- Quiz will start as soon as you click the ‘Start Quiz‘ button below.
- Question will come one by one click on next for next question
- There are 30 questions in this quiz, you will get 30 Minutes to attempt.
- 2 Marks is determined for the correct answer for each question. There is no negative marking for incorrect answer.
- After the quiz is over, in order to know your rank in the Ranking List / Leader-board below, you should enter your name and email address, otherwise you will be deprived of it.
- After completing click on finish Quiz
- To see correct answers click on view Question
- जैसे ही आप नीचे दिए गए ‘स्टार्ट क्विज़’ बटन पर क्लिक करेंगे, क्विज़ शुरू हो जाएगा।
प्रश्न अगले प्रश्न के लिए अगले एक क्लिक पर आएगा
इस क्विज में 30 प्रश्न हैं, आपको प्रयास करने के लिए 30 मिनट मिलेंगे।
प्रत्येक प्रश्न के सही उत्तर के लिए 2 अंक निर्धारित किए गए हैं। गलत उत्तर के लिए कोई नकारात्मक अंकन नहीं है।
प्रश्नोत्तरी समाप्त होने के बाद, नीचे दी गई रैंकिंग सूची / लीडर-बोर्ड में अपनी रैंक जानने के लिए, आपको अपना नाम और ईमेल पता दर्ज करना चाहिए, अन्यथा आप इससे वंचित रह जाएंगे।
फिनिश क्विज़ पर क्लिक करने के बाद
सही उत्तर देखने के लिए प्रश्न पर क्लिक करें
Paper 2 CS System Software & Operating System Part 4
Quiz-summary
0 of 30 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
Information
Paper 1 Quiz helps u to Excel in NET JRF
Paper 1 All questions 2 Marks each
- Navdeep Kaur
- All the Best
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
-
Average marks Improve next time All the Best
-
Nice Keep it up, Stay Blessed
-
Awesome Great Marks, Keep doing
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- Answered
- Review
-
Question 1 of 30
1. Question
2 points“A system has n resources R0,..,Rn-1 and k processes P0,..Pk-1. The implementation of the resources request logic of each process Pi is a follows:
if(i%2==0)
{
if(iif(i+2 }
else
{
if(iif(i+2 < n) request Rn-i-2
}
In which one of the following situations is a deadlock possible?
“Correct
“Consider the case where i = 10 & i = 11, n = 21 & k = 12
P10 requests R10 & R11
P11 requests R10 & R8
Hence P10 & P11 inorder in deadlock.
“Incorrect
“Consider the case where i = 10 & i = 11, n = 21 & k = 12
P10 requests R10 & R11
P11 requests R10 & R8
Hence P10 & P11 inorder in deadlock.
“ -
Question 2 of 30
2. Question
2 pointsA system contains three programs and each requires three tape units for its operation. The minimum number of tape units which the system must have such that deadlocks never arise is__
Correct
“Three programs and each requires 3 tapes.
We will allocate minimum two tapes to each program then total tapes are 6 and each program requires one more tape to complete its operation.
So, we will allocate one tape to one program and that program will complete its operation.
After completion of operation of one program, all tapes allocated to that program are free. So no need of the extra tape to complete action.
Minimum tapes required are=(3*2 tape units) + 1 tape unit = 7″Incorrect
“Three programs and each requires 3 tapes.
We will allocate minimum two tapes to each program then total tapes are 6 and each program requires one more tape to complete its operation.
So, we will allocate one tape to one program and that program will complete its operation.
After completion of operation of one program, all tapes allocated to that program are free. So no need of the extra tape to complete action.
Minimum tapes required are=(3*2 tape units) + 1 tape unit = 7″ -
Question 3 of 30
3. Question
2 pointsThe process of entering data into a storage location
Correct
The process of entering data into a storage location is destructive of previous contents using memory management techniques. In paging we are using LRU for replacing existing data.
Incorrect
The process of entering data into a storage location is destructive of previous contents using memory management techniques. In paging we are using LRU for replacing existing data.
-
Question 4 of 30
4. Question
2 pointsFor Providing large storage space the semiconductor based storage is not permitted now a days due to their:
Correct
→ In the case of semiconductor based memory technology, we get speed but the increase in the integration of various devices the cost is high.
Incorrect
→ In the case of semiconductor based memory technology, we get speed but the increase in the integration of various devices the cost is high.
-
Question 5 of 30
5. Question
2 pointsLet the next generation computer systems of 64 bit has virtual address space is of the same size as the physical address space. In such a case, if we remove the virtual space completely in new systems then which one of the following is true in this scenario?
Correct
“→ When designer decides to get rid of virtual memory entirely then hardware support is no longer needed.
→ Because special hardware support needed only for virtual memory.
→ Virtual memory is an integral part of a modern computer architecture. Implementations usually require hardware support, typically in the form of a memory management unit built into the CPU.
→ While not necessary, emulators and virtual machines can employ hardware support to increase performance of their virtual memory implementations.
“Incorrect
“→ When designer decides to get rid of virtual memory entirely then hardware support is no longer needed.
→ Because special hardware support needed only for virtual memory.
→ Virtual memory is an integral part of a modern computer architecture. Implementations usually require hardware support, typically in the form of a memory management unit built into the CPU.
→ While not necessary, emulators and virtual machines can employ hardware support to increase performance of their virtual memory implementations.
