Quiz Sail Part 1 Flashcards
For a Hold and wait condition to prevail:
A: A process must hold at least one resource and not be waiting to acquire additional resources
B: A process must be holding at least one resource and waiting to acquire additional resources that are being held by other processes
C: None of the mentioned
D: A process must be not be holding a resource, but waiting for one to be freed, and then request to acquire it
B: A process must be holding at least one resource and waiting to acquire additional resources that are being held by other processes
What is ‘separation’ in security of Operating systems?
A: To have separate Hard disk drive/partition for different users
B: It means keeping one user’s objects separate from other users
C: None of the mentioned
D: To have separate login for different users
B: It means keeping one user’s objects separate from other users
The main disadvantage of spinlocks is that:
A: they are unreliable sometimes
B: they require busy waiting
C: they are too complex for programmers
D: they are not sufficient for many process
B: they require busy waiting
What is characteristics of Authorization?
A: 3 way handshaking with syn and fin
B: RADIUS and RSA
C: Deals with privileges and rights
D: Multilayered protection for securing resources
C: Deals with privileges and rights
The two phase locking protocol consists of:
A: destruction & creation phase
B: growing & shrinking phase
C: shrinking & creation phase
D: creation & growing phase
B: growing & shrinking phase
To organise file systems on disk,:
A: information about files is added to each partition
B: all of the mentioned
C: they are made on different storage spaces
D: they are split into one or more partitions
A: information about files is added to each partition
Memory management technique in which system stores and retrieves data from secondary storage for use in main memory is called:
A: fragmentation
B: paging
C: none of the mentioned
D: mapping
B: paging
Mapping refers to the process of associating a logical address (virtual address) with a physical address in memory.
Paging is a memory management technique that allows the operating system to divide the virtual memory space of a process into fixed-size blocks called pages.
It provides a mechanism for translating virtual addresses used by a program into physical addresses in main memory.
To find a particular file on a disk, refer to the disk’s:
A: buffer
B: table of contents
C: directory
D: control unit
C: directory
If a pointer is lost or damaged in a linked allocation:
A: there would not be any problems
B: none of the mentioned
C: the entire file could get damaged
D: only a part of the file would be affected
C: the entire file could get damaged
Standard set of functions through which interacts with kernel is defined by:
A: kernel code
B: system libraries
C: utility programs
D: compilers
B: system libraries
Scheduling is done so as to:
A: decrease CPU utilization
B: keep the CPU more idle
C: increase CPU utilization
D: None of the mentioned
C: increase CPU utilization
Multithreaded programs are:
A: lesser prone to deadlocks
B: not at all prone to deadlocks
C: none of the mentioned
D: more prone to deadlocks
D: more prone to deadlocks
A deadlock avoidance algorithm dynamically examines the –?– to ensure that a circular wait condition can never exist.
A: resources
B: resource allocation state
C: operating system
D: system storage state
B: resource allocation state
It is __________ to reread a page from the file system than to write it to swap space and then to reread it from there.
A: none of the mentioned
B: more efficient
C: useless
D: less efficient
B: more efficient
If relocation is static and is done at assembly or load time, compaction:
A: cannot be done
B: must be done
C: can be done
D: must not be done
A: cannot be done
What is meaning of right-set?
A: None of the mentioned
B: It is a subset of all valid operations that can be performed on the object
C: It is a subset consist of read,write and execute
D: It is a subset consist of read and write
B: It is a subset of all valid operations that can be performed on the object
The mount request is mapped to the corresponding –?– and is forwarded to the mount server running on the specific server machine.
A: CPU
B: System
C: IPC
D: RPC
B: System
A mount server, also known as a file server or network file server, is a computer or device that provides file-level storage services over a network.
Because the kernel thread management is done by the Operating System itself:
A: none of the mentioned
B: kernel threads are faster to create than user threads
C: kernel threads are slower to create than user threads
D: kernel threads are easier to manage as well as create then user threads
C: kernel threads are slower to create than user threads
The most effective technique to keep dispatch latency low is to:
A: make it user programmed
B: run less number of processes at a time
C: provide preemptive kernels
D: provide non preemptive kernels
C: provide preemptive kernels
The register context and stacks of a thread are deallocated when the thread:
A: unblocks
B: spawns
C: blocks
D: terminates
D: terminates
Which protocol establishes the initial logical connection between a server and a client?
A: mount protocol
B: transmission control protocol
C: user datagram protocol
D: datagram congestion control protocol
A: mount protocol
The child process can:
A: cannot have another program loaded into it
B: be a duplicate of the parent process
C: never be a duplicate of the parent process
D: never have another program loaded into it
B: be a duplicate of the parent process
Virtual memory is a –?– of memory contents.
