0

Operating System

Description: Information Technology
Number of Questions: 15
Created by:
Tags: OS Operating System
Attempted 0/15 Correct 0 Score 0

In which of the following sharings is a resource allocated for exclusive use by a program and when the resource is deallocated, it is marked free in the resources table?

  1. Sequential sharing

  2. Concurrent sharing

  3. CPU sharing

  4. None of these


Correct Option: A
Explanation:

In this type of sharing,  a resource is allocated for exclusive use by a program and when the resource is deallocated, it is marked free in the resources table.

____________ is a method by which a program makes a request to the OS.

  1. Priority

  2. Memory fragmentation

  3. System call

  4. None of these


Correct Option: C
Explanation:

System call is a method by which a program makes a request to the OS.

Which of the following is the activity of determining which service request should be handled next by a server?

  1. Turn-around time

  2. Scheduling

  3. Resource preemption

  4. None of these


Correct Option: B
Explanation:

Scheduling is the activity of determining, which service request should be handled next by a server.

Which of the following events occurrs when a requested resource is allocated?

  1. Timer interrupt

  2. Process creation event

  3. Process termination event

  4. Allocation event


Correct Option: D
Explanation:

This event occurs when a requested resource is allocated.

Which of the following is the time between the submission of the computational request by a user and the reporting of its result to the user?

  1. Throughput

  2. Turn-around time

  3. Response time

  4. Time slice


Correct Option: C
Explanation:

Response time is the time between the submission of the computational request by a user and the reporting of its result to the user.

Which of the following information is useful for deallocating memory and resources when the process terminates?

  1. Process scheduling information

  2. Memory and resources information

  3. Event information

  4. None of these


Correct Option: B
Explanation:

This information is useful for deallocating memory and resources when the process terminates.

Which of the following scheduling events is requested when the server switches to servicing of another request before completing the request?

  1. Arrival

  2. Preemption

  3. Scheduling

  4. None of these


Correct Option: B
Explanation:

This scheduling event is requested when the server switches to servicing of another request before completing the request.

Which of the following sub-functions saves the status of a running process, when its execution is to be suspended?

  1. Scheduling

  2. Dispatching

  3. Context save

  4. None of these


Correct Option: C
Explanation:

This sub-function saves the status of a running process when its execution is to be suspended.

In ____________, interacting processes co-ordinate their executions with respect to one another.

  1. control synchronization

  2. data access synchronization

  3. interprocess communication

  4. none of these


Correct Option: A
Explanation:

In control synchronization, interacting processes co-ordinate their executions with respect to one another.

_____________ is a unique combination of ranges of scheduling parameters such as execution time, memory requirements, other resource requirements, etc.

  1. Real-time application

  2. Non-preemptible server

  3. Job class

  4. None of these


Correct Option: C
Explanation:

A job class is a unique combination of ranges of scheduling parameters such as execution time, memory requirements, other resource requirements, etc. 

_____________ events can be classified into request events of some kind or exceptions occurring during the execution of an instruction.

  1. Internal

  2. External

  3. OS action

  4. None of these


Correct Option: A
Explanation:

Internal events can be classified into request events of some kind or exceptions occurring during the execution of an instruction.

 

_____________ is a shared integer variable with non-negative values which can only be subjected to initialization and invisible operations.

  1. Semaphore

  2. Indivisible operation

  3. Critical section

  4. Race condition


Correct Option: A
Explanation:

Semaphore is a shared integer variable with non-negative values, which can only be subjected to initialization and invisible operations.

In which of the following systems is a cycle a necessary and sufficient condition for the existence of a deadlock?

  1. Single Instance Single request (SISR) Systems

  2. Multiple Instance Single request (MISR) Systems

  3. Single Instance Multiple Request (SIMR) Systems

  4. Multiple Instance Multiple request (MIMR) Systems


Correct Option: C
Explanation:

In such a system, a cycle is a necessary and sufficient condition for the existence of a deadlock.

Which of the following aims at facilitating the merging of a pair of adjacent free blocks to make larger free blocks?

  1. Memory compaction

  2. Power of two free lists method

  3. Buddy system

  4. None of these


Correct Option: C
Explanation:

The buddy system aims at facilitating the merging of a pair of adjacent free blocks to make larger free blocks.

________ is defined as the presence of unusable memory areas in a computer system.

  1. Memory fragmentation

  2. Garbage collection

  3. Memory protection

  4. None of these


Correct Option: A
Explanation:

Memory fragmentation is defined as the presence of unusable memory areas in a computer system.

- Hide questions