Monday, 3 October 2011

Memory allocation scheme subject to external fragmentation is......................
a.Segmentation
b.Swapping
c.Demand paging

ans: a

In which of the following page replacement policies, Balady's anomaly occur
a.FIFO
b.LRU
c.NRU

ans: b

The principal of locality of reference justify the use of..................
a.Virtual memory
b.Cache memory
c.Non-reusable memory

ans: b

A system program that sets up an executable program in main memory ready for execution is...............
a.Linker
b.Compiler
c.Loader

ans: c

A computer cannot boot if it does not have......................
 a.Assembler
b.Operating system
c.Loader

ans: b

To avoide the race condition the number of process that simultaneously inside the critical section is.....................
a.8
b.1
c.0

ans: b

Access time is highest in the case of ......
a.Floppy disk
b.Magnetic disk
c.Cache

ans: c

Most common system security method...........................
a.Password
b.Encryption
c.Firewall

ans: a

Virtual memory is ................
a.Simple to implement
b.Used in all major commerical operating system
c.Less efficient in utilization of memory

ans: b

System maintenance.................
a.Usually not necessary
b.Always requires several program
c.Is necessary on all system

ans: c

Which of the following operating system used write  through caches.......................
a.UNIX
b.DOS
c.XENIX

ans: a

Operating system is a collection of ......................
a.Fireware
b.Hardware
c.Software

ans: c

Main frame operating system was developed by.........................
a.INTEL
b.IIT
c.MIT

ans: c

Which of the following operating system provide a good interface to a single user with the computer................
a.Embedded with the system
b.Distributed operating system
c.Desktop operating system

ans: c

Computer system has more than one CPU is called.................
a.Distributed operating system
b.Multiprocessor operating system
c.Multi-user operating system

ans: b

No comments:

Post a Comment