Advanced Operating System _BT0069_ by liwenting

VIEWS: 8 PAGES: 14

									                   Advanced Operating System (MTOO85)
                           (1-MARK questions)

1Complete code files for which address have been, resolved for all global
functions are?
       a. Exactable files
       b. Object files
       c. Source file
       d. None of the above


2. Header contains information of?
       a. Position, Size, value of pc& register
       b. Length, data & index
       c. Size, pointer, function
       d. All of the above


3. A table that indicates the name of all functions & global variables is?
       a. #Table
       b. Symbol of table
       c. Index table
       d. Data table


4. Structure of UNIX used files is due to?
       a. Shared libraries
       b. Virtual memory
       c. Symbol table
       d. Unix shell


5. Unix shell is a user command that is used to create a _____?
       a. shells script
       b. Shells
      c. Program
      d. Process
6. Distributed system are also known as _________
      a. Loosely coupled
      b. Tightly coupled
      c. Time sharing system
      d. Multitasking system


7. The time elapse between submitting the job & getting the result is known as?
      a. Turnaround time
      b. Response time
      c. Threshold time
      d. Waiting time


8. RTOS stand for?
      a. Real time operating system
      b. Resource type online system
      c. Rapid time operating system
      d. None of the above


9. The main function of the micro kernel is to provide a _________ facility
between the client program and the varieties services that one also running in
user space
      a. Transportation
      b. Communication
      c. Programming
      d. Processing


10. ________ is a piece of computer software that isolates the application being
used by the user from the computer
      a. Mach
       b. X 86
       c. Virtual machine
       d. None
11.the zz command is used to
   a) Abort a vi session
   b) Move the contents of a file to another file
   c) Saves the fileand remains in editing mode
   d) Quit vi editor after saving

12the default shell which is to be used is given in the
   a) /etc/passwd file
   b) .exrc file in home directory
   c) /ect/shell file
   d) None of these

13.to move to the end of a line you have to use.
   a) $
   b) E
   c) E
   d) ^

14.we can paste a deleted line using the command.
   a) Y
   b) Cp
   c) P
   d) None of the above

15 the key mapping can
   a) Create macros
   b) Assign a key a particular function
   c) Create new keys
   d) None of the above

16.vi abbreviations are defined in a file called.exerc located in the
   a) Shell directory
   b) Home directory
   c) Bin directory
   d) Directory in which vi program is stored

17.which unix commad displays the information contained in a particular file
   a) More filename
   b) Type filename
   c) File filename
   d) None of the above
18.almost all computers store characters strings
   a) As a sequence of anscii codes binary strings
   b) In bcd code
   c) As a sequence of intrgers indicating the position of the characters in the
      alphabetical seuence
   d) None of the above

19.the instructions of a program which is currently being executed are stored in
   a) Secondary memory
   b) Main memory
   c) Read – only memory
   d) None of the above

20.the default program sh in unix os is
   a) Jsh
   b) Bourne shell
   c) Csh
   d) Ksh

21 Text for a program is written in _________ language & saved in_______
      a) HLL, Source file
      b) Assembly language
      c) Mill, Code file
      d) Both a & b


22 Balancing can be achieved through either __________or ______
                        a. Push migration/ pull migration
                        b. Soft affinity\hard affinity
                        c. SMP/SMT
                        d. None of the above
23 Process is an ______ entity, while Program is a ______ entity. (Active,
Passive)

24 Operating system acts as a ______ and ______________ for the system.
(Resource allocator, government)

25 When you turn on the computer ______ management works, While executing
an application ______ management works (H/w mgmt, Process mgmt)
26 One of the three vital components of a system are ___________(hardware),
_______________(application) and _______(operating system).
27 Bootstrapping is also known as ______ (Cold boot), Bootstrap procedure is
_______ dependent (Hardware)


28 To create the user use ________ command (Useradd) , To create a group
use ______ command (Groupadd).


29 Ext 2 was a block size of _____ bytes (1024) , Ufs file system’s block size is
_______ bytes maximum (64).
30 To set the value of environment variable use ______ command.(Setenv) , To
undefined and unset an environment variable use ______ command (Unsetenv)

31 If the CPU scheduling policy SJF, the average waiting time with pre-emption
will be
        a) 8 ms
        b) 14 ms
        c) 5.6 ms
        d) None of these


32 A sequence of instruction telling the comp what to do is called
      a. Function
      b. Program
      c. Statements
      d. None of the above
33. A language whose statements have almost one to one correspondence to the
instruction understood by the CP of computer is
      a. High level language
      b. Middle level language
      c. Assembly level
      d. show level
34. Which of the following is not a high level language?
      a. COBOL
      b. Pascal
         c. C
         d. Java
35. A program used to translate high level lang. to machine level language is
called
         a. Loader
         b. Compiler
         c. Linker
         d. Assembler
36. Code files corresponding to incomplete pension of program area
         a. Object files
         b. Exactable
         c. Complete files
         d. All of the above


