1.
The section of code which accesses shared
variables is called as __________.
1 Critical section
2 Block
3 Procedure
4 Semaphore
Ans ) 1
2.
Thrashing ________.
1 Reduces page I/O
2 Decreases the degree of multiprogramming
3 Implies excessive page I/O
4 Improve the system performance
Ans ) 3
3.
Routine is not loaded until it is called. All
routines are kept on disk in a relocatable load format. The main program is
loaded into memory & is executed. This type of loading is called _________
1 Static loading
2 Dynamic loading
3 Dynamic linking
4 Overlays
Ans ) 3
4.
Which of the following is crucial time while
accessing data on the disk?
1 Seek time
2 Rotational time
3 Transmission time
4 Waiting time
Ans ) 1
5.
The host repeatedly checks if the controller is
busy until it is not. It is in a loop that status register's busy bit becomes
clear. This is called _____________ and a mechanism for the hardware controller
to notify the CPU that it is ready is called ___________.
1 Interrupt and Polling
2 Polling and Spooling
3 Polling and Interrupt
4 Deadlock and Starvation
Ans ) 3
6.
Unix Operating System is an __________.
1 Time Sharing Operating System
2 Multi-User Operating System
3 Multi-tasking Operating System
4 All the Above
Ans ) 4
7.
Information about a process is maintained in a
_________.
1 Stack
2 Translation Lookaside Buffer
3 Process Control Block
4 Program Control Block
Ans ) 3
8.
Distributed OS works on the ________ principle.
1 File Foundation
2 Single system image
3 Multi system image
4 Networking image
Ans ) 2
9.
The problem of fragmentation arises in ________.
1 Static storage allocation
2 Stack allocation storage
3 Stack allocation with dynamic binding
4 Heap allocation
Ans ) 4
10.
Which file system does DOS typically use ?
1 FAT16
2 FAT32
3 NTFS
4 WNFS
Ans ) 1
11.
The program is known as _________ which
interacts with the inner part of called kernel.
1 Compiler
2 Device Driver
3 Protocol
4 Shell
Ans ) 4
12.
The time
taken by the disk arm to locate the specific address of a sector for getting
information is called __________.
1 Rotational Latency
2 Seek Time
3 Search Time
4 Response Time
Ans ) 2
13.
Which file system does Windows 95 typically use
?
1 FAT16
2 FAT32
3 NTFS
4 LMFS
Ans ) 2
14.
Identify
the odd thing in the services of operating system.
1 Accounting
2 Protection
3 Error detection and correction
4 Dead lock handling
Ans ) 3
15.
Cryptography technique is used in ________.
1 Polling
2 Job Scheduling
3 Protection
4 File Management
Ans ) 3
No comments:
Post a Comment
Thank you for using this blog.