Quiz Sail Part 2 Flashcards
Access matrix model for user authentication contains:
A: a list of objects
B: a function which returns an object’s type
C: a list of domains
D: all of the mentioned
D: all of the mentioned
In the single level directory:
A: all of the mentioned
B: all files must have unique names
C: all files must have unique owners
D: all directories must have unique names
B: all files must have unique names
A parent process calling –?– system call will be suspended until children processes terminate.
A: fork
B: exit
C: wait
D: exec
C: wait
In a system that does not support swapping:
A: binding of symbolic addresses to physical addresses normally takes place during execution
B: the compiler normally binds symbolic addresses (variables) to relocatable addresses
C: the loader binds relocatable addresses to physical addresses
D: the compiler normally binds symbolic addresses to physical addresses
B: the compiler normally binds symbolic addresses (variables) to relocatable addresses
What is breach of availability?
A: This violation involves unauthorized use of resources
B: This violation involves unauthorized destruction of data
C: This violation involves unauthorized modification of data
D: This type of violation involves unauthorized reading of data
B: This violation involves unauthorized destruction of data
To differentiate the many network services a system supports –?– are used.
A: Variables
B: Service names
C: Sockets
D: Ports
D: Ports
Spinlocks are:
A: Locks that avoid time wastage in context switches
B: CPU cycles wasting locks over critical sections of programs
C: Locks that work better on multiprocessor systems
D: All of the mentioned
D: All of the mentioned
The code segment that misuses its environment is called a:
A: code stacker
B: trojan horse
C: internal thief
D: none of the mentioned
B: trojan horse
The circular wait condition can be prevented by:
A: using thread
B: defining a linear ordering of resource types
C: all of the mentioned
D: using pipes
B: defining a linear ordering of resource types
The idea of overlays is to:
A: all of the mentioned
B: data that are needed at any given time
C: enable a process to be larger than the amount of memory allocated to it
D: keep in memory only those instructions
A: all of the mentioned
External fragmentation exists when:
A: a request cannot be satisfied even when the total memory is free
B: none of the mentioned
C: the total memory is insufficient to satisfy a request
D: enough total memory exists to satisfy a request but it is not contiguous
D: enough total memory exists to satisfy a request but it is not contiguous
The usefulness of signals as a general inter process communication mechanism is limited because:
A: none of the mentioned
B: they cannot carry information directly
C: they do not work between processes
D: they are user generated
B: they cannot carry information directly
Error handler codes, to handle unusual errors are:
A: almost never executed
B: executed very often
C: none of the mentioned
D: executed periodically
A: almost never executed
A file is a/an –?– data type.
A: abstract
B: private
C: primitive
A: abstract
The current directory contains, most of the files that are:
A: of current interest to the user
B: not of current interest to the system
C: not used in the system
D: stored currently in the system
A: of current interest to the user
The –?– keeps state information about the use of I/O components.
A: OS
B: CPU
C: shell
D: kernel
D: kernel
In a time-sharing operating system, when the time slot given to a process is completed, the process goes from the running state to the:
A: Blocked state
B: Terminated state
C: Suspended state
D: Ready state
D: Ready state
When an attempt is to make a machine or network resource unavailable to its intended users, the attack is called:
A: tarvation attack
B: slow read attack
C: denial-of-service attack
D: spoofed attack
C: denial-of-service attack
In operating system, each process has its own:
A: open files
B: address space and global variables
C: all of the mentioned
D: pending alarms, signals and signal handlers
C: all of the mentioned
In UNIX, even an ’empty’ disk has a percentage of its space lost to:
A: stacks
B: programs
C: inodes
D: virtual memory
C: inodes
Swap space exists in:
A: primary memory
B: secondary memory
C: cpu
D: none of the mentioned
B: secondary memory
_____ is the concept in which a process is copied into main memory from the secondary memory according to the requirement.
A: Swapping
B: Paging
C: Segmentation
D: Demand paging
D: Demand paging
The minimum number of frames to be allocated to a process is decided by the:
A: the amount of available physical memory
B: none of the mentioned
C: operating System
D: instruction set architecture
D: instruction set architecture
What is all-or-nothing situation for sharing in memory?
A: Program makes all its data available to be accessed
B: It prohibits access to some
C: It separates program memory and data memory
D: It creates rules who can access program memory
A: Program makes all its data available to be accessed
Those processes should be aborted on occurrence of a deadlock, the termination of which:
A: safety is not hampered
B: all of the mentioned
C: is more time consuming
D: incurs minimum cost
D: incurs minimum cost
Which two rights allow a process to change the entries in a column?
