set-11
551. Program ‘preemption’ is:
Forced deallocation of the CPU from a program which is executing on the CPU
Release of CPU by the program after completing its task
Forced allotment of CPU by a program to itself
A program terminating itself due to detection of an error
Show me the answer
Answer: 1. Forced deallocation of the CPU from a program which is executing on the CPU
Explanation:
Preemption: Preemption occurs when the operating system forcibly removes a running process from the CPU to allocate it to another process, typically in a time-sharing system.
Conclusion: Preemption involves forced deallocation of the CPU from a running process.
552. An assembler is:
Programming language dependent
Machine dependent
Syntax dependent
Data dependent
Show me the answer
Answer: 2. Machine dependent
Explanation:
Assembler: An assembler is a program that converts assembly language code into machine code. It is machine-dependent because the generated machine code is specific to the target processor architecture.
Conclusion: Assemblers are machine-dependent.
553. Which of the following is not a fundamental process state?
Ready
Executing
Terminated
Blocked
Show me the answer
Answer: 2. Executing
Explanation:
Process States: The fundamental process states are Ready, Running, Blocked, and Terminated. "Executing" is not a standard process state; it is synonymous with the Running state.
Conclusion: Executing is not a fundamental process state.
554. LRU page replacement policy is:
Last Replaced Unit
Least Recently Used
Last Restored Unit
Least Required Unit
Show me the answer
Answer: 2. Least Recently Used
Explanation:
LRU Policy: The Least Recently Used (LRU) page replacement policy replaces the page that has not been used for the longest time.
Conclusion: LRU stands for Least Recently Used.
555. Which of the following is true?
Block cipher technique is an encryption technique
Stream cipher technique is an encryption technique
Both (A) and (B)
Neither of (A) and (B)
Show me the answer
Answer: 3. Both (A) and (B)
Explanation:
Encryption Techniques: Block cipher and stream cipher are both encryption techniques. Block cipher encrypts data in fixed-size blocks, while stream cipher encrypts data bit by bit.
Conclusion: Both block cipher and stream cipher are encryption techniques.
556. Which of the following approaches do not require knowledge of the system state?
Deadlock detection
Deadlock avoidance
Deadlock prevention
None of the above
Show me the answer
Answer: 3. Deadlock prevention
Explanation:
Deadlock Prevention: Deadlock prevention techniques do not require knowledge of the system state. They ensure that at least one of the necessary conditions for deadlock (mutual exclusion, hold and wait, no preemption, circular wait) is never satisfied.
Conclusion: Deadlock prevention does not require knowledge of the system state.
557. Program generation activity aims at:
Automatic generation of program
Organize execution of a program written in PL
Skips generation of program
Speed generation of program
Show me the answer
Answer: 1. Automatic generation of program
Explanation:
Program Generation: Program generation involves automatically creating programs based on predefined templates or specifications.
Conclusion: Program generation aims at the automatic generation of programs.
558. Which amongst the following is not an advantage of Distributed systems?
Reliability
Resource sharing
Incremental growth
None of the above
Show me the answer
Answer: 4. None of the above
Explanation:
Advantages of Distributed Systems: Distributed systems offer reliability, resource sharing, and incremental growth. All the listed options are advantages.
Conclusion: None of the options are disadvantages of distributed systems.
559. An imperative statement:
Reserves areas of memory and associates names with them
Indicates an action to be performed during execution of assembled program
Indicates an action to be performed during optimization
None of the above
Show me the answer
Answer: 2. Indicates an action to be performed during execution of assembled program
Explanation:
Imperative Statement: An imperative statement in assembly language specifies an action to be performed during the execution of the program.
Conclusion: Imperative statements indicate actions to be performed during execution.
560. Which of the following loader is executed when a system is first turned on or restarted?
Boot loader
Bootstrap loader
Compile and Go loader
Relating loader
Show me the answer
Answer: 2. Bootstrap loader
Explanation:
Bootstrap Loader: The bootstrap loader is a small program that runs when the system is first turned on or restarted. It loads the operating system into memory.
