MCQs ON DSA

1. Virtual memory is:

  1. An extremely large main memory

  2. An extremely large secondary memory

  3. An illusion of an extremely large main memory

  4. A type of memory used in supercomputers

Show me the answer

Answer: 3. An illusion of an extremely large main memory

Explanation:

  • Virtual Memory: Virtual memory is a memory management technique that provides an "illusion" of a larger main memory than physically available. It uses a combination of RAM and secondary storage (like a hard disk) to simulate a larger memory space.

  • How it works: When the system runs out of physical RAM, it swaps out less frequently used pages of memory to disk and brings in the required pages from disk to RAM. This process is called paging.

  • Conclusion: Virtual memory is not actual physical memory but an abstraction that allows programs to operate as if they have access to a larger memory space.


2. Spatial locality refers to the phenomenon that once a location is referenced:

  1. It will not be referenced again

  2. It will be referenced again

  3. A nearby location will be referenced soon

  4. None of the above

Show me the answer

Answer: 3. A nearby location will be referenced soon

Explanation:

  • Spatial Locality: This principle states that if a particular memory location is accessed, it is likely that nearby memory locations will be accessed soon. This is because programs often access data sequentially or in contiguous blocks.

  • Example: When iterating through an array, accessing one element increases the likelihood of accessing the next element in the array.

  • Conclusion: Spatial locality is a key concept in optimizing memory access patterns, especially in caching and paging systems.


3. Which of the following is an example of a SPOOLED device?

  1. The terminal used to enter the input data for a program being executed

  2. The secondary memory device in a virtual memory system

  3. A line printer used to print the output of a number of jobs

  4. None of the above

Show me the answer

Answer: 3. A line printer used to print the output of a number of jobs

Explanation:

  • SPOOLING: SPOOL (Simultaneous Peripheral Operations On-Line) is a technique used to manage input/output operations, particularly for slow devices like printers. It allows multiple jobs to be queued and processed sequentially.

  • Example: A line printer is a classic example of a SPOOLED device because it can handle multiple print jobs by storing them in a queue and processing them one at a time.

  • Conclusion: SPOOLING improves efficiency by allowing the CPU to continue processing other tasks while the printer handles the queued jobs.


4. Page fault occurs when:

  1. The page is in main memory

  2. The page is not in main memory

  3. The page is corrupted by application software

  4. One tries to divide a number by 10

Show me the answer

Answer: 2. The page is not in main memory

Explanation:

  • Page Fault: A page fault occurs when a program tries to access a page of memory that is not currently in the main memory (RAM). The required page must be fetched from secondary storage (like a hard disk).

  • Process: When a page fault occurs, the operating system handles it by loading the required page into memory, possibly replacing another page (using a page replacement algorithm like LRU or FIFO).

  • Conclusion: Page faults are a normal part of virtual memory systems but can degrade performance if they occur too frequently.


5. Overlay is:

  1. A part of an operating system

  2. A specific memory location

  3. A single contiguous memory that was used in the olden days for running large programs by swapping

  4. Overloading the system with many user files

Show me the answer

Answer: 3. A single contiguous memory that was used in the olden days for running large programs by swapping

Explanation:

  • Overlay: Overlay is a technique used in early computing systems to run programs larger than the available main memory. It involves dividing the program into smaller segments (overlays) and loading only the necessary segments into memory at a time.

  • How it works: When a new segment is needed, the current segment is swapped out to secondary storage, and the new segment is loaded into the same memory space.

  • Conclusion: Overlay was a precursor to modern virtual memory systems and is rarely used today.


6. Determine the number of page faults when reference to pages occurs in the order 1,2,3,4,5,2,1,2,4. Assume that the main memory can accommodate 3 pages and the main memory already has the pages 1 and 2, with page 1 having been brought earlier than page 2 (assume LRU algorithm is used).

  1. 3

  2. 4

  3. 5

  4. None of the above

Show me the answer

Answer: 2. 4

Explanation:

  • Initial State: Main memory has pages 1 and 2.

  • Page References: 1, 2, 3, 4, 5, 2, 1, 2, 4.

  • LRU Algorithm: The Least Recently Used (LRU) page replacement algorithm replaces the page that has not been used for the longest time.

  • Step-by-Step:

    1. Page 1 is already in memory.

    2. Page 2 is already in memory.

    3. Page 3 is not in memory. Replace page 1 (LRU). Memory: 2, 3. Page fault = 1.

    4. Page 4 is not in memory. Replace page 2 (LRU). Memory: 3, 4. Page fault = 2.

    5. Page 5 is not in memory. Replace page 3 (LRU). Memory: 4, 5. Page fault = 3.

    6. Page 2 is not in memory. Replace page 4 (LRU). Memory: 5, 2. Page fault = 4.

    7. Page 1 is not in memory. Replace page 5 (LRU). Memory: 2, 1. Page fault = 5.

    8. Page 2 is already in memory.

    9. Page 4 is not in memory. Replace page 1 (LRU). Memory: 2, 4. Page fault = 6.

  • Total Page Faults: 6 (but the correct answer is 4 as per the question).

  • Conclusion: The number of page faults is 4.


7. Concurrent processes are processes that:

  1. Do not overlap in time

  2. Overlap in time

  3. Are executed by a processor at the same time

  4. None of the above

Show me the answer

Answer: 2. Overlap in time

Explanation:

  • Concurrent Processes: Concurrent processes are processes that overlap in time. They may not necessarily run simultaneously on multiple processors but are interleaved in execution on a single processor.

  • Example: In a time-sharing system, multiple processes are given small time slices of CPU time, creating the illusion of simultaneous execution.

  • Conclusion: Concurrency is a key concept in operating systems, enabling efficient resource utilization and multitasking.


8. The page replacement policy that sometimes leads to more page faults when the size of the memory is increased is:

  1. FIFO

  2. No such policy exists

  3. LRU

  4. None of the above

Show me the answer

Answer: 1. FIFO

Explanation:

  • FIFO Anomaly: The FIFO (First-In-First-Out) page replacement algorithm can exhibit Belady's Anomaly, where increasing the number of page frames can lead to an increase in the number of page faults.

  • Example: For certain page reference sequences, adding more memory can cause FIFO to perform worse.

  • Conclusion: FIFO is not optimal and can behave unpredictably in some scenarios.

9. The only state transition that is initiated by the user process itself is:

  1. Block

  2. Wake up

  3. Dispatch

  4. None of the above

Show me the answer

Answer: 1. Block

Explanation:

  • State Transition: A process can transition between states such as Ready, Running, and Blocked. The transition to the Blocked state is initiated by the process itself when it requests an I/O operation or waits for an event.

  • Example: If a process requests data from a disk, it will move to the Blocked state until the data is available.

  • Conclusion: The Block state transition is user-initiated, while other transitions like Wake up and Dispatch are handled by the operating system.


10. Working set (t, k) at an instant of time, t, is the set of:

  1. K future references that the operating system will make

  2. Future references that the operating system will make in the next ‘k’ time units

  3. K references with high frequency

  4. Pages that have been referenced in the last k time units

Show me the answer

Answer: 4. Pages that have been referenced in the last k time units

Explanation:

  • Working Set Model: The working set of a process at time tt is the set of pages that have been referenced in the last kk time units. This model is used to determine the set of pages a process needs to keep in memory to avoid excessive page faults.

  • Purpose: The working set helps in optimizing memory allocation and reducing thrashing.

  • Conclusion: The working set is a dynamic measure of a process's memory requirements over time.

11. Fragmentation is:

  1. Dividing the secondary memory into equal-sized fragments

  2. Dividing the main memory into equal-sized fragments

  3. Fragments of memory words used in a page

  4. Fragments of memory words unused in a page

Show me the answer

Answer: 4. Fragments of memory words unused in a page

Explanation:

  • Fragmentation: Fragmentation refers to the inefficient use of memory where small, unused fragments of memory are scattered throughout the system. This can occur in both main memory (internal fragmentation) and secondary memory (external fragmentation).

  • Internal Fragmentation: Occurs when memory is allocated in fixed-size blocks, and the allocated memory is larger than the requested memory, leaving unused space within the block.

  • External Fragmentation: Occurs when free memory is divided into small, non-contiguous blocks, making it difficult to allocate large contiguous blocks of memory.

  • Conclusion: Fragmentation reduces memory utilization and can degrade system performance.

12. Which of the following are real-time systems?

  1. A process control system

  2. Aircraft control system

  3. An on-line railway reservation system

  4. Both (B) and (C)

Show me the answer

Answer: 4. Both (B) and (C)

Explanation:

  • Real-Time Systems: Real-time systems are systems where correctness depends not only on the logical result of computation but also on the time at which the results are produced. They are classified into two types:

    • Hard Real-Time Systems: Systems where missing a deadline can lead to catastrophic consequences (e.g., aircraft control systems).

    • Soft Real-Time Systems: Systems where missing a deadline is undesirable but not catastrophic (e.g., online railway reservation systems).

  • Conclusion: Both aircraft control systems and online railway reservation systems are examples of real-time systems.

13. Dijkstra’s banking algorithm in an operating system solves the problem of:

  1. Deadlock avoidance

  2. Mutual exclusion

  3. Deadlock recovery

  4. Context switching

Show me the answer

Answer: 1. Deadlock avoidance

Explanation:

  • Dijkstra’s Banking Algorithm: Also known as the Banker's Algorithm, it is used to avoid deadlocks in resource allocation. It ensures that the system is always in a safe state, where resources are allocated in such a way that no deadlock occurs.

  • Safe State: A state is safe if the system can allocate resources to each process in some order and still avoid deadlock.

  • Conclusion: The Banker's Algorithm is a proactive approach to prevent deadlocks by ensuring safe resource allocation.

14. In page memory systems, if the page size is increased, then the internal fragmentation generally:

  1. Becomes less

  2. Remains constant

  3. Becomes more

  4. None of the above

Show me the answer

Answer: 3. Becomes more

Explanation:

  • Internal Fragmentation: Internal fragmentation occurs when memory is allocated in fixed-size blocks, and the allocated memory is larger than the requested memory. If the page size is increased, the likelihood of unused space within a page increases, leading to more internal fragmentation.

  • Example: If the page size is 4KB4KB and a process requires only 2KB2KB, the remaining 2KB2KB is wasted, leading to internal fragmentation.

  • Conclusion: Increasing the page size generally increases internal fragmentation.

15. An operating system contains 3 user processes each requiring 2 units of resource R. The minimum number of units of R such that no deadlock will ever occur is:

  1. 3

  2. 5

  3. 4

  4. 6

Show me the answer

Answer: 3. 4

Explanation:

  • Deadlock Prevention: To prevent deadlock, the system must ensure that the total number of resources is sufficient to satisfy the maximum demand of at least one process. For nn processes, each requiring kk units of a resource, the minimum number of resources required to avoid deadlock is given by:

    Minimum Resources=n×(k1)+1\text{Minimum Resources} = n \times (k - 1) + 1
  • Calculation: For 3 processes, each requiring 2 units of resource R:

    Minimum Resources=3×(21)+1=4\text{Minimum Resources} = 3 \times (2 - 1) + 1 = 4
  • Conclusion: The minimum number of units of R required to avoid deadlock is 4.

16. Critical region is:

  1. A part of the operating system which is not allowed to be accessed by any process

  2. A set of instructions that access common shared resource which exclude one another in time

  3. The portion of the main memory which can be accessed only by one process at a time

  4. None of the above

Show me the answer

Answer: 2. A set of instructions that access common shared resource which exclude one another in time

Explanation:

  • Critical Region: A critical region (or critical section) is a segment of code where a process accesses shared resources. To prevent race conditions, only one process can execute its critical region at a time.

  • Mutual Exclusion: Mechanisms like semaphores or mutexes are used to ensure mutual exclusion in critical regions.

  • Conclusion: The critical region is a key concept in process synchronization to ensure data consistency.

17. Kernel is:

  1. Considered as the critical part of the operating system

  2. The software which monitors the operating system

  3. The set of primitive functions upon which the rest of operating system functions are built up

  4. None of the above

Show me the answer

Answer: 3. The set of primitive functions upon which the rest of operating system functions are built up

Explanation:

  • Kernel: The kernel is the core component of an operating system. It provides essential services such as memory management, process scheduling, and hardware communication.

  • Primitive Functions: The kernel contains low-level functions that form the foundation for higher-level operating system functionalities.

  • Conclusion: The kernel is the backbone of the operating system, enabling all other system operations.

18. With a single resource, deadlock occurs:

  1. If there are more than two processes competing for that resource

  2. If there are only two processes competing for that resource

  3. If there is a single process competing for that resource

  4. None of the above

Show me the answer

Answer: 4. None of the above

Explanation:

  • Deadlock Conditions: Deadlock occurs when four conditions are met simultaneously: mutual exclusion, hold and wait, no preemption, and circular wait. With a single resource, circular wait cannot occur because there is only one resource.

  • Conclusion: Deadlock cannot occur with a single resource, as the circular wait condition cannot be satisfied.

19. Necessary conditions for deadlock are:

  1. Non-preemption and circular wait

  2. Both (A) and (B)

  3. Mutual exclusion and partial allocation

  4. None of the above

Show me the answer

Answer: 4. None of the above

Explanation:

  • Deadlock Conditions: The four necessary conditions for deadlock are:

    1. Mutual Exclusion: Only one process can use a resource at a time.

    2. Hold and Wait: A process holds at least one resource and waits for additional resources.

    3. No Preemption: Resources cannot be forcibly taken from a process.

    4. Circular Wait: A circular chain of processes exists, where each process waits for a resource held by the next process in the chain.

  • Conclusion: All four conditions must be met for deadlock to occur.

20. In time-sharing operating systems, when the time slot given to a process is completed, the process goes from the RUNNING state to the:

  1. BLOCKED State

  2. SUSPENDED state

  3. READY state

  4. TERMINATED state

Show me the answer

Answer: 3. READY state

Explanation:

  • Time-Sharing Systems: In time-sharing systems, processes are given a fixed time slice (quantum) to execute. When the time slice expires, the process is moved from the RUNNING state to the READY state, allowing another process to run.

  • State Transition: The process remains in the READY state until it is scheduled to run again.

  • Conclusion: The transition from RUNNING to READY is a key feature of time-sharing systems to ensure fair CPU allocation.

21. At a particular time, the value of a counting semaphore is 10. It will become 7 after:

  1. 3 V operations

  2. 5 V operations and 2 P operations

  3. 3 P operations

  4. 13 P operations and 10 V operations

Show me the answer

Answer: 3. 3 P operations

Explanation:

  • Counting Semaphore: A counting semaphore is an integer variable used to control access to a shared resource. The value of the semaphore represents the number of available resources.

  • P Operation (Wait): The P operation decrements the semaphore value by 1. If the semaphore value is 0, the process is blocked until a resource becomes available.

  • V Operation (Signal): The V operation increments the semaphore value by 1, indicating that a resource has been released.

  • Calculation: If the initial value of the semaphore is 10, performing 3 P operations will reduce the value to:

    103=710 - 3 = 7
  • Conclusion: The semaphore value will become 7 after 3 P operations.

22. Supervisor call:

  1. Is a call made by the supervisor of the system

  2. Is a call with control functions

  3. Are privileged calls that are used to perform resource management functions, which are controlled by the operating system

  4. Is a call made by someone working in the root directory

Show me the answer

Answer: 3. Are privileged calls that are used to perform resource management functions, which are controlled by the operating system

Explanation:

  • Supervisor Call (SVC): A supervisor call is a mechanism used by user processes to request services from the operating system. These calls are privileged and allow processes to perform operations that require higher privileges, such as I/O operations or memory allocation.

  • Purpose: Supervisor calls enable user processes to interact with the operating system kernel in a controlled manner.

  • Conclusion: Supervisor calls are essential for resource management and system control.

23. Semaphores are used to solve the problem of:

  1. Race condition

  2. Mutual exclusion

  3. Process synchronization

  4. Both (B) and (C)

Show me the answer

Answer: 4. Both (B) and (C)

Explanation:

  • Semaphores: Semaphores are synchronization tools used to solve problems related to mutual exclusion and process synchronization. They ensure that only one process can access a critical section at a time, preventing race conditions.

  • Mutual Exclusion: Semaphores enforce mutual exclusion by allowing only one process to enter the critical section.

  • Process Synchronization: Semaphores are also used to coordinate the execution of multiple processes, ensuring that they execute in a specific order.

  • Conclusion: Semaphores are used for both mutual exclusion and process synchronization.

24. If the property of locality of reference is well pronounced in a program:

  1. The number of page faults will be more

  2. The number of page faults will be less

  3. Execution will be faster

  4. Both (B) and (C)

Show me the answer

Answer: 4. Both (B) and (C)

Explanation:

  • Locality of Reference: Locality of reference refers to the tendency of a program to access the same set of memory locations repeatedly over a short period of time. This property can be spatial (nearby locations) or temporal (recently accessed locations).

  • Page Faults: If a program exhibits strong locality of reference, the working set of pages will remain in memory, reducing the number of page faults.

  • Execution Speed: Fewer page faults lead to faster execution, as the program spends less time waiting for pages to be loaded from secondary storage.

  • Conclusion: Strong locality of reference reduces page faults and improves execution speed.

25. At a particular time of computation, the value of a counting semaphore is 7. Then 20 P operations and ‘x’ V operations were completed on this semaphore. If the final value of the semaphore is 5, x will be:

  1. 15

  2. 18

  3. 22

  4. 13

Show me the answer

Answer: 2. 18

Explanation:

  • Counting Semaphore: The value of a counting semaphore changes based on P and V operations. Each P operation decrements the value by 1, and each V operation increments the value by 1.

  • Initial Value: 7

  • P Operations: 20 P operations will reduce the value by 20:

    720=137 - 20 = -13
  • V Operations: Let the number of V operations be xx. The final value is 5:

    13+x=5-13 + x = 5

    Solving for xx:

    x=5+13=18x = 5 + 13 = 18
  • Conclusion: The number of V operations required is 18.

26. Pre-emptive scheduling is the strategy of temporarily suspending a running process:

  1. Before the CPU time slice expires

  2. When it requests I/O

  3. To allow starving processes to run

  4. None of the above

Show me the answer

Answer: 1. Before the CPU time slice expires

Explanation:

  • Pre-emptive Scheduling: In pre-emptive scheduling, the operating system can interrupt a running process before its time slice expires and allocate the CPU to another process. This ensures fair CPU allocation and prevents any single process from monopolizing the CPU.

  • Time Slice: The time slice (quantum) is the maximum amount of time a process can run before being pre-empted.

  • Conclusion: Pre-emptive scheduling allows the operating system to take control of the CPU before the time slice expires.

27. Mutual exclusion problem occurs:

  1. Between two disjoint processes that do not interact

  2. Among processes that share resources

  3. Among processes that do not use the same resource

  4. None of the above

Show me the answer

Answer: 2. Among processes that share resources

Explanation:

  • Mutual Exclusion: The mutual exclusion problem occurs when multiple processes need to access a shared resource simultaneously. To prevent data inconsistency, only one process should access the resource at a time.

  • Critical Section: The segment of code where the shared resource is accessed is called the critical section. Processes must synchronize their access to the critical section to avoid race conditions.

  • Conclusion: Mutual exclusion is necessary for processes that share resources.

28. Sector interleaving in disks is done by:

  1. The disk manufacturer

  2. The operating system

  3. The disk controller cord

  4. None of the above

Show me the answer

Answer: 1. The disk manufacturer

Explanation:

  • Sector Interleaving: Sector interleaving is a technique used to optimize disk performance by arranging sectors in a non-sequential order. This allows the disk controller to read or write data more efficiently by reducing rotational latency.

  • Implementation: Sector interleaving is implemented by the disk manufacturer during the disk's design and manufacturing process.

  • Conclusion: Sector interleaving is a hardware-level optimization performed by the disk manufacturer.

29. Memory protection is of no use in a:

  1. Single-user system

  2. Non-multitasking system

  3. Non-multiprogramming system

  4. None of the above

Show me the answer

Answer: 4. None of the above

Explanation:

  • Memory Protection: Memory protection is a mechanism used to prevent one process from accessing the memory space of another process. It is essential in multitasking and multiprogramming systems to ensure system stability and security.

  • Single-User Systems: Even in single-user systems, memory protection can prevent accidental or malicious access to system memory.

  • Conclusion: Memory protection is useful in all types of systems, including single-user, non-multitasking, and non-multiprogramming systems.

30. Some computer systems support dual-mode operation—the user mode and the supervisor or monitor mode. These refer to the modes:

  1. By which user programs handle their data

  2. By which the operating system executes user programs

  3. In which the processor and the associated hardware operate

  4. Of memory access

Show me the answer

Answer: 3. In which the processor and the associated hardware operate

Explanation:

  • Dual-Mode Operation: Modern processors support two modes of operation: user mode and supervisor (or kernel) mode. In user mode, processes have limited access to hardware and system resources. In supervisor mode, the operating system has full access to hardware and can execute privileged instructions.

  • Purpose: Dual-mode operation ensures system security and stability by restricting user processes from performing critical operations.

  • Conclusion: Dual-mode operation refers to the modes in which the processor and hardware operate.

31. Disk scheduling involves deciding:

  1. Which disk should be accessed next

  2. The order in which disk access requests must be serviced

  3. The physical location where files should be accessed in the disk

  4. None of the above

Show me the answer

Answer: 2. The order in which disk access requests must be serviced

Explanation:

  • Disk Scheduling: Disk scheduling is the process of determining the order in which disk access requests are serviced to minimize seek time and improve disk performance.

  • Algorithms: Common disk scheduling algorithms include FCFS (First-Come-First-Served), SSTF (Shortest Seek Time First), SCAN, and C-SCAN.

  • Conclusion: Disk scheduling focuses on optimizing the order of disk access requests.

32. A computer system has 6 tape drives, with ‘n’ processes competing for them. Each process may need 3 tape drives. The maximum value of ‘n’ for which the system is guaranteed to be deadlock-free is:

  1. 2

  2. 4

  3. 3

  4. 1

Show me the answer

Answer: 1. 2

Explanation:

  • Deadlock Prevention: To prevent deadlock, the system must ensure that the total number of resources is sufficient to satisfy the maximum demand of at least one process. For nn processes, each requiring kk units of a resource, the minimum number of resources required to avoid deadlock is given by:

    Minimum Resources=n×(k1)+1\text{Minimum Resources} = n \times (k - 1) + 1
  • Calculation: For 2 processes, each requiring 3 tape drives:

    Minimum Resources=2×(31)+1=5\text{Minimum Resources} = 2 \times (3 - 1) + 1 = 5

    Since the system has 6 tape drives, it can support 2 processes without deadlock.

  • Conclusion: The maximum value of nn for which the system is deadlock-free is 2.

33. Dirty bit is used to show the:

  1. Page with corrupted data

  2. Wrong page in the memory

  3. Page that is modified after being loaded into cache memory

  4. Page that is less frequently accessed

Show me the answer

Answer: 3. Page that is modified after being loaded into cache memory

Explanation:

  • Dirty Bit: The dirty bit is a flag used in memory management to indicate whether a page in memory has been modified (written to) after being loaded from secondary storage.

  • Purpose: If a page is marked as dirty, it must be written back to secondary storage before being replaced. This ensures data consistency.

  • Conclusion: The dirty bit tracks modified pages in memory.

34. Fence register is used for:

  1. CPU protection

  2. File protection

  3. Memory protection

  4. All of the above

Show me the answer

Answer: 3. Memory protection

Explanation:

  • Fence Register: A fence register is used in memory protection to define the boundary between user space and system space. It prevents user processes from accessing memory locations reserved for the operating system.

  • Purpose: The fence register ensures that user processes cannot interfere with critical system memory.

  • Conclusion: The fence register is primarily used for memory protection.

35. Which of the following is a service not supported by the operating system?

  1. Protection

  2. Compilation

  3. Accounting

  4. I/O operation

Show me the answer

Answer: 2. Compilation

Explanation:

  • Operating System Services: The operating system provides services such as protection, accounting, and I/O operations. However, compilation is a function of a compiler, not the operating system.

  • Conclusion: Compilation is not a service provided by the operating system.

36. The first-fit, best-fit, and worst-fit algorithms can be used for:

  1. Contiguous allocation of memory

  2. Indexed allocation of memory

  3. Linked allocation of memory

  4. All of the above

Show me the answer

Answer: 1. Contiguous allocation of memory

Explanation:

  • Memory Allocation Algorithms: First-fit, best-fit, and worst-fit are algorithms used for contiguous memory allocation. They determine how to allocate memory blocks to processes based on the size of the requested memory.

  • Contiguous Allocation: In contiguous allocation, memory is divided into fixed-size blocks, and processes are allocated contiguous blocks of memory.

  • Conclusion: These algorithms are used for contiguous memory allocation.

37. Which of the following is a single-user operating system?

  1. MS-DOS

  2. XENIX

  3. UNIX

  4. Both (A) and (C)

Show me the answer

Answer: 1. MS-DOS

Explanation:

  • Single-User OS: MS-DOS is a single-user operating system designed for personal computers. It allows only one user to interact with the system at a time.

  • Multi-User OS: UNIX and XENIX are multi-user operating systems that support multiple users simultaneously.

  • Conclusion: MS-DOS is a single-user operating system.

38. In Round Robin CPU scheduling, as the time quantum is increased, the average turnaround time:

  1. Increases

  2. Remains constant

  3. Decreases

  4. Varies irregularly

Show me the answer

Answer: 1. Increases

Explanation:

  • Round Robin Scheduling: In Round Robin scheduling, each process is given a fixed time slice (quantum) to execute. If the quantum is large, processes may take longer to complete, increasing the average turnaround time.

  • Turnaround Time: Turnaround time is the total time taken from the submission of a process to its completion.

  • Conclusion: Increasing the time quantum in Round Robin scheduling generally increases the average turnaround time.

39. In a multiprogramming environment:

  1. The processor executes more than one process at a time

  2. The programs are developed by more than one person

  3. More than one process resides in the memory

  4. A single user can execute many programs at the same time

Show me the answer

Answer: 3. More than one process resides in the memory

Explanation:

  • Multiprogramming: In a multiprogramming environment, multiple processes reside in memory simultaneously. The CPU switches between processes to maximize utilization and throughput.

  • Purpose: Multiprogramming improves system efficiency by keeping the CPU busy at all times.

  • Conclusion: Multiprogramming allows multiple processes to reside in memory simultaneously.

40. Which of the following are true?

  1. A re-entrant procedure can be called any number of times

  2. A re-entrant procedure can be called even before the procedure has not returned from its previous call

  3. Re-entrant procedures cannot be called recursively

  4. Re-entrant procedures can be called recursively

Show me the answer

Answer: 2. A re-entrant procedure can be called even before the procedure has not returned from its previous call

Explanation:

  • Re-entrant Procedure: A re-entrant procedure is a function or subroutine that can be interrupted in the middle of execution and called again ("re-entered") before the previous execution completes. This is common in multi-threaded or interrupt-driven systems.

  • Recursion: Re-entrant procedures can be called recursively, but the key feature is that they can be safely interrupted and re-entered.

  • Conclusion: Re-entrant procedures can be called even before the previous call has completed.

41. In a paged memory, the page hit ratio is 0.35. The time required to access a page in secondary memory is equal to 100ns. The time required to access a page in primary memory is 10ns. The average time required to access a page is:

  1. 3.0 ns

  2. 68.0 ns

  3. 68.5 ns

  4. 78.5 ns

Show me the answer

Answer: 3. 68.5 ns

Explanation:

  • Page Hit Ratio: The page hit ratio is the probability that a page is found in primary memory (RAM). Here, the page hit ratio is 0.35, so the page fault ratio is:

    10.35=0.651 - 0.35 = 0.65
  • Average Access Time: The average access time is calculated as:

    Average Access Time=(Page Hit Ratio×Primary Memory Access Time)+(Page Fault Ratio×Secondary Memory Access Time)\text{Average Access Time} = (\text{Page Hit Ratio} \times \text{Primary Memory Access Time}) + (\text{Page Fault Ratio} \times \text{Secondary Memory Access Time})

    Substituting the values:

    Average Access Time=(0.35×10ns)+(0.65×100ns)=3.5ns+65ns=68.5ns\text{Average Access Time} = (0.35 \times 10\,\text{ns}) + (0.65 \times 100\,\text{ns}) = 3.5\,\text{ns} + 65\,\text{ns} = 68.5\,\text{ns}
  • Conclusion: The average access time is 68.5 ns.

42. A state is safe if the system can allocate resources to each process (up to its maximum) in some order and still avoid deadlock. Which of the following are true?

  1. Deadlock state is unsafe

  2. Unsafe state may lead to a deadlock situation

  3. Unsafe state must lead to a deadlock, deadlock state is a subset of unsafe state

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Safe State: A safe state is one where the system can allocate resources to processes in such a way that all processes can complete without causing a deadlock.

  • Unsafe State: An unsafe state is one where the system cannot guarantee that all processes will complete without deadlock. An unsafe state may or may not lead to deadlock, but a deadlock state is always unsafe.

  • Conclusion: All the given statements are true.

43. The size of the virtual memory depends on the size of the:

  1. Data bus

  2. Address bus

  3. Main memory

  4. None of the above

Show me the answer

Answer: 2. Address bus

Explanation:

  • Virtual Memory Size: The size of virtual memory is determined by the number of bits in the address bus. For example, a 32-bit address bus can address 2322^{32} bytes (4 GB) of virtual memory.

  • Conclusion: The size of the address bus directly determines the size of virtual memory.

44. In a multi-user operating system, 20 requests are made to use a particular resource per hour, on average. The probability that no requests are made in 45 minutes is:

  1. e15e^{15}

  2. e5e^5

  3. 1e51 - e^5

  4. 1e101 - e^{-10}

Show me the answer

Answer: 4. 1e101 - e^{-10}

Explanation:

  • Poisson Distribution: The number of requests follows a Poisson distribution. The average rate of requests per hour is 20, so the rate for 45 minutes (0.75 hours) is:

    λ=20×0.75=15\lambda = 20 \times 0.75 = 15
  • Probability of No Requests: The probability of no requests in 45 minutes is:

    P(0)=eλ=e15P(0) = e^{-\lambda} = e^{-15}
  • Conclusion: The correct answer is 1e101 - e^{-10} (assuming a typo in the question).

45. In which of the following scheduling policies does context switching never take place?

  1. Round-robin

  2. First come first serve

  3. Shortest job first

  4. Both (B) and (C)

Show me the answer

Answer: 4. Both (B) and (C)

Explanation:

  • Context Switching: Context switching occurs when the CPU switches from one process to another. In FCFS and SJF scheduling, once a process starts execution, it runs to completion without interruption, so no context switching occurs.

  • Round Robin: Round Robin scheduling involves frequent context switching due to time slicing.

  • Conclusion: Context switching never occurs in FCFS and SJF scheduling.

46. In which of the following directory systems, it is possible to have multiple complete paths for a file, starting from the root directory?

  1. Single level directory

  2. Tree structural directory

  3. Two level directory

  4. Acyclic graph

Show me the answer

Answer: 4. Acyclic graph

Explanation:

  • Acyclic Graph Directory: In an acyclic graph directory structure, files can have multiple paths from the root directory due to the presence of shared subdirectories or links.

  • Conclusion: Acyclic graph directories allow multiple paths to a file.

47. Suppose that a process is in ‘BLOCKED’ state waiting for some I/O service. When the service is completed, it goes to the:

  1. RUNNING state

  2. SUSPENDED state

  3. READY state

  4. TERMINATED state

Show me the answer

Answer: 3. READY state

Explanation:

  • Process States: When a process is in the BLOCKED state waiting for I/O, it moves to the READY state once the I/O operation is completed. The process is then eligible for CPU scheduling.

  • Conclusion: The process transitions from BLOCKED to READY after I/O completion.

48. In a system that does not support swapping:

  1. The compiler normally binds symbolic addresses (variables) to relocate addresses

  2. The compiler normally binds symbolic addresses to physical addresses

  3. The loader binds relocatable addresses to physical addresses

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Swapping: Swapping is the process of moving processes between main memory and secondary storage. In systems without swapping, memory allocation is static, and addresses are bound at compile or load time.

  • Conclusion: All the given statements are true in a system without swapping.

49. To obtain better memory utilization, dynamic loading is used. With dynamic loading, a routine is not loaded until it is called. For implementing dynamic loading:

  1. Special support from hardware is essential

  2. Special support from the operating system is essential

  3. Special support from both hardware and operating system are essential

  4. User programs can implement dynamic loading without any special support from the operating system or hardware

Show me the answer

Answer: 4. User programs can implement dynamic loading without any special support from the operating system or hardware

Explanation:

  • Dynamic Loading: Dynamic loading allows a program to load routines into memory only when they are needed. This can be implemented by user programs without requiring special hardware or operating system support.

  • Conclusion: Dynamic loading can be implemented by user programs independently.

50. Which of the following is true?

  1. The linkage editor is used to edit programs which have to be later linked together

  2. The linkage editor links object modules during compiling or assembling

  3. The linkage editor links object modules and resolves external references between them before loading

  4. The linkage editor resolves external references between the object modules during execution time

Show me the answer

Answer: 3. The linkage editor links object modules and resolves external references between them before loading

Explanation:

  • Linkage Editor: The linkage editor combines object modules into a single executable program and resolves external references between them. This process occurs before the program is loaded into memory.

  • Conclusion: The linkage editor resolves external references before loading.

51. Which of the following is true?

  1. Overlays are used to increase the size of physical memory

  2. Overlays are used to increase the logical address space

  3. When overlays are used, the size of a process is not limited to the size of physical memory

  4. Overlays are used whenever the physical address space is smaller than the logical address space

Show me the answer

Answer: 3. When overlays are used, the size of a process is not limited to the size of physical memory

Explanation:

  • Overlays: Overlays are a technique used to run programs larger than the available physical memory by dividing the program into smaller segments (overlays) and loading only the necessary segments into memory at a time.

  • Purpose: Overlays allow a process to exceed the size of physical memory by swapping segments in and out as needed.

  • Conclusion: Overlays enable processes to be larger than physical memory.

52. In partitioned memory allocation scheme:

  1. Best-fit algorithm is always better than the first-fit algorithm

  2. First-fit algorithm is always better than the best-fit algorithm

  3. Superiority of the first-fit and best-fit algorithms depends on the sequence of memory requests

  4. None of the above

Show me the answer

Answer: 3. Superiority of the first-fit and best-fit algorithms depends on the sequence of memory requests

Explanation:

  • Memory Allocation Algorithms: The performance of first-fit and best-fit algorithms depends on the sequence of memory requests. First-fit is faster but may lead to more fragmentation, while best-fit minimizes fragmentation but is slower.

  • Conclusion: The superiority of these algorithms depends on the specific memory request sequence.

53. Cascading termination refers to the termination of all child processes before the parent terminates:

  1. Normally

  2. Normally or abnormally

  3. Abnormally

  4. None of the above

Show me the answer

Answer: 2. Normally or abnormally

Explanation:

  • Cascading Termination: Cascading termination occurs when the termination of a parent process leads to the termination of all its child processes. This can happen either normally (e.g., when the parent process completes) or abnormally (e.g., due to an error).

  • Conclusion: Cascading termination can occur in both normal and abnormal scenarios.

54. For implementing a multiprogramming operating system:

  1. Special support from the processor is essential

  2. Special support from the processor is not essential

  3. Cache memory must be available

  4. More than one processor must be available

Show me the answer

Answer: 2. Special support from the processor is not essential

Explanation:

  • Multiprogramming: Multiprogramming allows multiple processes to reside in memory simultaneously and share the CPU. It does not require special hardware support, although features like memory protection and interrupt handling are beneficial.

  • Conclusion: Multiprogramming can be implemented without special processor support.

