- Quiz will start as soon as you click the ‘Start Quiz‘ button below.
- Question will come one by one click on next for next question
- There are 30 questions in this quiz, you will get 30 Minutes to attempt.
- 2 Marks is determined for the correct answer for each question. There is no negative marking for incorrect answer.
- After the quiz is over, in order to know your rank in the Ranking List / Leader-board below, you should enter your name and email address, otherwise you will be deprived of it.
- After completing click on finish Quiz
- To see correct answers click on view Question
- जैसे ही आप नीचे दिए गए ‘स्टार्ट क्विज़’ बटन पर क्लिक करेंगे, क्विज़ शुरू हो जाएगा।
प्रश्न अगले प्रश्न के लिए अगले एक क्लिक पर आएगा
इस क्विज में 30 प्रश्न हैं, आपको प्रयास करने के लिए 30 मिनट मिलेंगे।
प्रत्येक प्रश्न के सही उत्तर के लिए 2 अंक निर्धारित किए गए हैं। गलत उत्तर के लिए कोई नकारात्मक अंकन नहीं है।
प्रश्नोत्तरी समाप्त होने के बाद, नीचे दी गई रैंकिंग सूची / लीडर-बोर्ड में अपनी रैंक जानने के लिए, आपको अपना नाम और ईमेल पता दर्ज करना चाहिए, अन्यथा आप इससे वंचित रह जाएंगे।
फिनिश क्विज़ पर क्लिक करने के बाद
सही उत्तर देखने के लिए प्रश्न पर क्लिक करें
Paper 2 CS System Software & Operating System Part 6
Quiz-summary
0 of 30 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
Information
Paper 1 Quiz helps u to Excel in NET JRF
Paper 1 All questions 2 Marks each
- Navdeep Kaur
- All the Best
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
| Average score |
|
| Your score |
|
Categories
- Not categorized 0%
-
Average marks Improve next time All the Best
-
Nice Keep it up, Stay Blessed
-
Awesome Great Marks, Keep doing
| Pos. | Name | Entered on | Points | Result |
|---|---|---|---|---|
| Table is loading | ||||
| No data available | ||||
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- Answered
- Review
-
Question 1 of 30
1. Question
2 pointsEach process is contained in a single section of memory that is contiguous to the section containing the next process is called
Correct
Contiguous memory allocation is a classical memory allocation model that assigns a process consecutive memory blocks (that is, memory blocks having consecutive addresses).
Incorrect
Contiguous memory allocation is a classical memory allocation model that assigns a process consecutive memory blocks (that is, memory blocks having consecutive addresses).
-
Question 2 of 30
2. Question
2 pointsBoth the first fit and best fit strategies for memory allocation suffer from
Correct
“→ Internal fragmentation is the wasted space within each allocated block because of rounding up from the actual requested allocation to the allocation granularity.
→ External fragmentation is the various free spaced holes that are generated in either your memory or disk space.
→ Both the first-fit and best-fit strategies for memory allocation suffer from external fragmentation. As the processes are loaded and removed from memory, the free memory space is broken into little pieces.
→ External fragmentation exists when there is enough total memory space to satisfy a request, but the available spaces are not contiguous.
“Incorrect
“→ Internal fragmentation is the wasted space within each allocated block because of rounding up from the actual requested allocation to the allocation granularity.
→ External fragmentation is the various free spaced holes that are generated in either your memory or disk space.
→ Both the first-fit and best-fit strategies for memory allocation suffer from external fragmentation. As the processes are loaded and removed from memory, the free memory space is broken into little pieces.
→ External fragmentation exists when there is enough total memory space to satisfy a request, but the available spaces are not contiguous.
“ -
Question 3 of 30
3. Question
2 pointsThe simplest, but most expensive approach to introductory redundancy is duplicate to every disk. This technique is called
Correct
“● Mirroring copies identical data onto more than one drive.
● Striping partitions each drive’s storage space into units ranging from a sector (512 bytes) up to several megabytes.
●The stripes of all the disks are interleaved and addressed in order.
“Incorrect
“● Mirroring copies identical data onto more than one drive.
● Striping partitions each drive’s storage space into units ranging from a sector (512 bytes) up to several megabytes.
●The stripes of all the disks are interleaved and addressed in order.
“ -
Question 4 of 30
4. Question
2 points_____ is a sequence of memory read-write operations that are atomic
Correct
An operation (or set of operations) is atomic or uninterruptible if it appears to the rest of the system to occur instantaneously.
Incorrect
An operation (or set of operations) is atomic or uninterruptible if it appears to the rest of the system to occur instantaneously.
-
Question 5 of 30
5. Question
2 pointsThe term____ refers to the use of electronics and software within a product, as opposed to a general purpose computer such as a laptop or desktop system
Correct
“● Fuzzy logic is an approach to computing based on “”degrees of truth”” rather than the usual “”true or false”” (1 or 0) Boolean logic on which the modern computer is based.
● An embedded system is a controller programmed and controlled by a real-time operating system (RTOS) with a dedicated function within a larger mechanical or electrical system, often with real-time computing constraints.
“Incorrect
“● Fuzzy logic is an approach to computing based on “”degrees of truth”” rather than the usual “”true or false”” (1 or 0) Boolean logic on which the modern computer is based.
● An embedded system is a controller programmed and controlled by a real-time operating system (RTOS) with a dedicated function within a larger mechanical or electrical system, often with real-time computing constraints.