Conclusion: The bootstrap loader is executed during system startup.
561. Poor response time is usually caused by:
Process busy
High paging rate
High I/O rates
Any of the above
Show me the answer
Answer: 4. Any of the above
Explanation:
Poor Response Time: Poor response time can be caused by a busy process, high paging rates, or high I/O rates, as all these factors can delay the execution of user requests.
Conclusion: Any of the listed factors can cause poor response time.
562. The “blocking factor” of a file is:
The number of blocks accessible to a file
The number of blocks allocated to a file
The number of logical records in one physical record
None of the above
Show me the answer
Answer: 3. The number of logical records in one physical record
Explanation:
Blocking Factor: The blocking factor is the number of logical records stored in one physical block or record.
Conclusion: The blocking factor refers to the number of logical records in one physical record.
563. Which of these is a component of a process precedence sequence?
Process name
Concurrency operator
Sequence operator ';'
All of the above
Show me the answer
Answer: 4. All of the above
Explanation:
Process Precedence Sequence: A process precedence sequence includes process names, concurrency operators, and sequence operators to define the order of process execution.
Conclusion: All the listed options are components of a process precedence sequence.
564. Which amongst the following is valid syntax of the Fork and Join Primitive?
Fork
For
Fork
Fork
Show me the answer
Answer: 1. Fork
Explanation:
Fork and Join Primitive: The Fork and Join primitives are used in parallel programming. The valid syntax for Fork is
Fork <label>, where<label>specifies the starting point of the new process.Conclusion: The correct syntax is
Fork <label>.
565. Nested Macro calls are expanded using the:
FIFO rule (First in first out)
FILO rule (First in last out)
LIFO (Last in First out)
None of the above
Show me the answer
Answer: 3. LIFO (Last in First out)
Explanation:
Nested Macro Calls: Nested macro calls are expanded using the Last In First Out (LIFO) rule, similar to a stack.
Conclusion: LIFO is used for expanding nested macro calls.
566. A parser which is a variant of top-down parsing without backtracking is:
Recursive Descent
LL(1) parser
Operator Precedence
LALR Parser
Show me the answer
Answer: 2. LL(1) parser
Explanation:
LL(1) Parser: The LL(1) parser is a variant of top-down parsing that does not require backtracking. It uses a lookahead of one token to make parsing decisions.
Conclusion: The LL(1) parser is a top-down parser without backtracking.
567. The expansion of nested macro calls follows:
FIFO rule
LILO rule
LIFO rule
Priority rule
Show me the answer
Answer: 3. LIFO rule
Explanation:
Nested Macro Calls: Nested macro calls are expanded using the Last In First Out (LIFO) rule, similar to a stack.
Conclusion: LIFO is used for expanding nested macro calls.
568. In a two-pass assembler, the task of the Pass II is to:
Separate the symbol, mnemonic opcode, and operand fields
Build the symbol table
Construct intermediate code
Synthesize the target program
Show me the answer
Answer: 4. Synthesize the target program
Explanation:
Pass II of Assembler: In a two-pass assembler, Pass II synthesizes the target program by generating machine code using the symbol table built in Pass I.
Conclusion: Pass II synthesizes the target program.
569. A linker program:
Places the program in the memory for the purpose of execution
Relocates the program to execute from the specific memory area allocated to it
Links the program with other programs needed for its execution
Interfaces the program with the entities generating its input data
Show me the answer
Answer: 3. Links the program with other programs needed for its execution
Explanation:
Linker Program: The linker combines object modules into a single executable program and resolves external references between them.
Conclusion: The linker links the program with other programs needed for its execution.
570. Which scheduling policy is most suitable for a time-shared operating system?
Shortest-job First
Round-Robin
Elevator
First-Come-First-Serve
Show me the answer
Answer: 2. Round-Robin
Explanation:
Time-Shared Systems: Round-Robin scheduling is most suitable for time-shared systems because it provides fair CPU allocation to all processes by giving each process a fixed time slice (quantum).
