Quiz Sail Part 1 Flashcards
For a Hold and wait condition to prevail:
A: A process must hold at least one resource and not be waiting to acquire additional resources
B: A process must be holding at least one resource and waiting to acquire additional resources that are being held by other processes
C: None of the mentioned
D: A process must be not be holding a resource, but waiting for one to be freed, and then request to acquire it
B: A process must be holding at least one resource and waiting to acquire additional resources that are being held by other processes
What is ‘separation’ in security of Operating systems?
A: To have separate Hard disk drive/partition for different users
B: It means keeping one user’s objects separate from other users
C: None of the mentioned
D: To have separate login for different users
B: It means keeping one user’s objects separate from other users
The main disadvantage of spinlocks is that:
A: they are unreliable sometimes
B: they require busy waiting
C: they are too complex for programmers
D: they are not sufficient for many process
B: they require busy waiting
What is characteristics of Authorization?
A: 3 way handshaking with syn and fin
B: RADIUS and RSA
C: Deals with privileges and rights
D: Multilayered protection for securing resources
C: Deals with privileges and rights
The two phase locking protocol consists of:
A: destruction & creation phase
B: growing & shrinking phase
C: shrinking & creation phase
D: creation & growing phase
B: growing & shrinking phase
To organise file systems on disk,:
A: information about files is added to each partition
B: all of the mentioned
C: they are made on different storage spaces
D: they are split into one or more partitions
A: information about files is added to each partition
Memory management technique in which system stores and retrieves data from secondary storage for use in main memory is called:
A: fragmentation
B: paging
C: none of the mentioned
D: mapping
B: paging
Mapping refers to the process of associating a logical address (virtual address) with a physical address in memory.
Paging is a memory management technique that allows the operating system to divide the virtual memory space of a process into fixed-size blocks called pages.
It provides a mechanism for translating virtual addresses used by a program into physical addresses in main memory.
To find a particular file on a disk, refer to the disk’s:
A: buffer
B: table of contents
C: directory
D: control unit
C: directory
If a pointer is lost or damaged in a linked allocation:
A: there would not be any problems
B: none of the mentioned
C: the entire file could get damaged
D: only a part of the file would be affected
C: the entire file could get damaged
Standard set of functions through which interacts with kernel is defined by:
A: kernel code
B: system libraries
C: utility programs
D: compilers
B: system libraries
Scheduling is done so as to:
A: decrease CPU utilization
B: keep the CPU more idle
C: increase CPU utilization
D: None of the mentioned
C: increase CPU utilization
Multithreaded programs are:
A: lesser prone to deadlocks
B: not at all prone to deadlocks
C: none of the mentioned
D: more prone to deadlocks
D: more prone to deadlocks
A deadlock avoidance algorithm dynamically examines the –?– to ensure that a circular wait condition can never exist.
A: resources
B: resource allocation state
C: operating system
D: system storage state
B: resource allocation state
It is __________ to reread a page from the file system than to write it to swap space and then to reread it from there.
A: none of the mentioned
B: more efficient
C: useless
D: less efficient
B: more efficient
If relocation is static and is done at assembly or load time, compaction:
A: cannot be done
B: must be done
C: can be done
D: must not be done
A: cannot be done
What is meaning of right-set?
A: None of the mentioned
B: It is a subset of all valid operations that can be performed on the object
C: It is a subset consist of read,write and execute
D: It is a subset consist of read and write
B: It is a subset of all valid operations that can be performed on the object
The mount request is mapped to the corresponding –?– and is forwarded to the mount server running on the specific server machine.
A: CPU
B: System
C: IPC
D: RPC
B: System
A mount server, also known as a file server or network file server, is a computer or device that provides file-level storage services over a network.
Because the kernel thread management is done by the Operating System itself:
A: none of the mentioned
B: kernel threads are faster to create than user threads
C: kernel threads are slower to create than user threads
D: kernel threads are easier to manage as well as create then user threads
C: kernel threads are slower to create than user threads
The most effective technique to keep dispatch latency low is to:
A: make it user programmed
B: run less number of processes at a time
C: provide preemptive kernels
D: provide non preemptive kernels
C: provide preemptive kernels
The register context and stacks of a thread are deallocated when the thread:
A: unblocks
B: spawns
C: blocks
D: terminates
D: terminates
Which protocol establishes the initial logical connection between a server and a client?
A: mount protocol
B: transmission control protocol
C: user datagram protocol
D: datagram congestion control protocol
A: mount protocol
The child process can:
A: cannot have another program loaded into it
B: be a duplicate of the parent process
C: never be a duplicate of the parent process
D: never have another program loaded into it
B: be a duplicate of the parent process
Virtual memory is a –?– of memory contents.
A: physical model
B: mirror image
C: duplicate
D: logical model
D: logical model
The operating system –?– the links when traversing directory trees, to preserve the acyclic structure of the system.
A: none of the mentioned
B: deletes
C: ignores
D: considers
C: ignores
In virtual memory. the programmer –?– of overlays.
A: does not have to take care
B: all of the mentioned
C: none of the mentioned
D: has to take care
A: does not have to take care
The –?– swaps processes in and out of the memory.
A: CPU
B: Memory manager
C: User
D: CPU manager
B: Memory manager
Binding of instructions and data to memory addresses can be done at:
A: All of the mentioned
B: Execution time
C: Load time
D: Compile time
A: All of the mentioned
Address Binding is:
A: going to an address in memory
B: locating an address with the help of another address
C: binding two addresses together to form a new address in a different memory space
D: a mapping from one address space to another
D: a mapping from one address space to another
When the head damages the magnetic surface, it is known as:
A: magnetic damage
B: head crash
C: all of the mentioned
D: disk crash
B: head crash
Which mechanism is used by worm process?