“ -
Question 6 of 30
6. Question
2 pointsSequential, direct, random and associative are access methods and key characteristics of computer____system
Correct
“● An access method is a program or a hardware mechanism that moves data between the computer and an outlying device such as a hard disk (or other form of storage) or a display terminal.
● Memory can be accessed Sequential, direct, random and associative manner.
“Incorrect
“● An access method is a program or a hardware mechanism that moves data between the computer and an outlying device such as a hard disk (or other form of storage) or a display terminal.
● Memory can be accessed Sequential, direct, random and associative manner.
“ -
Question 7 of 30
7. Question
2 pointsIn a monolithic kernel, operating system runs in
Correct
“Monolithic kernel means that the whole operating system runs in kernel mode (i.e. highly privileged by the hardware). That is, no part of the OS runs in user mode (lower privilege). Only applications on top of the OS run in user mode.
“Incorrect
“Monolithic kernel means that the whole operating system runs in kernel mode (i.e. highly privileged by the hardware). That is, no part of the OS runs in user mode (lower privilege). Only applications on top of the OS run in user mode.
“ -
Question 8 of 30
8. Question
2 pointsOne scheme for communication between user thread library and the kernel is known as
Correct
Scheduler activations are a threading mechanism that, when implemented in an operating system’s process scheduler, provide kernel-level thread functionality with user-level thread flexibility and performance
Incorrect
Scheduler activations are a threading mechanism that, when implemented in an operating system’s process scheduler, provide kernel-level thread functionality with user-level thread flexibility and performance
-
Question 9 of 30
9. Question
2 pointsA classic software based solution to the critical section problem is known as
Correct
Peterson’s solution is a concurrent programming algorithm for mutual exclusion that allows two or more processes to share a single-use resource without conflict, using only shared memory for communication
Incorrect
Peterson’s solution is a concurrent programming algorithm for mutual exclusion that allows two or more processes to share a single-use resource without conflict, using only shared memory for communication
-
Question 10 of 30
10. Question
2 pointsConsider a set of n tasks with known runtimes R1 ,R2 ,Rn , to be run uniprocessor machine. Which of the following processor scheduling algorithm will result in the maximum throughput?
Correct
“→ In shortest job first scheduling algorithm, the processor selects the process with the smallest execution time to execute next.
→ SJF scheduling algorithm will result in the maximum throughput
“Incorrect
“→ In shortest job first scheduling algorithm, the processor selects the process with the smallest execution time to execute next.
→ SJF scheduling algorithm will result in the maximum throughput
“ -
Question 11 of 30
11. Question
2 pointsOLE, a microsoft’s component document technology, means
Correct
→ Object Linking & Embedding (OLE) is a proprietary technology developed by Microsoft that allows embedding and linking to documents and other objects.
→ For developers, it brought OLE Control Extension (OCX), a way to develop and use custom user interface elements. On a technical level, an OLE object is any object that implements the IOleObject interface, possibly along with a wide range of other interfaces, depending on the object’s needs.Incorrect
→ Object Linking & Embedding (OLE) is a proprietary technology developed by Microsoft that allows embedding and linking to documents and other objects.
→ For developers, it brought OLE Control Extension (OCX), a way to develop and use custom user interface elements. On a technical level, an OLE object is any object that implements the IOleObject interface, possibly along with a wide range of other interfaces, depending on the object’s needs. -
Question 12 of 30
12. Question
2 pointsThe problem of indefinite blockage of low priority jobs in general priority scheduling algorithm can be solved using
Correct
“→ Ageing is a scheduling technique used to avoid starvation. Fixed priority scheduling is a scheduling discipline, in which tasks queued for utilizing a system resource are assigned a priority each.
→ A task with a high priority is allowed to access a specific system resource before a task with a lower priority is allowed to do the same.
→ A disadvantage of this approach is that tasks assigned with a lower priority may be starved when a large number of high priority tasks are queued. Aging is used to gradually increase the priority of a task, based on its waiting time in the ready queue.
“Incorrect
“→ Ageing is a scheduling technique used to avoid starvation. Fixed priority scheduling is a scheduling discipline, in which tasks queued for utilizing a system resource are assigned a priority each.
→ A task with a high priority is allowed to access a specific system resource before a task with a lower priority is allowed to do the same.
→ A disadvantage of this approach is that tasks assigned with a lower priority may be starved when a large number of high priority tasks are queued. Aging is used to gradually increase the priority of a task, based on its waiting time in the ready queue.
“ -
Question 13 of 30
13. Question
2 pointsA Thread is also called
Correct
“→ A light-weight process (LWP) is a means of achieving multitasking.
→ A LWP runs in user space on top of a single kernel thread and shares its address space and system resources with other LWPs within the same process. Multiple user level threads, managed by a thread library, can be placed on top of one or many LWPs – allowing multitasking to be done at the user level, which can have some performance benefits.
“Incorrect
“→ A light-weight process (LWP) is a means of achieving multitasking.
→ A LWP runs in user space on top of a single kernel thread and shares its address space and system resources with other LWPs within the same process. Multiple user level threads, managed by a thread library, can be placed on top of one or many LWPs – allowing multitasking to be done at the user level, which can have some performance benefits.
“ -
Question 14 of 30
14. Question
2 pointsCopying a process from memory to disk to allow space for other processes is called___
Correct
Incorrect

-
Question 15 of 30
15. Question
2 pointsIf the time quantum size is 2 units of an there is only one job of 14 time unit in a ready queue, the round robin scheduling algorithm will cause___ connected switches.
Correct
“→ Actually they are given single job, so when we are using round robin algorithm it won’t perform any context switch because we are executing same job.
