Question Bank Unit - I: 2 Marks
Question Bank Unit - I: 2 Marks
Question Bank Unit - I: 2 Marks
UNIT – I :
2 Marks
5 Marks
10 Marks
1. Define process?
2. What is meant by the state of the process?
3. What does PCB contain?
4. What are the 3 different types of scheduling queues?
5. Define schedulers?
6. What are the types of scheduler?
7. Define critical section?
8. Define semaphores.
9. Name dome classic problem of synchronization?
10. What is the use of cooperating processes?
11. Define race condition.
12. What are the requirements that a solution to the critical section problem must satisfy?
13. Define entry section and exit section
5 Marks
10 Marks
10 Marks
1. Briefly explain and compare, fixed and dynamic memory partitioning schemes.
2. Explain with the help of examples FIFO and LRU, optical page replacement algorithms
with example reference string. Mention the merits and demerits of each of the above
3. algorithm.
Explain how paging supports virtual memory. With neat diagram explain hoe logical
address is translated into physical address
4. Write about the techniques for structuring the page table.
5. What is thrashing and explain the methods to avoid thrashing?
6. Explain the basic concepts of segmentation in detail.
UNIT-IV
2 Marks
1. What is a File?
2. List the various File Attributes
3. What are the various File Operations?
4. What is the information associated with an Open File?
5. What are the different Accessing Methods of a File?
6. What is Directory?
7. What are the operations that can be performed on a Directory?
8. What are the most common schemes for defining the Logical Structure of a Directory?
9. Define UFD and MFD
10. What is a Path Name?
11. If the average page faults service time of 25 ms and a memory access time of
100ns.Calculate the effective access time.
12. What are the types of Path Names?
13. What is meant by Locality of Reference?
14. Define Seek Time and Latency Time.
15. What are the Allocation Methods of a Disk Space?
16. What are the advantages of Contiguous Allocation?
17. What are the drawbacks of Contiguous Allocation of Disk Space?
18. What are the advantages of Linked Allocation?
19. What are the disadvantages of Linked Allocation?
20. What are the various Disk-Scheduling Algorithms?
5 Marks
10 Marks
a) Concept of file
b) Access methods
c) File sharing
3. Explain disk structure in detail.
d) File Attributes
4. Explain swap space management in detail.
5. Explain
e) different
File typesDisk scheduling algorithms SCAN,CSCAN.CLOOK(DEC 2015)
