Study Guide Q's Flashcards
Which of the following describes rotational delay?
A) Time to move the read/write head to the correct track
B) Time for the desired sector to rotate under the read/write head
C) Time to transfer data to the computer once it is under the read/write head
D) Time to spin up the disk to its operational speed
B) Time for the desired sector to rotate under the read/write head
Which of the following describes seek time?
A) Time for the desired sector to rotate under the read/write head
B) Time to move the read/write head to the correct track
C) Time to transfer data once the head is in position
D) Time to access data on a solid-state drive
B) Time to move the read/write head to the correct track
You have memory blocks of sizes: 100 KB, 500 KB, 200 KB, 300 KB, and 600 KB (in that order). A process requests 250 KB of memory.
Which block would Best Fit choose?
300 KB
You have memory blocks of sizes: 100 KB, 500 KB, 200 KB, 300 KB, and 600 KB (in that order). A process requests 250 KB of memory.
Which block would Worst Fit choose?
600 KB
You have memory blocks of sizes: 100 KB, 500 KB, 200 KB, 300 KB, and 600 KB (in that order). A process requests 250 KB of memory.
Which block would First Fit choose?
500 KB
You have memory blocks of sizes: 100 KB, 500 KB, 200 KB, 300 KB, and 600 KB (in that order). A process requests 250 KB of memory.
Which block would Next Fit choose? (Assume the last allocation was made in the 300 KB block)
600 KB
What is the primary role of an operating system?
A) To manage the hardware and software resources of the system
B) To act as a bridge between hardware capabilities and user needs
C) To run applications directly without hardware intervention
D) To replace hardware functionality entirely
B) To act as a bridge between hardware capabilities and user needs
Which feature of the OS allows multiple programs to run simultaneously?
A) Abstraction
B) Multiprogramming
C) Resource Allocation
D) Virtualization
B) Multiprogramming
How does the OS abstract hardware functionality for users?
A) By giving direct access to hardware
B) By simplifying and hiding the complexity of hardware
C) By requiring applications to handle hardware-level instructions
D) By allowing hardware to run independently of the OS
B) By simplifying and hiding the complexity of hardware
Virtualization in an operating system:
A) Provides direct access to hardware components
B) Creates the illusion of more favorable hardware characteristics
C) Duplicates hardware components for redundancy
D) Runs only one application at a time
B) Creates the illusion of more favorable hardware characteristics
Which component of the OS is primarily responsible for managing resources?
A) Kernel
B) User Interface
C) File System
D) Device Driver
A) Kernel
What is a process?
A) A hardware component of the computer
B) A sequence of static instructions
C) A program in execution
D) A component of the OS
C) A program in execution
Which of the following is a characteristic of a thread?
A) Operates independently of processes
B) Does not share memory space with other threads in the same process
C) Is a smaller unit of execution within a process
D) Is managed only at the hardware level
C) Is a smaller unit of execution within a process
What does the Process Control Block (PCB) store?
A) Information about a process, such as its state, memory, and open files
B) Details about all threads in the system
C) The instructions for a process
D) Information about CPU hardware
A) Information about a process, such as its state, memory, and open files
In which scheduling algorithm does each process get a fixed time quantum?
A) Shortest Job First (SJF)
B) Priority Scheduling
C) Round Robin (RR)
D) First-Come, First-Served (FCFS)
C) Round Robin (RR)
What is a critical section?
A) A part of the OS that schedules threads
B) A file that controls resource access
C) A section of code that must not be executed by more than one process at a time
D) A memory area shared by multiple processes
C) A section of code that must not be executed by more than one process at a time
What is the difference between user-level threads and kernel-level threads?
A) User-level threads are managed by the OS kernel, while kernel-level threads are managed by user applications
B) User-level threads are managed in user space, while kernel-level threads are managed by the OS kernel
C) Kernel-level threads are faster to manage than user-level threads
D) User-level threads require no scheduling mechanism
B) User-level threads are managed in user space, while kernel-level threads are managed by the OS kernel
What is the purpose of paging in memory management?
A) To allocate memory in fixed-size blocks
B) To divide programs into logical segments
C) To map virtual memory pages to physical frames
D) To allocate entire memory blocks to processes
C) To map virtual memory pages to physical frames
What is internal fragmentation?
A) Unused memory outside allocated regions
B) Unused memory within allocated blocks
C) Wasted memory due to segmentation
D) Wasted memory from page tables
B) Unused memory within allocated blocks
What is the role of the Translation Lookaside Buffer (TLB)?
A) Manages all memory allocations
B) Caches recent address translations for faster access
C) Handles interrupts during memory access
D) Prevents segmentation faults
B) Caches recent address translations for faster access
Which memory management technique combines segmentation and paging?
A) Virtual Memory
B) Hybrid Memory Management
C) Relocation
D) Cache Memory
B) Hybrid Memory Management
What is external fragmentation?
A) Unused memory between allocated memory blocks
B) Unused memory within allocated blocks
C) Memory waste caused by paging
D) Memory waste from TLB misses
A) Unused memory between allocated memory blocks
Which RAID level provides no redundancy but increases performance?
A) RAID 0
B) RAID 1
C) RAID 5
D) RAID 6
A) RAID 0
Which RAID level duplicates data on two disks for fault tolerance?
A) RAID 0
B) RAID 1
C) RAID 5
D) RAID 6
B) RAID 1
Which RAID level can recover from a single disk failure using distributed parity?
A) RAID 0
B) RAID 1
C) RAID 5
D) RAID 6
C) RAID 5
What is Logical Block Addressing (LBA)?
