OSG 202 PART III

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

When using the clock page replacement policy, a page with a reference bit of ____ is replaced. A) -1 B) 0 C) 1 D) 5

0

9/ what is the value of mode bit in User Mode? A/ 00 B/ 11 C/1 D/ 0

1

QN=60 (7637) A system has four processes and five allocated resources. The current allocation and maximum needs are as follows: Process Allocated Maximum Available ------------------------------------------------------------------------------------------------------------------ A 10211 11212 00x11 B 20110 22210 C 11011 21311 D 11010 11121 What is the smallest value of x for which this is a safe state? a. 0 b. 1 c. 2 d. 3

1

There are ____ entries per page in the PMT. A) 0 B) 1 C) 2 D) 5

1

How many percent of the CPU time is wasted, when a computer system has enough room to hold two program and these programs are idle waiting for I/O 10% of the time? [A] 90% [B] 99% [C] None of the other choices [D] 1 %

1 %

Consider a swapping system in which the memory consists of the following hole sizes: 10 K, 4 K, 20 K, 15 K, 9 K. Assume first fit algorithm is used. Which holes are taken for successive segment requests of 8 K, 12 K, 10 K? [A] 9 K, 15 K, 10 K [B] 10 K, 20 K, 15 K [C] 20 K, 15 K, 4 K [D] None of the other choices

10 K, 20 K, 15 K

How much cylinder skew is needed for a 5400- RPM (rotate per minute) disk with the track-to-track seek time of 1 msec? The disk has 200 sectors of 512 bytes on each track. [A] 18 sectors [B] 12 sectors [C] 24 sectors [D] 36 sectors

18 sectors

Vacuum tube computers were used during the period of ____. A) 1920s-1930s B) 1935-1945 C) 1940-1955 D) 1945-1960

1940-1955

QN=10 (2311) Which is the correct description of transitions between process states below? (see picture) a. 1: Process blocks for input; 2: Scheduler picks another process; 3: Scheduler picks this process; 4: Input becomes available b. 1: Process blocks for input; 2: Scheduler picks this process; 3: Scheduler picks another process; 4: Input becomes available c. 1: Process blocks for input; 2: Input becomes available; 3: Scheduler picks another process; 4: Scheduler picks this process d. 1: Process blocks for input; 2: Input becomes available; 3: Scheduler picks this process; 4: Scheduler picks another process

1: Process blocks for input; 2: Scheduler picks another process; 3: Scheduler picks this process; 4: Input becomes available

1/ The maximum segment for Process Pentium if the Limit field of Segment Descriptor has Unit of Byte? A/ 1MB B/ 1 GB C/ 4GB D/ None of the above

1MB

How many categories can be the I/O devices roughly divided? [A] 3 [B] 2 (block devices and character devices) [C] 4 [D] 1

2

How many levels of Page Tables the Processor Pentium supports: A/ 3 B/ 1 C/ 4 D/ 2

2

A supercomputer can perform ____ floating-point operations per second. A) 240 million B) 2.4 billion C) 2.4 trillion

2.4 trillion

Assume jobs A-D arrive in quick succession in the READY queue. Using round robin scheduling, the turnaround time for job C is ____. Arrival time: 0 1 2 3 Job: A B C D CPU cycle: 8 4 9 5 A) 7 B) 20 C) 22 D) 24

24

Assuming that it takes 10 nsec to copy a byte, how much time does it take to completely rewrite the screen of a 1200 x 800 pixel graphics with 24- bit color? [A] 288 msec [B] 288 micro-sec [C] 28.8 micro-sec [D] 28.8 msec

28.8 msec

A system has four processes and five allocated resources. The current allocation and maximum needs are as follows: Allocated Maximum Available Process A 10211 11213 00x11 Process B 20110 22210 Process C 11011 21311 Process D 11010 11121 What is the smallest value of x for which this is a safe state? a) 0 b) 1 c) 2 d) 3

3

If the transport speed for a magnetic tape is 200 inches per second and the density is 1600 bpi, a total of ____ bytes can be transferred in one second. A) 3,200 B) 32,000 C) 320,000 D) 3,200,000

320,000

14. How many context switches occur whenever application processes are multiplexed? a. 1 b. 2 c. 4 d. 8

4

8/ How many levels of Protection the Processor Pentium supports; A. 8 B. 6 C. 4 D. 2

4

Which is the maximum number of partition that most disks can be divided up? [D] 4

4

Consider a computer system that has cache memory, main memory (RAM) and disk, and OS uses virtual memory. It takes 2 nsec to access a byte from the cache. 20 nsec to access a byte from RAM. and 10 msec to access a block of 1000 bytes from the disk. If a b ook has 1000 pages, each with 50 lines of 80 characters each. How long it will take to electronically scan the textfor the case of the master copy being in each of the level as one proceeds down the memory hierarchy (from inboard memory to offline storage )? [A] 1 msec. 10 msec. 10 sec [B] 4 msec. 40 msec. 20 sec [C] 2 msec. 20 msec. 10 sec TO] 1 msec. 10 msec. 5 sec

4 msec. 40 msec. 20 sec

Imagine that a certain modem can read 7,000 characters per second and that the time to read a character to the modem register is so short it can be ignored. If to run this modem using interrupt- driven I/O and each character read requires an interrupt that takes 10 usee all-in to service. How many percent of the CPU does the interrupt overhead cost? [A] 4% of the CPU [B] 7% of the CPU [C] 96% of the CPU [D] 93% of the CPU

4% of the CPU

Assuming that it takes 10 nsec to copy a byte, how much time, does it take to completely rewrite the screen of a 200 character x 20 line text mode memory- mapped screen? [A] 10 micro-sec [B] 30 micro-sec [C] 40 micro-sec [D] 20 micro-sec

40 micro-sec

Assume that the Page Map Table below is in effect. The number of lines per page is 400. The actual memory location for line 433 is ____. Job Page Number Page Frame Number 0 8 1 10 2 5 3 11 A) 1 B) 33 C) 4000 D) 4033

4033

Rearrange the layers in I/O software starting at the bottom 1. User-level I/O software 2. Device drivers 3. Interrupt handlers 4. Hardware 5. Device-independent OS software [A] 12345 [B] 54321 [C] 15234 [D] 43251

43251

QN=52 (7560) A computer uses a programmable clock in square-wave mode. If 500 MHz crystal is used, what should be the value of the holding register to achieve a clock resolution of 1 msec (Clock tick)? a. 500,000 b. 50,000 c. 5,000,000 d. 50,000,000

500,000

The cache hit ratio is ____, if the total number of requests is 10 and 6 of those are found in cache memory. A) 6% B) 10% C) 60% D) 100%

60%

The cache hit ratio is ____, if the total number of requests is 10 and 6 of those are found in cache memory. A) 6% B) 10% C) 60% D) 100%

60%

Assume the Memory Manager receives a request for a block of 200. When the best-fit algorithm is used, is the beginning address of the hole granted by the Memory Manager. Beginning Address of Hole Hole Size 4075 105 5225 5 6785 600 7560 20 7600 205 10250 4050 [A] 6785 [B] 7600 [C] 10250

7600

If a particular demand paging configuration has 9 page interrupts out of 11 page requests, failure rate is ____. A) 18% B) 52% C) 82% D) 95%

82%

If a particular demand paging configuration has 9 page interrupts out of 11 page requests, failure rate is ____. A) 18% B) 52% C) 82% D) 95%

82%

Consider a swapping system in which the memory consists of the following hole sizes: 10K, 4K, 20K, 15K, 9K. Assume best fit algorithm is used. Which holes are taken for successive segment requests of 8K, 12K, 10K? [A] 10K, 15K, 20K [B] 10K, 20K, 15K [C] 9K, 15K, 10K [D] 20K, 15K, 10K

9K, 15K, 10K

To specify an address in this segmented memory, the form is used [A] <physical address, offset> [B] <process, offset> [C] <segment-number, offset> [D] <virtual address, offset>

<segment-number, offset>

QN=3 (2540) A file is generally defined to be: a. A basic element of data b. A collection of related fields c. A collection of similar records d. All of the above

A collection of similar records

QN=9 (2575) Which of the following statements is incorrect? a. The term data rate refers to the speed with which data moves to and from the individual I/O device b. In the interrupt-driven I/O technique, the processor issues an I/O request, continues with other work and eventually receives notification that the request was fulfilled c. A hard drive is an example of a character-oriented I/O device d. None of the above

A hard drive is an example of a character-oriented I/O device

Critical Region (Section) concept used in interprocess communication is: [A] A part of shared memory [B] A part of the program where the shared memory is accessed [C] None of the other choices [D] A part of shared data

A part of shared memory

: An Operating System is? a) A program that acts as an intermediary between computer processor and computer memory b) A program that acts as an intermediary between a user of a computer and a user of another computer c) A program that acts as an intermediary between computer software and computer hardware d) A program that acts as an intermediary between a user of a computer and the computer hardware

A program that acts as an intermediary between a user of a computer and the computer hardware

10/ The ways to keep track of memory usages: A/ Memory Management with Bit Maps B/ Memory Management with Linked Lists C/ A vs B D/ None of the above

A vs B

Where is the position of the operating system in computer system: [A] Between the user interface program and the application Program [B] None of the other choices [C] In user space [D] Above the hardware and under the user interface program

Above the hardware and under the user interface program

QN=10 (2538) The actual location in main memory is called a(n): a. Relative address b. Logical address c. Absolute address d. None of the above

Absolute address

QN=6 (2580) Which of the following is not correct about the reliability of different RAID levels? a. There is no reliability support in RAID level 0 b. All RAID levels can survive one disk crash c. In RAID level 2, a single bit error in a word can be detected AND corrected d. In RAID levels 3, 4, 5 a single bit error in a word can be detected

All RAID levels can survive one disk crash

QN=14 (2298) Which of the following statements is incorrect about timesharing and multiprogramming systems? a. In a timesharing system, multiple users can access the system simultaneously b. In a multiprogramming system, one user can run several processes simultaneously c. All timesharing systems are multiprogramming systems d. All multiprogramming systems are timesharing systems

All multiprogramming systems are timesharing systems

11/ What is the correct about trap instructions and interrupts ? A/ A trap instruction switch the execution mode of a CPU from the user mode to kernel mode? B/ A trap instruction is caused by a user program to invoke functions in the OS kernel C/ An interrupt is caused by an external event D/ All of the above

All of the above

QN=3 (2581) An example of the key differences that can exist across (and even in) classes of I/O devices is: a. Data rate b. Data representation c. Error conditions d. All of the above

All of the above

QN=5 (2300) Which is the difference between personal computers and mainframe computers? a. Personal computers are always interactive b. Mainframe computers are mostly batch systems with many users c. Protection is much more important on mainframe computers d. All of the above

All of the above

QN=5 (2313) What is Software proposal in the solution of Mutual exclusion with Busy waiting a. Lock Variables b. Strict Alternation c. Peterson's Solution d. All of the above

All of the above

The following requirement must be met by any facility or capability that is to provide support for mutual exclusion: a. Only one process at a time can be allowed into a critical code section b. A process remains in its critical region for a finite time only c. No assumption can be made about relative process speeds d. All of the above

All of the above

What are the allocation methods of disk blocks for files: a. Contiguous allocation b. Linked allocation c. Indexed allocation d. All of the above

All of the above

A operation concerning Stable Storage is: [A] Stable Reads [B] All of the other choices [C] Crash recovery [D] Stable writes

All of the other choices

Which of the following actions generates an hardware interrupt? a) An input/output operation is completed. b) A page that does not exist in the main memory is accessed by the virtual storage management. c) A system call instruction is executed. d) Division by zero occurs.

