OSG202 Final (P1)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

11 (2304) What is interrupt vector? a. A signal an I/O device sends to CPU b. A signal an I/O device sends to CPU c. Part of memory which contains the addresses of interrupt handlers d. None of the above

C

12 (2297) What is not a main function of an operating system? a. Provide the users with an extended (virtual) machine b. Manage the I/O devices c. Provide user interfaces d. Support virtual memory

C

12 (2314) In a single processor system, mutual exclusion can be guaranteed by: a. Overlapping processes b. Interleaving processes c. Disabling interrupts d. All of the above

C

13 (2527) The task of subdividing memory between the OS and processes is performed automatically by the OS and is called a. Protection b. Relocation c. Memory Management d. All of the above

C

15 (2525) What is the method to keep track of memory usages? a. Memory Management with Bit Maps b. Memory Management with Linked Lists c. a and b d. None of the above *********************************************

C

3 (2294) The four main structural elements of a computer system are: a. Processor, Registers, I/O Modules, Main Memory b. Processor, Registers, Main Memory, System Bus c. Processor, Main Memory, I/O Modules, System Bus d. None of the above

C

3 (2540) A file is generally defined to be: a. A basic element of data b. A collection of related fields c. A collection of similar records d. All of the above

C

The _________is the essential component ofthe operating system that remains in RAM when your computer is powered on. [A] system file [C] kernel [D] registry

C

Which of the following instructions should be allowed only in kernel mode? [A] ADD of two numbers [B] Read the time-of-day clock [C] I Disable all interrupts 1 [D] AND of two numbers

C

Which of the following statements about semaphores is true? [A] A semaphore implementation should guarantee that processes do not suffer indefinite postponement, [B] P and V (Down and Up) operations should be indivisible operations [C] All of the other choices [D] If several processes attempt a P(S) operation simultaneously, only one process should be allowed to proceed.

C

Which of the following statements is incorrect about timesharing and multiprogramming systems? [A] In a timesharing system, multiple users can access the system simultaneously I [B] Al l timesharing systems are multiprogramming systems [C] Al l multiprogramming systems are timesharing systems [D] In a multiprogramming system, one user can run several processes simultaneously

C

7 What is correct about trap instructions and interrupts? (2301) a. A trap instruction switch the execution mode of a CPU from the user mode to the kernel mode. b. A trap instruction is caused by a user program to invoke functions in the OS kernel c. An interrupt is caused by an external event d. All of the above

D

8 (2589) Which of the following is not a condition necessary for deadlock to exist? a. mutual-exclusion condition b. circular-wait condition c. hold and wait condition d. preemption condition

D

9 (2312) The following requirement must be met by any facility or capability that is to provide support for mutual exclusion: a. Only one process at a time can be allowed into a critical code section b. A process remains in its critical region for a finite time only c. No assumption can be made about relative process speeds d. All of the above

D

9 (2591) Dijkstra's Banker's Algorithm require the system to maintain the resource information for each process, including: a. A count of the system's total resources b. The maximum resources that can be requested by the process c. The number of resources currently acquired by the process d. B and C

D

The basic idea behind the microkernel design is: [A] All ofthe other choices [B] All other modules run as relatively powerless ordinary user processes [C] Only one module runs in kernel mode [D] To archive high reliability by splitting operating system up into small, well-defined modules

D

Which ofthe following operating systems is an example of monolithic system? [A] Windows XP [B] Mac OS [C] UNIX [D] MS-DOS

D

14 (2298) Which of the following statements is incorrect about timesharing and multiprogramming systems? a. In a timesharing system, multiple users can access the system simultaneously b. In a multiprogramming system, one user can run several processes simultaneously c. All timesharing systems are multiprogramming systems d. All multiprogramming systems are timesharing systems

D

14 (2319) Which is a wrong statement about the quantum used in Round Robin algorithm ? a. If the quantum is very large, RR is essentially FCFS b. If the quantum is very small, the CPU efficiency is reduced c. A reasonable value of quantum is around 20-50 ms d. None of the above

