OSG202 - FE Chap 1

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

At which level in Protection Rings on the Pentium the User programs reside A. 1 B. 0 C. 2 D. 3

A

Consider an i-node which contains 10 direct addresses of 4 bytes each and all disk blocks are 1 KB. Also consider that the inode contains an additonal "single and double i A. 65802 KB B. 10KB C. 266KB D. 65536 KB

A

In a directed graph used to model deadlock, ______ represents deadlock. A. Cycle B. Dashed arrow C. Any path D. Solid arrow

A

The Mach model of Page fault handling with an external pager includes A. All of the other choices B. An external pager running in user space C. A low-level MMU handler D. A page fault handler that is part of the kernel

A

The major operating system services provide mechanisms for secure and efficient are: A. all of the other choices B. Communication between processes C. Execution of a program. I/O operations performed by it, and detecting and reporting errors caused by it D. File manipulation

A

The scheme of ________ removes the possibility of a circular wait and therefore guarantees the removal of deadlocks. A. Hierarchical ordering B. Preemption C. Requesting all resources before job run D. Saving and restoring job state

A

The term ______ characterizes a system configuration that includes an I/O module that is a separate processor with a specialized instruction set A. DMA B. I/O device C. Programmed I/O D. None of the other choices

A

Which of the following I/O software is done by User-level software A. Converting binary integers to ASCII for printing B. Checking to see if the user is permitted to use the device C. Computing the track, sector, and head for a disk read D. Writing commands to the device registers

A

Dijkstra's Banker's Algorithm require the system to maintain the resource information for each process, including: A. The maximum resources that can be requested by the process B. Both The maximum resources that can be requested and The number of resources currently acquired by the process C. A count of the system's total resources D. The number of resources currently acquired by the process

B

Dijkstra's Banker's Algorithm require the system to maintain the resource information for each process, including: A. The maximum resources that can be requested by the process B. Both The maximum resources that can be requested and The number of resources currently acquired by the process C. Account of the system's total resources D. The number of resources currently acquired by the process

B

In order that CPU communicates with the control registers in the devices, the control register is assigned: A. I/O port number B. None of the other choices C. Index D. I/O address

B

One of the primary disadvantages of contiguous storage is that _____ A. It is an inefficient use of space B. File can't be expanded unless there is empty space available immediately following it C. It is hard to implement and manage D. It ts difficult to find information in files

B

The Linking technique that allows the file to appear in more than one directory are: A Symbolic link B. Both hard link and symbolic link C. Soft link D. Hard link

B

What is not correct about system calls? A. User programs use system calls to invoke operating system services B. In terms of performance, using system calls is better than using procedure calls C. A system call allows a user process to assess and execute operating system functions inside the worn D. Every system call involves overhead due to context switch

B

What is the correct approach of the driver of dedicated devices with requesting device that is busy to solve deadlock using Ostrich algorithm? A. All of the other choices B. The device driver decides blocking and returning an error code C. The device driver hills those requesting processes D. The device dnver stops the current jobs and releases the devices

B

Which deadlock condition does "Spool everything" attack? A. Hold and wait B. Mutual exclusion C. Circular-wait condition D. No preemption

B

A CPU may have multiple execution units, so that can carry out multiple instructions in the same time is called: A. Pipeline B. None of the other choices . C. Superscalar D. Multicore

C

Assume jobs A-D arrive in quick succession in the READY queue. Using round robin scheduling (quantum=4), the turnaround time for job D is _______ Arrival time: 0 1 2 3 Job: A B C D CPU cycle: 8 4 9 5 A 20 B. 24 C. 22 D.7

C

Assuming that it takes 10 nsec to copy a byte, how much time does it take to completely rewrite the screen of a 1000 x 600 pocel graphics with 24- bit color? A. 18 micro-sec B. 180 micro-sec C. 8 msec D. 180 msec

C

If a system is deadlocked, no processes can A. run B. be awakened C. All of the other choices D. release resources

C

In a directed graph used to model deadlock, processes are represented using A. Ellipse B. Squares C. Circular D. Rectangle

