1000 MEQs - PDF 2 Operating Systems
1000 MEQs - PDF 2 Operating Systems
1000 MEQs
50 Qs on SYSTEM SOFTWARE AND
OPERATING SYSTEM
Most Expected Questions Course
SYSTEM SOFTWARE
1. Round robin
2. Shortest job first
3. Latest job first
1. Round robin
2. Shortest job first
3. Latest job first
a) Sequence access
b) Direct access
c) Both a) and b)
d) None of these
OPERATING SYSTEM
a) Sequence access
b) Direct access
c) Both a) and b)
d) None of these
OPERATING SYSTEM
Direct Access –
Another method is direct access method also known as relative access method.
• Allows the program to read and write record rapidly , in no particular order.
• The direct access is based on the disk model of a file since disk allows random access to
any file block.
OPERATING SYSTEM
113. Using a larger block size in a fixed block size file system leads to :
1. better disk throughput
2. poorer disk space utilization
3. reduced disk throughput
4. Better disk space utilization
a) 1 and 4
b) 2 and 3
c) 1 and 2
d) 3 and 4
OPERATING SYSTEM
113. Using a larger block size in a fixed block size file system leads to :
1. better disk throughput
2. poorer disk space utilization
3. reduced disk throughput
4. Better disk space utilization
115. A file system with 300 GByte uses a file descriptor with 8 direct block address. 1
indirect block address and 1 doubly indirect block address. The size of each disk block is
128 Bytes and the size of each disk block address is 8 Bytes. The maximum possible file
size in this file system is
(A) 3 Kbytes
(B) 35 Kbytes
(C) 280 Bytes
(D) Dependent on the size of the disk
OPERATING SYSTEM
115. A file system with 300 GByte uses a file descriptor with 8 direct block address. 1 indirect block
address and 1 doubly indirect block address. The size of each disk block is 128 Bytes and the size of
each disk block address is 8 Bytes. The maximum possible file size in this file system is
(A) 3 Kbytes
(B) 35 Kbytes
(C) 280 Bytes
(D) Dependent on the size of the disk
Answer (B)
Total number of possible addresses stored in a disk block = 128/8 = 16
Maximum number of addressable bytes due to direct address block = 8*128
Maximum number of addressable bytes due to 1 single indirect address block = 16*128
Maximum number of addressable bytes due to 1 double indirect address block = 16*16*128
The maximum possible file size = 8*128 + 16*128 + 16*16*128 = 35KB
OPERATING SYSTEM
116. A Unix-style i-node has 10 direct pointers and one single, one double and one triple
indirect pointers. Disk block size is 1 Kbyte, disk block address is 32 bits, and 48-bit
integers are used. What is the maximum possible file size ?
(A) 224 bytes
(B) 232 bytes
(C) 234 bytes
(D) 248 bytes
A Unix-style i-node has 10 direct pointers and one single, one double and one triple indirect
pointers. Disk block size is 1 Kbyte, disk block address is 32 bits, and 48-bit integers are used. What
is the maximum possible file size ?
(A) 224 bytes
(B) 232 bytes Size of Disk Block = 1Kbyte
(C) 234 bytes Disk Blocks address = 32bits,
(D) 248 bytes
but 48 bit integers are used for address
Therefore address size = 6 bytes
No of addresses per block =
A Unix-style i-node has 10 direct pointers and one single, one double and one triple indirect
pointers. Disk block size is 1 Kbyte, disk block address is 32 bits, and 48-bit integers are used. What
is the maximum possible file size ?
(A) 224 bytes
(B) 232 bytes Size of Disk Block = 1Kbyte
(C) 234 bytes Disk Blocks address = 32bits,
(D) 248 bytes but 48 bit integers are used for address
Therefore address size = 6 bytes
No of addresses per block = 1024/6 =
170.66
Therefore 170 ≈ 2^8 addresses per block
can be stored
A Unix-style i-node has 10 direct pointers and one single, one double and one triple indirect
pointers. Disk block size is 1 Kbyte, disk block address is 32 bits, and 48-bit integers are used. What
is the maximum possible file size ?