→ But according to their intention will cause total 6 switches. 0-2, 2-4, 4-6, 6-8, 8-10, 10-12, 12-14. We are initially started with 0. So, It will take 6 connected switches
Note: We thought they made this question wrong.”Incorrect
“→ Actually they are given single job, so when we are using round robin algorithm it won’t perform any context switch because we are executing same job.
→ But according to their intention will cause total 6 switches. 0-2, 2-4, 4-6, 6-8, 8-10, 10-12, 12-14. We are initially started with 0. So, It will take 6 connected switches
Note: We thought they made this question wrong.” -
Question 16 of 30
16. Question
2 pointsThe memory which does not lose its content on failure of power supply is known as___memory.
Correct
Non-volatile memory (NVM) or non-volatile storage is a type of computer memory that can retrieve stored information even after having been power cycled. In contrast, volatile memory needs constant power in order to retain data. Examples of non-volatile memory include read-only memory, flash memory, ferroelectric RAM, most types of magnetic computer storage devices (e.g. hard disk drives, solid state drives, floppy disks, and magnetic tape), optical discs, and early computer storage methods such as paper tape and punched cards.
Incorrect
Non-volatile memory (NVM) or non-volatile storage is a type of computer memory that can retrieve stored information even after having been power cycled. In contrast, volatile memory needs constant power in order to retain data. Examples of non-volatile memory include read-only memory, flash memory, ferroelectric RAM, most types of magnetic computer storage devices (e.g. hard disk drives, solid state drives, floppy disks, and magnetic tape), optical discs, and early computer storage methods such as paper tape and punched cards.
-
Question 17 of 30
17. Question
2 pointsThe kernel keeps track of the state of each executing program by using a data structure called__
Correct
Process Control Block (PCB, also called Task Controlling Block, Entry of the Process Table, Task Struct, or Switchframe) is a data structure in the operating system kernel containing the information needed to manage the scheduling of a particular process.
Incorrect
Process Control Block (PCB, also called Task Controlling Block, Entry of the Process Table, Task Struct, or Switchframe) is a data structure in the operating system kernel containing the information needed to manage the scheduling of a particular process.
-
Question 18 of 30
18. Question
2 pointsAn operating system contains 3 user processes each requiring 2 units of resource R. The minimum number of units of R such that no deadlock will ever occur is
Correct
“There are three processes, so there is a possibility to occur deadlock when we are taking 3 resources. If we are taking 3+1 resources means it will never occur deadlock.
Note: If there are ‘n’ processes then ‘n+1’ resources allocated, will never occur deadlock.”Incorrect
“There are three processes, so there is a possibility to occur deadlock when we are taking 3 resources. If we are taking 3+1 resources means it will never occur deadlock.
Note: If there are ‘n’ processes then ‘n+1’ resources allocated, will never occur deadlock.” -
Question 19 of 30
19. Question
2 pointsThe segmentation memory management scheme suffers from:
Correct
“• Segmentation and paging avoids external fragmentation but still it suffers from internal fragmentation.
• Internal fragmentation is the wasted space within each allocated block because of rounding up from the actual requested allocation to the allocation granularity.
• External fragmentation is the various free spaced holes that are generated in either your memory or disk space. External fragmented blocks are available for allocation, but may be too small to be of any use.
• Resource starvation is a problem encountered in concurrent computing where a process is perpetually denied necessary resources to process its work. Starvation may be caused by errors in a scheduling or mutual exclusion algorithm.
• Ageing is a scheduling technique used to avoid starvation.”Incorrect
“• Segmentation and paging avoids external fragmentation but still it suffers from internal fragmentation.
• Internal fragmentation is the wasted space within each allocated block because of rounding up from the actual requested allocation to the allocation granularity.
• External fragmentation is the various free spaced holes that are generated in either your memory or disk space. External fragmented blocks are available for allocation, but may be too small to be of any use.
• Resource starvation is a problem encountered in concurrent computing where a process is perpetually denied necessary resources to process its work. Starvation may be caused by errors in a scheduling or mutual exclusion algorithm.
• Ageing is a scheduling technique used to avoid starvation.” -
Question 20 of 30
20. Question
2 pointsWhich of the following technique allows execution of programs larger than the size of physical memory?
Correct
Virtual memory technique allows execution of programs larger than the size of physical memory. Demand paging we are using for virtual memory technique.
Incorrect
Virtual memory technique allows execution of programs larger than the size of physical memory. Demand paging we are using for virtual memory technique.
-
Question 21 of 30
21. Question
2 pointsIn page replacement, ‘adding more frames may cause more page faults’ is referred to as:
Correct
In FIFO page replacement policy sometimes behaves differently. The abnormal behaviour is nothing but Belady’s anomaly. Belady’s anomaly is nothing but adding more frames may cause more page faults.
Incorrect
In FIFO page replacement policy sometimes behaves differently. The abnormal behaviour is nothing but Belady’s anomaly. Belady’s anomaly is nothing but adding more frames may cause more page faults.
-
Question 22 of 30
22. Question
2 points____ is an IEEE 1003.1C standard API for thread creation and synchronization in operating system.
Correct
POSIX Threads, usually referred to as pthreads, is an execution model that exists independently from a language, as well as a parallel execution model. It allows a program to control multiple different flows of work that overlap in time. Each flow of work is referred to as a thread, and creation and control over these flows is achieved by making calls to the POSIX Threads API. POSIX Threads is an API defined by the standard POSIX.1c, Threads extensions (IEEE Std 1003.1c-1995).