A: physical model
B: mirror image
C: duplicate
D: logical model
D: logical model
The operating system –?– the links when traversing directory trees, to preserve the acyclic structure of the system.
A: none of the mentioned
B: deletes
C: ignores
D: considers
C: ignores
In virtual memory. the programmer –?– of overlays.
A: does not have to take care
B: all of the mentioned
C: none of the mentioned
D: has to take care
A: does not have to take care
The –?– swaps processes in and out of the memory.
A: CPU
B: Memory manager
C: User
D: CPU manager
B: Memory manager
Binding of instructions and data to memory addresses can be done at:
A: All of the mentioned
B: Execution time
C: Load time
D: Compile time
A: All of the mentioned
Address Binding is:
A: going to an address in memory
B: locating an address with the help of another address
C: binding two addresses together to form a new address in a different memory space
D: a mapping from one address space to another
D: a mapping from one address space to another
When the head damages the magnetic surface, it is known as:
A: magnetic damage
B: head crash
C: all of the mentioned
D: disk crash
B: head crash
Which mechanism is used by worm process?
A: Fake process
B: Trap door
C: VAX process
D: Spawn Process
D: Spawn Process
A relative block number is an index relative to:
A: the end of the file
B: the beginning of the file
C: none of the mentioned
D: the last written position in file
B: the beginning of the file
The process invoking the wait operation is:
A: none of the mentioned
B: stopped until the next process in the queue finishes execution
C: waiting for another process to complete before it can itself call the signal operation
D: suspended until another process invokes the signal operation
D: suspended until another process invokes the signal operation
The larger the block size, the –?– the internal fragmentation.
A: lesser
B: same
C: greater
D: none of the mentioned
C: greater
To create a file:
A: allocate the space in file system & make an entry for new file in directory
B: allocate the space in file system
C: make an entry for new file in directory
D: none of the mentioned
A: allocate the space in file system & make an entry for new file in directory
Management of metadata information is done by:
A: file-organisation module
B: application programs
C: logical file system
D: basic file system
C: logical file system
The deletion of a link, –?– the original file.
A: deletes
B: does not affect
C: none of the mentioned
D: affects
B: does not affect
The two steps of a process execution are:
A: OS & Memory Burst
B: CPU & I/O Burst
C: Memory & I/O Burst
D: I/O & OS Burst
B: CPU & I/O Burst
The request and release of resources are:
A: special programs
B: interrupts
C: command line statements
D: system calls
D: system calls
Which operation is performed by an interrupt handler?
A: Once done handling, bringing back the system to the original state it was before the interrupt occurred
B: All of the mentioned
C: Saving the current state of the system
D: Loading the interrupt handling code and executing it
B: All of the mentioned
The data structure used for file directory is called:
A: process table
B: file table
C: mount table
D: hash table
D: hash table
If binding is done at assembly or load time, then the process –?– be moved to different locations after being swapped out and in again.
A: may
B: can
C: must
D: can never
D: can never
When using counters to implement LRU, we replace the page with the:
A: none of the mentioned
B: largest time value
C: smallest time value
D: greatest size
C: smallest time value
What will happen if a non-recursive mutex is locked more than once?
A: Deadlock
B: Starvation
C: Aging
D: Signaling
A: Deadlock
What is theft of service?
A: This violation involves unauthorized use of resources
B: This violation involves unauthorized modification of data
C: This violation involves unauthorized destruction of data
D: This type of violation involves unauthorized reading of data
A: This violation involves unauthorized use of resources
Which principle states that programs, users and even the systems be given just enough privileges to perform their task?
A: principle of process scheduling
B: none of the mentioned
C: principle of least privilege
D: principle of operating system
C: principle of least privilege
The set of tracks that are at one arm position make up a:
A: magnetic disks
B: electrical disks
C: assemblies
D: cylinders
D: cylinders
A device driver can be thought of as a translator. Its input consists of –?– commands and output consists of –?– instructions.
A: low level, complex
B: high level, low level
C: low level, high level
D: complex, simple
B: high level, low level
To create a new file or find an existing file, a program executes:
A: a read instruction
B: a save command
C: an open command
D: a load command
C: an open command
What is a short-term scheduler?