(A) 224 bytes
(B) 232 bytes Size of Disk Block = 1Kbyte
(C) 234 bytes Disk Blocks address = 32bits,
(D) 248 bytes but 48 bit integers are used for address
Therefore address size = 6 bytes
No of addresses per block = 1024/6 = 170.66
Therefore 170 ≈ 2^8 addresses per block can be stored
Maximum File Size = 10 Direct + 1 Single Indirect + 1
Double Indirect + 1 Triple Indirect
A Unix-style i-node has 10 direct pointers and one single, one double and one triple
indirect pointers. Disk block size is 1 Kbyte, disk block address is 32 bits, and 48-bit
integers are used. What is the maximum possible file size ?
(A) 224 bytes
Size of Disk Block = 1Kbyte
(B) 232 bytes
Disk Blocks address = 32bits,
(C) 234 bytes
but 48 bit integers are used for address
(D) 248 bytes Therefore address size = 6 bytes
No of addresses per block = 1024/6 = 170.66
Therefore 170 ≈ 2^8 addresses per block can be stored
Maximum File Size = 10 Direct + 1 Single Indirect + 1
Double Indirect + 1 Triple Indirect
= 10 + 28 + 28*28 + 28*28*28 ≈ 224
A Unix-style i-node has 10 direct pointers and one single, one double and one triple
indirect pointers. Disk block size is 1 Kbyte, disk block address is 32 bits, and 48-bit
integers are used. What is the maximum possible file size ?
(A) 224 bytes Size of Disk Block = 1Kbyte
117. Consider a disk pack with the following specifications- 16 surfaces, 128
tracks per surface, 256 sectors per track and 512 bytes per sector.
What is the capacity of disk pack?
A. 256 MB
B. 152 MB
C. 128 MB
D. 64 MB
Consider a disk pack with the following
Given- specifications- 16 surfaces, 128 tracks per
Number of surfaces = 16 surface, 256 sectors per track and 512
Number of tracks per surface = 128 bytes per sector.
Number of sectors per track = 256 What is the capacity of disk pack?
Number of bytes per sector = 512 bytes
118. Consider a typical disk that rotates at 15000 RPM and has a transfer rate of 50 x
106 bytes/sec. If the average seek time of the disk is twice the average rotational delay
and the controller’s transfer time is 10 times the disk transfer time. What is the
average time (in milliseconds) to read or write a 512 byte sector of the disk?
A.8.09
B. 6.11
C. 9.23
D. NONE
Given- Average seek time
Rotation speed of the disk = 15000 RPM = 2 x Average rotational delay
Transfer rate = 50 x 106 bytes/sec = 2 x 2 msec
Average seek time = 2 x Average rotational delay = 4 msec
Controller’s transfer time = 10 x Disk transfer
time Disk transfer time
= Time taken to read or write 512 bytes
Time taken for one full rotation = 512 bytes / (50 x 106 bytes/sec)
= (60 / 15000) sec = 0.004 sec = 4 msec = 10.24 x 10-6 sec
= 0.01024 msec
Average rotational delay
= 1/2 x Time taken for one full rotation Controller’s transfer time
= 1/2 x 4 msec = 2 msec = 10 x Disk transfer time
= 10 x 0.01024 msec
= 0.1024 msec
A. 10 , QUEUE 10
B. 9 , QUEUE 11
C. 10 , QUEUE , 11
D. NONE
Consider a system which has a CPU bound process, which requires the burst time of 21
seconds. The multilevel Feed Back Queue scheduling algorithm is used and the queue
time quantum ‘2’ seconds and in each level it is incremented by ‘2’ seconds.Then how
many times the process will be interrupted and on which queue the process will terminate
the execution?
•Given n processes P1, P2, … , Pn and burst time of each process Pi as ti.
•Then, predicted burst time for process Pn+1 is given as-
In worst case,
The number of units that each process holds = One less than its maximum demand
So,
•Process P1 holds 2 unit of resource R
•Process P2 holds 2 unit of resource R
•Process P3 holds 2 unit of resource R
Thus,
•Maximum number of units of resource R that ensures deadlock = 2+2+2 = 6
•Minimum number of units of resource R that ensures no deadlock = 6 + 1 = 7
129. A system is having 3 user processes P1, P2 and P3 where P1 requires 22 units of
resource R, P2 requires 32 units of resource R, P3 requires 42 units of resource R. The
minimum number of units of R that ensures no deadlock is _____?
A. 100
B. 98
C. 96
D. 94
A system is having 3 user processes P1, P2 and P3 where P1 requires 22 units of resource R, P2
requires 32 units of resource R, P3 requires 42 units of resource R. The minimum number of units of R
that ensures no deadlock is _____?