37. Complete code files for which address have been, resolved for all global
functions are?
         a. Exactable files
         b. Object files
         c. Source file
         d. None of the above


38. Header contains information of?
         a. Position, Size, value of pc& register
         b. Length, data & index
         c. Size, pointer, function
         d. All of the above


39. A table that indicates the name of all functions & global variables is?
         a. #Table
         b. Symbol of table
         c. Index table
      d. Data table


40. Structure of UNIX used files is due to?
      a. Shared libraries
      b. Virtual memory
      c. Symbol table
      d. Unix shell




      2 mark Question
1. What are the 4 conditions that must be true dead lock to accrue?
      a) Threading, non-preemptive, processing, hold &wait
      b) Non conditions. Are required
      c) Mutual exclusion, hold & wait, no preemption, circular wait
      d) None of the above


2. What is the UNIX system call to create pipe?
      a) Char pipe (Flout fd [3])
      b) Unit pipe (int fd [2])
      c) Double pipe (Float fd [2])
      d) Int pipe (int fd [3])


3. ______ occurs when two or more execution flours are able to run
   simultaneously
      a) Concurrency
      b) Non-concurrency
      c) Preemptive
      d) Multi programming
4. What is the condition that occurs when multiprocessors threads read and
   write data items so that the final result depends on the order of execution of
   instruction in the multiple processes?
      a) Convey condition
      b) Race conditions
      c) Both a & b
      d) None of the above


5. A ________ is a part of program that accesses a shared resource that must
   not be consistently accessed by more than one process of exertion
      a) Critical section
      b) Mutual execution
      c) mutual exclusion
      d) None of the above
6. To avoid race conditions and flawed results, one must identify codes in
   ________ in each process?
      a) Critical section
      b) Mutual execution
      c) Mutual exclusion
      d) None of the above
7. Concurrency control is a method that is used to ensure that processes are
   exacted in?
      a) Sequential manner
      b) Hierarchical manner
      c) Safe manner
      d) Quickly
8. Timer I/o devices are?
      a) Trap
      b) Interrupts
      c) Locks
      d) None of the above
9. A mechanism that prevents two or more processes from accessing a shored
   resource simultaneously?
      a) Semaphore
      b) Mutual exclusion
      c) Deadlock
      d) Interrupts
10. Text for a program is written in _________ language & saved in_______
      a) HLL, Source file
      b) Assembly language
      c) Mill, Code file
      d) Both a & b
11. Machine code is saved in _________& is loaded in_________
      a) Source file, CPU
      b) Code file, virtual memory
      c) Code file, main memory
      d) Source, file, Virtual memory
12. If several users execute the same command then each one creates different
   process, if the user double clicks on several data files, _______ process are
   created & manages the _______
      a) Thread
      b) Program
      c) Shall
13. _________ system call creates an almost identical copy of an existing
   process followed by ________ system call which replaces the program being
   executed by new programmed?
      a) New, delete
      b) Create, clustery
      c) Create, execute
      d) Fork, execute
14. In java ________ is used to create a program and in unix ______ is used to
   implement a program?
       a) Exec ()
       b) Exec
       c) Exec (), fork (), exec
       d) new (),exec ()
15. An operating system as resource manager, controls how ________(The
   active agents) may access_______ (passive entities)
       a) Statements, Program
       b) Processes, resources
       c) Program, Instructions
       d) Files, instructions


16. ______ is an interface of os with the user. It is not a part of ________
       a) Unix, kernel
       b) command interpreter, kernel
       c) Code, interpreter
       d) None of the above


17. PVM and MPI are to common software packages that permit a
   heterogeneous collection of networked Unix and windows computers to be
   used as a Angle, large, penallelcomputer. What does PVM & MPI Stand for ?
       a) Paralled virtual machine/message processing interface
       b) Processed virtual machine/ mobile program interface
       c) Both a & b
       d) None of the above


18. ________ operation decrease is the semaphore value &               __________
   Operation increments the semaphore volume
       a) Wait, Signal
       b) Flag, mate
       c) Block, make up
       d) Murex, semaphore
19. What are the two common choices of craning policy,
       a) Post cleaning/Demand cleaning
       b) Demand cleaning/ Page cleaning
       c) Demand cleaning/ pre- craning
       d) Framed cleaning/ Pre-cleaning


20. If we consider only READ operations, then a formula for the average cycle
time is :
       a) teff = tcache + (1-n) tmain
       b)Teff =tcache + (1+n) tcache
       c)Teff=tmain +(1-n)main
       d)Teff=tcache + (1-n)tcache




                                  (4-MARKS questions)

1) An operating system is a program that controls the…………of an application
   program and acts as an……..between the user and………. Operating system
   is an example of……….software.
       a) Hardware, System, Variable, Application.
       b) Interface, Execution, Computer software, system
       c) Execution, interface, computer hardware, system
       d) None of the above


2) An operating system as resource manager, controls how…………….(the
   active agents) may access………(passive entities) one can view operating
   system from two points of views:…………. And ……………
       a) Resource, Process, Resource manager, Extended machines
       b) Process, Resource, Resource manager, Extended machines
       c) Registers, Processors, File manager, System machines
       d) Both a) & b).


