0% found this document useful (0 votes)
913 views

Operating Systems Final Exam

A deadlocked state occurs when every process in a set is waiting for an event that can only be caused by another process in the set. The four necessary conditions for deadlock are: mutual exclusion, hold and wait, no preemption, and circular wait. The banker's algorithm handles deadlocks by ensuring the system remains in a safe state where requested resources can be allocated without resulting in a deadlocked state.

Uploaded by

NavaneethReddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
913 views

Operating Systems Final Exam

A deadlocked state occurs when every process in a set is waiting for an event that can only be caused by another process in the set. The four necessary conditions for deadlock are: mutual exclusion, hold and wait, no preemption, and circular wait. The banker's algorithm handles deadlocks by ensuring the system remains in a safe state where requested resources can be allocated without resulting in a deadlocked state.

Uploaded by

NavaneethReddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODT, PDF, TXT or read online on Scribd
You are on page 1/ 7

IT600FinalExamTestBank

MultipleChoice
1.Adeadlockedstateoccurswhenever____.ANS:C
A)aprocessiswaitingforI/Otoadevicethatdoesnotexist
B)thesystemhasnoavailablefreeresources
C)everyprocessinasetiswaitingforaneventthatcanonlybecausedbyanotherprocessin
theset
D)aprocessisunabletoreleaseitsrequestforaresourceafteruse
2.Onenecessaryconditionfordeadlockis____,whichstatesthatatleastoneresourcemustbe
heldinanonsharablemode.
A)holdandwaitANS:B
B)mutualexclusion
C)circularwait
D)nopreemption
3.Onenecessaryconditionfordeadlockis______,whichstatesthataprocessmustbeholding
oneresourceandwaitingtoacquireadditionalresources.
A)holdandwaitANS:A
B)mutualexclusion
C)circularwait
D)nopreemption
4.Onenecessaryconditionfordeadlockis______,whichstatesthataresourcecanbereleased
onlyvoluntarilybytheprocessholdingtheresource.
A)holdandwait
B)mutualexclusionANS:D
C)circularwait
D)nopreemption
5.Onenecessaryconditionfordeadlockis______,whichstatesthatthereisachainofwaiting
processeswherebyP0iswaitingforaresourceheldbyP1,P1iswaitingforaresourceheldby
P2,andPniswaitingforaresourceheldbyP0.
A)holdandwait
B)mutualexclusionANS:C
C)circularwait
D)nopreemption
6.Thewitnesssoftwareproductisa____.
A)lockorderverifierthatusesmutualexclusionlockstoprotectcriticalsectionsANS:C
B)modelertodevelopresourceallocationgraphs
C)driverthatcanbeusedtopreventmutualexclusionfornonsharableresources
D)implementationofthebanker'salgorithmavailableformostoperatingsystems

7.Inasystemresourceallocationgraph,____.
A)adirectededgefromaprocesstoaresourceiscalledanassignmentedgeANS:C
B)adirectededgefromaresourcetoaprocessiscalledarequestedge
C)adirectededgefromaprocesstoaresourceiscalledarequestedge
D)Noneoftheabove
8.Acycleinaresourceallocationgraphis____.
A)anecessaryandsufficientconditionfordeadlockinthecasethateachresourcehasmorethan
oneinstance
B)anecessaryandsufficientconditionforadeadlockinthecasethateachresourcehasexactly
oneinstanceANS:B
C)asufficientconditionforadeadlockinthecasethateachresourcehasmorethanonce
instance
D)isneithernecessarynorsufficientforindicatingdeadlockinthecasethateachresourcehas
exactlyoneinstance
9.Tohandledeadlocks,operatingsystemsmostoften_____.
A)pretendthatdeadlocksneveroccur
B)useprotocolstopreventoravoiddeadlocksANS:A
C)detectandrecoverfromdeadlocks
D)Noneoftheabove
10.Whichofthefollowingstatementsistrue?
A)Asafestateisadeadlockedstate.ANS:D
B)Asafestatemayleadtoadeadlockedstate.
C)Anunsafestateisnecessarily,andbydefinition,alwaysadeadlockedstate.
D)Anunsafestatemayleadtoadeadlockedstate.
11.Supposethattherearetenresourcesavailabletothreeprocesses.Attime0,thefollowing
dataiscollected.Thetableindicatestheprocess,themaximumnumberofresourcesneededby
theprocess,andthenumberofresourcescurrentlyownedbyeachprocess.Whichofthe
followingcorrectlycharacterizesthisstate?ANS:B
Process