In worst case,
The number of units that each process holds = One less than its maximum demand
So,
•Process P1 holds 21 units of resource R
•Process P2 holds 31 units of resource R
•Process P3 holds 41 units of resource R
Thus,
•Maximum number of units of resource R that ensures deadlock = 21 + 31 + 41 = 93
•Minimum number of units of resource R that ensures no deadlock = 93 + 1 = 94
130. If there are 1000 units of resource R in the system and each process in
the system requires 2 units of resource R, then how many processes can be
present at maximum so that no deadlock will occur?
A. 99
B. 999
C. 9999
D. 9
130.If there are 1000 units of resource R in the system and each process in the system
requires 2 units of resource R, then how many processes can be present at maximum
so that no deadlock will occur?
In worst case,
The number of units that each process holds = One less than its maximum demand
So,
•Process P1 holds 1 unit of resource R
•Process P2 holds 1 unit of resource R
•Process P3 holds 1 unit of resource R and so on.
•Process P1000 holds 1 unit of resource R
Thus,
•Minimum number of processes that ensures deadlock = 1000
•Maximum number of processes that ensures no deadlock = 1000 – 1 = 999
131. Consider a system having m resources of the same type being shared by n
processes. Resources can be requested and released by processes only one at
a time. The system is deadlock free if and only if-
Solution-
4. The quality of the virtual memory manager cannot have an extensive effect on overall
system performance.
Which is FALSE Statement ?
4. The quality of the virtual memory manager can have an extensive effect on overall
system performance.
133. Consider a three level paging scheme with a TLB. Assume no page
fault occurs. It takes 20 ns to search the TLB and 100 ns to access the
physical memory. If TLB hit ratio is 80%, the effective memory access
time is _______ nsec.
A. 100
B. 130
C. 150
D. 180
EAT = Hit Ratio (Access Time of TLB + Access Time of main memory)
+ Miss Ratio of TLB (Access Time of TLB + (L+1) x Access time of main memory)
Consider a three level paging scheme with a TLB.
Assume no page fault occurs. It takes 20 ns to
Given-
search the TLB and 100 ns to access the physical
Number of levels of page table = 3
memory. If TLB hit ratio is 80%, the effective
TLB access time = 20 ns
memory access time is _______ msec.
Main memory access time = 100 ns
TLB Hit ratio = 80% = 0.8
Calculating Effective Access Time-
Calculating TLB Miss Ratio-
Substituting the values in above formula, we get-
Effective Access Time
TLB Miss ratio
= 0.8 x { 20 ns + 100 ns } + 0.2 x { 20 ns + (3+1) x 100 ns }
= 1 – TLB Hit ratio
= 0.8 x 120 ns + 0.2 x 420 ns
= 1 – 0.8
= 96 ns + 84 ns
= 0.2
= 180 ns
Thus, effective memory access time = 180 ns.
134. Two processes, P1 and P2, need to access a critical section of code. Consider the
following synchronization construct used by the processes:
Here, JRF1 and JRF2 are shared variables,
/* P1 */ /* P2 */
while (true) { while (true) {
which are initialized to false. Which one of the
JRF1 = true; JRF2 = true; following statements is TRUE about the above
while (JRF2 == true); while (JRF1==true); construct?
/* Critical /* Critical (a) It does not ensure mutual exclusion.
Section */ Section */ (b) It does not ensure bounded waiting.
JRF1=false; JRF2 = false; (c) It requires that processes enter the critical
} } section in strict alteration.
/* Remainder section */ /* Remainder section */ (d) It does not prevent deadlocks, but ensures
mutual exclusion.
Two processes, P1 and P2, need to access a critical section of code. Consider the following
synchronization construct used by the processes:
Here, JRF1 and JRF2 are shared variables,
/* P1 */ /* P2 */
while (true) { while (true) {
which are initialized to false. Which one of the
JRF1 = true; JRF2 = true; following statements is TRUE about the above
while (JRF2 == true); while (JRF1==true); construct?
/* Critical /* Critical (a) It does not ensure mutual exclusion.
Section */ Section */ (b) It does not ensure bounded waiting.
JRF1=false; JRF2 = false; (c) It requires that processes enter the critical
} } section in strict alteration.
/* Remainder section */ /* Remainder section */ (d) It does not prevent deadlocks, but ensures
mutual exclusion.