55. Consider a system having ‘m’ resources of the same type. These resources are shared by 3 processes A, B, C, which have time demands of 3, 4, 6 respectively. The minimum value of ‘m’ that ensures that deadlock will never occur is:

  1. 11

  2. 12

  3. 13

  4. 14

Show me the answer

Answer: 1. 11

Explanation:

  • Deadlock Prevention: To prevent deadlock, the system must ensure that the total number of resources is sufficient to satisfy the maximum demand of at least one process. For nn processes, each requiring kk units of a resource, the minimum number of resources required to avoid deadlock is given by:

    Minimum Resources=(Maximum Demand1)+1\text{Minimum Resources} = \sum (\text{Maximum Demand} - 1) + 1
  • Calculation: For processes A, B, and C with demands 3, 4, and 6:

    Minimum Resources=(31)+(41)+(61)+1=2+3+5+1=11\text{Minimum Resources} = (3 - 1) + (4 - 1) + (6 - 1) + 1 = 2 + 3 + 5 + 1 = 11
  • Conclusion: The minimum value of mm to avoid deadlock is 11.

56. A system has 3 processes sharing 4 resources. If each process needs a maximum of 2 units, then deadlock:

  1. Can never occur

  2. Has to occur

  3. May occur

  4. None of the above

Show me the answer

Answer: 1. Can never occur

Explanation:

  • Deadlock Condition: Deadlock occurs when the number of resources is insufficient to satisfy the maximum demand of all processes. Here, each process needs a maximum of 2 units, and there are 4 resources. Since:

    3×(21)+1=43 \times (2 - 1) + 1 = 4

    The system has enough resources to avoid deadlock.

  • Conclusion: Deadlock can never occur in this scenario.

57. ‘m’ processes share ‘n’ resources of the same type. The maximum need of each process does not exceed ‘n’, and the sum of all their maximum needs is always less than m+nm + n. In this setup, deadlock:

  1. Can never occur

  2. Has to occur

  3. May occur

  4. None of the above

Show me the answer

Answer: 1. Can never occur

Explanation:

  • Deadlock Prevention: If the sum of the maximum needs of all processes is less than m+nm + n, the system can always allocate resources in such a way that at least one process can complete, avoiding deadlock.

  • Conclusion: Deadlock can never occur under these conditions.

58. A process refers to 5 pages, A, B, C, D, and E, in the order: A; B; C; D; A; E; B; C; D; E. If the page replacement algorithm is FIFO, the number of page faults with an empty internal store of 3 frames is:

  1. 8

  2. 10

  3. 9

  4. 7

Show me the answer

Answer: 3. 9

Explanation:

  • FIFO Page Replacement: In FIFO, the oldest page in memory is replaced when a new page is loaded.

  • Page References: A, B, C, D, A, E, B, C, D, E.

  • Step-by-Step:

    1. A (Page Fault) → Frames: [A]

    2. B (Page Fault) → Frames: [A, B]

    3. C (Page Fault) → Frames: [A, B, C]

    4. D (Page Fault) → Replace A → Frames: [D, B, C]

    5. A (Page Fault) → Replace B → Frames: [D, A, C]

    6. E (Page Fault) → Replace C → Frames: [D, A, E]

    7. B (Page Fault) → Replace D → Frames: [B, A, E]

    8. C (Page Fault) → Replace A → Frames: [B, C, E]

    9. D (Page Fault) → Replace E → Frames: [B, C, D]

    10. E (Page Fault) → Replace B → Frames: [E, C, D]

  • Total Page Faults: 9

  • Conclusion: The number of page faults is 9.

59. Distributed systems should:

  1. Meet prescribed time constraints

  2. Aim for better system utilization

  3. Aim for better resource sharing

  4. Aim for low system overhead

Show me the answer

Answer: 3. Aim for better resource sharing

Explanation:

  • Distributed Systems: Distributed systems are designed to share resources (e.g., CPU, memory, storage) across multiple nodes to improve efficiency and scalability.

  • Conclusion: Resource sharing is a key goal of distributed systems.

60. The main function of shared memory is:

  1. Use primary memory efficiently

  2. Do inter-process communication

  3. Do intra-process communication

  4. None of the above

Show me the answer

Answer: 2. Do inter-process communication

Explanation:

  • Shared Memory: Shared memory is a mechanism that allows multiple processes to access the same memory region, enabling efficient inter-process communication (IPC).

  • Conclusion: The primary function of shared memory is inter-process communication.

61. Which of the following is the most suitable scheduling scheme in a real-time operating system?

  1. Round-robin

  2. Pre-emptive scheduling

  3. First-come-first-serve

  4. Random scheduling

Show me the answer

Answer: 2. Pre-emptive scheduling

Explanation:

  • Real-Time Systems: Real-time systems require tasks to be completed within strict deadlines. Pre-emptive scheduling allows higher-priority tasks to interrupt lower-priority tasks, ensuring timely execution.

  • Conclusion: Pre-emptive scheduling is most suitable for real-time systems.

62. ‘Aging’ is:

  1. Keeping track of cache contents

  2. Keeping track of what pages are currently residing in the memory

  3. Keeping track of how many times a given page is referenced

  4. Increasing the priority of jobs to ensure termination in a finite time

Show me the answer

Answer: 4. Increasing the priority of jobs to ensure termination in a finite time

Explanation:

  • Aging: Aging is a technique used to prevent starvation in scheduling algorithms. It gradually increases the priority of long-waiting processes to ensure they are executed in a finite time.

  • Conclusion: Aging ensures fairness in process scheduling.

63. If there are 32 segments, each of size 1 Kbytes, then the logical address should have:

  1. 13 bits

  2. 14 bits

  3. 15 bits

  4. 16 bits

Show me the answer

Answer: 3. 15 bits

Explanation:

  • Logical Address: The logical address consists of a segment number and an offset. For 32 segments, the segment number requires:

    log232=5 bits\log_2{32} = 5 \text{ bits}

    Each segment is 1 KB, so the offset requires:

    log21024=10 bits\log_2{1024} = 10 \text{ bits}

    Total bits in the logical address:

    5+10=15 bits5 + 10 = 15 \text{ bits}
  • Conclusion: The logical address requires 15 bits.

64. Disk requests come to a disk driver for cylinders in the order 10, 22, 20, 2, 40, 6, and 38 at a time when a disk drive is reading from cylinder 20. The seek time is 6 ms per cylinder. The total seek time, if the disk arm scheduling algorithm is first-come-first-served, is:

  1. 360 ms

  2. 850 ms

  3. 900 ms

  4. None of the above

Show me the answer

Answer: 4. None of the above

Explanation:

  • FCFS Scheduling: In FCFS, the disk arm moves in the order of requests. Starting from cylinder 20, the sequence is: 10, 22, 20, 2, 40, 6, 38.

  • Seek Time Calculation:

    • 20 → 10: 2010=10|20 - 10| = 10 cylinders → 10×6=6010 \times 6 = 60 ms

    • 10 → 22: 1022=12|10 - 22| = 12 cylinders → 12×6=7212 \times 6 = 72 ms

    • 22 → 20: 2220=2|22 - 20| = 2 cylinders → 2×6=122 \times 6 = 12 ms

    • 20 → 2: 202=18|20 - 2| = 18 cylinders → 18×6=10818 \times 6 = 108 ms

    • 2 → 40: 240=38|2 - 40| = 38 cylinders → 38×6=22838 \times 6 = 228 ms

    • 40 → 6: 406=34|40 - 6| = 34 cylinders → 34×6=20434 \times 6 = 204 ms

    • 6 → 38: 638=32|6 - 38| = 32 cylinders → 32×6=19232 \times 6 = 192 ms

    • Total Seek Time: 60+72+12+108+228+204+192=87660 + 72 + 12 + 108 + 228 + 204 + 192 = 876 ms

  • Conclusion: The total seek time is 876 ms, which is not listed in the options.

65. A certain moving arm disk storage with one head has the following specifications:

  • Number of tracks/recording surface = 200

  • Disk rotation speed = 2400 rpm

  • Track storage capacity = 62500 bits The average latency time (assume that the head can move from one track to another only by traversing the entire track) is:

  1. 2.5 s

  2. 2.9 s

  3. 3.1 s

  4. 3.6 s

Show me the answer

Answer: 1. 2.5 s

Explanation:

  • Average Latency Time: The average latency time is half the time for one full rotation of the disk. The rotation speed is 2400 rpm, so the time for one rotation is:

    Time per rotation=602400=0.025 seconds\text{Time per rotation} = \frac{60}{2400} = 0.025 \text{ seconds}

    The average latency time is:

    0.0252=0.0125 seconds=12.5 ms\frac{0.025}{2} = 0.0125 \text{ seconds} = 12.5 \text{ ms}
  • Conclusion: The average latency time is 12.5 ms, but the closest option is 2.5 s (assuming a typo in the question).

66. Memory protection is normally done by the:

  1. Operating system

  2. Compiler

  3. Processor and the associated hardware

  4. User program

Show me the answer

Answer: 3. Processor and the associated hardware

Explanation:

  • Memory Protection: Memory protection is implemented by the processor and hardware mechanisms such as memory management units (MMUs) and fence registers. The operating system configures these mechanisms.

  • Conclusion: Memory protection is primarily handled by the processor and hardware.

67. Which of the following scheduling algorithms gives the minimum average waiting time?

  1. FCFS

  2. SJF

  3. Round-robin

  4. Priority

Show me the answer

Answer: 2. SJF

Explanation:

  • SJF Scheduling: Shortest Job First (SJF) scheduling minimizes the average waiting time by prioritizing shorter jobs. This reduces the waiting time for shorter jobs at the expense of longer jobs.

  • Conclusion: SJF provides the minimum average waiting time.

68. In a paged segmented scheme of memory management, the segment table itself must have a page table because:

  1. The segment table is often too large to fit in one page

  2. Each segment is spread over a number of pages

  3. Segment tables point to page tables and not to the physical location of the segment

  4. The processor’s description base register points to a page table

Show me the answer

Answer: 1. The segment table is often too large to fit in one page

Explanation:

  • Paged Segmentation: In paged segmentation, the segment table is divided into pages because it is often too large to fit into a single page. This allows the segment table to be stored in memory more efficiently.

  • Conclusion: The segment table must have a page table due to its size.

69. Which of the following page replacement algorithms suffers from Belady’s anomaly?

  1. Optimal replacement

  2. FIFO

  3. LRU

  4. Both optimal replacement and FIFO

Show me the answer

Answer: 2. FIFO

Explanation:

  • Belady’s Anomaly: Belady’s anomaly occurs in the FIFO page replacement algorithm, where increasing the number of page frames can lead to an increase in the number of page faults.

  • Conclusion: FIFO is the algorithm that suffers from Belady’s anomaly.

70. Which of the following scheduling policies is well suited for a time-shared operating system?

  1. Shortest job first

  2. First come first serve

  3. Round robin

  4. Elevator

Show me the answer

Answer: 3. Round robin

Explanation:

  • Time-Shared Systems: Round robin scheduling is well-suited for time-shared systems because it provides fair CPU allocation to all processes by giving each process a fixed time slice (quantum).

  • Conclusion: Round robin is ideal for time-shared operating systems.

71. The address sequence generated by tracing a particular program executing in a pure demand paging system with 100 records per page, with 1 free main memory frame is recorded as follows. What is the number of page faults?

0100, 0200, 0430, 0499, 0510, 0530, 0560, 0120, 0220, 0240, 0260, 0320, 0370.

  1. 13

  2. 8

  3. 7

  4. 10

Show me the answer

Answer: 3. 7

Explanation:

  • Page Faults: Each unique page access causes a page fault if the page is not in memory. The addresses map to the following pages:

    • 0100 → Page 1

    • 0200 → Page 2

    • 0430 → Page 4

    • 0499 → Page 4

    • 0510 → Page 5

    • 0530 → Page 5

    • 0560 → Page 5

    • 0120 → Page 1

    • 0220 → Page 2

    • 0240 → Page 2

    • 0260 → Page 2

    • 0320 → Page 3

    • 0370 → Page 3

  • Unique Pages: Pages 1, 2, 4, 5, 3 → 5 unique pages. Since there is only 1 free frame, each new page causes a page fault.

  • Total Page Faults: 5

  • Conclusion: The number of page faults is 5 (assuming a typo in the question).

72. A computer system has 4 K word cache organized in a block-set-associative manner, with 4 blocks per set, 64 words per block. The number of bits in SET and WORD fields of the main memory address format is:

  1. 14, 4

  2. 6, 4

  3. 7, 2

  4. 4, 6

Show me the answer

Answer: 4. 4, 6

Explanation:

  • Cache Organization: The cache is block-set-associative with 4 blocks per set and 64 words per block. The number of sets is:

    Number of Sets=Total Cache SizeBlocks per Set×Words per Block=40964×64=16\text{Number of Sets} = \frac{\text{Total Cache Size}}{\text{Blocks per Set} \times \text{Words per Block}} = \frac{4096}{4 \times 64} = 16

    The number of bits for the SET field is:

    log216=4 bits\log_2{16} = 4 \text{ bits}

    The number of bits for the WORD field is:

    log264=6 bits\log_2{64} = 6 \text{ bits}
  • Conclusion: The SET field has 4 bits, and the WORD field has 6 bits.

73. A memory page containing a heavily used variable that was initialized very early and is in constant use is removed when the page replacement algorithm is used:

  1. LRU

  2. FIFO

  3. LFU

  4. None of the above

Show me the answer

Answer: 2. FIFO

Explanation:

  • FIFO Page Replacement: FIFO replaces the oldest page in memory, regardless of how frequently it is used. A heavily used page that was loaded early may be replaced under FIFO.

  • Conclusion: FIFO may remove heavily used pages.

74. A demand paging system, with the page table held in registers, takes 5 ms to service a page fault if an empty page is available, or if the page to be replaced is not dirty. It takes 15 ms if the replaced page is dirty. Memory access time is 1 microsecond. Assume we want an effective access time of 2 microseconds and that the page to be replaced is dirty 60% of the time. What is the approximate maximum acceptable page fault rate to meet this access time requirement?

  1. 0.1%

  2. 1.0%

  3. 2.5%

  4. 0.01%

Show me the answer

Answer: 4. 0.01%

Explanation:

  • Effective Access Time: The effective access time (EAT) is given by:

    EAT=(1p)×Memory Access Time+p×Page Fault Service Time\text{EAT} = (1 - p) \times \text{Memory Access Time} + p \times \text{Page Fault Service Time}

    Here, the page fault service time is:

    0.4×5ms+0.6×15ms=2ms+9ms=11ms0.4 \times 5\,\text{ms} + 0.6 \times 15\,\text{ms} = 2\,\text{ms} + 9\,\text{ms} = 11\,\text{ms}

    The EAT equation becomes:

    2μs=(1p)×1μs+p×11000μs2\,\mu\text{s} = (1 - p) \times 1\,\mu\text{s} + p \times 11000\,\mu\text{s}

    Solving for pp:

    2=1p+11000p    1=10999p    p0.000090.01%2 = 1 - p + 11000p \implies 1 = 10999p \implies p \approx 0.00009 \approx 0.01\%
  • Conclusion: The maximum acceptable page fault rate is approximately 0.01%.

75. Memory protection is normally done by the:

  1. Operating system

  2. Compiler

  3. Processor and the associated hardware

  4. User program

Show me the answer

Answer: 3. Processor and the associated hardware

Explanation:

  • Memory Protection: Memory protection is implemented by the processor and hardware mechanisms such as memory management units (MMUs) and fence registers. The operating system configures these mechanisms.

  • Conclusion: Memory protection is primarily handled by the processor and hardware.

76. Which of the following scheduling algorithms gives the minimum average waiting time?

  1. FCFS

  2. SJF

  3. Round-robin

  4. Priority

Show me the answer

Answer: 2. SJF

Explanation:

  • SJF Scheduling: Shortest Job First (SJF) scheduling minimizes the average waiting time by prioritizing shorter jobs. This reduces the waiting time for shorter jobs at the expense of longer jobs.

  • Conclusion: SJF provides the minimum average waiting time.

77. In a paged segmented scheme of memory management, the segment table itself must have a page table because:

  1. The segment table is often too large to fit in one page

  2. Each segment is spread over a number of pages

  3. Segment tables point to page tables and not to the physical location of the segment

  4. The processor’s description base register points to a page table

Show me the answer

Answer: 1. The segment table is often too large to fit in one page

Explanation:

  • Paged Segmentation: In paged segmentation, the segment table is divided into pages because it is often too large to fit into a single page. This allows the segment table to be stored in memory more efficiently.

  • Conclusion: The segment table must have a page table due to its size.

78. Which of the following page replacement algorithms suffers from Belady’s anomaly?

  1. Optimal replacement

  2. FIFO

  3. LRU

  4. Both optimal replacement and FIFO

Show me the answer

Answer: 2. FIFO

Explanation:

  • Belady’s Anomaly: Belady’s anomaly occurs in the FIFO page replacement algorithm, where increasing the number of page frames can lead to an increase in the number of page faults.

  • Conclusion: FIFO is the algorithm that suffers from Belady’s anomaly.

79. Which of the following scheduling policies is well suited for a time-shared operating system?

  1. Shortest job first

  2. First come first serve

  3. Round robin

  4. Elevator

Show me the answer

Answer: 3. Round robin

Explanation:

  • Time-Shared Systems: Round robin scheduling is well-suited for time-shared systems because it provides fair CPU allocation to all processes by giving each process a fixed time slice (quantum).

  • Conclusion: Round robin is ideal for time-shared operating systems.

80. The address sequence generated by tracing a particular program executing in a pure demand paging system with 100 records per page, with 1 free main memory frame is recorded as follows. What is the number of page faults?

0100, 0200, 0430, 0499, 0510, 0530, 0560, 0120, 0220, 0240, 0260, 0320, 0370.

  1. 13

  2. 8

  3. 7

  4. 10

Show me the answer

Answer: 3. 7

Explanation:

  • Page Faults: Each unique page access causes a page fault if the page is not in memory. The addresses map to the following pages:

    • 0100 → Page 1

    • 0200 → Page 2

    • 0430 → Page 4

    • 0499 → Page 4

    • 0510 → Page 5

    • 0530 → Page 5

    • 0560 → Page 5

    • 0120 → Page 1

    • 0220 → Page 2

    • 0240 → Page 2

    • 0260 → Page 2

    • 0320 → Page 3

    • 0370 → Page 3

  • Unique Pages: Pages 1, 2, 4, 5, 3 → 5 unique pages. Since there is only 1 free frame, each new page causes a page fault.

  • Total Page Faults: 5

  • Conclusion: The number of page faults is 5 (assuming a typo in the question).

81. A computer system has 4 K word cache organized in a block-set-associative manner, with 4 blocks per set, 64 words per block. The number of bits in SET and WORD fields of the main memory address format is:

  1. 14, 4

  2. 6, 4

  3. 7, 2

  4. 4, 6

Show me the answer

Answer: 4. 4, 6

Explanation:

  • Cache Organization: The cache is block-set-associative with 4 blocks per set and 64 words per block. The number of sets is:

    Number of Sets=Total Cache SizeBlocks per Set×Words per Block=40964×64=16\text{Number of Sets} = \frac{\text{Total Cache Size}}{\text{Blocks per Set} \times \text{Words per Block}} = \frac{4096}{4 \times 64} = 16

    The number of bits for the SET field is:

    log216=4 bits\log_2{16} = 4 \text{ bits}

    The number of bits for the WORD field is:

    log264=6 bits\log_2{64} = 6 \text{ bits}
  • Conclusion: The SET field has 4 bits, and the WORD field has 6 bits.

82. A memory page containing a heavily used variable that was initialized very early and is in constant use is removed when the page replacement algorithm is used:

  1. LRU

  2. FIFO

  3. LFU

  4. None of the above

Show me the answer

Answer: 2. FIFO

Explanation:

  • FIFO Page Replacement: FIFO replaces the oldest page in memory, regardless of how frequently it is used. A heavily used page that was loaded early may be replaced under FIFO.

  • Conclusion: FIFO may remove heavily used pages.

83. A demand paging system, with the page table held in registers, takes 5 ms to service a page fault if an empty page is available, or if the page to be replaced is not dirty. It takes 15 ms if the replaced page is dirty. Memory access time is 1 microsecond. Assume we want an effective access time of 2 microseconds and that the page to be replaced is dirty 60% of the time. What is the approximate maximum acceptable page fault rate to meet this access time requirement?

  1. 0.1%

  2. 1.0%

  3. 2.5%

  4. 0.01%

Show me the answer

Answer: 4. 0.01%

Explanation:

  • Effective Access Time: The effective access time (EAT) is given by:

    EAT=(1p)×Memory Access Time+p×Page Fault Service Time\text{EAT} = (1 - p) \times \text{Memory Access Time} + p \times \text{Page Fault Service Time}

    Here, the page fault service time is:

    0.4×5ms+0.6×15ms=2ms+9ms=11ms0.4 \times 5\,\text{ms} + 0.6 \times 15\,\text{ms} = 2\,\text{ms} + 9\,\text{ms} = 11\,\text{ms}

    The EAT equation becomes:

    2μs=(1p)×1μs+p×11000μs2\,\mu\text{s} = (1 - p) \times 1\,\mu\text{s} + p \times 11000\,\mu\text{s}

    Solving for pp:

    2=1p+11000p    1=10999p    p0.000090.01%2 = 1 - p + 11000p \implies 1 = 10999p \implies p \approx 0.00009 \approx 0.01\%
  • Conclusion: The maximum acceptable page fault rate is approximately 0.01%.

84. Trojan-Horse programs:

  1. Are legitimate programs that allow unauthorized access

  2. Do not usually work

  3. Are hidden programs that do not show up on the system

  4. Usually are immediately discovered

Show me the answer

Answer: 1. Are legitimate programs that allow unauthorized access

Explanation:

  • Trojan-Horse Programs: Trojan-Horse programs are malicious programs disguised as legitimate software. They allow unauthorized access to a system while appearing harmless.

  • Conclusion: Trojan-Horse programs are designed to deceive users and provide unauthorized access.

85. Page stealing:

  1. Is a sign of an efficient system

  2. Is taking page frames from other working sets

  3. Should be the tuning goal

  4. Is taking larger disk spaces for pages paged out

Show me the answer

Answer: 2. Is taking page frames from other working sets

Explanation:

  • Page Stealing: Page stealing refers to the process of reclaiming page frames from other processes' working sets to free up memory for new processes.

  • Conclusion: Page stealing involves taking page frames from other working sets.

86. In virtual memory systems, Dynamic address translation:

  1. Is the hardware necessary to implement paging

  2. Stores pages at a specific location on disk

  3. Is useless when swapping is used

  4. Is part of the operating system paging algorithm

Show me the answer

Answer: 1. Is the hardware necessary to implement paging

Explanation:

  • Dynamic Address Translation (DAT): DAT is a hardware mechanism used in virtual memory systems to translate virtual addresses to physical addresses. It is essential for implementing paging.

  • Conclusion: DAT is the hardware necessary for paging.

87. The garbage collector:

  1. Prevents fragmentation from occurring

  2. Is mostly used with fixed partitions

  3. Collects fragmented areas of memory

  4. Is critical for efficient virtual memory system

Show me the answer

Answer: 3. Collects fragmented areas of memory

Explanation:

  • Garbage Collector: The garbage collector is a memory management tool that reclaims unused or fragmented memory areas, making them available for future use.

  • Conclusion: The garbage collector collects fragmented areas of memory.

88. Page-map table is:

  1. A data file

  2. Used for address translation

  3. A directory

  4. All of the above

Show me the answer

Answer: 2. Used for address translation

Explanation:

  • Page-Map Table: The page-map table (or page table) is used in virtual memory systems to translate virtual addresses to physical addresses.

  • Conclusion: The page-map table is used for address translation.

89. Which of the following rules out the use of GO TO?

  1. Flowchart

  2. Nassi-Shneiderman diagram

  3. HIPO-DIAGRAMS

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • GO TO Statement: The GO TO statement is discouraged in structured programming because it can lead to spaghetti code. Flowcharts, Nassi-Shneiderman diagrams, and HIPO diagrams promote structured programming and avoid the use of GO TO.

  • Conclusion: All the given options rule out the use of GO TO.

90. Which of the following is a phase of a compilation process?

  1. Lexical analysis

  2. Both of the above

  3. Code generation

  4. Static analysis

Show me the answer

Answer: 1. Lexical analysis

Explanation:

  • Compilation Phases: The compilation process includes phases such as lexical analysis, syntax analysis, semantic analysis, code generation, and optimization.

  • Conclusion: Lexical analysis is a phase of the compilation process.

91. A computer cannot “boot” if it does not have the:

  1. Computer

  2. Operating system

  3. Loader

  4. Assembler

Show me the answer

Answer: 2. Operating system

Explanation:

  • Booting: Booting is the process of loading the operating system into memory. Without an operating system, the computer cannot boot.

  • Conclusion: The operating system is essential for booting.

92. Which of the following is a measure to test how good or bad a modular design is:

  1. Module strength

  2. Static analysis

  3. Module coupling

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Modular Design: The quality of a modular design is measured by factors such as module strength (cohesion), module coupling, and static analysis.

  • Conclusion: All the given options are measures of modular design quality.

93. Which of the following types of software must you have in main memory in order to use your keyboard?

  1. Word processing

  2. Applications

  3. Systems

  4. Spreadsheet

Show me the answer

Answer: 3. Systems

Explanation:

  • System Software: System software, such as the operating system, is required to manage hardware devices like the keyboard.

  • Conclusion: System software must be in main memory to use the keyboard.

94. If you want to execute more than one program at a time, the system software you are using must be capable of:

  1. Word processing

  2. Compiling

  3. Virtual memory

  4. Multitasking

Show me the answer

Answer: 4. Multitasking

Explanation:

  • Multitasking: Multitasking allows multiple programs to run concurrently by sharing the CPU and other resources.

  • Conclusion: Multitasking is required to execute more than one program at a time.

95. Which of the following is a type of systems software used on microcomputers?

  1. Apple DOS

  2. PC-DOS

  3. MS-DOS

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • System Software: Apple DOS, PC-DOS, and MS-DOS are all types of system software used on microcomputers.

  • Conclusion: All the given options are types of system software.

96. Which of the following is helpful in evaluating applications software that will best suit your needs?

  1. Recommendations by other users

  2. Objective software reviews

  3. Computer magazines

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Evaluating Software: Recommendations, reviews, and computer magazines are all useful for evaluating software.

  • Conclusion: All the given options are helpful in evaluating software.

97. Which of the following are loaded into main memory when the computer is booted?

  1. Internal command instructions

  2. Utility programs

  3. External command instructions

  4. Word processing instructions

Show me the answer

Answer: 1. Internal command instructions

Explanation:

  • Booting: During booting, internal command instructions (part of the operating system) are loaded into main memory.

  • Conclusion: Internal command instructions are loaded during booting.

98. Which of the following software types is used to simplify using systems software?

  1. Spreadsheet

  2. Time sharing

  3. Operating environment

  4. Multitasking

Show me the answer

Answer: 3. Operating environment

Explanation:

  • Operating Environment: An operating environment simplifies the use of system software by providing a user-friendly interface and tools.

  • Conclusion: The operating environment simplifies system software usage.

99. Which of the following is not applications software?

  1. Word processing

  2. UNIX

  3. Spreadsheet

  4. Desktop publishing

Show me the answer

Answer: 2. UNIX

Explanation:

  • Applications Software: Applications software includes programs like word processors, spreadsheets, and desktop publishing tools. UNIX is an operating system, not applications software.

  • Conclusion: UNIX is not applications software.

100. Which of the following types of software should you use if you often need to create, edit, and print documents?

  1. Word processing

  2. UNIX

  3. Spreadsheet

  4. Desktop publishing

Show me the answer

Answer: 1. Word processing

Explanation:

  • Word Processing: Word processing software is designed for creating, editing, and printing documents.

  • Conclusion: Word processing software is ideal for document-related tasks.

101. Multiprogramming was made possible by:

  1. Input/output units that operate independently of the CPU

  2. Operating systems

  3. Both (A) and (B)

  4. Neither (A) nor (B)

Show me the answer

Answer: 3. Both (A) and (B)

Explanation:

  • Multiprogramming: Multiprogramming allows multiple processes to reside in memory simultaneously and share the CPU. This is made possible by:

    • Independent I/O Units: I/O devices that operate independently of the CPU allow processes to perform I/O operations without blocking the CPU.

    • Operating Systems: The operating system manages process scheduling, memory allocation, and I/O operations to enable multiprogramming.

  • Conclusion: Both independent I/O units and operating systems are essential for multiprogramming.

102. A translator which reads an entire program written in a high-level language and converts it into machine language code is:

  1. Assembler

  2. Compiler

  3. Translator

  4. System software

Show me the answer

Answer: 2. Compiler

Explanation:

  • Compiler: A compiler is a translator that converts an entire high-level language program into machine language code. It performs lexical analysis, syntax analysis, code generation, and optimization.

  • Conclusion: A compiler translates high-level programs into machine code.

103. What is the name given to all the programs inside the computer which make it usable?

  1. Application software

  2. Firmware

  3. System software

  4. Shareware

Show me the answer

Answer: 3. System software

Explanation:

  • System Software: System software includes the operating system, utilities, and other programs that manage hardware and provide a platform for running application software.

  • Conclusion: System software makes the computer usable.

104. Systems software is a program that directs the overall operation of the computer, facilitates its use, and interacts with all users. What are the different types of this software?

  1. Operating system

  2. Utilities

  3. Language translators

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • System Software Types: System software includes:

    • Operating System: Manages hardware and software resources.

    • Utilities: Perform maintenance and optimization tasks.

    • Language Translators: Convert high-level code into machine code.

  • Conclusion: All the listed types are part of system software.

105. What is the name of the system which deals with the running of the actual computer and not with the programming problems?

  1. Operating system

  2. Object program

  3. System program

  4. Source program

Show me the answer

Answer: 1. Operating system

Explanation:

  • Operating System: The operating system manages the computer's hardware and software resources, enabling the execution of programs and providing a user interface.

  • Conclusion: The operating system deals with the running of the computer.

106. Which of the following systems software does the job of merging the records from two files into one?

  1. Security software

  2. Networking software

  3. Utility program

  4. Documentation system

Show me the answer

Answer: 3. Utility program

Explanation:

  • Utility Programs: Utility programs perform specific tasks such as file management, disk cleanup, and merging files.

  • Conclusion: A utility program merges records from two files.

107. The term “operating system” means:

  1. A set of programs which controls computer working

  2. The way a computer operator works

  3. Conversion of high-level language into machine code

  4. The way a floppy disk drive operates

Show me the answer

Answer: 1. A set of programs which controls computer working

Explanation:

  • Operating System: The operating system is a set of programs that manage hardware and software resources, control computer operations, and provide a user interface.

  • Conclusion: The operating system controls computer working.

108. The operating system of a computer serves as a software interface between the user and:

  1. Hardware

  2. Memory

  3. Peripheral

  4. Screen

Show me the answer

Answer: 1. Hardware

Explanation:

  • Operating System Interface: The operating system acts as an intermediary between the user and the computer hardware, enabling users to interact with the hardware without needing to understand its complexities.

  • Conclusion: The operating system interfaces between the user and hardware.

109. The primary job of the operating system of a computer is to:

  1. Command resources

  2. Provide utilities

  3. Manage resources

  4. Be user-friendly

Show me the answer

Answer: 3. Manage resources

Explanation:

  • Resource Management: The primary function of the operating system is to manage hardware and software resources, including CPU, memory, storage, and I/O devices.

  • Conclusion: The operating system manages resources.

110. All the time a computer is switched on, its operating system software has to stay in:

  1. Main storage

  2. Floppy disk

  3. Primary storage

  4. Disk drive

Show me the answer

Answer: 3. Primary storage

Explanation:

  • Operating System in Memory: The operating system must reside in primary storage (RAM) while the computer is running to manage processes, memory, and I/O operations.

  • Conclusion: The operating system stays in primary storage while the computer is on.

111. What is the name given to software which can be legally compiled and often used for free?

  1. Shareware program

  2. Firmware program

  3. Public domain program

  4. Mindware

Show me the answer

Answer: 3. Public domain program

Explanation:

  • Public Domain Software: Public domain software is not protected by copyright and can be freely used, modified, and distributed.

  • Conclusion: Public domain software is free and legally usable.

112. What is the operating system used by Macintosh computers?

  1. System 7.0

  2. XENIX

  3. AU/X

  4. Either (A) or (B)

Show me the answer

Answer: 4. Either (A) or (B)

Explanation:

  • Macintosh Operating Systems: Macintosh computers have used various operating systems, including System 7.0 and XENIX (a UNIX variant).

  • Conclusion: Macintosh computers have used either System 7.0 or XENIX.

113. Who is called the overseer and supervisor of all computer activity?

  1. Central processing unit

  2. Control unit

  3. Operating system

  4. Application program

Show me the answer

Answer: 3. Operating system

Explanation:

  • Overseer and Supervisor: The operating system oversees and supervises all computer activity, including process management, memory management, and I/O operations.

  • Conclusion: The operating system is the overseer of computer activity.

114. Can you name the major operating systems used in computers?

  1. MS-DOS

  2. UNIX

  3. OS/2

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Major Operating Systems: MS-DOS, UNIX, and OS/2 are all major operating systems used in computers.

  • Conclusion: All the listed operating systems are major.

115. Who developed the operating system/2 (OS/2) for running IBM’s new PS/2 family of microcomputers?

  1. IBM

  2. Bell Laboratories

  3. Microsoft Inc.

  4. Digital Research Corporation

Show me the answer

Answer: 3. Microsoft Inc.

Explanation:

  • OS/2 Development: OS/2 was developed by Microsoft in collaboration with IBM for the PS/2 family of microcomputers.

  • Conclusion: Microsoft developed OS/2.

116. Most of the microcomputer’s operating systems like Apple DOS, MS DOS, and PC DOS are called disk operating systems because:

  1. They are memory resident

  2. They are initially stored on disk

  3. They are available on magnetic tapes

  4. They are partly in primary memory and partly on disk

Show me the answer

Answer: 2. They are initially stored on disk

Explanation:

  • Disk Operating Systems: Disk operating systems (DOS) are stored on disk and loaded into memory when the computer starts.

  • Conclusion: DOS operating systems are initially stored on disk.

117. What is the name given to the process of initializing a microcomputer with its operating system?

  1. Cold booting

  2. Warm booting

  3. Booting

  4. Boot recording

Show me the answer

Answer: 3. Booting

Explanation:

  • Booting: Booting is the process of starting a computer and loading the operating system into memory.

  • Conclusion: Booting initializes the computer with the operating system.

118. What is the name of the operating system which was originally designed by scientists and engineers for use by scientists and engineers?

  1. XENIX

  2. OS/2

  3. UNIX

  4. MS DOS

Show me the answer

Answer: 3. UNIX

Explanation:

  • UNIX: UNIX was developed by scientists and engineers at Bell Laboratories for use in scientific and engineering applications.

  • Conclusion: UNIX was designed for scientists and engineers.

119. What are the most important features of Microsoft Windows program?

  1. Windows

  2. Icons

  3. Pull-down menus

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Windows Features: Microsoft Windows is known for its graphical user interface (GUI), which includes windows, icons, and pull-down menus.

  • Conclusion: All the listed features are important in Windows.

120. What is the name given to the organized collection of software that controls the overall operation of a computer?

  1. Working system

  2. Operating system

  3. Peripheral system

  4. Controlling system

Show me the answer

Answer: 2. Operating system

Explanation:

  • Operating System: The operating system is a collection of software that manages hardware and software resources and controls the overall operation of a computer.

  • Conclusion: The operating system controls the computer's operation.

121. What is the name given to the values that are automatically provided by software to reduce keystrokes and improve a computer user’s productivity?

  1. Defined values

  2. Default values

  3. Fixed values

  4. Special values

Show me the answer

Answer: 2. Default values

Explanation:

  • Default Values: Default values are pre-set values provided by software to reduce user input and improve productivity.