An input/output operation is completed.

QN=9 (2591) Dijkstra's Banker's Algorithm require the system to maintain the resource information for each process, including: a. A count of the system's total resources b. The maximum resources that can be requested by the process c. The number of resources currently acquired by the process d. B and C

B and C

10/ What is the correct statement about the process of booting a computer? A/ BIOS loads the operating system immediately into RAM B/ BIOS detects the boot device, the boot sector determines the active partition, then the boot loader loads the operating system C/ None of the above

BIOS detects the boot device, the boot sector determines the active partition, then the boot loader loads the operating system

Which is not a goal of a sheduling algorithm for all systems? [A] Balance [B] Response time [C] Policy enforcement [D] Fairness

Balance

QN=8 (2579) What kind of I/O devices that disks and tapes belong to? a. Stream-oriented devices b. Block-oriented devices c. Character-oriented devices d. None of the above

Block-oriented devices

____ means that several logical records are grouped within one physical record. A) Grouping B) Fixing C) Combining D) Blocking

Blocking

QN=1 (2548) The special files a a. character special b. block special file c. Neither a nor b d. Both a and b

Both a and b

Which of the following is not a CPU scheduling criterion? [A] Burst time [B] CPU utilization [C] Throughput [D] Response time

Burst time

Which of a system call is to allow the system announce that the file is coming and set some of the attributes? [A] CREATE [B] RENAME [C] OPEN [D] CLOSE

CREATE

QN=11 (7490) Which of the following statement is not true about separating I/O and memory space? a. Device drivers must be written using assembly language b. Programs must use 2 instructions to test whether the device is ready c. There is special protection mechanism to keep user processes from performing I/O d. Caching a device control register would be disastrous

Caching a device control register would be disastrous

QN=53 (7578) What is true about preemptable resources? a. Will cause the process to fail if taken away b. Can be taken away from a process with no ill effects c. Can share among processes d. None of the other choices

Can be taken away from a process with no ill effects

Consider the following four cases. The LRU policy,____, will be least likely to swap. Modified Referenced Meaning Case 1 0 0 Not modified AND not referenced Case 2 0 1 Not modified BUT was referenced Case 3 1 0 Was modified BUT not referenced Case 4 1 1 Was modified AND was refe renced A) Case 1 B) Case 2 C) Case 3 D) Case 4

Case 4

In a directed graph used to model deadlock, processes are represented using [A] Rectangle [B] Circular [C] Squares [D] Ellipse

Circular

QN=4 (2588) What is the characteristic of deadlocked systems a. Starvation b. Circular wait c. Saturation

Circular wait

Which deadlock condition does "Ordering resources numerically" attack? [A] No preemption [B] Circular-wait condition [C] Hold and wait [D] Mutual exclusion

Circular-wait condition

Which of a system call is to allow the system free up internal table space? [A] SEEK [B] OPEN [C] Close [D] DELETE

Close

2/ Which of the following is used in mutual exclusion ( exclusive control)? A/ Checkpoint B/ Semaphore C/ Contention D/ Hash

Contention

QN=2 (2578) Which of the following I/O software device layers is done by user-level software? a. Computing the track, sector, and head for a disk read b. Writing commands to the device registers c. Checking to see if the user is permitted to use the dev ice d. Converting binary integers to ASCII for printing

Converting binary integers to ASCII for printing

In a directed graph used to model deadlock, ______represents deadlock. [A] Dashed arrow [B] Solid arrow [C] Any path [D] Cycle

Cycle

Which of a system call is to allow the system free up disk space? [A] OPEN [B] CLOSE [C] SEEK [D] DELETE

DELETE

The term__________a specialized instruction set. [A] None of the other choices [B] I/O device [C] DMA characterizes a system configuration that includes an I/O module that is a separate processor with [D] Programmed I/O

DMA characterizes a system configuration that includes an I/O module that is a separate processor with

Which of the following statements is incorrect about I/O using DMA? [A] None of the other choices [B] DMA helps free up the CPU during the I/O to do other work [C] DMA helps reduce the number of interrupts [D] DMA is software solution to speed up data transfer between I/O device and memory

DMA is software solution to speed up data transfer between I/O device and memory

6/ What is not the technique of implemention for Virtual Memory? A/ Demand segmentation B/ Demand partition C/ Demand paging D/ All of the above

Demand partition

7. The process manager commonly interacts with other components except a. Device controller b. Device manager c. Memory manager d. File manager

Device controller

QN=7 (2577) Which of the following statements is not correct about "device independence"? a. Files and devices are accessed in the same way, ind ependent of their physical nature b. A system has to maintain only one set of system calls for both writing on a file and writing on the console c. Device independence requires all programmers to deal with different devices directly d. Device independent interfaces should be given to programmers

Device independence requires all programmers to deal with different devices directly

Device Driver is usually written by: [A] Device's Manufacturer \P\ OS's Manufacturer [C] Computer's Manufacturer [D] All of the other choices

Device's Manufacturer

____ developed the Banker's Algorithm. A) Havender B) Holt C) Dijkstra D) Lane & Mooney

Dijkstra

Which of the following instructions should be allowed only in kernel mode? [A] ADD of two numbers [B] Read the time-of-day clock [C] Disable all interrupts [D] AND of two numbers

Disable all interrupts

QN=12 In a single processor system, mutual exclusion can be guaranteed by: (2314) a. Overlapping processes b. Interleaving processes c. Disabling interrupts d. All of the above

Disabling interrupts

The following,____, describes the first memory allocation scheme. A) Each program to be processed was loaded into secondary storage, then swapped into memory in parts B) Each program to be processed was partially loaded into memory, then granted more memory as needed C) Each program to be processed was allocated a portion of memory and could negotiate with other programs to access more memory D) Each program to be processed was loaded in its entirety into memory and allocated as much contiguous space in memory as it needed

Each program to be processed was loaded in its entirety into memory and allocated as much contiguous space in memory as it needed

1. The operating system does each of the following except a. Allocates the computer's components to different programs b. Synchronizes individual programs' activities c. Ensures that programs terminate their execution d. Provides the general mechanisms that are needed so that the programs execute in perfect harmony

Ensures that programs terminate their execution

Which is the voluntary-condition which terminated process? a) Job error b) Killed by another process c) Error exit d) Killed by user

Error exit

QN=55 (7590) Assume the following events and actions take place. The following statement____ is true. Event Action 1 P1 requests and is allocated R1. 2 P2 requests and is allocated R2. 3 P3 requests and is allocated R3. 4 P1 requests R2. 5 P2 requests R3. 6 P3 requests R1. a. There is no deadlock b. Event 4 caused deadlock c. Event 5 caused deadlock. d. Event 6 caused deadlock.

Event 6 caused deadlock.

A deadlock is preceded by six simultaneous conditions that the operating system could have recognized. A) True B) False

F

A fixed-head disk is lower in cost than a movable head disk. A) True B) False

F

A job's working set is the set of pages residing in memory that can be accessed indirectly A) True B) False

F

According to the Banker's Algorithm an unsafe state always leads to deadlock. A) True B) False

F

An optical disc drive adjusts the speed of the disc's spin to compensate for the sector's location on the disc—this is called continuous linkage velocity (CLV). A) True B) False

F

Card systems date from the earliest computers, which relied on punched cards or tape for input when a job was entered by assembling the cards into a deck and running the entire deck of cards through a card reader as a group. A) True B) False

F

Deadlock does not usually affect the entire system. A) True B) False

F

Deadlock was a serious problem for early batch systems. A) True B) False

F

From HOLD, the job moves to WAITING when it's ready to run but is waiting for the CPU. A) True B) False

F

In general, when a job is allocated to the CPU its Page Map Table is loaded into main memory while the Segment Map Tables are loaded only as needed. A) True B) False

F

In the 1950s, only one FORTRAN program could run at a time, and then the FORTRAN compiler had to be reloaded into memory. A) True B) False

F

In the dining philosophers problem there are five philosophers and four forks. A) True B) False

F

Onboard systems are computers placed inside other products to add features and capabilities. A) True B) False

F

RAID-0 is ideal for data-critical real-time systems. A) True B) False

F

Starvation is the result of the liberal allocation of resources. A) True B) False

F

The File Manager is responsible for data files but not program files. A) True B) False

F

The Processor Manager is a composite of two submanagers: one in charge of job scheduling and the other in charge of program scheduling. A) True B) False

F

The SCAN algorithm moves the arm methodically from the inner to the outer track, servicing every request in its path. A) True B) False

F

The advantage of RAID Level 3 is that if any one drive fails, data can be restored using the bits in the parity disk. A) True B) False

F

The first-in first-out (FIFO) page replacement policy will remove the pages that have been in memory the shortest. A) True B) False

F

The high-level portion of the Process Manager is called the Process Scheduler. A) True B) False

F

The job of the I/O control unit is to keep up with the I/O requests from the CPU and pass them down the line to the appropriate control unit. A) True B) False

F

The minicomputer of the 1970s was smaller than the microcomputer. A) True B) False

F

The only reason for multiprocessing is to increase computer power. A) True B) False

F

The success of process synchronization hinges on the capability of the operating system to make a resource available to other processes while it is being used by one of them. A) True B) False

F

Two of the most important measures of optical disc drive performance are sustained data-transfer rate and longest access time. A) True B) False

