Tuesday 4 October 2011

Collection of related data is called......................
a.Field
b.Record
c.Database

ans: c

Name given to the file by the user for identification is called........................
a.File name
b.File  attributes
c.File operating

ans: a

Information provided by the operating system to the file is called.....................
a.File name
b.File attributes
c.File operation

ans: b

Operating used to add information with the content of the file is called......................
a.Open
b.Read
c.Append

ans: c

Nature of information within the files is given by..............................
a.File name
b.File attributes
c.File type

ans: c

In which file system structure information are stored as a fixed length records having same number of field.....................
a.Byte sequence
b.Record sequence
c.Tree based

ans: b

Protecting the information from physical damages is called.............................
a.Reliability
b.Protection
c.Recovery

ans: a

DOS program which is used to handle and correct inconsistencies is.........................
a.FDISK
b.Scandisk
c.REN

ans: b

Process of making blank medium for computer use is called.......................
a.Recovery
b.Reliability
c.Formatting

ans: c

Process of servicing the disk request in some order is called.....................
a.Disk formatting
b.Disk scheduling
c.Recovery

ans: b

Time taken by the read/write head of a disk to the target track is called.....................
a.Latency time
B.Rotation time
c.Service time

ans: c

In which disk scheduling alogoritham the read/ write head of the disk moves from one end towards the other end in order to service all the requested track for the process........................
a.First come first served
b.SCAN scheduling
c.C-SCAN scheduling

ans: b

....................runs on computer hardware and serve as platform for other software to run on
a.Operating system
b.Application software
c.System software

ans: a

........................is the layer of a computer system between the hardware and the user program
a.Operating environment
b.Operating system
c.System environment

ans: b
In segmentation physical address is calculated by using.........................
a.Base address and offset
b.Base address and segment number
c.offset and size

ans: a

Which of the following is a memory management technique which uses the concept of virtual memory........................
a.Contiguous allocation
b.Paging
c.Demand paging

ans: c

Non-availability of  a needed page by the CPU in main memory is called........................
a.Locality of reference
b.Page fault
c.Working set

ans: b

Set of pages within the locality of reference referred at any moment during reference referred at any moment during execution is called........................
a.Working set

b.Locality of reference
c.Page fault

ans: a

Pages which are modified during execution is called......................
a.Page fault
b.Dirty page
c.Thrashing

ans: b

Rate at which page fault occur during execution of a program is called...................
a.Thrashing
b.Page fault
c.Working set

ans: a

Principle used to select a particular page frame for freeing is called..................
a.Locality of reference
b.Page replacement policy
c.String

ans: b

During execution the program refers pages in the memory using memory address is some order the resulting page address sequence is called.........................

a.Locality of reference
b.Page replacement policy
c.Reference string

ans: c

Which of the following is a memory area that holds data during input/output transfer.................................
a.Cache
b.Buffer
c.Stack

ans: b

Data are stored on the magnetic disk surface in the form of concentric circle called...........................
a.Head
b.Track
c.Cylinder

ans: a

Collection of corresponding tracks in all sides of disk is called.......................
a.Cylinder
b.Sector
c.Head

ans: b

Basic element of data is called.........................
a.Field
b.Record
c.File

ans: a

Collection of related fields is called.........................
a.Field
b.Record
c.File

ans: b

Collection of similar records is  called...........................
a.Field
b.Record
c.File

ans: c


If  there is a directed edge from resource to process then that edge is called.........................
a.Assignment edge
b.Request edge
c.Response edge

ans: a

Process of finding the deadlock in the system is....................
a.Deadlock recovery
b.Deadlock detection
c.Deadlock avoidance

ans:  b

Process of breaking the deadlock detected by the detection algorithm is .........................
a.Deadlock detection
b.Deadlock recovery
c.Deadlock avoidance

ans: b

Process of   converting the logical address generated by CPU to actual physical address is.........................
a.Relocation
b.Overlaying
c.Scheduling

ans: a

Fragmentation is solved in which contiguous allocation method...................
a.Single partition allocation
b.Single partition allocation
c.Relocatable partition allocation

ans: c

Process of moving the content of all allocated partitions in one side & all the free memory in other side is called.....................