A: Fake process
B: Trap door
C: VAX process
D: Spawn Process
D: Spawn Process
A relative block number is an index relative to:
A: the end of the file
B: the beginning of the file
C: none of the mentioned
D: the last written position in file
B: the beginning of the file
The process invoking the wait operation is:
A: none of the mentioned
B: stopped until the next process in the queue finishes execution
C: waiting for another process to complete before it can itself call the signal operation
D: suspended until another process invokes the signal operation
D: suspended until another process invokes the signal operation
The larger the block size, the –?– the internal fragmentation.
A: lesser
B: same
C: greater
D: none of the mentioned
C: greater
To create a file:
A: allocate the space in file system & make an entry for new file in directory
B: allocate the space in file system
C: make an entry for new file in directory
D: none of the mentioned
A: allocate the space in file system & make an entry for new file in directory
Management of metadata information is done by:
A: file-organisation module
B: application programs
C: logical file system
D: basic file system
C: logical file system
The deletion of a link, –?– the original file.
A: deletes
B: does not affect
C: none of the mentioned
D: affects
B: does not affect
The two steps of a process execution are:
A: OS & Memory Burst
B: CPU & I/O Burst
C: Memory & I/O Burst
D: I/O & OS Burst
B: CPU & I/O Burst
The request and release of resources are:
A: special programs
B: interrupts
C: command line statements
D: system calls
D: system calls
Which operation is performed by an interrupt handler?
A: Once done handling, bringing back the system to the original state it was before the interrupt occurred
B: All of the mentioned
C: Saving the current state of the system
D: Loading the interrupt handling code and executing it
B: All of the mentioned
The data structure used for file directory is called:
A: process table
B: file table
C: mount table
D: hash table
D: hash table
If binding is done at assembly or load time, then the process –?– be moved to different locations after being swapped out and in again.
A: may
B: can
C: must
D: can never
D: can never
When using counters to implement LRU, we replace the page with the:
A: none of the mentioned
B: largest time value
C: smallest time value
D: greatest size
C: smallest time value
What will happen if a non-recursive mutex is locked more than once?
A: Deadlock
B: Starvation
C: Aging
D: Signaling
A: Deadlock
What is theft of service?
A: This violation involves unauthorized use of resources
B: This violation involves unauthorized modification of data
C: This violation involves unauthorized destruction of data
D: This type of violation involves unauthorized reading of data
A: This violation involves unauthorized use of resources
Which principle states that programs, users and even the systems be given just enough privileges to perform their task?
A: principle of process scheduling
B: none of the mentioned
C: principle of least privilege
D: principle of operating system
C: principle of least privilege
The set of tracks that are at one arm position make up a:
A: magnetic disks
B: electrical disks
C: assemblies
D: cylinders
D: cylinders
A device driver can be thought of as a translator. Its input consists of –?– commands and output consists of –?– instructions.
A: low level, complex
B: high level, low level
C: low level, high level
D: complex, simple
B: high level, low level
To create a new file or find an existing file, a program executes:
A: a read instruction
B: a save command
C: an open command
D: a load command
C: an open command
What is a short-term scheduler?
A: It selects which process has to be brought into the ready queue
B: It selects which process has to be executed next and allocates CPU
C: It selects which process to remove from memory by swapping
D: None of the mentioned
B: It selects which process has to be executed next and allocates CPU
The reason for using the LFU page replacement algorithm is:
A: all of the mentioned
B: an actively used page should have a large reference count
C: it is extremely efficient and optimal
D: a less used page has more chances to be used again
B: an actively used page should have a large reference count
Which algorithm of disk scheduling selects the request with the least seek time from the current head positions?
A: FCFS scheduling
B: LOOK scheduling
C: SCAN scheduling
D: SSTF scheduling
D: SSTF scheduling
–?– is a unique tag, usually a number, identifies the file within the file system.
A: File name
B: File identifier
C: File type
D: None of the mentioned
B: File identifier
The series of accesses between the open and close operations is a:
A: file session
B: program
C: transaction
D: procedure
A: file session
During compaction time, other normal system operations –?– be permitted.
A: is
B: none of the mentioned
C: can
D: cannot
D: cannot
To create a new file application program calls:
A: logical file system
B: basic file system
C: file-organisation module
D: none of the mentioned
A: logical file system
If a kernel thread performs a blocking system call:
A: the kernel must schedule another thread of a different application for execution
B: the kernel can schedule another thread in the application for execution
C: the kernel must schedule another thread of the same application on a different processor
D: the kernel cannot schedule another thread in the same application for execution
B: the kernel can schedule another thread in the application for execution
Which buffer holds the output for a device?
A: output
B: spool
C: magic
D: status
B: spool
Real time systems need to –?– the interrupt latency.
A: not bother about
B: none of the mentioned
C: minimize
D: maximize
C: minimize
Cascading termination refers to termination of all child processes before the parent terminates:
A: Normally or abnormally
B: Abnormally
C: None of the mentioned
D: Normally
D: Normally
In UNIX, each process is identified by its:
A: None of the the mentioned
B: Process Control Block
C: Device Queue
D: Process Identifier
D: Process Identifier
The file management function incorporates routines that allow the user or programmer to:
A: create files by name
B: delete files by name
C: all of the mentioned
D: modify files by name
C: all of the mentioned
What is Domain?
A: None of the mentioned
B: Collection of protection policies
C: Set of all objects
D: Set of access-rights
D: Set of access-rights
For large data transfers, –?– is used.
A: none of the mentioned
B: controller register
C: programmed I/O
D: dma
D: dma
The time for the disk arm to move the heads to the cylinder containing the desired sector is called:
A: disk time
B: sector time
C: arm time
D: seek time
D: seek time
Which process can be affected by other processes executing in the system?