“ -
Question 6 of 30
6. Question
2 points“Consider a disk pack with 32 surfaces, 64 tracks and 512 sectors per pack. 256 bytes of data are stored in a bit serial manner in a sector. The number of bits required to specify a particular sector in the disk is
Correct
“There are 32(25) surfaces, each surface have 64(26) tracks and each surface have 512(29) sectors.
So, to identify each sector uniquely,
5+6+9 = 20-bits are needed.
“Incorrect
“There are 32(25) surfaces, each surface have 64(26) tracks and each surface have 512(29) sectors.
So, to identify each sector uniquely,
5+6+9 = 20-bits are needed.
“ -
Question 7 of 30
7. Question
2 points“Dirty bit is used to show the
Correct
“The Dirty bit in a PCB(process control block) is set if the page is modified after being loading into cache memory.
This bit helps in maintaining updated data in the hard disk.”Incorrect
“The Dirty bit in a PCB(process control block) is set if the page is modified after being loading into cache memory.
This bit helps in maintaining updated data in the hard disk.” -
Question 8 of 30
8. Question
2 pointsA linker is given object module for a set of programs that were compiled separately. What information need not be included in an object module?
Correct
” ●In object module it includes names and locations of all external symbols defined in the object module.
● To link to external symbols it must know the location of external symbols.
● So object module won’t consists of absolute addresses of internal symbols , Option D is correct.
“Incorrect
” ●In object module it includes names and locations of all external symbols defined in the object module.
● To link to external symbols it must know the location of external symbols.
● So object module won’t consists of absolute addresses of internal symbols , Option D is correct.
“ -
Question 9 of 30
9. Question
2 pointsThe file structure that redefines its first record at a base of zero uses the term
Correct
” ●A relative record file contains records ordered by their relative key, a record number that represents the location of the record relative to where the file begins.
● For example, the first record in a file has a relative record number of 1, the tenth record has a relative record number of 10, and so forth. The records can have fixed length or variable length.
“Incorrect
” ●A relative record file contains records ordered by their relative key, a record number that represents the location of the record relative to where the file begins.
● For example, the first record in a file has a relative record number of 1, the tenth record has a relative record number of 10, and so forth. The records can have fixed length or variable length.
“ -
Question 10 of 30
10. Question
2 pointsA long-term monitor
Correct
”
● Long term monitor metrics, as the name indicates, are the metrics that are collected for a resource for a longer term monitoring perspective. They are useful for continuous ongoing monitoring of the managed system.
● Monitoring the performance of operating systems and processes is essential to debug processes and systems, effectively manage system resources, making system decisions, and evaluating and examining systems.”Incorrect
”
● Long term monitor metrics, as the name indicates, are the metrics that are collected for a resource for a longer term monitoring perspective. They are useful for continuous ongoing monitoring of the managed system.
● Monitoring the performance of operating systems and processes is essential to debug processes and systems, effectively manage system resources, making system decisions, and evaluating and examining systems.” -
Question 11 of 30
11. Question
2 pointsDetermine the number of page faults when references to pages occur in the following order:1,2,4,5,2,1,2,4. Assume that the main memory can accommodate 3 pages and the main memory already has the pages 1 and 2, with page 1 having been brought earlier than page 2.(LRU algorithm is used)
Correct
Incorrect
-
Question 12 of 30
12. Question
2 pointsWorking set(t,k) at an instant of time,t,is
Correct
“→Working set defines the amount of memory that a process requires in a given time interval.
→ It defines “the working set of information W(t,τ) of a process at time t to be the collection of information referenced by the process during the process time interval (t−τ,t)”.
→ Typically the units of information in question are considered to be memory pages. This is suggested to be an approximation of the set of pages that the process will access in the future (say during the next τ time units), and more specifically is suggested to be an indication of what pages ought to be kept in main memory to allow most progress to be made in the execution of that process.
“Incorrect
“→Working set defines the amount of memory that a process requires in a given time interval.
→ It defines “the working set of information W(t,τ) of a process at time t to be the collection of information referenced by the process during the process time interval (t−τ,t)”.
→ Typically the units of information in question are considered to be memory pages. This is suggested to be an approximation of the set of pages that the process will access in the future (say during the next τ time units), and more specifically is suggested to be an indication of what pages ought to be kept in main memory to allow most progress to be made in the execution of that process.
“ -
Question 13 of 30
13. Question
2 pointsThe shell
Correct
“● A Unix shell is a command-line interpreter or shell that provides a command line user interface for Unix-like operating systems.
● The shell is both an interactive command language and a scripting language, and is used by the operating system to control the execution of the system using shell scripts.
“Incorrect
“● A Unix shell is a command-line interpreter or shell that provides a command line user interface for Unix-like operating systems.
● The shell is both an interactive command language and a scripting language, and is used by the operating system to control the execution of the system using shell scripts.
“ -
Question 14 of 30
14. Question
2 pointsSoftware that measures, monitors, analyzes and controls real world events is called
Correct
“● System software is a type of computer program that is designed to run a computer’s hardware and application programs.
● Real-time software enables the user to execute various task and activities all at the same time, as long as the programs are kept open.Real-time software refers to programs that can perform their assigned duties and functions right when they are assigned to run their given processes, not after the program has been executed, and not on a scheduled date
● Scientific software is defined by three characteristics: (1) it is developed to answer a scientific question; (2) it relies on the close involvement of an expert in its scientific domain; and (3) it provides data to be examined by the person who will answer that question.