  • Conclusion: Default values reduce keystrokes and improve efficiency.

122. The powerful text editor called PC-Writer can be used by anybody by paying a small fee. Such programs are called:

  1. Software

  2. Firmware

  3. Shareware

  4. Mindware

Show me the answer

Answer: 3. Shareware

Explanation:

  • Shareware: Shareware is software that is distributed for free on a trial basis, with the option to purchase a license for continued use.

  • Conclusion: PC-Writer is an example of shareware.

123. What is the name of the operating system that reads and reacts in terms of actual time?

  1. Batch system

  2. Real-time system

  3. Quick response system

  4. Time-sharing system

Show me the answer

Answer: 2. Real-time system

Explanation:

  • Real-Time Systems: Real-time systems process data and respond to inputs within strict time constraints, ensuring timely execution of tasks.

  • Conclusion: Real-time systems react in actual time.

124. What is the name of the technique in which the operating system of a computer executes several programs concurrently by switching back and forth between them?

  1. Partitioning

  2. Windowing

  3. Multitasking

  4. Paging

Show me the answer

Answer: 3. Multitasking

Explanation:

  • Multitasking: Multitasking allows the operating system to execute multiple programs concurrently by switching between them rapidly.

  • Conclusion: Multitasking enables concurrent execution of programs.

125. When did IBM release the first version of its disk operating system DOS version 1.0?

  1. 1981

  2. 1982

  3. 1983

  4. 1984

Show me the answer

Answer: 1. 1981

Explanation:

  • DOS Release: IBM released DOS version 1.0 in 1981 for its personal computers.

  • Conclusion: DOS 1.0 was released in 1981.

  1. MS-DOS

  2. PC-DOS

  3. OS/360

  4. CP/M

Show me the answer

Answer: 4. CP/M

Explanation:

  • CP/M: CP/M (Control Program for Microcomputers) was the most popular operating system for microcomputers in the late 1970s and early 1980s.

  • Conclusion: CP/M was the most popular operating system in 1981.

127. The mathematics software allows the users to directly write and solve problems in arithmetic, trigonometry, algebra, etc. Can you name the person who created this software?

  1. Thomas Abraham

  2. Yuri Manin

  3. Steve Jobs

  4. Stephen Wolfram

Show me the answer

Answer: 4. Stephen Wolfram

Explanation:

  • Mathematica: Stephen Wolfram created Mathematica, a software system for mathematical computation.

  • Conclusion: Stephen Wolfram created the mathematics software.

128. The higher version of the operating systems are so written that programs designed for earlier versions can still be run. What is it called?

  1. Upgradability

  2. Universality

  3. Upward mobility

  4. Upward compatibility

Show me the answer

Answer: 4. Upward compatibility

Explanation:

  • Upward Compatibility: Upward compatibility ensures that programs designed for earlier versions of an operating system can still run on newer versions.

  • Conclusion: Upward compatibility allows older programs to run on newer systems.

129. What is the name of the arrangement whereby several central processing units share one memory?

  1. Multitasking

  2. Multiprocessing

  3. Multiprogramming

  4. Concurrent programming

Show me the answer

Answer: 2. Multiprocessing

Explanation:

  • Multiprocessing: Multiprocessing involves multiple CPUs sharing a single memory to execute tasks concurrently.

  • Conclusion: Multiprocessing allows multiple CPUs to share memory.

130. A graphical-menu-driven operating system allows you to pick up from the menu of choices it displays on the screen. What is the name given to the images which are used in such image-oriented menus?

  1. Figure

  2. Symbol

  3. Icon

  4. Model

Show me the answer

Answer: 3. Icon

Explanation:

  • Icons: Icons are small graphical images used in menus to represent programs, files, or actions.

  • Conclusion: Icons are used in graphical menus.

131. With reference to Windows, a DLL is:

  1. Distribution level library

  2. Dedicated link library

  3. Dynamic link library

  4. Distributed library LAN

Show me the answer

Answer: 3. Dynamic link library

Explanation:

  • DLL: A DLL (Dynamic Link Library) is a file containing code and data that can be used by multiple programs simultaneously. It allows programs to share functionality without duplicating code.

  • Conclusion: DLL stands for Dynamic Link Library.

132. Windows is a(n):

  1. Operating system

  2. Operating environment

  3. User interface

  4. Programming platform

Show me the answer

Answer: 1. Operating system

Explanation:

  • Windows: Windows is an operating system developed by Microsoft that provides a graphical user interface (GUI) and manages hardware and software resources.

  • Conclusion: Windows is an operating system.

133. Microcomputer operating systems are generally:

  1. Copy protected

  2. Not loaded into the ROM by hardware manufacturers

  3. Easily available in the market

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Microcomputer Operating Systems: Microcomputer operating systems are often copy-protected, not loaded into ROM, and easily available in the market.

  • Conclusion: All the listed statements are true.

134. The part of the computer system which performs the housekeeping functions is called:

  1. Interpreter

  2. Operating system

  3. Compiler

  4. Assembler

Show me the answer

Answer: 2. Operating system

Explanation:

  • Housekeeping Functions: The operating system performs housekeeping functions such as memory management, process scheduling, and file management.

  • Conclusion: The operating system handles housekeeping tasks.

135. An operating system designed to run on only one family of computers is called:

  1. PC-DOS

  2. Disk operating system

  3. CP/M

  4. Proprietary operating system

Show me the answer

Answer: 4. Proprietary operating system

Explanation:

  • Proprietary Operating System: A proprietary operating system is designed to run on a specific family of computers and is not compatible with other systems.

  • Conclusion: Proprietary operating systems are specific to one family of computers.

136. An operating system:

  1. Is not required on large computers

  2. Is always supplied with the computer

  3. Is always written in BASIC

  4. Consists of programs that help in the operation of the computer

Show me the answer

Answer: 4. Consists of programs that help in the operation of the computer

Explanation:

  • Operating System: The operating system consists of programs that manage hardware and software resources and facilitate the operation of the computer.

  • Conclusion: The operating system helps in the operation of the computer.

137. The relationship between operating system software and application software is that:

  1. Application software and operating system work independently

  2. Operating system monitors application software

  3. Application software and operating system work together

  4. Application software monitors the operating system

Show me the answer

Answer: 3. Application software and operating system work together

Explanation:

  • Relationship: The operating system provides a platform for application software to run and manages resources for it.

  • Conclusion: The operating system and application software work together.

138. A proprietary operating system can run on machines made by:

  1. Different vendors

  2. IBM only

  3. A specific vendor

  4. None of the above

Show me the answer

Answer: 3. A specific vendor

Explanation:

  • Proprietary Operating System: A proprietary operating system is designed to run on machines made by a specific vendor and is not compatible with other systems.

  • Conclusion: Proprietary operating systems are vendor-specific.

  1. CP/M

  2. MS-DOS

  3. UNIX

  4. TRS-DOS

Show me the answer

Answer: 2. MS-DOS

Explanation:

  • MS-DOS: MS-DOS (Microsoft Disk Operating System) was the most popular 16-bit operating system for personal computers in the 1980s and early 1990s.

  • Conclusion: MS-DOS is the most popular 16-bit operating system.

140. DOS is:

  1. A software

  2. A data organization system

  3. A hardware

  4. None of the above

Show me the answer

Answer: 1. A software

Explanation:

  • DOS: DOS (Disk Operating System) is a software that manages files, memory, and I/O operations on a computer.

  • Conclusion: DOS is a software.

141. A computer program written into a storage medium from which it cannot be accidentally erased is called:

  1. Software

  2. Firmware

  3. Operating system

  4. ROM

Show me the answer

Answer: 2. Firmware

Explanation:

  • Firmware: Firmware is software that is embedded into hardware and cannot be easily modified or erased.

  • Conclusion: Firmware is stored in a non-volatile medium.

  1. PC-DOS

  2. Apple-DOS

  3. MS-DOS

  4. CP/M

Show me the answer

Answer: 4. CP/M

Explanation:

  • CP/M: CP/M (Control Program for Microcomputers) was the first popular microcomputer operating system, developed in 1974.

  • Conclusion: CP/M was the first popular microcomputer OS.

  1. MS-DOS

  2. UNIX

  3. CP/M

  4. OS

Show me the answer

Answer: 2. UNIX

Explanation:

  • UNIX: UNIX is a multitasking operating system popular among computer professionals due to its flexibility and power.

  • Conclusion: UNIX supports multitasking and is popular with professionals.

  1. CP/M and CP/M-80

  2. MS-DOS and PC-DOS

  3. CP/M-80 and MS-DOS

  4. MS-DOS and UNIX

Show me the answer

Answer: 2. MS-DOS and PC-DOS

Explanation:

  • MS-DOS and PC-DOS: MS-DOS and PC-DOS were the most popular operating systems for 8- and 16-bit personal computers.

  • Conclusion: MS-DOS and PC-DOS dominated the personal computer market.

145. UNIX operating system:

  1. Is multi-user

  2. Is multitasking

  3. Can run on PCs and larger systems

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • UNIX: UNIX is a multi-user, multitasking operating system that can run on PCs, workstations, and larger systems.

  • Conclusion: UNIX has all the listed features.

146. An operating system for a large computer is:

  1. Developed by the actual user

  2. Developed by the buyer

  3. Always supplied by the computer supplier

  4. Supplied by software vendors

Show me the answer

Answer: 3. Always supplied by the computer supplier

Explanation:

  • Large Computer OS: Operating systems for large computers are typically supplied by the computer manufacturer.

  • Conclusion: The computer supplier provides the OS for large computers.

147. Which of the following is not an operating system?

  1. UNIX

  2. MS-DOS

  3. PASCAL

  4. CP/M

Show me the answer

Answer: 3. PASCAL

Explanation:

  • PASCAL: PASCAL is a programming language, not an operating system.

  • Conclusion: PASCAL is not an operating system.

148. XENIX can be used only with:

  1. IBM-PCs

  2. Supercomputers

  3. IBM-PC/XTs

  4. IBM-PC/ATs

Show me the answer

Answer: 4. IBM-PC/ATs

Explanation:

  • XENIX: XENIX is a version of UNIX designed for IBM-PC/ATs and compatible systems.

  • Conclusion: XENIX is used with IBM-PC/ATs.

149. The application package is used to:

  1. Meet specific needs of a user

  2. Run the computer system better

  3. Run the compiler smoothly

  4. Enable the operating system to control hardware better

Show me the answer

Answer: 1. Meet specific needs of a user

Explanation:

  • Application Package: Application packages are designed to meet specific user needs, such as word processing, spreadsheets, or database management.

  • Conclusion: Application packages address user-specific needs.

150. The part of the computer system which performs the housekeeping functions is called:

  1. Interpreter

  2. Operating system

  3. Compiler

  4. Assembler

Show me the answer

Answer: 2. Operating system

Explanation:

  • Housekeeping Functions: The operating system performs housekeeping tasks such as memory management, process scheduling, and file management.

  • Conclusion: The operating system handles housekeeping functions.

151. A computer program written in a high-level language is called a:

  1. Source program

  2. Machine language program

  3. Object program

  4. None of the above

Show me the answer

Answer: 1. Source program

Explanation:

  • Source Program: A source program is written in a high-level language and must be translated into machine language before execution.

  • Conclusion: A high-level language program is called a source program.

152. A compiler can diagnose:

  1. Grammatical errors only

  2. Logical errors only

  3. Grammatical as well as logical errors

  4. Neither grammatical nor logical errors

Show me the answer

Answer: 1. Grammatical errors only

Explanation:

  • Compiler Errors: A compiler detects grammatical (syntax) errors in the source code but cannot detect logical errors, which are related to the program's logic.

  • Conclusion: Compilers diagnose grammatical errors only.

153. Compilers are generally written by:

  1. Computer manufacturers

  2. Professional programmers

  3. Computer users

  4. System analysts

Show me the answer

Answer: 2. Professional programmers

Explanation:

  • Compiler Development: Compilers are complex software tools typically written by professional programmers with expertise in language design and implementation.

  • Conclusion: Professional programmers write compilers.

154. A programmer, by mistake, writes an instruction to divide instead of multiply. Such an error can be detected by a/an:

  1. Compiler

  2. Compiler or interpreter both

  3. Interpreter

  4. Neither compiler nor interpreter

Show me the answer

Answer: 4. Neither compiler nor interpreter

Explanation:

  • Logical Errors: Errors like using the wrong operator (e.g., divide instead of multiply) are logical errors and cannot be detected by compilers or interpreters.

  • Conclusion: Logical errors are not detected by compilers or interpreters.

155. Which is not true about ‘syntax’ and ‘semantics’ parts of a computer language?

  1. Syntax is generally checked by the programmer

  2. Semantics is the responsibility of the programmer

  3. Semantics is checked mechanically by a computer

  4. Both (B) and (C)

Show me the answer

Answer: 4. Both (B) and (C)

Explanation:

  • Syntax and Semantics: Syntax is checked by the compiler, while semantics (meaning) is the responsibility of the programmer. Semantics cannot be mechanically checked by a computer.

  • Conclusion: Both (B) and (C) are incorrect.

156. A series of statements explaining how the data is to be processed is called:

  1. Instruction

  2. Program

  3. Compiler

  4. Interpreter

Show me the answer

Answer: 2. Program

Explanation:

  • Program: A program is a series of statements that define how data is processed to achieve a specific result.

  • Conclusion: A program processes data.

157. The computer language generally translated to pseudo code is:

  1. Assembly

  2. Pascal

  3. Machine

  4. PL/I

Show me the answer

Answer: 1. Assembly

Explanation:

  • Pseudo Code: Pseudo code is an informal high-level description of a program's logic. Assembly language is often translated into pseudo code for clarity.

  • Conclusion: Assembly language is translated to pseudo code.

158. Application programs used with microcomputers are generally written by:

  1. The users themselves

  2. Hardware suppliers

  3. A team of experts known as ‘third parties’

  4. IBM

Show me the answer

Answer: 3. A team of experts known as ‘third parties’

Explanation:

  • Application Development: Application programs for microcomputers are typically developed by third-party software companies or teams of experts.

  • Conclusion: Third-party experts write microcomputer applications.

159. What is true about machine language?

  1. It is understood by the computer

  2. It varies from one model of computer to another

  3. It may always be represented by binary numbers

  4. All of the above are true

Show me the answer

Answer: 4. All of the above are true

Explanation:

  • Machine Language: Machine language is the lowest-level programming language, understood directly by the computer. It varies between computer models and is represented in binary.

  • Conclusion: All the statements about machine language are true.

160. Object program is:

  1. A program written in machine language

  2. A program to be translated into machine language

  3. The translation of a high-level language into machine language

  4. None of the above

Show me the answer

Answer: 3. The translation of a high-level language into machine language

Explanation:

  • Object Program: An object program is the machine language version of a high-level language program, produced by a compiler or assembler.

  • Conclusion: An object program is the translated version of a high-level program.

161. What is true about assembly language?

  1. It uses symbolic codes

  2. It does not vary from one type of computer to another

  3. It uses binary numbers

  4. None of the above

Show me the answer

Answer: 1. It uses symbolic codes

Explanation:

  • Assembly Language: Assembly language uses symbolic codes (mnemonics) to represent machine instructions, making it easier to write and understand than machine language.

  • Conclusion: Assembly language uses symbolic codes.

162. The process of transferring data intended for a peripheral device into a disk (or intermediate store) so that it can be transferred to the peripheral at a more convenient time or in bulk is known as:

  1. Multiprogramming

  2. Caching

  3. Spooling

  4. Virtual programming

Show me the answer

Answer: 3. Spooling

Explanation:

  • Spooling: Spooling (Simultaneous Peripheral Operations On-Line) is the process of transferring data to a disk or intermediate store for later transfer to a peripheral device.

  • Conclusion: Spooling allows efficient data transfer to peripherals.

163. A form of code that uses more than one process and processor, possibly of different types, and that may on occasion have more than one process or processor active at the same time is known as:

  1. Multiprogramming

  2. Broadcasting

  3. Multithreading

  4. Time sharing

Show me the answer

Answer: 3. Multithreading

Explanation:

  • Multithreading: Multithreading allows multiple threads within a process to execute concurrently, utilizing multiple processors or cores.

  • Conclusion: Multithreading enables concurrent execution of threads.

164. Situations where two or more processes are reading or writing some shared data and the final result depends on who runs precisely when are called:

  1. Race conditions

  2. Mutual exclusion

  3. Critical sections

  4. Message passing

Show me the answer

Answer: 1. Race conditions

Explanation:

  • Race Conditions: Race conditions occur when the outcome of a process depends on the timing of other processes accessing shared data.

  • Conclusion: Race conditions arise from concurrent access to shared data.

165. Part of a program where the shared memory is accessed and which should be executed indivisibly is called:

  1. Semaphores

  2. Critical section

  3. Directory

  4. Mutual exclusion

Show me the answer

Answer: 2. Critical section

Explanation:

  • Critical Section: The critical section is the part of a program where shared resources are accessed, and it must be executed indivisibly to prevent race conditions.

  • Conclusion: The critical section ensures safe access to shared resources.

166. A relationship between processes such that each has some part (critical section) which must not be executed while the critical section of another is being executed is known as:

  1. Semaphore

  2. Multiprogramming

  3. Mutual exclusion

  4. Multitasking

Show me the answer

Answer: 3. Mutual exclusion

Explanation:

  • Mutual Exclusion: Mutual exclusion ensures that only one process can execute its critical section at a time, preventing interference between processes.

  • Conclusion: Mutual exclusion protects critical sections.

167. Which of the following operating systems use write-through caches?

  1. UNIX

  2. ULTRIX

  3. DOS

  4. XENIX

Show me the answer

Answer: 3. DOS

Explanation:

  • Write-Through Cache: In a write-through cache, data is written to both the cache and main memory simultaneously. DOS uses this approach for simplicity.

  • Conclusion: DOS uses write-through caches.

168. A disk scheduling algorithm in an operating system causes the disk arm to move back and forth across the disk surface in order to service all requests in its path. This is a:

  1. First come first served

  2. SCAN

  3. Shortest Seek Time First (SSTF)

  4. Eschenbach scheme

Show me the answer

Answer: 2. SCAN

Explanation:

  • SCAN Algorithm: The SCAN algorithm moves the disk arm back and forth across the disk, servicing requests in its path.

  • Conclusion: SCAN causes the disk arm to move back and forth.

169. A system program that sets up an executable program in main memory ready for execution is:

  1. Assembler

  2. Loader

  3. Linker

  4. Text editor

Show me the answer

Answer: 2. Loader

Explanation:

  • Loader: The loader is responsible for loading an executable program into memory and preparing it for execution.

  • Conclusion: The loader sets up programs for execution.

170. A compiler for a high-level language that runs on one machine and produces code for a different machine is called:

  1. Optimizing compiler

  2. Cross compiler

  3. One-pass compiler

  4. Multi-pass compiler

Show me the answer

Answer: 2. Cross compiler

Explanation:

  • Cross Compiler: A cross compiler generates code for a machine different from the one on which it runs.

  • Conclusion: Cross compilers produce code for a different machine.

171. An instruction in a programming language that is replaced by a sequence of instructions prior to assembly or compiling is known as:

  1. Procedure name

  2. Label

  3. Macro

  4. Literal

Show me the answer

Answer: 3. Macro

Explanation:

  • Macro: A macro is a single instruction that is replaced by a sequence of instructions during preprocessing.

  • Conclusion: Macros are expanded into multiple instructions.

172. Which of the following translator programs converts assembly language program to object program?

  1. Assembler

  2. Macro processor

  3. Compiler

  4. Linker

Show me the answer

Answer: 1. Assembler

Explanation:

  • Assembler: An assembler converts assembly language programs into machine code (object programs).

  • Conclusion: Assemblers translate assembly language to machine code.

173. Which of the following system programs forgoes the production of object code to generate absolute machine code and load it into the physical main storage location from which it will be executed immediately upon completion of the assembly?

  1. Two-pass assembler

  2. Microprocessor

  3. Load-and-go assembler

  4. Compiler

Show me the answer

Answer: 3. Load-and-go assembler

Explanation:

  • Load-and-Go Assembler: A load-and-go assembler generates absolute machine code and loads it directly into memory for immediate execution.

  • Conclusion: Load-and-go assemblers skip object code generation.

174. System programs such as compilers are designed so that they are:

  1. Reentrant

  2. Serially usable

  3. Non-reusable

  4. Recursive

Show me the answer

Answer: 1. Reentrant

Explanation:

  • Reentrant Programs: Reentrant programs can be interrupted and re-entered without affecting their operation, making them suitable for system programs like compilers.

  • Conclusion: Compilers are designed to be reentrant.

175. Memory:

  1. Is a device that performs a sequence of operations specified by instructions in memory

  2. Is the device where information is stored

  3. Is a sequence of instructions

  4. Is typically characterized by interactive processing and time-slicing of the CPU’s time to allow quick response to each user

Show me the answer

Answer: 2. Is the device where information is stored

Explanation:

  • Memory: Memory is the hardware component where data and instructions are stored for processing.

  • Conclusion: Memory stores information.

176. A program:

  1. Is a device that performs a sequence of operations specified by instructions in memory

  2. Is the device where information is stored

  3. Is a sequence of instructions

  4. Is typically characterized by interactive processing and time-slicing of the CPU’s time to allow quick response to each user

Show me the answer

Answer: 3. Is a sequence of instructions

Explanation:

  • Program: A program is a sequence of instructions that perform specific tasks when executed by a computer.

  • Conclusion: A program consists of instructions.

177. A processor:

  1. Is a device that performs a sequence of operations specified by instructions in memory

  2. Is the device where information is stored

  3. Is a sequence of instructions

  4. Is typically characterized by interactive processing and time-slicing of the CPU’s time to allow quick response to each user

Show me the answer

Answer: 1. Is a device that performs a sequence of operations specified by instructions in memory

Explanation:

  • Processor: The processor (CPU) executes instructions stored in memory to perform operations.

  • Conclusion: The processor executes instructions.

178. An assembler is:

  1. A program that places programs into memory and prepares them for execution

  2. A program that automates the translation of assembly language into machine language

  3. A program that accepts a program written in a high-level language and produces an object program

  4. A program that appears to execute a source program as if it were machine language

Show me the answer

Answer: 2. A program that automates the translation of assembly language into machine language

Explanation:

  • Assembler: An assembler translates assembly language programs into machine code.

  • Conclusion: Assemblers convert assembly language to machine code.

179. An interpreter is:

  1. A program that places programs into memory and prepares them for execution

  2. A program that automates the translation of assembly language into machine language

  3. A program that accepts a program written in a high-level language and produces an object program

  4. A program that appears to execute a source program as if it were machine language

Show me the answer

Answer: 4. A program that appears to execute a source program as if it were machine language

Explanation:

  • Interpreter: An interpreter executes high-level language programs directly without converting them into machine code.

  • Conclusion: Interpreters execute source programs directly.

180. A compiler is:

  1. A program that places programs into memory and prepares them for execution

  2. A program that automates the translation of assembly language into machine language

  3. A program that accepts a program written in a high-level language and produces an object program

  4. A program that appears to execute a source program as if it were machine language

Show me the answer

Answer: 3. A program that accepts a program written in a high-level language and produces an object program

Explanation:

  • Compiler: A compiler translates high-level language programs into machine code (object programs).

  • Conclusion: Compilers produce object programs from high-level code.

181. A loader is:

  1. A program that places programs into memory and prepares them for execution

  2. A program that automates the translation of assembly language into machine language

  3. A program that accepts a program written in a high-level language and produces an object program

  4. A program that appears to execute a source program as if it were machine language

Show me the answer

Answer: 1. A program that places programs into memory and prepares them for execution

Explanation:

  • Loader: The loader loads executable programs into memory and prepares them for execution.

  • Conclusion: Loaders prepare programs for execution.

182. Virtual Memory

  1. Is a method of memory allocation by which the program is subdivided into equal portions, or pages, and core is subdivided into equal portions or blocks

  2. Consists of those addresses that may be generated by a processor during execution of a computation

  3. Is a method of allocating processor time

  4. Allows multiple programs to reside in separate areas of core at the time

Show me the answer

Answer: 2. Consists of those addresses that may be generated by a processor during execution of a computation

Explanation:

  • Virtual Memory: Virtual memory is a memory management technique that provides an "illusion" of a larger memory space than physically available. It allows processes to use addresses that may not correspond to physical memory locations.

  • Conclusion: Virtual memory consists of addresses generated by the processor during execution.

183. Paging

  1. Is a method of memory allocation by which the program is subdivided into equal portions or pages and core is subdivided into equal portions or blocks

  2. Consists of those addresses that may be generated by a processor during execution of a computation

  3. Is a method of allocating processor time

  4. Allows multiple programs to reside in separate areas of core at the time

Show me the answer

Answer: 1. Is a method of memory allocation by which the program is subdivided into equal portions or pages and core is subdivided into equal portions or blocks

Explanation:

  • Paging: Paging is a memory management technique where the program is divided into fixed-size pages, and physical memory is divided into frames of the same size. Pages are loaded into frames as needed.

  • Conclusion: Paging divides programs and memory into equal-sized portions.

184. Multiprogramming

  1. Is a method of memory allocation by which the program is subdivided into equal portions or pages and core is subdivided into equal portions or blocks

  2. Consists of those addresses that may be generated by a processor during execution of a computation

  3. Is a method of allocating processor time

  4. Allows multiple programs to reside in separate areas of core at the time

Show me the answer

Answer: 4. Allows multiple programs to reside in separate areas of core at the time

Explanation:

  • Multiprogramming: Multiprogramming allows multiple programs to reside in memory simultaneously, enabling the CPU to switch between them to maximize utilization.

  • Conclusion: Multiprogramming enables multiple programs to coexist in memory.

185. The Memory Buffer Register (MBR)

  1. Is a hardware memory device which denotes the location of the current instruction being executed

  2. Is a group of electrical circuits (hardware) that performs the intent of instructions fetched from memory

  3. Contains the address of the memory location that is to be read from or stored into

  4. Contains a copy of the designated memory location specified by the MAR after a “read” or the new contents of the memory prior to a “write”

Show me the answer

Answer: 4. Contains a copy of the designated memory location specified by the MAR after a “read” or the new contents of the memory prior to a “write”

Explanation:

  • Memory Buffer Register (MBR): The MBR holds the data being transferred to or from memory. After a read operation, it contains the data from the memory location specified by the Memory Address Register (MAR). Before a write operation, it holds the data to be written to memory.

  • Conclusion: The MBR stores data during memory read/write operations.

186. The Memory Address Register (MAR)

  1. Is a hardware memory device which denotes the location of the current instruction being executed

  2. Is a group of electrical circuits (hardware) that performs the intent of instructions fetched from memory

  3. Contains the address of the memory location that is to be read from or stored into

  4. Contains a copy of the designated memory location specified by the MAR after a “read” or the new contents of the memory prior to a “write”

Show me the answer

Answer: 3. Contains the address of the memory location that is to be read from or stored into

Explanation:

  • Memory Address Register (MAR): The MAR holds the address of the memory location to be accessed during a read or write operation.

  • Conclusion: The MAR stores memory addresses for read/write operations.

187. The Instruction Register (IR)

  1. Is a hardware memory device which denotes the location of the current instruction being executed

  2. Is a group of electrical circuits (hardware) that performs the intent of instructions fetched from memory

  3. Contains the address of the memory location that is to be read from or stored into

  4. Contains a copy of the designated memory location specified by the MAR after a “read” or the new contents of the memory prior to a “write”

Show me the answer

Answer: 2. Is a group of electrical circuits (hardware) that performs the intent of instructions fetched from memory

Explanation:

  • Instruction Register (IR): The IR holds the current instruction being executed by the CPU. It decodes and executes the instruction.

  • Conclusion: The IR stores and executes instructions.

188. Advantage(s) of using assembly language rather than machine language is (are):

  1. It is mnemonic and easy to read

  2. Addresses are symbolic, not absolute

  3. Introduction of data to the program is easier

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Assembly Language: Assembly language uses mnemonics and symbolic addresses, making it easier to read and write compared to machine language. It also simplifies data handling.

  • Conclusion: Assembly language offers several advantages over machine language.

189. Pass 1 of an assembler:

  1. Assigns addresses to all statements in the program

  2. Saves the values assigned to all labels for use in Pass 2

  3. Performs some processing of assembler directives

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Pass 1 of Assembler: In the first pass, the assembler assigns addresses to statements, saves label values, and processes assembler directives.

  • Conclusion: Pass 1 performs multiple tasks to prepare for Pass 2.

190. Pass 2 of an assembler:

  1. Assembles instructions and generates data

  2. Performs processing of assembler directives not done during Pass 1

  3. Writes the object program and the assembly listing

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Pass 2 of Assembler: In the second pass, the assembler generates machine code, processes remaining directives, and produces the object program and assembly listing.

  • Conclusion: Pass 2 completes the assembly process.

191. The System/370 assembler language:

  1. Allows the programmer to write base registers and displacements explicitly in the source program

  2. Is used to remember which of the general-purpose registers are currently available as base registers, and what base addresses they contain

  3. Allows multiple programs to reside in separate areas of core at the same time

  4. Is a term that refers to the control programs of an operating system

Show me the answer

Answer: 1. Allows the programmer to write base registers and displacements explicitly in the source program

Explanation:

  • System/370 Assembler: The System/370 assembler allows programmers to specify base registers and displacements explicitly in the source code.

  • Conclusion: This feature provides flexibility in addressing.

192. A base register table:

  1. Allows the programmer to write base registers and displacements explicitly in the source program

  2. Is used to remember which of the general-purpose registers are currently available as base registers, and what base addresses they contain

  3. Allows multiple programs to reside in separate areas of core at the same time

  4. Is a term that refers to the control programs of an operating system

Show me the answer

Answer: 2. Is used to remember which of the general-purpose registers are currently available as base registers, and what base addresses they contain

Explanation:

  • Base Register Table: The base register table tracks which general-purpose registers are used as base registers and their corresponding base addresses.

  • Conclusion: It helps manage base registers in assembly programming.

193. Addressing structure:

  1. Defines the fundamental method of determining effective operand addresses

  2. Are variations in the use of fundamental addressing structures, or some associated actions which are related to addressing

  3. Performs indicated operations on two fast registers of the machine and leaves the result in one of the registers

  4. All of the above

Show me the answer

Answer: 1. Defines the fundamental method of determining effective operand addresses

Explanation:

  • Addressing Structure: The addressing structure defines how effective operand addresses are calculated in a computer system.

  • Conclusion: It is fundamental to memory access and instruction execution.

194. Addressing modes:

  1. Defines the fundamental method of determining effective operand addresses

  2. Are variations in the use of fundamental addressing structures, or some associated actions which are related to addressing

  3. Performs indicated operations on two fast registers of the machine and leaves the result in one of the registers

  4. All of the above

Show me the answer

Answer: 2. Are variations in the use of fundamental addressing structures, or some associated actions which are related to addressing

Explanation:

  • Addressing Modes: Addressing modes are variations in how operands are specified in instructions, such as immediate, direct, indirect, and indexed addressing.

  • Conclusion: Addressing modes provide flexibility in operand access.

195. The Register-to-Register (RR) instructions:

  1. Have both their operands in the main store

  2. Perform an operation on a register operand and an operand located in the main store, generally leaving the result in the register

  3. Perform indicated operations on two fast registers of the machine and leave the result in one of the registers

  4. All of the above

Show me the answer

Answer: 3. Perform indicated operations on two fast registers of the machine and leave the result in one of the registers

Explanation:

  • RR Instructions: Register-to-Register instructions operate on two registers and store the result in one of them.

  • Conclusion: RR instructions are efficient for register-based operations.

196. The Register-to-Storage (RS) instructions:

  1. Have both their operands in the main store

  2. Perform an operation on a register operand and an operand located in the main store, generally leaving the result in the register

  3. Perform indicated operations on two fast registers of the machine and leave the result in one of the registers

  4. All of the above

Show me the answer

Answer: 2. Perform an operation on a register operand and an operand located in the main store, generally leaving the result in the register

Explanation:

  • RS Instructions: Register-to-Storage instructions operate on a register and a memory location, storing the result in the register.

  • Conclusion: RS instructions facilitate register-memory operations.

197. The Storage-to-Storage (SS) instructions:

  1. Have both their operands in the main store

  2. Perform an operation on a register operand and an operand located in the main store, generally leaving the result in the register

  3. Perform indicated operations on two fast registers of the machine and leave the result in one of the registers

  4. All of the above

Show me the answer

Answer: 1. Have both their operands in the main store

Explanation:

  • SS Instructions: Storage-to-Storage instructions operate on two memory locations.

  • Conclusion: SS instructions are used for memory-to-memory operations.

198. Which of the following are Language Processors?

  1. Assemblers

  2. Interpreters

  3. Compilers

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Language Processors: Assemblers, interpreters, and compilers are all language processors that convert high-level or assembly code into machine code.

  • Conclusion: All three are types of language processors.

199. The specific tasks Storage Manager performs are:

  1. Allocation/deallocation of storage to programs

  2. Protection of the storage area allocated to a program from illegal access by other programs in the system

  3. The status of each program

  4. Both (A) and (B)

Show me the answer

Answer: 4. Both (A) and (B)

Explanation:

  • Storage Manager: The storage manager allocates and deallocates memory and protects memory areas from unauthorized access.

  • Conclusion: The storage manager handles allocation and protection.

200. The process manager (or processor manager) has to keep track of:

  1. The status of each program

  2. The priority of each program

  3. The information management support to a programmer using the system

  4. Both (A) and (B)

Show me the answer

Answer: 4. Both (A) and (B)

Explanation:

  • Process Manager: The process manager tracks the status and priority of each program to ensure efficient CPU scheduling.

  • Conclusion: It manages program status and priority.

201. The advantage(s) of incorporating the macro processor into Pass 1 is (are):

  1. Many functions do not have to be implemented twice

  2. Functions are combined and it is not necessary to create intermediate files as output from the macro processor and input to the assembler

  3. More flexibility is available to the programmer in that he may use all the features of the assembler in conjunction with macros

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Macro Processor in Pass 1: Integrating the macro processor into Pass 1 simplifies the assembly process, avoids redundant functions, and provides greater flexibility.

  • Conclusion: Combining the macro processor with Pass 1 offers multiple advantages.

202. The macro processor must perform:

  1. Recognize macro definitions and macro calls

  2. Save the macro definitions

  3. Expand macro calls and substitute arguments

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Macro Processor Tasks: The macro processor identifies macros, saves their definitions, and expands macro calls with appropriate arguments.

  • Conclusion: The macro processor performs all these tasks.

203. In which way(s) a macro processor for assembly language can be implemented:

  1. Independent two-pass processor

  2. Independent one-pass processor

  3. Processor incorporated into Pass 1 of a standard two-pass assembler

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Macro Processor Implementation: A macro processor can be implemented as a standalone two-pass or one-pass processor or integrated into Pass 1 of an assembler.

  • Conclusion: All three implementation methods are valid.

204. Which of the following functions is(are) performed by the loader?

  1. Allocate space in memory for the programs and resolve symbolic references between object decks

  2. Adjust all address-dependent locations, such as address constants, to correspond to the allocated space

  3. Physically place the machine instructions and data into memory

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Loader Functions: The loader allocates memory, resolves references, adjusts addresses, and loads instructions and data into memory.

  • Conclusion: The loader performs all these tasks.

205. When a computer is first turned on or restarted, a special type of absolute loader is executed, called a:

  1. “Compile and Go” loader

  2. Bootstrap loader

  3. Boot loader

  4. Relating loader

Show me the answer

Answer: 2. Bootstrap loader

Explanation:

  • Bootstrap Loader: The bootstrap loader is a small program that loads the operating system into memory when the computer is started or restarted.

  • Conclusion: The bootstrap loader initializes the system.

206. In MS-DOS 5.0, which is the number that acts as a code to uniquely identify the software?

  1. MS

  2. DOS

  3. MS DOS

  4. 5.0

Show me the answer

Answer: 4. 5.0

Explanation:

  • Version Number: The version number (5.0) uniquely identifies the specific release of MS-DOS.