MaximumNeeds

CurrentlyOwned
P0
10
4
P1
3
1
P2
6
4
A)Itissafe.
B)Itisnotsafe.
C)Thestatecannotbedetermined.
D)Itisanimpossiblestate.
12.Supposethatthereare12resourcesavailabletothreeprocesses.Attime0,thefollowing
dataiscollected.Thetableindicatestheprocess,themaximumnumberofresourcesneededby
theprocess,andthenumberofresourcescurrentlyownedbyeachprocess.Whichofthe
followingcorrectlycharacterizesthisstate?ANS:A
Process

MaximumNeeds

CurrentlyOwned
P0
10
4

P1
3
P2
7
A)Itissafe.
B)Itisnotsafe.
C)Thestatecannotbedetermined.
D)Itisanimpossiblestate.

2
4

13.Whichofthefollowingdatastructuresinthebanker'salgorithmisavectoroflengthm,
wheremisthenumberofresourcetypes?
A)Need
ANS:D
B)Allocation
C)Max
D)Available
14.Assumetherearethreeresources,R1,R2,andR3,thatareeachassigneduniqueinteger
values15,10,and25,respectively.Whatisaresourceorderingwhichpreventsacircularwait?
A)R1,R2,R3
ANS:D
B)R3,R2,R1
C)R3,R1,R2
D)R2,R1,R3
15.A_____couldbepreemptedfromaprocess.
ANS:B
A)mutexlock
B)CPU
C)semaphore
D)filelock
16.Inavirtualmachine,eachprogrambelievesthatithas____.
ANS:B
A)multipleprocessors
B)itsownmemory
C)another"virtual"computertoassistinitsoperations
D)morememorythanisphysicallyavailableonthemachine
17._____isnotanexampleofabenefitofvirtualmachines.
A)Theabilitytorunseveraldifferentoperatingsystemsthatallsharethesamehardware
ANS:C
B)Theabilitytoconcurrentlyrunseveraldifferentoperatingsystems
C)Useslessphysicalmemorythananactualoperatingsystem
D)Protectsthehostsystemfromguestoperatingsystems
18._________allowsavirtualmachinetobehaveasifitisactinginkernelmode.
ANS:C
A)Paravirtualization
B)Livemigration
C)Trapandemulate

D)TheJavavirtualmachine
19.WhichofthefollowingstatementsregardingavirtualCPU(VCPU)isconsideredfalse?
ANS:C
A)TheVCPUdoesnotexecutecode.
B)ItrepresentsthestateofthephysicalCPU.
C)EachguestsharestheVCPU.
D)TheVCPUisfoundinmostvirtualizationoptions.
20._________allowsforvirtualizationonsystemsthatdonothaveacleanseparationbetween
privilegedandnonprivilegedinstructions.
ANS:A
A)Binarytranslation
B)Trapandemulate
C)Applicationcontainment
D)Paravirtualization
21.Whichofthefollowingstatementsregardingnestedpagetables(NPTs)isfalse?
ANS:C
A)Theyareusedtorepresenttheguest'spagetablestate.
B)NPTsareusedforbothtrapandemulateandbinarytranslation.
C)NPTsreducethenumberofTLBmisses.
D)EachguestoperatingsystemmaintainsitsownNPT.
22._________occurswhenavirtualmachineisconfiguredwithmorevirtualCPUsthanthere
arephysicalCPUs.
A)Containment
B)CPUscheduling
ANS:C
C)Overcommitment
D)Itisnotpossibletoconfigureavirtualmachinewithmoreprocessorsthanexistinthesystem.

23.VMMiscodedinFirmwarein.
A)Hypervisor1.
B)Hypervisor2.
C)Hypervisor0.
D)Noneofabove.
24.AVMMwhichrunsdirectlyonhatdwareinmostprivelagedmode.
A)type0Hypervisor.
B)type1Hypervisor.
C)type2Hypervisor.
D)Paravirtualization.