A: owner and transfer
B: deny and copy
C: copy and transfer
D: copy and owner
C: copy and transfer
RPC provides a(an) –?– on the client side, a separate one for each remote procedure.
A: identifier
B: name
C: process identifier
D: stub
D: stub
If the swap space is simply a large file, within the file system, –?– used to create it, name it and allocate its space.
A: swap space storage manager is
B: normal file system routines cannot be
C: special routines must be
D: normal file system routines can be
D: normal file system routines can be
When the valid – invalid bit is set to valid, it means that the associated page:
A: is the system’s physical address space
B: is in the process’s logical address space
C: is in the TLB
D: has data in it
B: is in the process’s logical address space
Multipartite viruses attack on:
A: files
B: memory
C: all of the mentioned
D: boot sector
C: all of the mentioned
Cancellation point is the point where:
A: the thread can be cancelled – safely or otherwise doesn’t matter
B: the thread can be cancelled safely
C: the whole process can be cancelled safely
D: none of the mentioned
B: the thread can be cancelled safely
In paging the user provides only –?– which is partitioned by the hardware into –?– and –?–
A: one offset, page number, address
B: page number, offset, address
C: none of the mentioned
D: one address, page number, offset
D: one address, page number, offset
The priority of a real time task:
A: none of the mentioned
B: must degrade over time
C: must not degrade over time
D: may degrade over time
C: must not degrade over time
What are various roles of protection?
A: It is used to optimize system downtime
B: It is used to detect errors which can prevent contamination of system
C: None of the mentioned
D: It is used used to accelerate a process
B: It is used to detect errors which can prevent contamination of system
A set of processes is deadlock if:
A: all processes are trying to kill each other
B: each process is blocked and will remain so forever
C: none of the mentioned
D: each process is terminated
B: each process is blocked and will remain so forever
In the Many to One model, if a thread makes a blocking system call:
A: none of the mentioned
B: the entire process will run
C: a part of the process will stay blocked, with the rest running
D: the entire process will be blocked
D: the entire process will be blocked
The two methods how LRU page replacement policy can be implemented in hardware are:
A: RAM & Registers
B: Stack & Counters
C: Registers & RAM
D: Counters & Registers
B: Stack & Counters
When is the Many to One model at an advantage?
A: When there is a single processor
B: None of the mentioned
C: When the program has to be multi-threaded
D: When the program does not need multithreading
D: When the program does not need multithreading
A process can be:
A: single threaded
B: both single threaded and multithreaded
C: none of the mentioned
D: multithreaded
B: both single threaded and multithreaded
An I/O bound program will typically have:
A: many very short I/O bursts
B: many very short CPU bursts
C: a few very short CPU bursts
D: a few very short I/O bursts
B: many very short CPU bursts
An absolute path name begins at the:
A: stem
B: root
C: current directory
D: leaf
B: root
On most computer systems, the internal components are designed around a common:
A: word size
B: byte size
C: protocol
D: interface
A: word size
Real time systems must have:
A: non preemptive kernels
B: neither preemptive nor non preemptive kernels
C: preemptive kernels or non preemptive kernels
D: preemptive kernels
D: preemptive kernels
A program is generally composed of several different localities, which –?– overlap.
A: do not
B: must
C: must not
D: may
D: may
A page fault occurs when:
A: a page is invisible
B: a page cannot be accessed due to its absence from memory
C: a page gives inconsistent data
D: all of the mentioned
B: a page cannot be accessed due to its absence from memory
A multilevel page table is preferred in comparison to a single level page table for translating virtual address to physical address because:
A: it helps to reduce the size of page table needed to implement the virtual address space of a process
B: it reduces the memory access time to read or write a memory location
C: it is required by the translation lookaside buffer
D: it helps to reduce the number of page faults in page replacement algorithms
A: it helps to reduce the size of page table needed to implement the virtual address space of a process
A thread is also called:
A: Heavy Weight Process(HWP)
B: Process
C: None of the mentioned
D: Light Weight Process(LWP)
D: Light Weight Process(LWP)
With relocation and limit registers, each logical address must be –?– the limit register.
A: greater than
B: less than
C: equal to
D: none of the mentioned
B: less than
The interrupt vector contains:
A: the interrupts
B: the identifiers of interrupts
C: the memory addresses of specialized interrupt handlers
D: the device addresses
C: the memory addresses of specialized interrupt handlers
Consider a machine in which all memory reference instructions have only one memory address, for them we need at least –?– frame(s).