135. A solution to the Dining Philosophers Problem which avoids deadlock is:
(A) ensure that all philosophers pick up the left fork before the right fork
(B) ensure that all philosophers pick up the right fork before the left fork
(C) ensure that one particular philosopher picks up the left fork before the right fork,
and that all other philosophers pick up the right fork before the left fork
(D) None of the above
A solution to the Dining Philosophers Problem which avoids deadlock is:
(A) ensure that all philosophers pick up the left fork before the right fork
(B) ensure that all philosophers pick up the right fork before the left fork
(C) ensure that one particular philosopher picks up the left fork before the right fork,
and that all other philosophers pick up the right fork before the left fork
(D) None of the above
136. Consider the following two scenarios in the dining philosophers problem:
1.First a philosopher has to enter a room with the table that restricts the number of
philosophers to four.
2.There is no restriction on the number of philosophers entering the room.
Which of the following is true?
A. Deadlock is possible in (i) and (ii).
B. Deadlock is possible in (i).
C. Starvation is possible in (i).
D. Deadlock is not possible in (ii).
E. Starvation is not possible in (ii)
Since restricting the number of philosophers to 4 is a deadlock free solution, Options A
and B are incorrect.
By the same logic, increasing the number of philosophers would make deadlock more
likely. So (ii) is vulnerable to deadlock, and hence, starvation too. Option D and E are
incorrect.
Starvation is definitely possible in (i) if a philosopher gets hungry more often and keeps
picking up both the forks again and again.
A. Any 4
B. Any 5
C. Any 6
D. None
When the process is switched, which information is not stored for later use?
•Program Counter
•Scheduling information
•Base and limit register value
•Currently used register
•Changed State
•I/O State information
•Accounting information
A. Any 4
B. Any 5
C. Any 6
D. None
141. Which statement is FALSE in context of Process control block ?
A. 4 ,5
B. 5,4
C. 3,4
D. 4,3
142. The minimum no. of states required with and without I/O Operation ?
A. 4 ,5
B. 5,4
C. 3,4
D. 4,3 •The minimum number of states through which a
process compulsorily goes through is 4.
•These states are new state, ready state, run state
and terminate state.
•However, if a process also requires the I/O
operation, then minimum number of states is 5.
143. Consider a system using TLB for paging with TLB access
time of 40ns. What hit ratio is reduced for TLB to reduce the
effective memory access time from 400ns to 280ns?
a) 95%
b) 90%
c) 85%
d) 80%
143. Consider a system using TLB for paging with TLB access
time of 40ns. What hit ratio is reduced for TLB to reduce the
effective memory access time from 400ns to 280ns?
a) 95%
b) 90%
c) 85%
Given that without using TLB, the effective memory access time
d) 80% = 400ns, which is 2 * tm
Hence memory access time tm = 200ns
Effective memory access time = H(tTLB + tm) + (1-H)(tTLB + 2Tm)
280 = H(40+200) + (1-H) (40 + 400)
H = 0.8 = 80%
144. A system has 56-bit virtual addresses and 48-bit physical addresses. If
the pages are 4kB in size, the number of bits required for virtual page
number and physical frame number will be respectively?
a) 56 and 48
b) 44 and 36
c) 41 and 31
d) 36 and 44
144. A system has 56-bit virtual addresses and 48-bit physical addresses. If
the pages are 4kB in size, the number of bits required for virtual page
number and physical frame number will be respectively?
a) 56 and 48 Given page size = 4KB = 212bytes, hence the line number (displacement
or offset) = 12 bits
b) 44 and 36
Virtual address 56 bits:
c) 41 and 31
d) 36 and 44
Page number = 56-12 = 44 bits
a) Spin lock
b) Deadlock
c) Livelock
d) None of these.
146. ____________ is a situation in which two or more
processes continuously change their state in response to
changes in the other process(es) without doing any useful work,
indefinitely.
a) Spin lock
b) Deadlock
c) Livelock
d) None of these. Livelock
This is similar to deadlock in that no progress is
made, but differs in that neither process is
blocked or waiting for anything.