A: child process
B: parent process
C: cooperating process
D: init process
C: cooperating process
Each set of operations for performing a specific task is a:
A: all of the mentioned
B: transaction
C: code
D: program
B: transaction
The information about all files is kept in:
A: none of the mentioned
B: swap space
C: operating system
D: seperate directory structure
D: seperate directory structure
When hardware is accessed by reading and writing to the specific memory locations, then it is called:
A: port-mapped I/O
B: bus-mapped I/O
C: none of the mentioned (Cause its memory-mapped I/O)
D: controller-mapped I/O
C: none of the mentioned (Cause its memory-mapped I/O)
What is the ready state of a process?
A: when process is using the CPU
B: when process is scheduled to run after some execution
C: none of the mentioned
D: when process is unable to run until some task has been completed
B: when process is scheduled to run after some execution
The switching of the CPU from one process or thread to another is called:
A: process switch
B: context switch
C: task switch
D: all of the mentioned
D: all of the mentioned
The solution to starvation is:
A: the number of resources must be included in resource preemption
B: resource preemption be done instead
C: the number of rollbacks must be included in the cost factor
D: all of the mentioned
C: the number of rollbacks must be included in the cost factor
The ability to execute a program that is only partially in memory has benefits like:
A: All of the mentioned
B: Programs for an extremely large virtual space can be created
C: Throughput increases
D: The amount of physical memory cannot put a constraint on the program
A: All of the mentioned
Dynamic loading is:
A: loading multiple routines randomly
B: none of the mentioned
C: loading multiple routines dynamically
D: loading a routine only when it is called
D: loading a routine only when it is called
The processor fetches and executes one instruction during each:
A: instruction cycle
B: machine cycle
C: execution cycle
D: clock pulse
B: machine cycle
In contiguous allocation:
A: each file is a linked list of disk blocks
B: none of the mentioned
C: each file must occupy a set of contiguous blocks on the disk
D: all the pointers to scattered blocks are placed together in one location
C: each file must occupy a set of contiguous blocks on the disk
If we preempt a resource from a process, the process cannot continue with its normal execution and it must be:
A: terminated
B: rolled back
C: queued
D: aborted
B: rolled back
By using FAT, random access time is:
A: not affected
B: increased
C: decreased
D: the same
C: decreased
An asynchronous call:
A: does not return immediately and waits for the I/O to complete
B: returns immediately, without waiting for the I/O to complete
C: is too slow
D: consumes a lot of time
B: returns immediately, without waiting for the I/O to complete
The replacement of a bad block generally is not totally automatic because:
A: data in bad block can not be replaced
B: bad block does not contain any data
C: none of the mentioned
D: data in bad block is usually lost
D: data in bad block is usually lost
A mount point is:
A: a location where every time file systems are mounted
B: is the time when the mounting is done
C: an empty directory at which the mounted file system will be attached
D: none of the mentioned
C: an empty directory at which the mounted file system will be attached
Preemptive, priority based scheduling guarantees:
A: none of the mentioned
B: protection of memory
C: soft real time functionality
D: hard real time functionality
C: soft real time functionality
Cancelling a thread asynchronously:
A: none of the mentioned
B: spoils the process execution
C: may not free each resource
D: frees all the resources properly
C: may not free each resource
The bounded buffer problem is also known as:
A: Dining – Philosophers problem
B: Producer – Consumer problem
C: Readers – Writers problem
D: None of the mentioned
B: Producer – Consumer problem
What is best practice in firewall domain environment?
A: Create a Demilitarized zone
B: Create two DMZ zones with one untrusted domain
C: Create strong policy in firewall to support different types of users
D: Create two domain trusted and untrusted domain
A: Create a Demilitarized zone
One way to ensure that the circular wait condition never holds is to:
A: impose a total ordering of all resource types and to determine whether one precedes another in the ordering
B: to never let a process acquire resources that are held by other processes
C: to let a process wait for only one resource at a time
D: all of the mentioned
A: impose a total ordering of all resource types and to determine whether one precedes another in the ordering
Signals are identified by:
A: signal actions
B: none of the mentioned
C: signal handlers
D: signal identifiers
D: signal identifiers
The amount of memory in a real time system is generally:
A: same as in PCs
B: they do not have any memory
C: less compared to PCs
D: high compared to PCs
C: less compared to PCs
The host controller is:
A: none of the mentioned
B: controller built at the end of each disk
C: controller at the computer end of the bus
D: all of the mentioned
C: controller at the computer end of the bus
The ways of aborting processes and eliminating deadlocks are:
A: Abort all processes
B: Abort one process at a time until the deadlock cycle is eliminated
C: Abort all deadlocked processes
D: All of the mentioned
B: Abort one process at a time until the deadlock cycle is eliminated
A consistency checker –?– and tries to fix any inconsistencies it finds.
A: compares the data in the directory structure with the data blocks on disk
B: compares the data in the secondary storage with the data in the cache
C: compares the system generated output and user required output
D: all of the mentioned
A: compares the data in the directory structure with the data blocks on disk
Which one of the following is a synchronization tool?
A: semaphore
B: pipe
C: socket
D: thread
A: semaphore
In internal fragmentation, memory is internal to a partition and:
A: is being used
B: is not being used
C: none of the mentioned
D: is always used
B: is not being used
To solve the problem of external fragmentation, –?– needs to be done periodically.
A: formatting
B: replacing memory
C: compaction
D: check
C: compaction
In the –?– algorithm, the disk head moves from one end to the other , servicing requests along the way. When the head reaches the other end, it immediately returns to the beginning of the disk without servicing any requests on the return trip.
