We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9
resource types
1. What is a reusable resource? b) using thread
a) that can be used by one process c) using pipes at a time and is not depleted by d) all of the mentioned that use b) that can be used by more than 5. Which one of the following is the one process at a time deadlock avoidance algorithm? c) that can be shared between a) banker’s algorithm various threads b) round-robin algorithm d) none of the mentioned c) elevator algorithm d) karn’s algorithm 2. Which of the following condition is required for a deadlock to be 6. What is the drawback of possible? banker’s algorithm? a) mutual exclusion a) in advance processes rarely b) a process may hold allocated know how much resource they will resources while awaiting need assignment of other resources b) the number of processes c) no resource can be forcibly changes as time progresses removed from a process holding it c) resource once available can d) all of the mentioned disappear d) all of the mentioned 3. A system is in the safe state if ____________ 7. For an effective operating a) the system can allocate system, when to check for resources to each process in some deadlock? order and still avoid a deadlock a) every time a resource request is b) there exist a safe sequence made c) all of the mentioned b) at fixed time intervals d) none of the mentioned c) every time a resource request is made at fixed time intervals 4. The circular wait condition can d) none of the mentioned be prevented by ____________ a) defining a linear ordering of
Course Lecturer: Martin Offei Good luck my friend 1
8. A problem encountered in d) a mapping from one address multitasking when a process is space to another perpetually denied necessary resources is called ____________ 12. Binding of instructions and a) deadlock data to memory addresses can be b) starvation done at ____________ c) inversion a) Compile time d) aging b) Load time c) Execution time 9. Which one of the following is a d) All of the mentioned visual ( mathematical ) way to determine the deadlock 13. If the process can be moved occurrence? during its execution from one a) resource allocation graph memory segment to another, then b) starvation graph binding must be ____________ c) inversion graph a) delayed until run time d) none of the mentioned b) preponed to compile time c) preponed to load time 10. To avoid deadlock d) none of the mentioned ____________ a) there must be a fixed number of 14. What is Dynamic loading? resources to allocate a) loading multiple routines b) resource allocation must be dynamically done only once b) loading a routine only when it c) all deadlocked processes must is called be aborted c) loading multiple routines d) inversion technique can be used randomly d) none of the mentioned 11. What is Address Binding? a) going to an address in memory 15. What is the advantage of b) locating an address with the dynamic loading? help of another address a) A used routine is used multiple c) binding two addresses together times to form a new address in a b) An unused routine is never different memory space loaded Course Lecturer: Martin Offei Good luck my friend 2 c) CPU utilization increases process. When the higher priority d) All of the mentioned process finishes, the lower priority process is swapped back 16. The idea of overlays is to in and continues execution. This ____________ variant of swapping is sometimes a) data that are needed at any called? given time a) priority swapping b) enable a process to be larger b) pull out, push in than the amount of memory c) roll out, roll in allocated to it d) none of the mentioned c) keep in memory only those instructions 20. If binding is done at d) all of the mentioned assembly or load time, then the process _____ be moved to 17. The ___________ must different locations after being design and program the overlay swapped out and in again. structure. a) can a) programmer b) must b) system architect c) can never c) system designer d) may d) none of the mentioned 21. In a system that does not 18. The ___________ swaps support swapping ____________ processes in and out of the a) the compiler normally binds memory. symbolic addresses (variables) to a) Memory manager relocatable addresses b) CPU b) the compiler normally binds c) CPU manager symbolic addresses to physical d) User addresses c) the loader binds relocatable 19. If a higher priority process addresses to physical addresses arrives and wants service, the d) binding of symbolic addresses memory manager can swap out to physical addresses normally the lower priority process to takes place during execution execute the higher priority Course Lecturer: Martin Offei Good luck my friend 3 22. Which of the following is 25. While working with MS-DOS TRUE? which command is used to move a) Overlays are used to increase file from one directory to another? the size of physical memory (A) Cp b) Overlays are used to increase (B) Move the logical address space (C) Copy c) When overlays are used, the (D) Rename size of a process is not limited to the size of the physical memory 26. Characteristics of an operating d) Overlays are used whenever system is/are the physical address space is (A) Error recovery smaller than the logical address (B) Resource management space (C) Memory management (D) All of the above 23. The primary takes care of the behind the scenes details and 27. To display the list of all the file manages the hardware on the disk you would type (A) Hard disk (A) DIR AUTOEXEC.BAT (B) Peripheral devices (B) DIR FILES (C) Application software (C) DIR (D) Operating system (D) COPY
24. The capabilities of the 28. Internal commands in DOS are