A: It selects which process has to be brought into the ready queue
B: It selects which process has to be executed next and allocates CPU
C: It selects which process to remove from memory by swapping
D: None of the mentioned
B: It selects which process has to be executed next and allocates CPU
The reason for using the LFU page replacement algorithm is:
A: all of the mentioned
B: an actively used page should have a large reference count
C: it is extremely efficient and optimal
D: a less used page has more chances to be used again
B: an actively used page should have a large reference count
Which algorithm of disk scheduling selects the request with the least seek time from the current head positions?
A: FCFS scheduling
B: LOOK scheduling
C: SCAN scheduling
D: SSTF scheduling
D: SSTF scheduling
–?– is a unique tag, usually a number, identifies the file within the file system.
A: File name
B: File identifier
C: File type
D: None of the mentioned
B: File identifier
The series of accesses between the open and close operations is a:
A: file session
B: program
C: transaction
D: procedure
A: file session
During compaction time, other normal system operations –?– be permitted.
A: is
B: none of the mentioned
C: can
D: cannot
D: cannot
To create a new file application program calls:
A: logical file system
B: basic file system
C: file-organisation module
D: none of the mentioned
A: logical file system
If a kernel thread performs a blocking system call:
A: the kernel must schedule another thread of a different application for execution
B: the kernel can schedule another thread in the application for execution
C: the kernel must schedule another thread of the same application on a different processor
D: the kernel cannot schedule another thread in the same application for execution
B: the kernel can schedule another thread in the application for execution
Which buffer holds the output for a device?
A: output
B: spool
C: magic
D: status
B: spool
Real time systems need to –?– the interrupt latency.
A: not bother about
B: none of the mentioned
C: minimize
D: maximize
C: minimize
Cascading termination refers to termination of all child processes before the parent terminates:
A: Normally or abnormally
B: Abnormally
C: None of the mentioned
D: Normally
D: Normally
In UNIX, each process is identified by its:
A: None of the the mentioned
B: Process Control Block
C: Device Queue
D: Process Identifier
D: Process Identifier
The file management function incorporates routines that allow the user or programmer to:
A: create files by name
B: delete files by name
C: all of the mentioned
D: modify files by name
C: all of the mentioned
What is Domain?
A: None of the mentioned
B: Collection of protection policies
C: Set of all objects
D: Set of access-rights
D: Set of access-rights
For large data transfers, –?– is used.
A: none of the mentioned
B: controller register
C: programmed I/O
D: dma
D: dma
The time for the disk arm to move the heads to the cylinder containing the desired sector is called:
A: disk time
B: sector time
C: arm time
D: seek time
D: seek time
Which process can be affected by other processes executing in the system?
A: child process
B: parent process
C: cooperating process
D: init process
C: cooperating process
Each set of operations for performing a specific task is a:
A: all of the mentioned
B: transaction
C: code
D: program
B: transaction
The information about all files is kept in:
A: none of the mentioned
B: swap space
C: operating system
D: seperate directory structure
D: seperate directory structure
When hardware is accessed by reading and writing to the specific memory locations, then it is called:
A: port-mapped I/O
B: bus-mapped I/O
C: none of the mentioned (Cause its memory-mapped I/O)
D: controller-mapped I/O
C: none of the mentioned (Cause its memory-mapped I/O)
What is the ready state of a process?
A: when process is using the CPU
B: when process is scheduled to run after some execution
C: none of the mentioned
D: when process is unable to run until some task has been completed
B: when process is scheduled to run after some execution
The switching of the CPU from one process or thread to another is called:
A: process switch
B: context switch
C: task switch
D: all of the mentioned
D: all of the mentioned
The solution to starvation is:
A: the number of resources must be included in resource preemption
B: resource preemption be done instead
C: the number of rollbacks must be included in the cost factor
D: all of the mentioned
C: the number of rollbacks must be included in the cost factor
The ability to execute a program that is only partially in memory has benefits like:
A: All of the mentioned
B: Programs for an extremely large virtual space can be created
C: Throughput increases
D: The amount of physical memory cannot put a constraint on the program
A: All of the mentioned
Dynamic loading is:
A: loading multiple routines randomly
B: none of the mentioned
C: loading multiple routines dynamically
D: loading a routine only when it is called
D: loading a routine only when it is called
The processor fetches and executes one instruction during each:
A: instruction cycle
B: machine cycle
C: execution cycle
D: clock pulse
B: machine cycle
In contiguous allocation:
A: each file is a linked list of disk blocks
B: none of the mentioned
C: each file must occupy a set of contiguous blocks on the disk
D: all the pointers to scattered blocks are placed together in one location
C: each file must occupy a set of contiguous blocks on the disk
If we preempt a resource from a process, the process cannot continue with its normal execution and it must be:
A: terminated
B: rolled back
C: queued
D: aborted
B: rolled back
By using FAT, random access time is:
A: not affected
B: increased
C: decreased
D: the same
C: decreased
An asynchronous call:
A: does not return immediately and waits for the I/O to complete
B: returns immediately, without waiting for the I/O to complete
C: is too slow
D: consumes a lot of time
B: returns immediately, without waiting for the I/O to complete
The replacement of a bad block generally is not totally automatic because:
A: data in bad block can not be replaced
B: bad block does not contain any data
C: none of the mentioned
D: data in bad block is usually lost
D: data in bad block is usually lost
A mount point is:
A: a location where every time file systems are mounted
B: is the time when the mounting is done
C: an empty directory at which the mounted file system will be attached
D: none of the mentioned
C: an empty directory at which the mounted file system will be attached
Preemptive, priority based scheduling guarantees:
A: none of the mentioned
B: protection of memory
C: soft real time functionality
D: hard real time functionality
C: soft real time functionality
Cancelling a thread asynchronously:
A: none of the mentioned
B: spoils the process execution
C: may not free each resource
D: frees all the resources properly
C: may not free each resource
The bounded buffer problem is also known as:
A: Dining – Philosophers problem
B: Producer – Consumer problem
C: Readers – Writers problem
D: None of the mentioned
B: Producer – Consumer problem
What is best practice in firewall domain environment?