147. Four jobs A, B, C and D are waiting in Ready Queue. Their
expected runtimes are 6, 2, 4 and x respectively. All jobs
entered in Ready queue at time zero. They must run
in.........order to minimize average response time if 2 < x < 4.
a) B, D, C, A
b) C, B, A, D
c) A, D, C, B
d) C, A, D, B
147. Four jobs A, B, C and D are waiting in Ready Queue. Their
expected runtimes are 6, 2, 4 and x respectively. All jobs
entered in Ready queue at time zero. They must run
in.........order to minimize average response time if 2 < x < 4.
a) B, D, C, A
b) C, B, A, D
c) A, D, C, B
d) C, A, D, B
148. Given that a computer system has only 5 processes. The first and
fourth processes are single threaded, second process is two threaded
and third and fifth processes are 4 threaded. So total how many page
tables will be managed by the operating system if all the page tables
are always in the main memory ?
A. Exactly 5
B. At most 12
C. At least 5
D. None of the above
148. Given that a computer system has only 5 processes. The first and
fourth processes are single threaded, second process is two threaded
and third and fifth processes are 4 threaded. So total how many page
tables will be managed by the operating system if all the page tables
are always in the main memory ?
A. Exactly 5
B. At most 12
As we know in multithreading memory is shared by the
C. At least 5 threads of the processes . So, Page table is also shared in
D. None of the above between the threads of the process.
x =7y (given)
Effective memory access time = 0.1 * x + (1-0.1)*y
= 0.1 * 7y + 0.9 * y
= 1.6 y
THANK YOU !!
Keep Learning, Keep Practicing
GATE NoteBook
Target JRF - UGC NET Computer Science Paper 2
1000 MEQs
50 Qs on SYSTEM SOFTWARE AND
OPERATING SYSTEM
Most Expected Questions Course
OPERATING SYSTEM
All processes will wait for 1 instance each and will suffer from deadlock.
OPERATING SYSTEM
154. Which of the following page replacement algorithms suffer from Belady
Anomaly ?
1. FCFS
2. LRU
3. MRU
a) 1 and 2
b) 2 and 3
c) 1 and 3
d) Only 2
e) All of them
OPERATING SYSTEM
154. Which of the following page replacement algorithms suffer from Belady
Anomaly ?
1. FCFS
2. LRU
3. MRU
a) 1 and 2
b) 2 and 3
c) 1 and 3
d) Only 2
e) All of them
OPERATING SYSTEM
155. If there are 32 pages and the page size is 1024 words, the what will be the
length of logical address ?
a) 10
b) 13
c) 15
d) 17
e) 18
OPERATING SYSTEM
155. If there are 32 pages and the page size is 1024 words, the what will be the
length of logical address ?
a) 10
b) 13
c) 15
d) 17
e) 18
(I) The size of pages is typically of any size depending upon user program.
(II) The physical addresses and virtual addresses are represented in bits.
a) Only I
b) Only II
c) Both
d) None
OPERATING SYSTEM
(I) The size of pages is typically of any size depending upon user program.
(II) The physical addresses and virtual addresses are represented in bits.
a) Only I
b) Only II
c) Both
d) None
The size of pages is typically a power of 2
OPERATING SYSTEM
a) Only 1
b) Only 3
c) 1 and 2
d) 2 and 3
e) All of the above
OPERATING SYSTEM
a) Only 1 Pass-1:
b) Only 3 •Define symbols and literals and remember them in symbol
c) 1 and 2 table and literal table respectively.
•Keep track of location counter
d) 2 and 3 •Process pseudo-operations
e) All of the above Pass-2:
•Generate object code by converting symbolic op-code into
respective numeric op-code
•Generate data for literals and look for values of symbols
OPERATING SYSTEM
a) Cache memory
b) Solid State Disk
c) Magnetic disk
d) Both a) and b)
e) All of the above
OPERATING SYSTEM
a) Cache memory
b) Solid State Disk
c) Magnetic disk
d) Both a) and b)
e) All of the above
Memory management keeps track of each and
every memory location, regardless of either it is
allocated to some process or it is free.
OPERATING SYSTEM
159. Consider the following statements about user level threads and kernel level threads.
Which one of the following statement is FALSE?
(A) Context switch time is longer for kernel level threads than for user level threads.
(B) User level threads do not need any hardware support.
(C) Related user level threads can be scheduled on different processors in a multi-
processor system.
(D) Blocking one user level thread blocks all related threads.
OPERATING SYSTEM
159. Consider the following statements about user level threads and kernel level threads.
Which one of the following statement is FALSE?
