Advanced operating system

 

(1-MARK questions)

 

 

1Complete code files for which address have been, resolved for all global functions are?

a. Exactable files

b. Object files

c. Source file

d. None of the above

 

2. Header contains information of?

a. Position, Size, value of pc& register

b. Length, data & index

c. Size, pointer, function

d. All of the above

 

3. A table that indicates the name of all functions & global variables is?

a. #Table

b. Symbol of table

c. Index table

d. Data table

 

4. Structure of UNIX used files is due to?

a. Shared libraries

b. Virtual memory

c. Symbol table

d. Unix shell

 

5. Unix shell is a user command that is used to create a _____?

a. shells script

b. Shells

c. Program

d. Process

6. Distributed system are also known as _________

a. Loosely coupled

b. Tightly coupled

c. Time sharing system

d. Multitasking system

 

7. The time elapse between submitting the job & getting the result is known as?

a. Turnaround time

b. Response time

c. Threshold time

d. Waiting time

 

8. RTOS stand for?

a. Real time operating system

b. Resource type online system

c. Rapid time operating system

d. None of the above

 

9. The main function of the micro kernel is to provide a _________ facility between the client program and the varieties services that one also running in user space

a. Transportation

b. Communication

c. Programming

d. Processing

 

10. ________ is a piece of computer software that isolates the application being used by the user from the computer

a. Mach

b. X 86

c. Virtual machine

d. None

11.the zz command is used to

a)     Abort a vi session

b)     Move the contents of a file to another file

c)      Saves the fileand remains in editing mode

d)     Quit vi editor after saving

 

12the default shell which is to be used is given in the

a)     /etc/passwd file

b)     .exrc file in home directory

c)      /ect/shell file

d)     None of these

 

13.to move to the end of a line you have to use.

a)     $

b)     E

c)      E

d)     ^

 

14.we can paste a deleted line using the command.

a)     Y

b)     Cp

c)     P

d)     None of the above

 

15 the key mapping can

a)     Create macros

b)     Assign a key a particular function

c)      Create new keys

d)     None of the above

 

16.vi abbreviations are defined in a file called.exerc located in the

a)     Shell directory

b)     Home directory

c)      Bin directory

d)     Directory in which vi program is stored

 

17.which unix commad displays the information contained in a particular file

a)     More filename

b)     Type filename

c)     File filename

d)     None of the above

 

18.almost all computers store characters strings

a)     As a sequence of anscii codes binary strings

b)     In bcd code

c)      As a sequence of intrgers indicating the position of the characters in the alphabetical seuence

d)     None of the above

 

19.the instructions of a program which is currently being executed are stored in

a)     Secondary memory

b)     Main memory

c)      Read – only memory

d)     None of the above

 

20.the default program sh in unix os is

a)     Jsh

b)     Bourne shell

c)      Csh

d)     Ksh

 

21 Text for a program is written in _________ language & saved in_______

a)     HLL, Source file

b)     Assembly language

c)     Mill, Code file

d)     Both a & b

 

22 Balancing can be achieved through either __________or ______

a.      Push migration/ pull migration

b.      Soft affinity\hard affinity

c.      SMP/SMT

d.      None of the above

23 Process is an ______ entity, while Program is a ______ entity. (Active, Passive)

 

24 Operating system acts as a ______ and ______________ for the system. (Resource allocator, government)

 

25 When you turn on the computer ______ management works,  While executing an application ______ management works (H/w mgmt, Process mgmt)

 

26 One of the three vital components of a system are ___________(hardware), _______________(application) and _______(operating system).

27 Bootstrapping is also known as ______ (Cold boot), Bootstrap procedure is _______ dependent (Hardware)

 

28 To create the user use ________ command (Useradd) , To create a group use ______ command (Groupadd).

 

 

29 Ext 2 was a block size of _____ bytes (1024) , Ufs file system’s block size is _______ bytes maximum (64).

30 To set the value of environment variable use ______ command.(Setenv) , To undefined and unset an environment variable use ______ command (Unsetenv)

 

31 If the CPU scheduling policy SJF, the average waiting time with pre-emption will be

a)     8 ms

b)     14 ms

c)     5.6 ms

d)     None of these

 

 

32 A sequence of instruction telling the comp what to do is called

a. Function

b. Program

c. Statements

d. None of the above

33. A language whose statements have almost one to one correspondence to the instruction understood by the CP of computer is

a. High level language

b. Middle level language

c. Assembly level

d. show level

34. Which of the following is not a high level language?

a. COBOL

b. Pascal

c. C

d. Java

35. A program used to translate high level lang. to machine level language is called

a. Loader

b. Compiler

c. Linker

d. Assembler

36. Code files corresponding to incomplete pension of program area

a. Object files

b. Exactable

c. Complete files

d. All of the above

 