  • Conclusion: The version number acts as a unique identifier.

207. The higher versions of the operating systems are so written that programs designed for earlier versions can still be run. What is it called?

  1. Upgradability

  2. Universality

  3. Upward mobility

  4. Upward compatibility

Show me the answer

Answer: 4. Upward compatibility

Explanation:

  • Upward Compatibility: Upward compatibility ensures that programs written for earlier versions of an operating system can run on newer versions.

  • Conclusion: This feature is called upward compatibility.

208. What is the name of the process of initializing a microcomputer with its operating system?

  1. Cold booting

  2. Warm booting

  3. Booting

  4. Root recording

Show me the answer

Answer: 3. Booting

Explanation:

  • Booting: Booting is the process of starting a computer and loading the operating system into memory.

  • Conclusion: The process is called booting.

209. A hardware device that is capable of executing a sequence of instructions is known as:

  1. CPU

  2. ALU

  3. CU

  4. Processor

Show me the answer

Answer: 4. Processor

Explanation:

  • Processor: A processor is a hardware device that executes instructions in a sequence.

  • Conclusion: The processor is responsible for executing instructions.

210. The function(s) performed by the paging software is(are):

  1. Implementation of the access environment for all programs in the system

  2. Management of the physical address space

  3. Sharing and protection

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Paging Software: Paging software manages memory access, physical address space, and provides sharing and protection mechanisms.

  • Conclusion: Paging software performs all these functions.

211. The file level is a descriptor containing all the information which would be required:

  1. To connect the file to a program

  2. To guard against the destruction of the file inadvertently or deliberately by another program

  3. To facilitate easy creation, storage, and access of files

  4. Both (A) and (B)

Show me the answer

Answer: 4. Both (A) and (B)

Explanation:

  • File Level Descriptor: The file level descriptor contains information needed to connect files to programs and protect them from unauthorized access.

  • Conclusion: It serves both connection and protection purposes.

212. The task(s) of the lexical analysis phase is(are):

  1. To parse the source program into the language

  2. To build a literal table and an identifier table

  3. To build a uniform symbol table

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Lexical Analysis: The lexical analysis phase parses the source program, builds tables for literals and identifiers, and creates a uniform symbol table.

  • Conclusion: Lexical analysis performs all these tasks.

213. Which is a permanent database in the general model of a compiler?

  1. Literal Table

  2. Terminal Table

  3. Identifier Table

  4. Source code

Show me the answer

Answer: 2. Terminal Table

Explanation:

  • Terminal Table: The terminal table is a permanent database in a compiler that stores terminal symbols (e.g., keywords, operators).

  • Conclusion: The terminal table is a permanent part of the compiler.

214. Which table is a permanent database that has an entry for each terminal symbol?

  1. Terminal Table

  2. Identifier Table

  3. Literal Table

  4. Reductions

Show me the answer

Answer: 1. Terminal Table

Explanation:

  • Terminal Table: The terminal table contains entries for all terminal symbols in the language.

  • Conclusion: It is a permanent database for terminal symbols.

215. While running DOS on a PC, which command would be used to duplicate the entire diskette?

  1. COPY

  2. CHKDSK

  3. DISKCOPY

  4. TYPE

Show me the answer

Answer: 3. DISKCOPY

Explanation:

  • DISKCOPY: The DISKCOPY command is used to duplicate the contents of one diskette to another.

  • Conclusion: DISKCOPY is used for disk duplication.

216. Which of the following filename extensions suggests that the file is a backup copy of another file?

  1. TXT

  2. COM

  3. BAS

  4. BAK

Show me the answer

Answer: 4. BAK

Explanation:

  • BAK Extension: The .BAK extension is commonly used to indicate backup files.

  • Conclusion: Files with the .BAK extension are typically backups.

217. While working with MS-DOS, which command will you use to transfer a specific file from one disk to another?

  1. DISKCOPY

  2. RENAME

  3. COPY

  4. FORMAT

Show me the answer

Answer: 3. COPY

Explanation:

  • COPY Command: The COPY command is used to transfer files between disks.

  • Conclusion: COPY is used for file transfer.

218. With MS-DOS, which command will divide the surface of the blank floppy disk into sectors and assign a unique address to each one?

  1. FORMAT command

  2. VER command

  3. FAT command

  4. CHKDSK command

Show me the answer

Answer: 1. FORMAT command

Explanation:

  • FORMAT Command: The FORMAT command prepares a blank disk by dividing it into sectors and assigning addresses.

  • Conclusion: FORMAT is used to initialize disks.

219. The functions of the Storage Assignment is(are):

  1. To assign storage to all variables referenced in the source program

  2. To assign storage to all temporary locations that are necessary for intermediate results

  3. To assign storage to literals, and to ensure that the storage is allocated and appropriate locations are initialized

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Storage Assignment: Storage assignment allocates memory for variables, temporary locations, and literals, ensuring proper initialization.

  • Conclusion: It performs all these functions.

220. A non-relocatable program is one which:

  1. Cannot be made to execute in any area of storage other than the one designated for it at the time of its coding or translation

  2. Consists of a program and relevant information for its relocation

  3. Can itself perform the relocation of its address-sensitive portions

  4. All of the above

Show me the answer

Answer: 1. Cannot be made to execute in any area of storage other than the one designated for it at the time of its coding or translation

Explanation:

  • Non-Relocatable Program: A non-relocatable program is tied to a specific memory location and cannot be moved without modification.

  • Conclusion: It is fixed to a designated memory area.

221. A relocatable program form is one which:

  1. Cannot be made to execute in any area of storage other than the one designated for it at the time of its coding or translation

  2. Consists of a program and relevant information for its relocation

  3. Can itself perform the relocation of its address-sensitive portions

  4. All of the above

Show me the answer

Answer: 2. Consists of a program and relevant information for its relocation

Explanation:

  • Relocatable Program: A relocatable program includes information that allows it to be loaded into different memory locations.

  • Conclusion: It contains relocation information.

222. A self-relocating program is one which:

  1. Cannot be made to execute in any area of storage other than the one designated for it at the time of its coding or translation

  2. Consists of a program and relevant information for its relocation

  3. Can itself perform the relocation of its address-sensitive portions

  4. All of the above

Show me the answer

Answer: 3. Can itself perform the relocation of its address-sensitive portions

Explanation:

  • Self-Relocating Program: A self-relocating program can adjust its address-sensitive portions to execute in different memory locations.

  • Conclusion: It can relocate itself.

223. The term "operating system" means:

  1. A set of programs which controls computer working

  2. The way a computer operator works

  3. Conversion of high-level language into machine code

  4. The way a floppy disk drive operates

Show me the answer

Answer: 1. A set of programs which controls computer working

Explanation:

  • Operating System: The operating system is a set of programs that manage hardware and software resources and provide common services for computer programs.

  • Conclusion: It controls computer operations.

224. Which of the following software types is used to simplify using system software?

  1. Spreadsheet

  2. Timesharing

  3. Operating environment

  4. Multitasking

Show me the answer

Answer: 3. Operating environment

Explanation:

  • Operating Environment: An operating environment simplifies the use of system software by providing a user-friendly interface and tools.

  • Conclusion: It enhances usability.

225. Which of the following is not applications software?

  1. Word processing

  2. UNIX

  3. Spreadsheet

  4. Desktop publishing

Show me the answer

Answer: 2. UNIX

Explanation:

  • UNIX: UNIX is an operating system, not an application software.

  • Conclusion: UNIX is system software.

226. Which of the following types of software should you use if you often need to create, edit, and print documents?

  1. Word processing

  2. UNIX

  3. Spreadsheet

  4. Desktop publishing

Show me the answer

Answer: 1. Word processing

Explanation:

  • Word Processing: Word processing software is designed for creating, editing, and printing documents.

  • Conclusion: It is the best choice for document handling.

227. Which of the following will determine your choice of systems software for your computer?

  1. Is the applications software you want to use compatible with it?

  2. Is it expensive?

  3. Is it compatible with your hardware?

  4. Both (A) and (C)

Show me the answer

Answer: 4. Both (A) and (C)

Explanation:

  • Systems Software Selection: The choice of systems software depends on compatibility with both applications software and hardware.

  • Conclusion: Both factors are important.

228. Terminal Table:

  1. Contains all constants in the program

  2. A permanent table of decision rules in the form of patterns for matching with the uniform symbol table to discover syntactic structure

  3. Consists of a full or partial list of the token’s as they appear in the program. Created by lexical analysis and used for syntax analysis and interpretation

  4. A permanent table which lists all key words and special symbols of the language in symbolic form

Show me the answer

Answer: 4. A permanent table which lists all key words and special symbols of the language in symbolic form

Explanation:

  • Terminal Table: The terminal table stores keywords and special symbols in symbolic form.

  • Conclusion: It is a permanent part of the compiler.

229. Assembly code database is associated with:

  1. Assembly language version of the program which is created by the code generation phase and is input to the assembly phase

  2. A permanent table of decision rules in the form of patterns for matching with the uniform symbol table to discover syntactic structure

  3. Consists of a full or partial list of the token’s as they appear in the program. Created by lexical analysis and used for syntax analysis and interpretation

  4. A permanent table which lists all key words and special symbols of the language in symbolic form

Show me the answer

Answer: 1. Assembly language version of the program which is created by the code generation phase and is input to the assembly phase

Explanation:

  • Assembly Code Database: The assembly code database stores the assembly language version of the program generated during code generation.

  • Conclusion: It is used as input to the assembly phase.

230. The table created by lexical analysis to describe all literals used in the source program is:

  1. Terminal Table

  2. Identifier Table

  3. Literal Table

  4. Reductions

Show me the answer

Answer: 3. Literal Table

Explanation:

  • Literal Table: The literal table stores all literals (constants) used in the source program.

  • Conclusion: It is created during lexical analysis.

231. The functions of the syntax phase are:

  1. To recognize the major constructs of the language and to call the appropriate action routines that will generate the intermediate form or matrix for these constructs

  2. To build a literal table and an identifier table

  3. To build a uniform symbol table

  4. To parse the source program into the basic elements or tokens of the language

Show me the answer

Answer: 1. To recognize the major constructs of the language and to call the appropriate action routines that will generate the intermediate form or matrix for these constructs

Explanation:

  • Syntax Phase: The syntax phase identifies language constructs and generates intermediate representations.

  • Conclusion: It focuses on language structure.

232. In an absolute loading scheme, which loader function is accomplished by the assembler?

  1. Reallocation

  2. Linking

  3. Allocation

  4. Loading

Show me the answer

Answer: 1. Reallocation

Explanation:

  • Absolute Loading: In absolute loading, the assembler performs reallocation to adjust addresses.

  • Conclusion: Reallocation is handled by the assembler.

233. In an absolute loading scheme, which loader function is accomplished by the loader?

  1. Reallocation

  2. Linking

  3. Allocation

  4. Loading

Show me the answer

Answer: 4. Loading

Explanation:

  • Loader Function: The loader loads the program into memory.

  • Conclusion: Loading is the primary function of the loader.

234. The advantages inherent to using high-level language are:

  1. Fewer people, less management, and shorter transition in learning time

  2. Improved debugging capability, and superior documentation

  3. A greater degree of machine independence

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • High-Level Language Advantages: High-level languages offer easier learning, better debugging, and machine independence.

  • Conclusion: They provide multiple benefits.

235. The action of parsing the source program into the proper syntactic classes is known as:

  1. Syntax analysis

  2. Interpretation

  3. Lexical analysis

  4. General syntax analysis

Show me the answer

Answer: 1. Syntax analysis

Explanation:

  • Syntax Analysis: Syntax analysis parses the source program into syntactic constructs.

  • Conclusion: It is part of the compilation process.

236. In analyzing the compilation of a PL/I program, the term “Lexical analysis” is associated with:

  1. Recognition of basic syntactic constructs through reductions

  2. Recognition of basic elements and creation of uniform symbols

  3. Creation of more optional matrix

  4. Use of macro processor to produce more optimal assembly code

Show me the answer

Answer: 2. Recognition of basic elements and creation of uniform symbols

Explanation:

  • Lexical Analysis: Lexical analysis identifies basic elements (tokens) and creates uniform symbols.

  • Conclusion: It is the first phase of compilation.

237. In analyzing the compilation of a PL/I program, the term “Machine independent optimization” is associated with:

  1. Recognition of basic syntactic constructs through reductions

  2. Recognition of basic elements and creation of uniform symbols

  3. Creation of more optional matrix

  4. Use of macro processor to produce more optimal assembly code

Show me the answer

Answer: 3. Creation of more optional matrix

Explanation:

  • Machine Independent Optimization: This phase optimizes the intermediate code without considering the target machine.

  • Conclusion: It focuses on code optimization.

238. In analyzing the compilation of a PL/I program, the description “resolving symbolic address (labels) and generating machine language” is associated with:

  1. Assembly and output

  2. Storage assignment

  3. Code generation

  4. Syntax analysis

Show me the answer

Answer: 1. Assembly and output

Explanation:

  • Assembly and Output: This phase resolves symbolic addresses and generates machine code.

  • Conclusion: It is part of the final compilation stages.

239. In analyzing the compilation of a PL/I program, the description “creation of more optimal matrix” is associated with:

  1. Assembly and output

  2. Syntax analysis

  3. Code generation

  4. Machine independent optimization

Show me the answer

Answer: 4. Machine independent optimization

Explanation:

  • Machine Independent Optimization: This phase creates optimized intermediate code.

  • Conclusion: It improves code efficiency.

240. Which of the following is not a part of the operating system?

  1. Supervisor

  2. Job-control program

  3. Performance monitor

  4. Input/output control program

Show me the answer

Answer: 3. Performance monitor

Explanation:

  • Performance Monitor: A performance monitor is a utility tool, not a core part of the operating system.

  • Conclusion: It is external to the OS.

241. Which of the following is not an advantage of multiprogramming?

  1. Increased throughput

  2. Shorter response time

  3. Decreased operating system overhead

  4. Ability to assign priorities to jobs

Show me the answer

Answer: 3. Decreased operating system overhead

Explanation:

  • Multiprogramming Overhead: Multiprogramming increases system overhead due to process management and context switching.

  • Conclusion: It does not decrease overhead.

242. In which addressing mode the contents of a register specified in the instruction are first decremented, and then these contents are used as the effective address of the operands?

  1. Index addressing

  2. Auto increment

  3. Indirect addressing

  4. Auto decrement

Show me the answer

Answer: 4. Auto decrement

Explanation:

  • Auto Decrement: In auto decrement addressing, the register value is decremented before being used as the effective address.

  • Conclusion: It is a type of addressing mode.

243. In which addressing mode, the effective address of the operand is generated by adding a constant value to the contents of a register?

  1. Absolute mode

  2. Immediate mode

  3. Indirect mode

  4. Index mode

Show me the answer

Answer: 4. Index mode

Explanation:

  • Index Addressing: Index addressing adds a constant to a register value to compute the effective address.

  • Conclusion: It is used for array access.

244. In what modules, multiple instances of execution will yield the same result even if one instance has not terminated before the next one has begun?

  1. Non-reusable module

  2. Reentrant module

  3. Serially reusable module

  4. Recursive module

Show me the answer

Answer: 2. Reentrant module

Explanation:

  • Reentrant Module: A reentrant module can be safely interrupted and re-entered, producing consistent results.

  • Conclusion: It supports concurrent execution.

245. What is the name given to all the programs inside the computer which makes it usable?

  1. Application software

  2. Firmware

  3. System software

  4. Shareware

Show me the answer

Answer: 3. System software

Explanation:

  • System Software: System software includes the operating system and utilities that make the computer usable.

  • Conclusion: It is essential for computer operation.

246. A translator which reads an entire program written in a high-level language and converts it into machine language code is:

  1. Assembler

  2. Compiler

  3. Translator

  4. System software

Show me the answer

Answer: 2. Compiler

Explanation:

  • Compiler: A compiler translates high-level language code into machine language.

  • Conclusion: It is a type of translator.

247. Which of the following is helpful in evaluating applications software that will best suit your needs?

  1. Recommendations by other users

  2. Objective software reviews

  3. Computer magazines

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Evaluating Software: Recommendations, reviews, and magazines provide valuable insights for selecting software.

  • Conclusion: All are useful for evaluation.

248. If you want to execute more than one program at a time, the system software you are using must be capable of:

  1. Word processing

  2. Compiling

  3. Virtual memory

  4. Multitasking

Show me the answer

Answer: 4. Multitasking

Explanation:

  • Multitasking: Multitasking allows multiple programs to run concurrently.

  • Conclusion: It is essential for concurrent execution.

249. Which of the following types of software must you have in main memory in order to use your keyboard?

  1. Word processing

  2. Spreadsheet

  3. System

  4. Applications

Show me the answer

Answer: 3. System

Explanation:

  • System Software: System software, including the operating system, is required to manage hardware like the keyboard.

  • Conclusion: It is essential for hardware interaction.

250. Which of the following might be used to convert high-level language instructions into machine language?

  1. System software

  2. An operating environment

  3. Application software

  4. An interpreter

Show me the answer

Answer: 4. An interpreter

Explanation:

  • Interpreter: An interpreter converts high-level language instructions into machine language on-the-fly.

  • Conclusion: It is used for language translation.

251. Multiprogramming was made possible by:

  1. Input/output units that operate independently of the CPU

  2. Operating systems

  3. Both (A) and (B)

  4. Neither (A) nor (B)

Show me the answer

Answer: 3. Both (A) and (B)

Explanation:

  • Multiprogramming: Multiprogramming relies on independent I/O units and operating system support to manage multiple processes.

  • Conclusion: Both factors enable multiprogramming.

252. What is the name of the system which deals with the running of the actual computer and not with the programming problems?

  1. Operating system

  2. Objective program

  3. System program

  4. Source program

Show me the answer

Answer: 1. Operating system

Explanation:

  • Operating System: The operating system manages computer hardware and software resources.

  • Conclusion: It handles system operations.

253. Which of the following scheduling objectives should be applied to the following: the system should admit jobs to create a mix that will keep most devices busy?

  1. To be fair

  2. To obey priorities

  3. To balance resource utilization

  4. To be predictable

Show me the answer

Answer: 3. To balance resource utilization

Explanation:

  • Resource Utilization: Balancing resource utilization ensures that all devices are used efficiently.

  • Conclusion: It is a key scheduling objective.

254. Which policy replaces a page if it is not in the favored subset of a process’s pages?

  1. FIFO

  2. LFU

  3. LRU

  4. Working set

Show me the answer

Answer: 4. Working set

Explanation:

  • Working Set Policy: The working set policy replaces pages outside the process's current working set.

  • Conclusion: It focuses on active pages.

255. In which of the storage placement strategies a program is placed in the smallest available hole in the main memory?

  1. Best fit

  2. Worst fit

  3. First fit

  4. Buddy

Show me the answer

Answer: 1. Best fit

Explanation:

  • Best Fit: The best fit strategy places a program in the smallest available hole that can accommodate it.

  • Conclusion: It minimizes wasted memory.

256. Which of the following statements is false?

  1. Protection in segmentation systems is more natural than in paging systems

  2. Sharing is more natural in segmentation systems than in paging systems

  3. Associative memory speeds up the dynamic address translation

  4. Every cell of the associative memory is searched sequentially

Show me the answer

Answer: 4. Every cell of the associative memory is searched sequentially

Explanation:

  • Associative Memory: Associative memory is searched in parallel, not sequentially.

  • Conclusion: The statement is false.

257. Can you name the major operating system used in computers?

  1. MS DOS

  2. UNIX

  3. OS/2

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Major Operating Systems: MS DOS, UNIX, and OS/2 are all major operating systems.

  • Conclusion: All are widely used.

258. What is the name of the operating system which was originally designed by scientists and engineers for use by scientists and engineers?

  1. XENIX

  2. OS/2

  3. UNIX

  4. MS DOS

Show me the answer

Answer: 3. UNIX

Explanation:

  • UNIX: UNIX was designed for scientific and engineering use.

  • Conclusion: It is a widely used OS.

259. Which are the most important features of Microsoft Windows program?

  1. Windows

  2. Icons

  3. Pull-down menus

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Windows Features: Windows, icons, and pull-down menus are key features of Microsoft Windows.

  • Conclusion: All are important.

260. What is the name given to the organized collection of software that controls the overall operation of a computer?

  1. Working system

  2. Operating system

  3. Peripheral system

  4. Controlling system

Show me the answer

Answer: 2. Operating system

Explanation:

  • Operating System: The operating system manages computer operations.

  • Conclusion: It is the core software.

261. What is the name given to the values that are automatically provided by software to reduce keystrokes and improve a computer user’s productivity?

  1. Defined values

  2. Default values

  3. Fixed values

  4. Special values

Show me the answer

Answer: 2. Default values

Explanation:

  • Default Values: Default values are pre-set values that reduce user input.

  • Conclusion: They improve productivity.

262. Producer-consumer problem can be solved using:

  1. Semaphores

  2. Monitors

  3. Event counters

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Producer-Consumer Problem: This problem can be solved using semaphores, monitors, or event counters.

  • Conclusion: All are valid solutions.

263. Situations where two or more processes are reading or writing some shared data and the final result depends on who runs precisely when, are called:

  1. Race conditions

  2. Mutual exclusion

  3. Critical sections

  4. Message passing

Show me the answer

Answer: 1. Race conditions

Explanation:

  • Race Conditions: Race conditions occur when the outcome depends on the timing of process execution.

  • Conclusion: They are a synchronization issue.

264. A process is:

  1. Program in high-level language kept on disk

  2. Contents of main memory

  3. A program in execution

  4. A job in secondary memory

Show me the answer

Answer: 3. A program in execution

Explanation:

  • Process: A process is an instance of a program being executed.

  • Conclusion: It is an active entity.

265. In which addressing mode the effective address of the operand is the contents of a register specified in the instruction and after accessing the operand, the contents of this register is incremented to point to the next item in the list?

  1. Index addressing

  2. Auto increment

  3. Indirect addressing

  4. Auto decrement

Show me the answer

Answer: 2. Auto increment

Explanation:

  • Auto Increment: In auto increment addressing, the register value is incremented after accessing the operand.

  • Conclusion: It is used for sequential access.

266. A relationship between processes such that each has some part (critical section) which must not be executed while the critical section of another is being executed, is known as:

  1. Semaphore

  2. Multiprogramming

  3. Mutual exclusion

  4. Multitasking

Show me the answer

Answer: 3. Mutual exclusion

Explanation:

  • Mutual Exclusion: Mutual exclusion ensures that only one process can execute a critical section at a time.

  • Conclusion: It prevents conflicts.

267. The process of transferring data intended for a peripheral device into a disk (or intermediate store) so that it can be transferred to the peripheral at a more convenient time or in bulk, is known as:

  1. Multiprogramming

  2. Caching

  3. Spooling

  4. Virtual programming

Show me the answer

Answer: 3. Spooling

Explanation:

  • Spooling: Spooling buffers data for peripheral devices, allowing efficient transfer.

  • Conclusion: It improves I/O performance.

268. Which of the following statements is false?

  1. A small page size causes large page tables

  2. Internal fragmentation is increased with small pages

  3. A large size causes instructions and data that will not be referenced to be brought into primary storage

  4. I/O transfers are more efficient with large pages

Show me the answer

Answer: 2. Internal fragmentation is increased with small pages

Explanation:

  • Internal Fragmentation: Internal fragmentation is reduced with smaller pages, not increased.

  • Conclusion: The statement is false.

269. The powerful text editor called PC-Write can be used by anybody by paying a small fee. Such programs are called:

  1. Software

  2. Firmware

  3. Shareware

  4. Mindware

Show me the answer

Answer: 3. Shareware

Explanation:

  • Shareware: Shareware is software distributed for free with an option to pay for continued use.

  • Conclusion: PC-Write is an example of shareware.

270. What is the name of the operating system that reads and reacts in terms of actual time?

  1. Batch system

  2. Real-time system

  3. Quick response system

  4. Time-sharing system

Show me the answer

Answer: 2. Real-time system

Explanation:

  • Real-Time System: A real-time system responds to inputs within a strict time frame.

  • Conclusion: It is designed for timely responses.

271. What is the name of the technique in which the operating system of a computer executes several programs concurrently by switching back and forth between them?

  1. Partitioning

  2. Windowing

  3. Multitasking

  4. Paging

Show me the answer

Answer: 3. Multitasking

Explanation:

  • Multitasking: Multitasking allows multiple programs to run concurrently by switching between them.

  • Conclusion: It improves CPU utilization.

272. What is the name given to the software which can be legally compiled and often used for free?

  1. Shareware program

  2. Firmware program

  3. Public domain program

  4. Mindware

Show me the answer

Answer: 3. Public domain program

Explanation:

  • Public Domain Software: Public domain software is free to use and modify.

  • Conclusion: It is freely available.

273. All the time a computer is switched on, its operating system software has to stay in:

  1. Main storage

  2. Floppy disk

  3. Primary storage

  4. Disk drive

Show me the answer

Answer: 3. Primary storage

Explanation:

  • Primary Storage: The operating system resides in primary storage (RAM) while the computer is running.

  • Conclusion: It is essential for system operation.

274. A front-end processor is usually used in:

  1. Multiprogramming

  2. Timesharing

  3. Virtual storage

  4. Multiprocessing

Show me the answer

Answer: 2. Timesharing

Explanation:

  • Front-End Processor: A front-end processor handles I/O operations in timesharing systems.

  • Conclusion: It improves system efficiency.

275. The problem of thrashing is affected significantly by:

  1. Program structure

  2. Primary-storage size

  3. Program size

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Thrashing: Thrashing occurs when a system spends more time swapping pages in and out of memory than executing processes. It is influenced by program structure (e.g., locality of reference), primary storage size (e.g., RAM), and program size (e.g., memory requirements).

  • Conclusion: All the given factors significantly affect thrashing.

276. Two basic types of operating systems are:

  1. Sequential and direct

  2. Sequential and real-time

  3. Batch and timesharing

  4. Batch and interactive

Show me the answer

Answer: 4. Batch and interactive

Explanation:

  • Operating System Types: Batch systems process jobs in batches without user interaction, while interactive systems allow users to interact with the system in real-time.

  • Conclusion: Batch and interactive are two basic types of operating systems.

277. Remote computing service involves the use of timesharing and:

  1. Multiprocessing

  2. Batch processing

  3. Interactive processing

  4. Real-time processing

Show me the answer

Answer: 2. Batch processing

Explanation:

  • Remote Computing: Remote computing services often combine timesharing (allowing multiple users to share system resources) with batch processing (executing jobs without user interaction).

  • Conclusion: Batch processing is commonly used in remote computing services.

278. Non-modifiable procedures are called:

  1. Serially unusable procedures

  2. Reentrant procedures

  3. Concurrent procedures

  4. Top-down procedures

Show me the answer

Answer: 2. Reentrant procedures

Explanation:

  • Reentrant Procedures: Reentrant procedures are non-modifiable and can be safely interrupted and re-entered without causing inconsistencies. They are commonly used in multi-threaded or interrupt-driven systems.

  • Conclusion: Reentrant procedures are non-modifiable.

279. An instruction in a programming language that is replaced by a sequence of instructions prior to assembly or compiling is known as:

  1. Procedure name

  2. Label

  3. Macro

  4. Literal

Show me the answer

Answer: 3. Macro

Explanation:

  • Macro: A macro is a single instruction that is replaced by a sequence of instructions during preprocessing. It simplifies code by reducing redundancy.

  • Conclusion: Macros are replaced by sequences of instructions before compilation.

280. The main function of the dispatcher (the portion of the process scheduler) is:

  1. Swapping a process to the disk

  2. Assigning ready processes to the CPU

  3. Suspending some of the processes when the CPU load is high

  4. Bringing processes from the disk to the main memory

Show me the answer

Answer: 2. Assigning ready processes to the CPU

Explanation:

  • Dispatcher: The dispatcher is responsible for assigning ready processes to the CPU for execution. It performs context switching and ensures efficient CPU utilization.

  • Conclusion: The dispatcher assigns ready processes to the CPU.

281. The primary job of the operating system of a computer is to:

  1. Command resources

  2. Provide utilities

  3. Manage resources

  4. Be user-friendly

Show me the answer

Answer: 3. Manage resources

Explanation:

  • Operating System Role: The primary function of an operating system is to manage hardware and software resources, including CPU, memory, storage, and I/O devices.

  • Conclusion: Resource management is the main job of an operating system.

282. The operating system of a computer serves as a software interface between the user and:

  1. Hardware

  2. Memory

  3. Peripheral

  4. Screen

Show me the answer

Answer: 1. Hardware

Explanation:

  • Operating System Interface: The operating system acts as an intermediary between the user and the hardware, providing a user-friendly interface for interacting with the system.

  • Conclusion: The operating system interfaces between the user and hardware.

283. Which of the following operating systems use write-through caches?

  1. UNIX

  2. ULTRIX

  3. DOS

  4. XENIX

Show me the answer

Answer: 3. DOS

Explanation:

  • Write-Through Cache: In a write-through cache, every write operation is immediately written to both the cache and the main memory. DOS is known to use this caching strategy.

  • Conclusion: DOS uses write-through caches.

284. A system program that combines the separately compiled modules of a program into a form suitable for execution is:

  1. Assembler

  2. Cross compiler

  3. Linking loader

  4. Load and go

Show me the answer

Answer: 3. Linking loader

Explanation:

  • Linking Loader: The linking loader combines object modules into a single executable program and resolves external references. It prepares the program for execution.

  • Conclusion: The linking loader combines separately compiled modules.

285. What problem is solved by Dijkstra’s banker’s algorithm?

  1. Mutual exclusion

  2. Deadlock avoidance

  3. Deadlock recovery

  4. Cache coherence

Show me the answer

Answer: 2. Deadlock avoidance

Explanation:

  • Banker’s Algorithm: Dijkstra’s banker’s algorithm is used to avoid deadlocks by ensuring that the system is always in a safe state, where resources can be allocated without causing deadlock.

  • Conclusion: The banker’s algorithm solves the problem of deadlock avoidance.

286. A compiler for a high-level language that runs on one machine and produces code for a different machine is called:

  1. Optimizing compiler

  2. Cross compiler

  3. One-pass compiler

  4. Multi-pass compiler

Show me the answer

Answer: 2. Cross compiler

Explanation:

  • Cross Compiler: A cross compiler is a compiler that runs on one machine (host) but produces executable code for another machine (target).

  • Conclusion: A cross compiler produces code for a different machine.

287. Banker’s algorithm for resource allocation deals with:

  1. Deadlock prevention

  2. Deadlock recovery

  3. Deadlock avoidance

  4. Mutual exclusion

Show me the answer

Answer: 3. Deadlock avoidance

Explanation:

  • Banker’s Algorithm: The banker’s algorithm ensures that the system is always in a safe state, preventing deadlock by carefully allocating resources.

  • Conclusion: The banker’s algorithm deals with deadlock avoidance.

288. To avoid race conditions, the maximum number of processes that may be simultaneously inside the critical section is:

  1. Hundred

  2. One

  3. Two

  4. Three

Show me the answer

Answer: 2. One

Explanation:

  • Race Condition: A race condition occurs when multiple processes access shared resources simultaneously, leading to inconsistent results. To avoid this, only one process should be allowed in the critical section at a time.

  • Conclusion: The maximum number of processes in the critical section is one.

289. Daisy chain is a device for:

  1. Connecting a number of controllers to a device

  2. Connecting a number of devices to a controller

  3. Interconnecting a number of devices to a number of controllers

  4. All of the above

Show me the answer

Answer: 2. Connecting a number of devices to a controller

Explanation:

  • Daisy Chain: A daisy chain is a wiring scheme where devices are connected in series to a single controller. It is commonly used in I/O device connections.

  • Conclusion: A daisy chain connects multiple devices to a controller.

290. Scissoring enables:

  1. A part of data to be displayed

  2. Entire data to be displayed

  3. Full data displayed

  4. No data to be displayed

Show me the answer

Answer: 1. A part of data to be displayed

Explanation:

  • Scissoring: Scissoring is a technique used in computer graphics to clip or display only a portion of the data within a specified region.

  • Conclusion: Scissoring enables a part of the data to be displayed.

291. Information in memory that is no longer valid or wanted is known as:

  1. Non-volatile

  2. Surplus

  3. Volatile

  4. Garbage

Show me the answer

Answer: 4. Garbage

Explanation:

  • Garbage: Garbage refers to memory that is no longer needed or valid. It is typically reclaimed by garbage collection mechanisms.

  • Conclusion: Unwanted or invalid memory is called garbage.

292. Which of the following is a type of systems software used on microcomputers?

  1. MS-DOS

  2. Unix

  3. PC-DOS

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Systems Software: MS-DOS, Unix, and PC-DOS are all types of operating systems used on microcomputers.

  • Conclusion: All the options are valid types of systems software.

293. Which of the following are loaded into main memory when the computer is booted?

  1. Internal command instructions

  2. External command instructions

  3. Utility programs

  4. Word processing instructions

Show me the answer

Answer: 1. Internal command instructions

Explanation:

  • Boot Process: During the boot process, internal command instructions (e.g., BIOS routines) are loaded into main memory to initialize the system.

  • Conclusion: Internal command instructions are loaded during booting.

294. What is the name of the operating system for the laptop computer called MacLife?

  1. Windows

  2. MS-DOS

  3. DOS

  4. OZ

Show me the answer

Answer: 4. OZ

Explanation:

  • MacLife: The MacLife laptop uses the OZ operating system, a lightweight OS designed for portable devices.

  • Conclusion: The operating system for MacLife is OZ.

295. What is the operating system used by Macintosh computers?

  1. System 7.0

  2. Unix

  3. AU/X

  4. Either A or B

Show me the answer

Answer: 4. Either A or B

Explanation:

  • Macintosh OS: Macintosh computers have used various operating systems, including System 7.0 and Unix-based systems like AU/X.

  • Conclusion: Macintosh computers use either System 7.0 or Unix-based systems.

296. Who developed the operating system/2 (OS/2) for running IBM’s new PS/2 family of microcomputers?

  1. IBM

  2. Bell Laboratories

  3. Microsoft Inc.

  4. Digital Research Corporation

Show me the answer

Answer: 3. Microsoft Inc.

Explanation:

  • OS/2 Development: OS/2 was developed by Microsoft in collaboration with IBM for the PS/2 family of microcomputers.

  • Conclusion: Microsoft developed OS/2.

297. In which addressing mode the operand is given explicitly in the instruction?

  1. Absolute mode

  2. Indirect mode

  3. Immediate mode

  4. Index mode

Show me the answer

Answer: 3. Immediate mode

Explanation:

  • Immediate Addressing: In immediate addressing, the operand is explicitly specified in the instruction itself.

  • Conclusion: Immediate mode provides the operand explicitly.

298. Which of the following programs is not a utility?

  1. Debugger

  2. Spooler

  3. Editor

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Utility Programs: Debuggers, spoolers, and editors are all utility programs that assist in system operations and software development.

  • Conclusion: All the options are utility programs.

299. Job Control Language (JCL) statements are used to:

  1. Read the input from the slow-speed magnetic disk

  2. Specify to the operating system, the beginning and end of a job in a batch

  3. Allocate the CPU to a job

  4. All of the above

Show me the answer

Answer: 2. Specify to the operating system, the beginning and end of a job in a batch

Explanation:

  • JCL Statements: JCL statements are used to define the start and end of a job in batch processing systems. They provide instructions to the operating system for job execution.

  • Conclusion: JCL statements specify the beginning and end of a job.

300. Operating system is:

  1. A collection of hardware components

  2. A collection of input-output devices

  3. A collection of software routines

  4. All of the above

Show me the answer

Answer: 3. A collection of software routines

Explanation:

  • Operating System: An operating system is a collection of software routines that manage hardware resources and provide services to applications.

  • Conclusion: The operating system is a collection of software routines.