(A) Context switch time is longer for kernel level threads than for user level threads.
(B) User level threads do not need any hardware support.
(C) Related user level threads can be scheduled on different processors in a multi-
processor system.
(D) Blocking one user level thread blocks all related threads.
OPERATING SYSTEM
160. ___________ is/are I/O devices, used to store data, boot the system.
160. ___________ is/are I/O devices, used to store data, boot the system.
161. In HDD the data transfer is _________ and the data transfer is
_________ access in SSD.
a) Random, Sequential
b) Index Sequential, Random
c) Direct, Sequential
d) Sequential, Random
OPERATING SYSTEM
161. In HDD the data transfer is _________ and the data transfer is
_________ access in SSD.
a) Random, Sequential
b) Index Sequential, Random
c) Direct, Sequential
d) Sequential, Random
OPERATING SYSTEM
a) Only i
b) Only ii
c) Both i and ii
d) None of them
OPERATING SYSTEM
a) Only i
b) Only ii
c) Both i and ii
d) None of them
HDD SSD
Hard Disk Drive. Solid State Drive.
supports fewer I/O operations per second. supports more I/O operations per second.
In HDD the data transfer is sequential. In SSD the data transfer is random access.
less reliable due to possibility of mechanical failure, like head crash and
SSD is more reliable.
susceptibility to strong magnets.
HDD is cheaper per unit storage. SSD is costlier per unit storage.
HDD can produce noise due to mechanical movements. SSD does not produces noise.
UNI/LINUX
163. Pipes in UNIX was introduced by M.D Mcllory in June 1972– version 2,
10 UNIX installations. Piping is used to give ___________ .
163. Pipes in UNIX was introduced by M.D Mcllory in June 1972– version 2,
10 UNIX installations. Piping is used to give ___________ .
a) 1, 2 and 3
b) 2, 3 and 4
c) 1, 3 and 4
d) All of them
e) None of them
UNI/LINUX
a) I and III
b) Only II
c) II and III
d) I and II
e) Only III
UNI/LINUX
a) I and III
b) Only II
c) II and III
Generally, system calls are similar to function
d) I and II calls, the only difference is that they remove
e) Only III the control from the user process.
UNI/LINUX
167. Which of the following system calls in Unix used to gets the
parent and child process times ?
a) fork()
b) chroot()
c) times()
d) chmod()
UNI/LINUX
167. Which of the following system calls in Unix used to gets the
parent and child process times ?
a) fork()
b) chroot()
c) times()
d) chmod()
a) fork() : A new process is created
b) chroot() : changes the root directory of a file
c) times() : Gets the parent and child process times
d) chmod() : The mode of a file can be changed
UNI/LINUX
UNI/LINUX
UNI/LINUX
UNI/LINUX
WINDOWS OS
WINDOWS
UNI/LINUX
OS
WINDOWS
UNI/LINUX
OS
WINDOWS
UNI/LINUX
OS
WINDOWS
UNI/LINUX
OS
WINDOWS
UNI/LINUX
OS
WINDOWS
UNI/LINUX
OS
WINDOWS
UNI/LINUX
OS
OPERATING SYSTEM
a) The process wants to wait and allow the other process to wait.
b) The process wants to execute and also allow the other process to execute
simultaneously.
c) The process wants to execute but it will allow the other process to run first.
d) The process wants to execute but it will restrict the other process to run
first.
OPERATING SYSTEM
a) The process wants to wait and allow the other process to wait.
b) The process wants to execute and also allow the other process to execute
simultaneously.
c) The process wants to execute but it will allow the other process to run first.
d) The process wants to execute but it will restrict the other process to run
first.
PETERSON’S ALGORITHM –
3. The process wants to execute but it will allow the other process to run first.
4. The process performs busy waiting until the other process has finished it’s own critical
section.
5. After this the current process enters it’s critical section and adds or removes a random
number from the shared buffer.
6. After completing the critical section, it sets it’s own flag to false, indication it does not wish to
execute anymore.
7. The program runs for a fixed amount of time before exiting.
8. This time can be changed by changing value of the macro RT.
SYSTEM SOFTWARE
175. Match the following :-
List I (Multi-Threading Models) List II (Functions)
a) One to One 1. a thread blocking system call blocks entire process.
b) Many to One 2. restriction on the number of threads in the system.
c) Many to Many 3. no. of kernel threads depends on the kernel or app.