Incorrect
POSIX Threads, usually referred to as pthreads, is an execution model that exists independently from a language, as well as a parallel execution model. It allows a program to control multiple different flows of work that overlap in time. Each flow of work is referred to as a thread, and creation and control over these flows is achieved by making calls to the POSIX Threads API. POSIX Threads is an API defined by the standard POSIX.1c, Threads extensions (IEEE Std 1003.1c-1995).
-
Question 23 of 30
23. Question
2 pointsIf a system has multiple instances of resources, to avoid deadlock which of the following algorithms is used?
Correct
“Banker’s Algorithm :
Banker’s algo can be applied even when Resource-system have multiple instances of each resource type. It can also be applied when Resource-system have single instance of each resource type But in that case, It would be less efficient than Resource-Allocation Graph Algorithm.”Incorrect
“Banker’s Algorithm :
Banker’s algo can be applied even when Resource-system have multiple instances of each resource type. It can also be applied when Resource-system have single instance of each resource type But in that case, It would be less efficient than Resource-Allocation Graph Algorithm.” -
Question 24 of 30
24. Question
2 pointsWhich of the following is not a CPU scheduling criteria:
Correct
“The term dispatch latency describes the amount of time it takes for a system to respond to a request for a process to begin operation. With a scheduler written specifically to honor application priorities, real-time applications can be developed with a bounded dispatch latency.
Note: The time taken by the dispatcher to stop one process and start another running is known as dispatch latency.”Incorrect
“The term dispatch latency describes the amount of time it takes for a system to respond to a request for a process to begin operation. With a scheduler written specifically to honor application priorities, real-time applications can be developed with a bounded dispatch latency.
Note: The time taken by the dispatcher to stop one process and start another running is known as dispatch latency.” -
Question 25 of 30
25. Question
2 pointsAn address in the memory is called
Correct
A physical address (also real address, or binary address), is a memory address that is represented in the form of a binary number on the address bus circuitry in order to enable the data bus to access a particular storage cell of main memory, or a register of memory mapped I/O device.
Incorrect
A physical address (also real address, or binary address), is a memory address that is represented in the form of a binary number on the address bus circuitry in order to enable the data bus to access a particular storage cell of main memory, or a register of memory mapped I/O device.
-
Question 26 of 30
26. Question
2 pointsIn which of the following state, the process is waiting for processor?
Correct
“New→ The process is being created
Running→ Instructions are being executed
Ready→ The process is waiting to be assigned to a processor
Waiting→ The process is waiting for some event to occur(such as IO exception or reception of a signal)
Terminated: The process has finished execution.
“Incorrect
“New→ The process is being created
Running→ Instructions are being executed
Ready→ The process is waiting to be assigned to a processor
Waiting→ The process is waiting for some event to occur(such as IO exception or reception of a signal)
Terminated: The process has finished execution.
“ -
Question 27 of 30
27. Question
2 pointsThe mechanism that brings a page memory only when it is needed in___
Correct
“→ Demand paging follows that pages should only be brought into memory if the executing process demands them. This is often referred to as lazy evaluation as only those pages demanded by the process are swapped from secondary storage to main memory. Contrast this to pure swapping, where all memory for a process is swapped from secondary storage to main memory during the process startup.
→ Demand paging is a method of virtual memory management. In a system that uses demand paging, the operating system copies a disk page into physical memory only if an attempt is made to access it and that page is not already in memory (i.e., if a page fault occurs).
→ It follows that a process begins execution with none of its pages in physical memory, and many page faults will occur until most of a process working set of pages are located in physical memory. This is an example of a lazy loading technique.
“Incorrect
“→ Demand paging follows that pages should only be brought into memory if the executing process demands them. This is often referred to as lazy evaluation as only those pages demanded by the process are swapped from secondary storage to main memory. Contrast this to pure swapping, where all memory for a process is swapped from secondary storage to main memory during the process startup.
→ Demand paging is a method of virtual memory management. In a system that uses demand paging, the operating system copies a disk page into physical memory only if an attempt is made to access it and that page is not already in memory (i.e., if a page fault occurs).
→ It follows that a process begins execution with none of its pages in physical memory, and many page faults will occur until most of a process working set of pages are located in physical memory. This is an example of a lazy loading technique.
“ -
Question 28 of 30
28. Question
2 pointsSemaphores are used to solve the problem of
Correct
“Semaphores are used to solve the problem of process synchronization.
There are two types of semaphores
1. Counting Semaphore
2. Binary semaphore
“Incorrect
“Semaphores are used to solve the problem of process synchronization.
There are two types of semaphores
1. Counting Semaphore
2. Binary semaphore
“ -
Question 29 of 30
29. Question
2 points“Consider the following statements
S1: a small page size causes large page tables
S2: Internal fragmentation is increase with small pages
S3: I/O transfers are more efficient with large pages
Which of the following is true?
“Correct
“S1: True:A small page size causes large page tables
S2: True:Internal fragmentation is increase with small pages. Actually Internal fragmentation is decrease with small pages
S3:True:I/O transfers are more efficient with large pages”Incorrect
“S1: True:A small page size causes large page tables
S2: True:Internal fragmentation is increase with small pages. Actually Internal fragmentation is decrease with small pages
S3:True:I/O transfers are more efficient with large pages” -
Question 30 of 30
30. Question
2 pointsIn __________ disk scheduling algorithm, the disk head moves from one end to other end of the disk, serving the requests along the way. When the head reaches the other end, it immediately returns to the beginning of the disk without serving any requests on the return trip.
