Good Guy Beket
Quiz by , created more than 1 year ago

Suicidal Operating Systems [Teachers: Teshebayeva Karagoz, Mishina Aigerim ; Final Exam + STATE EXAM] ▼ Quiz on OS Part 2, created by Good Guy Beket on 18/12/2017.

692
18
0
Created by a deleted user over 6 years ago
Good Guy Beket
Copied by Good Guy Beket over 6 years ago
Close

OS Part 2

Question 1 of 95

1

A situation where several processes access and manipulate the same data concurrently and the outcome of the execution depends on the particular order in which access takes place is called:

Select one of the following:

  • race condition

  • data consistency

  • starvation

  • mutual exclusion

Explanation

Question 2 of 95

1

Which one of the following is the address generated by CPU?

Select one of the following:

  • logical address

  • physical address

  • absolute address

  • none of the above

Explanation

Question 3 of 95

1

What is the ready state of a process?

Select one of the following:

  • when process is scheduled to run after some execution

  • none of the above

  • when process is using CPU

  • when process is unable to run until some task has been completed

Explanation

Question 4 of 95

1

Mutual exclusion can be provided by the:

Select one of the following:

  • none of the above maint

  • mutex locks

  • both

  • binary semaphores

Explanation

Question 5 of 95

1

What is a long-term scheduler?

Select one of the following:

  • it selects which process has to be executed next and allocates CPU

  • none of the above

  • it selects which process has to be brought into the ready queue

  • it selects which process has to remove from memory by swapping

Explanation

Question 6 of 95

1

Operating system maintains the page table for

Select one of the following:

  • each process

  • each thread

  • each instruction

  • each address

Explanation

Question 7 of 95

1

If a page number is not found in the TLB, then it is known as a:

Select one of the following:

  • TLB miss

  • buffer miss

  • TLB hit

  • page fault

Explanation

Question 8 of 95

1

Part of a program where the shared memory is accessed and which should be executed invisibly, is called:

Select one of the following:

  • semaphores

  • mutual exclusion

  • critical section

  • directory

Explanation

Question 9 of 95

1

In memory systems, boundary registers?

Select one of the following:

  • track the beginning and ending of programs

  • track page boundaries

  • are only necessary with fixed partitions

  • are used for temporary program variable storage

Explanation

Question 10 of 95

1

The resource vector defines

Select one of the following:

  • total amount of resources required for all processes

  • total amount of each resource in the system

  • total amount of each resource allocated to all processes

  • total amount of each resource NOT allocated to any process

Explanation

Question 11 of 95

1

When each process in the set is blocked awaiting for resource seized by another blocked process

Select one of the following:

  • it is a deadend

  • it is a deadlock

  • it is a softlock

  • it is a mortallock

Explanation

Question 12 of 95

1

The number of resources requested be a process:

Select one of the following:

  • must exceed the total number of resources available in the system

  • must always be equal to the total number of resources available in the system

  • must not exceed the total number of resources available in the system

  • must always be less than the total number of resources available in the system

Explanation

Question 13 of 95

1

What is interprocess communication?

Select one of the following:

  • communication between two process

  • communication between two threads of same process

  • none of the above

  • communication within the process

Explanation

Question 14 of 95

1

The degree of multi-programming is:

Select one of the following:

  • the number of processes executed per unit time

  • the number of processes in the I/O queue

  • the number of processes in the ready queue

  • the number of processes in memory

Explanation

Question 15 of 95

1

This matrix defines the amount of resources of type j requested by process i

Select one of the following:

  • Allocation matrix

  • Resource matrix

  • Request matrix

  • Claim matrix

Explanation

Question 16 of 95

1

To avoid the race condition, the number of processes that may be simultaneously inside their critical section is:

Select one of the following:

  • 10

  • 0

  • 1

  • 2

Explanation

Question 17 of 95

1

Which process can be affected by other processes executing in the system?

Select one of the following:

  • init process

  • cooperating process

  • child process

  • parent process

Explanation

Question 18 of 95

1

Which of the following registers are used by the processor to exchange data with memory?

