(i) Which module gives control of the CPU to the process selected by the short-term scheduler?
(a) Dispatcher
(b) Interrupt
(c) Scheduler
(d) None of these
(ii) Which Scheduling algorithm allocates the CPU first to the process that requests the CPU first?
(a) First Come First Server(FCFS)
(b) Shorted job
(c) Priority
(d) None of these
(iii) A Process Control Block(PCB) does not contain which of the following: -
(a) Program
(b) Stack
(c) Heap
(d) Boot strap program
(iv) File type can be represented as:-
(a) File extension
(b) File name
(c) File identifier
(d) (a) and (b) both
(v) Because of virtual memory, the memory can be shared among
(a) Process
(b) Threads
(c) Instruction
(d) None of these
(vi) Swap space exists in
(a) CPU
(b) Primary memory
(c) Secondary memory
(d) none of these
(vii) Effective access time is directly proportional to
(a) Hit rate
(b) Page-fault rate
(c) Memory access time
(d) None of these
(viii) Linux is:-
(a) Single user, single tasking
(b) Single user, multitasking
(c) Multi user, multitasking
(d) Multi user, single tasking
(ix) Which one of the following is deadlock avoidance algorithm
(a) FCFS
(b) Elevator algorithm
(c) Banker's Algorithm
(d) None of these
(x) Logical memory is broken into blocks of the size called_______
(a) Pages
(b) Frames
(c) Backing store
(d) None of these
(xi) The ______ is used as index into the page table
(a) Page number
(b) Frames
(c) page Offset
(d) Frame Offset
(xii) A monitor is type of____________
(a) Semaphore
(b) Low level synchronization constructor
(c) High level synchronization constructor
(d) none of these
(xiii) ___________ is the layer of a computer system between the hardware and the user program
(a) Operating system
(b) System environment
(c) Operating environment
(d) none of these
(xiv) Operating system is an example of:-
(a) System program
(b) Window
(c) Application program
(d) None
(xv) Run time mapping from virtual to physical address is done by:-
(a) Memory management
(b) CPU
(c) PCB
(d) PCI
(xvi) The ______ register is read by the host to get input
(a) Flow in
(b) Flow out
(c) Data in
(d) Data out
(xvii) Illegal Address are trapped using the ____________ bit.
(a) Error
(b) Protection
(c) Valid-invalid
(d) Access
(xviii) A system is in a safe state, only if there exits a:
(a) Safe location
(b) Safe resource
(c) Safe sequence
(d) All of these
(xix) A problem encountered in multitasking when a process is perpetually denied necessary resources is called
(a) Deadlock
(b) Inversion
(c) Starvation
(d) Aging
(xx) If a process fails, most operating system write the error information to a:-
(a) Log file
(b) Another running process
(c) New file
(d) None of these
(Note:- Update available soon, comment for any type
of help)
For more information whats_app:- 8873466244
For more information contact us: - Click me
Or follow our FACEBOOK page @diploma.1234
{Other links
OS
https://diplomaforcse.blogspot.com/2019/08/previous-year-question-for-computer_26.html
CPTC
https://diplomaforcse.blogspot.com/2019/08/previous-year-question-for-computer_28.html
ISP: -
https://diplomaforcse.blogspot.com/2019/08/previous-year-question-for-computer_31.html
NOTES of COA
(unit-1): -
https://diplomaforcse.blogspot.com/2019/09/notes-for-computer-science-engineering.html
NOTES of ISP (unit-4): -
https://diplomaforcse.blogspot.com/2019/09/notes-for-computer-science-engineering_21.html
Notes
of OS (Unit- 1) {click me}
}
No comments:
Post a Comment
Please do not enter any spam link in the comment box and use English and Hindi language for comment.