C

Single-sided, single-layer DVD can hold___. A. 8.5GB B. 17GB C. 4.7GB D. 9.4GB

C

The ways that input/output can be done is? A. Busy waiting B. Interrupt C. All of the other choices D. DMA (Direct Memory Access)

C

What is an operating system structure in which the communication between requesting process and responding process is message passing? A. Monolithic Systems B. Client - Server Model C. MS - DOS D. All of the other choices

C

What is not the technique of implementation for Virtual Memory? A. All of the other choices B. Segmentation C. Partition D. Paging

C

Which method is used to implement files with file's size larger than 2 GB in UNIX V7? A. FAT 32 B. i-node with single indirect block C. i-node with triple indirect block D. FAT 16

C

Which of a system call is to allow the system to specify from where to take the data in file? A. LINK B. CREATE C. SEEK D. OPEN

C

Which of the following is not special file? A. Block special file B. None of the other choices C. Stream special file D. Character special file

C

Which of the following is true about Atomic action on semaphores? A. Possibly going to sleep B. Changing the value ' C. All of the other choices D. Checking the value

C

Which of the following is true about Atomic action on semaphores? A. Possibly going to sleep B. Changing the value C. All of the other choices D. Checking the value

C

Which of the following synchronization mechanisms does not rely on busy-waiting? A. Peterson's algorithm B. Lock variables C. Smaphores D. Strict alternation

C

As one proceeds down the memory hierarchy (from inboard memory to offline storage). which of the following conditions is correct? A. Decreasing capacity B. None of the other choices C. Increasing cost per bit D. Increasing access time

D

How much cylinder skew is needed for a 3600- RPM (rotate per minute) disk with the track-to-track seek time of 1 msec? The disk has 200 sectors of 512 bytes on each track. A 24 sectors B. 18 sectors C. 36 sectors D. 12 sectors

D

Imagine that a certain printer can print 400 characters per second and that the time to write a character to the printer's output register is so short it can be ignored. If to run this printer using interrupter A. 4% of the CPU B. 96% of the CPU C. 98% of the CPU D. 2% of the CPU

D

In some thread systems, a thread want be biocked until an other thread has exited. It can establish this goal by calling ______ A. thread_wait B. thread_exit C. thread_create D. thread_ yield

D

In terms of storage utilization the best method of Dynamic Storage Allocation is: A. First fit B. Worst fit C. Next fit D. Best fit

D

Increasing file system performance is implemented by _______ A. Buffer cache B. Defragmenting Disks C. Block Read Ahead D All of the other choices

D

Programmed I/O should be acceptable for which of the following systems? A. Multiprogramming systems B. Interactive systems C. Embedded systems D. None of the other choices

D

Programmed I/O should be acceptable for which of the following systems? A. Multiprogramming systems B. Interactive systems C. Embedded systems D. None of the other choices

D

What is the characteristic of the first generation of operating system? A. Personal computers, single user, multitasking B. ICs and multiprogramming C. Transistors, batch systems D. Vacuum tubes, plug boards

D

What is the table where its entry contains the memory address of Interrupt service routine A. Interrupt table B. Address table C. Address lines table D. Interrupt vector table

D

Which of the following conditions that causes the processes to be terminated, when the processes have a program bug? A. Fatal error (involuntary) B. Normal exit (voluntary ) C. Error exit (voluntary) D. Killed by another process (involuntary)

D

Which of the following information bits in the entry of page table is used to indicate what kinds of access are permitted? A. Modified bit B. Protection bit C. Caching disabled D. Present/absent bit

D

Which of the following is specified to indicate the directory where the file is located? A. Extension B. Root directory C. Sub-directory D. Path name

D


Set pelajaran terkait

health promotion and maintenance

View Set

Anatomy & Physiology: Skin and Membranes

View Set

Case Analysis: Restructure, Outsource, Redesign Assignment

View Set

Chapter 5: Empiricism, sensationalism and positivism

View Set

международные организации

View Set

Unit 2 Test: Sin and Salvation Salles-Cunha

View Set

Chapter 21: Postpartum Complications NCLEX

View Set

Sterilization and Disinfection Bb Test

View Set