A: C-SCAN
B: C-LOOK
C: SCAN
D: LOOK
A: C-SCAN
In an interrupt driven input/output:
A: the CPU runs a user written code and does accordingly
B: the CPU receives an interrupt when the device is ready for the next byte
C: the CPU writes one data byte to the data register and sets a bit in control register to show that a byte is available
D: the CPU uses polling to watch the control bit constantly, looping to see if device is ready
B: the CPU receives an interrupt when the device is ready for the next byte
A single thread of control allows the process to perform:
A: all of the mentioned
B: only one task at a time
C: multiple tasks at a time
D: only two tasks at a time
B: only one task at a time
The technique in which the CPU generates physical addresses directly is known as:
A: real addressing
B: virtual addressing
C: relocation register method
D: none of the mentioned
A: real addressing
The operating system keeps a small table containing information about all open files called:
A: directory table
B: open-file table
C: file table
D: system table
B: open-file table
The entry of all the PCBs of the current processes is in:
A: Process Table
B: Process Register
C: Program Counter
D: Process Unit
A: Process Table
A process is selected from the –?– queue by the –?– scheduler, to be executed.
A: ready, long term
B: wait, long term
C: ready, short term
D: blocked, short term
C: ready, short term
In the Zero capacity queue:
A: none of the mentioned
B: the queue can store at least one message
C: the sender blocks until the receiver receives the message
D: the sender keeps sending and the messages don’t wait in the queue
C: the sender blocks until the receiver receives the message
What is principle of least privilege?
A: None of the mentioned
B: Users should be given just enough privileges to perform their tasks
C: Users can get temporary high privilege access
D: Less privileges provide difficulty in executing admin tasks
B: Users should be given just enough privileges to perform their tasks
In the following cases non – preemptive scheduling occurs:
A: When a process switches from the waiting state to the ready state
B: When a process switches from the running state to the ready state
C: When a process goes from the running state to the waiting state
D: All of the mentioned
C: When a process goes from the running state to the waiting state
Spooling:
A: is fast memory
B: holds the only copy of the data
C: holds a copy of the data
D: holds output for a device
B: holds the only copy of the data
The UNIX sytem uses a/an –?– stored at the beginning of a some files to indicate roughly the type of file.
A: identifier
B: virtual number
C: extension
D: magic number
D: magic number
In Unix, Which system call creates the new process?
A: create
B: fork
C: new
D: none of the mentioned
B: fork
A process can be terminated due to:
A: all of the mentioned
B: normal exit
C: fatal error
D: killed by another process
A: all of the mentioned
Virtual memory is normally implemented by:
A: demand paging
B: buses
C: virtualization
D: all of the mentioned
A: demand paging
A locality is:
A: none of the mentioned
B: a set of pages that are actively used together
C: an area near a set of processes
D: a space in memory
B: a set of pages that are actively used together
A file being read or written sequentially should not have its pages replaced in LRU order, because:
A: it is not efficient
B: the most recently used page will be used last
C: all of the mentioned
D: it is very costly
B: the most recently used page will be used last
In a multiprogramming environment:
A: the programs are developed by more than one person
B: the processor executes more than one process at a time
C: more than one process resides in the memory
D: a single user can execute many programs at the same time
C: more than one process resides in the memory
The FCFS algorithm is particularly troublesome for:
A: multiprogramming systems
B: operating systems
C: multiprocessor systems
D: time sharing systems
A: multiprogramming systems
Who can add new rights and remove some rights?
A: owner
B: transfer
C: limited copy
D: copy
A: owner
Global table implementation of matrix table contains:
A: object
B: domain
C: all of the mentioned
D: right-set
C: all of the mentioned
To avoid deadlock:
A: inversion technique can be used
B: resource allocation must be done only once
C: all deadlocked processes must be aborted
D: there must be a fixed number of resources to allocate
D: there must be a fixed number of resources to allocate
For effective operating system, when to check for deadlock?
A: every time a resource request is made
B: none of the mentioned
C: at fixed time intervals
D: every time a resource request is made at fixed time intervals
D: every time a resource request is made at fixed time intervals
When a user job starts in a two level directory system, or a user logs in:
A: the master file directory is indexed by user name or account number, and each entry points to the UFD for that user
B: the users user file directory is searched
C: the system’s master file directory is not searched
D: all of the mentioned
A: the master file directory is indexed by user name or account number, and each entry points to the UFD for that user
The usual effect of abnormal termination of a program is:
A: signal destruction
B: system crash
C: core dump file generation
D: program switch
C: core dump file generation
The solution to the problem of reliability is the introduction of:
A: scheduling
B: disks
C: redundancy
D: aging
C: redundancy
Programmers code at the –?– level.
A: source
B: load
C: object
D: machine
A: source
Interfaces and control units execute:
A: object-level commands
B: machine-level commands
C: none of the mentioned
D: primitive commands
D: primitive commands
An I/O port typically consists of four registers status, control, –?– and –?– registers.
A: data in, data out
B: flow in, flow out
C: input, output
D: system in, system out
A: data in, data out
For system protection, a process should access:
A: all of the mentioned
B: all the resources
C: only those resources for which it has authorization
D: few resources but authorization is not required
C: only those resources for which it has authorization
Contiguous allocation has two problems –?– and –?– that linked allocation solves.
A: internal – fragmentation & external – fragmentation
B: size – declaration & internal – fragmentation
C: external – fragmentation & size – declaration
D: memory – allocation & size – declaration
C: external – fragmentation & size – declaration
Division by zero, accessing a protected or non existent memory address, or attempting to execute a privileged instruction from user mode are all categorized as:
A: errors
B: exceptions
C: all of the mentioned
D: interrupt handlers
B: exceptions
For any type of access, contiguous allocation requires –?– access to get a disk block.