F

When using DMA, the CPU is involved in transferring data to and from memory for the entire transfer. A) True B) False

F

When using a FIFO scheme, more memory will always result in better performance. A) True B) False

F

Within the Memory Manager the Segment Link Table lists details about each segment (one for each job). A) True B) False

F

The ____ policy is based on the theory that the best page to remove is the one that has been in memory the longest. A) TRU B) LRU C) LIFO D) FIFO

FIFO

QN=57 (7611) What following resource allocation state is unsafe? [file:7611.jpg] a. Fig. B b. Fig. C c. Fig. B and Fig. C d. None of the other choices

Fig. C

Which of the following is Operating System component? a) Time Management b) Space Management c) Speed Management d) File Management

File Management

Many computer users and some operating systems call subdirectories [A] Volumes [B] Databases [C] Folders [D] Files

Files

QN=9 (2535) In terms of speed the best method of Dynamic Storage -Allocation is: a. Next fit b. First fit c. Best fit d. Worst fit

First fit

QN=10 (2290) The two basic types of processor registers are: a. General and special registers b. Control and Status registers c. User-visible and user-invisible registers d. None of the above

General and special registers

QN=10 (2545) Which of the following is not correct about hard links and symbolic links? a. Symbolic links need space to store the name and the file pointed to b. Hard links do not require extra disk space c. Symbolic links can point to files in the network d. Hard links can point to files on other machines

Hard links can point to files on other machines

QN=59 (7626) The scheme of ____ removes the possibility of a circular wait and therefore guarantees the removal of deadlocks. a. Hierarchical ordering b. Preemption c. Saving and restoring job state d. Requesting all resources before job run

Hierarchical ordering

____ proposed a solution to the readers and writers problem that did not result in starvation for readers or writers. A) Hoare B) Courtois C) Heymans D) Parnas

Hoare

____ include(s) every peripheral unit in the system such as printers, disk drives, CD/DVD drives, flash memory, keyboards, and so on. A) The CPU B) I/O Devices C) Processors D) Secondary components

I/O Devices

Which is the fastest bus in the IBM PC computer? [A] ISA (Industry Standard Architecture) [B] USB (Universal Serial BUS) [C] IDE (Integrated Drive Electronic) [D] PCI (Peripheral Component Interconnect)

ISA (Industry Standard Architecture)

QN=5 (2586) A possibility of deadlock can occur: a. If a system is in safe state b. If a system is in unsafe state c. If a system is in instable state d. None of the above

If a system is in unsafe state

20. Which statement about IPC is incorrect? a. The OS explicitly copies information from a sending process's address space into a distinct receiving process's space b. Sometimes, the OS can perform the copy by overriding the memory security mechanism c. If the sender and receiver are on different machines, the OS must obtain additional cooperation of the two processes d. IPC is rarely used between threads in a single process

If the sender and receiver are on different machines, the OS must obtain additional cooperation of the two processes

The language of the CPU is known as its [A] Register set [B] Control unit set [C] Instruction set [D] None ofthe other choices

Instruction set

QN=12 (2536) In a system employing a paging scheme for memory management, wasted space is due to: a. External fragmentation b. Internal fragmentation c. Pages and frames of different specified sizes d. None of the above

Internal fragmentation

The overwhelming demand for ____ capability in the mid-1990s sparked the proliferation of networking capability. A) e-mail B) processing C) Internet D) FTP

Internet

When an external device becomes ready to be serviced by the processor, the device sends this signal to the processor. This signal is called: [A] None of the other choices [B] Halt signal [C] Interrupt signal [D] Handler signal

Interrupt signal

Which of the following statements is not correct about the device controller of I/O devices? [A] Is also called adapter [B] Can handle two, four, or even eight identical devices [C] Is electronic component of device [D] Is software component of device

Is software component of device

QN=7 (2544) What is incorrect about contiguous allocation of files ? a. It is simple to implement b. It leads to excellent read performance c. It does not cause disk fragmentation d. It is widely used on CD-ROMs

It does not cause disk fragmentation

7/ Which of the following is NOT a correct explanation of UNIX which is one of the OS? A/ Provides network functions that easily implement distributed processing. B/ It is a single- user and multi-task OS C/ Since its specifications have been released to the public and it has a high portability, it has been adopted in a wide range of devices. D/ Provides an interactive human interface that uses character- based commands.

It is a single- user and multi-task OS

____ introduced the need for control cards, which defined the exact nature of each program and its requirements. A) Job scheduling B) Control scheduling C) Job control D) Structure control

Job scheduling

Which of a system call is to allow the file to appear in more than one directory? [A] CREATE [B] LINK [C] OPEN [D] SEEK

LINK

Which method is used to implement files to keep each file as a linked list of disk blocks? [A] Contiguous Allocation [B] i -node [C] File Allocation Table [D] Linked List Allocation

Linked List Allocation

Which of the following allocation methods, Operating system MS-DOS is implemented? [A] Linked allocation using FAT [B] Indexed allocation [C] Contiguous allocation [D] Linked allocation

Linked allocation using FAT

QN=19 (7547) Which concept is described as "disk sectors are just numbered consecutively starting at 0, without regard to the disk geometry"? a. Logical block addressing b. Physical block addressing c. Virtual block addressing d. None of the other choices

Logical block addressing

What is an operating system structure in which the communication between requesting process and responding process is message passing? [A] Monolithic Systems [B] All of the other choices [C] MS-DOS [D] Client-Server Model

MS-DOS

Which ofthe following operating systems is an example of monolithic system? [A] Windows XP [B] Mac OS [C] UNIX [D] MS-DOS

MS-DOS

Which is not an example of a resource that is commonly time-multiplexed? a. Network interface b. CPU c. Graphics accelerator d. Main memory

Main memory

What is the main difference function between Operating Systems for Mainframe computer and Personal computer? a) Multitask b) Many I/O devices c) Multi-user d) Multiprogramming

Many I/O devices

QN=5 (6907) Which of the following is not a task of I/O management of OS? a. Manage main memory for the devices using caching, buffering, and spooling b. Maintain and provide a general device-driver interfaces c. Mapping files onto secondary storage d. Drivers for specific hardware devices

Mapping files onto secondary storage

An example of preemptable resources is [A] DVD device [B] None of the other choices [C] CD-ROM device [D] Memory

Memory

QN=13 (2527) The task of subdividing memory between the OS and processes is performed automatically by the OS and is called a. Protection b. Relocation c. Memory Management d. All of the above

Memory Management

QN=1 (2309) Which of the following statements is correct about Shortest Job First a. Avoid Starvation b. Minimize average waiting time c. Both a and b d. None of the above

Minimize average waiting time

1/ Which of the following is a high-level synchronization primitive? A/ Semaphores B/ Monitors C/ TSL D/ Nonf of the above

Monitors

19. Which statement about monitors is incorrect? a. Monitors can solve just a proper subset of synchronization problems solvable with semaphores b. Monitors provide a simplified paradigm for some synchronization problems c. Monitors can solve synchronization problems too complex for semaphores d. Monitors are based on abstract data types

Monitors can solve just a proper subset of synchronization problems solvable with semaphores

4/ MS- DOS is an example of ... A/ Layered System B/ Monolithic system C/ Virtual machine D/ Client- server model

Monolithic system

QN=6 (2528) The second-chance page -replacement algorithm a. Moves pages found at the head of a FIFO queue with the referenced bit turned on back to the tail of the queue to avoid replacing them b. Searches through a circular list of pages and replaces the first page it encounters that has the referenced bit turned off c. Relies on a modified bit to determine which page to replace d. None of the above

Moves pages found at the head of a FIFO queue with the referenced bit turned on back to the tail of the queue to avoid replacing them

QN=1 (6837) A CPU may have two or more complete processors, so that can carry out multiple threads in the same time is called: a. Pipeline b. Superscalar c. Multicore d. None of the other choices

Multicore

____ is necessary in any computer system because some resources such as memory, CPU, and dedicated devices must be exclusively allocated to one user at a time. A) Mutual exclusion B) Resource holding C) No preemption D) Circular wait

Mutual exclusion

is necessary in any computer system because some resources such as memory, CPU, and dedicated devices must be exclusively allocated to one user at a time. A) Mutual exclusion B) Resource holding C) No preemption D) Circular wait

Mutual exclusion

_________is the act of allowing only one process to have access to a dedicated resource [A] Hold and wait condition [B] No preemption condition [C] Circular-wait condition [D] Mutual-exclusion condition

Mutual-exclusion condition

Which deadlock condition does "Take resources away" attack? [A] Circular-wait condition B No preemption C Hold and wait [D] Mutual exclusion

No preemption

QN=54 (7583) ____ allows a resource to be held by a process as long as it is needed. a. Mutual-exclusion condition b. Circular-wait condition c. Hold and wait condition d. No preemption condition

No preemption condition

QN=14 (2319) Which is a wrong statement about the quantum used in Round Robin algorithm ? a. If the quantum is very large, RR is essentially FCFS b. If the quantum is very small, the CPU efficiency is reduced c. A reasonable value of quantum is around 20-50 ms d. None of the above

None of the above

QN=4 Which of the following is not a path name for the file /etc/passwd (2546) a. /etc/passwd b. /etc/../etc/passwd c. /etc/../etc/../etc/passwd d. None of the above

None of the above

Which of the following conditions that causes the processes to be terminated, when processes have done their work? [A] Fatal error (involuntary) [B] Normal exit (voluntary) [C] Killed by another process (i nvoluntary) [D] Error exit (voluntary)

Normal exit (voluntary)

QN=56 (7596) Which of the following statements does not apply to manual deadlock management? a. Deadlock is relatively infrequent for some system resources b. OS designers are normally very sensitive to deadlock when designing resource managers c. Recovery may involves rebooting the system d. None of the other choices

OS designers are normally very sensitive to deadlock when designing resource managers

2. The process is the computational environment that includes each of the following except a. Operating system b. Data c. Program d. Files

Operating system

Five batch jobs A through E, arrive at a computer center at almost the same time. They have estimated running times of 8, 6, 2, 10, and 4 minutes. Their (externally determined) priorities are 3, 5, 2, 1, and 4, respectively, with 5 being the highest priority. For each of the following scheduling algorithms: P-Priority scheduling; F- First-come, first-Server (run in order 8, 6, 2, 10, 4); S-Shortest job first, determine the mean process turnaround time. Ignore process switching overhead. Assume that only one job at a time runs, until it finishes. All jobs are completely CPU bound. a) P-84, F-94, S-70 b) P-16, F-18, S-14 c) P-16.8, F-18.8, S-14

P-16.8, F-18.8, S-14

Fill in the missing step in the following deadlock situation. Two users from the local board of education are each running a program (P1 and P2), and both programs will eventually need two DVD drives to copy files from one disc to another. Only two DVD-R drives are available and they're allocated on an "as requested" basis. Soon the following sequence transpires: 1. P1 requests drive 1 and gets it. 2. ____ 3. P1 requests drive 2 but is blocked. 4. P2 requests drive 1 but is blocked. A) P1 requests drive 2. B) P2 requests drive 2 and gets it. C) P2 requests drive 1 but is blocked. D) P1 releases drive 1.