D

15 (2317) Which of the following synchronization mechanisms does not rely on busy-waiting ? a. Lock variables b. Strict alternation c. Peterson's algorithm d. Semaphores *********************************************

D

2 (2534) Which of the following is appropriate to release page table and pages? a. Process creation b. Process execution c. Page fault time d. Process termination time

D

2 (2578) Which of the following I/O software device layers is done by user-level software? a. Computing the track, sector, and head for a disk read b. Writing commands to the device registers c. Checking to see if the user is permitted to use the device d. Converting binary integers to ASCII for printing

D

3 (2537) Page replacement algorithms determine a. when the system should update page table entries b. how many pages should be added to main memory c. which pages should be brought into memory because a process is likely to reference them soon d. which page to remove to provide space for an incoming page

D

3 (2581) An example of the key differences that can exist across (and even in) classes of I/O devices is: a. Data rate b. Data representation c. Error conditions d. All of the above

D

4 (2292) What is the main characteristic of embedded operating system? a. Multiple CPU b. Time-sharing c. Many I/O devices d. Restriction of memory size, speed of CPU, screen size, powers

D

4 (2546) Which of the following is not a path name for the file /etc/passwd a. /etc/passwd b. /etc/../etc/passwd c. /etc/../etc/../etc/passwd d. None of the above

D

5 (2300) Which is the difference between personal computers and mainframe computers? a. Personal computers are always interactive b. Mainframe computers are mostly batch systems with many users c. Protection is much more important on mainframe computers d. All of the above

D

5 (2313) What is Software proposal in the solution of Mutual exclusion with Busy waiting a. Lock Variables b. Strict Alternation c. Peterson's Solution d. All of the above

D

5 What are the allocation methods of disk blocks for files: (2549) a. Contiguous allocation b. Linked allocation c. Indexed allocation d. All of the above

D

6 File Structure can be: (2547) a. byte sequence b. record sequence c. tree d. All of the above

D

13 (2296) Which of the following instructions should be allowed in user mode? a. Disable all interrupts b. Read the time-of-day clock c. Set the time-of-day clock d. Change the memory map

B

2 (2302) Random Access memory: a. Is typically faster than cache memory b. Is volatile c. Can only be read sequentially d. Stores all the files on the computer

B

2 (2542) Which of the following is true about the block size in disk space management a. the larger the block size is the lower the data rate is b. the larger the block size is the worse the disk space utilization is c. the larger the block size is lesser the disk space is d. none of the above

B

3 (2305) Which of the following process state transitions are legal? a. waiting -> running b. running -> ready c. waiting -> terminated d. ready -> terminated

B

3 All deadlocks involve conflicting needs for resources by (2583) a. One or more processes b. Two or more processes c. Three or more processes d. None of the above

B

4 What is the characteristic of deadlocked systems (2588) a. Starvation b. Circular wait c. Saturation d. Aging

B

5 (2586) A possibility of deadlock can occur: a. If a system is in safe state b. If a system is in unsafe state c. If a system is in instable state d. None of the above

B

1 (2309) Which of the following statements is correct about Shortest Job First a. Avoid Starvation b. Minimize average waiting time c. Both a and b d. None of the above

B

11 (2539) LRU replaces the page that has spent the a. longest time in memory b. longest time in memory without being referenced c. shortest time in memory d. shortest time in memory without being referenced

B

12 (2536) In a system employing a paging scheme for memory management, wasted space is due to: a. External fragmentation b. Internal fragmentation c. Pages and frames of different specified sizes d. None of the above

B

A well-known Real-Time operating system is: [A] MS-DOS [B] e-COS [C] TinyOS [D] Personal Operating System

B

Which is not an example of a resource that is commonly time-multiplexed? [A] Graphics accelerator [B] Network interface [C] Main memory [D] CPU

B

Which of the following conditions that causes the processes to be terminated, when processes have done their work? [A] Fatal error (involuntary) [B] Normal exit (voluntary) [C] Killed by another process (involuntary) [D] Error exit (voluntary)