A: exactly two
B: at least two
C: only one
D: none of the mentioned
C: only one
A terminated transaction that has completed its execution successfully is –?– otherwise it is –?–
A: committed, destroyed
B: aborted, destroyed
C: committed, aborted
D: none of the mentioned
C: committed, aborted
The –?– becomes the name of the root of the newly mounted directory.
A: root of the previous directory
B: local directory
C: none of the mentioned
D: remote directory itself
B: local directory
Given a start of file address, the location of any given record can be computed from its:
A: source structure
B: relative record number
C: data object
D: key
B: relative record number
The number of the threads in the pool can be decided on factors such as:
A: all of the mentioned
B: number of CPUs in the system
C: amount of physical memory
D: expected number of concurrent client requests
A: all of the mentioned
If working set window is too large:
A: it will cause memory problems
B: none of the mentioned
C: it will not encompass entire locality
D: it may overlap several localities
D: it may overlap several localities
The undo and redo operations must be –?– to guarantee correct behaviour, even if a failure occurs during recovery process.
A: easy
B: idempotent
C: all of the mentioned
D: protected
B: idempotent
A process is moved to wait queue when I/O request is made with:
A: non-blocking I/O
B: blocking I/O
C: asynchronous I/O
D: synchronous I/O
B: blocking I/O
The disadvantage of real addressing mode is:
A: time consumption overhead
B: absence of memory protection between processes
C: there is a lot of cost involved
D: restricted access to memory locations by processes
B: absence of memory protection between processes
Under –?– memory management, only active portions of a program are actually stored in main memory.
A: dynamic
B: fragmented
C: virtual
D: fixed-partition
C: virtual
Semaphores are mostly used to implement:
A: None of the mentioned
B: System calls
C: System protection
D: IPC mechanisms
D: IPC mechanisms
The direct access method is based on a –?– model of a file, as –?– allow random access to any file block.
A: tape, disks
B: tape, tapes
C: disk, disks
D: magnetic tape, magnetic tapes
C: disk, disks
On most computers, a peripheral establishes communication with the opening system by sending:
A: a command
B: a request
C: a protocol signal
D: an interrupt
D: an interrupt
In a multi level directory structure:
A: none of the mentioned
B: the subdirectories do not need protection once the directory is protected
C: a mechanism for directory protection will have to applied
D: the same previous techniques will be used as in the other structures
C: a mechanism for directory protection will have to applied
The offset ‘d’ of the logical address must be:
A: between 0 and the segment number
B: greater than the segment number
C: between 0 and segment limit
D: greater than segment limit
C: between 0 and segment limit
In domain structure what is Access-right equal to?
A: Access-right = read-name, write-set
B: Access-right = object-name, execute-set
C: Access-right = read-name, execute-set
D: Access-right = object-name, rights-set
D: Access-right = object-name, rights-set
The One to One model allows:
A: increased concurrency
B: increased or decreased concurrency
C: decreased concurrency
D: concurrency equivalent to other models
A: increased concurrency
Which of the following is the drawback of the One to One Model?
A: decreased concurrency provided by this model
B: creating a user thread requires creating the corresponding kernel thread
C: creating so many threads at once can crash the system
D: increased concurrency provided by this model
B: creating a user thread requires creating the corresponding kernel thread
In a programmed input/output(PIO):
A: the CPU runs a user written code and does accordingly
B: the CPU receives an interrupt when the device is ready for the next byte
C: the CPU uses polling to watch the control bit constantly, looping to see if device is ready
D: the CPU writes one data byte to the data register and sets a bit in control register to show that a byte is available
C: the CPU uses polling to watch the control bit constantly, looping to see if device is ready
The maximum number of frames per process is defined by:
A: instruction set architecture
B: none of the mentioned
C: operating System
D: the amount of available physical memory
D: the amount of available physical memory
The Process Control Block is:
A: A secondary storage section
B: Data Structure
C: A Block in memory
D: Process type variable
B: Data Structure
Which of the following system calls transforms executable binary file into a process?
A: longjmp
B: fork
C: exec
D: ioctl
C: exec
The portion of the process scheduler in an operating system that dispatches processes is concerned with:
A: all of the mentioned
B: assigning ready processes to waiting queue
C: assigning running processes to blocked queue
D: assigning ready processes to CPU
D: assigning ready processes to CPU
Which module gives control of the CPU to the process selected by the short-term scheduler?
A: interrupt
B: dispatcher
C: none of the mentioned
D: scheduler
B: dispatcher
The disk bandwidth is:
A: the total number of bytes transferred divided by the total time between the first request for service and the completion on the last transfer
B: the total number of bytes transferred
C: total time between the first request for service and the completion on the last transfer
D: none of the mentioned
A: the total number of bytes transferred divided by the total time between the first request for service and the completion on the last transfer
Which of the following objects require protection?
A: Memory
B: All of the mentioned
C: Monitor
D: Power supply unit
A: Memory
The kernel is –?– of user threads.
A: unaware of
B: a part of
C: aware of
D: the creator of
A: unaware of
The objective of multiprogramming is to:
A: To minimize CPU utilization
B: None of the mentioned
C: Have multiple programs waiting in a queue ready to run
D: Have some process running at all times
D: Have some process running at all times
The major disadvantage with linked allocation is that:
A: there is no sequential access
B: external fragmentation
C: there is only sequential access
D: internal fragmentation
C: there is only sequential access
Thrashing –?– the CPU utilization.
A: increases
B: none of the mentioned
C: keeps constant
D: decreases
D: decreases
The first process launched by the linux kernel is:
A: init process
B: boot process
C: zombie process
D: batch process
A: init process
To –?– to a safe state, the system needs to keep more information about the states of processes.
