0% found this document useful (0 votes)
10 views

Operating System 2

Past question on mobile app development

Uploaded by

peace.jones112
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

Operating System 2

Past question on mobile app development

Uploaded by

peace.jones112
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

resource types

1. What is a reusable resource? b) using thread


a) that can be used by one process c) using pipes
at a time and is not depleted by d) all of the mentioned
that use
b) that can be used by more than 5. Which one of the following is the
one process at a time deadlock avoidance algorithm?
c) that can be shared between a) banker’s algorithm
various threads b) round-robin algorithm
d) none of the mentioned c) elevator algorithm
d) karn’s algorithm
2. Which of the following condition
is required for a deadlock to be 6. What is the drawback of
possible? banker’s algorithm?
a) mutual exclusion a) in advance processes rarely
b) a process may hold allocated know how much resource they will
resources while awaiting need
assignment of other resources b) the number of processes
c) no resource can be forcibly changes as time progresses
removed from a process holding it c) resource once available can
d) all of the mentioned disappear
d) all of the mentioned
3. A system is in the safe state if
____________ 7. For an effective operating
a) the system can allocate system, when to check for
resources to each process in some deadlock?
order and still avoid a deadlock a) every time a resource request is
b) there exist a safe sequence made
c) all of the mentioned b) at fixed time intervals
d) none of the mentioned c) every time a resource request is
made at fixed time intervals
4. The circular wait condition can d) none of the mentioned
be prevented by ____________
a) defining a linear ordering of

Course Lecturer: Martin Offei Good luck my friend 1


8. A problem encountered in d) a mapping from one address
multitasking when a process is space to another
perpetually denied necessary
resources is called ____________ 12. Binding of instructions and
a) deadlock data to memory addresses can be
b) starvation done at ____________
c) inversion a) Compile time
d) aging b) Load time
c) Execution time
9. Which one of the following is a d) All of the mentioned
visual ( mathematical ) way to
determine the deadlock 13. If the process can be moved
occurrence? during its execution from one
a) resource allocation graph memory segment to another, then
b) starvation graph binding must be ____________
c) inversion graph a) delayed until run time
d) none of the mentioned b) preponed to compile time
c) preponed to load time
10. To avoid deadlock d) none of the mentioned
____________
a) there must be a fixed number of 14. What is Dynamic loading?
resources to allocate a) loading multiple routines
b) resource allocation must be dynamically
done only once b) loading a routine only when it
c) all deadlocked processes must is called
be aborted c) loading multiple routines
d) inversion technique can be used randomly
d) none of the mentioned
11. What is Address Binding?
a) going to an address in memory 15. What is the advantage of
b) locating an address with the dynamic loading?
help of another address a) A used routine is used multiple
c) binding two addresses together times
to form a new address in a b) An unused routine is never
different memory space loaded
Course Lecturer: Martin Offei Good luck my friend 2
c) CPU utilization increases process. When the higher priority
d) All of the mentioned process finishes, the lower
priority process is swapped back
16. The idea of overlays is to in and continues execution. This
____________ variant of swapping is sometimes
a) data that are needed at any called?
given time a) priority swapping
b) enable a process to be larger b) pull out, push in
than the amount of memory c) roll out, roll in
allocated to it d) none of the mentioned
c) keep in memory only those
instructions 20. If binding is done at
d) all of the mentioned assembly or load time, then the
process _____ be moved to
17. The ___________ must different locations after being
design and program the overlay swapped out and in again.
structure. a) can
a) programmer b) must
b) system architect c) can never
c) system designer d) may
d) none of the mentioned
21. In a system that does not
18. The ___________ swaps support swapping ____________
processes in and out of the a) the compiler normally binds
memory. symbolic addresses (variables) to
a) Memory manager relocatable addresses
b) CPU b) the compiler normally binds
c) CPU manager symbolic addresses to physical
d) User addresses
c) the loader binds relocatable
19. If a higher priority process addresses to physical addresses
arrives and wants service, the d) binding of symbolic addresses
memory manager can swap out to physical addresses normally
the lower priority process to takes place during execution
execute the higher priority
Course Lecturer: Martin Offei Good luck my friend 3
22. Which of the following is 25. While working with MS-DOS
TRUE? which command is used to move
a) Overlays are used to increase file from one directory to another?
the size of physical memory (A) Cp
b) Overlays are used to increase (B) Move
the logical address space (C) Copy
c) When overlays are used, the (D) Rename
size of a process is not limited to
the size of the physical memory 26. Characteristics of an operating
d) Overlays are used whenever system is/are
the physical address space is (A) Error recovery
smaller than the logical address (B) Resource management
space (C) Memory management
(D) All of the above
23. The primary takes care of the
behind the scenes details and 27. To display the list of all the file
manages the hardware on the disk you would type
(A) Hard disk (A) DIR AUTOEXEC.BAT
(B) Peripheral devices (B) DIR FILES
(C) Application software (C) DIR
(D) Operating system (D) COPY

24. The capabilities of the 28. Internal commands in DOS are


operating system is to enable two (A) Del, disk, copy, label
or more than two programs to (B) Dir, ren, sys
execute simultaneously in a single (C) Cls, rd label
computer system by a single (D) Time, type, dir
processor is
(A) Multi-execution 29. ____ controls the way in which
(B) Multi-programming the computer system functions and
(C) Multi-tasking provides a means by which users
(D) Multi-processing can interact with the computer.
(A) Application software
(B) The motherboard
(C) The operating system