6. Give overview of mass storage structure in detail.
UNIT-V
2 Marks
1. What is deadlock?
2. What are goals of system protection?
3. What is Access matrix?
4. What are different methods for handling deadlocks?
5. What is Access control?
6. What are principles of protection?
7. What are necessary conditions for deadlocks?
8. Explain domain of protection.
9. Explain capability based system?
10. Explain laguange based protection.
5 Marks
6. Explain:
A. 1 mode
B. 2 modes
C. 3 modes
D. 4 modes
ANSWER: B
2.Multi-processor system gives a
A. small system
B. tightly coupled system
C. loosely coupled system
D. both a and b
Answer B
A. time sharing
B. multi-tasking
C. single programing
D. both a and b
Answer D
A. Increased Throughput
B. Expensive hardware
C. operating system
D. both a and b
ANSWER: A
A. input
B. output
C. operating system
D. memory
ANSWER:C
A. memory
B. storage
C. CPU utilization
D. cost
ANSWER: C
A. mini Computer
B. Super Computer
C. Clustered System
D. both a and b
ANSWER: C
A. high memory
B. low memory
C. mid memory
D. both a and b
ANSWER: B
A. UNIX
B. Linux
C. windows
D. both a and b
ANSWER: D
A. non volatile
B. volatile
C. reserved
D. large
ANSWER: B
11. Controller of computer system transfers data from device to
A. buffers
B. cache
C. registers
D. indexes
ANSWER: A
A. resource allocation
B. word processors
C. dedicated resources
D. interface
ANSWER: A
A. serial clusters
B. parallel clusters
C. Beowulf clusters
D. both a and b
ANSWER: B
14. To start an I/O operation device driver loads appropriate register into?
A. memory
B. Secondary storage
C. Device Controller
D. Arrays
ANSWER: C
A. bus
B. memory
C. processors
D. both a and b
ANSWER: D
16. In asymmetric clustering other machines perform operations while one machine is in
ANSWER: AAnswer A
A. graceful upgradation
B. degradation
C. upgradation
D. graceful degradation
ANSWER: D
A. non volatile
B. volatile
C. reserved
D. small
ANSWER: A
A. operating system
B. nodes
C. clustered system
D. both a and b
ANSWER: A
A. 2 bytes
B. 4 bytes
C. 7 bytes
D. 8 bytes
ANSWER: B
21. Each user of computer system that uses computer services has at least
A. 1program
B. 2programs
C. 3programs
D. 4programs
ANSWER: A
A. serialization
B. parallelization
C. LAN
D. WAN
ANSWER: B
23. A properly designed operating system must ensure that an incorrect (or malicious) program cannot
cause other programs to execute
A. incorrectly
B. Correctly
C. both a and b
D. None
ANSWER: A
A. interrupts
B. programs
C. addresses
D. compilers
ANSWER: C
A. CPU
B. software
C. hardware
D. interface
ANSWER: D
A. speed
B. cost
C. indexes
D. both a and b
ANSWER: D
ANSWER: C
A. 1024 bytes
B. 1024² bytes
C. 1024³ bytes
D. 1024&sup4; bytes
ANSWER: B
A. 2 types
B. 3 types
C. 4 types
D. 5 types
ANSWER: A
A. LAN
B. WAN
C. PAN
D. TAN
ANSWER: A
A. 1
B. 0
C. x
D. undefined
ANSWER: B
A. user mode
B. system mode
C. supervisor mode
D. both a and b
ANSWER: C
A. cost
B. reliability
C. uncertainty
D. scalability
ANSWER: B
A. clusters
B. nodes
C. file system
D. both a and b
ANSWER:C
A. 1024 bytes
B. 1024 kilo bytes
C. 1056 bytes
D. 1058 kilo bytes
ANSWER: B
A. user code
B. kernel mode
C. system mode
D. both b and c
ANSWER: B
A. zero error
B. infinite loop
C. invalid memory access
D. both a and b
ANSWER: B
A. symmetric multiprocessor
B. asymmetric multiprocessor
C. symmetric multiprocessing
D. asymmetric multiprocessing
ANSWER: D
ANSWER: B
A. sit idle
B. perform well
C. cost high
D. cost low
ANSWER: B
UNIT II
A. Block
B. Execute
C. Terminate
D. Update
ANSWER:A
Answer A
MCQ. In a pure Kernel Level Thread facility all of work of thread management is done by the
A. Application
B. Program
C. Kernel
D. Threads
An ANSWER:Cswer C
A. Process
B. Processor
C. Interface
D. System
Answer C ANSWER:C
A. Functionality
B. Extensibility
C. Reliability
D. Portability
Answer B ANSWER:B
A. Bugs
B. Threads
C. Programs
D. Security Policy
Answer B ANSWER:B
A. Multiprogramming
B. Security Policy
C. Problem
D. Thread
Answer D ANSWER:D
MCQ. A single machine instruction can controls simultaneous execution of a number processing
elements on
A. Lockstep Basis
B. Open Step Basis
C. Early Basis
D. None
Answer A ANSWER:A
A. Modules
B. Pages
C. Devices
D. Computers
Answer B ANSWER:B
A. Computers
B. Systems
C. Distributed Systems
D. Applications
Answer C ANSWER:C
A. Flexibility
B. Reliability
C. Accessible
D. Rigid
Answer A ANSWER:A
MCQ. In Many-to-One multithreading model many user level threads are attached to
A. One register
B. operating system
C. One kernel thread
D. other threads
Answer C ANSWER:C
MCQ. Programs involve a variety of activities is easier to design and implement using
A. Programs
B. Information
C. Data
D. Threads
Answer D ANSWER:D