A: none of the mentioned
B: queue the process
C: roll back the process
D: abort the process
C: roll back the process
If the semaphore value is negative:
A: no operation can be further performed on it until the signal operation is performed on it
B: none of the mentioned
C: it is invalid
D: its magnitude is the number of processes waiting on that semaphore
D: its magnitude is the number of processes waiting on that semaphore
Which system call returns the process identifier of a terminated child?
A: get
B: fork
C: wait
D: exit
C: wait
Which one of the following is not an attack, but a search for vulnerabilities to attack?
A: denial of service
B: memory access violation
C: dumpster diving
D: port scanning
D: port scanning
When the memory allocated to a process is slightly larger than the process, then:
A: internal fragmentation occurs
B: external fragmentation occurs
C: neither internal nor external fragmentation occurs
D: both internal and external fragmentation occurs
A: internal fragmentation occurs
When a file system is mounted over a directory that is not empty:
A: the system may allow the mount and the directory’s existing files will then be made obscure
B: the system may not allow the mount
C: the system must allow the mount
D: all of the mentioned
A: the system may allow the mount and the directory’s existing files will then be made obscure
The first fit and best fit algorithms suffer from:
A: external fragmentation
B: all of the mentioned
C: starvation
D: internal fragmentation
A: external fragmentation
The –?– determines the cause of the interrupt, performs the necessary processing and executes a return from the interrupt instruction to return the CPU to the execution state prior to the interrupt.
A: all of the mentioned
B: interrupt request line
C: interrupt handler
D: device driver
C: interrupt handler
The –?– can be turned off by the CPU before the execution of critical instruction sequences that must not be interrupted.
A: nonmaskable interrupt
B: blocked interrupt
C: none of the mentioned
D: maskable interrupt
D: maskable interrupt
An unrecoverable error is known as:
A: soft error
B: none of the mentioned
C: hard error
D: tough error
C: hard error
In UNIX, the –?– system call is used to send a signal.
A: sig
B: kill
C: sigsend
D: send
B: kill
Swapping –?– be done when a process has pending I/O, or has to execute I/O operations only into operating system buffers.
A: must
B: can
C: must never
D: maybe
C: must never
In contiguous memory allocation:
A: the memory space is contiguous
B: all processes are contained in a single contiguous section of memory
C: none of the mentioned
D: each process is contained in a single contiguous section of memory
D: each process is contained in a single contiguous section of memory
In most cases, if a process is sent a signal while it is executing a system call:
A: the system call is interrupted by the signal, and the signal handler comes in
B: the signal has no effect until the system call completes
C: the system call will continue execution and the signal will be ignored completely
D: none of the mentioned
B: the signal has no effect until the system call completes
By operating system, the resource management can be done via:
A: space division multiplexing
B: none of the mentioned
C: both time and space division multiplexing
D: time division multiplexing
C: both time and space division multiplexing
Which file is a sequence of bytes organized into blocks understandable by the system’s linker?
A: executable file
B: object file
C: source file
D: text file
B: object file
If two routines each control a resource needed by the other and neither is willing to give in, –?– can occur.
A: an interrupt
B: deadlock
C: a race condition
D: a time-slice
B: deadlock
For a direct access file:
A: there are no restrictions on the order of reading and writing
B: access is not restricted permission wise
C: there are restrictions on the order of reading and writing
D: access is restricted permission wise
A: there are no restrictions on the order of reading and writing
On a mainframe, device-dependent I/O functions are assigned to:
A: a control unit
B: an interface
C: a buffer
D: a channel
D: a channel
By –?– data (storing several logical records in a single block sector), disk space can be better utilized.
A: encoding
B: encrypting
C: compressing
D: blocking
D: blocking
One problem with the global replacement algorithm is that:
A: a process cannot control its own page – fault rate
B: it is very expensive
C: many frames can be allocated to a process
D: only a few frames can be allocated to a process
A: a process cannot control its own page – fault rate
The hardware mechanism that allows a device to notify the CPU is called:
A: driver
B: interrupt
C: polling
D: controlling
B: interrupt
I/O is a –?– in system performance.
A: none of the mentioned
B: does not matter
C: minor factor
D: major factor
D: major factor
In UNIX, domain switch is accomplished via:
A: file system
B: superuser
C: user
D: none of the mentioned
A: file system
If a process fails, most operating system write the error information to a:
A: new file
B: another running process
C: log file
D: none of the mentioned
C: log file
For sharable resources, mutual exclusion:
A: is required
B: is not required
C: may be or may not be required
D: none of the mentioned
B: is not required
By preallocating the inodes and spreading them across the volume, we –?– the system performance.
A: decrease
B: improve
C: maintain
D: do not affect
B: improve
To ensure no preemption, if a process is holding some resources and requests another resource that cannot be immediately allocated to it:
A: the process resumes execution without the resource being allocated to it
B: then the process waits for the resources be allocated to it
C: then all resources currently being held are preempted
D: the process keeps sending requests until the resource is allocated to it
C: then all resources currently being held are preempted
The –?– is used as an index into the page table.
A: frame bit
B: frame offset
C: page offset
D: page number
D: page number
The main memory accommodates:
A: user processes
B: all of the mentioned
C: operating system
D: cpu
C: operating system
The data-in register of I/O port is:
A: Read by host to get input
B: Written by host to start a command
C: Written by host to send output
D: Read by controller to get input
A: Read by host to get input
Termination of the process terminates:
A: no thread within the process
B: first thread of the process
C: all threads within the process
D: first two threads of the process
C: all threads within the process
Which of the following is least secure method of authentication?