P2 requests drive 2 and gets it.

When a virtual memory system manages memory in fixed length units, which of the following terms correctly represents its unit? [A] Page [B] Frame [C] Block [D] Segment

Page

16. In the synchronization context, process creation and destruction tend to be quite costly operations because of the following, except a. Creation/destruction require considerable manipulation of process descriptors b. Parent processes have difficulty tracking concurrent creation and destruction of child processes c. Protection mechanism are extensively executed d. Memory management is heavily invoked

Parent processes have difficulty tracking concurrent creation and destruction of child processes

3. Threads can be implemented in each of the following ways except a. Run-time libraries b. Operating system c. Java Virtual Machine d. Parent/child processes

Parent/child processes

5/ What is interrupt vector? A/ A signal an I/O devices sends to CPU B/ Part of memory which contains the addresses of interrupt handlers C/ None of the above

Part of memory which contains the addresses of interrupt handlers

What is not the technique of implementation for Virtual Memory? [A] All of the other choices [B] Paging [C] Segmentation [D] Partition

Partition

A CPU may have separate fetch, decode and execute units, so that can carry out three steps of the three instructions in the same time is called: [A] Multicore [B] Pipeline [C] None of the other choices [D] Superscalar

Pipeline

7/ Which of the following information bits in the entry of page table is used to indicate Page Fault? A/ Status bit B/ Present/ Absent bit C/ Referenced bit D/ Modified bit

Present/ Absent bit

15. The OS implementation of a scheduler normally does not include a. Context switcher code b. Procedure call handler code c. System call handler code d. Interrupt handler code

Procedure call handler code

3/ Which of the following is OS component? A/ Space Management B/ Speed Management C/ Time Management D/ Process Management

Process Management

Which of the following is an Operating System component? [A] Process Management [B] Speed Management [C] Space Management [D] Time Management

Process Management

Which of the following is an Operating System component? [A] Process Management B Speed Management [C] Space Management [D] Time Management

Process Management

QN=14 (2532) Which of the following is appropriate to determine program size and create page table? a. Process creation b. Process execution c. Page fault time d. Process termination time

Process creation

Which of the following is appropriate to release page table and pages? a. Process creation b. Process execution c. Page fault time d. Process termination time

Process termination time

QN=8 (2293) A Control/Status register that contains the address of the next instruction to be fetched is called the: a. Instruction Register (IR) b. Program Counter (PC) c. Program Status Word (PSW) d. All of the above

Program Counter (PC)

QN=10 (2582) The I/O technique where the processor busy waits for an I/O operation to complete is called: a. Programmed I/O b. Interrupt-driven I/O c. Direct Memory Access (DMA) d. None of the above

Programmed I/O

QN=9 (2291) The general role of an operating system is to: a. Act as an interface between various computers b. Provide a set of services to system users c. Manage files for application programs d. None of the above

Provide a set of services to system users

The Process Scheduler assigns the CPU to execute the processes of those jobs placed on the ____ queue by the Job Scheduler. A) WAITING B) NEXT C) PROCESS D) READY

READY

Which of a system call is to allow the system fetch the attributes and list of disk addresses into main memory for rapid access on later call? [A] SEEK [B] OPEN [C] RENAME [D] CLOSE

RENAME

is a specialized WRITE command for existing data files that allows for appending records or for rewriting selected records in their original place in the file. [A] UPDATE [B] REWRITE [C] MODIFY [D] APPEND

REWRITE

Which of the following process state transitions is illegal? [A] Ready -> Blocked (waiting) [B] Running -> Blocked (waiting) [C] Blocked (waiting) -> ready [D] Running -> ready

Ready -> Blocked (waiting)

Which of the following process state transitions is correct, when the scheduler picks a process from the ready queue to run? [A] Ready -> running [B] Running -> Blocked (waiting) [C] Blocked (waiting) -> ready [D] Running -> ready

Ready -> running

Which of the following information bits used by the various page replacement policies indicates if the page has been called lately? a. Locality bit b. Status bit c. Referenced bit d. Modified bit

Referenced bit

: What is the correct approach with the Hold and Wait condition to prevent Deadlock? a) Spool everything b) Request all resources initially c) Take resources away d) Order resources numerically

Request all resources initially

QN=6 (2592) What is the weakness of the Banker's algorithm? a. Allowing the population of processes to vary over time b. Enabling processes to hold their resources indefinitely c. Requiring that processes state their maximum needs in advance d. Enabling the number of resources to fluctuate

Requiring that processes state their maximum needs in advance

____ occurs when two processes do not release control of resources they are using. A) No preemption B) Circular wait C) Resource holding D) Mutual exclusion

Resource holding

8. A trap instruction doesn't cause this CPU hardware step to occur: a. Switch the CPU to supervisor mode b. Consult the trap table c. Load the PC with an address found in the trap table d. Return control to the user code which invoked the trap instruction

Return control to the user code which invoked the trap instruction

The aspect of disk performance that represents the time it takes to position the head a the desired track is known as [A] Rotational delay [B] Access time [C] Seek time [D] None of the other choices

Rotational delay

____ is a way to optimize search times by ordering the requests once the read/write heads have been positioned. A) Rotational ordering B) SSTF C) C-SCAN D) LOOK and SCAN

Rotational ordering

4/ Which of the following preemptive scheduling algorithm? A/ FCFS B/ Shortest Job First C/ Round Robin D/ None of the above

Round Robin

____ uses the same underlying philosophy as shortest job next, where the shortest jobs are processed first and longer jobs are made to wait. A) LOOK B) FCFS C) SSTF D) SCAN

SSTF

10. On a magnetic disk, which is not a critical timing characteristic? a. Rotational latency b. Track seek time c. Sector header erasure time d. Data transfer latency

Sector header erasure time

QN=15 (2317) Which of the following synchronization mechanisms does not rely on busy -waiting ? a. Lock variables b. Strict alternation c. Peterson's algorithm d. Semaphores

Semaphores

18. The following statements about AND synchronization are true except a. Simultaneous semaphore is a programming convenience b. Simultaneous semaphore is an abstraction of a basic semaphore c. Simultaneous semaphore is slightly more powerful than basic semaphore d. Simultaneous semaphore uses basic semaphore in a particular pattern

Simultaneous semaphore is slightly more powerful than basic semaphore

What is the correct approach with the "Mutual Exclusion condition" to prevent Deadlock? [A] Take resources away [B] Request all resources initially [C] Spool everything [D] Order resources numerically

Spool everything

What is the correct approach with the Mutual Exclusion condition to prevent Deadlock? a) Spool everything b) Request all resources initially c) Take resources away d) Order resources numerically

Spool everything

____ is when, in modern printing systems, a disk accepts output from several users and acts as a temporary storage area for all output until the printer is ready to accept it. A) Phishing B) Lagging C) Spooling D) Spoofing

Spooling

In a directed graph used to model deadlock, resources are re presented using [A] Rectangle [B] Circular [C] Squares. [D] Ellipse

Squares

8/ Which of the following cannot be shared among different threads of a process? A/ File handless B/ Process data C/ Process code D/ Stack

Stack

Which of the following is not special file? [A] None of the other choices [B] Block special file [C] Character special file [D] Stream special file

Stream special file

QN=1 (6837) A CPU may have two or more complete processors, so that can carry out multiple threads in the same time is called: a. Pipeline b. Superscalar c. Multicore d. None of the other choices

System calls

A DVD with a fast data transfer rate will drop fewer frames when playing back a recorded video segment than will a unit with a slower transfer rate. A) True B) False

T

A process requires space in main memory where it resides during its execution although, from time to time, it requires other resources such as data files or I/O devices. A) True B) False

T

A variation of the LRU page replacement algorithm is known as the clock page replacement policy because it is implemented with a circular queue and uses a pointer to step through the reference bits of the active pages, simulating a clockwise motion. A) True B) False

T

Additional complex configurations of RAID can be created by combining multiple levels. A) True B) False

T

After relocation and compaction, both the free list and the busy list are updated. A) True B) False

T

Among the many differences between an optical disc and a magnetic disk is the design of the disc track and sectors. A) True B) False

T

As a job moves through the system it is always in one of five states (or at least three); these are called the job status or the process status. A) True B) False

T

Demand paging requires that the Page Map Table for each job keep track of each page as it is loaded or removed from main memory. A) True B) False

T

Direct access storage devices (DASDs) are devices that can directly read or write to a specific place on a disk. A) True B) False

T

During compaction, the operating system must distinguish between addresses and data values, and the distinctions are not obvious once the program has been loaded into memory A) True B) False

T

Each page of a job is actually stored in a page frame that can be located anywhere in available main memory. A) True B) False

T

Every time an instruction is executed, or a data value is used, the operating system (or the hardware) must translate the job space address, which is relative, into its physical address, which is absolute. A) True B) False

T

Few major advances were made in data management during the 1960s. A) True B) False

T

For many computational purposes, serial processing is sufficient; it's easy to implement and fast enough for most users. A) True B) False

T

If locks are not used to preserve data integrity, the updated records in a database might include only some of the data—and their contents would depend on the order in which each process finishes its execution. A) True B) False

T

In the relocatable dynamic partitions scheme, the Memory Manager relocates programs to gather together all of the empty blocks and compact them to make one block of memory large enough to accommodate some or all of the jobs waiting to get in. A) True B) False

T

Many early programs used convoluted logic that only the original programmer could understand, so it was nearly impossible for anyone else to debug or change the program later on. A) True B) False

T

Multiple-level queues isn't really a separate scheduling algorithm but works in conjunction with several other schemes. A) True B) False

T

Multiprocessing can refer to one job using several processors to execute sets of instructions in parallel. A) True B) False

