Skip to main content

::: vuaskari.com ::: CS604 Quiz No.1 Dec 04, 2012

CS604 – Operating System

Quiz No.1 Dated Dec 04, 2012

 

 

The process id returned to the child process after successful fork system call execution is _____________.

0

1

2

3

 

Shared libraries and kernel modules are stored in _____________ directory.

/bin

/dev/

/boot

/lib

 

___________ is a piece of code in a cooperating process in which the process may updates shared data (variable, file, database, etc.).

Critical analysis

Critical section

Critical path

Critical code

 

Round Robin algorithm is similar to ____________ scheduling but preemption is added to switch between processes.

Shortest job first

Shortest Remaining Time First

First Come First Server

None of these

 

DOS is single user operating system.

True

False

 

You can use the mv file1 file2 command to move ______________

File1 to file2.

File2 to file 1

This command will not work for moving

None the options is correct

 

A process is said to be in critical section if it executes code that manipulates shared data

True

False

 

When process opens its first file explicitly it will get descriptor number ______

1

2

3

4

 

 

 

A parent process calling_______ system call will be suspended until children process terminates

wait

Fork

Exit

Exec

 

 

_____ scheduling algorithm is sometimes called shortest remaining time first scheduling algorithm.

Non-Preemptive SJF

Priority Scheduling

Preemptive Shortest Job First

FCFS

 

A solution to the critical section problem must satisfy the following requirements

Progress

Mutual exclusion 

Bounded Waiting

Race Condition

 

A major problem with priority scheduling algorithms is ______.

Deadlock

Aging

Starvation

None of the these

 

 

All threads within a process share the ________ address space.

Same

Different

 

 

__________ displays information about the top processes.

Is

Cs

top

Cd

 

The problem with priority scheduling algorithms is ___________

Deadlock

Starvation

Aging

Nice value

 

 

 

 

 

_________ scheduling algorithm can be preemptive or non-preemptive.

First Come First Serve

Shortest job First

Round Robin

Priority

 

The scheduling of ______ are done by the operating system.

Kernel threads

User level threads

Both kernel and user level thread

None of the give option

 

In Unix/ Linux, by default the standard output file is attached to the ___________

File

Screen

Printer

Scanner

 

POSIX is a standard developed by ANSI

IEEE

ISO

ACM

 

_____________ is the basis of queuing theory which is branch of mathematics used to analyze systems involving queues and servers.

Little's Formula

Deterministic modeling

Queuing Theory

Queuing Analysis

 

___________ is a solution to the problem of indefinite blockage of low-priority processes.

Starvation

Deadlock

Aging

None of the these

 

The priority of a process can be changed using ___________ command.

nice

cmd

Cat

grep

 

Batch programs are usually _________ programs.

Interactive

Non-interactive

Foreground

Preemptive

A process consists of __________

One or more threads

Code

Data

All of the given

 

_________ is the smallest rectangle enclosing the portion of a window or client area affected by recent drawing operations

Invalid Rectangle

Accumulated Bounding Rectangle

Accumulated Client Rect

All of the given options

 

What kind of messages can be display using messagebox function?

Long messages

Short messages

Null value

None othe given

 

 

 

_______ acts as a buffer between applications and output devices.

GDI

Kernal32

OS

CPU

 

On which machines the scheduler can move individual threads to different processors to "balance" the CPU load.

Miniprocessor

Multiprocessor

Doubleprocessor

None of given options

 

The window ______ is the color or pattern used to fill the client area before a window begins drawing

Caption

Color palette

Background

Foreground

 

___________ is used to check the predefined identifiers.

#include

#ifdef

#def

#elif

 

 

_________ is/are Pre-defined GDI object(s) in Windows.

Pens

Brushes

Fonts

All of the given options

 

If a window owns child Windows, and we destroy owner Window then _____________.

Only owner window will be destroyed

Only its owned window will be destroyed

Both owner and owned Windows will be destroyed

The application will be crashed

 

command displays the contents of current working directory.