A: Password
B: retina pattern
C: fingerprint
D: Key card
A: Password
Resource sharing helps:
A: an application have several different threads of activity all within the same address space
B: reduce the address space that a process could potentially use
C: all of the mentioned
D: share the memory and resources of the process to which the threads belong
C: all of the mentioned
The initial program that is run when the computer is powered up is called:
A: boot program
B: initializer
C: bootstrap program
D: bootloader
C: bootstrap program
The device-status table contains:
A: each I/O device address
B: each I/O device type
C: all of the mentioned
D: each I/O device state
C: all of the mentioned
All the changes that were done from a transaction that did not commit before the system crashed, have to be:
A: none of the mentioned
B: saved
C: saved and the transaction redone
D: undone
D: undone
Scheduling is done so as to:
A: increase the duration of a specific amount of work
B: None of the mentioned
C: decrease the throughput
D: increase the throughput
D: increase the throughput
In paged memory systems, if the page size is increased, then the internal fragmentation generally:
A: remains constant
B: becomes more
C: becomes less
D: none of the mentioned
B: becomes more
For each file there exists a –?– that contains information about the file, including ownership, permissions and location of the file contents.
A: process control block
B: metadata
C: file control block
D: all of the mentioned
C: file control block
Indexed allocation –?– direct access.
A: none of the mentioned
B: is not related to
C: supports
D: does not support
C: supports
The –?– consists of all processes whose memory images are in the backing store or in memory and are ready to run.
A: ready queue
B: secondary storage
C: wait queue
D: cpu
A: ready queue
If no process is suspended, the signal operation:
A: suspends some default process’ execution
B: the output is unpredictable
C: puts the system into a deadlock state
D: nothing happens
D: nothing happens
‘Aging’ is:
A: keeping track of how many times a given page is referenced
B: keeping track of what pages are currently residing in memory
C: keeping track of cache contents
D: increasing the priority of jobs to ensure termination in a finite time
D: increasing the priority of jobs to ensure termination in a finite time
What are features of a tripwire file system?
A: It is used to secure UNIX system
B: None of the mentioned
C: It is a tool to monitor file systems
D: It is used to automatically take corrective action
C: It is a tool to monitor file systems
The system periodically performs checkpoints that consists of the following operation(s):
A: Putting all the log records currently in main memory onto stable storage
B: putting all modified data residing in main memory onto stable storage
C: all of the mentioned
D: putting a log record onto stable storage
C: all of the mentioned
The access method is added to the program load module by the:
A: linkage editor
B: compiler
C: internal component
D: programmer
A: linkage editor
Restricting the child process to a subset of the parent’s resources prevents any process from:
A: overloading the system by using a lot of secondary storage
B: overloading the system by creating a lot of sub-processes
C: under-loading the system by very less CPU utilization
D: crashing the system by utilizing multiple resources
B: overloading the system by creating a lot of sub-processes
The real disadvantage of a linear list of directory entries is the:
A: size of the linear list in memory
B: all of the mentioned
C: linear search to find a file
D: it is not reliable
C: linear search to find a file
The atomic operation permissible on semaphores are:
A: none of the mentioned
B: wait
C: hold
D: stop
B: wait
During recovery from a failure:
A: each pair of physical block is examined
B: first pair of physical block is examined
C: none of the mentioned
D: specified pair of physical block is examined
A: each pair of physical block is examined
A process stack does not contain:
A: PID of child process
B: Return addresses
C: Function parameters
D: Local variables
A: PID of child process
Protection is only provided at the –?– level.
A: lower
B: higher
C: none of the mentioned
D: central
A: lower
Mutual exclusion implies that:
A: if a process is executing in its critical section, then all the resources of the system must be blocked until it finishes execution
B: if a process is executing in its critical section, then no other process must be executing in their critical sections
C: none of the mentioned
D: if a process is executing in its critical section, then other processes must be executing in their critical sections
B: if a process is executing in its critical section, then no other process must be executing in their critical sections
What are common security threats?
A: File sharing and permission
B: File integrity
C: File shredding and integrity
D: File Shredding
A: File sharing and permission
What is a trap/exception?
A: none of the mentioned
B: user generated interrupt caused by an error
C: software generated interrupt caused by an error
D: hardware generated interrupt caused by an error
C: software generated interrupt caused by an error
Mutual exclusion can be provided by the:
A: both mutex locks and binary semaphores
B: binary semaphores
C: none of the mentioned
D: mutex locks
A: both mutex locks and binary semaphores
The scheduler admits a process using:
A: admission control algorithm
B: busy wait polling
C: two phase locking protocol
D: none of the mentioned
B: busy wait polling
Instead of starting a new thread for every task to execute concurrently, the task can be passed to a:
A: none of the mentioned
B: thread queue
C: process
D: thread pool
D: thread pool
What is breach of confidentiality?
A: This violation involves unauthorized destruction of data
B: This type of violation involves unauthorized reading of data
C: This violation involves unauthorized modification of data
D: This violation involves unauthorized use of resources
B: This type of violation involves unauthorized reading of data
Which direction access cannot happen using DMZ zone by default?
A: Internet to DMZ
B: Company computer to DMZ
C: Internet to company computer
D: Company computer to internet
C: Internet to company computer
In UNIX, exactly which operations can be executed by group members and other users is definable by:
A: the group’s head
B: the file’s permissions
C: all of the mentioned
D: the file’s owner
D: the file’s owner
The implementation of the LFU and the MFU algorithm is very uncommon because:
A: they are too complicated
B: all of the mentioned
C: they are expensive
D: they are optimal
C: they are expensive
When a page is selected for replacement, and its modify bit is set:
A: the page is dirty
B: the page has been modified since it was read in from the disk & page is dirty
C: the page is clean
D: the page has been modified since it was read in from the disk
B: the page has been modified since it was read in from the disk & page is dirty
A swap space can reside in:
A: None of the mentioned
B: RAM
C: Cache
D: Separate disk partition
D: Separate disk partition
An SJF algorithm is simply a priority algorithm where the priority is:
A: the inverse of the predicted next CPU burst
B: the predicted next CPU burst
C: anything the user wants
D: the current CPU burst
B: the predicted next CPU burst
A process –?– lower the priority of another process, if both are owned by the same owner.
