Memory allocation scheme subject to external fragmentation is......................
a.Segmentation
b.Swapping
c.Demand paging
ans: a
In which of the following page replacement policies, Balady's anomaly occur
a.FIFO
b.LRU
c.NRU
ans: b
The principal of locality of reference justify the use of..................
a.Virtual memory
b.Cache memory
c.Non-reusable memory
ans: b
A system program that sets up an executable program in main memory ready for execution is...............
a.Linker
b.Compiler
c.Loader
ans: c
A computer cannot boot if it does not have......................
a.Assembler
b.Operating system
c.Loader
ans: b
To avoide the race condition the number of process that simultaneously inside the critical section is.....................
a.8
b.1
c.0
ans: b
Access time is highest in the case of ......
a.Floppy disk
b.Magnetic disk
c.Cache
ans: c
Most common system security method...........................
a.Password
b.Encryption
c.Firewall
ans: a
Virtual memory is ................
a.Simple to implement
b.Used in all major commerical operating system
c.Less efficient in utilization of memory
ans: b
System maintenance.................
a.Usually not necessary
b.Always requires several program
c.Is necessary on all system
ans: c
Which of the following operating system used write through caches.......................
a.UNIX
b.DOS
c.XENIX
ans: a
Operating system is a collection of ......................
a.Fireware
b.Hardware
c.Software
ans: c
Main frame operating system was developed by.........................
a.INTEL
b.IIT
c.MIT
ans: c
Which of the following operating system provide a good interface to a single user with the computer................
a.Embedded with the system
b.Distributed operating system
c.Desktop operating system
ans: c
Computer system has more than one CPU is called.................
a.Distributed operating system
b.Multiprocessor operating system
c.Multi-user operating system
ans: b
a.Segmentation
b.Swapping
c.Demand paging
ans: a
In which of the following page replacement policies, Balady's anomaly occur
a.FIFO
b.LRU
c.NRU
ans: b
The principal of locality of reference justify the use of..................
a.Virtual memory
b.Cache memory
c.Non-reusable memory
ans: b
A system program that sets up an executable program in main memory ready for execution is...............
a.Linker
b.Compiler
c.Loader
ans: c
A computer cannot boot if it does not have......................
a.Assembler
b.Operating system
c.Loader
ans: b
To avoide the race condition the number of process that simultaneously inside the critical section is.....................
a.8
b.1
c.0
ans: b
Access time is highest in the case of ......
a.Floppy disk
b.Magnetic disk
c.Cache
ans: c
Most common system security method...........................
a.Password
b.Encryption
c.Firewall
ans: a
Virtual memory is ................
a.Simple to implement
b.Used in all major commerical operating system
c.Less efficient in utilization of memory
ans: b
System maintenance.................
a.Usually not necessary
b.Always requires several program
c.Is necessary on all system
ans: c
Which of the following operating system used write through caches.......................
a.UNIX
b.DOS
c.XENIX
ans: a
Operating system is a collection of ......................
a.Fireware
b.Hardware
c.Software
ans: c
Main frame operating system was developed by.........................
a.INTEL
b.IIT
c.MIT
ans: c
Which of the following operating system provide a good interface to a single user with the computer................
a.Embedded with the system
b.Distributed operating system
c.Desktop operating system
ans: c
Computer system has more than one CPU is called.................
a.Distributed operating system
b.Multiprocessor operating system
c.Multi-user operating system
ans: b
No comments:
Post a Comment