A: Create a Demilitarized zone
B: Create two DMZ zones with one untrusted domain
C: Create strong policy in firewall to support different types of users
D: Create two domain trusted and untrusted domain
A: Create a Demilitarized zone
One way to ensure that the circular wait condition never holds is to:
A: impose a total ordering of all resource types and to determine whether one precedes another in the ordering
B: to never let a process acquire resources that are held by other processes
C: to let a process wait for only one resource at a time
D: all of the mentioned
A: impose a total ordering of all resource types and to determine whether one precedes another in the ordering
Signals are identified by:
A: signal actions
B: none of the mentioned
C: signal handlers
D: signal identifiers
D: signal identifiers
The amount of memory in a real time system is generally:
A: same as in PCs
B: they do not have any memory
C: less compared to PCs
D: high compared to PCs
C: less compared to PCs
The host controller is:
A: none of the mentioned
B: controller built at the end of each disk
C: controller at the computer end of the bus
D: all of the mentioned
C: controller at the computer end of the bus
The ways of aborting processes and eliminating deadlocks are:
A: Abort all processes
B: Abort one process at a time until the deadlock cycle is eliminated
C: Abort all deadlocked processes
D: All of the mentioned
B: Abort one process at a time until the deadlock cycle is eliminated
A consistency checker –?– and tries to fix any inconsistencies it finds.
A: compares the data in the directory structure with the data blocks on disk
B: compares the data in the secondary storage with the data in the cache
C: compares the system generated output and user required output
D: all of the mentioned
A: compares the data in the directory structure with the data blocks on disk
Which one of the following is a synchronization tool?
A: semaphore
B: pipe
C: socket
D: thread
A: semaphore
In internal fragmentation, memory is internal to a partition and:
A: is being used
B: is not being used
C: none of the mentioned
D: is always used
B: is not being used
To solve the problem of external fragmentation, –?– needs to be done periodically.
A: formatting
B: replacing memory
C: compaction
D: check
C: compaction
In the –?– algorithm, the disk head moves from one end to the other , servicing requests along the way. When the head reaches the other end, it immediately returns to the beginning of the disk without servicing any requests on the return trip.
A: C-SCAN
B: C-LOOK
C: SCAN
D: LOOK
A: C-SCAN
In an interrupt driven input/output:
A: the CPU runs a user written code and does accordingly
B: the CPU receives an interrupt when the device is ready for the next byte
C: the CPU writes one data byte to the data register and sets a bit in control register to show that a byte is available
D: the CPU uses polling to watch the control bit constantly, looping to see if device is ready
B: the CPU receives an interrupt when the device is ready for the next byte
A single thread of control allows the process to perform:
A: all of the mentioned
B: only one task at a time
C: multiple tasks at a time
D: only two tasks at a time
B: only one task at a time
The technique in which the CPU generates physical addresses directly is known as:
A: real addressing
B: virtual addressing
C: relocation register method
D: none of the mentioned
A: real addressing
The operating system keeps a small table containing information about all open files called:
A: directory table
B: open-file table
C: file table
D: system table
B: open-file table
The entry of all the PCBs of the current processes is in:
A: Process Table
B: Process Register
C: Program Counter
D: Process Unit
A: Process Table