A. Applications
B. Programs
C. Processors
D. Processes
Answer C ANSWER:C
MCQ. A lightweight process (LWP) can be viewed as a mapping between ULTs and
A. Kernel Threads
B. UNIX Thread
C. Linux Threads
D. Window Vista Threads
Answer A ANSWER:A
A. Functionality
B. Reliability
C. Portability
D. Flexibility
Answer B ANSWER:B
A. Module
B. I/O Devices
C. Memory
D. Page
Answer D ANSWER:D
A. Processes
B. Processors
C. Programs
D. Applications
Answer B ANSWER:B
A. Runnable
B. Executing
C. Updated
D. Access
Answer A ANSWER:A
A. Complete
B. Spawned
C. Closed
D. Update
Answer B ANSWER:B
A. Devices
B. Resources
C. Computers
D. Processors
Answer D ANSWER:D
A. Buffers
B. Data Set
C. Buses
D. Registers
Answer B ANSWER:B
A. Address
B. ID
C. Object
D. Attributes
Answer D ANSWER:D
A. Execution
B. Updating
C. Completion
D. None
Answer A ANSWER:A
Answer A ANSWER:A
MCQ. When a new process is created in Win32 new process inherits many of its
A. Classes
B. Objects
C. Parent Attributes
D. Functions
Answer C ANSWER:C
MCQ. A single processor executes a single instruction stream to operate on data stored in a single
A. Computer
B. System
C. Memory
D. Device
Answer C ANSWER:C
A. I/O Devices
B. Interface
C. Object
D. Information
Answer C ANSWER:C
A. Application
B. Information
C. Data
D. Message
Answer D ANSWER:D
A. task done
B. task construct
C. task build
D. task struct
Answer D ANSWER:D
A. Objectives
B. Programs
C. Modems
D. Models
Answer A ANSWER:A
Answer C ANSWER:C
A. Overcome
B. Overhead
C. Overload
D. Over access
Answer B ANSWER:B
A. Images
B. Graphics
C. Programs
D. None
Answer C ANSWER:C
A. Threads
B. Systems
C. Registers
D. Buffers
Answer A ANSWER:A
MCQ. A process can map any of its pages into address space of another
A. Process
B. Program
C. System
D. Application
ANSWER:A
Answer AMCQ. In a pure User Level Thread facility all of work of thread management is done by the
A. Application
B. Process
C. Program
D. System
Answer A ANSWER:A
A. Blocks
B. Paths
C. Statements
D. Programs
Answer B ANSWER:B
A. Data
B. Machine
C. Program
D. Process
Answer B ANSWER:B
Answer C ANSWER:C
VB ANSWER:B
UNIT-III
1. CPU fetches the instruction from memory according to the value of:
A. program counter
B. status register
C. instruction register
D. program status word
A. stack pointer
B. cache
C. accumulator
D. disk buffer
ANSWER: B
A. physical address
B. absolute address
C. logical address
D. none of the mentioned
ANSWER:C
5. Memory management technique in which system stores and retrieves data from secondary storage for
use in main memory is called:
A. fragmentation
B. paging
C. mapping
D. none of the mentioned
ANSWER:B
A. page-fault rate
B. hit ratio
C. memory access time
D. none of the mentioned
ANSWER:B
ANSWER:A
8. Which algorithm chooses the page that has not been used for the longest period of time whenever the
page required to be replaced?
ANSWER:A
A. modularity
B. locality
C. globalization
D. random access
ANSWER:A
ANSWER:C
14. With relocation and limit registers, each logical address must be _______ the limit register.
A. less than
B. equal to
C. greater than
D. None of these
ANSWER:A
15. The operating system and the other processes are protected from being modified by an already
running process because :
ANSWER:D
ANSWER:B
17. Using transient code, _______ the size of the operating system during program execution.
A. increases
B. decreases
C. changes
D. maintains
ANSWER:C
18. When memory is divided into several fixed sized partitions, each partition may contain ________.
ANSWER:A
ANSWER:A
20. The first fit, best fit and worst fit are strategies to select a ______.
A. is being used
B. is not being used
C. is always used
D. None of these
ANSWER:B
A. compaction
B. larger memory space
C. smaller memory space
D. None of these
ANSWER:A
ANSWER:A
24. If relocation is static and is done at assembly or load time, compaction _________.
A. cannot be done
B. must be done
C. must not be done
D. can be done
ANSWER:A
25. The disadvantage of moving all process to one end of memory and all holes to the other direction,
producing one large hole of available memory is :
ANSWER:A
Answer D
ANSWER:A
ANSWER:A
ANSWER:D
ANSWER:B
30. When the memory allocated to a process is slightly larger than the process, then :
A. processes
B. threads
C. instructions
D. none of the mentioned
ANSWER:A
32. _____ is the concept in which a process is copied into main memory from the secondary memory
according to the requirement.
A. Paging
B. Demand paging
C. Segmentation
D. Swapping
ANSWER:B
A. primary memory
B. secondary memory
C. CPU
D. none of the mentioned
ANSWER:B
35. When a program tries to access a page that is mapped in address space but not loaded in physical
memory, then?