a.Compaction
b.Relocation
c.Swapping

ans: a

In paging each user process is divided in to equal pieces called......................
a.Frames
b.Segments
c.Pages

ans: c

In paging physical memory is divided into equal pieces called.....................
a.Frames
b.Segments
c.Pages

ans: a

Addresses of the frequently needed pages and its corresponding frame number is loaded in......................
a.Pages is loaded in
b.Translation look aside buffer
c.File map table

ans: b

Process of guarding the memory from unauthorized  access is called...................
a.Sharing
b.Translation
c.Protection

ans: a

Process of mapping a page with many other processes is called.....................

a.Sharing
b.Translation
c.Protection

ans: a

Which of the following is a memory management technique which uses the users view of memory........................
a.Contiguous allocation
b.Segmentation
c.Paging

ans: b

Starting address of the segment in the memory is given by....................
a.Base
b.Size
c.Segment number

ans: a

Monday 3 October 2011

System calls which is used to control the execution of the process is called........................
a.Process control call
b.Fill manipulation call
c.Device manage call

ans: a

System calls which is used to exchange information between different processes....................
a.Process control call
b.File manipulation call
c.Communication call

ans: c

Time interval between the submission of request  for CPU by the process unit the first response is produced is called.............................
a.Throughput
b.Processor efficiency
c.Fairness

ans: a

An area in main memory that can be shared by more than one process is called........................
a.Shared memory
b.Shared variable
c.Job pool

ans: a

In which communication technique the process that wants to communicate must explicitly name the sender or recipient of the communication...................................
a.Direct communication
b.Message passing
c.Direct communication

ans: c

If more than one process share a common variable concurrently the result of the execution will be different depending on the order of execution of  the processes this situation is called ...................
a.Mutual
b.Race condition
c.Semaphores

ans: b

Which of the following is a code segment in all process using this only the processes can access shared variable or files......................
a.Semaphores
b.Critical section
c.Mutual exclusion

ans: a

If a process pi is executing in its critical section then no process is allowed to enter into its critical section this concept is called.........................
a.Critical section
b.Mutual exclusion
c.send section

ans: b

Which of the following is an integer variables denoted by the letter S....................
a.Semaphores
b.Critical section
b.Mutual exclusion

ans: a

Operating used to increment semaphore is ............................
a.Wait
b.Signal
c.Lock

ans: b

Mutual exclusion  is achieved by ..........................
a.Race condition
b.Critical section
c.Locks

ans: c

Which of the  following  is a  special structure used to attain mutual exclusion among co-operating process......................
a.Monitors
b.Locks
c.Section

ans: a

Processes utilize the needed resources in the  following sequence.......................
a.Request,use,release
b.Use,request,release
c.Request release use

ans: a

If there is a directed edge from process to resource, then that edge is called.......................
a.Assignment edge
b.Request edge
c.Direct edge

ans: c
Computer system connected either using wire or wireless is called......................
a.Embedded operating system
b.Distributed operating system
c.Desktop operating system

ans: b

Computer system that control device such as TV, Microwave ovens is called.............................
a.Embedded operating system
b.multi operating system
c.Distributed operating system

ans: a

Which of  the following is an example for embedded operating system....................
a.Unix
b.Palm OS
c.Sun  Os

ans: b

Multiprogramming operating system was introduced by.......................
a.INTEL
b.Windows
c.IBM

ans:  b

Operating system that control the industrial process is known as...........................
a.Real time operating system
b.Run time operating system
c.Stop time operating system

ans: a

Which of the following is a batch operating system.........................
a.UNIX
b.OS/390
c.FMS

ans: c

Set of instruction is called................................
a.Program
b.Process
c.Task

ans: b

Which of the following is a technique involved in creating a process and to assign process attributes.............
a.Multiplexing
b.Tasking
c.Scheduling

ans: b

When a process is created then that state  is called...................
a.New
b.Ready
c.Waiting