T

Once starvation has been detected, an algorithm can be implemented in which the system blocks new jobs until the starving jobs have been satisfied. A) True B) False

T

One of the problems with the best-fit algorithm is that the entire table must be searched before the allocation can be made because the memory blocks are physically stored in sequence according to their location in memory. A) True B) False

T

One sector will hold one page of job instructions and fit into one page frame of memory. A) True B) False

T

Real-time systems are used in time-critical environments where reliability is key and data must be processed within a strict time limit. A) True B) False

T

Research continues to focus on finding the optimum allocation scheme. A) True B) False

T

Since the mid-1970s rapid advances in computer technology have blurred the distinguishing characteristics of early machines. A) True B) False

T

The best-fit free list scheme uses memory more efficiently than the first-fit free scheme but it is slower to implement. A) True B) False

T

The classic problem of producers and consumers is one in which one process produces some data that another process consumes later. A) True B) False

T

The common element in all synchronization schemes is to allow a process to finish work on a critical region of the program before other processes have access to it. A) True B) False

T

The first attempt to allow for multiprogramming used fixed partitions. A) True B) False

T

The first bug was a moth trapped in a Harvard computer. A) True B) False

T

The loosely coupled configuration features several complete computer systems, each with its own memory, I/O devices, CPU, and operating system. A) True B) False

T

The supercomputer was developed primarily for government applications needing massive and fast number-crunching ability to carry out military operations and weather forecasting. A) True B) False

T

The symmetric configuration is best implemented if the processors are all of the same type. A) True B) False

T

The traffic controller maintains a database containing the status and connections for each unit in the I/O subsystem, grouped into Channel Control Blocks, Control Unit Control Blocks, and Device Control Blocks. A) True B) False

T

Threads share the same resources as the process that created them. A) True B) False

T

To overlay is to transfer segments of a program from main memory into secondary storage for execution, so that two or more segments take turns occupying the same memory locations. A) True B) False

T

When modeling deadlock, if there's a cycle in the graph, then there is a deadlock involving the processes and the resources in the cycle. A) True B) False

T

17. Which statement about test-and-set is incorrect? a. It is the dominant way to accomplish semaphores in modern hardware b. Test-and-set involves both a memory location and a register c. Test-and-set executes as a sequence of machine instructions d. Test-and-set can make semaphore implementation simple and efficient

Test-and-set executes as a sequence of machine instructions

What is asynchronous transfer in principles of I/O software? [A] The user process makes system call and goes to sleep until other process it wakes up [B] None of the other choices [C] The user program starts system cal l to transfer and automatically suspended until the data are available in the buffer [D] The CPU starts the transfer and goes off to do something else until the interrupt arrives

The CPU starts the transfer and goes off to do something else until the interrupt arrives

Which of the following is not a step in the boot process? [A] The antivirus program checks all files for viruses. [B] Configuration and customization settings are checked [C] The operating system is loaded into RAM. [D] The BIOS is activated by powering on the CPU.

The antivirus program checks all files for viruses.

What is the correct approach of the driver of dedicated devices with requesting device that is busy to solve deadlock using Ostrich algorithm? [A] The device driver stops the current jobs and releases the devices [B] The device driver kills those requesting processes [C] All of the other choices [D] The device driver decides blocking and returning an error code

The device driver decides blocking and returning an error code

QN=4 (2530) The page table for each process maintains: a. The frame location for each page of the process b. The page location for each frame of the process c. The physical memory location of the process d. None of the above

The frame location for each page of the process

QN=2 (2584) If in a resource -allocation graph, each resource type has exactly one instance, which of the following indicate a deadlock situation? a. The graph has at least one cycle. b. The graph has no cycle. c. The graph is connected. d. The graph is not connected.

The graph has at least one cycle.

QN=8 (7455) The File Manager writes the volume name and other descriptive information on an easy-to-access place on each unit: ____ of the magnetic disk a. The outermost part b. The innermost part c. Immediately following the master file directory d. Stored at the beginning of the volume

The innermost part

4. Files are distinguished from other resources except that a. The interface is exceptionally complex as compared with most other resources. b. They are the prevalent form of storing information c. Operating systems often use the file as a primitive for modeling other resource abstractions d. UNIX pipes can be modeled as files

The interface is exceptionally complex as compared with most other resources.

QN=1 (2590) The system is said to be in an unsafe state if a. The operating system cannot guarantee that all current processes can complete their work b. The system is deadlocked c. A process is indefinitely postponed d. None of the above

The operating system cannot guarantee that all current processes can complete their work

The system is said to be in an unsafe state if a. The operating system cannot guarantee that all current processes can complete their work b. The system is deadlocked c. A process is indefinitely postponed d. None of the above

The operating system cannot guarantee that all current processes can complete their work

QN=17 (6980) What happens when a thread calls Down (S) when it wants to enter its critical section, where S is a binary semaphore set to 1? a. The thread is allowed to enter its critical section and S is decremented. b. The thread is blocked and added to a queue of waiting threads. c. The semaphore is set to 2. d. None of the other choices

The thread is allowed to enter its critical section and S is decremented.

Assume the following events and actions take place. The following statement is true. Event Action 1 P1 requests and is allocated R1. P1 requests and is allocated R1 2 P2 requests and is allocated R2 3 P3 requests and is allocated R3 4 P1 requests R2. 5 P2 requests R3. 6 P3 requests R1. [A] There is no deadlock [B] Event 5 caused deadlock. [C] Event 4 caused deadlock [D] Event 6 caused deadlock.

There is no deadlock

Assume the following events and actions take place. The following statement, ____ is true. Event Action 1 P1 requests and is allocated the printer R1. 2 P1 releases the printer R1. 3 P2 requests and is allocated the disk drive R2. 4 P2 releases the disk R2. 5 P3 requests and is allocated the plotter R3. 6 P3 releases the plotter R3. A) There is no deadlock. B) Event 4 caused deadlock. C) Event 5 caused deadlock. D) Event 6 caused deadlock

There is no deadlock.

13. Which is the least common reason that a running thread might cease using the CPU? a. Thread completes execution b. Thread requests resource, and blocks c. Thread voluntarily releases CPU d. Thread involuntarily releases CPU

Thread involuntarily releases CPU

11. Which is not a characteristic of a thread? a. Thread identifier b. Thread parent identifier c. Thread-specific data d. Process environment

Thread parent identifier

5. A UNIX process contains each of the following except a. Text segment b. Data segment c. Thread segment d. Stack segment

Thread segment

Which method is used to prevent the communication deadlock? [A] All of the other choices [B] Timeouts [C] Handling alarm [D] Acknowledge signa

Timeouts

Which is not a function of device drivers? [A] To manage its power requirements and log events [B] To accept abstract read and write request from device independent software above it and see that they are curried out [C] To receive system call [D] To initialize the device, if needed

To accept abstract read and write request from device independent software above it and see that they are curried out

The basic idea behind the microkernel design is: [A] All ofthe other choices [B] All other modules run as relatively powerless o rdinary user processes [C] Only one module runs in kernel mode [D] To archive high reliability by splitting operating system up into small, well - defined modules

To archive high reliability by splitting operating system up into small, well - defined modules

QN=3 (2583) All deadlocks involve conflicting needs for resources by a. One or more processes b. Two or more processes c. Three or more processes d. None of the above

Two or more processes

Linux and are often used as operating systems on supercomputers, mainframes, and servers. [A] UNIX [B* Windows [C] None ofthe other choices [D] Mac OS

UNIX

QN=42 (7487) In the memory-mapped I/O system, in order that CPU communicates with the control registers in the devices, the control register is assigned : a. Index b. I/O address c. Unique memory address d. None of the other choices

Unique memory address

The ____ is unique to each operating system. A) User Interface B) Process Manager C) Memory Manager D) File Manager

User Interface

What is the characteristic of the first generation of operating system? [A] Personal computers, single user, multitasking [B] Transistors, batch systems [C] Vacuum tubes, plug boards [D] ICs and multiprogramming

Vacuum tubes, plug boards

The page size that is too small wil l generate [A] More difficult to calculate actual position [B] Excessive internal fragmentation [C] Very long Page tables [D] Excessive external fragmentation

Very long Page tables

____ gives users the appearance that their programs are being completely loaded in main memory during their entire processing time. A) Segmenting B) Virtual memory C) Shared memory D) Multithreading

Virtual memory

One of the most important innovations of demand paging was that it made feasible [A] Virtual paging [B] Virtual memory. [C] Memory demand [D] Virtual demand

Virtual memory.

QN=7 (6916) ____ is the partitioning of a single server, each of which can support a different operating system. a. Multiprocessing b. Multithreading c. Virtualization d. Shared processing

Virtualization

What is true about non-preemptable resources? (non preemptable) [A] Can be taken away from a process with no ill effects [B] None of the other choices [C] Will cause the process to fail if taken away [D] Can share among processes

Will cause the process to fail if taken away

6. The process manager deals with the following except a. Thread management b. Resource management c. Process management d. Window management

Window management

QN=4 (2316) Which of the following is not correct about user-level threads ? a. User-level threads are more efficient than kernel threads, in the sense that they do not need kernel calls to switch among threads b. User-level threads cannot be preempted by clock interrupts unless the whole process' quantum has been used up c. With user-level threads, customized scheduling algorithms cannot be implemented d. If one user-level thread makes a blocking system call, the system will block the entire process (which contains that user-level thread)