A. page-fault rate
B. hit ratio
C. memory access time
D. none of the mentioned
ANSWER:A
ANSWER:A
38. Which algorithm chooses the page that has not been used for the longest period of time whenever the
page required to be replaced?
ANSWER:C
ANSWER:A
10. Working set model for page replacement is based on the assumption of:
A. modularity
B. locality
C. globalization
D. random access
ANSWER:B
UNIT-IV
1. Destruction of files for malicious reasons such as access by fraudulent people is classified as being
A. modified
B. accessed
C. destroyed
D. unauthorized access
ANSWER:A
Answer A
2.. In files, if order of operation on two or more files are similar, then operation will be
A. complex
B. simple
C. sequential
D. combinational
ANSWER:B
Answer B
3. Search in which record is checked and read for desired items in file linearly is classified as
A. combinational search
B. linear research
C. linear search
D. quadratic search
ANSWER:C
Answer C
4. Field which is used to identify specific record and can't be duplicated is classified as
A. key field
B. duplicate field
C. copied field
D. original field
Answer A
5. Access in which records are accessed from and inserted into file, is classified as
A. direct access
B. sequential access
C. random access
D. duplicate access
ANSWER:B
A. file record
B. item
C. data column
D. bug
ANSWER:BAnswer B
7. File code which engineers add to file name and limit access to few users is called
A. limited code
B. access code
C. code protection
D. physical code
ANSWER:BAnswer B
8. Large collection of structured data that can be used in different applications is called
A. database management
B. management system
C. database
D. data storage system
ANSWER:CAnswer C
A. disc format
B. disc address
C. disc footer
D. disc header
ANSWER:AAnswer A
10. In microcomputers files, inquiry programs used for simple purposes are classified as
A. storage package
B. database package
C. organized package
D. hardware package
Answer B
11.In computer programming, particular way by which data records are arranged into a specific manner is
considered as
A. organization
B. reorganized
C. managing
D. record storage
ANSWER:AAnswer A
A. sorting
B. ordering
C. learning
D. inquiring
ANSWER:AAnswer A
ANSWER:CAnswer C
14. All keys which are used to identify particular item must be
A. same
B. different
C. lengthy
D. short
ANSWER:BAnswer B
15. Program packages that allows user to search items in a file or some combination of selected items are
classified as
A. file search
B. file inquiry
C. linear file search
D. quadratic linear search
ANSWER:BAnswer B
A. direct file
B. order file
C. sequence file
D. timed file
ANSWER:CAnswer C
17. Kind of exchange in which number is compared to next item for possible exchange is called
A. exchange sort
B. selection sort
C. bubble sort
D. possible sort
ANSWER:CAnswer C
18. Operations performed on serial file are in order would be much
A. easier
B. complex
C. differential
D. sequential
ANSWER:AAnswer A
19. In user facilities, copying of all records onto a main store from permanent store is considered as
A. delete file
B. rename file
C. save file
D. load file
ANSWER:DAnswer D
20. In sequential files update, record orders of transaction file and master file must be
A. safe
B. same
C. different
D. descending order
ANSWER:B
Answer B21 21.When data files are updated, new file is called
A. father file
B. son file
C. grandfather file
D. grandson file
Answer ANSWER:BB
22. Ability to obtain data from a storage device by going directly to where it is physically located on
device rather than by having to sequentially look for data at one physical location after another is called
A. sequential access
B. timed access
C. direct access
D. variable access
ANSWER:CAnswer C
A. two
B. three
C. four
D. five
ANSWER:BAnswer B
A. item
B. advantage
C. previous records
D. disadvantage
ANSWER:BAnswer B
A. software safeguards
B. physical safeguards
C. generation files
D. locked files
ANSWER:AAnswer A
A. direct access
B. sequential access
C. timed access
D. random access
ANSWER:AAnswer A
A. duplicate
B. key
C. copied column
D. copied row
ANSWER:BAnswer B
A. linear research
B. quadratic search
C. search
D. non linear research
ANSWER:CAnswer C
29. If master and transaction file have keys in same order then it takes
A. less time
B. more time
C. many hours
D. many days
ANSWER:AAnswer A
A. record
B. file
C. rows