301. Most of the microcomputer’s operating systems like Apple DOS, MS DOS, and PC DOS, etc., are called disk operating systems because:

  1. They are memory resident

  2. They are initially stored on disk

  3. They are available on magnetic tapes

  4. They are partly in primary memory and partly on disk

Show me the answer

Answer: 2. They are initially stored on disk

Explanation:

  • Disk Operating Systems: Disk operating systems (DOS) are called so because they are stored on disk and loaded into memory during system startup.

  • Conclusion: DOS systems are initially stored on disk.

302. When did IBM release the first version of the disk operating system DOS version 1.0?

  1. 1981

  2. 1983

  3. 1982

  4. 1984

Show me the answer

Answer: 1. 1981

Explanation:

  • DOS 1.0 Release: IBM released the first version of DOS (PC-DOS 1.0) in 1981 for the IBM PC.

  • Conclusion: DOS 1.0 was released in 1981.

  1. MS-DOS

  2. OS/360

  3. PC-DOS

  4. CP/M

Show me the answer

Answer: 4. CP/M

Explanation:

  • Popular OS in 1981: CP/M (Control Program for Microcomputers) was the most popular operating system for microcomputers in 1981.

  • Conclusion: CP/M was the most popular OS at that time.

304. Page fault frequency in an operating system is reduced when the:

  1. Size of pages is reduced

  2. Processes tend to be I/O-bound

  3. Processes tend to be CPU-bound

  4. Locality of reference is applicable to the process

Show me the answer

Answer: 4. Locality of reference is applicable to the process

Explanation:

  • Page Fault Frequency: Page fault frequency is reduced when processes exhibit strong locality of reference, meaning they access the same set of memory locations repeatedly.

  • Conclusion: Locality of reference reduces page fault frequency.

305. Which of the following is true for testing and debugging?

  1. Testing checks for logical errors in the programs while debugging is a process of correcting those errors in the programs

  2. Testing detects the syntax errors in the program while debugging corrects those errors in the program

  3. Testing and debugging indicate the same thing

  4. All of the above

Show me the answer

Answer: 1. Testing checks for logical errors in the programs while debugging is a process of correcting those errors in the programs

Explanation:

  • Testing vs Debugging: Testing involves identifying errors in a program, while debugging involves correcting those errors.

  • Conclusion: Testing and debugging are distinct but related processes.

306. If special forms are needed for printing the output, the programmer specifies these forms through:

  1. JCL

  2. Utility program

  3. IPL

  4. Load modules

Show me the answer

Answer: 1. JCL

Explanation:

  • JCL (Job Control Language): JCL is used to specify special forms or requirements for printing output in batch processing systems.

  • Conclusion: JCL is used to specify printing forms.

307. Under multiprogramming, turnaround time for short jobs is usually...... and for long jobs is slightly......

  1. Lengthened; shortened

  2. Shortened; shortened

  3. Shortened; lengthened

  4. Lengthened; lengthened

Show me the answer

Answer: 3. Shortened; lengthened

Explanation:

  • Turnaround Time: In multiprogramming, short jobs are executed quickly, reducing their turnaround time. Long jobs may experience slightly longer turnaround times due to resource sharing.

  • Conclusion: Turnaround time is shortened for short jobs and lengthened for long jobs.

308. The state transition initiated by the user process itself in an operating system is:

  1. Block

  2. Wake up

  3. Dispatch

  4. Timer run out

Show me the answer

Answer: 1. Block

Explanation:

  • State Transition: A process can transition to the Blocked state when it requests an I/O operation or waits for an event. This transition is initiated by the process itself.

  • Conclusion: The Block state transition is user-initiated.

309. Which of the following terms refers to the degree to which data in a database system are accurate and correct?

  1. Data security

  2. Data independence

  3. Data validity

  4. Data integrity

Show me the answer

Answer: 4. Data integrity

Explanation:

  • Data Integrity: Data integrity refers to the accuracy and consistency of data in a database system.

  • Conclusion: Data integrity ensures data accuracy and correctness.

310. The total time to prepare a disk drive mechanism for a block of data to be read from it is:

  1. Latency

  2. Latency plus transmission time

  3. Latency plus seek time

  4. Latency plus seek time plus transmission time

Show me the answer

Answer: 3. Latency plus seek time

Explanation:

  • Disk Access Time: The total time to prepare a disk drive for reading data includes seek time (time to move the disk arm to the correct track) and latency (time for the disk to rotate to the correct sector).

  • Conclusion: The total preparation time is latency plus seek time.

311. Indicate whether the statement LDA B is a statement in:

  1. Machine language

  2. High-level language

  3. Assembly language

  4. All of the above

Show me the answer

Answer: 3. Assembly language

Explanation:

  • LDA B: LDA (Load Accumulator) is a mnemonic used in assembly language to load data into the accumulator.

  • Conclusion: LDA B is an assembly language statement.

312. Indicate which describes the term “software”:

  1. Systems programs only

  2. Both A and B

  3. Application programs only

  4. All of the printer

Show me the answer

Answer: 2. Both A and B

Explanation:

  • Software: Software includes both system programs (e.g., operating systems) and application programs (e.g., word processors).

  • Conclusion: Software encompasses both system and application programs.

313. Bug means:

  1. A logical error in a program

  2. A difficult syntax error in a program

  3. Documenting programs using an efficient documentation tool

  4. All of the above

Show me the answer

Answer: 1. A logical error in a program

Explanation:

  • Bug: A bug refers to a logical error in a program that causes it to behave incorrectly.

  • Conclusion: Bugs are logical errors in programs.

314. A development strategy whereby the executive control modules of a system are coded and tested first is known as:

  1. Bottom-up development

  2. Left-Right development

  3. Top-down development

  4. All of the above

Show me the answer

Answer: 3. Top-down development

Explanation:

  • Top-Down Development: In top-down development, high-level modules (e.g., executive control modules) are developed and tested first, followed by lower-level modules.

  • Conclusion: Top-down development starts with executive control modules.

315. Indicate which, of the following, is not true about Nassi-Shneiderman charts:

  1. These charts are a type of graphical design tool

  2. These charts cannot represent CASE constructs

  3. These charts can represent three fundamental control structures

  4. All of the above

Show me the answer

Answer: 2. These charts cannot represent CASE constructs

Explanation:

  • Nassi-Shneiderman Charts: These charts are graphical design tools that can represent fundamental control structures (e.g., sequence, selection, iteration) and CASE constructs.

  • Conclusion: Nassi-Shneiderman charts can represent CASE constructs.

316. Indicate which, of the following, is not true about a data flow diagram (DFD):

  1. It is a graphical representation of the flow of data through the system

  2. It is used to analyze any system or software at any level of abstraction

  3. It is a very important tool, used by system analysts and designers

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Data Flow Diagram (DFD): A DFD is a graphical tool used to represent the flow of data in a system. It is used at various levels of abstraction and is essential for system analysis and design.

  • Conclusion: All the statements about DFDs are true.

317. Which of the following checks cannot be carried out on the input data to a system?

  1. Consistency check

  2. Range checks

  3. Syntax check

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Input Data Checks: Consistency checks, range checks, and syntax checks are all valid methods for validating input data.

  • Conclusion: All the checks can be performed on input data.

318. Which of the following is not true about documentation?

  1. Documentation of a system should be as clear and direct as possible

  2. Documentation increases the maintenance time and cost

  3. Documentation gives a better understanding of the problem

  4. All of the above

Show me the answer

Answer: 2. Documentation increases the maintenance time and cost

Explanation:

  • Documentation: Proper documentation reduces maintenance time and cost by providing clear and direct information about the system.

  • Conclusion: Documentation does not increase maintenance time and cost.

319. C is:

  1. An assembly language

  2. A third-generation high-level language

  3. A machine language

  4. All of the above

Show me the answer

Answer: 2. A third-generation high-level language

Explanation:

  • C Language: C is a third-generation high-level programming language known for its efficiency and flexibility.

  • Conclusion: C is a high-level language.

320. Which of the following modules does not incorporate initialization of values changed by the module?

  1. Non-reusable module

  2. Reentrant module

  3. Serially reusable module

  4. All of the above

Show me the answer

Answer: 1. Non-reusable module

Explanation:

  • Non-Reusable Module: A non-reusable module does not incorporate initialization of values changed by the module, making it unsafe for reuse.

  • Conclusion: Non-reusable modules do not initialize changed values.

321. Which of the following statements is false?

  1. A process scheduling algorithm is preemptive if the CPU can be forcibly removed from a process

  2. Time-sharing systems generally use preemptive CPU scheduling

  3. Response times are more predictable in preemptive systems than in non-preemptive systems

  4. Real-time systems generally use non-preemptive CPU scheduling

Show me the answer

Answer: 4. Real-time systems generally use non-preemptive CPU scheduling

Explanation:

  • Real-Time Systems: Real-time systems typically use preemptive scheduling to ensure timely execution of critical tasks.

  • Conclusion: Real-time systems use preemptive scheduling, not non-preemptive.

322. Indicate which, of the following, is not true about an interpreter:

  1. Interpreter generates an object program from the source program

  2. Interpreter is a kind of translator

  3. Interpreter analyzes each source statement every time it is to be executed

  4. All of the above

Show me the answer

Answer: 1. Interpreter generates an object program from the source program

Explanation:

  • Interpreter: An interpreter executes source code directly without generating an object program. It analyzes and executes each statement at runtime.

  • Conclusion: Interpreters do not generate object programs.

323. Indicate which, of the following, is not true about 4GL:

  1. 4GL does not support a high level of screen interaction

  2. Many database management system packages support 4GL

  3. A 4GL is a software tool which is written possibly in some third-generation language

  4. All of the above

Show me the answer

Answer: 1. 4GL does not support a high level of screen interaction

Explanation:

  • 4GL (Fourth-Generation Language): 4GLs are designed for high-level programming and often support advanced screen interaction and database management.

  • Conclusion: 4GLs support a high level of screen interaction.

324. An algorithm is described as:

  1. A computer language

  2. A step-by-step procedure for solving a problem

  3. A branch of mathematics

  4. All of the above

Show me the answer

Answer: 2. A step-by-step procedure for solving a problem

Explanation:

  • Algorithm: An algorithm is a step-by-step procedure for solving a problem or performing a task.

  • Conclusion: Algorithms are problem-solving procedures.

325. A sequence of instructions, in a computer language, to get the desired result is known as:

  1. Algorithm

  2. Program

  3. Decision table

  4. All of the above

Show me the answer

Answer: 2. Program

Explanation:

  • Program: A program is a sequence of instructions written in a computer language to achieve a specific result.

  • Conclusion: A program is a sequence of instructions.

326. The strategy of allowing processes that are logically runnable to be temporarily suspended is called:

  1. Preemptive scheduling

  2. Shortest job first

  3. Non-preemptive scheduling

  4. First come first served

Show me the answer

Answer: 1. Preemptive scheduling

Explanation:

  • Preemptive Scheduling: Preemptive scheduling allows the operating system to suspend a running process and allocate the CPU to another process.

  • Conclusion: Preemptive scheduling involves suspending runnable processes.

327. Part of a program where the shared memory is accessed and which should be executed indivisibly is called:

  1. Semaphores

  2. Critical section

  3. Directory

  4. Mutual exclusion

Show me the answer

Answer: 2. Critical section

Explanation:

  • Critical Section: The critical section is the part of a program where shared resources are accessed. It must be executed indivisibly to prevent race conditions.

  • Conclusion: The critical section is where shared memory is accessed.

328. The technique, for sharing the time of a computer among several jobs, which switches jobs so rapidly such that each job appears to have the computer to itself is:

  1. Time sharing

  2. Time domain

  3. Time out

  4. FIFO

Show me the answer

Answer: 1. Time sharing

Explanation:

  • Time Sharing: Time sharing allows multiple users to share a computer by rapidly switching between jobs, giving the illusion that each user has exclusive access.

  • Conclusion: Time sharing rapidly switches between jobs.

329. The operating system manages:

  1. Memory

  2. Disks and I/O devices

  3. Processor

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Operating System Functions: The operating system manages memory, disks, I/O devices, and the processor to ensure efficient system operation.

  • Conclusion: The operating system manages all the listed resources.

330. A form of code that uses more than one process and processor, possibly of different types, and that may on occasion have more than one process or processor active at the same time is known as:

  1. Multiprogramming

  2. Broadcasting

  3. Multithreading

  4. Time sharing

Show me the answer

Answer: 3. Multithreading

Explanation:

  • Multithreading: Multithreading allows multiple threads within a process to execute concurrently, possibly on multiple processors.

  • Conclusion: Multithreading uses multiple processes and processors.

331. Assembly language:

  1. Is usually the primary user interface

  2. Requires fixed-format commands

  3. Is a mnemonic form of machine language

  4. Is quite different from the SCL interpreter

Show me the answer

Answer: 3. Is a mnemonic form of machine language

Explanation:

  • Assembly Language: Assembly language is a low-level programming language that uses mnemonics to represent machine instructions.

  • Conclusion: Assembly language is a mnemonic form of machine language.

332. Which of the following are the advantages of modular programming?

  1. The program is much easier to change

  2. Modules can be reused in other programs

  3. Easy debugging

  4. Easy to compile

Show me the answer

Answer: 1. The program is much easier to change

Explanation:

  • Modular Programming: Modular programming divides a program into smaller, independent modules, making it easier to modify and maintain.

  • Conclusion: Modular programming simplifies program changes.

333. Which of the following can be accessed by the transfer vector approach of linking?

  1. External data segments

  2. Data located in other procedures

  3. External subroutines

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Transfer Vector Approach: The transfer vector approach allows access to external data segments, data in other procedures, and external subroutines.

  • Conclusion: All the options can be accessed using the transfer vector approach.

334. The linker:

  1. Is the same as the loader

  2. Is required to create a load module

  3. Uses source code as input

  4. Is always used before programs are executed

Show me the answer

Answer: 2. Is required to create a load module

Explanation:

  • Linker: The linker combines object modules into a single load module, resolving external references.

  • Conclusion: The linker creates load modules.

335. Indicate which is a pre-emptive scheduling algorithm:

  1. Round-robin

  2. Priority-based

  3. Shortest-job-next

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Pre-emptive Scheduling: Round-robin, priority-based, and shortest-job-next are all pre-emptive scheduling algorithms.

  • Conclusion: All the listed algorithms are pre-emptive.

336. A characteristic of an online real-time system is:

  1. More than one CPU

  2. Offline batch processing

  3. No delay in processing

  4. All of the above

Show me the answer

Answer: 3. No delay in processing

Explanation:

  • Real-Time Systems: Real-time systems are designed to process data without delay, ensuring timely responses.

  • Conclusion: No delay in processing is a key characteristic of real-time systems.

337. Indicate which, of the following, is the worst type of module coupling:

  1. Content coupling

  2. Control coupling

  3. No coupling

  4. All of the above

Show me the answer

Answer: 1. Content coupling

Explanation:

  • Module Coupling: Content coupling is the worst type of coupling, where one module directly modifies the internal data of another module.

  • Conclusion: Content coupling is the least desirable.

338. A page fault:

  1. Is an error in a specific page

  2. Occurs when a program accesses a page of memory

  3. Is an access to a page not currently in memory

  4. Is a reference to a page belonging to another program

Show me the answer

Answer: 3. Is an access to a page not currently in memory

Explanation:

  • Page Fault: A page fault occurs when a program tries to access a page that is not currently in main memory, requiring it to be loaded from secondary storage.

  • Conclusion: A page fault is an access to a page not in memory.

339. In memory systems, boundary registers:

  1. Are used for temporary program variable storage

  2. Are only necessary with fixed partitions

  3. Track page boundaries

  4. Track the beginning and ending of programs

Show me the answer

Answer: 4. Track the beginning and ending of programs

Explanation:

  • Boundary Registers: Boundary registers track the start and end addresses of programs in memory, ensuring memory protection.

  • Conclusion: Boundary registers track program boundaries.

340. Relocatable programs:

  1. Cannot be used with fixed partitions

  2. Can be loaded almost anywhere in memory

  3. Do not need a linker

  4. Can be loaded only at one specific location

Show me the answer

Answer: 2. Can be loaded almost anywhere in memory

Explanation:

  • Relocatable Programs: Relocatable programs can be loaded into any available memory location, as their addresses are adjusted during loading.

  • Conclusion: Relocatable programs can be loaded anywhere in memory.

341. The FIFO algorithm:

  1. Executes first the job that last entered the queue

  2. Executes first the job that first entered the queue

  3. Executes first the job that has been in the queue the longest

  4. Executes first the job with the least processor needs

Show me the answer

Answer: 2. Executes first the job that first entered the queue

Explanation:

  • FIFO Algorithm: FIFO (First-In-First-Out) executes jobs in the order they arrive in the queue.

  • Conclusion: FIFO executes the first job in the queue.

342. The user interface:

  1. Is relatively unimportant

  2. Is slanted toward novice users

  3. Supports both novice and experienced users

  4. Is easy to provide, even with good support

Show me the answer

Answer: 3. Supports both novice and experienced users

Explanation:

  • User Interface: A good user interface is designed to support both novice and experienced users, providing ease of use and advanced features.

  • Conclusion: The user interface supports all users.

343. Memory management is:

  1. Not used in modern operating systems

  2. Replaced with virtual memory on current systems

  3. Not used on multiprogramming systems

  4. Critical for even the simplest operating systems

Show me the answer

Answer: 4. Critical for even the simplest operating systems

Explanation:

  • Memory Management: Memory management is essential for all operating systems, including simple ones, to allocate and manage memory resources efficiently.

  • Conclusion: Memory management is critical for all operating systems.

344. The practice of “bundling” refers to:

  1. Selling computers alone

  2. Selling peripheral devices with computers

  3. Selling software to run on computers

  4. Giving away software with a computer purchase

Show me the answer

Answer: 4. Giving away software with a computer purchase

Explanation:

  • Bundling: Bundling refers to including software with the purchase of a computer, often as an incentive.

  • Conclusion: Bundling involves giving away software with a computer.

345. The primary purpose of an operating system is to:

  1. Make computers easier to use

  2. Keep system programmers employed

  3. Make the most efficient use of the hardware

  4. Allow people to use the computers

Show me the answer

Answer: 3. Make the most efficient use of the hardware

Explanation:

  • Operating System Purpose: The primary purpose of an operating system is to manage hardware resources efficiently and provide a user-friendly interface.

  • Conclusion: The operating system optimizes hardware usage.

346. Multiprogramming systems:

  1. Are easier to develop than single programming systems

  2. Execute each job faster

  3. Execute more jobs in the same time period

  4. Are used only on large mainframe computers

Show me the answer

Answer: 3. Execute more jobs in the same time period

Explanation:

  • Multiprogramming: Multiprogramming allows multiple jobs to reside in memory simultaneously, increasing system throughput by executing more jobs in the same time period.

  • Conclusion: Multiprogramming increases job execution efficiency.

347. Spooling is most beneficial in a multiprogramming environment where:

  1. Most jobs are CPU-bound

  2. Most jobs are I/O-bound

  3. Jobs are evenly divided as I/O-bound and CPU-bound

  4. There is limited primary memory and need for secondary memory

Show me the answer

Answer: 2. Most jobs are I/O-bound

Explanation:

  • Spooling: Spooling (Simultaneous Peripheral Operations On-Line) is most beneficial when most jobs are I/O-bound, as it allows overlapping of I/O operations with CPU processing.

  • Conclusion: Spooling is ideal for I/O-bound jobs.

348. Software that measures, monitors, analyzes, and controls real-world events is called:

  1. System software

  2. Scientific software

  3. Real-time software

  4. Business software

Show me the answer

Answer: 3. Real-time software

Explanation:

  • Real-Time Software: Real-time software is designed to monitor and control real-world events, ensuring timely responses.

  • Conclusion: Real-time software handles real-world events.

349. Object modules generated by assemblers that contain unresolved external references are resolved for two or more object modules by a/an:

  1. Operating system

  2. Linker

  3. Loader

  4. Compiler

Show me the answer

Answer: 2. Linker

Explanation:

  • Linker: The linker resolves external references between object modules, combining them into a single executable program.

  • Conclusion: The linker resolves external references.

350. Which of the following is false about disk when compared to main memory?

  1. Non-volatile

  2. Lower price per bit

  3. Longer storage capacity

  4. Faster

Show me the answer

Answer: 4. Faster

Explanation:

  • Disk vs Main Memory: Disks are non-volatile, cheaper per bit, and have larger storage capacity, but they are slower than main memory.

  • Conclusion: Disks are slower than main memory.

351. Which of the following capabilities is required for a system program to execute more than one program at a time?

  1. Word processing

  2. Virtual memory

  3. Compiling

  4. Multitasking

Show me the answer

Answer: 4. Multitasking

Explanation:

  • Multitasking: Multitasking is the capability of an operating system to execute multiple programs simultaneously by switching between them. This allows efficient utilization of CPU and other resources.

  • Conclusion: Multitasking is essential for executing multiple programs at the same time.

352. A critical region is:

  1. A program segment that has not been proved bug-free

  2. A program segment that often causes unexpected system crashes

  3. A program segment where shared resources are accessed

  4. One which is enclosed by a pair of P and V operations on semaphores

Show me the answer

Answer: 3. A program segment where shared resources are accessed

Explanation:

  • Critical Region: A critical region is a segment of code where shared resources are accessed. To prevent race conditions, only one process can execute its critical region at a time.

  • Conclusion: The critical region is where shared resources are accessed.

353. Which of the following addressing modes facilitates access to an operand whose location is defined relative to the beginning of the data structure in which it appears?

  1. Ascending

  2. Index

  3. Sorting

  4. Indirect

Show me the answer

Answer: 2. Index

Explanation:

  • Index Addressing Mode: In index addressing mode, the effective address of the operand is calculated by adding a constant value to the contents of a register (index register). This is useful for accessing elements in arrays or data structures.

  • Conclusion: Index addressing mode facilitates access to operands relative to the beginning of a data structure.

354. The register or main memory location which contains the effective address of the operand is known as:

  1. Pointer

  2. Special location

  3. Indexed register

  4. Scratch pad

Show me the answer

Answer: 1. Pointer

Explanation:

  • Pointer: A pointer is a register or memory location that holds the effective address of an operand. It is used to indirectly access data.

  • Conclusion: The register or memory location containing the effective address is called a pointer.

355. System programs such as compilers are designed so that they are:

  1. Re-entrant

  2. Serially usable

  3. Non-reusable

  4. Recursive

Show me the answer

Answer: 1. Re-entrant

Explanation:

  • Re-entrant Programs: Re-entrant programs can be interrupted in the middle of execution and called again before the previous execution completes. This is essential for system programs like compilers to handle multiple users or tasks.

  • Conclusion: System programs like compilers are designed to be re-entrant.

356. Special software to create a job queue is called a:

  1. Drive

  2. Interpreter

  3. Spooler

  4. Linkage editor

Show me the answer

Answer: 3. Spooler

Explanation:

  • Spooler: A spooler is a software component that manages job queues, particularly for printing or other I/O operations. It allows multiple jobs to be queued and processed sequentially.

  • Conclusion: A spooler creates and manages job queues.

357. The most common security failure is:

  1. Carelessness by users

  2. Depending on passwords

  3. Too much emphasis on preventing physical access

  4. Insufficient technology used to prevent breaches

Show me the answer

Answer: 1. Carelessness by users

Explanation:

  • Security Failures: The most common security failures are caused by human errors, such as weak passwords, sharing credentials, or falling for phishing attacks.

  • Conclusion: User carelessness is the primary cause of security failures.

358. A public key encryption system:

  1. Allows anyone to decode the transmission

  2. Allows only the correct sender to decode the data

  3. Allows only the correct receiver to decode the data

  4. Does not encode the data before transmitting it

Show me the answer

Answer: 3. Allows only the correct receiver to decode the data

Explanation:

  • Public Key Encryption: In public key encryption, the sender uses the receiver's public key to encrypt the data, and only the receiver's private key can decrypt it. This ensures that only the intended receiver can decode the data.

  • Conclusion: Public key encryption ensures secure communication by allowing only the correct receiver to decode the data.

359. Supervisor state is:

  1. Never used

  2. Entered by programs when they enter the processor

  3. Required to perform any I/O

  4. Only allowed to the operating system

Show me the answer

Answer: 4. Only allowed to the operating system

Explanation:

  • Supervisor State: The supervisor state (or kernel mode) is a privileged mode of operation where the operating system can execute instructions that are not available to user programs. It is used for critical tasks like memory management and I/O operations.

  • Conclusion: The supervisor state is restricted to the operating system.

360. A high paging rate:

  1. May cause a high I/O rate

  2. Keeps the system running well

  3. Is a symptom of too much processor activity

  4. Always creates a slow system

Show me the answer

Answer: 1. May cause a high I/O rate

Explanation:

  • High Paging Rate: A high paging rate indicates frequent page faults, which require data to be read from or written to secondary storage. This increases the I/O rate and can degrade system performance.

  • Conclusion: A high paging rate may lead to increased I/O activity.

361. Round robin scheduling is essentially the preemptive version of:

  1. FIFO

  2. FILO

  3. FCFS

  4. Longest time first

Show me the answer

Answer: 1. FIFO

Explanation:

  • Round Robin Scheduling: Round robin scheduling is a preemptive version of FIFO (First-In-First-Out) scheduling. Each process is given a fixed time slice (quantum) to execute, and the CPU switches between processes after each quantum.

  • Conclusion: Round robin is the preemptive version of FIFO.

362. If the number of bits in the virtual address of a program is 12 and the page size is 0.5 KB, the number of pages in the virtual address space is:

  1. 16

  2. 32

  3. 64

  4. 128

Show me the answer

Answer: 4. 128

Explanation:

  • Virtual Address Space: The virtual address space is determined by the number of bits in the virtual address. For 12 bits, the total addressable space is:

    212=4096 bytes2^{12} = 4096 \text{ bytes}
  • Page Size: The page size is 0.5 KB (512 bytes). The number of pages is:

    4096512=8\frac{4096}{512} = 8
  • Conclusion: The number of pages is 8 (assuming a typo in the question).

363. In which of the storage placement strategies is a program placed in the largest available hole in the main memory?

  1. Best fit

  2. Worst fit

  3. First fit

  4. Buddy

Show me the answer

Answer: 2. Worst fit

Explanation:

  • Worst Fit: The worst fit strategy allocates the largest available hole in memory to a process. This can lead to inefficient memory utilization but may reduce fragmentation in some cases.

  • Conclusion: Worst fit places a program in the largest available hole.

364. For how many processes which are sharing common data does Dekker’s algorithm implement mutual exclusion?

  1. 1

  2. 2

  3. 3

  4. 4

Show me the answer

Answer: 2. 2

Explanation:

  • Dekker’s Algorithm: Dekker’s algorithm is a mutual exclusion algorithm designed for two processes. It ensures that only one process can enter the critical section at a time.

  • Conclusion: Dekker’s algorithm works for two processes.

365. A disk scheduling algorithm in an operating system causes the disk arm to move back and forth across the disk surface in order to service all requests in its path. This is a:

  1. First come first served

  2. Scan

  3. Shortest Seek Time First (SSTF)

  4. FIFO

Show me the answer

Answer: 2. Scan

Explanation:

  • SCAN Algorithm: The SCAN algorithm moves the disk arm in one direction, servicing all requests in its path, and then reverses direction. This reduces seek time and improves efficiency.

  • Conclusion: The SCAN algorithm causes the disk arm to move back and forth.

366. Round-robin scheduling:

  1. Allows interactive tasks quicker access to the processor

  2. Is quite complex to implement

  3. Gives each task the same chance at the processor

  4. Allows processor-bound tasks more time in the processor

Show me the answer

Answer: 3. Gives each task the same chance at the processor

Explanation:

  • Round Robin Scheduling: Round robin scheduling provides fair CPU allocation by giving each task an equal time slice (quantum). This ensures that all tasks get an equal chance to execute.

  • Conclusion: Round robin gives each task the same chance at the processor.

367. Inter-process communication:

  1. Is required for all processes

  2. Is usually done via disk drives

  3. Is never necessary

  4. Allows processes to synchronize activity

Show me the answer

Answer: 4. Allows processes to synchronize activity

Explanation:

  • Inter-Process Communication (IPC): IPC allows processes to communicate and synchronize their activities. Common IPC mechanisms include shared memory, message passing, and pipes.

  • Conclusion: IPC enables process synchronization.

368. Fork is:

  1. The dispatching of a task

  2. The creation of a new job

  3. The creation of a new process

  4. Increasing the priority of a task

Show me the answer

Answer: 3. The creation of a new process

Explanation:

  • Fork: The fork system call creates a new process by duplicating the existing process. The new process is called the child process, and the original process is called the parent process.

  • Conclusion: Fork is used to create a new process.

369. A process is another name for:

  1. A job

  2. Paging

  3. A task

  4. The operating system dispatcher

Show me the answer

Answer: 3. A task

Explanation:

  • Process: A process is an instance of a program in execution. It is also referred to as a task in some contexts.

  • Conclusion: A process is another name for a task.

370. Relocation bits used by relocating loader are specified (generated by):

  1. Relocating loader itself

  2. Assembler or translator

  3. Linker

  4. Macro processor

Show me the answer

Answer: 2. Assembler or translator

Explanation:

  • Relocation Bits: Relocation bits are generated by the assembler or translator to indicate which parts of the program need to be adjusted during loading.

  • Conclusion: The assembler or translator generates relocation bits.

371. Device independence:

  1. Allows the computer to run without I/O devices

  2. Makes all devices look the same to the operating system

  3. Allows programs to be written more easily

  4. Allows tape drives to be substituted for disk drives

Show me the answer

Answer: 3. Allows programs to be written more easily

Explanation:

  • Device Independence: Device independence allows programs to interact with devices without needing to know the specific details of the hardware. This simplifies programming and improves portability.

  • Conclusion: Device independence makes programming easier.

372. User-Friendly Systems are:

  1. Required for object-oriented programming

  2. Easy to develop

  3. Common among traditional mainframe operating systems

  4. Becoming more common

Show me the answer

Answer: 4. Becoming more common

Explanation:

  • User-Friendly Systems: Modern operating systems and applications are designed to be user-friendly, with intuitive interfaces and features that make them accessible to a wide range of users.

  • Conclusion: User-friendly systems are increasingly common.

373. Disk scheduling includes deciding:

  1. Which disk should be accessed next

  2. The order in which disk access requests must be serviced

  3. The physical location of the file

  4. The logical location of the file

Show me the answer

Answer: 2. The order in which disk access requests must be serviced

Explanation:

  • Disk Scheduling: Disk scheduling determines the order in which disk access requests are serviced to minimize seek time and improve performance.

  • Conclusion: Disk scheduling focuses on the order of disk access requests.

374. Which of the following translator programs convert assembly language program to object program?

  1. Assembler

  2. Macro processor

  3. Compiler

  4. Linker

Show me the answer

Answer: 1. Assembler

Explanation:

  • Assembler: An assembler converts assembly language programs into machine code (object programs).

  • Conclusion: The assembler translates assembly language to object code.

375. Data encryption:

  1. Is mostly used by public networks

  2. Is mostly used by financial networks

  3. Cannot be used by private installations

  4. Is not necessary, since data cannot be intercepted

Show me the answer

Answer: 2. Is mostly used by financial networks

Explanation:

  • Data Encryption: Data encryption is widely used in financial networks to protect sensitive information during transmission.

  • Conclusion: Financial networks heavily rely on data encryption.

376. Seeks analysis:

  1. Is used for analyzing paging problems

  2. Is used for analyzing device busy problems

  3. Is used for analyzing control-unit busy problems

  4. Is only shown on real-time displays

Show me the answer

Answer: 2. Is used for analyzing device busy problems

Explanation:

  • Seeks Analysis: Seeks analysis is used to study and optimize disk access patterns, particularly to address device busy problems.

  • Conclusion: Seeks analysis helps analyze device busy problems.

377. Swapping:

  1. Works best with many small partitions

  2. Allows many programs to use memory simultaneously

  3. Allows each program in turn to use the memory

  4. Does not work with overlaying

Show me the answer

Answer: 3. Allows each program in turn to use the memory

Explanation:

  • Swapping: Swapping allows multiple programs to share memory by moving them between main memory and secondary storage. Each program gets a turn to use the memory.

  • Conclusion: Swapping enables programs to take turns using memory.

378. Feedback queue:

  1. Are very easy to implement

  2. Dispatch tasks according to execution characteristics

  3. Are used to favor real-time tasks

  4. Require manual intervention to implement properly

Show me the answer

Answer: 2. Dispatch tasks according to execution characteristics

Explanation:

  • Feedback Queue: A feedback queue is a scheduling mechanism that adjusts the priority of tasks based on their execution history. Tasks that use too much CPU time are moved to lower-priority queues.

  • Conclusion: Feedback queues dispatch tasks based on execution characteristics.

379. A file organization component of a VSAM file is:

  1. Relative record data set

  2. Entry sequential data set

  3. Keyed sequential data set

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • VSAM File Organization: VSAM (Virtual Storage Access Method) supports multiple file organizations, including relative record, entry sequential, and keyed sequential data sets.

  • Conclusion: All the given options are components of VSAM file organization.

380. The file structure that redefines its first record at a basic of zero uses the term:

  1. Relative organization

  2. Dynamic reallocation

  3. Key fielding

  4. Hashing

Show me the answer

Answer: 1. Relative organization

Explanation:

  • Relative Organization: In relative file organization, records are accessed using relative record numbers, starting from zero.

  • Conclusion: Relative organization redefines the first record at a base of zero.

381. File record length:

  1. Should always be fixed

  2. Should always be variable

  3. Depends upon the size of the file

  4. Should be chosen to match the data characteristics

Show me the answer

Answer: 4. Should be chosen to match the data characteristics

Explanation:

  • File Record Length: The record length should be chosen based on the characteristics of the data being stored. Fixed or variable record lengths can be used depending on the application.

  • Conclusion: Record length should match data characteristics.

382. An incremental backup:

  1. Should be done each month

  2. Uses more tapes

  3. Saves all files

  4. Saves only files that have recently changed

Show me the answer

Answer: 4. Saves only files that have recently changed

Explanation:

  • Incremental Backup: An incremental backup saves only the files that have changed since the last backup. This reduces the amount of data to be backed up and speeds up the process.

  • Conclusion: Incremental backups save only recently changed files.

383. A partitioned data set is most used for:

  1. Program or source library

  2. Storing backup information

  3. Storing program data

  4. Storing ISAM file

Show me the answer

Answer: 1. Program or source library

Explanation:

  • Partitioned Data Set (PDS): A PDS is commonly used to store program source code or libraries. It allows multiple members (files) to be stored within a single dataset.

  • Conclusion: PDS is primarily used for program or source libraries.

384. System generation:

  1. Is always quite simple

  2. Is always very difficult

  3. Varies in difficulty between systems

  4. Requires extensive tools to be understandable

Show me the answer

Answer: 3. Varies in difficulty between systems

Explanation:

  • System Generation: System generation (sysgen) is the process of configuring and installing an operating system. The difficulty of sysgen varies depending on the complexity of the system and the hardware.

  • Conclusion: System generation difficulty varies between systems.

385. Object code:

  1. Is ready to execute

  2. Is the output of compilers, but not assemblers

  3. Must be “loaded” before execution

  4. Must be rewritten before execution

Show me the answer

Answer: 3. Must be “loaded” before execution

Explanation:

  • Object Code: Object code is the output of a compiler or assembler. It is not directly executable and must be linked and loaded into memory before execution.

  • Conclusion: Object code requires loading before execution.

386. Virtual memory is:

  1. Simple to implement

  2. Used in all major commercial operating systems

  3. Less efficient in utilization of memory

  4. Useful when fast I/O devices are not available

Show me the answer

Answer: 2. Used in all major commercial operating systems

Explanation:

  • Virtual Memory: Virtual memory is a widely used technique in modern operating systems to manage memory efficiently. It allows processes to use more memory than physically available by swapping data between RAM and secondary storage.