Course Lecturer: Martin Offei Good luck my friend 4


(D) The platform 34.____ controls the way in which
the computer system functions and
30. ____ loader is executed, when provides a means by which users
a system is first turned ON or can interact with the computer.
restarted. (A) Application software
(A) Compile and Go (B) The motherboard
(B) Relating (C) The operating system
(C) Harmish (D) The platform
(D) Bootstrap
35.____ loader is executed, when a
31. All the time a computer is system is first turned ON or
switched ON, its operating system restarted.
software has to stay in (A) Compile and Go
(A) DVDs (B) Relating
(B) CDs (C) Harmish
(C) Main storage (D) Bootstrap
(D) Primary storage
36. All the time a computer is
32. The ___ commands are those switched ON, its operating system
which are included with software has to stay in
“command.com” and no external (A) DVDs
file is needed to run those (B) CDs
commands. (C) Main storage
(A) Wild cards (D) Primary storage
(B) Super
(C) Internal 37.The ___ commands are those
(D) External which are included with
“command.com” and no external
33.In UNIX, name the system call file is needed to run those
which create(s) the new process? commands.
(A) Fork (A) Wild cards
(B) New (B) Super
(C) Create (C) Internal
(D) Creation (D) External

Course Lecturer: Martin Offei Good luck my friend 5


38.In UNIX, name the system call 42.An entire path name, consisting
which create(s) the new process? of several sub directory names can
(A) Fork contain upto
(B) New (A) 13 character
(C) Create (B) 36 character
(D) Creation (C) 53 character
(D) 63 character
39.What is the standard set of
functions through which an 43.The ability of an operating
application interacts with the system to run more than one
Kernel? application at a time is called
(A) Compilers (A) Multi user computing
(B) Utility programs (B) Time sharing
(C) Kernel code (C) Object oriented programming
(D) System libraries (D) Multi tasking

40. DEL command is used to 44.RESTORE command is used to


(A) Delete files (A) Restore files which are deleted
(B) Delete labels recently
(C) Delete contents (B) Restore files from disks made
(D) Delete directory using the BACKUP command
(C) Restore files is used to
(D) Restore files from recycle bin
41.____ is a set of computer
programs that run or control 45.____ used to create a new
computer hardware and acts as an Directory or nested Directories.
interface between application (A) MZND or MKMDIR
programs and users. (B) MD or MKDIR
(A) The CPU (C) MND or MKNDIR
(B) An operating system (D) DM or MFDIR
(C) Object code
(D) A compiler 46. While working with MS-DOS
which command transfers a
specific file from one disk to
another?

Course Lecturer: Martin Offei Good luck my friend 6


(A) Diskcopy (A) Are used only on large
(B) Copy mainframe computers
(C) Time (B) Are easier to develop than
(D) Rename single programming systems
(C) Execute more jobs at the same
47.Restarting a running computer time
is called (D) Execute each faster
(A) Normal boot
(B) Cold boot 52.The operating system
(C) Cool boot determines the manner in which
(D) Warm boot all of the following occurs except
(A) Data displayed on the monitor
48.Which of the following (B) Printer output
extensions suggest that the file is (C) User interaction with the
backup copy processor
(A) Txt (D) User creation of a document
(B) Bak
(C) Com 53. CHKDSK command is used to
(D) Bas (A) Report the status of files on
disk
49.Embedded operating system (B) Diagnose the hard disk error
used (C) Analyze the hard disk error
(A) On a mainframe (D) All of the above
(B) On a PDA
(C) On a desktop operating system 54.A memory resident command
(D) On a networked PC refers to
(A) Wild cards
50.Extension name may be ___ to (B) Pipes
___ characters. (C) Internal command
(A) 0-5 (D) External command
(B) 0-6
(C) 2-9 55.Which command is used to get
(D) 0-3 the current date only?
(A) Date
51.Multi programming systems (B) Time

Course Lecturer: Martin Offei Good luck my friend 7


(C) Second executed in sequence without any
(D) All of the above input from the user.
(A) Batch file
56.The vol command is used to (B) Path
(A) See the volume of largest (C) Pipe
(B) See the disk volume label (D) All of these
(C) See the variety of language
(D) See the value of list 61.DIR command is used to
(A) Display a list of files in a
57.Turn on the computer for first directory
time on a day is called a (B) Display type of files in a sub
(A) Hot boot directory
(B) Cold boot (C) Display contents of files in
(C) Cool boot directory
(D) Warm boot (D) All of the above

58.Process that starts up a 62._____ is the sequence of


computer is called directories and subdirectories the
(A) Processing operating system must follow to
(B) Starting find a specific file.
(C) Booting (A) Internal command
(D) All of these (B) Path
(C) External command
59. A(n) ___ is a set of programs (D) Extension
that manage computer hardware
resources and provide common 63. Which command divides the
services for application software. surface of the blank disk into
(A) Operating system sectors and assign a unique
(B) MS PowerPoint address to each one
(C) MS Word (A) Chkdsk
(D) Web browser (B) Ver
(C) Format
60.____ is a file that includes a (D) Fat
series of commands that are

Course Lecturer: Martin Offei Good luck my friend 8


64.The operating system that is (B) Embedded operating system
self-contained in a device and (C) Real time operating system
resident in the ROM is known as (D) Batch operating system
(A) Multi processor operating
system

Course Lecturer: Martin Offei Good luck my friend 9

You might also like