Correct
Circular scanning works just like the elevator to some extent. It begins its scan toward the nearest end and works it way all the way to the end of the system. Once it hits the bottom or top it jumps to the other end and moves in the same direction. Keep in mind that the huge jump doesn’t count as a head movement.
Incorrect
Circular scanning works just like the elevator to some extent. It begins its scan toward the nearest end and works it way all the way to the end of the system. Once it hits the bottom or top it jumps to the other end and moves in the same direction. Keep in mind that the huge jump doesn’t count as a head movement.
- Next Quiz Daily at navclasses.in 12 PM
- Paper 2 Sunday at navclasses.in
Study Paper 1 Topics for Free Click Here
Get subscription for Complete Preparation NTA NET JRF: https://unacademy.com/subscribe/TEWDQ
use my referral code for 10% additional discount: NAVCLASSES
Search Navdeep Kaur and start watching ongoing courses
NTA NET Paper 1
Paper 2 CS System Software & Operating System Part 6
Quiz-summary
0 of 30 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
Information
Paper 1 Quiz helps u to Excel in NET JRF
Paper 1 All questions 2 Marks each
- Navdeep Kaur
- All the Best
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
| Average score |
|
| Your score |
|
Categories
- Not categorized 0%
-
Average marks Improve next time All the Best
-
Nice Keep it up, Stay Blessed
-
Awesome Great Marks, Keep doing
| Pos. | Name | Entered on | Points | Result |
|---|---|---|---|---|
| Table is loading | ||||
| No data available | ||||
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- Answered
- Review
-
Question 1 of 30
1. Question
2 pointsEach process is contained in a single section of memory that is contiguous to the section containing the next process is called
Correct
Contiguous memory allocation is a classical memory allocation model that assigns a process consecutive memory blocks (that is, memory blocks having consecutive addresses).
Incorrect
Contiguous memory allocation is a classical memory allocation model that assigns a process consecutive memory blocks (that is, memory blocks having consecutive addresses).
-
Question 2 of 30
2. Question
2 pointsBoth the first fit and best fit strategies for memory allocation suffer from
Correct
“→ Internal fragmentation is the wasted space within each allocated block because of rounding up from the actual requested allocation to the allocation granularity.
→ External fragmentation is the various free spaced holes that are generated in either your memory or disk space.
→ Both the first-fit and best-fit strategies for memory allocation suffer from external fragmentation. As the processes are loaded and removed from memory, the free memory space is broken into little pieces.
→ External fragmentation exists when there is enough total memory space to satisfy a request, but the available spaces are not contiguous.
“Incorrect
“→ Internal fragmentation is the wasted space within each allocated block because of rounding up from the actual requested allocation to the allocation granularity.
→ External fragmentation is the various free spaced holes that are generated in either your memory or disk space.
→ Both the first-fit and best-fit strategies for memory allocation suffer from external fragmentation. As the processes are loaded and removed from memory, the free memory space is broken into little pieces.
→ External fragmentation exists when there is enough total memory space to satisfy a request, but the available spaces are not contiguous.
“ -
Question 3 of 30
3. Question
2 pointsThe simplest, but most expensive approach to introductory redundancy is duplicate to every disk. This technique is called
Correct
“● Mirroring copies identical data onto more than one drive.
● Striping partitions each drive’s storage space into units ranging from a sector (512 bytes) up to several megabytes.
●The stripes of all the disks are interleaved and addressed in order.
“Incorrect
“● Mirroring copies identical data onto more than one drive.
● Striping partitions each drive’s storage space into units ranging from a sector (512 bytes) up to several megabytes.
●The stripes of all the disks are interleaved and addressed in order.
“ -
Question 4 of 30
4. Question
2 points_____ is a sequence of memory read-write operations that are atomic
Correct
An operation (or set of operations) is atomic or uninterruptible if it appears to the rest of the system to occur instantaneously.
Incorrect
An operation (or set of operations) is atomic or uninterruptible if it appears to the rest of the system to occur instantaneously.
-
Question 5 of 30
5. Question
2 pointsThe term____ refers to the use of electronics and software within a product, as opposed to a general purpose computer such as a laptop or desktop system
Correct
“● Fuzzy logic is an approach to computing based on “”degrees of truth”” rather than the usual “”true or false”” (1 or 0) Boolean logic on which the modern computer is based.
● An embedded system is a controller programmed and controlled by a real-time operating system (RTOS) with a dedicated function within a larger mechanical or electrical system, often with real-time computing constraints.
“Incorrect
“● Fuzzy logic is an approach to computing based on “”degrees of truth”” rather than the usual “”true or false”” (1 or 0) Boolean logic on which the modern computer is based.
● An embedded system is a controller programmed and controlled by a real-time operating system (RTOS) with a dedicated function within a larger mechanical or electrical system, often with real-time computing constraints.
“ -
Question 6 of 30
6. Question
2 pointsSequential, direct, random and associative are access methods and key characteristics of computer____system
Correct
“● An access method is a program or a hardware mechanism that moves data between the computer and an outlying device such as a hard disk (or other form of storage) or a display terminal.
● Memory can be accessed Sequential, direct, random and associative manner.
“Incorrect
“● An access method is a program or a hardware mechanism that moves data between the computer and an outlying device such as a hard disk (or other form of storage) or a display terminal.
● Memory can be accessed Sequential, direct, random and associative manner.