B

Which of the following statements is a hardware solution to the critical region problem? [A] Semaphore [B] TSL| [C] None of the other choices [D] Shared memory

B

6 (2580) Which of the following is not correct about the reliability of different RAID levels? a. There is no reliability support in RAID level 0 b. All RAID levels can survive one disk crash c. In RAID level 2, a single bit error in a word can be detected AND corrected d. In RAID levels 3, 4, 5 a single bit error in a word can be detected

B

7 (2308) The scheduling strategy where each process in the queue is given a certain amount of time, in turn, to execute and then returned to the queue, unless blocked is referred to as: a. Prioritization b. Round-Robin c. LIFO d. All of the above

B

7 The permanent blocking of a set of processes that compete for system resources is called (2587) a. Starvation b. Deadlock c. Prioritization d. All of the above

B

8 (2293) A Control/Status register that contains the address of the next instruction to be fetched is called the: a. Instruction Register (IR) b. Program Counter (PC) c. Program Status Word (PSW) d. All of the above

B

8 (2307) Which of the following process state transitions are illegal? a. Ready-> running b. waiting -> running c. running -> ready d. running -> terminated

B

8 (2526) When a virtual memory system manages memory in fixed length units, which of the following terms correctly represents its unit? a. Frame b. Page c. Sector d. Segment

B

8 (2579) What kind of I/O devices that disks and tapes belong to? a. Stream-oriented devices b. Block-oriented devices c. Character-oriented devices d. None of the above

B

9 (2291) The general role of an operating system is to: a. Act as an interface between various computers b. Provide a set of services to system users c. Manage files for application programs d. None of the above

B

9 (2535) In terms of speed the best method of Dynamic Storage-Allocation is: a. Next fit b. First fit c. Best fit d. Worst fit

B

9 (2541) Which of the following is specified to indicate the directory where the file is located? a. Extension b. Path name c. Root directory d. Sub-directory

B

Which of the following is an Operating System component? [A] Process Management [B] Speed Management [C] Space Management [D] Time Management

A

Which of the following process state transitions is correct, when the scheduler picks a process from the ready queue to run? [A] Ready -> running [B] Running -> Blocked (waiting) [C] Blocked (waiting) -> ready [D] Running -> ready

A

Which of the following process state transitions is illegal? [A] Ready -> Blocked (waiting) [B] Running -> Blocked (waiting) [C] Blocked (waiting) -> ready [D] Running -> ready

A

Critical Region (Section) concept used in interprocess communication is: [A] A part of shared memory [B] A part of the program where the shared memory is accessed [C] None of the other choices [D] A part of shared data

A

Linux and are often used as operating systems on supercomputers, mainframes, and servers. [A] UNIX [B* Windows [C] None ofthe other choices [D] Mac OS

A

Which cannot be able to solve the race condition? [A] TSL [B] Shared memory [C] Semaphore [D] Monitor

A

10 (2538) The actual location in main memory is called a(n): a. Relative address b. Logical address c. Absolute address d. None of the above

C

10 (2585) If a deadlocked system, the processes can a. run b. release resources c. be awakened d. do nothing

D

11 (2306) Which of the following cannot be shared among different threads of a process? a. Process code b. File handles c. Process data d. Stack

D

13 (2315) Which is not a goal of a scheduling algorithm for batch systems ? a. Fairness b. Throughput c. Turnaround time d. Response time

D

1 (2574) Device Driver is normally written by: a. Device's Manufacturer b. OS's Manufacturer c. Computer's Manufacturer d. All of the above

A

1 The system is said to be in an unsafe state if (2590) a. The operating system cannot guarantee that all current processes can complete their work b. The system is deadlocked c. A process is indefinitely postponed d. None of the above

A

10 (2290) The two basic types of processor registers are: a. General and special registers b. Control and Status registers c. User-visible and user-invisible registers d. None of the above