● Business software or a business application is any software or set of computer programs used by business users to perform various business functions. These business applications are used to increase productivity, to measure productivity and to perform other business functions accurately.”Incorrect
“● System software is a type of computer program that is designed to run a computer’s hardware and application programs.
● Real-time software enables the user to execute various task and activities all at the same time, as long as the programs are kept open.Real-time software refers to programs that can perform their assigned duties and functions right when they are assigned to run their given processes, not after the program has been executed, and not on a scheduled date
● Scientific software is defined by three characteristics: (1) it is developed to answer a scientific question; (2) it relies on the close involvement of an expert in its scientific domain; and (3) it provides data to be examined by the person who will answer that question.
● Business software or a business application is any software or set of computer programs used by business users to perform various business functions. These business applications are used to increase productivity, to measure productivity and to perform other business functions accurately.” -
Question 15 of 30
15. Question
2 pointsWhen a computer is first turned on or restart, a special type of absolute loader is executed called
Correct
“● A boot loader is a type of program that loads and starts the boot time tasks and processes of an operating system or the computer system. It enables loading the operating system with in the computer memory when a computer is started or booted up.
● A boot loader is also known as a boot manager or bootstrap loader. Bootstrap loader is a program that resides in the computer’s EPROM, ROM, or other non-volatile memory. The bootstrap loader reads the hard drives boot sector to continue the process of loading the computer’s operating system. The term bootstrap comes from the old phrase “”Pull yourself up by your bootstraps.”””Incorrect
“● A boot loader is a type of program that loads and starts the boot time tasks and processes of an operating system or the computer system. It enables loading the operating system with in the computer memory when a computer is started or booted up.
● A boot loader is also known as a boot manager or bootstrap loader. Bootstrap loader is a program that resides in the computer’s EPROM, ROM, or other non-volatile memory. The bootstrap loader reads the hard drives boot sector to continue the process of loading the computer’s operating system. The term bootstrap comes from the old phrase “”Pull yourself up by your bootstraps.””” -
Question 16 of 30
16. Question
2 points“Which of the following is the internal memory of the system(computer)?
“Correct
Incorrect
-
Question 17 of 30
17. Question
2 points“Suppose for a process P, reference to pages in order are 1, 2, 4, 5, 2, 1, 2, 4. Assume that main memory can accommodate 3 pages and the main memory has already pages 1 and 2 in the order 1 – first, 2- second. At this moment, assume FIFO Page Replacement Algorithm is used then the number of page faults that occur to complete the execution of process P is
“
Correct
Incorrect
-
Question 18 of 30
18. Question
2 points“______________ system call creates new process in Unix.
Correct
fork system call is used to creates a new process in Unix.
Incorrect
fork system call is used to creates a new process in Unix.
-
Question 19 of 30
19. Question
2 points“A process residing in main memory and ready and waiting for execution, is kept on
“
Correct
A process residing in main memory and ready and waiting for execution, is kept on Ready queue.
Incorrect
A process residing in main memory and ready and waiting for execution, is kept on Ready queue.
-
Question 20 of 30
20. Question
2 pointsIn which one of the following pages replacement policies, Belady’s anomaly may occur?
Correct
“● Bélády’s anomaly is the phenomenon in which increasing the number of page frames results in an increase in the number of page faults for certain memory access patterns.
● This phenomenon is commonly experienced when using the first-in first-out (FIFO) page replacement algorithm.
● In FIFO, the page fault may or may not increase as the page frames increase, but in Optimal and stack-based algorithms like LRU, as the page frames increase the page fault decreases.
“Incorrect
“● Bélády’s anomaly is the phenomenon in which increasing the number of page frames results in an increase in the number of page faults for certain memory access patterns.
● This phenomenon is commonly experienced when using the first-in first-out (FIFO) page replacement algorithm.
● In FIFO, the page fault may or may not increase as the page frames increase, but in Optimal and stack-based algorithms like LRU, as the page frames increase the page fault decreases.
“ -
Question 21 of 30
21. Question
2 pointsA process that is based on IPC mechanism which executes on different systems and can communicate with other processes using message based communication is called__
Correct
“● Remote Procedure Call (RPC) is a protocol that one program can use to request a service from a program located in another computer on a network without having to understand the network’s details.
● A procedure call is also sometimes known as a function call or a subroutine call.
● inter-process communication or interprocess communication (IPC) refers specifically to the mechanisms an operating system provides to allow the processes to manage shared data.
● The RMI (Remote Method Invocation) is an API that provides a mechanism to create distributed application in java. The RMI allows an object to invoke methods on an object running in another JVM.
“Incorrect
“● Remote Procedure Call (RPC) is a protocol that one program can use to request a service from a program located in another computer on a network without having to understand the network’s details.
● A procedure call is also sometimes known as a function call or a subroutine call.
● inter-process communication or interprocess communication (IPC) refers specifically to the mechanisms an operating system provides to allow the processes to manage shared data.
● The RMI (Remote Method Invocation) is an API that provides a mechanism to create distributed application in java. The RMI allows an object to invoke methods on an object running in another JVM.