“ -
Question 7 of 30
7. Question
2 pointsIn a monolithic kernel, operating system runs in
Correct
“Monolithic kernel means that the whole operating system runs in kernel mode (i.e. highly privileged by the hardware). That is, no part of the OS runs in user mode (lower privilege). Only applications on top of the OS run in user mode.
“Incorrect
“Monolithic kernel means that the whole operating system runs in kernel mode (i.e. highly privileged by the hardware). That is, no part of the OS runs in user mode (lower privilege). Only applications on top of the OS run in user mode.
“ -
Question 8 of 30
8. Question
2 pointsOne scheme for communication between user thread library and the kernel is known as
Correct
Scheduler activations are a threading mechanism that, when implemented in an operating system’s process scheduler, provide kernel-level thread functionality with user-level thread flexibility and performance
Incorrect
Scheduler activations are a threading mechanism that, when implemented in an operating system’s process scheduler, provide kernel-level thread functionality with user-level thread flexibility and performance
-
Question 9 of 30
9. Question
2 pointsA classic software based solution to the critical section problem is known as
Correct
Peterson’s solution is a concurrent programming algorithm for mutual exclusion that allows two or more processes to share a single-use resource without conflict, using only shared memory for communication
Incorrect
Peterson’s solution is a concurrent programming algorithm for mutual exclusion that allows two or more processes to share a single-use resource without conflict, using only shared memory for communication
-
Question 10 of 30
10. Question
2 pointsConsider a set of n tasks with known runtimes R1 ,R2 ,Rn , to be run uniprocessor machine. Which of the following processor scheduling algorithm will result in the maximum throughput?
Correct
“→ In shortest job first scheduling algorithm, the processor selects the process with the smallest execution time to execute next.
→ SJF scheduling algorithm will result in the maximum throughput
“Incorrect
“→ In shortest job first scheduling algorithm, the processor selects the process with the smallest execution time to execute next.
→ SJF scheduling algorithm will result in the maximum throughput
“ -
Question 11 of 30
11. Question
2 pointsOLE, a microsoft’s component document technology, means
Correct
→ Object Linking & Embedding (OLE) is a proprietary technology developed by Microsoft that allows embedding and linking to documents and other objects.
→ For developers, it brought OLE Control Extension (OCX), a way to develop and use custom user interface elements. On a technical level, an OLE object is any object that implements the IOleObject interface, possibly along with a wide range of other interfaces, depending on the object’s needs.Incorrect
→ Object Linking & Embedding (OLE) is a proprietary technology developed by Microsoft that allows embedding and linking to documents and other objects.
→ For developers, it brought OLE Control Extension (OCX), a way to develop and use custom user interface elements. On a technical level, an OLE object is any object that implements the IOleObject interface, possibly along with a wide range of other interfaces, depending on the object’s needs. -
Question 12 of 30
12. Question
2 pointsThe problem of indefinite blockage of low priority jobs in general priority scheduling algorithm can be solved using
Correct
“→ Ageing is a scheduling technique used to avoid starvation. Fixed priority scheduling is a scheduling discipline, in which tasks queued for utilizing a system resource are assigned a priority each.
→ A task with a high priority is allowed to access a specific system resource before a task with a lower priority is allowed to do the same.
→ A disadvantage of this approach is that tasks assigned with a lower priority may be starved when a large number of high priority tasks are queued. Aging is used to gradually increase the priority of a task, based on its waiting time in the ready queue.
“Incorrect
“→ Ageing is a scheduling technique used to avoid starvation. Fixed priority scheduling is a scheduling discipline, in which tasks queued for utilizing a system resource are assigned a priority each.
→ A task with a high priority is allowed to access a specific system resource before a task with a lower priority is allowed to do the same.
→ A disadvantage of this approach is that tasks assigned with a lower priority may be starved when a large number of high priority tasks are queued. Aging is used to gradually increase the priority of a task, based on its waiting time in the ready queue.
“ -
Question 13 of 30
13. Question
2 pointsA Thread is also called
Correct
“→ A light-weight process (LWP) is a means of achieving multitasking.
→ A LWP runs in user space on top of a single kernel thread and shares its address space and system resources with other LWPs within the same process. Multiple user level threads, managed by a thread library, can be placed on top of one or many LWPs – allowing multitasking to be done at the user level, which can have some performance benefits.
“Incorrect
“→ A light-weight process (LWP) is a means of achieving multitasking.
→ A LWP runs in user space on top of a single kernel thread and shares its address space and system resources with other LWPs within the same process. Multiple user level threads, managed by a thread library, can be placed on top of one or many LWPs – allowing multitasking to be done at the user level, which can have some performance benefits.
“ -
Question 14 of 30
14. Question
2 pointsCopying a process from memory to disk to allow space for other processes is called___
Correct
Incorrect

-
Question 15 of 30
15. Question
2 pointsIf the time quantum size is 2 units of an there is only one job of 14 time unit in a ready queue, the round robin scheduling algorithm will cause___ connected switches.
Correct
“→ Actually they are given single job, so when we are using round robin algorithm it won’t perform any context switch because we are executing same job.
→ But according to their intention will cause total 6 switches. 0-2, 2-4, 4-6, 6-8, 8-10, 10-12, 12-14. We are initially started with 0. So, It will take 6 connected switches
Note: We thought they made this question wrong.”Incorrect
“→ Actually they are given single job, so when we are using round robin algorithm it won’t perform any context switch because we are executing same job.
→ But according to their intention will cause total 6 switches. 0-2, 2-4, 4-6, 6-8, 8-10, 10-12, 12-14. We are initially started with 0. So, It will take 6 connected switches
Note: We thought they made this question wrong.” -
Question 16 of 30
16. Question
2 pointsThe memory which does not lose its content on failure of power supply is known as___memory.