A

10 (2311) Which is the correct description of transitions between process states below? (see picture) ( Running J ( Blocked j , C Ready J a. 1: Process blocks for input; 2: Scheduler picks another process; 3: Scheduler picks this process; 4: Input becomes available b. 1: Process blocks for input; 2: Scheduler picks this process; 3: Scheduler picks another process; 4: Input becomes available c. 1: Process blocks for input; 2: Input becomes available; 3: Scheduler picks another process; 4: Scheduler picks this process d. 1: Process blocks for input; 2: Input becomes available; 3: Scheduler picks this process; 4: Scheduler picks another process

A

10 (2582) The I/O technique where the processor busy waits for an I/O operation to complete is called: a. Programmed I/O b. Interrupt-driven I/O c. Direct Memory Access (DMA) d. None of the above

A

14 (2532) Which of the following is appropriate to determine program size and create page table? a. Process creation b. Process execution c. Page fault time d. Process termination time

A

15 (2295) MS-DOS is a example of .... a. Monolithic system b. Layered System c. Virtual Machine d. Client-server model *********************************************

A

2 (2310) In order to implement mutual exclusion on a critical resource for competing processes, only one program at a time should be allowed: a. In the critical region of the program b. To perform message passing c. To exhibit cooperation d. None of the above

A

2 (2584) If in a resource-allocation graph, each resource type has exactly one instance, which of the following indicate a deadlock situation? a. The graph has at least one cycle. b. The graph has no cycle. c. The graph is connected. d. The graph is not connected.

A

4 (2530) The page table for each process maintains: a. The frame location for each page of the process b. The page location for each frame of the process c. The physical memory location of the process d. None of the above

A

5 Which of the following information bits in the entry of page table is used to indicate Page (2529) Fault? a. Present/absent bit b. Status bit c. Referenced bit d. Modified bit

A

6 (2528) The second-chance page-replacement algorithm a. Moves pages found at the head of a FIFO queue with the referenced bit turned on back to the tail of the queue to avoid replacing them b. Searches through a circular list of pages and replaces the first page it encounters that has the referenced bit turned off c. Relies on a modified bit to determine which page to replace d. None of the above

A

Consider a computer system that has cache memory, main memory (RAM) and disk, and OS uses virtual memory. It takes 2 nsec to access a byte from the cache. 20 nsec to access a byte from RAM. and 10 msec to access a block of 1000 bytes from the disk. If a book has 1000 pages, each with 50 lines of 80 characters each. How long it will take to electronically scan the textfor the case of the master copy being in each of the level as one proceeds down the memory hierarchy (from inboard memory to offline storage)? [A] 1 msec. 10 msec. 10 sec [B] 4 msec. 40 msec. 20 sec [C] 2 msec. 20 msec. 10 sec TO] 1 msec. 10 msec. 5 sec

B

In order to implement mutual exclusion on a critical resource for competing processes, only one program at a time should be allowed: [A] None of the other choices [B] In the critical region of the program [C] To exhibit cooperation [D] To perform message passing

B

4 (2316) Which of the following is not correct about user-level threads ? a. User-level threads are more efficient than kernel threads, in the sense that they do not need kernel calls to switch among threads b. User-level threads cannot be preempted by clock interrupts unless the whole process' quantum has been used up c. With user-level threads, customized scheduling algorithms cannot be implemented d. If one user-level thread makes a blocking system call, the system will block the entire process (which contains that user-level thread)

C

4 (2573) In general, which is the best technique for I/O Data transfer? a. Programmed I/O b. Interrupt-Driven I/O c. Direct Memory Access d. None of the above

C

5 (2576) Which of the following statements is not correct about DMA ? a. DMA controller has access to the system bus independent of the CPU b. DMA helps reduce the number of interrupts (in comparison with interrupt-driven I/O) c. DMA controller is usually faster than CPU d. The operating system can only use DMA if the hardware has a DMA controller