With user-level threads, customized scheduling algorithms cannot be implemented

QN=11 (6931) OS Win32 use system call_____, while OS Unix use system call______ to create a new process a. CreateProcess; fork b. fork, CreateProcess c. copy, CreateProcess d. CreateProcess; copy

a

QN=14 (6959) An arrival message causes the system to create a new thread to handle this message. This new thread is call______ a. Pop-up b. Upcall c. Activator d. Distributed

a

QN=15 (6963) Critical Region (Section) concept used in interprocess communication is: a. A part of the program where the shared memory is accessed b. A part of shared data c. A part of shared memory d. None of the other choices

a

QN=15 (6966) Which conditions of mutual exclusion does the Lock Variables (Software proposal) violate? a. No two processes simultaneously in critical region b. No assumptions made about speeds or numbers of CPUs c. No process running outside its critical region may block another process d. No process must wait forever to enter its critical region

a

QN=16 (6969) Which of the following statements is a hardware solution to the critical region problem? a. TSL b. Shared memory c. Semaphore d. None of the other choices

a

QN=16 (6973) In order to implement mutual exclusion on a critical resource for competing processes, only one program at a time should be allowed: a. In the critical region of the program b. To perform message passing c. To exhibit cooperation d. None of the other choices

a

QN=17 (6984) Semaphores that are initialized to 1 and used for two or more processes to ensure only one can enter its critical section at the same time are called: a. Binary semaphores b. Integer semaphores c. Counter semaphores d. None of the other choices

a

QN=18 (6987) Which of the following statements is true about hardware solution to the critical region problem? a. Disable Interrupts b. Monitors c. Semaphore d. None of the other choices

a

QN=19 (6991) What is the purpose of CPU scheduling algorithms? a. Pick one of the ready processes to run next b. Put to sleep and wake up processes in an efficient manner c. Allocate memory to the processes in a fair and efficient way d. None of the other choices

a

QN=23 (7021) Which of following is true about cache in the memory hierarchy? a. Small amount of fast expensive memory b. Some medium-speed medium price c. Gigabytes of slow cheap memory d. None of the other choices

a

QN=36 (7421) ____ is a specialized WRITE command for existing data files that allows for adding records to end of the file. a. APPEND b. UPDATE c. REWRITE d. MODIFY

a

QN=40 (7449) Which mechanism is implemented by writing to the log file with the purpose of file system management and optimization? a. Journaling File Systems b. Log-Structured File Systems c. Virtual File Systems d. None of the other choices

a

QN=42 (7464) Which is the maximum partition size, if the FAT type is FAT-32 and the block size is 4 KB? a. 1 TB b. 128 MB c. 256 MB d. 512 MB

a

QN=45 (7504) What is the table where its entry contains the memory address of Interrupt service routine a. Interrupt vector table b. Interrupt table c. Address table d. Address lines table

a

QN=46 (7510) Imagine that a certain printer can print 400 characters per second and that the time to write a character to the printer's output register is so short it can be ignored. If to run this printer using interrupt-driven I/O and each character printed requires an interrupt that takes 50 µsec all-in to service. How many percent of the CPU does the interrupt overhead cost? a. 2% of the CPU b. 98% of the CPU c. 4% of the CPU d. 96% of the CPU

a

QN=47 (7502) An interrupt that leaves the machine in well-defined state is called a(n) ______ a. Precise interrupt b. Imprecise interrupt c. Required interrupt d. Disappointed interrupt

a

QN=49 (7531) Of the three components of access time in a disk, ____ is the longest. a. Seek time b. Search time c. Transfer time d. Delay time

a

QN=50 (7546) Which RAID level duplicates all the disks? a. 1 b. 2 c. 3 d. 4

a

QN=51 (7551) How much cylinder skew is needed for a 7200- RPM (rotate per minute) disk with the track-to-track seek time of 1 msec? The disk has 200 sectors of 512 bytes on each track. a. 24 sectors b. 12 sectors c. 36 sectors d. 18 sectors

a

QN=52 (7541) What is a "stripping" in RAID? a. Distributing data over multiple drives b. Take away possessions from someone c. Get undressed d. All of the other choices

a

QN=8 (6899) A(n) _________ is provided to make system calls from some programming languages a. procedure library b. operator c. pointer d. None of the other choices

a

525) What is the method to keep track of memory usages? a. Memory Management with Bit Maps b. Memory Management with Linked Lists c. a and b d. None of the above

a and b

Data recorded on fixed- head DASDs may or may not be blocked at the discretion of the ____. A) end user B) application programmer C) operator D) database administrator

application programmer

QN=1 (6836) A CPU may have multiple execution units, so that can carry out multiple instructions in the same time is called: a. Pipeline b. Superscalar c. Multicore d. None of the other choices

b

QN=13 (6948) How many percent of the CPU time is wasted, when a computer system has enough room to hold two program and these programs are idle waiting for I/O half the time? a. 50% b. 25% c. 75% d. None of the other choices

b

QN=14 (6956) How many ways is Thread implemented? a. 1 b. 2 c. 3 d. None of the other choice

b

QN=2 (6847) Which of main bus in the IBM PC computer, that can run at 66 MHz and transfer 8 bytes at a time? a. ISA (Industry Standard Architecture) b. PCI (Peripheral Component Interconnect) c. ISA and PCI d. None of the other choices

b

QN=20 (6999) The first-come, first-served (FCFS) algorithm is fine for most ____ systems a. Interactive b. Batch c. Real time d. Multiuser

b

QN=21 (7007) Five batch jobs A through E, arrive at a computer center at almost the same time. They have estimated running times of 8, 6, 2, 10, and 4 minutes. Determine the average waiting time for SJF (Shortest job first) scheduling. Ignore process switching overhead. a. 14 minutes b. 8 minutes c. 6 minutes d. 18.8 minutes

b

QN=23 (7028) With paging, when is the internal fragmentation possible? a. Page does not fit the frame b. The last page of the job is less than the maximum page size c. The virtual memory assigned to the program is less than the physical memory assigned to it d. Such thing cannot happen

b

QN=24 (7033) Which of these statements about the algorithm "Next fit" is true? a. Memory Manager scans along the list of segments until it finds a hole that is big enough. b. Memory Manager starting searching the list of segments from the place where it left off last time. c. Memory Manager searches the entire list of segments from beginning to end and take smallest hole that is adequate. d. None of the other choices

b

QN=25 (7041) Assume the Memory Manager receives a request for a block of 200. When the worst-fit algorithm is used, ____ is the beginning address of the block granted by the Memory Manager. Beginning Address Memory Block Size 4075 105 5225 5 6785 600 7560 20 7600 205 10250 4050 a. 7600 b. 10250 c. 6785 d. 4075

b

QN=26 (7045) When a virtual memory system manages memory in fixed length units, which of the following terms correctly represents its unit? a. Frame b. Page c. Block d. Segment

b

QN=3 (6849) Which of the following instructions should be allowed in user mode? a. Disable all interrupts b. Read the time-of-day clock c. Set the time-of-day clock d. Change the memory map

b

QN=31 (7080) Working set model is used for: a. Finding the minimum number of frames necessary for a job so that jobs can be run without "thrashing" b. Finding the average number of frames a job will need to run smoothly c. Determining whether page replacement is needed d. All of the other choices

b

QN=32 (7089) In terms of main memory efficiency the method of "Backing up pages dynamically" in comparison with the method of "Paging to a static swap area" is a. Better b. Worse c. Equal d. Nearly equal

b

QN=33 (7408) Which of the following is specified to indicate the directory where the file is located? a. Extension b. Path name c. Root directory d. Sub-directory

b

QN=38 (7444) Which of the following is correct about symbolic links? a. Symbolic links need not space to store the path name b. Symbolic links can only point to files on the same machines c. Symbolic links can point to files in the network d. None of the other choices

b

QN=4 (6860) Which of the following statements about Random Access memory (RAM) is correct? a. Is typically faster than cache memory b. Is volatile c. Can only be read sequentially d. Stores all the files on the computer

b

QN=40 (7456) Which of the following is true about the block size in disk space management a. The larger the block size is the lower the data rate is b. The larger the block size is the worse the disk space utilization is c. The larger the block size is lesser the disk space is d. None of the other choices

b

QN=41 (7454) The File Manager writes the volume name and other descriptive information on an easy-to-access place on each unit: ____ of the CD or DVD a. The outermost part b. The innermost part c. Immediately following the master file directory d. Stored at the beginning of the volume

b

QN=41 (7477) Which class of I/O devices that disks and tapes belong to? a. Stream devices b. Block devices c. Character devices d. None of the other choices

b

QN=47 (7518) Which of the following I/O software do Device drivers do? a. Converting binary integers to ASCII for printing b. Writing commands to the device registers c. Checking to see if the user is permitted to use the device d. None of the other choices

b

QN=55 (7581) ____ is when each process involved in the impasse is waiting for another to voluntarily release the resource so that at least one will be able to continue on. a. Mutual-exclusion condition b. Circular-wait condition c. Hold and wait condition d. No preemption condition

b

QN=57 (7593) The permanent blocking of a set of processes that compete for system resources is called a. Starvation b. Deadlock c. Prioritization d. None of the other choices

b

QN=59 (7619) Which deadlock condition does "Request all resources initially" attack? a. Mutual exclusion b. Hold and wait c. No preemption d. Circular-wait condition

b

QN=7 (6888) A well-known Embedded operating system is: a. TinyOS b. QNX and VxWork c. Symbian OS and Palm OS d. e-COS

b

The Job Scheduler seeks to ____, when scheduling jobs. A) run all CPU intensive jobs first B) run all I/O intensive jobs first C) balance CPU and I/O intensive jobs D) run the quickest jobs first

balance CPU and I/O intensive jobs

The Job Scheduler seeks to ____, when scheduling jobs. A) run all CPU intensive jobs first B) run all I/O intensive jobs first C) balance CPU and I/O intensive jobs D) run the quickest jobs first

balance CPU and I/O intensive jobs

A hybrid system is a combination of the ____ systems. A) batch and interactive B) batch and real -time C) interactive and real -time D) real-time and general-purpose

batch and interactive

Second-generation computers were developed to meet the needs of ____. A) home users B) businesses C) secondary education D) online users

businesses

QN=1 (6840) Which of special register contains the Mode Bit (user or kernel)? a. Instruction Register (IR) b. Program Counter (PC) c. Program Status Word (PSW) d. None of the other choices

c

QN=10 (6912) Which of the following is correct about the advantages of layered system? a. Easier to extend b. Easier to debug from lower to upper layer c. Easier to extend and Easier to debug from lower to upper layer d. None of the other choices

c

QN=11 (6925) What is the "sequential processes" concept? a. There are both many CPU and many PC b. All process is executed in concurrency c. No concurrency inside a process; everything happens sequentially d. None of the other choices

c

QN=12 (6941) Which of the following process state transitions is correct, when the external event for which a process was waiting happens? a. Running -> Blocked (waiting) b. Running -> ready c. Blocked (waiting) -> ready d. Ready -> running

c

QN=13 (6951) How many percent is CPU utilization, when a computer system has enough room to hold two program and these programs are idle waiting for I/O half the time? a. 50% b. 25% c. 75%

c

QN=18 (6988) Which cannot be able to solve the race condition? a. TSL b. Shared memory c. Semaphore d. Monitor

c

QN=2 (6843) The four main structural elements of a computer system are: a. Processor, Registers, I/O Modules, Main Memory b. Processor, Registers, Main Memory, System Bus c. Processor, Main Memory, I/O Modules, System Bus d. None of the other choices