Select one of the following:

  • MAR and MBR

  • PC and IR

  • Program status word

  • I/OAR and I/OBR

Explanation

Question 19 of 95

1

Which of the following registers are used by the processor to exchange data with input/output module?

Select one of the following:

  • MAR and MBR

  • PC and IR

  • Program status word

  • I/OAR and I/OBR

Explanation

Question 20 of 95

1

The main disadvantage of this technique: consumes a lot of processor time, because every word

Select one of the following:

  • Direct memory access (DMA)

  • Manual memory access

  • Interrupt-driven I/O

  • Programmed I/O

Explanation

Question 21 of 95

1

The processor issues an I/O command to a module and then go on to some other useful work. The I/O module performs the requested action and alerts the processor to request service when it is ready to exchange data with the processor. The described technique is:

Select one of the following:

  • Direct memory access (DMA)

  • Manual memory access

  • Interrupt-driven I/O

  • Programmed I/O

Explanation

Question 22 of 95

1

Which of the following is not a technique possible for I/O operations?

Select one of the following:

  • Direct memory access (DMA)

  • Manual memory access

  • Interrupt-driven I/O

  • Programmed I/O

Explanation

Question 23 of 95

1

If a page table entry is not in main memory, then it is known as a:

Select one of the following:

  • page fault

  • buffer miss

  • TLB hit

  • TLB miss

Explanation

Question 24 of 95

1

We have

Ts = average (system) access time

T1 = access time of M1 (cache)

T2 = access time of M2 (main memory)

T3 = access time of M3 (disk)

H1 = hit ratio, fraction of time reference is found i M1

H2 = hit ratio, fraction of time reference is found i M2

The average time to access an item, in case the item in disk is:

Select one of the following:

  • Ts = H1*T1 + H2*T2 + (1-H2)*T3

  • Ts = H1*T1 + (1-H1)*(H1*T1 + H2*(T1 + T2) + (1 - H2)*(T2 + T3))

  • Ts = H1*T1 + (1-H1)*H2*(T2 + T3)

  • Ts = H1*T1 + (1-H1)*(H2*(T1 + T2) + (1 - H2)*(T1 + T2 + T3))

Explanation

Question 25 of 95

1

This chooses which block to replace when a new block is to be loaded into the cache and the cache already had all slots filled with other blocks:

Select one of the following:

  • replacement algorithm

  • write policy

  • cache size

  • locality of reference

Explanation

Question 26 of 95

1

If the accessed word is found in the faster memory, that is defined as a:

Select one of the following:

  • bingo

  • win

  • hit

  • evrika

Explanation

Question 27 of 95

1

If the accessed word is not found in the faster memory, that is defined as a:

Select one of the following:

  • ricochet

  • miss

  • zero

  • loss

Explanation

Question 28 of 95

1

The processor contains a single data register, called

Select one of the following:

  • PSW

  • PC

  • IR

  • AC

Explanation

Question 29 of 95

1

Which register contains the instruction most recently fetched?

Select one of the following:

  • instruction register

  • execution register

  • program counter

  • process counter

Explanation

Question 30 of 95

1

This register specifies the location in memory for the next read or write

Select one of the following:

  • Memory address register

  • I/OAR

  • Memory buffer register

  • I/OBR

Explanation

Question 31 of 95

1

Which of the following element of a computer system moves data between the computer and its external environment?