Correct
Non-volatile memory (NVM) or non-volatile storage is a type of computer memory that can retrieve stored information even after having been power cycled. In contrast, volatile memory needs constant power in order to retain data. Examples of non-volatile memory include read-only memory, flash memory, ferroelectric RAM, most types of magnetic computer storage devices (e.g. hard disk drives, solid state drives, floppy disks, and magnetic tape), optical discs, and early computer storage methods such as paper tape and punched cards.
Incorrect
Non-volatile memory (NVM) or non-volatile storage is a type of computer memory that can retrieve stored information even after having been power cycled. In contrast, volatile memory needs constant power in order to retain data. Examples of non-volatile memory include read-only memory, flash memory, ferroelectric RAM, most types of magnetic computer storage devices (e.g. hard disk drives, solid state drives, floppy disks, and magnetic tape), optical discs, and early computer storage methods such as paper tape and punched cards.
-
Question 17 of 30
17. Question
2 pointsThe kernel keeps track of the state of each executing program by using a data structure called__
Correct
Process Control Block (PCB, also called Task Controlling Block, Entry of the Process Table, Task Struct, or Switchframe) is a data structure in the operating system kernel containing the information needed to manage the scheduling of a particular process.
Incorrect
Process Control Block (PCB, also called Task Controlling Block, Entry of the Process Table, Task Struct, or Switchframe) is a data structure in the operating system kernel containing the information needed to manage the scheduling of a particular process.
-
Question 18 of 30
18. Question
2 pointsAn operating system contains 3 user processes each requiring 2 units of resource R. The minimum number of units of R such that no deadlock will ever occur is
Correct
“There are three processes, so there is a possibility to occur deadlock when we are taking 3 resources. If we are taking 3+1 resources means it will never occur deadlock.
Note: If there are ‘n’ processes then ‘n+1’ resources allocated, will never occur deadlock.”Incorrect
“There are three processes, so there is a possibility to occur deadlock when we are taking 3 resources. If we are taking 3+1 resources means it will never occur deadlock.
Note: If there are ‘n’ processes then ‘n+1’ resources allocated, will never occur deadlock.” -
Question 19 of 30
19. Question
2 pointsThe segmentation memory management scheme suffers from:
Correct
“• Segmentation and paging avoids external fragmentation but still it suffers from internal fragmentation.
• Internal fragmentation is the wasted space within each allocated block because of rounding up from the actual requested allocation to the allocation granularity.
• External fragmentation is the various free spaced holes that are generated in either your memory or disk space. External fragmented blocks are available for allocation, but may be too small to be of any use.
• Resource starvation is a problem encountered in concurrent computing where a process is perpetually denied necessary resources to process its work. Starvation may be caused by errors in a scheduling or mutual exclusion algorithm.
• Ageing is a scheduling technique used to avoid starvation.”Incorrect
“• Segmentation and paging avoids external fragmentation but still it suffers from internal fragmentation.
• Internal fragmentation is the wasted space within each allocated block because of rounding up from the actual requested allocation to the allocation granularity.
• External fragmentation is the various free spaced holes that are generated in either your memory or disk space. External fragmented blocks are available for allocation, but may be too small to be of any use.
• Resource starvation is a problem encountered in concurrent computing where a process is perpetually denied necessary resources to process its work. Starvation may be caused by errors in a scheduling or mutual exclusion algorithm.
• Ageing is a scheduling technique used to avoid starvation.” -
Question 20 of 30
20. Question
2 pointsWhich of the following technique allows execution of programs larger than the size of physical memory?
Correct
Virtual memory technique allows execution of programs larger than the size of physical memory. Demand paging we are using for virtual memory technique.
Incorrect
Virtual memory technique allows execution of programs larger than the size of physical memory. Demand paging we are using for virtual memory technique.
-
Question 21 of 30
21. Question
2 pointsIn page replacement, ‘adding more frames may cause more page faults’ is referred to as:
Correct
In FIFO page replacement policy sometimes behaves differently. The abnormal behaviour is nothing but Belady’s anomaly. Belady’s anomaly is nothing but adding more frames may cause more page faults.
Incorrect
In FIFO page replacement policy sometimes behaves differently. The abnormal behaviour is nothing but Belady’s anomaly. Belady’s anomaly is nothing but adding more frames may cause more page faults.
-
Question 22 of 30
22. Question
2 points____ is an IEEE 1003.1C standard API for thread creation and synchronization in operating system.
Correct
POSIX Threads, usually referred to as pthreads, is an execution model that exists independently from a language, as well as a parallel execution model. It allows a program to control multiple different flows of work that overlap in time. Each flow of work is referred to as a thread, and creation and control over these flows is achieved by making calls to the POSIX Threads API. POSIX Threads is an API defined by the standard POSIX.1c, Threads extensions (IEEE Std 1003.1c-1995).
Incorrect
POSIX Threads, usually referred to as pthreads, is an execution model that exists independently from a language, as well as a parallel execution model. It allows a program to control multiple different flows of work that overlap in time. Each flow of work is referred to as a thread, and creation and control over these flows is achieved by making calls to the POSIX Threads API. POSIX Threads is an API defined by the standard POSIX.1c, Threads extensions (IEEE Std 1003.1c-1995).
-
Question 23 of 30
23. Question
2 pointsIf a system has multiple instances of resources, to avoid deadlock which of the following algorithms is used?