Conclusion: Round-Robin is ideal for time-shared operating systems.
571. A critical section is a program segment:
Which should run in a certain specified amount of time
Which avoids deadlocks
Where shared resources are accessed
Which must be enclosed by a pair of semaphore operations, P and V
Show me the answer
Answer: 3. Where shared resources are accessed
Explanation:
Critical Section: A critical section is a segment of code where shared resources are accessed. It must be executed atomically to prevent race conditions.
Conclusion: The critical section is where shared resources are accessed.
572. An operating system contains 3 user processes each requiring 2 units of resource R. The minimum number of units of R such that no deadlocks will ever arise is:
4
3
5
6
Show me the answer
Answer: 1. 4
Explanation:
Deadlock Prevention: To prevent deadlock, the system must ensure that the total number of resources is sufficient to satisfy the maximum demand of at least one process. For n processes, each requiring k units of a resource, the minimum number of resources required to avoid deadlock is given by:
Minimum Resources=n×(k−1)+1For 3 processes, each requiring 2 units:
Minimum Resources=3×(2−1)+1=4Conclusion: The minimum number of units of R required to avoid deadlock is 4.
573. Locality of reference implies that the page reference being made by a process:
Will always be to the page used in the previous page reference
Is likely to be the one of the pages used in the last few page references
Will always be to one of the pages existing in memory
Will always lead to a page fault
Show me the answer
Answer: 2. Is likely to be the one of the pages used in the last few page references
Explanation:
Locality of Reference: Locality of reference refers to the tendency of a program to access the same set of memory locations repeatedly over a short period of time. This property can be spatial (nearby locations) or temporal (recently accessed locations).
Conclusion: Locality of reference implies that a process is likely to access pages used in the last few references.
574. This of these is not a part of Synthesis phase:
Obtain machine code corresponding to the mnemonic from the Mnemonics table
Obtain address of a memory operand from the symbol table
Perform LC processing
Synthesize a machine instruction or the machine form of a constant
Show me the answer
Answer: 3. Perform LC processing
Explanation:
Synthesis Phase: The synthesis phase of an assembler involves generating machine code from assembly instructions. LC (Location Counter) processing is part of the analysis phase, not the synthesis phase.
Conclusion: LC processing is not part of the synthesis phase.
575. The syntax of the assembler directive EQU is:
EQU
EQU
EQU
None of the above
Show me the answer
Answer: 3. EQU
Explanation:
EQU Directive: The EQU directive in assembly language is used to define a symbol and assign it a value. The correct syntax is
<symbol> EQU <address space>.Conclusion: The correct syntax is
<symbol> EQU <address space>.
576. The following features are needed to implement top-down parsing:
Source string marker
Matching and Backtracking
Prediction making mechanism
All of the above
Show me the answer
Answer: 4. All of the above
Explanation:
Top-Down Parsing: Top-down parsing requires a source string marker, matching and backtracking, and a prediction-making mechanism to determine the correct production rule.
Conclusion: All the listed features are needed for top-down parsing.
577. A macro definition consists of:
Macro prototype statement
Macro pre-processor statements
One or more model statements
All of the above
Show me the answer
Answer: 4. All of the above
Explanation:
Macro Definition: A macro definition includes a macro prototype statement, macro pre-processor statements, and one or more model statements.
Conclusion: All the listed components are part of a macro definition.
578. The main reason to encrypt a file is to:
Reduce its size
Prepare it for backup
Secure it for transmission
Include it in the start-up sequence
Show me the answer
Answer: 3. Secure it for transmission
Explanation:
File Encryption: The primary purpose of encrypting a file is to secure it during transmission or storage, preventing unauthorized access.
Conclusion: Encryption is used to secure files for transmission.
579. This of the following is not a key piece of information, stored in a single page table entry, assuming pure paging and virtual memory:
Frame number
A bit indicating whether the page is in physical memory or on the disk
A reference for the disk block that stores the page
None of the above
Show me the answer
Answer: 3. A reference for the disk block that stores the page
Explanation:
Page Table Entry: A page table entry typically includes the frame number and a bit indicating whether the page is in memory or on disk. It does not include a reference to the disk block.