A: none of the mentioned
B: cannot
C: can
D: must
C: can
In the Many to One model, multiple threads are unable to run in parallel on multiprocessors because:
A: only one thread can access the kernel at a time
B: many user threads have access to just one kernel thread
C: none of the mentioned
D: there is only one kernel thread
A: only one thread can access the kernel at a time
What is known as sandbox?
A: It is a program which can be molded to do desired task
B: It is a special mode of antivirus
C: None of the mentioned
D: It is program that is controlled or emulated section of OS
D: It is program that is controlled or emulated section of OS
Which one of the following connects high-speed high-bandwidth device to memory subsystem and CPU.
A: None of the mentioned
B: SCSI bus
C: PCI bus
D: Expansion bus
D: Expansion bus
What is breach of integrity?
A: This violation involves unauthorized use of resources
B: This violation involves unauthorized modification of data
C: This type of violation involves unauthorized reading of data
D: This violation involves unauthorized destruction of data
B: This violation involves unauthorized modification of data
–?– replacement allows a process to select a replacement frame from the set of all frames, even if the frame is currently allocated to some other process.
A: Universal
B: Local
C: Public
D: Global
D: Global
In FIFO page replacement algorithm, when a page must be replaced:
A: random page is chosen
B: none of the mentioned
C: newest page is chosen
D: oldest page is chosen
D: oldest page is chosen
What is compaction?
A: a technique for overcoming external fragmentation
B: a technique for overcoming fatal error
C: a technique for overcoming internal fragmentation
D: a paging technique
A: a technique for overcoming external fragmentation
To ensure that the hold and wait condition never occurs in the system, it must be ensured that:
A: each process must request and be allocated all its resources before it begins its execution
B: a process can request resources only when it has none
C: all of the mentioned
D: whenever a resource is requested by a process, it is not holding any other resources
C: all of the mentioned
The two kinds of semaphores are:
A: mutex & counting
B: binary & counting
C: counting & decimal
D: decimal & binary
B: binary & counting
RAID level 1 refers to:
A: disk arrays with striping
B: disk mirroring
C: none of the mentioned
D: both disk arrays with striping and disk mirroring
B: disk mirroring
The protection bit is 0/1 based on:
A: read – write
B: read only
C: none of the mentioned
D: write only
A: read – write
The data structure for a sector typically contains:
A: header
B: trailer
C: data area
D: all of the mentioned
D: all of the mentioned
A system is in the safe state if:
A: none of the mentioned
B: all of the mentioned
C: there exist a safe sequence
D: the system can allocate resources to each process in some order and still avoid a deadlock
D: the system can allocate resources to each process in some order and still avoid a deadlock
The –?– is used by device controllers to request service.
A: blocked interrupt
B: maskable interrupt
C: nonmaskable interrupt
D: none of the mentioned
B: maskable interrupt
The –?– are reserved for events such as unrecoverable memory errors.
A: maskable interrupts
B: none of the mentioned
C: blocked interrupts
D: non maskable interrupts
D: non maskable interrupts
Most modern operating systems include:
A: file management
B: all of the mentioned
C: processor management
D: memory management
B: all of the mentioned
The Zero Capacity queue:
A: none of the mentioned
B: is referred to as a message system with buffering
C: is referred to as a link
D: is referred to as a message system with no buffering
D: is referred to as a message system with no buffering
To obtain better memory utilization, dynamic loading is used. With dynamic loading, a routine is not loaded until it is called. For implementing dynamic loading:
A: special support from both hardware and operating system is essential
B: user programs can implement dynamic loading without any special support from hardware or operating system
C: special support from operating system is essential
D: special support from hardware is required
B: user programs can implement dynamic loading without any special support from hardware or operating system
When we write something on the disk, which one of the following can not happen?
A: successful completion
B: none of the mentioned
C: total failure
D: partial failure
B: none of the mentioned
Which one of the following can not be scheduled by the kernel?
A: user level thread
B: kernel level thread
C: none of the mentioned
D: process
A: user level thread
–?– replacement allows each process to only select from its own set of allocated frames.
A: Local
B: Public
C: Universal
D: Global
A: Local
Associated with every interrupt is an identification number called a(n):
A: interrupt ID
B: interrupt description number
C: IDT
D: vector
D: vector
What is the problem of mutually suspicious subsystem?
A: Service program can malfunction and retain some rights of data provided by user
B: Calling program gets unrestricted access
C: Calling program can get access to restricted portion from service program
D: Service program can steal users data
A: Service program can malfunction and retain some rights of data provided by user
A problem encountered in multitasking when a process is perpetually denied necessary resources is called:
A: deadlock
B: starvation
C: aging
D: inversion
B: starvation
The segment of code in which the process may change common variables, update tables, write into files is known as:
A: non – critical section
B: synchronizing
C: critical section
D: program
C: critical section
In a memory mapped input/output:
A: the CPU writes one data byte to the data register and sets a bit in control register to show that a byte is available
B: the CPU receives an interrupt when the device is ready for the next byte
C: the CPU uses polling to watch the control bit constantly, looping to see if device is ready
D: the CPU runs a user written code and does accordingly
A: the CPU writes one data byte to the data register and sets a bit in control register to show that a byte is available