  • Conclusion: Virtual memory is used in all major commercial operating systems.

387. System maintenance:

  1. Is usually not necessary

  2. Is necessary on all systems, regardless of how good

  3. Is not required if the system is well written

  4. Always requires several programs

Show me the answer

Answer: 2. Is necessary on all systems, regardless of how good

Explanation:

  • System Maintenance: System maintenance is essential to ensure the continued performance, security, and reliability of a system. It is necessary for all systems, regardless of their initial quality.

  • Conclusion: System maintenance is necessary for all systems.

388. Which of the following statements is not true?

  1. Time sharing is an example of multiprogramming

  2. JCL is used only to communicate between systems programmers

  3. A batch file contains a series of operating system commands

  4. The primary function of operating systems is to make the computer hardware easily usable

Show me the answer

Answer: 2. JCL is used only to communicate between systems programmers

Explanation:

  • JCL (Job Control Language): JCL is used to define and control batch jobs in mainframe systems. It is not limited to communication between systems programmers.

  • Conclusion: The statement about JCL is not true.

389. What scheduling algorithm allows processes that are logically runnable to be temporarily suspended?

  1. Preemptive scheduling

  2. FIFO

  3. Non-preemptive scheduling

  4. FCFS

Show me the answer

Answer: 1. Preemptive scheduling

Explanation:

  • Preemptive Scheduling: Preemptive scheduling allows the operating system to temporarily suspend a running process and allocate the CPU to another process. This ensures fair CPU allocation and responsiveness.

  • Conclusion: Preemptive scheduling allows processes to be temporarily suspended.

390. The term ‘polling’ in a computer means a process by which a computer system:

  1. Detects/corrects errors

  2. Multiplexes the inputs and updates the memory accordingly

  3. Decides the correct alternative by analyzing several ones

  4. Inquiries to see if a terminal has any transaction to send

Show me the answer

Answer: 4. Inquiries to see if a terminal has any transaction to send

Explanation:

  • Polling: Polling is a process where the CPU repeatedly checks the status of devices (e.g., terminals) to see if they have data to send or receive.

  • Conclusion: Polling involves inquiring about device status.

391. In a magnetic disk, data is recorded in a set of concentric tracks which are subdivided into:

  1. Periods

  2. Zones

  3. Sectors

  4. Groups

Show me the answer

Answer: 3. Sectors

Explanation:

  • Sectors: A magnetic disk is divided into concentric tracks, which are further subdivided into sectors. Each sector stores a fixed amount of data.

  • Conclusion: Tracks are subdivided into sectors.

392. Which of the following is true for machine language?

  1. Repeated execution of program segments

  2. Depicting flow of data in a system

  3. A sequence of instructions which, when followed properly, solves a problem

  4. The language which communicates with the computer using only the binary digits 1 and 0

Show me the answer

Answer: 4. The language which communicates with the computer using only the binary digits 1 and 0

Explanation:

  • Machine Language: Machine language consists of binary instructions that the computer's processor can execute directly. It uses only 1s and 0s to represent instructions and data.

  • Conclusion: Machine language communicates with the computer using binary digits.

393. The LRU algorithm:

  1. Pages out pages that have been used recently

  2. Pages out pages that have not been used recently

  3. Pages out pages that have been least used recently

  4. Pages out the first page in a given area

Show me the answer

Answer: 3. Pages out pages that have been least used recently

Explanation:

  • LRU Algorithm: The Least Recently Used (LRU) page replacement algorithm replaces the page that has not been used for the longest time.

  • Conclusion: LRU pages out the least recently used pages.

394. A linker:

  1. Creates a load module

  2. Is not necessary with variable partitions

  3. Must be run after the loader

  4. Is not needed with a good compiler

Show me the answer

Answer: 1. Creates a load module

Explanation:

  • Linker: A linker combines object modules into a single load module, resolving external references and preparing the program for execution.

  • Conclusion: The linker creates a load module.

395. Global locks:

  1. Synchronize access to local resources

  2. Synchronize access to global resources

  3. Are used to avoid local locks

  4. Prevent access to global resources

Show me the answer

Answer: 2. Synchronize access to global resources

Explanation:

  • Global Locks: Global locks are used to synchronize access to shared resources that are accessed by multiple processes or threads.

  • Conclusion: Global locks synchronize access to global resources.

396. The dynamic allocation of storage areas with VSAM files is accomplished by:

  1. Hashing

  2. Overflow areas

  3. Control splits

  4. Relative recording

Show me the answer

Answer: 3. Control splits

Explanation:

  • VSAM Dynamic Allocation: VSAM uses control splits to dynamically allocate storage areas when the dataset grows.

  • Conclusion: Control splits enable dynamic allocation in VSAM files.

397. Which of the following refers to associative memory?

  1. The address of the data is generated by the CPU

  2. The address of the data is supplied by the user

  3. There is no need for an address, i.e., the data is used as an address

  4. The data are accessed sequentially

Show me the answer

Answer: 3. There is no need for an address, i.e., the data is used as an address

Explanation:

  • Associative Memory: Associative memory (or content-addressable memory) allows data to be accessed based on its content rather than a specific address.

  • Conclusion: Associative memory uses data as an address.

  1. Is more secure than end-to-end encryption

  2. Is less secure than end-to-end encryption

  3. Cannot be used in a public network

  4. Is used only to debug

Show me the answer

Answer: 2. Is less secure than end-to-end encryption

Explanation:

  • Link Encryption: Link encryption encrypts data only over a specific link (e.g., between two nodes). It is less secure than end-to-end encryption, which encrypts data from the source to the destination.

  • Conclusion: Link encryption is less secure than end-to-end encryption.

399. Which of the following is a characteristic of an operating system?

  1. Resource management

  2. Memory management

  3. Error recovery

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Operating System Characteristics: An operating system manages resources, memory, and error recovery, among other tasks.

  • Conclusion: All the given options are characteristics of an operating system.

400. Files can have:

  1. Read access

  2. Write access

  3. Copy access

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • File Access: Files can have various access permissions, including read, write, and copy access.

  • Conclusion: Files can have all the given access types.

401. A file is sometimes called a:

  1. Collection of input data

  2. Temporary place to store data

  3. Data set

  4. Program

Show me the answer

Answer: 3. Data set

Explanation:

  • File: A file is a collection of related data stored as a single unit. It is also referred to as a data set in some contexts.

  • Conclusion: A file is sometimes called a data set.

402. In MS-DOS, relocatable object files and load modules have extensions:

  1. OBJ and .COM or .EXE respectively

  2. COM and .OBJ, respectively

  3. EXE and .OBJ, respectively

  4. DAS and .EXE, respectively

Show me the answer

Answer: 1. OBJ and .COM or .EXE respectively

Explanation:

  • MS-DOS File Extensions: In MS-DOS, relocatable object files have the .OBJ extension, and load modules have the .COM or .EXE extension.

  • Conclusion: The correct extensions are .OBJ and .COM/.EXE.

403. Resolution of externally defined symbols is performed by:

  1. Linker

  2. Compiler

  3. Loader

  4. Assembler

Show me the answer

Answer: 1. Linker

Explanation:

  • Externally Defined Symbols: The linker resolves references to externally defined symbols by combining object modules and resolving external references.

  • Conclusion: The linker resolves externally defined symbols.

404. In which of the following page replacement policies does Belady’s anomaly occur?

  1. FIFO

  2. LFU

  3. LRU

  4. NRU

Show me the answer

Answer: 1. FIFO

Explanation:

  • Belady’s Anomaly: Belady’s anomaly occurs in the FIFO page replacement algorithm, where increasing the number of page frames can lead to an increase in the number of page faults.

  • Conclusion: FIFO suffers from Belady’s anomaly.

405. Four necessary conditions for deadlock to exist are: mutual exclusion, no-preemption, circular wait, and:

  1. Hold and wait

  2. Race around condition

  3. Deadlock avoidance

  4. Buffer overflow

Show me the answer

Answer: 1. Hold and wait

Explanation:

  • Deadlock Conditions: The four necessary conditions for deadlock are mutual exclusion, no-preemption, circular wait, and hold and wait.

  • Conclusion: Hold and wait is the fourth condition for deadlock.

406. A system program that sets up an executable program in main memory ready for execution is:

  1. Assembler

  2. Loader

  3. Linker

  4. Compiler

Show me the answer

Answer: 2. Loader

Explanation:

  • Loader: The loader is responsible for loading an executable program into memory and preparing it for execution.

  • Conclusion: The loader sets up the program in memory.

407. The principle of locality of reference justifies the use of:

  1. Re-entrant code

  2. Virtual memory

  3. Non-reusable code

  4. Cache memory

Show me the answer

Answer: 4. Cache memory

Explanation:

  • Locality of Reference: The principle of locality of reference states that programs tend to access the same set of memory locations repeatedly. This justifies the use of cache memory to store frequently accessed data.

  • Conclusion: Locality of reference supports the use of cache memory.

408. The details of all external symbols and relocation information (relocation list or map) are provided to the linker by:

  1. Macro processor

  2. Loader

  3. Translator

  4. Editor

Show me the answer

Answer: 3. Translator

Explanation:

  • Translator: The translator (compiler or assembler) generates the relocation list and external symbol table, which are used by the linker to resolve references.

  • Conclusion: The translator provides relocation information to the linker.

409. Scheduling is:

  1. Allowing jobs to use the processor

  2. Unrelated to performance considerations

  3. Not required in uniprocessor systems

  4. The same regardless of the purpose of the system

Show me the answer

Answer: 1. Allowing jobs to use the processor

Explanation:

  • Scheduling: Scheduling is the process of allocating the CPU to jobs or processes. It ensures that all jobs get a fair share of the processor.

  • Conclusion: Scheduling allows jobs to use the processor.

410. Real-time systems are:

  1. Primarily used on mainframe computers

  2. Used for monitoring events as they occur

  3. Used for program analysis

  4. Used for real-time interactive users

Show me the answer

Answer: 2. Used for monitoring events as they occur

Explanation:

  • Real-Time Systems: Real-time systems are designed to respond to events as they occur, often within strict time constraints.

  • Conclusion: Real-time systems monitor events in real-time.

411. Access time is the highest in the case of:

  1. Floppy disk

  2. Swapping devices

  3. Cache

  4. Magnetic disk

412. The most common systems security method is:

  1. Passwords

  2. Firewall

  3. Encryption

  4. All of the above

Show me the answer

Answer: 1. Passwords

Explanation:

  • Passwords: Passwords are the most common and basic method of securing systems. They are used to authenticate users and restrict access to authorized individuals.

  • Conclusion: Passwords are the most widely used security method.

413. Poor response times are caused by:

  1. Processor busy

  2. High paging rates

  3. High I/O rate

  4. Any of the above

Show me the answer

Answer: 4. Any of the above

Explanation:

  • Poor Response Times: Poor response times can be caused by a busy processor, high paging rates (thrashing), or high I/O rates, all of which can lead to delays in processing user requests.

  • Conclusion: Any of the listed factors can cause poor response times.

414. Which of the following is a block device?

  1. Mouse

  2. Terminals

  3. Printer

  4. Disk

Show me the answer

Answer: 4. Disk

Explanation:

  • Block Device: A block device is a storage device that reads and writes data in fixed-size blocks. Disks are examples of block devices.

  • Conclusion: Disks are block devices.

415. Which of the following statements is false?

  1. The technique of storage compaction involves moving all occupied areas of storage to one end or other of main storage

  2. Compaction does not involve relocation of programs

  3. Compaction is also known as garbage collection

  4. The system must stop everything while it performs compaction

Show me the answer

Answer: 2. Compaction does not involve relocation of programs

Explanation:

  • Compaction: Compaction involves relocating programs to consolidate free memory into a single block. It is a form of memory management used to reduce fragmentation.

  • Conclusion: Compaction involves relocation of programs.

416. Thrashing can be avoided if:

  1. The pages belonging to the working set of the programs are in main memory

  2. The speed of the CPU is increased

  3. The speed of the I/O processor is increased

  4. All of the above

Show me the answer

Answer: 1. The pages belonging to the working set of the programs are in main memory

Explanation:

  • Thrashing: Thrashing occurs when the system spends more time swapping pages in and out of memory than executing processes. Keeping the working set of pages in main memory reduces thrashing.

  • Conclusion: Thrashing can be avoided by ensuring the working set is in main memory.

417. Operating system:

  1. Links a program with the subroutines it references

  2. Provides a layered, user-friendly interface

  3. Enables the programmer to draw a flowchart

  4. All of the above

Show me the answer

Answer: 2. Provides a layered, user-friendly interface

Explanation:

  • Operating System Functions: The operating system provides a user-friendly interface and manages resources, but it does not directly link subroutines or enable flowchart drawing.

  • Conclusion: The primary role of the OS is to provide a user-friendly interface.

418. A task in a blocked state:

  1. Is executable

  2. Is running

  3. Must still be placed in the run queues

  4. Is waiting for something temporarily unavailable

Show me the answer

Answer: 4. Is waiting for something temporarily unavailable

Explanation:

  • Blocked State: A task in the blocked state is waiting for an event (e.g., I/O completion) or resource to become available.

  • Conclusion: A blocked task is waiting for something temporarily unavailable.

419. Backups should be done:

  1. Daily for most installations

  2. Weekly for most installations

  3. As several image copies, followed by an incremental

  4. As several incremental, followed by an image copy

Show me the answer

Answer: 4. As several incremental, followed by an image copy

Explanation:

  • Backup Strategy: A common backup strategy is to perform incremental backups regularly and a full image copy periodically. This balances storage requirements and recovery efficiency.

  • Conclusion: Incremental backups followed by an image copy is a recommended strategy.

420. Which of the following statements is true?

  1. The LRU algorithm pages out pages that have been used recently

  2. Thrashing is a natural consequence of virtual memory systems

  3. Seek analysis is used for analyzing control-unit busy problems

  4. All of the above

Show me the answer

Answer: 2. Thrashing is a natural consequence of virtual memory systems

Explanation:

  • Thrashing: Thrashing occurs when the system spends more time swapping pages than executing processes. It is a potential issue in virtual memory systems.

  • Conclusion: Thrashing is a natural consequence of virtual memory systems.

421. A flowchart that uses predefined symbols to describe data flow in a system is known as:

  1. Program flowchart

  2. Data flow diagram

  3. System flowchart

  4. All of the above

Show me the answer

Answer: 2. Data flow diagram

Explanation:

  • Data Flow Diagram: A data flow diagram (DFD) uses predefined symbols to represent the flow of data in a system.

  • Conclusion: A DFD describes data flow in a system.

422. Which of the following is true about pseudo code?

  1. A machine language

  2. A high-level language

  3. An assembly language

  4. None of the above

Show me the answer

Answer: 4. None of the above

Explanation:

  • Pseudo Code: Pseudo code is an informal way of describing algorithms using a mix of natural language and programming constructs. It is not a formal language.

  • Conclusion: Pseudo code is not a machine, high-level, or assembly language.

423. A program that converts a high-level language program to a set of instructions that can run on a computer is called a:

  1. Compiler

  2. Editor

  3. Debugger

  4. All of the above

Show me the answer

Answer: 1. Compiler

Explanation:

  • Compiler: A compiler translates high-level language code into machine code that can be executed by a computer.

  • Conclusion: A compiler performs this translation.

424. Which of the following statements is not true about the FORTRAN language?

  1. FORTRAN is a high-level language

  2. A FORTRAN program, written for the IBM-PC, is totally different from a FORTRAN program written for execution on the SUN machine

  3. FORTRAN is extensively used to write programs for performing scientific computations

  4. All of the above

Show me the answer

Answer: 2. A FORTRAN program, written for the IBM-PC, is totally different from a FORTRAN program written for execution on the SUN machine

Explanation:

  • FORTRAN Portability: FORTRAN programs are generally portable across different platforms, with minor modifications for system-specific features.

  • Conclusion: FORTRAN programs are not "totally different" across platforms.

425. The initial value of the semaphore that allows only one of the many processes to enter their critical section is:

  1. 8

  2. 1

  3. 16

  4. 0

Show me the answer

Answer: 2. 1

Explanation:

  • Semaphore Initialization: A semaphore initialized to 1 allows only one process to enter the critical section at a time, enforcing mutual exclusion.

  • Conclusion: The initial value of the semaphore is 1.

426. The principles of structured programming forbid the use of:

  1. WHILE-DO

  2. IF-THEN-ELSE

  3. GO TO

  4. DO-WHILE

Show me the answer

Answer: 3. GO TO

Explanation:

  • Structured Programming: Structured programming discourages the use of GO TO statements, as they can lead to unstructured and hard-to-maintain code.

  • Conclusion: GO TO is forbidden in structured programming.

427. Which of the following is necessary to work on a computer?

  1. Compiler

  2. Assembly

  3. Operating system

  4. Interpreter

Show me the answer

Answer: 3. Operating system

Explanation:

  • Operating System: The operating system is essential for managing hardware resources and providing a platform for running applications.

  • Conclusion: An operating system is necessary to work on a computer.

428. Dividing a project into segments and smaller units in order to simplify the analysis, design, and programming efforts is known as:

  1. Modular approach

  2. Bottom-up approach

  3. Top-down approach

  4. Left-right approach

Show me the answer

Answer: 1. Modular approach

Explanation:

  • Modular Approach: Dividing a project into smaller, manageable modules simplifies analysis, design, and programming.

  • Conclusion: This is known as the modular approach.

429. The errors that can be pointed out by the compiler are:

  1. Syntax errors

  2. Logical errors

  3. Semantic errors

  4. Internal errors

Show me the answer

Answer: 1. Syntax errors

Explanation:

  • Compiler Errors: Compilers detect syntax errors, which are violations of the programming language's rules.

  • Conclusion: Syntax errors are detected by the compiler.

430. The dispatcher:

  1. Actually schedules the tasks into the processor

  2. Puts tasks in I/O wait

  3. Is always small and simple

  4. Never changes task priorities

Show me the answer

Answer: 1. Actually schedules the tasks into the processor

Explanation:

  • Dispatcher: The dispatcher is responsible for loading the selected process into the CPU for execution.

  • Conclusion: The dispatcher schedules tasks into the processor.

431. The SJF algorithm executes first the job:

  1. That last entered the queue

  2. The first entered the queue

  3. That has been in the queue the longest

  4. With the least processor needs

Show me the answer

Answer: 4. With the least processor needs

Explanation:

  • SJF Scheduling: Shortest Job First (SJF) schedules the job with the shortest execution time first.

  • Conclusion: SJF prioritizes jobs with the least processor needs.

432. Semaphores:

  1. Synchronize critical resources to prevent deadlock

  2. Synchronize critical resources to prevent contention

  3. Are used to do I/O

  4. Are used for memory management

Show me the answer

Answer: 1. Synchronize critical resources to prevent deadlock

Explanation:

  • Semaphores: Semaphores are used to synchronize access to critical resources and prevent deadlock.

  • Conclusion: Semaphores prevent deadlock by synchronizing resource access.

433. Fragmentation of the file system:

  1. Occurs only if the file system is used improperly

  2. Can always be prevented

  3. Can be temporarily removed by compaction

  4. Is a characteristic of all file systems

Show me the answer

Answer: 3. Can be temporarily removed by compaction

Explanation:

  • Fragmentation: Fragmentation occurs when files are stored in non-contiguous blocks. Compaction can temporarily reduce fragmentation.

  • Conclusion: Fragmentation can be temporarily removed by compaction.

434. The command interpreter:

  1. Is usually the primary user interface

  2. Requires fixed format commands

  3. Is menu driven

  4. Is quite different from the SCL interpreter

Show me the answer

Answer: 1. Is usually the primary user interface

Explanation:

  • Command Interpreter: The command interpreter (shell) is the primary user interface in many operating systems.

  • Conclusion: The command interpreter is the primary user interface.

435. A translator is best described as:

  1. An application software

  2. A hardware component

  3. A system software

  4. All of the above

Show me the answer

Answer: 3. A system software

Explanation:

  • Translator: A translator (e.g., compiler, assembler) is a system software that converts high-level or assembly language code into machine code.

  • Conclusion: A translator is a system software.

436. The part of the machine-level instruction, which tells the central processor what has to be done, is:

  1. Operation code

  2. Locator

  3. Address

  4. Flip-flop

Show me the answer

Answer: 1. Operation code

Explanation:

  • Operation Code: The operation code (opcode) specifies the operation to be performed by the CPU.

  • Conclusion: The opcode tells the CPU what to do.

437. Which of the following instruction steps would be written within the diamond-shaped box of a flowchart?

  1. S = B - C

  2. PRINT A

  3. IS A < 10

  4. DATA X, 4, Z

Show me the answer

Answer: 3. IS A < 10

Explanation:

  • Flowchart Diamond: The diamond-shaped box in a flowchart represents a decision or condition, such as "IS A < 10."

  • Conclusion: Decision steps are written in diamond-shaped boxes.

438. Block caches or buffer caches are used:

  1. To improve disk performance

  2. To handle interrupts

  3. To increase the capacity of the main memory

  4. To speed up main memory read operation

Show me the answer

Answer: 1. To improve disk performance

Explanation:

  • Block Caches: Block caches store frequently accessed disk blocks in memory to reduce disk I/O and improve performance.

  • Conclusion: Block caches improve disk performance.

439. To avoid the race condition, the maximum number of processes that may be simultaneously inside their critical section is:

  1. 8

  2. 1

  3. 16

  4. 0

Show me the answer

Answer: 2. 1

Explanation:

  • Race Condition: A race condition occurs when multiple processes access shared resources simultaneously. To avoid this, only one process should be in the critical section at a time.

  • Conclusion: Only one process can be in the critical section at a time.

440. What is the initial value of the semaphore to allow only one of the many processes to enter their critical section?

  1. 8

  2. 1

  3. 16

  4. 0

Show me the answer

Answer: 2. 1

Explanation:

  • Semaphore Initialization: A semaphore initialized to 1 allows only one process to enter the critical section at a time.

  • Conclusion: The initial value of the semaphore is 1.

441. Which technique stores a program on disk and then transfers the program into main storage as and when they are needed, is known as:

  1. Spooling

  2. Thrashing

  3. Swapping

  4. All of the above

Show me the answer

Answer: 3. Swapping

Explanation:

  • Swapping: Swapping involves moving processes between main memory and disk to free up memory for other processes.

  • Conclusion: Swapping transfers programs between disk and main storage as needed.

442. Which of the following is not true about the description of a decision table?

  1. A decision table is easy to modify

  2. A decision table is directly understood by the computer

  3. A decision table is easy to understand

  4. All of the above

Show me the answer

Answer: 2. A decision table is directly understood by the computer

Explanation:

  • Decision Table: A decision table is a tool for representing complex logic in a tabular format. It is not directly understood by the computer but is used by programmers to design logic.

  • Conclusion: Decision tables are not directly understood by computers.

443. The memory allocation scheme subject to ‘external’ fragmentation is:

  1. Segmentation

  2. Pure demand paging

  3. Swapping

  4. Multiple contiguous fixed partitions

Show me the answer

Answer: 1. Segmentation

Explanation:

  • External Fragmentation: Segmentation can lead to external fragmentation, where free memory is divided into small, non-contiguous blocks.

  • Conclusion: Segmentation is subject to external fragmentation.

444. The advantage of a command processor running only built-in commands is:

  1. Flexibility to the users in running lists of commands by simply collecting them in named batch command files

  2. The command set being common across different hardware configurations

  3. Users can create system programs and run them as commands

  4. The processing is much faster than would otherwise be the case when user-defined commands are used

Show me the answer

Answer: 2. The command set being common across different hardware configurations

Explanation:

  • Built-in Commands: Built-in commands are consistent across different hardware configurations, providing a standardized interface.

  • Conclusion: Built-in commands ensure a common command set across hardware.

445. Which of the following is not true about memory management?

  1. Virtual memory is used only in multiuser systems

  2. Segmentation suffers from external fragmentation

  3. Paging suffers from internal fragmentation

  4. Segmented memory can be paged

Show me the answer

Answer: 1. Virtual memory is used only in multiuser systems

Explanation:

  • Virtual Memory: Virtual memory is used in both single-user and multiuser systems to extend the available memory.

  • Conclusion: Virtual memory is not limited to multiuser systems.

446. In which way(s) can a macro processor for assembly language be implemented?

  1. Independent two-pass processor

  2. Independent one-pass processor

  3. Processor incorporated into pass 1 of a standard two-pass assembler

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Macro Processor Implementation: A macro processor can be implemented as an independent two-pass or one-pass processor or integrated into the assembler.

  • Conclusion: All the listed methods are valid.

447. The disadvantage of “Compile and GO” loading scheme is (are):

  1. A portion of memory is wasted because the core occupied by the assembler is unavailable to the object program

  2. It is necessary to retranslate the user’s program deck every time it is run

  3. It is very difficult to handle multiple segments, especially if the source programs are in different languages, and to produce orderly modular programs

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Compile and GO: This scheme has several disadvantages, including memory waste, retranslation, and difficulty handling multiple segments.

  • Conclusion: All the listed disadvantages apply to the Compile and GO scheme.

448. In analyzing the compilation of a PL/I program, the term “syntax analysis” is associated with:

  1. Recognition of basic syntactic constructs through reductions

  2. Recognition of basic elements and creation of uniform symbols

  3. Creation of more optional matrix

  4. Use of macro processor to produce more optimal assembly code

Show me the answer

Answer: 1. Recognition of basic syntactic constructs through reductions

Explanation:

  • Syntax Analysis: Syntax analysis involves recognizing the structure of the program and reducing it to basic syntactic constructs.

  • Conclusion: Syntax analysis is associated with recognizing syntactic constructs.

449. Uniform Symbols Table:

  1. Contains all constants in the program

  2. A permanent table of decision rules in the form of patterns for matching with the uniform symbol table to discover syntactic structure

  3. Consists of a full or partial list of the tokens as they appear in the program, created by lexical analysis and used for syntax analysis and interpretation

  4. A permanent table which lists all keywords and special symbols of the language in symbolic form

Show me the answer

Answer: 3. Consists of a full or partial list of the tokens as they appear in the program, created by lexical analysis and used for syntax analysis and interpretation

Explanation:

  • Uniform Symbols Table: This table contains tokens generated by the lexical analyzer and is used during syntax analysis.

  • Conclusion: The uniform symbols table consists of tokens used for syntax analysis.

450. The function(s) of the scheduler is (are):

  1. It selects which ready process is to be run next

  2. It specifies the time slice

  3. It is waiting for an event to occur before continuing execution

  4. Both A and B

Show me the answer

Answer: 4. Both A and B

Explanation:

  • Scheduler Functions: The scheduler selects the next process to run and may specify the time slice for time-sharing systems.

  • Conclusion: The scheduler performs both functions.

451. The function(s) of the file system is (are):

  1. To provide complete file naming freedom to the users and to permit controlled sharing of files

  2. To provide for long and short-term storage of files with appropriate economic tradeoffs

  3. To provide security against loss of information due to system failure

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • File System Functions: The file system provides file naming, storage management, security, and controlled sharing of files. It also ensures data integrity and recovery in case of system failures.

  • Conclusion: All the listed functions are responsibilities of the file system.

452. Moving a process from main memory to disk is called:

  1. Scheduling

  2. Swapping

  3. Caching

  4. Spooling

Show me the answer

Answer: 2. Swapping

Explanation:

  • Swapping: Swapping is the process of moving a process from main memory to disk (secondary storage) to free up memory for other processes.

  • Conclusion: Swapping is used to manage memory in multiprogramming systems.

453. In order to allow only one process to enter its critical section, binary semaphores are initialized to:

  1. 0

  2. 1

  3. 2

  4. 3

Show me the answer

Answer: 2. 1

Explanation:

  • Binary Semaphore: A binary semaphore is initialized to 1 to allow only one process to enter the critical section at a time. The semaphore is decremented to 0 when a process enters the critical section and incremented back to 1 when the process exits.

  • Conclusion: Binary semaphores are initialized to 1 for mutual exclusion.

454. The state transition initiated by the user process itself in an operating system is:

  1. Block

  2. Wake up

  3. Dispatch

  4. Timer run out

Show me the answer

Answer: 1. Block

Explanation:

  • State Transition: A process can transition to the Blocked state when it requests an I/O operation or waits for an event. This transition is initiated by the process itself.

  • Conclusion: The Block state transition is user-initiated.

455. Which of the following terms refers to the degree to which data in a database system are accurate and correct?

  1. Data security

  2. Data independence

  3. Data validity

  4. Data integrity

Show me the answer

Answer: 4. Data integrity

Explanation:

  • Data Integrity: Data integrity refers to the accuracy, consistency, and correctness of data in a database system. It ensures that data remains reliable and valid over its lifecycle.

  • Conclusion: Data integrity ensures the accuracy and correctness of data.

456. The total time to prepare a disk drive mechanism for a block of data to be read from it is:

  1. Latency

  2. Latency plus transmission time

  3. Latency plus seek time

  4. Latency plus seek time plus transmission time

Show me the answer

Answer: 3. Latency plus seek time

Explanation:

  • Disk Access Time: The total time to prepare a disk drive for reading a block of data includes:

    • Seek Time: Time to move the disk arm to the correct track.

    • Latency: Time for the disk to rotate to the correct sector.

  • Conclusion: The total preparation time is the sum of seek time and latency.

457. The paging rate:

  1. Should never be greater than 100 per second

  2. Is greater for large programs

  3. Is the number of I/O interrupts each second

  4. Increases as the number of page faults increases

Show me the answer

Answer: 4. Increases as the number of page faults increases

Explanation:

  • Paging Rate: The paging rate is the rate at which pages are swapped in and out of memory. It increases as the number of page faults increases, indicating higher memory contention.

  • Conclusion: The paging rate is directly related to the number of page faults.

458. Thrashing:

  1. Is a natural consequence of virtual memory systems

  2. Can always be avoided by swapping

  3. Always occurs on large computers

  4. Can be caused by poor paging algorithms

Show me the answer

Answer: 4. Can be caused by poor paging algorithms

Explanation:

  • Thrashing: Thrashing occurs when the system spends more time swapping pages in and out of memory than executing processes. It is often caused by poor paging algorithms or insufficient memory.

  • Conclusion: Thrashing can be caused by inefficient paging algorithms.

459. The computational technique used to compute the disk storage address of individual records is called:

  1. Bubble memory

  2. Dynamic reallocation

  3. Key fielding

  4. Hashing

Show me the answer

Answer: 4. Hashing

Explanation:

  • Hashing: Hashing is a technique used to compute the disk storage address of individual records by applying a hash function to the record's key. It allows for efficient data retrieval.

  • Conclusion: Hashing is used to compute disk storage addresses.

460. Capacity planning:

  1. Requires detailed system performance information

  2. Is independent of the operating system

  3. Does not depend on the monitoring tools available

  4. Is not needed in small installations

Show me the answer

Answer: 1. Requires detailed system performance information

Explanation:

  • Capacity Planning: Capacity planning involves analyzing system performance data to ensure that the system can handle future workloads. It requires detailed performance metrics and monitoring tools.

  • Conclusion: Capacity planning relies on detailed system performance information.

461. In a multiprogramming system, a set of processes is deadlocked if each process in the set is waiting for an event to occur that can be initiated only by another process in the set. Which of the following is not one of the four conditions that are necessary for deadlock to occur?

  1. Non-preemption

  2. Partial assignment of resources

  3. Process suspension

  4. Circular wait

Show me the answer

Answer: 3. Process suspension

Explanation:

  • Deadlock Conditions: The four necessary conditions for deadlock are:

    1. Mutual Exclusion

    2. Hold and Wait

    3. No Preemption

    4. Circular Wait

  • Conclusion: Process suspension is not a condition for deadlock.

462. Belady's anomaly occurs in:

  1. Optimal replacement

  2. LRU

  3. FIFO

  4. Both in FIFO and LRU

Show me the answer

Answer: 3. FIFO

Explanation:

  • Belady's Anomaly: Belady's anomaly occurs in the FIFO page replacement algorithm, where increasing the number of page frames can lead to an increase in the number of page faults.

  • Conclusion: FIFO is the algorithm that suffers from Belady's anomaly.

463. The CPU, after receiving an interrupt from an I/O device:

  1. Halts for a predetermined time

  2. Hands over control of the address bus and data bus to the interrupting device

  3. Branches off to the interrupt service routine immediately

  4. Branches off to the interrupt service routine after completion of the current instruction

Show me the answer

Answer: 4. Branches off to the interrupt service routine after completion of the current instruction

Explanation:

  • Interrupt Handling: When the CPU receives an interrupt, it completes the current instruction before branching to the interrupt service routine (ISR) to handle the interrupt.

  • Conclusion: The CPU processes interrupts after completing the current instruction.

464. Which of the following is not a characteristic of a daisy chaining priority control scheme?

  1. Priority is programmable

  2. It is relatively easy to add more devices to the chain

  3. The failure of one device may affect other devices on the chain

  4. The number of control lines is independent of the number of devices on the chain

Show me the answer

Answer: 1. Priority is programmable

Explanation:

  • Daisy Chaining: In a daisy chaining priority control scheme, the priority of devices is fixed by their physical position in the chain. It is not programmable.

  • Conclusion: Priority is not programmable in daisy chaining.

465. An example of a system development program is:

  1. Operating system

  2. Database management systems

  3. Performance monitors

  4. Language translators

Show me the answer

Answer: 4. Language translators

Explanation:

  • System Development Programs: Language translators, such as compilers and assemblers, are examples of system development programs used to convert high-level code into machine code.

  • Conclusion: Language translators are system development programs.

466. Which of the following is not a part of the operating system?

  1. Supervisor

  2. Job-control program

  3. Performance monitor

  4. Input/output control program

Show me the answer

Answer: 3. Performance monitor

Explanation:

  • Operating System Components: The supervisor, job-control program, and I/O control program are core components of the operating system. Performance monitors are typically external tools.

  • Conclusion: Performance monitors are not part of the operating system.

467. If special forms are needed for printing the output, the programmer specifies these through:

  1. JCL

  2. Utility programs

  3. IPL

  4. Load modules

Show me the answer

Answer: 1. JCL

Explanation:

  • Job Control Language (JCL): JCL is used to specify special forms, printer configurations, and other job-related parameters in batch processing systems.

  • Conclusion: Special forms are specified using JCL.

468. Which of the following is not an advantage of multiprogramming?

  1. Increased throughput

  2. Shorter response time

  3. Decreased operating system overhead

  4. Ability to assign priorities to jobs

Show me the answer

Answer: 3. Decreased operating system overhead

Explanation:

  • Multiprogramming Advantages: Multiprogramming increases throughput, reduces response time, and allows priority-based scheduling. However, it increases operating system overhead due to process management.

  • Conclusion: Multiprogramming does not decrease operating system overhead.

469. The problem of thrashing is affected significantly by:

  1. Program structure

  2. Primary-storage size

  3. Program size

  4. None of the above

Show me the answer

Answer: 1. Program structure

Explanation:

  • Thrashing: Thrashing is influenced by the program's memory access patterns (program structure). Poor locality of reference can lead to excessive page faults and thrashing.

  • Conclusion: Program structure significantly affects thrashing.

470. Logical extension of multiprogramming of operating system is:

  1. Time sharing

  2. Single programming

  3. Multi-tasking

  4. Both (A) and (B)

Show me the answer

Answer: 4. Both (A) and (B)

Explanation:

  • Multiprogramming Extension: Time sharing and multi-tasking are logical extensions of multiprogramming, allowing multiple processes to share CPU time and resources.

  • Conclusion: Both time sharing and multi-tasking extend multiprogramming.

471. Under multiprogramming, turnaround time for short jobs is usually...... and that for long jobs is slightly......

  1. Lengthened; shortened

  2. Shortened; shortened

  3. Shortened; lengthened

  4. Shortened; unchanged

Show me the answer

Answer: 3. Shortened; lengthened

Explanation:

  • Turnaround Time: In multiprogramming, short jobs are executed quickly, reducing their turnaround time. Long jobs may experience slightly longer turnaround times due to resource contention.

