0

Operating System

Description: Operating System Concepts
Number of Questions: 15
Created by:
Tags: Operating System Operating Systems with Case Study of Unix Computer Science & Information Technology - CS
Attempted 0/15 Correct 0 Score 0

Which of the following system calls is a type of information maintenance system call?

  1. WaitForSingleObject()

  2. CloseHandle()

  3. Sleep()

  4. MapViewOfFile()

  5. WriteConsole()


Correct Option: C
Explanation:

It is an information maintenance system call.

Control of nuclear power plants, oil refining and chemical processing are examples of

  1. batch processing system

  2. real-time system

  3. interactive processing

  4. real-time transaction system

  5. offline processing system


Correct Option: B
Explanation:

Control of nuclear power plants, oil refining and chemical processing are examples of real-time system.

CPU scheduler is also known as

  1. long term scheduler

  2. middle term scheduler

  3. scheduler

  4. short scheduler

  5. process scheduler


Correct Option: D
Explanation:

It is called CPU scheduler.

Which of the following statements is/are true?

I. Real-time operating system does processing according to time interval. II. It has two types: one is hard time and another is soft time operating system. III. In hard real-time systems, secondary storage is not limited. IV. Real-time processing is always online whereas online system need not be real-time.

  1. I and III

  2. I, II and III

  3. I, II and IV

  4. I and IV

  5. II, III and IV


Correct Option: C
Explanation:

All statements are true except III. In hard real-time systems, secondary storage is limited.

Which of the following is a system threat?

  1. Trojan horse

  2. Logic bomb

  3. Virus

  4. Worm

  5. Trap door


Correct Option: D
Explanation:

It is a system threat.

Find out the wrong statement(s) about scheduler.

I. Short term scheduler is the fastest among the other two. II. Long term scheduler is a part of the time sharing systems. III. Middle term scheduler reduces the degree of multiprogramming. IV. Long term scheduler controls the degree of multiprogramming.

  1. Only I

  2. Only II

  3. Only III

  4. Both II and III

  5. Only IV


Correct Option: B
Explanation:

Statement II is false. Time-sharing systems (mostly) have no long term scheduler. The stability of these systems either depends upon a physical limitation (number of available terminals) or the self-adjusting nature of users (if you can't get response, you quit).

When a program traps user login credentials and stores them to send to malicious user, who can later on login to computer and can access system resources, then it is called

  1. trap door

  2. trojan horse

  3. virus

  4. logic bomb

  5. port scanning


Correct Option: B
Explanation:

Trojan horse is a program that traps user login credentials and stores them to send to malicious user, who can later on login to computer and can access system resources.

In which partitioning can the space allocations be conveniently handled in sizes of power of 2?

  1. Fixed partition

  2. The buddy system of partitioning

  3. Variable sized partition

  4. Horizontal partition

  5. Vertical partition


Correct Option: B
Explanation:

The buddy system of partitioning allocates spaces in sizes of power of 2. There are two ways in which the buddy system allocates space. Suppose we have a hole which is the closest power of two, in that case, that hole is used for allocation. In case we do not have that situation then we look for the next power of 2 hole size, split it in two equal halves and allocate one of these. Because we always split the holes in two equal sizes, the two are "buddies". Hence, the name buddy system.

Which of the following methods is used for deadlock prevention?

  1. Wait-die scheme

  2. Wait for graph

  3. Roll back

  4. Thomas Write rule

  5. Resource allocation graph algorithm


Correct Option: A
Explanation:

Wait-die scheme is used for deadlock prevention.

Identifying each user of the system and associating the executing programs with those users is known as

  1. one time password

  2. program threat

  3. authentication

  4. system threat

  5. computer security classification


Correct Option: C
Explanation:

Authentication refers to identifying each user of the system and associating the executing programs with those users.

Formula time (process completed) – time (process submitted) is used for calculating

  1. waiting time

  2. turnaround time

  3. response time

  4. throughput

  5. processor utilisation


Correct Option: B
Explanation:

 Turnaround time (tat) is the sum of time spent waiting to get into the ready queue, execution time and I/O time. tat = time (process completed) – time (process submitted).

When a process goes from running state to ready state, then the transition is called

  1. dispatch

  2. time-run-out

  3. wakeup

  4. admitted

  5. block


Correct Option: B
Explanation:

It goes from state: running -> ready.

_____ determines where a process piece is to reside in real memory.

  1. Fetch policy

  2. Placement policy

  3. Replacement policy

  4. Clock policy

  5. Cleaning policy


Correct Option: B
Explanation:

Placement policy determines where a process piece is to reside in real memory.

A context switch occurs due to interrupt (clock or I/O), trap or system call. If the instruction being executed has any error or exception, it is called

  1. trap

  2. clock interrupt

  3. I/O interrupt

  4. memory fault

  5. system call


Correct Option: A
Explanation:

If the instruction being executed has any error or exception, it is called trap.

Which of the following is an advantage of time-sharing operating systems?

  1. They need regular maintenance and updates.

  2. They reduce CPU idle time.

  3. They are not reliable.

  4. They reduce the load on the host computer.

  5. Centralised servers are highly stable.


Correct Option: B
Explanation:

It is one of the advantages of time-sharing operating systems.

- Hide questions