set-9
401. A file is sometimes called a:
402. In MS-DOS, relocatable object files and load modules have extensions:
403. Resolution of externally defined symbols is performed by:
404. In which of the following page replacement policies does Belady’s anomaly occur?
405. Four necessary conditions for deadlock to exist are: mutual exclusion, no-preemption, circular wait, and:
406. A system program that sets up an executable program in main memory ready for execution is:
407. The principle of locality of reference justifies the use of:
408. The details of all external symbols and relocation information (relocation list or map) are provided to the linker by:
409. Scheduling is:
410. Real-time systems are:
411. Access time is the highest in the case of:
412. The most common systems security method is:
413. Poor response times are caused by:
414. Which of the following is a block device?
415. Which of the following statements is false?
416. Thrashing can be avoided if:
417. Operating system:
418. A task in a blocked state:
419. Backups should be done:
420. Which of the following statements is true?
421. A flowchart that uses predefined symbols to describe data flow in a system is known as:
422. Which of the following is true about pseudo code?
423. A program that converts a high-level language program to a set of instructions that can run on a computer is called a:
424. Which of the following statements is not true about the FORTRAN language?
425. The initial value of the semaphore that allows only one of the many processes to enter their critical section is:
426. The principles of structured programming forbid the use of:
427. Which of the following is necessary to work on a computer?
428. Dividing a project into segments and smaller units in order to simplify the analysis, design, and programming efforts is known as:
429. The errors that can be pointed out by the compiler are:
430. The dispatcher:
431. The SJF algorithm executes first the job:
432. Semaphores:
433. Fragmentation of the file system:
434. The command interpreter:
435. A translator is best described as:
436. The part of the machine-level instruction, which tells the central processor what has to be done, is:
437. Which of the following instruction steps would be written within the diamond-shaped box of a flowchart?
438. Block caches or buffer caches are used:
439. To avoid the race condition, the maximum number of processes that may be simultaneously inside their critical section is:
440. What is the initial value of the semaphore to allow only one of the many processes to enter their critical section?
441. Which technique stores a program on disk and then transfers the program into main storage as and when they are needed, is known as:
442. Which of the following is not true about the description of a decision table?
443. The memory allocation scheme subject to ‘external’ fragmentation is:
444. The advantage of a command processor running only built-in commands is:
445. Which of the following is not true about memory management?
446. In which way(s) can a macro processor for assembly language be implemented?
447. The disadvantage of “Compile and GO” loading scheme is (are):
448. In analyzing the compilation of a PL/I program, the term “syntax analysis” is associated with:
449. Uniform Symbols Table:
450. The function(s) of the scheduler is (are):
Last updated