A: one
B: none of the mentioned
C: two
D: three
C: two
The way/s in which a process responds to a signal are:
A: performing some default action
B: handling the signal
C: ignoring the signal
D: all of the mentioned
D: all of the mentioned
The growing phase is a phase in which:
A: A transaction may release locks, and does obtain new locks
B: A transaction may obtain locks, and releases a few or all of them
C: A transaction may release locks, but does not obtain any new locks
D: A transaction may obtain locks, but does not release any
D: A transaction may obtain locks, but does not release any
For a domain _______ is a list of objects together with the operation allowed on these objects.
A: access list
B: both capability and access list
C: none of the mentioned
D: capability list
D: capability list
A non blocking system call:
A: halts the execution of the application for an extended time
B: none of the mentioned
C: does not block the interrupts
D: does not halt the execution of the application
D: does not halt the execution of the application
Scheduling is done so as to:
Increase Throughput
What is best solution to have effect of unbounded number if base/bound registers?
A: Tagged architecture
B: Segmentation
C: Fence method
D: None of the mentioned
B: Segmentation
The file name is generally split into two parts:
A: extension & name
B: name & identifier
C: type & extension
D: identifier & type
A: extension & name
If multiple threads are concurrently searching through a database and one thread returns the result then the remaining threads must be:
A: protected
B: cancelled
C: continued
D: none of the mentioned
B: cancelled
The page table registers should be built with:
A: very low speed logic
B: none of the mentioned
C: very high speed logic
D: a large memory space
C: very high speed logic
An interrupt vector:
A: is a unique identity given to an interrupt
B: none of the mentioned
C: is a unique device number that is indexed by an address
D: is an address that is indexed to an interrupt handler
D: is an address that is indexed to an interrupt handler
The FAT is used much as a:
A: stack
B: linked list
C: data
D: pointer
B: linked list
Event latency is:
A: the amount of time from event occurrence till the event crashes
B: the amount of time an event takes to occur from when the system started
C: the amount of time from the event occurrence till the system stops
D: the amount of time that elapses from when an event occurs to when it is serviced.
D: the amount of time that elapses from when an event occurs to when it is serviced.
Messages sent by a process:
A: have to be a variable size
B: None of the mentioned
C: can be fixed or variable sized
D: have to be of a fixed size
C: can be fixed or variable sized
If a process is executing in its critical section, then no other processes can be executing in their critical section. This condition is called:
A: critical exclusion
B: mutual exclusion
C: asynchronous exclusion
D: synchronous exclusion
B: mutual exclusion
With a shared file:
A: the changes made by one person are not reflected to the other
B: there are two copies of the file
C: actual file exists
D: the changes made by one person are reflected to the other
D: the changes made by one person are reflected to the other
If a thread invokes the exec system call:
A: none of the mentioned
B: the exec is ignored as it is invoked by a thread.
C: only the exec executes as a separate process.
D: the program specified in the parameter to exec will replace the entire process
D: the program specified in the parameter to exec will replace the entire process
Every time a request for allocation cannot be granted immediately, the detection algorithm is invoked. This will help identify:
A: the set of processes in the deadlock queue
B: the set of processes that have been deadlocked
C: the specific process that caused the deadlock
D: all of the mentioned
B: the set of processes that have been deadlocked
Which of the following does not interrupt a running process?
A: Scheduler process
B: A device
C: Timer
D: Power failure
A: Scheduler process
The header and trailer of a sector contain information used by the disk controller such as –?– and –?–
A: main section & disk identifier
B: sector number & main section
C: error correcting codes (ECC) & sector number
D: disk identifier & sector number
C: error correcting codes (ECC) & sector number
Once the changes are written to the log, they are considered to be:
A: completed
B: committed
C: none of the mentioned
D: aborted
B: committed
The idea behind thread pools is:
A: none of the mentioned
B: all threads in a pool distribute the task equally among themselves
C: a number of threads are created at process startup and placed in a pool where they sit and wait for work
D: when a process begins, a pool of threads is chosen from the many existing and each thread is allotted equal amount of work
C: a number of threads are created at process startup and placed in a pool where they sit and wait for work
A process is thrashing if:
A: it spends a lot of time executing, rather than paging
B: it has no memory allocated to it
C: none of the mentioned
D: it spends a lot of time paging, than executing
D: it spends a lot of time paging, than executing
A floppy disk is designed to rotate –?– as compared to a hard disk drive.