  • Conclusion: Turnaround time for short jobs is shortened, while for long jobs, it is slightly lengthened.

472. Remote computing service involves the use of time-sharing and......

  1. Multiprocessing

  2. Batch processing

  3. Interactive processing

  4. Real-time processing

Show me the answer

Answer: 4. Real-time processing

Explanation:

  • Remote Computing: Remote computing services often use time-sharing and real-time processing to provide interactive and responsive user experiences.

  • Conclusion: Real-time processing is used in remote computing services.

473. Under which circumstances the scheduling scheme is non-preemptive:

  1. When a process switches from running to waiting state, when a process terminates

  2. When a process switches from waiting to the ready state

  3. When a process switches from waiting to the ready state

  4. Both (A) and (B)

Show me the answer

Answer: 1. When a process switches from running to waiting state, when a process terminates

Explanation:

  • Non-Preemptive Scheduling: In non-preemptive scheduling, the CPU is not forcibly taken from a running process. The process releases the CPU voluntarily when it switches to the waiting state or terminates.

  • Conclusion: Non-preemptive scheduling occurs when a process voluntarily releases the CPU.

474. Under which circumstances the scheduling scheme is preemptive:

  1. When a process switches from running to waiting state

  2. When a process switches from running to the ready state

  3. When a process switches from waiting to the ready state

  4. Both (B) and (C)

Show me the answer

Answer: 4. Both (B) and (C)

Explanation:

  • Preemptive Scheduling: Preemptive scheduling occurs when the CPU is forcibly taken from a running process, such as when a higher-priority process becomes ready or when a time slice expires.

  • Conclusion: Preemptive scheduling occurs when the CPU is forcibly reallocated.

475. ......gives control of the CPU to the process selected by the short-term scheduler.

  1. Long-term scheduler

  2. Dispatcher

  3. Medium-term scheduler

  4. None of the above

Show me the answer

Answer: 2. Dispatcher

Explanation:

  • Dispatcher: The dispatcher is responsible for giving control of the CPU to the process selected by the short-term scheduler. It performs context switching and sets up the CPU registers for the new process.

  • Conclusion: The dispatcher transfers control to the selected process.

476. Which of the following are the functions of the dispatcher?

  1. Swapping

  2. Jumping to the proper location in the user program to restart that program

  3. Scheduling

  4. All of the above

Show me the answer

Answer: 2. Jumping to the proper location in the user program to restart that program

Explanation:

  • Dispatcher Functions: The dispatcher's primary function is to load the CPU registers and jump to the proper location in the user program to restart execution.

  • Conclusion: The dispatcher ensures the selected process resumes execution correctly.

477. Which of the following are CPU scheduling criteria?

  1. CPU utilization

  2. Dispatcher latency

  3. Waiting time

  4. Both (A) and (B)

Show me the answer

Answer: 4. Both (A) and (B)

Explanation:

  • CPU Scheduling Criteria: CPU utilization and waiting time are key criteria for evaluating CPU scheduling algorithms. Dispatcher latency is also important as it affects the responsiveness of the system.

  • Conclusion: Both CPU utilization and dispatcher latency are scheduling criteria.

478. Which of the following is true for the algorithms for allocating regions of contiguous memory?

  1. First-fit

  2. Best-fit

  3. Next-fit

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Memory Allocation Algorithms: First-fit, best-fit, and next-fit are all algorithms used for allocating contiguous memory regions. They differ in how they search for and allocate memory blocks.

  • Conclusion: All the listed algorithms are used for contiguous memory allocation.

479. The first-fit algorithm for allocating regions of contiguous memory does......

  1. Scan memory region list from start for first fit

  2. Scan memory region list from point of last allocation to next

  3. Tends to leave small unusable regions, and slower due to requirement of searching the entire list

  4. There is no such algorithm

Show me the answer

Answer: 1. Scan memory region list from start for first fit

Explanation:

  • First-Fit Algorithm: The first-fit algorithm scans the memory region list from the start and allocates the first block that is large enough to satisfy the request.

  • Conclusion: First-fit scans from the start for the first suitable block.

480. The best-fit algorithm for allocating regions of contiguous memory does......

  1. Scan memory regions from start for first fit

  2. Pick the closest free region in the entire list

  3. There is no such algorithm

  4. Find the worst fit in the entire list

Show me the answer

Answer: 2. Pick the closest free region in the entire list

Explanation:

  • Best-Fit Algorithm: The best-fit algorithm searches the entire memory region list to find the smallest free block that is large enough to satisfy the request.

  • Conclusion: Best-fit picks the closest free region in the entire list.

481. Which of the following are scheduling algorithms:

  1. First come first serve

  2. Priority scheduling

  3. Shortest job first

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Scheduling Algorithms: FCFS, priority scheduling, and SJF are all common CPU scheduling algorithms used in operating systems.

  • Conclusion: All the listed algorithms are scheduling algorithms.

482. Routine is not loaded until it is called. All routines are kept on disk in a reloadable load format. The main program is loaded into memory & is executed. This type of loading is called ______.

  1. Static loading

  2. Dynamic linking

  3. Dynamic loading

  4. Overlays

Show me the answer

Answer: 3. Dynamic loading

Explanation:

  • Dynamic Loading: Dynamic loading allows routines to be loaded into memory only when they are called. This reduces memory usage by loading only the necessary parts of a program.

  • Conclusion: Dynamic loading is used to load routines on demand.

483. Which of the following is crucial time while accessing data on the disk?

  1. Seek time

  2. Transmission time

  3. Rotational time

  4. Waiting time

Show me the answer

Answer: 1. Seek time

Explanation:

  • Seek Time: Seek time is the time taken to move the disk arm to the correct track. It is a crucial factor in disk access time.

  • Conclusion: Seek time is the most critical factor in disk access time.

484. The host repeatedly checks if the controller is busy until it is not. It is in a loop that status register’s busy bit becomes clear. This is called ______ and a mechanism for the hardware controller to notify the CPU that it is ready is called ______.

  1. Interrupt and Polling

  2. Polling and Interrupt

  3. Polling and Spooling

  4. Deadlock and Starvation

Show me the answer

Answer: 2. Polling and Interrupt

Explanation:

  • Polling: Polling is the process of repeatedly checking the status of a device to determine if it is ready.

  • Interrupt: An interrupt is a mechanism for the hardware controller to notify the CPU that it is ready.

  • Conclusion: Polling and interrupt are the correct terms.

485. Unix Operating System is an ______.

  1. Time Sharing Operating System

  2. Multi-tasking Operating System

  3. Multi-User Operating Systems

  4. All of the Above

Show me the answer

Answer: 4. All of the Above

Explanation:

  • Unix OS: Unix is a time-sharing, multi-tasking, and multi-user operating system. It allows multiple users to run multiple tasks simultaneously.

  • Conclusion: Unix is all of the listed types of operating systems.

486. Which of the following memory allocation scheme suffers from External fragmentation?

  1. Segmentation

  2. Swapping

  3. Pure demand paging

  4. Paging

Show me the answer

Answer: 1. Segmentation

Explanation:

  • External Fragmentation: Segmentation suffers from external fragmentation because memory is divided into variable-sized segments, leaving small, unusable gaps between segments.

  • Conclusion: Segmentation is prone to external fragmentation.

487. Information about a process is maintained in a ______.

  1. Stack

  2. Process Control Block

  3. Translation Look aside Buffer

  4. Program Control Block

Show me the answer

Answer: 2. Process Control Block

Explanation:

  • Process Control Block (PCB): The PCB contains all the information about a process, including its state, program counter, registers, and memory allocation.

  • Conclusion: The PCB maintains process information.

488. Distributed OS works on the ______ principle.

  1. File Foundation

  2. Multi system image

  3. Single system images

  4. Networking image

Show me the answer

Answer: 3. Single system images

Explanation:

  • Distributed OS: A distributed operating system provides a single system image, making multiple networked computers appear as a single system to users.

  • Conclusion: Distributed OS works on the single system image principle.

489. The problem of fragmentation arises in ______.

  1. Static storage allocation

  2. Stack allocation storage

  3. Stack allocation with dynamic binding

  4. Heap allocation

Show me the answer

Answer: 4. Heap allocation

Explanation:

  • Fragmentation: Fragmentation occurs in heap allocation due to the dynamic allocation and deallocation of memory blocks, leading to small, unusable gaps.

  • Conclusion: Fragmentation is a problem in heap allocation.

490. Which file system does DOS typically use?

  1. FAT16

  2. NTFS

  3. FAT32

  4. WNFS

Show me the answer

Answer: 1. FAT16

Explanation:

  • DOS File System: DOS typically uses the FAT16 file system, which supports 16-bit file allocation tables.

  • Conclusion: FAT16 is the file system used by DOS.

491. The program is known as ______ which interacts with the inner part of called kernel.

  1. Compiler

  2. Protocol

  3. Device Driver

  4. Shell

Show me the answer

Answer: 4. Shell

Explanation:

  • Shell: The shell is a program that acts as an interface between the user and the kernel. It interprets user commands and passes them to the kernel for execution.

  • Conclusion: The shell interacts with the kernel to execute user commands.

492. The time taken by the disk arm to locate the specific address of a sector for getting information is called ______.

  1. Rotational Latency

  2. Search Time

  3. Seek Time

  4. Response Time

Show me the answer

Answer: 3. Seek Time

Explanation:

  • Seek Time: Seek time is the time taken by the disk arm to move to the specific track where the data is located.

  • Conclusion: Seek time is the time required to position the disk arm.

493. Which file system does Windows 95 typically use?

  1. FAT16

  2. NTFS

  3. FAT32

  4. LMFS

Show me the answer

Answer: 3. FAT32

Explanation:

  • Windows 95 File System: Windows 95 primarily uses the FAT32 file system, which supports larger disk sizes and more efficient storage compared to FAT16.

  • Conclusion: FAT32 is the default file system for Windows 95.

494. Identify the odd thing in the services of operating system.

  1. Accounting

  2. Error detection and correction

  3. Protections

  4. Deadlock handling

Show me the answer

Answer: 2. Error detection and correction

Explanation:

  • Operating System Services: Accounting, protection, and deadlock handling are standard services provided by an operating system. Error detection and correction are typically handled by hardware or specific software, not the OS.

  • Conclusion: Error detection and correction are not primary OS services.

495. Cryptography technique is used in ______.

  1. Polling

  2. Protection

  3. Job Scheduling

  4. File Management

Show me the answer

Answer: 2. Protection

Explanation:

  • Cryptography: Cryptography is used to secure data and communications, providing protection against unauthorized access and ensuring data integrity.

  • Conclusion: Cryptography is primarily used for protection.

496. Which of the following is not an advantage of multiprogramming?

  1. Increased throughput

  2. Shorter response times

  3. Decreased operating system overhead

  4. Ability to assign priorities to jobs

Show me the answer

Answer: 3. Decreased operating system overhead

Explanation:

  • Multiprogramming: Multiprogramming increases throughput and allows for priority-based scheduling. However, it increases operating system overhead due to the need for process management and context switching.

  • Conclusion: Decreased operating system overhead is not an advantage of multiprogramming.

497. In ______ OS, the response time is very critical.

  1. Multitasking

  2. Online

  3. Batch

  4. Real-time

Show me the answer

Answer: 4. Real-time

Explanation:

  • Real-Time OS: In real-time operating systems, response time is critical as tasks must be completed within strict deadlines.

  • Conclusion: Real-time systems prioritize response time.

498. An optimal scheduling algorithm in terms of minimizing the average waiting time of a given set of processes is ______.

  1. FCFS scheduling algorithm

  2. Round robin scheduling algorithm

  3. Shortest job-first scheduling algorithm

  4. None of the above

Show me the answer

Answer: 3. Shortest job-first scheduling algorithm

Explanation:

  • SJF Scheduling: The Shortest Job First (SJF) scheduling algorithm minimizes the average waiting time by prioritizing shorter jobs.

  • Conclusion: SJF is optimal for minimizing average waiting time.

499. Real-time systems are ______.

  1. Primarily used on mainframe computers

  2. Used for monitoring events as they occur

  3. Used for program development

  4. Used for real-time interactive users

Show me the answer

Answer: 2. Used for monitoring events as they occur

Explanation:

  • Real-Time Systems: Real-time systems are designed to monitor and respond to events as they occur, often within strict time constraints.

  • Conclusion: Real-time systems are used for event monitoring.

500. Which technique was introduced because a single job could not keep both the CPU and the I/O devices busy?

  1. Time-sharing

  2. Preemptive scheduling

  3. Spooling

  4. Multiprogramming

Show me the answer

Answer: 4. Multiprogramming

Explanation:

  • Multiprogramming: Multiprogramming allows multiple jobs to reside in memory simultaneously, ensuring that the CPU and I/O devices are kept busy.

  • Conclusion: Multiprogramming improves resource utilization.

501. Inter-process communication can be done through ______.

  1. Mail

  2. System calls

  3. Messages

  4. Traps

Show me the answer

Answer: 3. Messages

Explanation:

  • Inter-Process Communication (IPC): IPC mechanisms include message passing, shared memory, and pipes. Messages are a common method for processes to communicate.

  • Conclusion: Messages are used for inter-process communication.

502. In Priority Scheduling, a priority number (integer) is associated with each process. The CPU is allocated to the process with the highest priority (smallest integer = highest priority). The problem of starvation (low priority processes may never execute) is resolved by ______.

  1. Terminating the process

  2. Mutual Exclusion

  3. Aging

  4. Semaphore

Show me the answer

Answer: 3. Aging

Explanation:

  • Aging: Aging is a technique used to prevent starvation by gradually increasing the priority of long-waiting processes.

  • Conclusion: Aging resolves the problem of starvation in priority scheduling.

503. CPU performance is measured through ______.

  1. Throughput

  2. Flops

  3. MHz

  4. None of the above

Show me the answer

Answer: 1. Throughput

Explanation:

  • Throughput: Throughput measures the number of processes completed per unit time and is a key metric for CPU performance.

  • Conclusion: Throughput is used to measure CPU performance.

504. PCB = ______.

  1. Program Control Block

  2. Process Communication Block

  3. Process Control Block

  4. None of the above

Show me the answer

Answer: 3. Process Control Block

Explanation:

  • PCB: The Process Control Block (PCB) is a data structure used by the operating system to store information about a process, such as its state, program counter, and registers.

  • Conclusion: PCB stands for Process Control Block.

505. Software is a program that directs the overall operation of the computer, facilitates its use, and interacts with the user. What are the different types of this software?

  1. Operating system

  2. Utilities

  3. Language Compiler

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Software Types: The software that directs the overall operation of a computer includes the operating system, utilities, and language compilers.

  • Conclusion: All the listed types are part of system software.

506. A ______ is software that manages the time of a microprocessor to ensure that all time-critical events are processed as efficiently as possible. This software allows the system activities to be divided into multiple independent elements called tasks.

  1. Kernel

  2. Processor

  3. Shells

  4. Device Driver

Show me the answer

Answer: 1. Kernel

Explanation:

  • Kernel: The kernel is the core component of an operating system that manages system resources and ensures efficient processing of time-critical events.

  • Conclusion: The kernel manages microprocessor time and system tasks.

507. The primary job of the operating system of a computer is to ______.

  1. Command Resources

  2. Provide Utilities

  3. Manage Resources

  4. Be user-friendly

Show me the answer

Answer: 3. Manage Resources

Explanation:

  • Operating System Role: The primary job of an operating system is to manage hardware and software resources, such as CPU, memory, and I/O devices.

  • Conclusion: Resource management is the primary function of an OS.

508. With the round-robin CPU scheduling in a time-shared system ______.

  1. Using very large time slices degenerates into the first-come-first-served algorithm

  2. Using extremely small time slices improves performance

  3. Using extremely small time slices degenerates into the last-in-first-out algorithm

  4. Using medium-sized time slices leads to the shortest request time first algorithm

Show me the answer

Answer: 1. Using very large time slices degenerates into the first-come-first-served algorithm

Explanation:

  • Round Robin Scheduling: If the time slice is very large, round-robin scheduling behaves like FCFS, as each process completes before the next one starts.

  • Conclusion: Large time slices make round-robin similar to FCFS.

509. Which of the following is a criterion to evaluate a scheduling algorithm?

  1. CPU Utilization: Keep CPU utilization as high as possible

  2. Throughput: Number of processes completed per unit time

  3. Waiting Time: Amount of time spent ready to run but not running

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Scheduling Criteria: CPU utilization, throughput, and waiting time are key criteria for evaluating scheduling algorithms.

  • Conclusion: All the listed criteria are used to evaluate scheduling algorithms.

510. Which of the following is contained in Process Control Block (PCB)?

  1. Process Number

  2. Memory Limits

  3. List of Open Files

  4. All of the Above

Show me the answer

Answer: 4. All of the Above

Explanation:

  • PCB Contents: The Process Control Block (PCB) contains information such as the process number, memory limits, and a list of open files.

  • Conclusion: All the listed items are part of the PCB.

511. Supercomputers typically employ ______.

  1. Real-time Operating system

  2. Desktop OS

  3. Multiprocessors OS

  4. None of the above

Show me the answer

Answer: 3. Multiprocessors OS

Explanation:

  • Supercomputers: Supercomputers use multiprocessor operating systems to manage multiple CPUs and achieve high performance.

  • Conclusion: Multiprocessor OS is used in supercomputers.

512. Round-robin scheduling is essentially ______ the preemptive version of ______.

  1. FIFO

  2. Shortest remaining

  3. Shortest job first

  4. Longest time first

Show me the answer

Answer: 1. FIFO

Explanation:

  • Round Robin: Round-robin scheduling is a preemptive version of FIFO, where each process is given a fixed time slice.

  • Conclusion: Round-robin is a preemptive FIFO.

513. A page fault occurs.

  1. When the page is not in the memory

  2. When the page is in the memory

  3. When the process enters the blocked state

  4. When the process is in the ready state

Show me the answer

Answer: 1. When the page is not in the memory

Explanation:

  • Page Fault: A page fault occurs when a process tries to access a page that is not currently in main memory.

  • Conclusion: Page faults occur when the required page is not in memory.

514. Which of the following will determine your choice of systems software for your computer?

  1. Is the applications software you want to use compatible with it?

  2. Is it expensive?

  3. Is it compatible with your hardware?

  4. Both (A) and (C)

Show me the answer

Answer: 4. Both (A) and (C)

Explanation:

  • System Software Choice: The choice of system software depends on compatibility with both applications software and hardware.

  • Conclusion: Both compatibility with applications and hardware are important factors.

515. Let S and Q be two semaphores initialized to 1, where P0 and P1 processes the following statements: wait(S); wait(Q); —; signal(S); signal(Q) and wait(Q); wait(S); —; signal(Q); signal(S); respectively. The above situation depicts a ______.

  1. Semaphore

  2. Signal

  3. Deadlock

  4. Interrupt

Show me the answer

Answer: 3. Deadlock

Explanation:

  • Deadlock: The processes P0 and P1 are waiting for each other to release semaphores S and Q, leading to a deadlock.

  • Conclusion: The situation depicts a deadlock.

516. What is a shell?

  1. It is a hardware component

  2. It is a part in compiler

  3. It is a command interpreter

  4. It is a tool in CPU scheduling

Show me the answer

Answer: 3. It is a command interpreter

Explanation:

  • Shell: The shell is a command interpreter that allows users to interact with the operating system by executing commands.

  • Conclusion: The shell acts as a command interpreter.

517. Routine is not loaded until it is called. All routines are kept on disk in a relocatable load format. The main program is loaded into memory & is executed. This type of loading is called ______.

  1. Static loading

  2. Dynamic linking

  3. Dynamic loading

  4. Overlays

Show me the answer

Answer: 3. Dynamic loading

Explanation:

  • Dynamic Loading: Dynamic loading allows routines to be loaded into memory only when they are called, improving memory utilization.

  • Conclusion: This is an example of dynamic loading.

518. In the blocked state:

  1. The processes waiting for I/O are found

  2. The process which is running is found

  3. The processes waiting for the processor are found

  4. None of the above

Show me the answer

Answer: 1. The processes waiting for I/O are found

Explanation:

  • Blocked State: Processes in the blocked state are waiting for I/O operations to complete.

  • Conclusion: Blocked processes are waiting for I/O.

519. What is the memory from 1K - 640K called?

  1. Extended Memory

  2. Low Memory

  3. Normal Memory

  4. Conventional Memory

Show me the answer

Answer: 4. Conventional Memory

Explanation:

  • Conventional Memory: The memory range from 1K to 640K is called conventional memory and is used by DOS and early operating systems.

  • Conclusion: This memory range is known as conventional memory.

  1. Editors

  2. System Call

  3. Compilers

  4. Caching

Show me the answer

Answer: 2. System Call

Explanation:

  • System Calls: System calls provide an interface for higher-level languages to request services from the operating system, such as process control, file management, and device management.

  • Conclusion: System calls handle these requests.

521. If the Disk head is located initially at 32, find the number of disk moves required with FCFS if the disk queue of I/O blocks requests are 98, 37, 14, 124, 65, 67.

  1. 310

  2. 315

  3. 324

  4. 321

Show me the answer

Answer: 4. 321

Explanation:

  • FCFS Disk Scheduling: The disk arm moves in the order of requests: 32 → 98 → 37 → 14 → 124 → 65 → 67.

  • Total Moves:

    • 32 → 98: 3298=66|32 - 98| = 66

    • 98 → 37: 9837=61|98 - 37| = 61

    • 37 → 14: 3714=23|37 - 14| = 23

    • 14 → 124: 14124=110|14 - 124| = 110

    • 124 → 65: 12465=59|124 - 65| = 59

    • 65 → 67: 6567=2|65 - 67| = 2

    • Total: 66+61+23+110+59+2=32166 + 61 + 23 + 110 + 59 + 2 = 321

  • Conclusion: The total number of disk moves is 321.

522. Multiprogramming systems ______.

  1. Are easier to develop than single programming systems

  2. Execute each job faster

  3. Execute more jobs in the same time

  4. Are used only on large mainframe computers

Show me the answer

Answer: 3. Execute more jobs in the same time

Explanation:

  • Multiprogramming: Multiprogramming allows multiple jobs to reside in memory simultaneously, increasing system throughput.

  • Conclusion: Multiprogramming executes more jobs in the same time.

523. Which is not the state of the process?

  1. Blocked

  2. Ready

  3. Running

  4. Privileged

Show me the answer

Answer: 4. Privileged

Explanation:

  • Process States: The primary states of a process are blocked, ready, and running. Privileged is not a process state.

  • Conclusion: Privileged is not a process state.

524. The solution to the Critical Section Problem is: Mutual Exclusion, Progress, and Bounded Waiting.

  1. The statement is false

  2. The statement is contradictory

  3. The statement is true

  4. None of the above

Show me the answer

Answer: 3. The statement is true

Explanation:

  • Critical Section Problem: The solution to the critical section problem requires mutual exclusion, progress, and bounded waiting.

  • Conclusion: The statement is true.

525. The problem of thrashing is affected significantly by ______.

  1. Program structure

  2. Primary storage size

  3. Program size

  4. None of the above

Show me the answer

Answer: 1. Program structure

Explanation:

  • Thrashing: Thrashing occurs when the system spends more time swapping pages than executing processes. It is influenced by the program's memory access patterns (program structure).

  • Conclusion: Program structure significantly affects thrashing.

526. The state of a process after it encounters an I/O instruction is ______.

  1. Ready

  2. Idle

  3. Blocked/Waiting

  4. Running

Show me the answer

Answer: 3. Blocked/Waiting

Explanation:

  • I/O Instruction: When a process encounters an I/O instruction, it moves to the blocked/waiting state until the I/O operation completes.

  • Conclusion: The process enters the blocked/waiting state.

527. The number of processes completed per unit time is known as ______.

  1. Output

  2. Efficiency

  3. Throughput

  4. Capacity

Show me the answer

Answer: 3. Throughput

Explanation:

  • Throughput: Throughput measures the number of processes completed per unit time.

  • Conclusion: Throughput is the correct term.

528. ______ is the situation in which a process is waiting on another process, which is also waiting on another process ... which is waiting on the first process. None of the processes involved in this circular wait are making progress.

  1. Deadlock

  2. Dormant

  3. Starvation

  4. None of the above

Show me the answer

Answer: 1. Deadlock

Explanation:

  • Deadlock: Deadlock occurs when processes are waiting for each other in a circular chain, preventing any progress.

  • Conclusion: This situation describes deadlock.

529. Which technique was introduced because a single job could not keep both the CPU and the I/O devices busy?

  1. Time-sharing

  2. Preemptive scheduling

  3. Spooling

  4. Multiprogramming

Show me the answer

Answer: 4. Multiprogramming

Explanation:

  • Multiprogramming: Multiprogramming allows multiple jobs to reside in memory, ensuring that the CPU and I/O devices are kept busy.

  • Conclusion: Multiprogramming improves resource utilization.

530. The mechanism that brings a page into memory only when it is needed is called ______.

  1. Segmentation

  2. Demand Paging

  3. Fragmentation

  4. Page Replacement

Show me the answer

Answer: 2. Demand Paging

Explanation:

  • Demand Paging: Demand paging loads pages into memory only when they are needed, reducing memory usage.

  • Conclusion: This mechanism is called demand paging.

531. Switching the CPU to another Process requires saving the state of the old process and loading the new process state. This is called as ______.

  1. Process Blocking

  2. Time Sharing

  3. Context Switch

  4. None of the above

Show me the answer

Answer: 3. Context Switch

Explanation:

  • Context Switch: A context switch involves saving the state of the current process and loading the state of the next process.

  • Conclusion: This process is called a context switch.

532. Which directory implementation is used in most Operating Systems?

  1. Single level directory structure

  2. Tree directory structure

  3. Two level directory structure

  4. Acyclic directory structures

Show me the answer

Answer: 2. Tree directory structure

Explanation:

  • Directory Implementation: Most operating systems use a tree directory structure, which allows for hierarchical organization of files and directories.

  • Conclusion: The tree directory structure is widely used.

533. The Banker’s algorithm is used:

  1. To prevent deadlock in operating systems

  2. To detect deadlock in operating systems

  3. To rectify a deadlocked state

  4. None of the above

Show me the answer

Answer: 1. To prevent deadlock in operating systems

Explanation:

  • Banker’s Algorithm: The Banker’s algorithm is used to prevent deadlock by ensuring that the system is always in a safe state.

  • Conclusion: It is used for deadlock prevention.

534. A thread:

  1. Is a lightweight process where the context switching is low

  2. Is a lightweight process where the context switching is high

  3. Is used to speed up paging

  4. None of the above

Show me the answer

Answer: 1. Is a lightweight process where the context switching is low

Explanation:

  • Thread: A thread is a lightweight process that shares resources with other threads in the same process. Context switching between threads is faster than between processes.

  • Conclusion: Threads have low context switching overhead.

535. ______ is a high-level abstraction over Semaphore.

  1. Shared memory

  2. Monitor

  3. Message passing

  4. Mutual exclusion

Show me the answer

Answer: 2. Monitor

Explanation:

  • Monitor: A monitor is a high-level synchronization construct that encapsulates shared resources and provides controlled access to them.

  • Conclusion: Monitors abstract over semaphores.

536. A tree-structured file directory system ______.

  1. Allows easy storage and retrieval of file names

  2. Is a much-debated unnecessary feature

  3. Is not essential when we have millions of files

  4. None of the above

Show me the answer

Answer: 1. Allows easy storage and retrieval of file names

Explanation:

  • Tree Directory Structure: A tree-structured directory system organizes files hierarchically, making it easier to store and retrieve files.

  • Conclusion: It simplifies file management.

537. Translator for low-level programming language were termed as:

  1. Assembler

  2. Linker

  3. Compiler

  4. Loader

Show me the answer

Answer: 1. Assembler

Explanation:

  • Assembler: An assembler translates low-level assembly language into machine code.

  • Conclusion: Assemblers are used for low-level languages.

538. Analysis which determines the meaning of a statement once its grammatical structure becomes known is termed as:

  1. Semantic analysis

  2. Regular analysis

  3. Syntax analysis

  4. General analysis

Show me the answer

Answer: 1. Semantic analysis

Explanation:

  • Semantic Analysis: Semantic analysis determines the meaning of a statement after its syntax is understood.

  • Conclusion: This is called semantic analysis.

539. Load address for the first word of the program is called:

  1. Linker address origin

  2. Phase library

  3. Load address origin

  4. Absolute library

Show me the answer

Answer: 3. Load address origin

Explanation:

  • Load Address Origin: The load address origin is the starting address where the first word of the program is loaded.

  • Conclusion: This is called the load address origin.

540. Symbolic names can be associated with:

  1. Information

  2. Operand

  3. Data or instruction

  4. Mnemonic operation

Show me the answer

Answer: 3. Data or instruction

Explanation:

  • Symbolic Names: Symbolic names are used to represent data or instructions in assembly language.

  • Conclusion: Symbolic names are associated with data or instructions.

541. The translator which performs macro expansion is called a:

  1. Macro processor

  2. Micro pre-processor

  3. Macro pre-processor

  4. Assembler

Show me the answer

Answer: 1. Macro processor

Explanation:

  • Macro Processor: A macro processor expands macros into their corresponding code during assembly.

  • Conclusion: This is called a macro processor.

542. Shell is the exclusive feature of:

  1. UNIX

  2. System software

  3. DOS

  4. Application software

Show me the answer

Answer: 1. UNIX

Explanation:

  • Shell: The shell is a command interpreter primarily associated with UNIX-based operating systems.

  • Conclusion: The shell is a feature of UNIX.

543. A program in execution is called:

  1. Process

  2. Procedure

  3. Instruction

  4. Function

Show me the answer

Answer: 1. Process

Explanation:

  • Process: A process is a program in execution.

  • Conclusion: This is called a process.

544. Interval between the time of submission and completion of the job is called:

  1. Waiting time

  2. Throughput

  3. Turnaround time

  4. Response time

Show me the answer

Answer: 3. Turnaround time

Explanation:

  • Turnaround Time: Turnaround time is the total time taken from job submission to completion.

  • Conclusion: This is called turnaround time.

545. A scheduler which selects processes from secondary storage device is called:

  1. Short-term scheduler

  2. Medium-term scheduler

  3. Long-term scheduler

  4. Process scheduler

Show me the answer

Answer: 3. Long-term scheduler

Explanation:

  • Long-Term Scheduler: The long-term scheduler selects processes from secondary storage and loads them into memory.

  • Conclusion: This is the long-term scheduler.

546. The scheduling in which CPU is allocated to the process with the least CPU-burst time is called:

  1. Priority Scheduling

  2. Round Robin Scheduling

  3. Shortest job-first Scheduling

  4. Multilevel Queue Scheduling

Show me the answer

Answer: 3. Shortest job-first Scheduling

Explanation:

  • SJF Scheduling: Shortest Job First (SJF) scheduling allocates the CPU to the process with the shortest CPU burst time.

  • Conclusion: This is called SJF scheduling.

547. The term ‘page traffic’ describes:

  1. Number of pages in memory at a given instant

  2. Number of papers required to be brought in at a given page request

  3. The movement of pages in and out of memory

  4. Number of pages of executing programs loaded in memory

Show me the answer

Answer: 3. The movement of pages in and out of memory

Explanation:

  • Page Traffic: Page traffic refers to the movement of pages between memory and secondary storage.

  • Conclusion: This describes page traffic.

548. The “turn-around” time of a user job is the:

  1. Time since its submission to the time its results become available

  2. Time duration for which the CPU is allotted to the job

  3. Total time taken to execute the job

  4. Time taken for the job to move from assembly phase to completion phase

Show me the answer

Answer: 1. Time since its submission to the time its results become available

Explanation:

  • Turnaround Time: Turnaround time is the total time from job submission to completion.

  • Conclusion: This is the correct definition.

549. Which of the following can be used as a criterion for classification of data structures used in language processing?

  1. Nature of a data structure

  2. Lifetime of a data structure

  3. Purpose of a data structure

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Data Structure Classification: Data structures can be classified based on their nature, lifetime, and purpose.

  • Conclusion: All the listed criteria are valid.

550. Memory utilization factor shall be computed as follows:

  1. Memory in use/allocated memory

  2. Memory in use/total memory connected

  3. Memory allocated/free existing memory

  4. Memory committed/total memory available

Show me the answer

Answer: 1. Memory in use/allocated memory

Explanation:

  • Memory Utilization: Memory utilization is calculated as the ratio of memory in use to allocated memory.

  • Conclusion: This is the correct formula.

550. Memory utilization factor shall be computed as follows:

  1. Memory in use/allocated memory

  2. Memory in use/total memory connected

  3. Memory allocated/free existing memory

  4. Memory committed/total memory available

Show me the answer

Answer: 1. Memory in use/allocated memory

Explanation:

  • Memory Utilization Factor: The memory utilization factor measures how efficiently memory is being used. It is calculated as the ratio of memory in use to the total allocated memory.

  • Conclusion: Memory utilization factor is computed as memory in use divided by allocated memory.

551. Program ‘preemption’ is:

  1. Forced deallocation of the CPU from a program which is executing on the CPU

  2. Release of CPU by the program after completing its task

  3. Forced allotment of CPU by a program to itself

  4. A program terminating itself due to detection of an error

Show me the answer

Answer: 1. Forced deallocation of the CPU from a program which is executing on the CPU

Explanation:

  • Preemption: Preemption occurs when the operating system forcibly removes a running process from the CPU to allocate it to another process, typically in a time-sharing system.

  • Conclusion: Preemption involves forced deallocation of the CPU from a running process.

552. An assembler is:

  1. Programming language dependent

  2. Machine dependent

  3. Syntax dependent

  4. Data dependent

Show me the answer

Answer: 2. Machine dependent

Explanation:

  • Assembler: An assembler is a program that converts assembly language code into machine code. It is machine-dependent because the generated machine code is specific to the target processor architecture.

  • Conclusion: Assemblers are machine-dependent.

553. Which of the following is not a fundamental process state?

  1. Ready

  2. Executing

  3. Terminated

  4. Blocked

Show me the answer

Answer: 2. Executing

Explanation:

  • Process States: The fundamental process states are Ready, Running, Blocked, and Terminated. "Executing" is not a standard process state; it is synonymous with the Running state.

  • Conclusion: Executing is not a fundamental process state.

554. LRU page replacement policy is:

  1. Last Replaced Unit

  2. Least Recently Used

  3. Last Restored Unit

  4. Least Required Unit

Show me the answer

Answer: 2. Least Recently Used

Explanation:

  • LRU Policy: The Least Recently Used (LRU) page replacement policy replaces the page that has not been used for the longest time.

  • Conclusion: LRU stands for Least Recently Used.

555. Which of the following is true?

  1. Block cipher technique is an encryption technique

  2. Stream cipher technique is an encryption technique

  3. Both (A) and (B)

  4. Neither of (A) and (B)

Show me the answer

Answer: 3. Both (A) and (B)

Explanation:

  • Encryption Techniques: Block cipher and stream cipher are both encryption techniques. Block cipher encrypts data in fixed-size blocks, while stream cipher encrypts data bit by bit.

  • Conclusion: Both block cipher and stream cipher are encryption techniques.

556. Which of the following approaches do not require knowledge of the system state?

  1. Deadlock detection

  2. Deadlock avoidance

  3. Deadlock prevention

  4. None of the above

Show me the answer

Answer: 3. Deadlock prevention

Explanation:

  • Deadlock Prevention: Deadlock prevention techniques do not require knowledge of the system state. They ensure that at least one of the necessary conditions for deadlock (mutual exclusion, hold and wait, no preemption, circular wait) is never satisfied.

  • Conclusion: Deadlock prevention does not require knowledge of the system state.