operating system is to enable two (A) Del, disk, copy, label or more than two programs to (B) Dir, ren, sys execute simultaneously in a single (C) Cls, rd label computer system by a single (D) Time, type, dir processor is (A) Multi-execution 29. ____ controls the way in which (B) Multi-programming the computer system functions and (C) Multi-tasking provides a means by which users (D) Multi-processing can interact with the computer. (A) Application software (B) The motherboard (C) The operating system
Course Lecturer: Martin Offei Good luck my friend 4
(D) The platform 34.____ controls the way in which the computer system functions and 30. ____ loader is executed, when provides a means by which users a system is first turned ON or can interact with the computer. restarted. (A) Application software (A) Compile and Go (B) The motherboard (B) Relating (C) The operating system (C) Harmish (D) The platform (D) Bootstrap 35.____ loader is executed, when a 31. All the time a computer is system is first turned ON or switched ON, its operating system restarted. software has to stay in (A) Compile and Go (A) DVDs (B) Relating (B) CDs (C) Harmish (C) Main storage (D) Bootstrap (D) Primary storage 36. All the time a computer is 32. The ___ commands are those switched ON, its operating system which are included with software has to stay in “command.com” and no external (A) DVDs file is needed to run those (B) CDs commands. (C) Main storage (A) Wild cards (D) Primary storage (B) Super (C) Internal 37.The ___ commands are those (D) External which are included with “command.com” and no external 33.In UNIX, name the system call file is needed to run those which create(s) the new process? commands. (A) Fork (A) Wild cards (B) New (B) Super (C) Create (C) Internal (D) Creation (D) External
Course Lecturer: Martin Offei Good luck my friend 5
38.In UNIX, name the system call 42.An entire path name, consisting which create(s) the new process? of several sub directory names can (A) Fork contain upto (B) New (A) 13 character (C) Create (B) 36 character (D) Creation (C) 53 character (D) 63 character 39.What is the standard set of functions through which an 43.The ability of an operating application interacts with the system to run more than one Kernel? application at a time is called (A) Compilers (A) Multi user computing (B) Utility programs (B) Time sharing (C) Kernel code (C) Object oriented programming (D) System libraries (D) Multi tasking
40. DEL command is used to 44.RESTORE command is used to
(A) Delete files (A) Restore files which are deleted (B) Delete labels recently (C) Delete contents (B) Restore files from disks made (D) Delete directory using the BACKUP command (C) Restore files is used to (D) Restore files from recycle bin 41.____ is a set of computer programs that run or control 45.____ used to create a new computer hardware and acts as an Directory or nested Directories. interface between application (A) MZND or MKMDIR programs and users. (B) MD or MKDIR (A) The CPU (C) MND or MKNDIR (B) An operating system (D) DM or MFDIR (C) Object code (D) A compiler 46. While working with MS-DOS which command transfers a specific file from one disk to another?
Course Lecturer: Martin Offei Good luck my friend 6
(A) Diskcopy (A) Are used only on large (B) Copy mainframe computers (C) Time (B) Are easier to develop than (D) Rename single programming systems (C) Execute more jobs at the same 47.Restarting a running computer time is called (D) Execute each faster (A) Normal boot (B) Cold boot 52.The operating system (C) Cool boot determines the manner in which (D) Warm boot all of the following occurs except (A) Data displayed on the monitor 48.Which of the following (B) Printer output extensions suggest that the file is (C) User interaction with the backup copy processor (A) Txt (D) User creation of a document (B) Bak (C) Com 53. CHKDSK command is used to (D) Bas (A) Report the status of files on disk 49.Embedded operating system (B) Diagnose the hard disk error used (C) Analyze the hard disk error (A) On a mainframe (D) All of the above (B) On a PDA (C) On a desktop operating system 54.A memory resident command (D) On a networked PC refers to (A) Wild cards 50.Extension name may be ___ to (B) Pipes ___ characters. (C) Internal command (A) 0-5 (D) External command (B) 0-6 (C) 2-9 55.Which command is used to get (D) 0-3 the current date only? (A) Date 51.Multi programming systems (B) Time
Course Lecturer: Martin Offei Good luck my friend 7
(C) Second executed in sequence without any (D) All of the above input from the user. (A) Batch file 56.The vol command is used to (B) Path (A) See the volume of largest (C) Pipe (B) See the disk volume label (D) All of these (C) See the variety of language (D) See the value of list 61.DIR command is used to (A) Display a list of files in a 57.Turn on the computer for first directory time on a day is called a (B) Display type of files in a sub (A) Hot boot directory (B) Cold boot (C) Display contents of files in (C) Cool boot directory (D) Warm boot (D) All of the above
58.Process that starts up a 62._____ is the sequence of
computer is called directories and subdirectories the (A) Processing operating system must follow to (B) Starting find a specific file. (C) Booting (A) Internal command (D) All of these (B) Path (C) External command 59. A(n) ___ is a set of programs (D) Extension that manage computer hardware resources and provide common 63. Which command divides the services for application software. surface of the blank disk into (A) Operating system sectors and assign a unique (B) MS PowerPoint address to each one (C) MS Word (A) Chkdsk (D) Web browser (B) Ver (C) Format 60.____ is a file that includes a (D) Fat series of commands that are
Course Lecturer: Martin Offei Good luck my friend 8
64.The operating system that is (B) Embedded operating system self-contained in a device and (C) Real time operating system resident in the ROM is known as (D) Batch operating system (A) Multi processor operating system
Course Lecturer: Martin Offei Good luck my friend 9