“ -
Question 22 of 30
22. Question
2 pointsconsider a system with m resources of same type being shared by n processes. Resources can be requested and release by processes only one at a time. The system is deadlock free if and only if:
Correct
“Suppose N = Sum of all Needi,
A = Sum of all Allocation,
M = Sum of all Maxi.
Prove:
→ Assume this system is not deadlock free. If there exists a deadlock state, then A = m because there’s only one kind of resource and resources can be requested and released only one at a time.
→ From condition b, N + A = M < m + n. So we get N + m < m + n. So we get N < n. It shows that at least one process i that Needi = 0. From condition a, Pi can release at least 1 resource.
→ So there are n-1 processes sharing m resources now, condition a and b still hold. Go on the argument, no process will wait permanently, so there’s no deadlock.
“Incorrect
“Suppose N = Sum of all Needi,
A = Sum of all Allocation,
M = Sum of all Maxi.
Prove:
→ Assume this system is not deadlock free. If there exists a deadlock state, then A = m because there’s only one kind of resource and resources can be requested and released only one at a time.
→ From condition b, N + A = M < m + n. So we get N + m < m + n. So we get N < n. It shows that at least one process i that Needi = 0. From condition a, Pi can release at least 1 resource.
→ So there are n-1 processes sharing m resources now, condition a and b still hold. Go on the argument, no process will wait permanently, so there’s no deadlock.
“ -
Question 23 of 30
23. Question
2 points“Semaphores are used to solve the problem of
I. Race Condition
II. Process Synchronization
III. Mutual Exclusion
IV. None of the above
“Correct
“Semaphore are used to solve the problem of process synchronization and mutual exclusion.
Semaphore are 2 types.
Counting semaphore
Binary semaphore
“Incorrect
“Semaphore are used to solve the problem of process synchronization and mutual exclusion.
Semaphore are 2 types.
Counting semaphore
Binary semaphore
“ -
Question 24 of 30
24. Question
2 pointsIf there are 32 segments, each size 1K bytes, then the logical address should have
Correct
“Given data, total 32 segments
Each segment size is 1K bytes.
Find the logical address=?
32 segments=25
Segment size=210
⇒ 25*210
⇒ 215
So, 15 bits are required.
“Incorrect
“Given data, total 32 segments
Each segment size is 1K bytes.
Find the logical address=?
32 segments=25
Segment size=210
⇒ 25*210
⇒ 215
So, 15 bits are required.
“ -
Question 25 of 30
25. Question
2 pointsSuppose a system contains n processes and system uses the round-robin algorithm for CPU scheduling then which data structure is best suited for ready queue of the process
Correct
“→ This type of scheduling is one of the very basic algorithms for Operating Systems in computers which can be implemented through circular queue data structure.
→ Round-robin (RR) is one of the algorithms employed by process and network schedulers in computing.
→ As the term is generally used, time slices (also known as time quanta) are assigned to each process in equal portions and in circular order, handling all processes without priority (also known as cyclic executive).
→ Round-robin scheduling is simple, easy to implement, and starvation-free.
→ Round-robin scheduling can also be applied to other scheduling problems, such as data packet scheduling in computer networks.
“Incorrect
“→ This type of scheduling is one of the very basic algorithms for Operating Systems in computers which can be implemented through circular queue data structure.
→ Round-robin (RR) is one of the algorithms employed by process and network schedulers in computing.
→ As the term is generally used, time slices (also known as time quanta) are assigned to each process in equal portions and in circular order, handling all processes without priority (also known as cyclic executive).
→ Round-robin scheduling is simple, easy to implement, and starvation-free.
→ Round-robin scheduling can also be applied to other scheduling problems, such as data packet scheduling in computer networks.
“ -
Question 26 of 30
26. Question
2 pointsAt a particular time of computation the value of a counting semaphore is 7. Then 20 P operations and 15 V operations were completed on this semaphore. The resulting value of the semaphore is :
Correct
“Counting semaphore value is 7
After 20 P operations value of semaphore = 7 – 20 = -13
After 15 V operations value of semaphore = -13 + 15 = 2
“Incorrect
“Counting semaphore value is 7
After 20 P operations value of semaphore = 7 – 20 = -13
After 15 V operations value of semaphore = -13 + 15 = 2
“ -
Question 27 of 30
27. Question
2 pointsIncreasing the RAM of a computer typically improves performance because:
Correct
“→ When page frames increases, then no. of page faults decreases.
→ Such as if RAM size increases, then no. of page entries increases, then no. of page faults decreases.
“Incorrect
“→ When page frames increases, then no. of page faults decreases.
→ Such as if RAM size increases, then no. of page entries increases, then no. of page faults decreases.
“ -
Question 28 of 30
28. Question
2 points“Consider the following program.
main()
{
fork();
fork();
fork();
}
How many new processes will be created?
“Correct
“The no. of child process created = (2^n) -1
= (2^3) -1
= 7
(where n is number of fork() statements)
“Incorrect
“The no. of child process created = (2^n) -1
= (2^3) -1
= 7
(where n is number of fork() statements)
“ -
Question 29 of 30
29. Question
2 points“Which of the following statements is FALSE?
Correct
“→ Long term scheduler controls the degree of multiprogramming.
→ Ready queue of the processes resides in main memory.
→ A process can have multiple sub processes.
→ Multiple process of a single program cannot exist because each program can have only one process.
“Incorrect
“→ Long term scheduler controls the degree of multiprogramming.