25.HostedhypervisorwhichrunsonahostOperatingSystemis.
A)type2Hypervisor.
B)type0Hypervisor.
C)type1Hypervisor.

D)Paravirtualization.

26.Formoreefficiency,thesourcecodeoftheguestOperatingSystemismodifiedin.
A)typee0Hypervisor.
B)type1Hypervisor.
C)Paravirtualization.
D)type2Hypervisor.

27.LocationofaMulticomputersystemgenerallycanbein.
A)SameRack
B)Sameroom.
C)Worldwide
D)Allofabove.

28.InaDistributedsystemsaregenerally.
A)Possiblydifferent.
B)Same.
C)Shared
D)Alloftheabove.

29.InaMultiprocessorsysteminternodecommunicationisgenerally.
A)Dedicatedinterconnect
B)Traditionalnetwork
C)SharedRAM.
D)Allofabove.

30.InaDistributedsystem,nodeperipheralsaregenerally.
A)Sharedexec.
B)Allshared.
C)Fullsetpernode.
D)Alloftheabove.

31.WhichisnotaproblemofaRemoteProcedureCall.
A)Passingpointerparameters.
B)MessagePassing.
C)Weeklytypedlanguages.
D)UseofGlobalvariables.

32.NoSwitchisusedinwhichofnodesinterconnectiontopologies.
A)Star.
B)Grid.
C)Cube.
D)Ring.

33.Inanaccessmatrix,the____rightallowsaprocesstochangetheentriesinarow.
ANS:C
A)owner
B)copy
C)control.

D)switch

34.The____implementationofanaccesstableconsistsofsetsoforderedtriples.
ANS:A
A)globaltable
B)accesslistforobjects
C)lockkeymechanism
D)capabilitylist
35.Incapabilitylists,eachobjecthasa____todenoteitstype.
ANS:B
A)gate
B)tag
C)key
D)lock

36.IfanAccessControlMatrixorProtectionMatrixisslicedbyrowsandtheblank
entriesarediscarded,wegetalistcalled.
A)ProtectionList.
B)AccessControlList.
C)CapabilityList.
D)Noneoftheabove.

37.IfanAccessControlMatrixorProtectionMatrixisslicedbycolumnsandtheblank
entriesarediscarded,wegetalistcalled.
A)ProtectionList.
B)AccessControlList.
C)CapabilityList.
D)Noneoftheabove.

38.Inpractice,actuallystoringofAccessControlMatrixorProtectionMatrixis
neverdonebecause.
A)Itisdense.
B)Itislargeandsparse.
C)Ithasnotenoughcells.
D)Noneoftheabove.

39.Themostcommonmethodusedbyattackerstobreachsecurityis____.
ANS:A
A)masquerading
B)messagemodification
C)sessionhijacking
D)phishing
40.Acodesegmentthatmisusesitsenvironmentiscalled____.
ANS:D
A)abackdoor
B)atrapdoor
C)aworm

D)aTrojanhorse
41.Worms____.
ANS:D
A)usethespawnmechanismtoravagesystemperformance
B)canshutdownanentirenetwork
C)continuetogrowastheInternetexpands
D)Alloftheabove
42.Adenialofserviceattackis____.
ANS:C
A)aimedatgaininginformation
B)aimedatstealingresources
C)aimedatdisruptinglegitimateuseofasystem
D)generallynotnetworkbased
43.Inapairedpasswordsystem,____.
ANS:B
A)theuserspecifiestwopasswords
B)thecomputersuppliesonepartofapasswordandtheuserenterstheotherpart
C)passwordsmustcontainequalamountsofnumbersanddigitspairedtogether
D)twousersmustentertheirownseparatepasswordtogainaccesstothesystem
44.A____viruschangeseachtimeitisinstalledtoavoiddetectionbyantivirussoftware.
ANS:A
A)polymorphic
B)tunneling
C)multipartite
D)stealth

45.A____isapublickeydigitallysignedbyatrustedparty.
ANS:B
A)keyring
B)digitalcertificate
C)messagedigest
D)digitalkey

You might also like