Select one of the following:

  • Main memory

  • Processor

  • System bus

  • I/O modules

Explanation

Question 32 of 95

1

This main disadvantage of this technique: consumes a lot of processor time, because every word of data that goes from memory to I/O module or from I/O module to memory must pass through the processor

Select one of the following:

  • Direct memory access (DMA)

  • Manual memory access

  • Interrupt-driven I/O

  • Programmed I/O

Explanation

Question 33 of 95

1

The processor issues an I/O command to a separate module, by sending the type of operation (read/write), the address of the I/O device, the starting location in memory for data, number of words. Then the processor continues with other work. The module transfers the entire block of data to/from memory without going through the processor. The described technique is:

Select one of the following:

  • Direct memory access (DMA)

  • Manual memory access

  • Interrupt-driven I/O

  • Programmed I/O

Explanation

Question 34 of 95

1

The processor issues an I/O command to a module and waits, periodically checking the status of the I/O module until it finds that the operation is complete.
The I/O module performs the requested action and then sets the appropriate bits in the I/O status register but takes no further action to alert the processor.
The described technique is:

Select one of the following:

  • Direct memory access (DMA)

  • Manual memory access

  • Interrupt-driven I/O

  • Programmed I/O

Explanation

Question 35 of 95

1

The processor is executing "Load AC from memory" instruction. Choose the correct micro-instruction:

Select one of the following:

  • PC -> MAR
    M -> MBR
    MBR -> AC
    IR -> MAR
    M -> MBR
    MBR -> AC

  • PC -> MBR
    M -> MAR
    MAR -> IR
    IR -> MAR
    M -> MBR
    MBR -> AC

  • PC -> MAR
    M -> MBR
    MBR -> IR
    IR -> MAR
    M -> MBR
    MBR -> AC

  • PC -> MAR
    M -> MBR
    MBR -> IR
    IR -> MBR
    M -> MAR
    MAR -> AC

Explanation

Question 36 of 95

1

If there no interrupts, after each write operation, the processor must:

Select one of the following:

  • Load new PC value

  • Finish execution of current instruction

  • Save the PSW and PC onto control stack

  • Pause and remain idle until the I/O operation finishes

Explanation

Question 37 of 95

1

Complete the relationship concerning the memory systems: greater capacity

Select one of the following:

  • lower capacity

  • greater cost per bit

  • faster access speed

  • smaller cost per bit

Explanation

Question 38 of 95

1

User-visible registers minimize main memory references by optimizing register use

Select one of the following:

  • True
  • False

Explanation

Question 39 of 95

1

This register contains the data to be written into memory or which receives the data read from memory

Select one of the following:

  • I/OAR

  • memory buffer register

  • memory address register

  • I/OBR

Explanation

Question 40 of 95

1

Which of the following element of a computer system controls the operation of the computer and performs its data processing functions?

Select one of the following:

  • System bus

  • Main memory

  • I/O modules

  • Processor

Explanation

Question 41 of 95

1

The main disadvantages of this technique: there is a competition for bus usage

Select one of the following:

  • Interrupt-driven I/O

  • Programmed I/O

  • Manual memory access

  • Direct memory access (DMA)

Explanation

Question 42 of 95

1

At the beginning of each instruction cycle, the processor fetches an instruction from the memory. The address of the instruction is held in

Select one of the following:

  • IR

  • MBR

  • MAR

  • PC

Explanation

Question 43 of 95

1

The smaller, more expensive, faster memory is:

Select one of the following:

  • Disk drive

  • Cache

  • Main memory

  • Register

Explanation

Question 44 of 95

1

There were no OS with

Select one of the following:

  • Simple batch systems

  • Serial processing

  • Time-sharing-systems

  • Multiprogrammed batch systems

Explanation

Question 45 of 95

1

The principal objective of the time-sharing system is to

Select one of the following:

  • Minimize response time

  • Minimize processor utilization

  • Maximize response time

  • Maximize processor utilization

Explanation

Question 46 of 95

1

Serial processing was used

Select one of the following:

  • In early 1960s

  • From late 1940s to the mid-1950s

  • From the mid-1950s to early 1960s

Explanation

Question 47 of 95

1

The programmer interacted directly with the computer hardware with

Select one of the following:

  • Simple batch systems

  • Serial processing

  • Time-sharing-systems

  • Multiprogrammed batch systems

Explanation

Question 48 of 95

1

In operation system security and protection, availability is:

Select one of the following:

  • Concerned with the proper verification of the identity of users and the validity of messages or data