→ Ready queue of the processes resides in main memory.
→ A process can have multiple sub processes.
→ Multiple process of a single program cannot exist because each program can have only one process.
“ -
Question 30 of 30
30. Question
2 pointsDirty bit for a page in a page table
Correct
→ The dirty bit allows for a performance optimization i.e., Dirty bit for a page in a page table helps to avoid unnecessary writes on a paging device.
Incorrect
→ The dirty bit allows for a performance optimization i.e., Dirty bit for a page in a page table helps to avoid unnecessary writes on a paging device.
- Next Quiz Daily at navclasses.in 12 PM
- Paper 2 Sunday at navclasses.in
Study Paper 1 Topics for Free Click Here
Get subscription for Complete Preparation NTA NET JRF: https://unacademy.com/subscribe/TEWDQ
use my referral code for 10% additional discount: NAVCLASSES
Search Navdeep Kaur and start watching ongoing courses
NTA NET Paper 1
Paper 2 CS System Software & Operating System Part 4
Quiz-summary
0 of 30 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
Information
Paper 1 Quiz helps u to Excel in NET JRF
Paper 1 All questions 2 Marks each
- Navdeep Kaur
- All the Best
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
-
Average marks Improve next time All the Best
-
Nice Keep it up, Stay Blessed
-
Awesome Great Marks, Keep doing
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- Answered
- Review
-
Question 1 of 30
1. Question
2 points“A system has n resources R0,..,Rn-1 and k processes P0,..Pk-1. The implementation of the resources request logic of each process Pi is a follows:
if(i%2==0)
{
if(iif(i+2 }
else
{
if(iif(i+2 < n) request Rn-i-2
}
In which one of the following situations is a deadlock possible?
“Correct
“Consider the case where i = 10 & i = 11, n = 21 & k = 12
P10 requests R10 & R11
P11 requests R10 & R8
Hence P10 & P11 inorder in deadlock.
“Incorrect
“Consider the case where i = 10 & i = 11, n = 21 & k = 12
P10 requests R10 & R11
P11 requests R10 & R8
Hence P10 & P11 inorder in deadlock.
“ -
Question 2 of 30
2. Question
2 pointsA system contains three programs and each requires three tape units for its operation. The minimum number of tape units which the system must have such that deadlocks never arise is__
Correct
“Three programs and each requires 3 tapes.
We will allocate minimum two tapes to each program then total tapes are 6 and each program requires one more tape to complete its operation.
So, we will allocate one tape to one program and that program will complete its operation.
After completion of operation of one program, all tapes allocated to that program are free. So no need of the extra tape to complete action.
Minimum tapes required are=(3*2 tape units) + 1 tape unit = 7″Incorrect
“Three programs and each requires 3 tapes.
We will allocate minimum two tapes to each program then total tapes are 6 and each program requires one more tape to complete its operation.
So, we will allocate one tape to one program and that program will complete its operation.
After completion of operation of one program, all tapes allocated to that program are free. So no need of the extra tape to complete action.
Minimum tapes required are=(3*2 tape units) + 1 tape unit = 7″ -
Question 3 of 30
3. Question
2 pointsThe process of entering data into a storage location
Correct
The process of entering data into a storage location is destructive of previous contents using memory management techniques. In paging we are using LRU for replacing existing data.
Incorrect
The process of entering data into a storage location is destructive of previous contents using memory management techniques. In paging we are using LRU for replacing existing data.
-
Question 4 of 30
4. Question
2 pointsFor Providing large storage space the semiconductor based storage is not permitted now a days due to their:
Correct
→ In the case of semiconductor based memory technology, we get speed but the increase in the integration of various devices the cost is high.
Incorrect
→ In the case of semiconductor based memory technology, we get speed but the increase in the integration of various devices the cost is high.
-
Question 5 of 30
5. Question
2 pointsLet the next generation computer systems of 64 bit has virtual address space is of the same size as the physical address space. In such a case, if we remove the virtual space completely in new systems then which one of the following is true in this scenario?
Correct
“→ When designer decides to get rid of virtual memory entirely then hardware support is no longer needed.
→ Because special hardware support needed only for virtual memory.
→ Virtual memory is an integral part of a modern computer architecture. Implementations usually require hardware support, typically in the form of a memory management unit built into the CPU.
→ While not necessary, emulators and virtual machines can employ hardware support to increase performance of their virtual memory implementations.
“Incorrect
“→ When designer decides to get rid of virtual memory entirely then hardware support is no longer needed.
→ Because special hardware support needed only for virtual memory.
→ Virtual memory is an integral part of a modern computer architecture. Implementations usually require hardware support, typically in the form of a memory management unit built into the CPU.
→ While not necessary, emulators and virtual machines can employ hardware support to increase performance of their virtual memory implementations.
“ -
Question 6 of 30
6. Question
2 points“Consider a disk pack with 32 surfaces, 64 tracks and 512 sectors per pack. 256 bytes of data are stored in a bit serial manner in a sector. The number of bits required to specify a particular sector in the disk is
Correct
“There are 32(25) surfaces, each surface have 64(26) tracks and each surface have 512(29) sectors.
So, to identify each sector uniquely,
5+6+9 = 20-bits are needed.
“Incorrect
“There are 32(25) surfaces, each surface have 64(26) tracks and each surface have 512(29) sectors.