C

6 (2303) What is not correct about system calls? a. A system call allows a user process to assess and execute operating system functions inside the kernel. b. User programs use system calls to invoke operating system services c. In terms of performance, using system calls is better than using procedure calls d. Every system call involves overhead due to context switch

C

6 (2318) Which of the following is a preemptive scheduling algorithm a. FCFS b. Shortest Job First c. Round Robin d. None of the above

C

6 (2592) What is the weakness of the Banker's algorithm? a. Allowing the population of processes to vary over time b. Enabling processes to hold their resources indefinitely c. Requiring that processes state their maximum needs in advance d. Enabling the number of resources to fluctuate

C

7 (2533) Which of the following information bits used by the various page replacement policies indicates if the page has been called lately? a. Locality bit b. Status bit c. Referenced bit d. Modified bit

C

7 (2577) Which of the following statements is not correct about "device independence"? a. Files and devices are accessed in the same way, independent of their physical nature b. A system has to maintain only one set of system calls for both writing on a file and writing on the console c. Device independence requires all programmers to deal with different devices directly d. Device independent interfaces should be given to programmers

C

7 What is incorrect about contiguous allocation of files ? (2544) a. It is simple to implement b. It leads to excellent read performance c. It does not cause disk fragmentation d. It is widely used on CD-ROMs

C

8 The i-nodes are used in which of the following allocation methods (2543) a. Contiguous allocation b. Linked allocation c. Indexed allocation d. Linked allocation using FAT

C

9 (2575) Which of the following statements is incorrect? a. The term data rate refers to the speed with which data moves to and from the individual I/O device b. In the interrupt-driven I/O technique, the processor issues an I/O request, continues with other work and eventually receives notification that the request was fulfilled c. A hard drive is an example of a character-oriented I/O device d. None of the above

C

The is the essential component ofthe operating system that remains in RAM when your computer is powered on. [A] registr y [C] kernel [D] system file

C

The language ofthe CPU is known as its [A] Register set [B] Control unit set [C] I Instruction set | [D] None ofthe other choices

C

What is an operating system structure in which the communication between requesting process and responding process is message passing? [A] Monolithic Systems [B] All of the other choices [C] MS-DOS [D] Client-Server Model

C

What is the characteristic of the first generation of operating system? [A] Personal computers, single user, multitasking [B] Transistors, batch systems [C] Vacuum tubes, plug boards [D] ICs and multiprogramming

C

1 (2299) Which of the following statements is incorrect about user mode and kernel mode? a. In kernel mode, the OS can execute every instruction in the instruction set b. In user mode, user program can execute only a subset of instructions c. Having two modes of operation helps prevent user programs from accessing critical instructions d. None of the above

D

1 (2531) A page fault means that we referenced a page a. that was outside the memory boundaries b. with an incorrect I/O request c. that was not in secondary storage d. that was not in main memory

D

1 (2548) The special files are: a. character special file b. block special file c. Neither a nor b d. Both a and b

D

10 (2545) Which of the following is not correct about hard links and symbolic links? a. Symbolic links need space to store the name and the file pointed to b. Hard links do not require extra disk space c. Symbolic links can point to files in the network d. Hard links can point to files on other machines *********************************************

D

Where is the position of the operating system in computer system: [A] Between the user interface program and the application Program [B] None of the other choices [C] In user space [D] Above the hardware and under the user interface program

D

Which of the following instructions should be allowed only in kernel mode? [A] AND of two numbers [B] ADD of two numbers [C] Read the time-of-day clock [D] Disable all interrupts

D


Ensembles d'études connexes

CHAPTER 46 Management of Patients with Oral and Esophageal Disorders QUIZ

View Set

Taxes,Retirement,and Other Insurance Concepts

View Set

Chp 28 Regulation of Gene Expression

View Set

Square Roots & Estimating Square Roots, Solving Radical Equations LD, Radical Equations, Fractions & Exponents Math Skills, Fractional Exponents, Fractional Exponents

View Set

CompTIA Security+ Certification Exam SY0-601 Midterm 2

View Set