set-8
351. Which of the following capabilities is required for a system program to execute more than one program at a time?
Word processing
Virtual memory
Compiling
Multitasking
352. A critical region is:
A program segment that has not been proved bug-free
A program segment that often causes unexpected system crashes
A program segment where shared resources are accessed
One which is enclosed by a pair of P and V operations on semaphores
353. Which of the following addressing modes facilitates access to an operand whose location is defined relative to the beginning of the data structure in which it appears?
Ascending
Index
Sorting
Indirect
354. The register or main memory location which contains the effective address of the operand is known as:
Pointer
Special location
Indexed register
Scratch pad
355. System programs such as compilers are designed so that they are:
Re-entrant
Serially usable
Non-reusable
Recursive
356. Special software to create a job queue is called a:
Drive
Interpreter
Spooler
Linkage editor
357. The most common security failure is:
Carelessness by users
Depending on passwords
Too much emphasis on preventing physical access
Insufficient technology used to prevent breaches
358. A public key encryption system:
Allows anyone to decode the transmission
Allows only the correct sender to decode the data
Allows only the correct receiver to decode the data
Does not encode the data before transmitting it
359. Supervisor state is:
Never used
Entered by programs when they enter the processor
Required to perform any I/O
Only allowed to the operating system
360. A high paging rate:
May cause a high I/O rate
Keeps the system running well
Is a symptom of too much processor activity
Always creates a slow system
361. Round robin scheduling is essentially the preemptive version of:
FIFO
FILO
FCFS
Longest time first
362. If the number of bits in the virtual address of a program is 12 and the page size is 0.5 KB, the number of pages in the virtual address space is:
16
32
64
128
363. In which of the storage placement strategies is a program placed in the largest available hole in the main memory?
Best fit
Worst fit
First fit
Buddy
364. For how many processes which are sharing common data does Dekker’s algorithm implement mutual exclusion?
1
2
3
4
365. A disk scheduling algorithm in an operating system causes the disk arm to move back and forth across the disk surface in order to service all requests in its path. This is a:
First come first served
Scan
Shortest Seek Time First (SSTF)
FIFO
366. Round-robin scheduling:
Allows interactive tasks quicker access to the processor
Is quite complex to implement
Gives each task the same chance at the processor
Allows processor-bound tasks more time in the processor
367. Inter-process communication:
Is required for all processes
Is usually done via disk drives
Is never necessary
Allows processes to synchronize activity
368. Fork is:
The dispatching of a task
The creation of a new job
The creation of a new process
Increasing the priority of a task
369. A process is another name for:
A job
Paging
A task
The operating system dispatcher
370. Relocation bits used by relocating loader are specified (generated by):
Relocating loader itself
Assembler or translator
Linker
Macro processor
371. Device independence:
Allows the computer to run without I/O devices
Makes all devices look the same to the operating system
Allows programs to be written more easily
Allows tape drives to be substituted for disk drives
372. User-Friendly Systems are:
Required for object-oriented programming
Easy to develop
Common among traditional mainframe operating systems
Becoming more common
373. Disk scheduling includes deciding:
Which disk should be accessed next
The order in which disk access requests must be serviced
The physical location of the file
The logical location of the file
374. Which of the following translator programs convert assembly language program to object program?
Assembler
Macro processor
Compiler
Linker
375. Data encryption:
Is mostly used by public networks
Is mostly used by financial networks
Cannot be used by private installations
Is not necessary, since data cannot be intercepted
376. Seeks analysis:
Is used for analyzing paging problems
Is used for analyzing device busy problems
Is used for analyzing control-unit busy problems
Is only shown on real-time displays
377. Swapping:
Works best with many small partitions
Allows many programs to use memory simultaneously
Allows each program in turn to use the memory
Does not work with overlaying
378. Feedback queue:
Are very easy to implement
Dispatch tasks according to execution characteristics
Are used to favor real-time tasks
Require manual intervention to implement properly
379. A file organization component of a VSAM file is:
Relative record data set
Entry sequential data set
Keyed sequential data set
All of the above
380. The file structure that redefines its first record at a basic of zero uses the term:
Relative organization
Dynamic reallocation
Key fielding
Hashing
381. File record length:
Should always be fixed
Should always be variable
Depends upon the size of the file
Should be chosen to match the data characteristics
382. An incremental backup:
Should be done each month
Uses more tapes
Saves all files
Saves only files that have recently changed
383. A partitioned data set is most used for:
Program or source library
Storing backup information
Storing program data
Storing ISAM file
384. System generation:
Is always quite simple
Is always very difficult
Varies in difficulty between systems
Requires extensive tools to be understandable
385. Object code:
Is ready to execute
Is the output of compilers, but not assemblers
Must be “loaded” before execution
Must be rewritten before execution
386. Virtual memory is:
Simple to implement
Used in all major commercial operating systems
Less efficient in utilization of memory
Useful when fast I/O devices are not available
387. System maintenance:
Is usually not necessary
Is necessary on all systems, regardless of how good
Is not required if the system is well written
Always requires several programs
388. Which of the following statements is not true?
Time sharing is an example of multiprogramming
JCL is used only to communicate between systems programmers
A batch file contains a series of operating system commands
The primary function of operating systems is to make the computer hardware easily usable
389. What scheduling algorithm allows processes that are logically runnable to be temporarily suspended?
Preemptive scheduling
FIFO
Non-preemptive scheduling
FCFS
390. The term ‘polling’ in a computer means a process by which a computer system:
Detects/corrects errors
Multiplexes the inputs and updates the memory accordingly
Decides the correct alternative by analyzing several ones
Inquiries to see if a terminal has any transaction to send
391. In a magnetic disk, data is recorded in a set of concentric tracks which are subdivided into:
Periods
Zones
Sectors
Groups
392. Which of the following is true for machine language?
Repeated execution of program segments
Depicting flow of data in a system
A sequence of instructions which, when followed properly, solves a problem
The language which communicates with the computer using only the binary digits 1 and 0
393. The LRU algorithm:
Pages out pages that have been used recently
Pages out pages that have not been used recently
Pages out pages that have been least used recently
Pages out the first page in a given area
394. A linker:
Creates a load module
Is not necessary with variable partitions
Must be run after the loader
Is not needed with a good compiler
395. Global locks:
Synchronize access to local resources
Synchronize access to global resources
Are used to avoid local locks
Prevent access to global resources
396. The dynamic allocation of storage areas with VSAM files is accomplished by:
Hashing
Overflow areas
Control splits
Relative recording
397. Which of the following refers to associative memory?
The address of the data is generated by the CPU
The address of the data is supplied by the user
There is no need for an address, i.e., the data is used as an address
The data are accessed sequentially
398. Link encryption:
Is more secure than end-to-end encryption
Is less secure than end-to-end encryption
Cannot be used in a public network
Is used only to debug
399. Which of the following is a characteristic of an operating system?
Resource management
Memory management
Error recovery
All of the above
400. Files can have:
Read access
Write access
Copy access
All of the above
Last updated