So, to identify each sector uniquely,
5+6+9 = 20-bits are needed.
“ -
Question 7 of 30
7. Question
2 points“Dirty bit is used to show the
Correct
“The Dirty bit in a PCB(process control block) is set if the page is modified after being loading into cache memory.
This bit helps in maintaining updated data in the hard disk.”Incorrect
“The Dirty bit in a PCB(process control block) is set if the page is modified after being loading into cache memory.
This bit helps in maintaining updated data in the hard disk.” -
Question 8 of 30
8. Question
2 pointsA linker is given object module for a set of programs that were compiled separately. What information need not be included in an object module?
Correct
” ●In object module it includes names and locations of all external symbols defined in the object module.
● To link to external symbols it must know the location of external symbols.
● So object module won’t consists of absolute addresses of internal symbols , Option D is correct.
“Incorrect
” ●In object module it includes names and locations of all external symbols defined in the object module.
● To link to external symbols it must know the location of external symbols.
● So object module won’t consists of absolute addresses of internal symbols , Option D is correct.
“ -
Question 9 of 30
9. Question
2 pointsThe file structure that redefines its first record at a base of zero uses the term
Correct
” ●A relative record file contains records ordered by their relative key, a record number that represents the location of the record relative to where the file begins.
● For example, the first record in a file has a relative record number of 1, the tenth record has a relative record number of 10, and so forth. The records can have fixed length or variable length.
“Incorrect
” ●A relative record file contains records ordered by their relative key, a record number that represents the location of the record relative to where the file begins.
● For example, the first record in a file has a relative record number of 1, the tenth record has a relative record number of 10, and so forth. The records can have fixed length or variable length.
“ -
Question 10 of 30
10. Question
2 pointsA long-term monitor
Correct
”
● Long term monitor metrics, as the name indicates, are the metrics that are collected for a resource for a longer term monitoring perspective. They are useful for continuous ongoing monitoring of the managed system.
● Monitoring the performance of operating systems and processes is essential to debug processes and systems, effectively manage system resources, making system decisions, and evaluating and examining systems.”Incorrect
”
● Long term monitor metrics, as the name indicates, are the metrics that are collected for a resource for a longer term monitoring perspective. They are useful for continuous ongoing monitoring of the managed system.
● Monitoring the performance of operating systems and processes is essential to debug processes and systems, effectively manage system resources, making system decisions, and evaluating and examining systems.” -
Question 11 of 30
11. Question
2 pointsDetermine the number of page faults when references to pages occur in the following order:1,2,4,5,2,1,2,4. Assume that the main memory can accommodate 3 pages and the main memory already has the pages 1 and 2, with page 1 having been brought earlier than page 2.(LRU algorithm is used)
Correct
Incorrect
-
Question 12 of 30
12. Question
2 pointsWorking set(t,k) at an instant of time,t,is
Correct
“→Working set defines the amount of memory that a process requires in a given time interval.
→ It defines “the working set of information W(t,τ) of a process at time t to be the collection of information referenced by the process during the process time interval (t−τ,t)”.
→ Typically the units of information in question are considered to be memory pages. This is suggested to be an approximation of the set of pages that the process will access in the future (say during the next τ time units), and more specifically is suggested to be an indication of what pages ought to be kept in main memory to allow most progress to be made in the execution of that process.
“Incorrect
“→Working set defines the amount of memory that a process requires in a given time interval.
→ It defines “the working set of information W(t,τ) of a process at time t to be the collection of information referenced by the process during the process time interval (t−τ,t)”.
→ Typically the units of information in question are considered to be memory pages. This is suggested to be an approximation of the set of pages that the process will access in the future (say during the next τ time units), and more specifically is suggested to be an indication of what pages ought to be kept in main memory to allow most progress to be made in the execution of that process.
“ -
Question 13 of 30
13. Question
2 pointsThe shell
Correct
“● A Unix shell is a command-line interpreter or shell that provides a command line user interface for Unix-like operating systems.
● The shell is both an interactive command language and a scripting language, and is used by the operating system to control the execution of the system using shell scripts.
“Incorrect
“● A Unix shell is a command-line interpreter or shell that provides a command line user interface for Unix-like operating systems.
● The shell is both an interactive command language and a scripting language, and is used by the operating system to control the execution of the system using shell scripts.
“ -
Question 14 of 30
14. Question
2 pointsSoftware that measures, monitors, analyzes and controls real world events is called
Correct
“● System software is a type of computer program that is designed to run a computer’s hardware and application programs.
● Real-time software enables the user to execute various task and activities all at the same time, as long as the programs are kept open.Real-time software refers to programs that can perform their assigned duties and functions right when they are assigned to run their given processes, not after the program has been executed, and not on a scheduled date
● Scientific software is defined by three characteristics: (1) it is developed to answer a scientific question; (2) it relies on the close involvement of an expert in its scientific domain; and (3) it provides data to be examined by the person who will answer that question.
● Business software or a business application is any software or set of computer programs used by business users to perform various business functions. These business applications are used to increase productivity, to measure productivity and to perform other business functions accurately.”Incorrect
“● System software is a type of computer program that is designed to run a computer’s hardware and application programs.
