Question 1: MULTIPLE CHOICE QUESTIONS (20 Marks)
Question 1: MULTIPLE CHOICE QUESTIONS (20 Marks)
Question 1: MULTIPLE CHOICE QUESTIONS (20 Marks)
4. The _____ model multiplexes many user-level threads to a smaller or equal number of kernel
threads.
a. many-to-many
b. two-level
c. one-to-one
d. many-to-one
5. When two or more processes need a resource that it will never gets, this situation is called
a. Bounded-Buffer
b. Deadlock
c. Bankers Algorithm
d. Semaphore
8. _____ is the dynamic storage-allocation algorithm which results in the smallest leftover hole in
memory.
a. First fit
b. Best fit
c. Worst fit
d. None of the above
10. _____ occurs when a process spends more time paging than executing.
a. Thrashing
b. Memory-mapping
c. Demand paging
d. Swapping
Page 2 of 11
11. “app.exe” is an example of a(n) _____.
a. batch file
b. object file
c. executable file
d. text file
13. When the head damages the magnetic surface, it is known as _________.
a. disk crash
b. head crash
c. magnetic damage
d. All of these
14. In the _______ algorithm, the disk head moves from one end to the other, servicing requests
along the way. When the head reaches the other end, it immediately returns to the beginning of
the disk without servicing any requests on the return trip.
a. LOOK
b. SCAN
c. C-SCAN
d. C-LOOK
15. In the ______ algorithm, the disk arm starts at one end of the disk and moves toward the other
end, servicing requests till the other end of the disk. At the other end, the direction is reversed
and servicing continues.
a. LOOK
b. SCAN
c. C-SCAN
d. C-LOOK
Page 3 of 11
c. Device reservation
d. None of above
17. The _____________ right allows a process to transfer from one domain to another.
a. Copy.
b. Owner.
c. Control.
d. Switch.
18. The ____________ right allows a process to add and remove access rights in a row (domain).
a. Copy.
b. Owner.
c. Control.
d. Switch.
Page 4 of 11
Question 2: TRUE OR FALSE QUESTIONS (10 marks)
Answer: True.
3. Metadata includes all of the file-system structure, including the actual data (or contents of the
file).
Answer: False.
4. I/O request includes input or output mode, disk address, memory address, number of sectors to
transfer.
Answer: True.
7. The copy right in the access matrix allows the access right to be copied both in the column and
the row.
Answer: False.
Page 5 of 11
10. The process has a physical memory address space, information (such as a base priority), and an
affinity for one or more processors.
Answer: False
Page 6 of 11
Question 3: FILL IN THE BLANKS : 5 sentences with the provided words and 5 sentences
with your own words (5 marks)
7. Each row in the access matrix can be implemented as a___________ for one domain.
Answer: Capability list.
10. The ___________ mechanism is used to support legacy applications written for a fiber-
execution model.
Answer: Fiber.
Page 7 of 11
Question 4: (4 marks)
Consider the following set of processes, with the length of the CPU burst time given in
milliseconds:
The processes are assumed to have arrived in the order P1, P2, P3, P4, P5 all at time 0.
Question:
a. Draw the Gantt chart that illustrate the execution of these processes using the Round Robin
scheduling algorithms with quantum time = 2.
b. What is the waiting time of each process for this scheduling algorithms?
Answer:
Page 8 of 11
Question 5: (5 marks)
Answer:
Page reference string is: 7,0,1,2,0,3,0,4,2,3,0,3,2,1,2,0,1,7,0,1 for allocated page blocks 3, we have
following Optimal Page Replacement allocation. Page reference marked with the highlighted gray
color.
7 0 1 2 0 3 0 4 2 3 0 3 2 1 2 0 1 7 0 1
7 7 7 2 2 2 2 2 2 2 2 2 2 2 2 2 2 7 7 7
0 0 0 0 0 0 4 4 4 0 0 0 0 0 0 0 0 0 0
1 1 1 3 3 3 3 3 3 3 3 1 1 1 1 1 1 1
Page 9 of 11
Question 6: (3 marks)
• Trap Door: The designer of a program or system might leave a hole in the software that only she
is capable of using.
• Logic Bomb: Consider a program that initiates a security incident only under certain
circumstances. It would be hard to detect because under normal operations, there would be no
security hole. However, when a predefined set of parameters was met, the security hole would
be created. This scenario is known as a logic bomb.
• Stack and Buffer Overflow: The stack- or buffer-overflow attack is the most common way for
an attacker outside the system, on a network or dial-up connection, to gain unauthorized access
to the target system. An authorized user of the system may also use this exploit for privilege
escalation.
• Viruses: A virus is a fragment of code embedded in a legitimate program. Viruses are self-
replicating and are designed to “infect” other programs. They can wreak havoc in a system by
modifying or destroying files and causing system crashes and program malfunctions.
Page 10 of 11
Question 7: (3 marks)
Page 11 of 11