set-11
551. Program ‘preemption’ is:
Forced deallocation of the CPU from a program which is executing on the CPU
Release of CPU by the program after completing its task
Forced allotment of CPU by a program to itself
A program terminating itself due to detection of an error
552. An assembler is:
Programming language dependent
Machine dependent
Syntax dependent
Data dependent
553. Which of the following is not a fundamental process state?
Ready
Executing
Terminated
Blocked
554. LRU page replacement policy is:
Last Replaced Unit
Least Recently Used
Last Restored Unit
Least Required Unit
555. Which of the following is true?
Block cipher technique is an encryption technique
Stream cipher technique is an encryption technique
Both (A) and (B)
Neither of (A) and (B)
556. Which of the following approaches do not require knowledge of the system state?
Deadlock detection
Deadlock avoidance
Deadlock prevention
None of the above
557. Program generation activity aims at:
Automatic generation of program
Organize execution of a program written in PL
Skips generation of program
Speed generation of program
558. Which amongst the following is not an advantage of Distributed systems?
Reliability
Resource sharing
Incremental growth
None of the above
559. An imperative statement:
Reserves areas of memory and associates names with them
Indicates an action to be performed during execution of assembled program
Indicates an action to be performed during optimization
None of the above
560. Which of the following loader is executed when a system is first turned on or restarted?
Boot loader
Bootstrap loader
Compile and Go loader
Relating loader
561. Poor response time is usually caused by:
Process busy
High paging rate
High I/O rates
Any of the above
562. The “blocking factor” of a file is:
The number of blocks accessible to a file
The number of blocks allocated to a file
The number of logical records in one physical record
None of the above
563. Which of these is a component of a process precedence sequence?
Process name
Concurrency operator
Sequence operator ';'
All of the above
564. Which amongst the following is valid syntax of the Fork and Join Primitive?
Fork
For
Fork
Fork
565. Nested Macro calls are expanded using the:
FIFO rule (First in first out)
FILO rule (First in last out)
LIFO (Last in First out)
None of the above
566. A parser which is a variant of top-down parsing without backtracking is:
Recursive Descent
LL(1) parser
Operator Precedence
LALR Parser
567. The expansion of nested macro calls follows:
FIFO rule
LILO rule
LIFO rule
Priority rule
568. In a two-pass assembler, the task of the Pass II is to:
Separate the symbol, mnemonic opcode, and operand fields
Build the symbol table
Construct intermediate code
Synthesize the target program
569. A linker program:
Places the program in the memory for the purpose of execution
Relocates the program to execute from the specific memory area allocated to it
Links the program with other programs needed for its execution
Interfaces the program with the entities generating its input data
570. Which scheduling policy is most suitable for a time-shared operating system?
Shortest-job First
Round-Robin
Elevator
First-Come-First-Serve
571. A critical section is a program segment:
Which should run in a certain specified amount of time
Which avoids deadlocks
Where shared resources are accessed
Which must be enclosed by a pair of semaphore operations, P and V
572. An operating system contains 3 user processes each requiring 2 units of resource R. The minimum number of units of R such that no deadlocks will ever arise is:
4
3
5
6
573. Locality of reference implies that the page reference being made by a process:
Will always be to the page used in the previous page reference
Is likely to be the one of the pages used in the last few page references
Will always be to one of the pages existing in memory
Will always lead to a page fault
574. This of these is not a part of Synthesis phase:
Obtain machine code corresponding to the mnemonic from the Mnemonics table
Obtain address of a memory operand from the symbol table
Perform LC processing
Synthesize a machine instruction or the machine form of a constant
575. The syntax of the assembler directive EQU is:
EQU
EQU
EQU
None of the above
576. The following features are needed to implement top-down parsing:
Source string marker
Matching and Backtracking
Prediction making mechanism
All of the above
577. A macro definition consists of:
Macro prototype statement
Macro pre-processor statements
One or more model statements
All of the above
578. The main reason to encrypt a file is to:
Reduce its size
Prepare it for backup
Secure it for transmission
Include it in the start-up sequence
579. This of the following is not a key piece of information, stored in a single page table entry, assuming pure paging and virtual memory:
Frame number
A bit indicating whether the page is in physical memory or on the disk
A reference for the disk block that stores the page
None of the above
580. A UNIX device driver is:
Structured into two halves called top half and bottom half
Three equal partitions
Unstructured
None of the above
581. The following is not a layer of IO management module:
PIOCS (Physical Input Output Control System)
LIOCS (Logical Input Output Control System)
FS (File System)
MCS (Management Control System)
582. Which amongst the following is not a valid page replacement policy?
LRU policy (Least Recently Used)
FIFO policy (First in first out)
RU policy (Recurrently used)
Optimal page replacement policy
583. Consider a program with a linked origin of 5000. Let the memory area allocated to it have the start address of 70000. Which amongst the following will be the value to be loaded in the relocation register?
20000
50000
70000
None of the above
584. An assembly language is a:
Low-level programming language
Middle-level programming language
High-level programming language
Internet-based programming language
585. TII stands for:
Table of Incomplete Instructions
Table of Information Instructions
Translation of Instructions Information
Translation of Information Instruction
586. An analysis, which determines the syntactic structure of the source statement, is called:
Semantic Analysis
Syntax Analysis
Process Analysis
Function Analysis
587. Actions implementing instruction’s meaning are actually carried out by:
Instruction Fetch
Instruction Execution
Instruction Decode
Instruction Program
588. The field that contains a segment index or an internal index is called:
Target Datum
Segment Field
Target Offset
Fis Data
589. A program in execution is called:
Process
CPU
Function
Memory
590. Jobs which are admitted to the system for processing are called:
Long-term scheduling
Medium-term scheduling
Short-term scheduling
Queuing
591. A set of techniques that allow executing a program which is not entirely in memory is called:
Demand Paging
Auxiliary Memory
Virtual Memory
Secondary Memory
592. SSTF stands for:
Shortest-Seek-Time-First scheduling
Simple-Seek-Time-First
Small–Small-Time-First
Small-Simple-Time-First scheduling
593. Before proceeding with its execution, each process must acquire all the resources it needs is called:
Hold and Wait
Circular Wait
No Pre-emption
Starvation
594. Relocation bits used by relocating loader are specified by:
Relocating loader itself
Macro processor
Assembler or Translator
Both (A) and (B)
595. Resolution of externally defined symbols is performed by:
Linker
Compiler
Loader
Editor
596. Relocation programs:
Cannot be used with fixed partitions
Can be loaded almost anywhere in memory
Do not need a linker
Can be loaded only at one specific location
597. Authentication is a fundamental building block in most computers:
Security Context
Execution Context
Control Context
Performance Context
598. Page fault frequency in an operating system is reduced when the:
Processes tend to be I/O-bound
Size of pages is reduced
Processes tend to be CPU-bound
Locality of reference is applicable to the process
599. Which of the following are language processors?
Assembler
Interpreter
Compiler
All of the above
600. Virtual memory can be implemented with:
Segmentation
None
Paging
All of the above
Last updated