  • Assuring that users cannot read data for which access is unauthorized

  • Protection of data from unauthorized modification

  • Concerned with protecting the system against interruption

Explanation

Question 49 of 95

1

Choose the storage management responsibility for "The OS can achieve efficiency by assigning memory to jobs only as needed"

Select one of the following:

  • Process isolation

  • Protection and access control

  • Long-term storage

  • Support of modular programming

  • Automatic allocation and management

Explanation

Question 50 of 95

1

The limit register

Select one of the following:

  • Defines the size of the region of memory occupied by the process (in bytes or words)

  • Contains the index into the process list of the process currently controlling the processor

  • Points to the next instruction in that process to be executed

  • Contains the staring address of the region of memory occupied by the process

Explanation

Question 51 of 95

1

In operating system security and protection, authenticity is:

Select one of the following:

  • Concerned with the proper verification of the identity of users and the validity of messages or data

  • Assuring that users cannot read data for which access is unauthorized

  • Protection of data from unauthorized modification

  • Concerned with protecting the system against interruption

Explanation

Question 52 of 95

1

An application programs is developed by the

Select one of the following:

  • Application programmer

  • End user

  • Operating system

  • Hardware

Explanation

Question 53 of 95

1

"The OS as a User/Computer interface" corresponds to the following objective

Select one of the following:

  • Efficiency

  • Convenience

  • Ability to evolve

Explanation

Question 54 of 95

1

Process is

Select one of the following:

  • Program in High level language kept on disk

  • Contents of main memory

  • A job in secondary memory

  • A program in execution

Explanation

Question 55 of 95

1

If a process is executing in its critical section, then no other processes can be executing in their critical section. This condition is called

Select one of the following:

  • Synchronous exclusion

  • Critical exclusion

  • Asynchronous exclusion

  • Mutual exclusion

Explanation

Question 56 of 95

1

In operating system security and protection, confidentiality is:

Select one of the following:

  • Concerned with the proper verification of the identity of users and the validity of messages or data

  • Assuring that users cannot read data for which access is unauthorized

  • Protection of data from unauthorized modification

  • Concerned with protecting the system against interruption

Explanation

Question 57 of 95

1

In operating system security and protection, Data integrity is:

Select one of the following:

  • Concerned with the proper verification of the identity of users and the validity of messages or data

  • Assuring that users cannot read data for which access is unauthorized

  • Protection of data from unauthorized modification

  • Concerned with protecting the system against interruption

Explanation

Question 58 of 95

1

When the time required for the I/O operation is less that the time to complete the execution of instructions between write operations in the user program, it is:

Select one of the following:

  • Fast I/O wait

  • Slow I/O wait

  • Long I/O wait

  • Short I/O wait

Explanation

Question 59 of 95

1

This type of memory is nonvolatile:

Select one of the following:

  • Register

  • Secondary memory

  • Cache

  • Main memory

Explanation

Question 60 of 95

1

If the contents of a block in the cache are altered, then it is needed to save it back to main memory before replacing it. This is called:

Select one of the following:

  • write policy

  • mapping function

  • locality of reference

  • replacement algorithm

Explanation

Question 61 of 95

1

What is not a structural element of a computer system?

Select one of the following:

  • System bus

  • Main memory

  • Operating system

  • Processor

Explanation

Question 62 of 95

1

The main disadvantage of this technique: it is a time-consuming process that keeps the processor busy needlessly

Select one of the following:

  • Direct memory access (DMA)

  • Manual memory access

  • Interrupt-driven I/O

  • Programmed I/O

Explanation

Question 63 of 95

1

Which of the following element of a computer system stores data and programs

Select one of the following:

  • Main memory

  • System bus

  • Processor

  • I/O modules

Explanation

Question 64 of 95

1

When an I/O device completes an I/O operation, the device issues an interrupt signal to the processor and then:

Select one of the following:

  • The processor stops execution of the current instruction without finishing it and responds to the interrupt

  • The processor loads the program counter with the entry location of the interrupt-handling routine

  • The processor saves information needed to resume the current program at the point if interrupt

  • The processor finishes execution of the current instruction before responding to the interrupt

Explanation

Question 65 of 95

1

Complete the relationship concerning the memory systems: greater capacity

Select one of the following:

  • lower capacity

  • slower access speed

  • greater cost per bit

  • faster access speed

Explanation

Question 66 of 95

1

Which register contains condition codes set by the processor hardware as the result of operations?