ans: a

When a process is waiting to be assigned to a processor then that state is called..........................
a.New
b.Waiting
c.Ready

ans: c

When a process is executed in CPU then that state is called.............................
a.Running
b.Waiting
c.Ready

ans: a

When a process is waiting for some event then that state is called.........................
a..Ready
b.Running
c.Waiting

ans: c

Whenever the running process is suspended the content of the process control block are saved on......................
a.Queue
b.Pointer
c.Stack

ans: a
Memory allocation scheme subject to external fragmentation is......................
a.Segmentation
b.Swapping
c.Demand paging

ans: a

In which of the following page replacement policies, Balady's anomaly occur
a.FIFO
b.LRU
c.NRU

ans: b

The principal of locality of reference justify the use of..................
a.Virtual memory
b.Cache memory
c.Non-reusable memory

ans: b

A system program that sets up an executable program in main memory ready for execution is...............
a.Linker
b.Compiler
c.Loader

ans: c

A computer cannot boot if it does not have......................
 a.Assembler
b.Operating system
c.Loader

ans: b

To avoide the race condition the number of process that simultaneously inside the critical section is.....................
a.8
b.1
c.0

ans: b

Access time is highest in the case of ......
a.Floppy disk
b.Magnetic disk
c.Cache

ans: c

Most common system security method...........................
a.Password
b.Encryption
c.Firewall

ans: a

Virtual memory is ................
a.Simple to implement
b.Used in all major commerical operating system
c.Less efficient in utilization of memory

ans: b

System maintenance.................
a.Usually not necessary
b.Always requires several program
c.Is necessary on all system

ans: c

Which of the following operating system used write  through caches.......................
a.UNIX
b.DOS
c.XENIX

ans: a

Operating system is a collection of ......................
a.Fireware
b.Hardware
c.Software

ans: c

Main frame operating system was developed by.........................
a.INTEL
b.IIT
c.MIT

ans: c

Which of the following operating system provide a good interface to a single user with the computer................
a.Embedded with the system
b.Distributed operating system
c.Desktop operating system

ans: c

Computer system has more than one CPU is called.................
a.Distributed operating system
b.Multiprocessor operating system
c.Multi-user operating system

ans: b

Producer consumer problem can be  solved using ......................
a.Semaphores       
b,Variables
c,Event counters

ans: a

Non-modifiable procedures are called.....................
a.Topdown procedures
b.Reentrant procedures
c.Concurrent procedures

ans: b

In order to allow only one process to enter its critical section binary 
semaphore is initialized to..............
a.2 
b.0
c.1
  
ans:  b

Indicate which is a pre-emptive scheduling algorithm
a.round robin
b.shortest job first
c.priority based 

ans:b

Which of the following is a type ofsystems software used on micro-
 computers?..............
a.MS-DOS
b.PC-DOS
c.UNIX
 
ans:  b

What is the name of operating system
for the laptop computer called Mac life?...............
a.DOS
b,Windows
c.OZ
  
ans: c

what is the name of operating system for  the laptop computer called mac life?...................
a.DOS
b.Windows
C.OZ

ans: c

What is the operating system used by macinotosh computer?................
a.AU/X
b.System 7.0
c.UNIX

ans: c

When did IBM release the first version of disk operating system DOS version 1.0?.................
a.1981
b.1982
c.1967

ans: a

Special software to create a job queue is called .............
a.Linkage editor
b.Drive
c.Interpreter

ans: b

A process another name for  ...................
a.Task
b.Paying
c.Job

ans: c

The register or main memory location which contain the effective address of the operand is known as...........
a.Pointer
b.Index register
c.Scratch pad

ans: b

Round robin scheduling is essentially the premptive version of.......................
a.FCFS
b.Congest time first
c.FILO

ans: b

Which of the following is necessary to work on a computer......................
a.Compiler
b.Assembler
c.Operating system

ans: c

The error that can be pointed out by the compiler are .........................
a.Syntax error
b.Semantic error
c.Logical error

ans: a

A translator is describe as........................
a.Microprogram
b.System software
c.Application software

 ans: c