37. Complete code files for which address have been, resolved for all global functions are?

a. Exactable files

b. Object files

c. Source file

d. None of the above

 

38. Header contains information of?

a. Position, Size, value of pc& register

b. Length, data & index

c. Size, pointer, function

d. All of the above

 

39. A table that indicates the name of all functions & global variables is?

a. #Table

b. Symbol of table

c. Index table

d. Data table

 

40. Structure of UNIX used files is due to?

a. Shared libraries

b. Virtual memory

c. Symbol table

d. Unix shell

 

 

2 mark Question

1.      What are the 4 conditions that must be true dead lock to accrue?

a)     Threading, non-preemptive, processing, hold &wait

b)     Non conditions. Are required

c)      Mutual exclusion, hold & wait, no preemption, circular wait

d)     None of the above

 

2.      What is the UNIX system call to create pipe?

a)     Char pipe (Flout fd [3])

b)     Unit pipe (int fd [2])

c)      Double pipe (Float fd [2])

d)     Int pipe (int fd [3])

 

3.      ______ occurs when two or more execution flours are able to run simultaneously

a)     Concurrency

b)     Non-concurrency

c)      Preemptive

d)     Multi programming

 

4.      What is the condition that occurs when multiprocessors threads read and write data items so that the final result depends on the order of execution of instruction in the multiple processes?

a)     Convey condition

b)     Race conditions

c)      Both a & b

d)     None of the above

 

5.      A ________ is a part of program that accesses a shared resource that must not be consistently accessed by more than one process of exertion

a)     Critical section

b)     Mutual execution

c)      mutual exclusion

d)     None of the above

6.      To avoid race conditions and flawed results, one must identify codes in ________ in each process?

a)     Critical section

b)     Mutual execution

c)      Mutual exclusion

d)     None of the above

7.      Concurrency control is a method that is used to ensure that processes are exacted in?

a)     Sequential manner

b)     Hierarchical manner

c)     Safe manner

d)     Quickly

8.      Timer I/o devices are?

a)     Trap

b)     Interrupts

c)      Locks

d)     None of the above

9.      A mechanism that prevents two or more processes from accessing a shored resource simultaneously?

a)     Semaphore

b)     Mutual exclusion

c)      Deadlock

d)     Interrupts

10.  Text for a program is written in _________ language & saved in_______

a)     HLL, Source file

b)     Assembly language

c)     Mill, Code file

d)     Both a & b

11. Machine code is saved in _________& is loaded in_________

a)     Source file, CPU

b)     Code file, virtual memory

c)      Code file, main memory

d)     Source, file, Virtual memory

12. If several users execute the same command then each one creates different process, if the user double clicks on several data files, _______ process are created & manages the _______

a)     Thread

b)     Program

c)      Shall

13. _________ system call creates an almost identical copy of an existing process followed by ________ system call which replaces the program being executed by new programmed?

a)     New, delete

b)     Create, clustery

c)     Create, execute

d)     Fork, execute

14. In java ________ is used to create a program and in unix ______ is used to implement a program?

a)     Exec ()

b)     Exec

c)      Exec (), fork (), exec

d)     new (),exec ()

15. An operating system as resource manager, controls how ________(The active agents) may access_______ (passive entities)

a)     Statements, Program

b)     Processes, resources

c)      Program, Instructions

d)     Files, instructions

 

16. ______ is an interface of os with the user. It is not a part of ________

a)     Unix, kernel

b)     command interpreter, kernel

c)      Code, interpreter

d)     None of the above

 

17. PVM and MPI are to common software packages that permit a heterogeneous collection of networked Unix and windows computers to be used as a Angle, large, penallelcomputer. What does PVM & MPI Stand for ?

a)     Paralled virtual machine/message processing interface

b)     Processed virtual machine/ mobile program interface

c)      Both a & b

d)     None of the above

 

18.  ________ operation decrease is the semaphore value & __________ Operation increments the semaphore volume

a)     Wait, Signal

b)     Flag, mate

c)      Block, make up

d)     Murex, semaphore

 

19. What are the two common choices of craning policy,

a)     Post cleaning/Demand cleaning

b)     Demand cleaning/ Page cleaning

c)      Demand cleaning/ pre- craning

d)     Framed cleaning/ Pre-cleaning

 

20. If we consider only READ operations, then a formula for the average cycle time is :

a) teff = tcache + (1-n) tmain

b)Teff =tcache + (1+n) tcache

c)Teff=tmain +(1-n)main

d)Teff=tcache + (1-n)tcache

 

 

(4-MARKS questions)

 

1)     An operating system is a program that controls the…………of an application program and acts as an……..between the user and………. Operating system is an example of……….software.

a)     Hardware, System, Variable, Application.

b)     Interface, Execution, Computer software, system

c)     Execution, interface, computer hardware, system

d)     None of the above

 

 

2)     An operating system as resource manager, controls how…………….(the active agents) may access………(passive entities) one can view operating system from two points of views:…………. And ……………

a)     Resource, Process, Resource manager, Extended machines

b)     Process, Resource, Resource manager, Extended machines

c)      Registers, Processors, File manager, System machines

d)     Both a) & b).