Select one of the following:

  • Program counter

  • Accumulator

  • Program status word

  • Stack pointer

Explanation

Question 67 of 95

1

Which of the following provides for communication among elements of a computer system?

Select one of the following:

  • main memory

  • system bus

  • processor

  • I/O modules

Explanation

Question 68 of 95

1

We have
Ts = average (system) access time

T1 = access time of M1 (cache)

T2 = access time of M2 (main memory)

T3 = access time of M3 (disk)

H1 = hit ratio, fraction of time reference is found i M1

H2 = hit ratio, fraction of time reference is found i M2

The average time to access an item, in case the item in main memory is:

Select one of the following:

  • Ts = H1*T1 + H2*T2 + (1-H2)*T3

  • Ts = H1*T1 + (1-H1)*(H1*T1 + H2*(T1 + T2) + (1 - H2)*(T2 + T3))

  • Ts = H1*T1 + (1-H1)*(T1+T2)

  • Ts = H1*T1 + (1-H1)*(H2*(T1 + T2) + (1 - H2)*(T1 + T2 + T3))

Explanation

Question 69 of 95

1

Control and status registers control the operation of the processor and the execution of programs

Select one of the following:

  • True
  • False

Explanation

Question 70 of 95

1

This type of system was developed at MIT by a group known as Project MAC for the IBM 709 in 1961

Select one of the following:

  • Serial processing

  • Multiprogrammed batch system

  • Simple batch system

  • Time-sharing-system

Explanation

Question 71 of 95

1

The concept of codes of operation (user mode, system mode) was introduced with

Select one of the following:

  • Time-sharing-system

  • Simple batch system

  • Multiprogrammed batch system

  • Serial processing

Explanation

Question 72 of 95

1

Short-term scheduler, or dispatcher, picks a process. Each process in the queue is given some time in turn. This strategy is called:

Select one of the following:

  • Round-robin technique

  • Prioritizing

  • Carousel technique

  • Merry-go-round technique

Explanation

Question 73 of 95

1

Central idea in this system was the use of piece of software known as the monitor:

Select one of the following:

  • Time-sharing-system

  • Simple batch system

  • Multiprogrammed batch system

  • Serial processing

Explanation

Question 74 of 95

1

'More than one program attempts to make use of a shared resource at the same time'. This is

Select one of the following:

  • Failed mutual exclusion

  • Improper synchronization

  • Deadlocks

  • Nondeterminate program operation

Explanation

Question 75 of 95

1

The term was first used by the designers of Multics in 1960s:

Select one of the following:

  • Monitor

  • Process

  • Multiprogramming

  • Time sharing

Explanation

Question 76 of 95

1

Utilities are

Select one of the following:

  • Application program

  • System programs

  • Opcodes

  • Processor registers

Explanation

Question 77 of 95

1

"When program shares memory and their execution is interleaved by the processor, they may interfere with each other by overwriting common memory areas in unpredictable ways. The result of a particular program depend on the activities of other programs in shared systems".
This is:

Select one of the following:

  • Falled mutual exclusions

  • Deadlocks

  • Nondeterminate program operation

  • Improper synchronisation

Explanation

Question 78 of 95

1

The state of a processor is defined by:

Select one of the following:

  • the activity just executed by the process

  • the current activity of the process

  • the final activity of the process

  • the activity to next be executed by the process

Explanation

Question 79 of 95

1

The hardware and software used in providing applications to a user can be viewed in:

Select one of the following:

  • classified fashion

  • layered fashion

  • sandwich fashion

  • leveled fashion

Explanation

Question 80 of 95

1

Suppose that a process is in "Blocked" state waiting for some I/O device.
When the service is completed, it goes to the:

Select one of the following:

  • Suspended state

  • Terminated state

  • Ready state

  • Running state

Explanation

Question 81 of 95

1

We have
Ts = average (system) access time
T1 = access time of M1 (cache)

T2 = access time of M2 (main memory)
T3 = access time of M3 (disk)

H1 = hit ratio, fraction of time reference is found i M1

H2 = hit ratio, fraction of time reference is found i M2

The average time to access an item, in case the item in cache is:

Select one of the following:

  • Ts = H1*T1 + H2*T2 + (1-H2)*T3

  • Ts = H1*T1 + (1-H1)*(H1*T1 + H2*(T1 + T2) + (1 - H2)*(T2 + T3))

  • Ts = H1*T1

  • Ts = H1*T1 + (1-H1)*(H2*(T1 + T2) + (1 - H2)*(T1 + T2 + T3))

Explanation

Question 82 of 95

1

The serial processing presented two main problems:

Select one or more of the following:

  • setup time

  • using a monitor

  • time slicing

  • multiprogramming

  • scheduling

Explanation

Question 83 of 95

1

The process index register:

Select one of the following:

  • contains the index into a process list of the process currently controlling the processor

  • define the region in memory occupied by the process

  • points to the next instruction in that process to be executed

  • contains the starting address of the region of memory occupied by the process

Explanation

Question 84 of 95

1

The concept of a batch operating system was developed to

Select one of the following:

  • Maximize processor utilization

  • Minimize response time

  • Support interactive mode

  • Minimize processor utilization

Explanation

Question 85 of 95

1

Batch operating system were used

Select one of the following:

  • From the late 1940s to the mid-1950s

  • From the mid-1950 to early 1960s

  • In early 1960s

Explanation

Question 86 of 95

1

"More than one programs hung up waiting for each other".
This is

Select one of the following:

  • Failed mutual exclusions

  • Deadlocks

  • Nondeterminate program operation

  • Improper synchronization

Explanation

Question 87 of 95

1

This contains the most frequently used functions in the OS:

Select one of the following:

  • Centre

  • Base

  • Root

  • Kernel

Explanation

Question 88 of 95

1

The end user views a computer system in terms of:

Select one of the following:

  • a set of machine instructions

  • utilities

  • a set of system programs

  • a set of applications

Explanation

Question 89 of 95

1

Which of the following is not the state of a process?

Select one or more of the following:

  • new

  • waiting

  • terminated

  • ready

  • running

  • old

Explanation

Question 90 of 95

1

The fetched instruction is loaded into the

Select one of the following:

  • IR

  • Accumulator

  • Memory

  • PC

Explanation

Question 91 of 95

1

When the time required for the I/O operation will take much more time than executing a sequence of user instructions, it is:

Select one of the following:

  • Slow I/O wait

  • Long I/O wait

  • Fast I/O wait

  • Short I/O wait

Explanation

Question 92 of 95

1

The system handles multiple interactive jobs

Select one of the following:

  • Time-sharing-system

  • Simple batch system

  • Serial processing

  • Multiprogrammed batch system

Explanation

Question 93 of 95

1

A system clock generates interrupts at a rate of approximately one every 0.2 seconds. At each clock interrupt, the OS regained control and could assign the processor to another user. This technique is known as

Select one of the following:

  • Time scheduling

  • Time sliding

  • Time slicing

  • Time allocating

Explanation

Question 94 of 95

1

Choose the storage management responsibility for "Programmers should be able to define programs modules, and to create, destroy, and alter the size of modules dynamically":

Select one of the following:

  • Protection and access control

  • Long-term storage

  • automatic allocation and management

  • process isolation

  • support of modular programming

Explanation

Question 95 of 95

1

'Lost signals, duplicate signals received'. This is

Select one of the following:

  • Improper synchronization

  • Nondeterminate program operation

  • Deadlocks

  • Failed mutual exclusion

Explanation