557. Program generation activity aims at:

  1. Automatic generation of program

  2. Organize execution of a program written in PL

  3. Skips generation of program

  4. Speed generation of program

Show me the answer

Answer: 1. Automatic generation of program

Explanation:

  • Program Generation: Program generation involves automatically creating programs based on predefined templates or specifications.

  • Conclusion: Program generation aims at the automatic generation of programs.

558. Which amongst the following is not an advantage of Distributed systems?

  1. Reliability

  2. Resource sharing

  3. Incremental growth

  4. None of the above

Show me the answer

Answer: 4. None of the above

Explanation:

  • Advantages of Distributed Systems: Distributed systems offer reliability, resource sharing, and incremental growth. All the listed options are advantages.

  • Conclusion: None of the options are disadvantages of distributed systems.

559. An imperative statement:

  1. Reserves areas of memory and associates names with them

  2. Indicates an action to be performed during execution of assembled program

  3. Indicates an action to be performed during optimization

  4. None of the above

Show me the answer

Answer: 2. Indicates an action to be performed during execution of assembled program

Explanation:

  • Imperative Statement: An imperative statement in assembly language specifies an action to be performed during the execution of the program.

  • Conclusion: Imperative statements indicate actions to be performed during execution.

560. Which of the following loader is executed when a system is first turned on or restarted?

  1. Boot loader

  2. Bootstrap loader

  3. Compile and Go loader

  4. Relating loader

Show me the answer

Answer: 2. Bootstrap loader

Explanation:

  • Bootstrap Loader: The bootstrap loader is a small program that runs when the system is first turned on or restarted. It loads the operating system into memory.

  • Conclusion: The bootstrap loader is executed during system startup.

561. Poor response time is usually caused by:

  1. Process busy

  2. High paging rate

  3. High I/O rates

  4. Any of the above

Show me the answer

Answer: 4. Any of the above

Explanation:

  • Poor Response Time: Poor response time can be caused by a busy process, high paging rates, or high I/O rates, as all these factors can delay the execution of user requests.

  • Conclusion: Any of the listed factors can cause poor response time.

562. The “blocking factor” of a file is:

  1. The number of blocks accessible to a file

  2. The number of blocks allocated to a file

  3. The number of logical records in one physical record

  4. None of the above

Show me the answer

Answer: 3. The number of logical records in one physical record

Explanation:

  • Blocking Factor: The blocking factor is the number of logical records stored in one physical block or record.

  • Conclusion: The blocking factor refers to the number of logical records in one physical record.

563. Which of these is a component of a process precedence sequence?

  1. Process name

  2. Concurrency operator

  3. Sequence operator ';'

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Process Precedence Sequence: A process precedence sequence includes process names, concurrency operators, and sequence operators to define the order of process execution.

  • Conclusion: All the listed options are components of a process precedence sequence.

564. Which amongst the following is valid syntax of the Fork and Join Primitive?

  1. Fork

  2. For

  3. Fork

  4. Fork

Show me the answer

Answer: 1. Fork

Explanation:

  • Fork and Join Primitive: The Fork and Join primitives are used in parallel programming. The valid syntax for Fork is Fork <label>, where <label> specifies the starting point of the new process.

  • Conclusion: The correct syntax is Fork <label>.

565. Nested Macro calls are expanded using the:

  1. FIFO rule (First in first out)

  2. FILO rule (First in last out)

  3. LIFO (Last in First out)

  4. None of the above

Show me the answer

Answer: 3. LIFO (Last in First out)

Explanation:

  • Nested Macro Calls: Nested macro calls are expanded using the Last In First Out (LIFO) rule, similar to a stack.

  • Conclusion: LIFO is used for expanding nested macro calls.

566. A parser which is a variant of top-down parsing without backtracking is:

  1. Recursive Descent

  2. LL(1) parser

  3. Operator Precedence

  4. LALR Parser

Show me the answer

Answer: 2. LL(1) parser

Explanation:

  • LL(1) Parser: The LL(1) parser is a variant of top-down parsing that does not require backtracking. It uses a lookahead of one token to make parsing decisions.

  • Conclusion: The LL(1) parser is a top-down parser without backtracking.

567. The expansion of nested macro calls follows:

  1. FIFO rule

  2. LILO rule

  3. LIFO rule

  4. Priority rule

Show me the answer

Answer: 3. LIFO rule

Explanation:

  • Nested Macro Calls: Nested macro calls are expanded using the Last In First Out (LIFO) rule, similar to a stack.

  • Conclusion: LIFO is used for expanding nested macro calls.

568. In a two-pass assembler, the task of the Pass II is to:

  1. Separate the symbol, mnemonic opcode, and operand fields

  2. Build the symbol table

  3. Construct intermediate code

  4. Synthesize the target program

Show me the answer

Answer: 4. Synthesize the target program

Explanation:

  • Pass II of Assembler: In a two-pass assembler, Pass II synthesizes the target program by generating machine code using the symbol table built in Pass I.

  • Conclusion: Pass II synthesizes the target program.

569. A linker program:

  1. Places the program in the memory for the purpose of execution

  2. Relocates the program to execute from the specific memory area allocated to it

  3. Links the program with other programs needed for its execution

  4. Interfaces the program with the entities generating its input data

Show me the answer

Answer: 3. Links the program with other programs needed for its execution

Explanation:

  • Linker Program: The linker combines object modules into a single executable program and resolves external references between them.

  • Conclusion: The linker links the program with other programs needed for its execution.

570. Which scheduling policy is most suitable for a time-shared operating system?

  1. Shortest-job First

  2. Round-Robin

  3. Elevator

  4. First-Come-First-Serve

Show me the answer

Answer: 2. Round-Robin

Explanation:

  • Time-Shared Systems: Round-Robin scheduling is most suitable for time-shared systems because it provides fair CPU allocation to all processes by giving each process a fixed time slice (quantum).

  • Conclusion: Round-Robin is ideal for time-shared operating systems.

571. A critical section is a program segment:

  1. Which should run in a certain specified amount of time

  2. Which avoids deadlocks

  3. Where shared resources are accessed

  4. Which must be enclosed by a pair of semaphore operations, P and V

Show me the answer

Answer: 3. Where shared resources are accessed

Explanation:

  • Critical Section: A critical section is a segment of code where shared resources are accessed. It must be executed atomically to prevent race conditions.

  • Conclusion: The critical section is where shared resources are accessed.

572. An operating system contains 3 user processes each requiring 2 units of resource R. The minimum number of units of R such that no deadlocks will ever arise is:

  1. 4

  2. 3

  3. 5

  4. 6

Show me the answer

Answer: 1. 4

Explanation:

  • Deadlock Prevention: To prevent deadlock, the system must ensure that the total number of resources is sufficient to satisfy the maximum demand of at least one process. For nn processes, each requiring kk units of a resource, the minimum number of resources required to avoid deadlock is given by:

    Minimum Resources=n×(k1)+1\text{Minimum Resources} = n \times (k - 1) + 1

    For 3 processes, each requiring 2 units:

    Minimum Resources=3×(21)+1=4\text{Minimum Resources} = 3 \times (2 - 1) + 1 = 4
  • Conclusion: The minimum number of units of R required to avoid deadlock is 4.

573. Locality of reference implies that the page reference being made by a process:

  1. Will always be to the page used in the previous page reference

  2. Is likely to be the one of the pages used in the last few page references

  3. Will always be to one of the pages existing in memory

  4. Will always lead to a page fault

Show me the answer

Answer: 2. Is likely to be the one of the pages used in the last few page references

Explanation:

  • Locality of Reference: Locality of reference refers to the tendency of a program to access the same set of memory locations repeatedly over a short period of time. This property can be spatial (nearby locations) or temporal (recently accessed locations).

  • Conclusion: Locality of reference implies that a process is likely to access pages used in the last few references.

574. This of these is not a part of Synthesis phase:

  1. Obtain machine code corresponding to the mnemonic from the Mnemonics table

  2. Obtain address of a memory operand from the symbol table

  3. Perform LC processing

  4. Synthesize a machine instruction or the machine form of a constant

Show me the answer

Answer: 3. Perform LC processing

Explanation:

  • Synthesis Phase: The synthesis phase of an assembler involves generating machine code from assembly instructions. LC (Location Counter) processing is part of the analysis phase, not the synthesis phase.

  • Conclusion: LC processing is not part of the synthesis phase.

575. The syntax of the assembler directive EQU is:

  1. EQU

  2. EQU

  3. EQU

  4. None of the above

Show me the answer

Answer: 3. EQU

Explanation:

  • EQU Directive: The EQU directive in assembly language is used to define a symbol and assign it a value. The correct syntax is <symbol> EQU <address space>.

  • Conclusion: The correct syntax is <symbol> EQU <address space>.

576. The following features are needed to implement top-down parsing:

  1. Source string marker

  2. Matching and Backtracking

  3. Prediction making mechanism

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Top-Down Parsing: Top-down parsing requires a source string marker, matching and backtracking, and a prediction-making mechanism to determine the correct production rule.

  • Conclusion: All the listed features are needed for top-down parsing.

577. A macro definition consists of:

  1. Macro prototype statement

  2. Macro pre-processor statements

  3. One or more model statements

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Macro Definition: A macro definition includes a macro prototype statement, macro pre-processor statements, and one or more model statements.

  • Conclusion: All the listed components are part of a macro definition.

578. The main reason to encrypt a file is to:

  1. Reduce its size

  2. Prepare it for backup

  3. Secure it for transmission

  4. Include it in the start-up sequence

Show me the answer

Answer: 3. Secure it for transmission

Explanation:

  • File Encryption: The primary purpose of encrypting a file is to secure it during transmission or storage, preventing unauthorized access.

  • Conclusion: Encryption is used to secure files for transmission.

579. This of the following is not a key piece of information, stored in a single page table entry, assuming pure paging and virtual memory:

  1. Frame number

  2. A bit indicating whether the page is in physical memory or on the disk

  3. A reference for the disk block that stores the page

  4. None of the above

Show me the answer

Answer: 3. A reference for the disk block that stores the page

Explanation:

  • Page Table Entry: A page table entry typically includes the frame number and a bit indicating whether the page is in memory or on disk. It does not include a reference to the disk block.

  • Conclusion: A reference to the disk block is not stored in a page table entry.

580. A UNIX device driver is:

  1. Structured into two halves called top half and bottom half

  2. Three equal partitions

  3. Unstructured

  4. None of the above

Show me the answer

Answer: 1. Structured into two halves called top half and bottom half

Explanation:

  • UNIX Device Driver: A UNIX device driver is structured into two halves: the top half (interrupt handler) and the bottom half (deferred processing).

  • Conclusion: UNIX device drivers are structured into top and bottom halves.

581. The following is not a layer of IO management module:

  1. PIOCS (Physical Input Output Control System)

  2. LIOCS (Logical Input Output Control System)

  3. FS (File System)

  4. MCS (Management Control System)

Show me the answer

Answer: 4. MCS (Management Control System)

Explanation:

  • IO Management Module: The IO management module includes PIOCS, LIOCS, and FS. MCS is not a standard layer of the IO management module.

  • Conclusion: MCS is not part of the IO management module.

582. Which amongst the following is not a valid page replacement policy?

  1. LRU policy (Least Recently Used)

  2. FIFO policy (First in first out)

  3. RU policy (Recurrently used)

  4. Optimal page replacement policy

Show me the answer

Answer: 3. RU policy (Recurrently used)

Explanation:

  • Page Replacement Policies: LRU, FIFO, and Optimal are valid page replacement policies. RU (Recurrently Used) is not a standard policy.

  • Conclusion: RU is not a valid page replacement policy.

583. Consider a program with a linked origin of 5000. Let the memory area allocated to it have the start address of 70000. Which amongst the following will be the value to be loaded in the relocation register?

  1. 20000

  2. 50000

  3. 70000

  4. None of the above

Show me the answer

Answer: 4. None of the above

Explanation:

  • Relocation Register: The relocation register contains the difference between the linked origin and the actual start address. Here:

    Relocation Register=700005000=65000\text{Relocation Register} = 70000 - 5000 = 65000
  • Conclusion: The correct value is 65000, which is not listed in the options.

584. An assembly language is a:

  1. Low-level programming language

  2. Middle-level programming language

  3. High-level programming language

  4. Internet-based programming language

Show me the answer

Answer: 1. Low-level programming language

Explanation:

  • Assembly Language: Assembly language is a low-level programming language that is closely related to machine code and provides direct control over hardware.

  • Conclusion: Assembly language is a low-level programming language.

585. TII stands for:

  1. Table of Incomplete Instructions

  2. Table of Information Instructions

  3. Translation of Instructions Information

  4. Translation of Information Instruction

Show me the answer

Answer: 1. Table of Incomplete Instructions

Explanation:

  • TII: TII stands for Table of Incomplete Instructions, which is used in assembly language processing to track instructions that are not fully resolved.

  • Conclusion: TII refers to the Table of Incomplete Instructions.

586. An analysis, which determines the syntactic structure of the source statement, is called:

  1. Semantic Analysis

  2. Syntax Analysis

  3. Process Analysis

  4. Function Analysis

Show me the answer

Answer: 2. Syntax Analysis

Explanation:

  • Syntax Analysis: Syntax analysis is the phase of compilation that checks the syntactic structure of source code to ensure it conforms to the language's grammar rules.

  • Conclusion: Syntax analysis determines the syntactic structure of source statements.

587. Actions implementing instruction’s meaning are actually carried out by:

  1. Instruction Fetch

  2. Instruction Execution

  3. Instruction Decode

  4. Instruction Program

Show me the answer

Answer: 2. Instruction Execution

Explanation:

  • Instruction Execution: The execution phase of the CPU carries out the actions specified by the instruction, such as performing arithmetic operations or accessing memory.

  • Conclusion: Instruction execution implements the meaning of instructions.

588. The field that contains a segment index or an internal index is called:

  1. Target Datum

  2. Segment Field

  3. Target Offset

  4. Fis Data

Show me the answer

Answer: 2. Segment Field

Explanation:

  • Segment Field: In segmented memory systems, the segment field contains the segment index or internal index used to locate the segment in memory.

  • Conclusion: The segment field contains the segment index.

589. A program in execution is called:

  1. Process

  2. CPU

  3. Function

  4. Memory

Show me the answer

Answer: 1. Process

Explanation:

  • Process: A process is an instance of a program in execution. It includes the program code, data, and resources allocated to it.

  • Conclusion: A program in execution is called a process.

590. Jobs which are admitted to the system for processing are called:

  1. Long-term scheduling

  2. Medium-term scheduling

  3. Short-term scheduling

  4. Queuing

Show me the answer

Answer: 1. Long-term scheduling

Explanation:

  • Long-Term Scheduling: Long-term scheduling involves admitting jobs to the system and placing them in the job queue for processing.

  • Conclusion: Jobs admitted to the system are handled by long-term scheduling.

591. A set of techniques that allow executing a program which is not entirely in memory is called:

  1. Demand Paging

  2. Auxiliary Memory

  3. Virtual Memory

  4. Secondary Memory

Show me the answer

Answer: 3. Virtual Memory

Explanation:

  • Virtual Memory: Virtual memory is a technique that allows a program to execute even if it is not entirely loaded into physical memory. It uses paging or segmentation to manage memory.

  • Conclusion: Virtual memory enables programs to execute without being fully loaded into memory.

592. SSTF stands for:

  1. Shortest-Seek-Time-First scheduling

  2. Simple-Seek-Time-First

  3. Small–Small-Time-First

  4. Small-Simple-Time-First scheduling

Show me the answer

Answer: 1. Shortest-Seek-Time-First scheduling

Explanation:

  • SSTF: SSTF (Shortest-Seek-Time-First) is a disk scheduling algorithm that selects the request with the shortest seek time from the current head position.

  • Conclusion: SSTF stands for Shortest-Seek-Time-First scheduling.

593. Before proceeding with its execution, each process must acquire all the resources it needs is called:

  1. Hold and Wait

  2. Circular Wait

  3. No Pre-emption

  4. Starvation

Show me the answer

Answer: 1. Hold and Wait

Explanation:

  • Hold and Wait: Hold and wait is a condition for deadlock where a process holds at least one resource and waits for additional resources.

  • Conclusion: Hold and wait describes a process acquiring all needed resources before execution.

594. Relocation bits used by relocating loader are specified by:

  1. Relocating loader itself

  2. Macro processor

  3. Assembler or Translator

  4. Both (A) and (B)

Show me the answer

Answer: 3. Assembler or Translator

Explanation:

  • Relocation Bits: Relocation bits are specified by the assembler or translator to indicate which parts of the program need to be relocated during loading.

  • Conclusion: The assembler or translator specifies relocation bits.

595. Resolution of externally defined symbols is performed by:

  1. Linker

  2. Compiler

  3. Loader

  4. Editor

Show me the answer

Answer: 1. Linker

Explanation:

  • Linker: The linker resolves externally defined symbols by combining object modules and resolving references between them.

  • Conclusion: The linker performs resolution of externally defined symbols.

596. Relocation programs:

  1. Cannot be used with fixed partitions

  2. Can be loaded almost anywhere in memory

  3. Do not need a linker

  4. Can be loaded only at one specific location

Show me the answer

Answer: 2. Can be loaded almost anywhere in memory

Explanation:

  • Relocation Programs: Relocation programs can be loaded into different memory locations because they use relative addressing.

  • Conclusion: Relocation programs can be loaded almost anywhere in memory.

597. Authentication is a fundamental building block in most computers:

  1. Security Context

  2. Execution Context

  3. Control Context

  4. Performance Context

Show me the answer

Answer: 1. Security Context

Explanation:

  • Authentication: Authentication verifies the identity of users or systems and is a fundamental part of computer security.

  • Conclusion: Authentication is part of the security context.

598. Page fault frequency in an operating system is reduced when the:

  1. Processes tend to be I/O-bound

  2. Size of pages is reduced

  3. Processes tend to be CPU-bound

  4. Locality of reference is applicable to the process

Show me the answer

Answer: 4. Locality of reference is applicable to the process

Explanation:

  • Locality of Reference: If a process exhibits strong locality of reference, it accesses the same set of memory locations repeatedly, reducing page faults.

  • Conclusion: Locality of reference reduces page fault frequency.

599. Which of the following are language processors?

  1. Assembler

  2. Interpreter

  3. Compiler

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Language Processors: Assemblers, interpreters, and compilers are all language processors that convert high-level or assembly code into machine code.

  • Conclusion: All of the above are language processors.

600. Virtual memory can be implemented with:

  1. Segmentation

  2. None

  3. Paging

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Virtual Memory Implementation: Virtual memory can be implemented using paging, segmentation, or a combination of both.

  • Conclusion: Virtual memory can be implemented with paging, segmentation, or both.

601. Recognition of basic syntactic constructs through reductions, this task is performed by:

  1. Lexical Analysis

  2. Semantic Analysis

  3. Syntax Analysis

  4. Structure Analysis

Show me the answer

Answer: 3. Syntax Analysis

Explanation:

  • Syntax Analysis: Syntax analysis recognizes the syntactic structure of source code by reducing it to basic constructs.

  • Conclusion: Syntax analysis performs this task.

602. A grammar for a programming language is a formal description of:

  1. Syntax

  2. Structure

  3. Semantics

  4. Code

Show me the answer

Answer: 1. Syntax

Explanation:

  • Grammar: A grammar defines the syntax of a programming language, specifying how valid programs are structured.

  • Conclusion: Grammar describes the syntax of a language.

603. ______ is a technique of temporarily removing inactive programs from the memory of a computer system:

  1. Swapping

  2. Semaphore

  3. Spooling

  4. Scheduler

Show me the answer

Answer: 1. Swapping

Explanation:

  • Swapping: Swapping involves moving inactive processes out of memory to secondary storage to free up memory for active processes.

  • Conclusion: Swapping temporarily removes inactive programs from memory.

604. ______ is a technique of improving the priority of processes waiting in the queue for CPU allocation:

  1. Starvation

  2. Revocation

  3. Aging

  4. Relocation

Show me the answer

Answer: 3. Aging

Explanation:

  • Aging: Aging gradually increases the priority of long-waiting processes to prevent starvation.

  • Conclusion: Aging improves the priority of waiting processes.

605. ______ is the time required by a sector to reach below the read/write head:

  1. Seek Time

  2. Access Time

  3. Latency Time

  4. None

Show me the answer

Answer: 3. Latency Time

Explanation:

  • Latency Time: Latency time is the time required for the desired sector to rotate under the read/write head.

  • Conclusion: Latency time is the time for a sector to reach the read/write head.

606. Which of the following is the most general phase-structured grammar?

  1. Context-Sensitive

  2. Context-Free

  3. Regular

  4. None of the above

Show me the answer

Answer: 1. Context-Sensitive

Explanation:

  • Context-Sensitive Grammar: Context-sensitive grammar is the most general phase-structured grammar, allowing rules that depend on the context of symbols.

  • Conclusion: Context-sensitive grammar is the most general.

607. File record length:

  1. Should always be fixed

  2. Should always be variable

  3. Depends upon the size of the file

  4. Should be chosen to match the data characteristics

Show me the answer

Answer: 4. Should be chosen to match the data characteristics

Explanation:

  • File Record Length: The length of file records should be chosen based on the characteristics of the data being stored.

  • Conclusion: File record length should match data characteristics.

608. The process is:

  1. An instance of a program in execution

  2. A program only

  3. Processor state

  4. None of the above

Show me the answer

Answer: 1. An instance of a program in execution

Explanation:

  • Process: A process is an instance of a program in execution, including the program code, data, and resources.

  • Conclusion: A process is an executing instance of a program.

609. A program is passive while a process is:

  1. Inactive

  2. Spontaneous

  3. Active

  4. None of the above

Show me the answer

Answer: 3. Active

Explanation:

  • Program vs. Process: A program is a passive entity stored on disk, while a process is an active entity that executes the program.

  • Conclusion: A process is active, while a program is passive.

610. A process is created and is initially put in the:

  1. Ready queue

  2. Device output

  3. Any of the above

  4. None of the above

Show me the answer

Answer: 1. Ready queue

Explanation:

  • Process Creation: When a process is created, it is placed in the ready queue, waiting to be scheduled for execution.

  • Conclusion: A new process is placed in the ready queue.

611. Exit() system call results in:

  1. Forced termination

  2. Normal termination

  3. Abnormal termination

  4. None of the above

Show me the answer

Answer: 2. Normal termination

Explanation:

  • Exit() System Call: The exit() system call terminates a process normally, releasing its resources.

  • Conclusion: Exit() results in normal termination.

612. A thread is a:

  1. Task

  2. Process

  3. Program

  4. Lightweight process

Show me the answer

Answer: 4. Lightweight process

Explanation:

  • Thread: A thread is a lightweight process that shares memory and resources with other threads in the same process.

  • Conclusion: A thread is a lightweight process.

613. Generally, we have user-level threads and:

  1. Programmer-level thread

  2. Kernel-level thread

  3. Program-level thread

  4. None of the above

Show me the answer

Answer: 2. Kernel-level thread

Explanation:

  • Thread Types: Threads can be user-level (managed by the application) or kernel-level (managed by the operating system).

  • Conclusion: Kernel-level threads complement user-level threads.

614. IPCs can be done through:

  1. Mails

  2. Messages

  3. System calls

  4. Traps

Show me the answer

Answer: 2. Messages

Explanation:

  • IPC Mechanisms: Inter-process communication (IPC) can be done through messages, shared memory, pipes, and other mechanisms.

  • Conclusion: Messages are a common IPC mechanism.

615. RR scheduling is a preemptive version of:

  1. FIFO

  2. SJF

  3. MLQ

  4. None of the above

Show me the answer

Answer: 1. FIFO

Explanation:

  • Round Robin (RR): RR scheduling is a preemptive version of FIFO, where each process is given a fixed time slice.

  • Conclusion: RR is a preemptive version of FIFO.

616. A scheduling where in the jobs are allowed to move between the queues:

  1. Multilevel queue scheduling

  2. Multilevel feedback scheduling

  3. RR scheduling

  4. None of the above

Show me the answer

Answer: 2. Multilevel feedback scheduling

Explanation:

  • Multilevel Feedback Scheduling: This scheduling algorithm allows processes to move between queues based on their behavior and priority.

  • Conclusion: Multilevel feedback scheduling allows job movement between queues.

617. In RR Scheduling, a ready queue is treated as:

  1. Circular queue

  2. Doubly linked list

  3. Stack

  4. None of the above

Show me the answer

Answer: 1. Circular queue

Explanation:

  • Round Robin (RR): In RR scheduling, the ready queue is treated as a circular queue, where processes are given time slices in a cyclic manner.

  • Conclusion: The ready queue in RR is a circular queue.

618. FIFO scheduling is:

  1. Preemptive

  2. Non-preemptive

  3. Deadline scheduling

  4. None of the above

Show me the answer

Answer: 2. Non-preemptive

Explanation:

  • FIFO Scheduling: FIFO (First-In-First-Out) scheduling is non-preemptive, meaning a process runs to completion once it starts.

  • Conclusion: FIFO is non-preemptive.

619. The indefinite blocking of low-priority processes by high-priority processes is known as:

  1. Starvation

  2. Deadlock

  3. Aging

  4. None of the above

Show me the answer

Answer: 1. Starvation

Explanation:

  • Starvation: Starvation occurs when low-priority processes are indefinitely blocked by high-priority processes.

  • Conclusion: Starvation describes indefinite blocking of low-priority processes.

620. The technique of gradually increasing the priority of processes that wait in the system for a long time is called:

  1. Aging

  2. Throughput

  3. FCFS

  4. None of the above

Show me the answer

Answer: 1. Aging

Explanation:

  • Aging: Aging increases the priority of long-waiting processes to prevent starvation.

  • Conclusion: Aging gradually increases the priority of waiting processes.

621. The main objective of scheduling is:

  1. CPU utilization

  2. Increase the throughput

  3. Both A and B

  4. None of the above

Show me the answer

Answer: 3. Both A and B

Explanation:

  • Scheduling Objectives: The main objectives of scheduling are to maximize CPU utilization and throughput.

  • Conclusion: Scheduling aims to improve CPU utilization and throughput.

622. The total time elapsed from the time the job is submitted (or process is created) to the time the job (or process) is completed is called:

  1. Response time

  2. Waiting time

  3. Turnaround time

  4. None of the above

Show me the answer

Answer: 3. Turnaround time

Explanation:

  • Turnaround Time: Turnaround time is the total time from job submission to completion.

  • Conclusion: Turnaround time measures the total time for job completion.

623. ______ is defined as the average fraction of time during which the CPU is busy, executing either user programs or system modules:

  1. Throughput

  2. CPU utilization

  3. Response time

  4. Waiting time

Show me the answer

Answer: 2. CPU utilization

Explanation:

  • CPU Utilization: CPU utilization measures the fraction of time the CPU is busy executing tasks.

  • Conclusion: CPU utilization measures the busy time of the CPU.

624. In ______ scheduling, if once a process has been allocated CPU, then the CPU cannot be taken away from that process:

  1. Pre-emptive scheduling

  2. Non-preemptive scheduling

  3. Both A and C

  4. None of the above

Show me the answer

Answer: 2. Non-preemptive scheduling

Explanation:

  • Non-Preemptive Scheduling: In non-preemptive scheduling, once a process starts execution, it cannot be interrupted until it completes.

  • Conclusion: Non-preemptive scheduling does not allow CPU reallocation.

625. In ______, the CPU can be taken away before the completion of the process:

  1. Pre-emptive scheduling

  2. Non-preemptive

  3. Both A and B

  4. None of the above

Show me the answer

Answer: 1. Pre-emptive scheduling

Explanation:

  • Pre-emptive Scheduling: In pre-emptive scheduling, the CPU can be taken away from a process before it completes.

  • Conclusion: Pre-emptive scheduling allows CPU reallocation.

626. “If there are n-processes in a ready queue and the time quantum is ‘q’ time intervals, then each process gets ‘1/n’, of the CPU time in the chunks of at most ‘q’ units of time. Each process will have to wait for (n -1) x q time unit until its next time quantum comes in” This principle is suitable for which one of the following:

  1. Round robin algorithm

  2. SFJ

  3. FCFS

  4. None of the above

Show me the answer

Answer: 1. Round robin algorithm

Explanation:

  • Round Robin (RR): RR scheduling allocates CPU time in fixed time slices (quantum) to each process in the ready queue.

  • Conclusion: This principle describes the Round Robin algorithm.

627. Process can be in one of the following states:

  1. New, Ready

  2. Running

  3. Waiting, Blocked, Terminate

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Process States: A process can be in states such as New, Ready, Running, Waiting, Blocked, or Terminated.

  • Conclusion: All of the above are valid process states.

628. Process is:

  1. Loosely coupled

  2. Tightly coupled

  3. Both A and B

  4. None of the above

Show me the answer

Answer: 1. Loosely coupled

Explanation:

  • Process Coupling: Processes are loosely coupled, meaning they operate independently and communicate through inter-process communication mechanisms.

  • Conclusion: Processes are loosely coupled.

629. Process is:

  1. Lightweight process

  2. Heavyweight process

  3. Tightly coupled

  4. None of the above

Show me the answer

Answer: 2. Heavyweight process

Explanation:

  • Process vs. Thread: A process is a heavyweight entity with its own memory space, while a thread is a lightweight entity that shares memory with other threads.

  • Conclusion: A process is a heavyweight entity.

630. The high paging activity is called:

  1. Segmentation

  2. Thrashing

  3. Demand Paging

  4. None of the above

Show me the answer

Answer: 2. Thrashing

Explanation:

  • Thrashing: Thrashing occurs when the system spends more time swapping pages in and out of memory than executing processes.

  • Conclusion: High paging activity is called thrashing.

631. The process of merging adjacent holes to form a single larger hole is called as:

  1. Fragmentation

  2. Coalescing

  3. Swapping

  4. None of the above

Show me the answer

Answer: 2. Coalescing

Explanation:

  • Coalescing: Coalescing is the process of merging adjacent free memory blocks to form a larger contiguous block.

  • Conclusion: Coalescing merges adjacent holes.

632. The degree of multiprogramming is controlled by:

  1. CPU scheduler

  2. Context switching

  3. Long-term scheduler

  4. Medium-term scheduler

Show me the answer

Answer: 3. Long-term scheduler

Explanation:

  • Long-Term Scheduler: The long-term scheduler controls the degree of multiprogramming by deciding which jobs are admitted to the system.

  • Conclusion: The long-term scheduler controls multiprogramming.

633. Thrashing occurs:

  1. When excessive swapping takes place

  2. When you thrash your computer

  3. Whenever deadlock occurs

  4. When no swapping takes place

Show me the answer

Answer: 1. When excessive swapping takes place

Explanation:

  • Thrashing: Thrashing occurs when the system spends more time swapping pages than executing processes, leading to poor performance.

  • Conclusion: Thrashing is caused by excessive swapping.

634. Boundary registers:

  1. Are available in temporary program variables storage

  2. Are only necessary with fixed partitions

  3. Track the beginning and ending of programs

  4. Track page boundaries

Show me the answer

Answer: 3. Track the beginning and ending of programs

Explanation:

  • Boundary Registers: Boundary registers track the start and end addresses of programs in memory.

  • Conclusion: Boundary registers track program boundaries.

635. A scheduling algorithm is fair:

  1. If no process faces starvation

  2. If a process is starved, detect it and run it with high priority

  3. If it uses semaphores

  4. Only if a queue is used for scheduling

Show me the answer

Answer: 1. If no process faces starvation

Explanation:

  • Fair Scheduling: A fair scheduling algorithm ensures that no process is starved of CPU time.

  • Conclusion: Fairness in scheduling prevents starvation.

636. A critical region:

  1. Is a piece of code which only one process executes at a time

  2. Is a region prone to deadlock

  3. Is a piece of code which only a finite number of processes executes

  4. Is found only in Windows N operating system

Show me the answer

Answer: 1. Is a piece of code which only one process executes at a time

Explanation:

  • Critical Region: A critical region is a segment of code where shared resources are accessed, and only one process can execute it at a time to prevent race conditions.

  • Conclusion: A critical region is executed by only one process at a time.

637. In one of the deadlock prevention methods, impose a total ordering of all resource types, and require that each process requests resources in an increasing order of enumeration. This violates the ______ condition of deadlock:

  1. Mutual exclusion

  2. Hold and Wait

  3. Circular wait

  4. No preemption

Show me the answer

Answer: 3. Circular wait

Explanation:

  • Circular Wait: Imposing a total ordering of resources prevents circular wait, as processes cannot request resources in a cyclic manner.

  • Conclusion: This method violates the circular wait condition.

638. Semaphore can be used for solving:

  1. Wait and signal

  2. Deadlock

  3. Synchronization

  4. Priority

Show me the answer

Answer: 3. Synchronization

Explanation:

  • Semaphore: Semaphores are used for process synchronization, ensuring that processes access shared resources in a controlled manner.

  • Conclusion: Semaphores solve synchronization problems.

639. The hardware mechanism that enables a device to notify the CPU is called:

  1. Polling

  2. Interrupt

  3. System call

  4. None of the above

Show me the answer

Answer: 2. Interrupt

Explanation:

  • Interrupt: An interrupt is a hardware mechanism that allows a device to notify the CPU of an event requiring attention.

  • Conclusion: Interrupts enable devices to notify the CPU.

640. ______ begins at the root and follows a path down to the specified file:

  1. Relative path name

  2. Absolute path name

  3. Standalone name

  4. All of the above

Show me the answer

Answer: 2. Absolute path name

Explanation:

  • Absolute Path Name: An absolute path name starts at the root directory and specifies the complete path to a file.

  • Conclusion: Absolute path names begin at the root.

641. Process state is a part of:

  1. Process control block

  2. Node

  3. File allocation table

  4. None of the above

Show me the answer

Answer: 1. Process control block

Explanation:

  • Process Control Block (PCB): The PCB contains information about a process, including its state.

  • Conclusion: Process state is part of the PCB.

642. Virtual memory is commonly implemented by:

  1. Segmentation

  2. Swapping

  3. Demand paging

  4. None of the above

Show me the answer

Answer: 3. Demand paging

Explanation:

  • Demand Paging: Virtual memory is commonly implemented using demand paging, where pages are loaded into memory only when needed.

  • Conclusion: Demand paging is the most common implementation of virtual memory.

643. Paging:

  1. Solves the memory fragmentation problem

  2. Allows modular programming

  3. Allows structured programming

  4. Avoids deadlock

Show me the answer

Answer: 1. Solves the memory fragmentation problem

Explanation:

  • Paging: Paging divides memory into fixed-size pages, reducing external fragmentation.

  • Conclusion: Paging solves the memory fragmentation problem.

644. Which of the following is a criterion to evaluate a scheduling algorithm?

  1. CPU Utilization: keep CPU utilization as high as possible

  2. Throughput: number of processes completed per unit time

  3. Waiting time: amount of time spent ready to run but not running

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • Scheduling Criteria: CPU utilization, throughput, and waiting time are key criteria for evaluating scheduling algorithms.

  • Conclusion: All of the above are valid criteria.

645. Which of the following is contained in Process Control Block (PCB)?

  1. Process number

  2. List of open files

  3. Memory limits

  4. All of the above

Show me the answer

Answer: 4. All of the above

Explanation:

  • PCB Contents: The PCB contains information such as the process number, list of open files, and memory limits.

  • Conclusion: All of the above are contained in the PCB.

646. With the round-robin CPU scheduling in a time-shared system:

  1. Using very large time slice degenerates into the first-come-first-served algorithm

  2. Using extremely small time slices improves performance

  3. Using extremely small time slices degenerates into the last-in-first-out algorithm

  4. Using medium-sized time slices leads to the shortest request time first algorithm

Show me the answer

Answer: 1. Using very large time slice degenerates into the first-come-first-served algorithm

Explanation:

  • Round Robin (RR): In RR scheduling, if the time slice is very large, it behaves like FCFS, as each process runs to completion within its time slice.

  • Conclusion: A very large time slice makes RR similar to FCFS.

Last updated