memory and a 128K cache. The cache block size is 4 K. It uses a direct mapping scheme for cache management. How many different main memory blocks can map onto a given physical cache block?
29. A multilevel page table is preferred in comparison to a single level page table for translating virtual address to physical address because
30. Whenever a process needs I/O to or from a disk it issues a
GLI provide testing, certification and skilled 온라인카지노 companies to the global gaming industry. The GLI additionally undertake auditing, field inspections and security audits, and so they work with gaming regulators, suppliers, and operators, with an aim of guaranteeing the integrity of the gaming industry.
ReplyDelete