A: none of the mentioned
B: faster
C: at the same speed
D: slower
D: slower
Bounded capacity and Unbounded capacity queues are referred to as:
A: User defined buffering
B: Programmed buffering
C: No buffering
D: Automatic buffering
D: Automatic buffering
An IPC facility provides at least two operations:
A: delete & receive message
B: receive & send message
C: write & delete message
D: send & delete message
B: receive & send message
A semaphore is a shared integer variable:
A: that can not be more than one
B: that can not drop below zero
C: that can not be more than zero
D: that can not drop below one
B: that can not drop below zero
When a process closes the file:
A: none of the mentioned
B: all of the mentioned
C: per-process table entry is not removed
D: system wide entry’s open count is decremented
D: system wide entry’s open count is decremented
The –?– program initializes all aspects of the system, from CPU registers to device controllers and the contents of main memory, and then starts the operating system.
A: rom
B: main
C: bootstrap
D: bootloader
C: bootstrap
How is disadvantage of all-or-nothing approach overcome?
A: Fence method
B: Tagged architecture
C: Base/Bound
D: Relocation technique
B: Tagged architecture
When a process blocks the receipt of certain signals:
A: The signals are received until they are unblocked
B: The signals are delivered
C: The signals are received by the process once they are delivered
D: The signals are not delivered
B: The signals are delivered
Segment replacement algorithms are more complex than page replacement algorithms because:
A: Pages are better than segments
B: Segments have fixed sizes
C: Segments are better than pages
D: Segments have variable sizes
D: Segments have variable sizes
–?– replacement generally results in greater system throughput.
A: Universal
B: Public
C: Local
D: Global
D: Global
The –?– maintains pending and blocked bit vectors in context of each process.
A: CPU
B: Memory
C: Process
D: Kernel
D: Kernel
–?– controller sends the command placed into it, via messages to the –?– controller.
A: host, host
B: disk, disk
C: host, disk
D: disk, host
C: host, disk
If too little space is allocated to a file:
A: the file cannot be extended
B: the file cannot be opened
C: there will not be any space for the data, as the FCB takes it all
D: the file will not work
A: the file cannot be extended
When a client has a cascading mount, –?– server(s) is/are involved in a path name traversal.
A: more than two
B: at least one
C: more than three
D: more than one
D: more than one
A thread shares its resources(like data section, code section, open files, signals) with:
A: other threads that belong to the same process
B: other threads that belong to similar processes
C: all of the mentioned
D: other process similar to the one that the thread belongs to
A: other threads that belong to the same process
If the offset is legal:
A: it is added to the segment base to produce the physical memory address
B: it is used as a physical memory address itself
C: it is subtracted from the segment base to produce the physical memory address
D: none of the mentioned
B: it is used as a physical memory address itself
Thread cancellation is:
A: the task of terminating a thread before it has completed
B: none of the mentioned
C: the task of removing a thread once its work is done
D: the task of destroying the thread once its work is done
A: the task of terminating a thread before it has completed
The protection domain of a process contains:
A: object name
B: rights-set
C: both object name and rights-set
D: none of the mentioned
C: both object name and rights-set
Virtual memory allows:
A: a program to be larger than the secondary storage
B: execution of a process without being in physical memory
C: execution of a process that may not be completely in memory
D: a program to be smaller than the physical memory
C: execution of a process that may not be completely in memory
Cost factors of process termination include:
A: All of the mentioned
B: Number of resources the deadlock process is not holding
C: CPU utilization at the time of deadlock
D: Amount of time a deadlocked process has thus far consumed during its execution
D: Amount of time a deadlocked process has thus far consumed during its execution
In fixed size partition, the degree of multiprogramming is bounded by:
A: the number of partitions
B: all of the mentioned
C: the CPU utilization
D: the memory size
A: the number of partitions
In which type of allocation method each file occupy a set of contiguous block on the disk?
A: dynamic-storage allocation
B: linked allocation
C: indexed allocation
D: contiguous allocation
D: contiguous allocation
In a safety critical system, incorrect operation:
A: does not affect much
B: causes minor problems
C: none of the mentioned
D: causes major and serious problems
D: causes major and serious problems
The base register is also known as the:
A: regular register
B: relocation register
C: basic register
D: delocation register
B: relocation register
If the set of resources available to the process is fixed throughout the process’s lifetime then its domain is:
A: dynamic
B: neither static nor dynamic
C: static
D: none of the mentioned
C: static
In the Many to Many model when a thread performs a blocking system call:
A: other threads are strictly prohibited from running
B: other threads are allowed to run
C: none of the mentioned
D: other threads only from other processes are allowed to run
B: other threads are allowed to run
Which of the following algorithms tends to minimize the process flow time?
A: First come First served
B: Earliest Deadline First
C: Shortest Job First
D: Longest Job First
C: Shortest Job First
If working set window is too small:
A: none of the mentioned
B: it will not encompass entire locality
C: it may overlap several localities
D: it will cause memory problems
B: it will not encompass entire locality