176. Storage management is a process for users to optimize the use of storage
devices and it is also responsible for :
a) Protecting the integrity of data for any media on which it resides
b) covering aspects such as security, virtualization and more, as well as
different types of provisioning or automation
c) improve the performance of system.
d) All of the above
OPERATING SYSTEM
176. Storage management is a process for users to optimize the use of storage
devices and it is also responsible for :
a) Protecting the integrity of data for any media on which it resides
b) covering aspects such as security, virtualization and more, as well as
different types of provisioning or automation
c) improve the performance of system.
d) All of the above
OPERATING SYSTEM
178. _________ is a feature that allows users to switch between user accounts on
a single computer without quitting applications and logging out in windows
operating system.
a) Multi-user Operating System
b) Fast User Switching
c) Terminal services
d) None of the above
WINDOWS OPERATING SYSTEM
178. _________ is a feature that allows users to switch between user accounts on
a single computer without quitting applications and logging out in windows
operating system.
a) Multi-user Operating System
b) Fast User Switching
c) Terminal services
d) None of the above
WINDOWS OPERATING SYSTEM
179. Terminal Server client require two license to connect to a terminal server.
The first license is a __________ and second is a client access license for the
server.
a) Windows 10 workstation license
b) Windows NT workstation license
c) Server access license
d) None of these
WINDOWS OPERATING SYSTEM
179. Terminal Server client require two license to connect to a terminal server.
The first license is a __________ and second is a client access license for the
server.
a) Windows 10 workstation license
b) Windows NT workstation license
c) Server access license
d) None of these
WINDOWS OPERATING SYSTEM
187. Consider the set of 6 processes whose arrival time and burst time are given below-
If the CPU scheduling policy is Round Robin with time quantum = 2, calculate the average
turn around time and average waiting time.
Process Arrival time Burst time
a) 11.89, 6.98 P1 0 4
b) 10.84, 7.33 P2 1 5
c) 9.74, 8.93 P3 2 2
d) 13.04, 6.89 P4 3 1
P5 4 6
P6 6 3
OPERATING SYSTEM
Arrival Burst
Process
time time
P1 0 4
P2 1 5
P3 2 2
P4 3 1
P5 4 6
P6 6 3
OPERATING SYSTEM
Arrival Burst
Process
time time
P1 0 4
P2 1 5
P3 2 2
P4 3 1
P5 4 6
P6 6 3
OPERATING SYSTEM
Arrival Burst
Process
time time
P1 0 4
P2 1 5
P3 2 2
P4 3 1
P5 4 6
P6 6 3
WINDOWS OPERATING SYSTEM
187. Consider the set of 6 processes whose arrival time and burst time are given below-
If the CPU scheduling policy is Round Robin with time quantum = 2, calculate the average
turn around time and average waiting time.
Process Arrival time Burst time
a) 11.89, 6.98 P1 0 4
b) 10.84, 7.33 P2 1 5
c) 9.74, 8.93 P3 2 2
d) 13.04, 6.89 P4 3 1
P5 4 6
P6 6 3
188. For the processes listed in the following (A)5
table, (B)6
(C)7
Using Round Robin with TQ = 2 , find the (D)8
number of context switches ?
ANSWER : B
Rate monotonic scheduling is a scheduling algorithm used in real-time operating
systems with a static-priority scheduling class.
194. Assume that the following jobs are to be executed on a single processor
system
-----------------------
Job-Id CPU-BurstTime
-----------------------
p 4
q 1
r 8
s 1
t 2
-----------------------
The jobs are assumed to have arrived at time 0 and in the order p, q, r, s, t.
Calculate the Turn around time for job p if scheduling is round robin with time
slice 1.
(a) 4 (b) 10 (c) 11 (d) 12
A. 10 ns
B. 20 ns
C. 30 ns
D. none
Let the page fault service time be 10 ms in a computer with
average memory access time being 20 ns. If one page fault EMAT (with page faults) =
is generated for every 10 6 memory accesses, what is the Page fault rate x {EAT without page fault + Page
effective access time for the memory? fault service time} + (1- Page fault rate) x {EMAT
without page fault}
Page fault service time = 10 ms
Average memory access time = 20 ns
One page fault occurs for every 10 6 memory accesses
It is given that one page fault occurs for every 10 6 memory
accesses.
Page fault rate = 1 / 106 = 10-6