c

QN=20 (7002) Some systems increase the priority of jobs that have been in the system for an unusually long time to expedite their exit, which is known as ____.? a. Lagging b. Bumping c. Aging d. Accelerated priority

c

QN=22 (7015) Assume jobs A-D arrive in quick succession in the READY queue. Using round robin scheduling (quantum=4), the turnaround time for job D is ____. Arrival time: 0 1 2 3 Job: A B C D CPU cycle: 8 4 9 5 a. 7 b. 20 c. 22 d. 24

c

QN=22 (7017) Assume jobs A-D arrive at almost the same time in the READY queue. Determine the average turnaround time for SJF scheduling. Ignore process switching overhead Job: A B C D CPU cycle: 5 2 6 4 a. 5.5 b. 6.8 c. 9.0 d. 11.1

c

QN=24 (7029) Which of the following is a method to keep track of memory usages? a. Memory Management with Bit Maps b. Memory Management with Linked Lists c. Both Memory Management with Bit Maps and Memory Management with Linked Lists d. None of the other choices

c

QN=28 (7061) Suppose a virtual address space of 2^32 words and the page size is 2^12 words. If the virtual address is 12345678 in Hexadecimal, what would be the page number in Hexadecimal? a. 123 b. 1234 c. 12345 d. 123456

c

QN=29 (7065) A system with 32 bit virtual address. If the page size is 4 KB and each table entry occupies 4 bytes, what is the size of the page table? a. 1 MB b. 2 MB c. 4 MB d. 8 MB

c

QN=29 (7068) A computer with a 32-bit address uses a two-level page table. Virtual addresses are split into a 10-bit top-level page table field, an 12-bit second-level page table field, and an offset. How large are the pages? a. 4-KB page b. 2-KB page c. 1-KB page d. 512B page

c

QN=30 (7072) Which of the following statements is incorrect about Translation Look-aside Buffer (TLB)? a. A TLB is sometimes known as an associative memory b. Each entry of a TLB contains the information about one page, including the virtual page number and the corresponding page frame c. A TLB miss implies a disk operation will follow d. None of the other choices

c

QN=30 (7077) The ____ policy is based on the theory that the best page to remove is the one that has been in memory the longest a. NRU b. LRU c. FIFO d. LIFO

c

QN=31 (7081) When there is an excessive amount of page swapping between main memory and secondary storage, the operation becomes inefficient, which is called ____. a. excessive demand paging b. hot swapping c. thrashing d. Over swapping

c

QN=32 (7086) Which is not true about the method of backing store: "Paging to a static swap area"? a. The swap area on the disk is as large as the process virtual address space b. Calculating the address in swap area requires knowing only where the process' paging area begins c. Requires a disk map in memory d. A page that is in memory always have shadow copy on disk

c

QN=34 (7406) A ____ is a group of related records that contains information to be used by specific application programs to generate reports. a. Field b. Record group c. File d. Directory

c

QN=36 (7430) Which of the following allocation methods the i-nodes use? a. Contiguous allocation b. Linked allocation c. Indexed allocation d. Linked allocation using FAT

c

QN=38 (7437) Disk can be divided up into one or more partitions. The first block of every partition is called: a. Free block b. MBR c. Boot block d. Super block

c

QN=39 (7442) The Linking technique that allows the file to appear in more than one directory are: a. Hard link b. Symbolic link c. Both hard link and symbolic link d. Soft link

c

QN=4 (6858) As one proceeds down the memory hierarchy(phân cấp bộ nhớ) (from inboard memory to offline storage), which of the following conditions is correct? a. Increasing cost per bit b. Decreasing capacity c. Increasing access time d. None of the other choices

c

QN=43 (7493) In general, which is the best technique for I/O Data transfer? a. Programmed I/O b. Interrupt-Driven I/O c. Direct Memory Access d. None of the other choices

c

QN=46 (7495) Which of the following statements is not correct about DMA? a. DMA controller has access to the system bus independent of the CPU b. DMA helps reduce the number of interrupts (in comparison with interrupt-driven I/O) c. DMA controller is usually faster than CPU d. The operating system can only use DMA if the hardware has a DMA controller

c

QN=48 (7507) Which of the following statements is not correct about "device independence"? a. Files and devices are accessed in the same way, independent of their physical nature b. A system has to maintain only one set of system calls for both writing on a file and writing on the console c. Device independence requires all programmers to deal with different devices directly d. Device independent interfaces should be given to programmers

c

QN=5 (6867) Which of the following statements is incorrect about the CMOS? a. Is volatile b. To hold the current time and date c. To contain BIOS d. To hold the configuration parameters

c

QN=50 (7523) Each device attached to your computer comes with a special program called a __________ that facilitates the communication between the device and the OS. a. device configurator b. translator c. device driver d. communication utility

c

QN=51 (7528) In a fixed magnetic disk, each circle is called a ____. a. sector b. block c. track d. platter

c

QN=7 (6883) What is the main characteristic of real-time operating system? a. Multiple CPU b. Time-sharing c. Time is key parameter d. Many I/O devices

c

QN=8 (6898) What is not correct about system calls? a. A system call allows a user process to assess and execute operating system functions inside the kernel. b. User programs use system calls to invoke operating system services c. In terms of performance, using system calls is better than using procedure calls d. Every system call involves overhead due to context switch

c

Studies have shown that having any ____, even a small one, can substantially improve the performance of the computer system. A) cache B) memory block C) page block D) block

cache

Which command can be used to display the contents of a file on the screen? a) ls b) grep c) dog d) cat

cat

Which command is used to jump on sub-directory? a) jump b) cd c) chage -n d) move

cd

The ____ of memory, sometimes referred to as garbage collection or defragmentation, is performed by the operating system to reclaim fragmented sections of the memory space. A) deallocation B) redirection C) compaction D) reallocation

compaction

In second-generation computers, to reduce the discrepancy in speed between the I/O and the CPU, an interface called the ____ was placed between them to act as a buffer. A) control unit B) scheduler C) holder D) buffer manager

control unit

A ____ of processing must be handled as a unit. A) line B) segment C) critical region D) semaphore

critical region

QN=10 (6909) A simple structuring model for monolithic system includes: a. A main program that invokes the requested service procedure b. A set of service procedures that carry out the system calls c. A set of utility procedures that help the service procedures d. All of the other choices

d

QN=12 (6944) Which of the following process state transitions is illegal? a. Running -> Blocked (waiting) b. Running -> ready c. Blocked (waiting) -> ready d. Ready -> Blocked (waiting)

d

QN=17 (6978) Which of the following is true about Atomic action on semaphores? a. Checking the value b. Changing the value c. Possibly going to sleep d. All of the other choices

d

QN=19 (6994) Which is not a goal of a scheduling algorithm for batch systems? a. CPU utilization b. Throughput c. Turnaround time d. Response time

d

QN=21 (7011) Five batch jobs A through E, arrive at a computer center at almost the same time. They have estimated running times of 8, 6, 2, 10, and 4 minutes. Their (externally determined) priorities are 3, 5, 2, 1, and 4, respectively, with 5 being the highest priority. Determine the average turnaround time for priority scheduling. Ignore process switching overhead. a. 6 minutes b. 12.8 minutes c. 18.8 minutes d. 16.8 minutes

d

QN=26 (7042) One of the most important innovations of demand paging was that it made ____ feasible a. Memory demand b. Virtual demand c. Virtual paging d. Virtual memory.

d

QN=27 (7048) Which of these statements about the Inverted Page Table are true? a. An entry contains the pair (process, virtual page) mapped into the corresponding page frame b. An entry contains the pair (process, offset) mapped into the corresponding page frame c. An entry contains the pair (segment, virtual page) mapped into the corresponding page frame d. An entry contains the pair (segment, offset) mapped into the corresponding page frame

d

QN=28 (7057) If there are 64 pages and the page size is 2048 words, what is the length of logical address? a. 14 bits b. 15 bits c. 16 bits d. 17 bits

d

QN=3 (6855) Booting a general purpose computer involves the following steps except a. Execution of a ROM-based POST sequence b. Loading one or more bootstrap loaders c. Loading the OS d. Loading the command interpreter

d

QN=33 (7092) Which of the following statements about segmentation is false? a. There are several linear address spaces b. The total address space can be more than the size of physical memory c. Sharing of procedures between different users can be facilitated d. None of the other choices

d

QN=34 (7417) Which of the following file structure is widely used on large mainframe computers? a. Byte sequence b. Record sequence c. Ring d. Tree

d

QN=35 (7413) File Structure can be: a. Byte sequence b. Record sequence c. Tree d. All of the other choices

d

QN=37 (7428) Which are allocation methods of disk blocks for files? a. Contiguous allocation b. Linked allocation c. Indexed allocation d. All of the other choices

d

QN=37 (7438) The disk block in a partition that includes a magic number, the number of blocks in the file system and other key administrative information is called: a. Free block b. MBR c. Boot block d. Superblock

d

QN=39 (7450) Increasing file system performance is implemented by _____ a. Buffer cache b. Block Read Ahead c. Defragmenting Disks d. All of the other choices

d

QN=43 (7475) The main classes of I/O devices are: a. Stream devices b. Block devices c. Character devices d. Block devices and Character devices

d

QN=44 (7485) Which of the following statements about the task of device controller of I/O devices is correct? a. Convert serial bit stream to block of bytes b. Perform error correction as necessary c. Make available to main memory d. All of the other choices

d

QN=44 (7498) DMA operations require the following information from the processor a. Address of I/O device b. Starting memory location to read from and write to c. Number of words to be read or written d. All of the other choices

d

QN=45 (7489) Which approach is used in order to CPU communicate with the control registers of the I/O device? a. Separating I/O and memory space b. Memory-mapped I/O c. Hybrid: separating I/O and memory space and memory-mapped I/O d. All of the other choices

d

QN=49 (7514) Which is the right order between the 4 I/O software layers? a. User-level I/O software, Device drivers, Interrupt handlers, Device-independent OS software b. User-level I/O software, Interrupt handlers, Device drivers, Device-independent OS software c. Device-independent OS software, user-level I/O software, Device drivers, Interrupt handlers d. User-level I/O software, Device-independent OS software, Device drivers, Interrupt handlers

d

QN=53 (7549) A operation concerning Stable Storage is: a. Stable writes b. Stable Reads c. Crash recovery d. All of the other choices

d

QN=54 (7576) If a system is deadlocked, no processes can a. run b. release resources c. be awakened d. All of the other choices