3) In the mid-1980, Researches at Carnegie Mellon university developed an
   operating system called…….that modularized the kernel using the micro
   kernel approach. This method structure the operating system by removing all
   …………. components from the ……………. And implementing then as
   system and ……………… programs.
      a) Mach, Non-essential, Kernel, User-level.
      b) Macintosh, Essential, Kernel, Programmer level.
      c) Max, Non-essential, Microkernel, User level.
      d) Mach, Essential, microkernel, User level.

4) The kernel mode has 4 major components:
      a) System calls, file subsystem, hardware control, s/w components.
      b) System calls, File subsystem, process control subsystem,
         hardware control.
      c) All of the above.
      d) None of the above.

5) PVM (…………………….) and MPI (………………..) are two common
   software packages that permits a …………..collection of networked unix or
   Windows computers to be used as a single, large, parallel computer.
       a) Parallel     virtual  machine,    Message        passing   interface,
          Heterogeneous.
       b) Post virtual machine, machine passing interface, Homogenous.
       c) Post varied machine, mode passed interface, indigenous.
       d) None of the above.

6) What are the four reasons due to which a new process terminates the existing
   process?
      a) Syntax error, Interrupt, Flip flop, Flag.
      b) Normal exit, Error exit, fatal exit, Killed by another process.
      c) Caching, Buffering, traffic generation, congestion
      d) All of the above.

7) Name the 5 states of 5state process model.
     a) New state, Terminated, Blocked, Running, ready.
     b) Old star, Busy, Wait, Running, Blocked
     c) New state, Busy, Ready, Blocked, Cached.
     d) None of the above.

8) For paging memory management, each process associated with a …………. .
   Each entry in the table contains the …………..of the corresponding page in
   the……………….. space of the process.
      a) Virtual address, Page table, Frame.
      b) Permanent address, Frame number, page table.
      c) Page table, Frame number, Virtual address
      d) None of the above.

9) Segmentation is a method for both……………….and …………………… . It
   also eases the control of …………and………..
      a)   Memory management, Virtual memory, Sharing, Protection.
      b)   File management, Resource, Sharing, Protection.
      c)   Both a) & b).
      d)   None of the above.


10) The FIFO (………) policy treats the allocated to a process as a ciucular
    buffer, and page are removed in a…….style. It may be viewed as a modified
    version of the………..policy.
       a) First in first out, Page frames, Round robin , LRU.
       b) First in fast out, Round robin, system, LRU.
       c) for in first out, page frame, round robin, LRU.
       d) None of these.


11) A cleaning policy is the apposite of a ……………….Policy. It deals with when
    a modified page should be written out to ……………… There are 2 common
    choice i.e: ………………and ………………..
       a) Decode, primary memory, demand cleaning, Pre cleaning.
       b) Execute, Secondary, Demand cleaning, Pre cleaning
       c) Fetch, Secondary memory, demand cleaning, Pre-cleaning.
       d) None of the above.


12) The difference between cached and virtual memory is a matters of…………..;
    the two notions are conceptually same because they both rely on
    the……………properties observed in sequences of…………………
       a) Implementation, Correlation, Address references.
       b) Correlation, Address references, implementation.
       c) Implementation, Address references, Correlation,
       d) None of the above.


13) Considering only READ operations, the formula for the average cycle time is
    ………………….when h is probability of a …………, also called ……….and
    the quantity(1-h), which the probability of a miss, is known as the……..
       a) tcache= teff + (1-h)tmain, hit rate,cache hit, miss rate.
       b) tcache= teff + (h-1)tmain, hit rate., Cache list, miss rate.
       c) teff = tcache + (1-h)tmain, cache hit, hit rate, miss rate
       d) teff = tcache + (h-1)tmain, cache list, hit rate, miss rate


14) A fully associative cache requires the ..…to be composed of……holding both
    the…..and the data for each….line.
       a) Cache, Associative memory, Memory address, Cached
       b) Cache, Memory, Relative address, Cached
      c) Cache, Relative memory, memory address, Cached
      d) None of the above.


15) In the counter implementation, a …………….is associated with each block. A
       simple implementation would be to ………each counter at regular intervals
       and to…………a counter when the line had been referenced.
       a)     Preset, Increment, Reset, Relative
       b)     Counter, Increment, Reset, Associated
       c)     Counter, decrement, Reset, Associated
       d)     Counter, Decrement, Preset, Relative

								
To top