● Real-time software enables the user to execute various task and activities all at the same time, as long as the programs are kept open.Real-time software refers to programs that can perform their assigned duties and functions right when they are assigned to run their given processes, not after the program has been executed, and not on a scheduled date
● Scientific software is defined by three characteristics: (1) it is developed to answer a scientific question; (2) it relies on the close involvement of an expert in its scientific domain; and (3) it provides data to be examined by the person who will answer that question.
● Business software or a business application is any software or set of computer programs used by business users to perform various business functions. These business applications are used to increase productivity, to measure productivity and to perform other business functions accurately.” -
Question 15 of 30
15. Question
2 pointsWhen a computer is first turned on or restart, a special type of absolute loader is executed called
Correct
“● A boot loader is a type of program that loads and starts the boot time tasks and processes of an operating system or the computer system. It enables loading the operating system with in the computer memory when a computer is started or booted up.
● A boot loader is also known as a boot manager or bootstrap loader. Bootstrap loader is a program that resides in the computer’s EPROM, ROM, or other non-volatile memory. The bootstrap loader reads the hard drives boot sector to continue the process of loading the computer’s operating system. The term bootstrap comes from the old phrase “”Pull yourself up by your bootstraps.”””Incorrect
“● A boot loader is a type of program that loads and starts the boot time tasks and processes of an operating system or the computer system. It enables loading the operating system with in the computer memory when a computer is started or booted up.
● A boot loader is also known as a boot manager or bootstrap loader. Bootstrap loader is a program that resides in the computer’s EPROM, ROM, or other non-volatile memory. The bootstrap loader reads the hard drives boot sector to continue the process of loading the computer’s operating system. The term bootstrap comes from the old phrase “”Pull yourself up by your bootstraps.””” -
Question 16 of 30
16. Question
2 points“Which of the following is the internal memory of the system(computer)?
“Correct
Incorrect
-
Question 17 of 30
17. Question
2 points“Suppose for a process P, reference to pages in order are 1, 2, 4, 5, 2, 1, 2, 4. Assume that main memory can accommodate 3 pages and the main memory has already pages 1 and 2 in the order 1 – first, 2- second. At this moment, assume FIFO Page Replacement Algorithm is used then the number of page faults that occur to complete the execution of process P is
“
Correct
Incorrect
-
Question 18 of 30
18. Question
2 points“______________ system call creates new process in Unix.
Correct
fork system call is used to creates a new process in Unix.
Incorrect
fork system call is used to creates a new process in Unix.
-
Question 19 of 30
19. Question
2 points“A process residing in main memory and ready and waiting for execution, is kept on
“
Correct
A process residing in main memory and ready and waiting for execution, is kept on Ready queue.
Incorrect
A process residing in main memory and ready and waiting for execution, is kept on Ready queue.
-
Question 20 of 30
20. Question
2 pointsIn which one of the following pages replacement policies, Belady’s anomaly may occur?
Correct
“● Bélády’s anomaly is the phenomenon in which increasing the number of page frames results in an increase in the number of page faults for certain memory access patterns.
● This phenomenon is commonly experienced when using the first-in first-out (FIFO) page replacement algorithm.
● In FIFO, the page fault may or may not increase as the page frames increase, but in Optimal and stack-based algorithms like LRU, as the page frames increase the page fault decreases.
“Incorrect
“● Bélády’s anomaly is the phenomenon in which increasing the number of page frames results in an increase in the number of page faults for certain memory access patterns.
● This phenomenon is commonly experienced when using the first-in first-out (FIFO) page replacement algorithm.
● In FIFO, the page fault may or may not increase as the page frames increase, but in Optimal and stack-based algorithms like LRU, as the page frames increase the page fault decreases.
“ -
Question 21 of 30
21. Question
2 pointsA process that is based on IPC mechanism which executes on different systems and can communicate with other processes using message based communication is called__
Correct
“● Remote Procedure Call (RPC) is a protocol that one program can use to request a service from a program located in another computer on a network without having to understand the network’s details.
● A procedure call is also sometimes known as a function call or a subroutine call.
● inter-process communication or interprocess communication (IPC) refers specifically to the mechanisms an operating system provides to allow the processes to manage shared data.
● The RMI (Remote Method Invocation) is an API that provides a mechanism to create distributed application in java. The RMI allows an object to invoke methods on an object running in another JVM.
“Incorrect
“● Remote Procedure Call (RPC) is a protocol that one program can use to request a service from a program located in another computer on a network without having to understand the network’s details.
● A procedure call is also sometimes known as a function call or a subroutine call.
● inter-process communication or interprocess communication (IPC) refers specifically to the mechanisms an operating system provides to allow the processes to manage shared data.
● The RMI (Remote Method Invocation) is an API that provides a mechanism to create distributed application in java. The RMI allows an object to invoke methods on an object running in another JVM.
“ -
Question 22 of 30
22. Question
2 pointsconsider a system with m resources of same type being shared by n processes. Resources can be requested and release by processes only one at a time. The system is deadlock free if and only if:
Correct
“Suppose N = Sum of all Needi,
A = Sum of all Allocation,
M = Sum of all Maxi.
Prove:
→ Assume this system is not deadlock free. If there exists a deadlock state, then A = m because there’s only one kind of resource and resources can be requested and released only one at a time.
→ From condition b, N + A = M < m + n. So we get N + m < m + n. So we get N < n. It shows that at least one process i that Needi = 0. From condition a, Pi can release at least 1 resource.