A) A method of addressing storage blocks independently of physical details
B) A mechanism to map virtual addresses to physical memory
C) A type of RAID implementation
D) A file organization method
A) A method of addressing storage blocks independently of physical details
Which disk scheduling algorithm services the request closest to the current head position?
A) First-Come, First-Served (FCFS)
B) Shortest Seek Time First (SSTF)
C) Round Robin (RR)
D) Circular SCAN (C-SCAN)
B) Shortest Seek Time First (SSTF)
What is the main purpose of mounting a file system?
A) To make the file system accessible to the operating system
B) To format the disk for new file storage
C) To back up the disk’s contents
D) To create a directory structure
A) To make the file system accessible to the operating system
What is a Trojan Horse?
A) A malicious program disguised as a legitimate one
B) A vulnerability in the operating system
C) A tool for debugging applications
D) A protocol for secure communication
A) A malicious program disguised as a legitimate one
What is the principle of least privilege?
A) Granting users full access to resources
B) Granting users only the minimum access necessary for their tasks
C) Restricting all resource access
D) Allowing unrestricted resource sharing between processes
B) Granting users only the minimum access necessary for their tasks
What is the main purpose of a digital signature?
A) Encrypting data for secure storage
B) Verifying the authenticity and integrity of a message
C) Hashing data for quick access
D) Authenticating user credentials
B) Verifying the authenticity and integrity of a message
Which technique prevents processes from accessing unauthorized resources?
A) Cryptography
B) Trojan Protection
C) Access Control
D) Buffer Overflow Prevention
C) Access Control
What is phishing?
A) A type of encryption
B) A process scheduling algorithm
C) An attack that deceives users into providing sensitive information
D) A method for detecting malware
C) An attack that deceives users into providing sensitive information
What is a buffer overflow attack?
A) An OS scheduling issue
B) A security vulnerability caused by writing more data than a buffer can hold
C) A type of RAID failure
D) A synchronization problem
B) A security vulnerability caused by writing more data than a buffer can hold
What is the main advantage of multithreading?
A) Reduces CPU scheduling overhead
B) Allows multiple sequences of execution within a single process
C) Prevents deadlock between processes
D) Simplifies memory management
B) Allows multiple sequences of execution within a single process
What is a deadlock?
A) A situation where processes are stuck waiting for resources held by each other
B) A scheduling algorithm for real-time systems
C) A memory management technique
D) A synchronization mechanism
A) A situation where processes are stuck waiting for resources held by each other
Which algorithm is used to avoid deadlock by ensuring safe resource allocation?
A) Banker’s Algorithm
B) Shortest Job First
C) First-Come, First-Served
D) Priority Scheduling
A) Banker’s Algorithm
What is a semaphore?
A) A memory management technique
B) A synchronization primitive used to control access to shared resources
C) A paging mechanism
D) A process state
B) A synchronization primitive used to control access to shared resources
Which scheduler is responsible for selecting a process to run next on the CPU?
A) Long-term scheduler
B) Short-term scheduler
C) Medium-term scheduler
D) I/O scheduler
B) Short-term
Which scheduler controls the degree of multiprogramming by deciding which processes enter the system for execution?
A) Short-term scheduler
B) Medium-term scheduler
C) Long-term scheduler
D) Preemptive scheduler
C) Long-term
Which type of scheduling allows the CPU to interrupt a running process and switch to another process?
A) Non-preemptive scheduling
B) Preemptive scheduling
C) Long-term scheduling
D) First-Come, First-Served (FCFS)
B) Preemptive
Which scheduling type is better suited for time-sharing systems, where multiple users share the CPU?
A) Non-preemptive scheduling
B) Preemptive scheduling
C) Long-term scheduling
D) Medium-term scheduling
B) Preemptive
Which scheduler is responsible for temporarily removing processes from memory to free up space and later swapping them back?
A) Short-term scheduler
B) Long-term scheduler
C) Medium-term scheduler
D) Preemptive scheduler
C) Medium-term
Which of the following scheduling algorithms does NOT allow process interruption once a process starts executing?
A) Preemptive Priority Scheduling
B) Shortest Remaining Time (SRT)
C) Round Robin (RR)
D) First-Come, First-Served (FCFS)
D) First-Come, First-Served (FCFS)
Which scheduling approach helps prevent long processes from starving shorter processes by allocating a fixed time slice to each process?
A) Shortest Job First (SJF)
B) First-Come, First-Served (FCFS)
C) Round Robin (RR)
D) Preemptive Priority Scheduling
C) Round Robin (RR)
Which scheduler runs most frequently in the system?
A) Long-term scheduler
B) Short-term scheduler
C) Medium-term scheduler
D) Job scheduler
B) Short-term
Which scheduling algorithm minimizes average waiting time but can cause starvation for long processes?
A) First-Come, First-Served (FCFS)
B) Shortest Job First (SJF)
C) Round Robin (RR)
D) Priority Scheduling
B) Shortest Job First (SJF)
Which scheduling algorithm is best suited for interactive systems to ensure all processes get CPU time fairly?
A) Shortest Job First (SJF)
B) Round Robin (RR)
C) First-Come, First-Served (FCFS)
D) Shortest Remaining Time (SRT)
B) Round Robin (RR)
Which type of scheduler primarily determines how many processes should be in memory at a time, controlling multiprogramming?
A) Short-term scheduler
B) Long-term scheduler
C) Preemptive scheduler
D) CPU scheduler
B) Long-term