 

 

3)     In the mid-1980, Researches at Carnegie Mellon university developed an operating system called…….that modularized the kernel using the micro kernel approach. This method structure the operating system by removing all …………. components from the ……………. And implementing then as system and ……………… programs.

a)     Mach, Non-essential, Kernel, User-level.

b)     Macintosh, Essential, Kernel, Programmer level.

c)      Max, Non-essential, Microkernel, User level.

d)     Mach, Essential, microkernel, User level.

 

4)     The kernel mode has 4 major components:

a)     System calls, file subsystem, hardware control, s/w components.

b)     System calls, File subsystem, process control subsystem, hardware control. 

c)      All of the above.

d)     None of the above.

 

5)     PVM (…………………….) and MPI (………………..) are two common software packages that permits a …………..collection of networked unix or Windows computers to be used as a single, large, parallel computer.

a)     Parallel virtual machine, Message passing interface, Heterogeneous.

b)     Post virtual machine, machine passing interface, Homogenous.

c)      Post varied machine, mode passed interface, indigenous.

d)     None of the above.

 

6)     What are the four reasons due to which a new process terminates the existing process?

a)     Syntax error, Interrupt, Flip flop, Flag.

b)     Normal exit, Error exit, fatal exit, Killed by another process.

c)      Caching, Buffering, traffic generation, congestion

d)     All of the above.

 

7)     Name the 5 states of 5state process model.

a)     New state, Terminated, Blocked, Running, ready.

b)      Old star, Busy, Wait, Running, Blocked

c)      New state, Busy, Ready, Blocked, Cached.

d)     None of the above.

 

8)     For paging memory management, each process associated with a …………. . Each entry in the table contains the …………..of the corresponding page in the……………….. space of the process.

a)     Virtual address, Page table, Frame.

b)     Permanent address, Frame number, page table.

c)     Page table, Frame number, Virtual address

d)     None of the above.

 

9)     Segmentation is a method for both……………….and …………………… . It also eases the control of …………and………..

a)     Memory management, Virtual memory, Sharing, Protection.

b)     File management, Resource, Sharing, Protection.

c)      Both a) & b).

d)     None of the above.

 

 

10) The FIFO (………) policy treats the allocated to a process as a ciucular buffer, and page are removed in a…….style. It may be viewed as a modified version of the………..policy.

a)     First in first out, Page frames, Round robin , LRU.

b)     First in fast out, Round robin, system, LRU.

c)      for in first out, page frame, round robin, LRU.

d)     None of these.

 

 

11) A cleaning policy is the apposite of a ……………….Policy. It deals with when a modified page should be written out to ……………… There are 2 common choice i.e: ………………and ………………..

a)     Decode, primary memory, demand cleaning, Pre cleaning.

b)     Execute, Secondary, Demand cleaning, Pre cleaning

c)     Fetch, Secondary memory, demand cleaning, Pre-cleaning.

d)     None of the above.

 

 

12) The difference between cached and virtual memory is a matters of…………..; the two notions are conceptually same because they both rely on the……………properties observed in sequences of…………………

a)     Implementation, Correlation, Address references.

b)     Correlation, Address references, implementation.

c)      Implementation, Address references, Correlation,

d)     None of the above.

 

 

13) Considering only READ operations, the formula for the average cycle time is ………………….when h is probability of a …………, also called ……….and the quantity(1-h), which the probability of a miss, is known as the……..

a)     tcache= teff + (1-h)tmain, hit rate,cache hit, miss rate.

b)     tcache= teff + (h-1)tmain, hit rate., Cache list, miss rate.

c)     teff = tcache + (1-h)tmain, cache hit, hit rate, miss rate

d)     teff = tcache + (h-1)tmain, cache list, hit rate, miss rate

 

 

14) A fully associative cache requires the ..…to be composed of……holding both the…..and the data for each….line.

a)     Cache, Associative memory, Memory address, Cached

b)     Cache, Memory, Relative address, Cached

c)      Cache, Relative memory, memory address, Cached

d)     None of the above.

 

15) In the counter implementation, a …………….is associated with each block. A simple implementation would be to ………each counter at regular intervals and to…………a counter when the line had been referenced.

a)                 Preset, Increment, Reset, Relative

b)                 Counter, Increment, Reset, Associated

c)                  Counter, decrement, Reset, Associated

d)                 Counter, Decrement, Preset, Relative