Correct
“Banker’s Algorithm :
Banker’s algo can be applied even when Resource-system have multiple instances of each resource type. It can also be applied when Resource-system have single instance of each resource type But in that case, It would be less efficient than Resource-Allocation Graph Algorithm.”Incorrect
“Banker’s Algorithm :
Banker’s algo can be applied even when Resource-system have multiple instances of each resource type. It can also be applied when Resource-system have single instance of each resource type But in that case, It would be less efficient than Resource-Allocation Graph Algorithm.” -
Question 24 of 30
24. Question
2 pointsWhich of the following is not a CPU scheduling criteria:
Correct
“The term dispatch latency describes the amount of time it takes for a system to respond to a request for a process to begin operation. With a scheduler written specifically to honor application priorities, real-time applications can be developed with a bounded dispatch latency.
Note: The time taken by the dispatcher to stop one process and start another running is known as dispatch latency.”Incorrect
“The term dispatch latency describes the amount of time it takes for a system to respond to a request for a process to begin operation. With a scheduler written specifically to honor application priorities, real-time applications can be developed with a bounded dispatch latency.
Note: The time taken by the dispatcher to stop one process and start another running is known as dispatch latency.” -
Question 25 of 30
25. Question
2 pointsAn address in the memory is called
Correct
A physical address (also real address, or binary address), is a memory address that is represented in the form of a binary number on the address bus circuitry in order to enable the data bus to access a particular storage cell of main memory, or a register of memory mapped I/O device.
Incorrect
A physical address (also real address, or binary address), is a memory address that is represented in the form of a binary number on the address bus circuitry in order to enable the data bus to access a particular storage cell of main memory, or a register of memory mapped I/O device.
-
Question 26 of 30
26. Question
2 pointsIn which of the following state, the process is waiting for processor?
Correct
“New→ The process is being created
Running→ Instructions are being executed
Ready→ The process is waiting to be assigned to a processor
Waiting→ The process is waiting for some event to occur(such as IO exception or reception of a signal)
Terminated: The process has finished execution.
“Incorrect
“New→ The process is being created
Running→ Instructions are being executed
Ready→ The process is waiting to be assigned to a processor
Waiting→ The process is waiting for some event to occur(such as IO exception or reception of a signal)
Terminated: The process has finished execution.
“ -
Question 27 of 30
27. Question
2 pointsThe mechanism that brings a page memory only when it is needed in___
Correct
“→ Demand paging follows that pages should only be brought into memory if the executing process demands them. This is often referred to as lazy evaluation as only those pages demanded by the process are swapped from secondary storage to main memory. Contrast this to pure swapping, where all memory for a process is swapped from secondary storage to main memory during the process startup.
→ Demand paging is a method of virtual memory management. In a system that uses demand paging, the operating system copies a disk page into physical memory only if an attempt is made to access it and that page is not already in memory (i.e., if a page fault occurs).
→ It follows that a process begins execution with none of its pages in physical memory, and many page faults will occur until most of a process working set of pages are located in physical memory. This is an example of a lazy loading technique.
“Incorrect
“→ Demand paging follows that pages should only be brought into memory if the executing process demands them. This is often referred to as lazy evaluation as only those pages demanded by the process are swapped from secondary storage to main memory. Contrast this to pure swapping, where all memory for a process is swapped from secondary storage to main memory during the process startup.
→ Demand paging is a method of virtual memory management. In a system that uses demand paging, the operating system copies a disk page into physical memory only if an attempt is made to access it and that page is not already in memory (i.e., if a page fault occurs).
→ It follows that a process begins execution with none of its pages in physical memory, and many page faults will occur until most of a process working set of pages are located in physical memory. This is an example of a lazy loading technique.
“ -
Question 28 of 30
28. Question
2 pointsSemaphores are used to solve the problem of
Correct
“Semaphores are used to solve the problem of process synchronization.
There are two types of semaphores
1. Counting Semaphore
2. Binary semaphore
“Incorrect
“Semaphores are used to solve the problem of process synchronization.
There are two types of semaphores
1. Counting Semaphore
2. Binary semaphore
“ -
Question 29 of 30
29. Question
2 points“Consider the following statements
S1: a small page size causes large page tables
S2: Internal fragmentation is increase with small pages
S3: I/O transfers are more efficient with large pages
Which of the following is true?
“Correct
“S1: True:A small page size causes large page tables
S2: True:Internal fragmentation is increase with small pages. Actually Internal fragmentation is decrease with small pages
S3:True:I/O transfers are more efficient with large pages”Incorrect
“S1: True:A small page size causes large page tables
S2: True:Internal fragmentation is increase with small pages. Actually Internal fragmentation is decrease with small pages
S3:True:I/O transfers are more efficient with large pages” -
Question 30 of 30
30. Question
2 pointsIn __________ disk scheduling algorithm, the disk head moves from one end to other end of the disk, serving the requests along the way. When the head reaches the other end, it immediately returns to the beginning of the disk without serving any requests on the return trip.
Correct
Circular scanning works just like the elevator to some extent. It begins its scan toward the nearest end and works it way all the way to the end of the system. Once it hits the bottom or top it jumps to the other end and moves in the same direction. Keep in mind that the huge jump doesn’t count as a head movement.
Incorrect
Circular scanning works just like the elevator to some extent. It begins its scan toward the nearest end and works it way all the way to the end of the system. Once it hits the bottom or top it jumps to the other end and moves in the same direction. Keep in mind that the huge jump doesn’t count as a head movement.