Conclusion: A reference to the disk block is not stored in a page table entry.
580. A UNIX device driver is:
Structured into two halves called top half and bottom half
Three equal partitions
Unstructured
None of the above
Show me the answer
Answer: 1. Structured into two halves called top half and bottom half
Explanation:
UNIX Device Driver: A UNIX device driver is structured into two halves: the top half (interrupt handler) and the bottom half (deferred processing).
Conclusion: UNIX device drivers are structured into top and bottom halves.
581. The following is not a layer of IO management module:
PIOCS (Physical Input Output Control System)
LIOCS (Logical Input Output Control System)
FS (File System)
MCS (Management Control System)
Show me the answer
Answer: 4. MCS (Management Control System)
Explanation:
IO Management Module: The IO management module includes PIOCS, LIOCS, and FS. MCS is not a standard layer of the IO management module.
Conclusion: MCS is not part of the IO management module.
582. Which amongst the following is not a valid page replacement policy?
LRU policy (Least Recently Used)
FIFO policy (First in first out)
RU policy (Recurrently used)
Optimal page replacement policy
Show me the answer
Answer: 3. RU policy (Recurrently used)
Explanation:
Page Replacement Policies: LRU, FIFO, and Optimal are valid page replacement policies. RU (Recurrently Used) is not a standard policy.
Conclusion: RU is not a valid page replacement policy.
583. Consider a program with a linked origin of 5000. Let the memory area allocated to it have the start address of 70000. Which amongst the following will be the value to be loaded in the relocation register?
20000
50000
70000
None of the above
Show me the answer
Answer: 4. None of the above
Explanation:
Relocation Register: The relocation register contains the difference between the linked origin and the actual start address. Here:
Relocation Register=70000−5000=65000Conclusion: The correct value is 65000, which is not listed in the options.
584. An assembly language is a:
Low-level programming language
Middle-level programming language
High-level programming language
Internet-based programming language
Show me the answer
Answer: 1. Low-level programming language
Explanation:
Assembly Language: Assembly language is a low-level programming language that is closely related to machine code and provides direct control over hardware.
Conclusion: Assembly language is a low-level programming language.
585. TII stands for:
Table of Incomplete Instructions
Table of Information Instructions
Translation of Instructions Information
Translation of Information Instruction
Show me the answer
Answer: 1. Table of Incomplete Instructions
Explanation:
TII: TII stands for Table of Incomplete Instructions, which is used in assembly language processing to track instructions that are not fully resolved.
Conclusion: TII refers to the Table of Incomplete Instructions.
586. An analysis, which determines the syntactic structure of the source statement, is called:
Semantic Analysis
Syntax Analysis
Process Analysis
Function Analysis
Show me the answer
Answer: 2. Syntax Analysis
Explanation:
Syntax Analysis: Syntax analysis is the phase of compilation that checks the syntactic structure of source code to ensure it conforms to the language's grammar rules.
Conclusion: Syntax analysis determines the syntactic structure of source statements.
587. Actions implementing instruction’s meaning are actually carried out by:
Instruction Fetch
Instruction Execution
Instruction Decode
Instruction Program
Show me the answer
Answer: 2. Instruction Execution
Explanation:
Instruction Execution: The execution phase of the CPU carries out the actions specified by the instruction, such as performing arithmetic operations or accessing memory.
Conclusion: Instruction execution implements the meaning of instructions.
588. The field that contains a segment index or an internal index is called:
Target Datum
Segment Field
Target Offset
Fis Data
Show me the answer
Answer: 2. Segment Field
Explanation:
Segment Field: In segmented memory systems, the segment field contains the segment index or internal index used to locate the segment in memory.
Conclusion: The segment field contains the segment index.
589. A program in execution is called:
Process
CPU
Function
Memory
Show me the answer
Answer: 1. Process
Explanation:
Process: A process is an instance of a program in execution. It includes the program code, data, and resources allocated to it.