d

QN=6 (6873) Which is not an example of a resource that is commonly time-multiplexed? a. Network interface b. CPU c. Graphics accelerator d. Main memory

d

QN=60 (7624) What is the correct approach with the "No preemption condition" to prevent Deadlock? a. Order resources numerically b. Request all resources initially c. Spool everything d. Take resources away

d

QN=9 (6903) Which of the following is a task of process management of OS? a. Process creation and deletion. b. Process suspension and resume c. Provision of mechanisms for process synchronization, Interprocess communication, Prevent or avoid deadlock d. All of the other choices

d

QN=9 (6908) The major operating system services provide mechanisms for secure and efficient are: a. Communication between processes b. File manipulation c. Execution of a program, I/O operations performed by it, and detecting and reporting errors caused by it d. All of the other choices

d

Which is not a component of general structure of device drivers? a. Checking the input parameters to see if they are valid b. Checking if the device is currently in use c. Writing command sequence into controller's device registers d. Checking to see if the user is permitted to use the device

d

Each active thread in a process shares the ____ and the resources allocated to its process. A) processor registers B) program counter C) data area D) status

data area

: Which command will display current day? a) day b) date c) view date d) calendar

date

In a symmetric configuration, processor scheduling is ____. A) centralized B) decentralized C) multifaceted D) balanced

decentralized

QN=50 (7523) Each device attached to your computer comes with a specia l program called a __________ that facilitates the communication between the device and the OS. a. device configurator b. translator c. device driver d. communication utility

device driver

N=10 (2585) If a deadlocked system, the processes can a. run b. release resources c. be awakened d. do nothing

do nothing

12. Basic process states include the following except a. blocked b. done c. running d. ready

done

Interactive systems generally improve the use of resources through ____ resource sharing, but this resource sharing capability also increases the possibility of deadlocks. A) interspersed B) group C) dynamic D) static

dynamic

A well-known Real-Time operating system is: [A] MS-DOS [B] e-COS [C] TinyOS [D] Personal Operating System

e-COS

The ____ is used to indicate that a program is permanently held in ROM (read only memory), as opposed to being held in secondary storage. A) hardware B) firmware C) software D) shareware

firmware

3 Put job in waiting queue 4 Go fetch next job A) first-fit memory allocation B) best-fit memory allocation C) least-fit memory allocation D) fixed partition memory allocation

first-fit memory allocation

The operating system can tell the ____ of each group of digits by its location in the line and the operation code. A) function B) value C) order D) assignment

function

: _____ is the command that writes the first 10 lines of a file to the screen. a) pr b) split c) tail d) head

head

Automatic detection by the compiler of instructions that can be performed in parallel is called ____. A) automatic parallelism B) array parallelism C) explicit parallelism D) implicit parallelism

implicit parallelism

The _________is the essential component ofthe operating system that remains in RAM when your computer is powered on. [A] system file [C] kernel [D] registry

kernel

The name for the nucleus of an operating system is the ____. A) manager B) center C) core D) kerneld

kerneld

To put data on an optical disc requires a high -intensity laser beam, which burns indentations, called pits, and flat areas, called ____. A) lands B) valleys C) hills D) lakes

lands

Most current operating systems support the implementation of threads, or ____, which have become part of numerous application packages. A) parallel processes B) lightweight processes C) heavyweight processes D) semaphores

lightweight processes

QN=11 (2539) LRU replaces the page that has spent the a. longest time in memory b. longest time in memory without being referenced c. shortest time in memory

longest time in memory without being referenced

Which command can be used to list all file (include hidden files) inside current directory? a) ls * b) ls -a c) ls -l d) show -a

ls -a

he data-transfer rate for an optical disc is measured in ____ per second and refers to the speed at which massive amounts of data can be read from the disc. A) kilobytes B) megabytes C) gigabytes D) terabytes

megabytes

In a highly interactive environment there is a third layer of the Processor Manager called the ____ scheduler. A) Managing B) Subprocess C) middle- level D) Program

middle- level

Which command would you use to create a sub-directory in your home directory? a) mkdir b) dir c) cp d) rm

mkdir

A typical ____ computer houses devices to perform audio, video, and graphic creation and editing. A) multiprocessor B) multimedia C) networked D) PDA

multimedia

Parallel processing is also called ____. A) uniprocessing B) multiprocessing C) shared processing D) divided processing

multiprocessing

Operations on semaphore s enforce the concept of ____, which is necessary to avoid having two operations attempt to execute at the same time. A) mutual execution B) mutex execution C) signal exclusion D) mutual exclusion

mutual exclusion

: Which command is used to change a file's name? a) name b) move c) chage -n d) mv

mv

Movable-head magnetic disks, such as the computer hard drive, have ____ read/write head(s). A) zero B) one C) two D) four

one

By compacting and relocating, the Memory Manager optimizes the use of memory and thus improves throughput, but an unfortunate side effect is more ____. A) null entries B) segmentation C) errors D) overhead

overhead

With demand paging, jobs are divided into equally sized ____ that initially reside in secondary storage. A) pages B) blocks C) frames D) sets

pages

QN=8 (2589) Which of the following is not a condition necessary for deadlock to exist? a. mutual-exclusion condition b. circular-wait condition c. hold and wait condition d. preemption condition

preemption condition

A entry of the Process table is called: [A] All of the other choices [B] Process check block [C] Process management block [D] process control block.

process control block

The primary distinguishing characteristic of modern computers is ____. A) memory capacity B) processor capacity C) disk space D) physical size

processor capacity

The primary distinguishing characteristic of modern computers is ____. A) memory capacity B) processor capacity C) disk space D) physical size

processor capacity

A network that's congested or has filled a large percentage of its I/O buffer space can become deadlocked if it doesn't have ____ to control the flow of messages through the network. A) procedures B) protocols C) policies D) rules

protocols

: The _____ command will list all working processes? a) ls b) jobs c) ps d) pwd

ps

Operating system abstraction supports the ability to have operation even when there is only one CPU available [A] None of the other choices [B] parallel [C] multiple [D] pseudoparallelism

pseudoparallelism

Which command is used to display the absolute pathname for the directory that you are working in? a) dir b) whereami c) pwd d) ls

pwd

Failure to lock database records before updating them may result in a ____ between processes. A) struggle B) race C) timeout D) livelock

race

For ____ systems, deadlocks quickly become critical situations. A) batch B) interactive C) real-time D) general purpose

real-time

The ____ contains the value that must be added to each address referenced in the program so it will be able to access the correct memory addresses after relocation. A) busy list B) compaction monitor C) relocation register D) bounds register

relocation register

QN=3 (2305) Which of the following process state transitions are legal? a. waiting -> running b. running -> ready c. waiting -> terminated d. ready -> terminated

running -> ready

Consider the case of a home construction company with two application programs, purchasing (P1) and sales (P2), which are active at the same time. They each need to access two files, inventory (F1) and suppliers (F2), to update daily transactions. The following series of events will cause a deadlock. Fill in the missing event in the sequence. 1. Purchasing (P1) accesses the supplier file (F2). 2. Sales (P2) accesses the inventory file (F1). 3. Purchasing (P1) doesn't release the supplier file (F2) but requests the inventory file (F1), but P1 is blocked because F1 is being held by P2. 4. Meanwhile, ____ A) sales (P2) doesn't release the inventory file (F1) but requests the supplier file (F2) B) sales (P2) does release the inventory file (F1) and then requests the supplier file (F2) C) purchasing (P1) does release the supplier file (F2) which is then requested by sales (P2) D) purchasing (P1) exits

sales (P2) doesn't release the inventory file (F1) but requests the supplier file (F2)

In a single -user system, jobs are processed ____. A) sequentially B) intermittently C) randomly D) in order of longest job to shortest job

sequentially

The need for algorithms to resolve conflicts between processors is called process ____. A) communication B) synchronization C) reduction D) transformation

synchronization

_____ is the command that writes the bottom 10 lines of a file to the screen. a) pr b) split c) tail d) head

tail

4/ A page fault means that we referenced a page? A/ With an incorrect I/O request B/ outside the memory boudaries C/ that was not in secondary storage D/ that was not in main memory

that was not in main memory

To access a location in memory when using segmented memory management, the address is composed of two entries: ____. A) the segment number and the line number B) the segment number and the displacement C) the line number and the displacement D) the segment number, the line number, and the displacement

the segment number and the displacement

In the "dining philosophers" problem, a philosopher can pick up a fork when____. A) there is one available B) there are two available C) no other philosopher is eating D) it is his turn, going in numerical order from one philosopher to the next

there are two available

In the "dining philosophers" problem, a philosopher can pick up a fork when____. A) there is one available B) there are two available C) no other philosopher is eating D) it is his turn, going in numerical order from one philosopher to the next

there are two available

A ____ is a portion of a process that can run independently. [A] subprocess [B] thread [C] program [D] Mini-process

thread

First-come, first- served (FCFS) is a very simple algorithm to implement because it ____. A) uses a FIFO queue B) uses a LIFO queue C) uses a circular queue D) uses a directed graph

uses a FIFO queue

A system with ____ divides programs into parts and keep them in secondary storage, bringing each part into memory only as it is needed. A) virtual memory B) shared memory C) segmented processing D) passive multiprogramming

virtual memory

One of the most important innovations of demand paging was that it made ____ feasible. A) memory demand B) virtual demand C) virtual paging D) virtual memory

virtual memory

6/ Which of the following state transitions are illegal? A/ ready -> running B/ running -> ready C/ waiting -> runing D/ running -> terminated

waiting -> runing

The fixed partition scheme works well ____. A) when jobs have the same size B) when jobs have different sizes C) when job sizes are not known in advance D) when all jobs are under 100K

when jobs have the same size

QN=3 (2537) Page replacement algorithms determine a. when the system should update page table entries b. how many pages should be added to main memory c. which pages should be brought into memory because a process is likely to reference them soon d. which page to remove to provide space for an incoming page

which page to remove to provide space for an incoming page

Powerful microcomputers developed for use by commercial, educational and government enterprises are called ____. A) supercomputers B) minicomputers C) terminals D) workstations

workstations


Kaugnay na mga set ng pag-aaral

Section 4.2 Part 1: Simplifying and Multiplying Fractions

View Set

Lecture 18: Gantt Charts in Project Management

View Set

Real Estate Mathematics and Formulas

View Set

Earth Space Science Technology and the EMS

View Set

OB: Ch. 18 Nursing Management of the Newborn

View Set