D. column
ANSWER:BAnswer B
A. header label
B. trailer label
C. end of file marker
D. start of file marker
ANSWER:AAnswer A
ANSWER:AAnswer A
33. Files to be accessed from punched cards and paper tape is classified as
ANSWER:DAnswer D
34. Method by which program read from files and writes data into file is considered as
A. access
B. organization
C. recording
D. selection
ANSWER:AAnswer A
35. Type of field in which reserved set of characters are not determined is classified as
A. stable length
B. file length
C. variable length
D. fixed length
ANSWER:C
ANSWER:C
37. Process of creating copy of stored data onto another disc is termed as creating
A. locked files
B. backup files
C. modified file
D. destroyed file
ANSWER:B
A. list directory
B. directory part
C. catalogue
D. disc directory
ANSWER:C
39. Records would not be arranged in particular order before creating it is classified as
ANSWER:A
A. path file
B. batched file
C. directory
D. path name
ANSWER:C
UNIT-V
A. Resources
B. Programs
C. Processes
D. Users
ANSWER:C
ANSWERAAAnsweC
A. Resources
B. Users
C. Computers
D. Programs
ANSWER:A
A. Virtual Memory
B. Memory
C. Shared Memory
D. Main Memory
ANSWER:CAnswer C
A. Conservative
B. Straight
C. Complex
D. Simple
ANSWER:A
A. Access
B. Count
C. Created
D. Control
ANSWER:C
ANSWER:D
A. Terminated
B. Non Voluntarily
C. Voluntarily
D. None
ANSWER:C
A. Process
B. Resource
C. Program
D. Application
ANSWER:A
A. Program Type
B. User Type
C. Resource Type
D. Process Type
ANSWER:C
A. Require
B. Safe
C. Run
D. Control
ANSWER:B
Answer B 11. Linux includes all of concurrency mechanism found in other
A. UNIX System
B. Linux System
C. Windows System
D. None
Ans ANSWER:Awer A
A. Users
B. Problems
C. Process
D. Application
ANSWER:BAnswer B
A. Data
B. Process
C. Movement
D. Wait
ANSWER:DAnswer D
A. Users
B. Programs
C. Applications
D. Procedures
ANSWER:DAnswer D
15. Conditions for deadlock, only one process may use a resource at a
A. Program
B. Time
C. Process
D. None
Answer B
ANSWER:CAnswer C
A. Information
B. Communication
C. Process
D. Resource
ANSWER:BAnswer B
A. Resources
B. Users
C. Time
D. Cost
ANSWER:AAnswer A
19. Once deadlock has been detected, some strategy is needed for
A. Control
B. Access
C. Recovery
D. None
ANSWER:CAnswer C
20. Common technique used for protecting a critical section in Linux is the
A. Lock Step
B. Program lock
C. Spinlock
D. None
ANSWER:C
Answer 21. For effective operating system, when to check for deadlock?
ANSWER:C
22. A problem encountered in multitasking when a process is perpetually denied necessary resources is
called:
A. deadlock
B. starvation
C. inversion
D. aging
ANSWER:B
23. Which one of the following is a visual ( mathematical ) way to determine the deadlock occurrence?
ANSWER:A
ANSWER:A
ANSWER:C
ANSWER:B
ANSWER:A
A. A process must be not be holding a resource, but waiting for one to be freed, and then request to
acquire it
B. A process must be holding at least one resource and waiting to acquire additional resources that are
being held by other processes
C. A process must hold at least one resource and not be waiting to acquire additional resources
D. None of these
ANSWER:B
A. must exist
B. must not exist
C. may exist
D. None of these
ANSWER:A
A. is required
B. is not required
C. None of these
ANSWER:B
33. To ensure that the hold and wait condition never occurs in the system, it must be ensured that :
ANSWER:D
34. The disadvantage of a process being allocated all its resources before beginning its execution is :
35. To ensure no preemption, if a process is holding some resources and requests another resource that
cannot be immediately allocated to it :
A. that can be used by one process at a time and is not depleted by that use
B. that can be used by more than one process at a time
C. that can be shared between various threads
D. none of the mentioned
ANSWER:A
A. mutual exclusion
B. a process may hold allocated resources while awaiting assignment of other resources
C. no resource can be forcibly removed from a process holding it
D. all of the mentioned
ANSWER:D
38. A system is in the safe state if:
A. the system can allocate resources to each process in some order and still avoid a deadlock
B. there exist a safe sequence
C. both (a) and (b)
D. none of the mentioned
ANSWER:C
ANSWER:A
A. banker’s algorithm
B. round-robin algorithm
C. elevator algorithm
D. karn’s algorithm
ANSWER:A