→ So there are n-1 processes sharing m resources now, condition a and b still hold. Go on the argument, no process will wait permanently, so there’s no deadlock.
“Incorrect
“Suppose N = Sum of all Needi,
A = Sum of all Allocation,
M = Sum of all Maxi.
Prove:
→ Assume this system is not deadlock free. If there exists a deadlock state, then A = m because there’s only one kind of resource and resources can be requested and released only one at a time.
→ From condition b, N + A = M < m + n. So we get N + m < m + n. So we get N < n. It shows that at least one process i that Needi = 0. From condition a, Pi can release at least 1 resource.
→ So there are n-1 processes sharing m resources now, condition a and b still hold. Go on the argument, no process will wait permanently, so there’s no deadlock.
“ -
Question 23 of 30
23. Question
2 points“Semaphores are used to solve the problem of
I. Race Condition
II. Process Synchronization
III. Mutual Exclusion
IV. None of the above
“Correct
“Semaphore are used to solve the problem of process synchronization and mutual exclusion.
Semaphore are 2 types.
Counting semaphore
Binary semaphore
“Incorrect
“Semaphore are used to solve the problem of process synchronization and mutual exclusion.
Semaphore are 2 types.
Counting semaphore
Binary semaphore
“ -
Question 24 of 30
24. Question
2 pointsIf there are 32 segments, each size 1K bytes, then the logical address should have
Correct
“Given data, total 32 segments
Each segment size is 1K bytes.
Find the logical address=?
32 segments=25
Segment size=210
⇒ 25*210
⇒ 215
So, 15 bits are required.
“Incorrect
“Given data, total 32 segments
Each segment size is 1K bytes.
Find the logical address=?
32 segments=25
Segment size=210
⇒ 25*210
⇒ 215
So, 15 bits are required.
“ -
Question 25 of 30
25. Question
2 pointsSuppose a system contains n processes and system uses the round-robin algorithm for CPU scheduling then which data structure is best suited for ready queue of the process
Correct
“→ This type of scheduling is one of the very basic algorithms for Operating Systems in computers which can be implemented through circular queue data structure.
→ Round-robin (RR) is one of the algorithms employed by process and network schedulers in computing.
→ As the term is generally used, time slices (also known as time quanta) are assigned to each process in equal portions and in circular order, handling all processes without priority (also known as cyclic executive).
→ Round-robin scheduling is simple, easy to implement, and starvation-free.
→ Round-robin scheduling can also be applied to other scheduling problems, such as data packet scheduling in computer networks.
“Incorrect
“→ This type of scheduling is one of the very basic algorithms for Operating Systems in computers which can be implemented through circular queue data structure.
→ Round-robin (RR) is one of the algorithms employed by process and network schedulers in computing.
→ As the term is generally used, time slices (also known as time quanta) are assigned to each process in equal portions and in circular order, handling all processes without priority (also known as cyclic executive).
→ Round-robin scheduling is simple, easy to implement, and starvation-free.
→ Round-robin scheduling can also be applied to other scheduling problems, such as data packet scheduling in computer networks.
“ -
Question 26 of 30
26. Question
2 pointsAt a particular time of computation the value of a counting semaphore is 7. Then 20 P operations and 15 V operations were completed on this semaphore. The resulting value of the semaphore is :
Correct
“Counting semaphore value is 7
After 20 P operations value of semaphore = 7 – 20 = -13
After 15 V operations value of semaphore = -13 + 15 = 2
“Incorrect
“Counting semaphore value is 7
After 20 P operations value of semaphore = 7 – 20 = -13
After 15 V operations value of semaphore = -13 + 15 = 2
“ -
Question 27 of 30
27. Question
2 pointsIncreasing the RAM of a computer typically improves performance because:
Correct
“→ When page frames increases, then no. of page faults decreases.
→ Such as if RAM size increases, then no. of page entries increases, then no. of page faults decreases.
“Incorrect
“→ When page frames increases, then no. of page faults decreases.
→ Such as if RAM size increases, then no. of page entries increases, then no. of page faults decreases.
“ -
Question 28 of 30
28. Question
2 points“Consider the following program.
main()
{
fork();
fork();
fork();
}
How many new processes will be created?
“Correct
“The no. of child process created = (2^n) -1
= (2^3) -1
= 7
(where n is number of fork() statements)
“Incorrect
“The no. of child process created = (2^n) -1
= (2^3) -1
= 7
(where n is number of fork() statements)
“ -
Question 29 of 30
29. Question
2 points“Which of the following statements is FALSE?
Correct
“→ Long term scheduler controls the degree of multiprogramming.
→ Ready queue of the processes resides in main memory.
→ A process can have multiple sub processes.
→ Multiple process of a single program cannot exist because each program can have only one process.
“Incorrect
“→ Long term scheduler controls the degree of multiprogramming.
→ Ready queue of the processes resides in main memory.
→ A process can have multiple sub processes.
→ Multiple process of a single program cannot exist because each program can have only one process.
“ -
Question 30 of 30
30. Question
2 pointsDirty bit for a page in a page table
Correct
→ The dirty bit allows for a performance optimization i.e., Dirty bit for a page in a page table helps to avoid unnecessary writes on a paging device.
Incorrect
→ The dirty bit allows for a performance optimization i.e., Dirty bit for a page in a page table helps to avoid unnecessary writes on a paging device.