Conclusion: A program in execution is called a process.
590. Jobs which are admitted to the system for processing are called:
Long-term scheduling
Medium-term scheduling
Short-term scheduling
Queuing
Show me the answer
Answer: 1. Long-term scheduling
Explanation:
Long-Term Scheduling: Long-term scheduling involves admitting jobs to the system and placing them in the job queue for processing.
Conclusion: Jobs admitted to the system are handled by long-term scheduling.
591. A set of techniques that allow executing a program which is not entirely in memory is called:
Demand Paging
Auxiliary Memory
Virtual Memory
Secondary Memory
Show me the answer
Answer: 3. Virtual Memory
Explanation:
Virtual Memory: Virtual memory is a technique that allows a program to execute even if it is not entirely loaded into physical memory. It uses paging or segmentation to manage memory.
Conclusion: Virtual memory enables programs to execute without being fully loaded into memory.
592. SSTF stands for:
Shortest-Seek-Time-First scheduling
Simple-Seek-Time-First
Small–Small-Time-First
Small-Simple-Time-First scheduling
Show me the answer
Answer: 1. Shortest-Seek-Time-First scheduling
Explanation:
SSTF: SSTF (Shortest-Seek-Time-First) is a disk scheduling algorithm that selects the request with the shortest seek time from the current head position.
Conclusion: SSTF stands for Shortest-Seek-Time-First scheduling.
593. Before proceeding with its execution, each process must acquire all the resources it needs is called:
Hold and Wait
Circular Wait
No Pre-emption
Starvation
Show me the answer
Answer: 1. Hold and Wait
Explanation:
Hold and Wait: Hold and wait is a condition for deadlock where a process holds at least one resource and waits for additional resources.
Conclusion: Hold and wait describes a process acquiring all needed resources before execution.
594. Relocation bits used by relocating loader are specified by:
Relocating loader itself
Macro processor
Assembler or Translator
Both (A) and (B)
Show me the answer
Answer: 3. Assembler or Translator
Explanation:
Relocation Bits: Relocation bits are specified by the assembler or translator to indicate which parts of the program need to be relocated during loading.
Conclusion: The assembler or translator specifies relocation bits.
595. Resolution of externally defined symbols is performed by:
Linker
Compiler
Loader
Editor
Show me the answer
Answer: 1. Linker
Explanation:
Linker: The linker resolves externally defined symbols by combining object modules and resolving references between them.
Conclusion: The linker performs resolution of externally defined symbols.
596. Relocation programs:
Cannot be used with fixed partitions
Can be loaded almost anywhere in memory
Do not need a linker
Can be loaded only at one specific location
Show me the answer
Answer: 2. Can be loaded almost anywhere in memory
Explanation:
Relocation Programs: Relocation programs can be loaded into different memory locations because they use relative addressing.
Conclusion: Relocation programs can be loaded almost anywhere in memory.
597. Authentication is a fundamental building block in most computers:
Security Context
Execution Context
Control Context
Performance Context
Show me the answer
Answer: 1. Security Context
Explanation:
Authentication: Authentication verifies the identity of users or systems and is a fundamental part of computer security.
Conclusion: Authentication is part of the security context.
598. Page fault frequency in an operating system is reduced when the:
Processes tend to be I/O-bound
Size of pages is reduced
Processes tend to be CPU-bound
Locality of reference is applicable to the process
Show me the answer
Answer: 4. Locality of reference is applicable to the process
Explanation:
Locality of Reference: If a process exhibits strong locality of reference, it accesses the same set of memory locations repeatedly, reducing page faults.
Conclusion: Locality of reference reduces page fault frequency.
599. Which of the following are language processors?
Assembler
Interpreter
Compiler
All of the above
Show me the answer
Answer: 4. All of the above
Explanation:
Language Processors: Assemblers, interpreters, and compilers are all language processors that convert high-level or assembly code into machine code.
Conclusion: All of the above are language processors.
600. Virtual memory can be implemented with:
Segmentation
None
Paging
All of the above
Last updated