Is

Cs

Mv

 

______________ is used to request the OS by the process to take an I/O or initiating child process.

System Call

Interrupt

Trap

Singal

 

Linux uses ___________ directory to store system configuration files.

/bin

/dev

/boot

/etc

 

__________ commands in Linux is used to copy file

is

cp

mv

mkdir

 

User mode can run the Privileged instructions.

1

0

 

A parent process calling __________ system call will be suspended until children process terminates. ht

wait

fork

exit

exec

 

 

 

 

If your processor does not have two slots empty in Per Process File Descriptor Table, then your _________ system call will fail.

pipe

read

write

open

 

The manual pages can be read in Linux using ____ command.

man

wan

desc

help

 

__________ directory includes essential system boot files including the kernel image.

/bin

/dev

/boot

/etc

 

Swapper is also termed as Short term scheduler.

1

0

 

First _______ entries in Per Process File Descriptor Table are used as soon as the process is created.

1

2

3

4

 

The number of processes completed per unit time is called ___________.

Turn around time

Throughput

Response time

Dispatch latency

 

Command-line interpreter is also called __________ in some operating systems.

kernal wrong

shell

signal

api

 

__________ displays information about the top processes.

is

cs

top

cd

 

/usr/X11R6 is used by the X Window System.

True

False



/opt is used for storage of large applications.

True

False


____ is a virtual directory in Linux and Unix.

/proc

/temp

/ver

/boot

 

The Home Directory for superuser in Linux and Unix is

/

/home

/root

None of the given


Linux Treats Devices as Files.

True

False

 

~/vusr/CS604 is an example of _________ pathname.

Absolute

Relative



usr/include/sys/vusr.h is an example of _______ path

Absolute

Relative

 

An absolute pathname starts with the root directory (/) and a relative pathname starts with your home directory.

True

False

 

A pathname is the list of directories separated by _________.

#

$

&

/

 

________ determines What will be done.

Mechanism

Policy

Mechanism and Policy

None of the given


_____________ determines How to do something.

Mechanism

Policy

Mechanism and Policy:

None of the given

 

User Goal of OS is that It easy to use, reliable, safe and fast.

True

False

 

We can install and run multiple OS by using VMWare.

True

False


Mach, MacOS X Server, QNX, OS/2 and Windows NT are examples of OS Based on ______.

Layered

Micro Kernal

Virtual Machine

None of The Given

 

In Layered Approach of OS, the Layer highest Layer is User Interface layer.

True

False

 

In Layered approach of OS, Lowest Layer is known as ________.

Software Layer

Hardware Layer

Lower Level Layer

None of The Given

 

 

Operating System is the Manager of Hardware Resources.

True

False


An operating system is a control program that manages the execution of user programs to prevent errors and improper use of a computer.

True

False

 

The bottom-up view is that operating system is a resource manager who manages the hardware and software resources in the computer system.

True

False


In Top-down OS, user simply give a Command and reset is done by the OS.

True

False

 

copy file1 file2 is an example of ______ OS view.

Top down

Bottum Up

 

The Top-down view is that it is a program that acts as an intermediary between a user of a computer and the computer hardware, and makes the computer system convenient to use.

True

False


Managing Secondary Storage Involves all of the Following except

Allocating storage space

Deallocating Storage

Prevent Overwritting

Insure integrity of shared data

 

Operating System provides services such as Managing Primary and Secondary Storage, Processes and Allowing user to manage his/her files and directories.

True

False

 

The Purpose of Operating System is to generate Executable Programs and to _______ them.

Regenetrate

Execute

Store

Remove

 

Users are the People, machines or computers that uses the Hardware resources.

True

False


Database, Complier, Video games are examples of ________.

Hardware

Application

Operating System

Users

 

Application Programs are methods that enable the use of Hardware resources to solve the user's Problem.

True

False

Which of the Following is not an Operating System.

Linux

Unix

Windows Xp

Datebase

 

Operating system enables the user to use the Hardware Resources.

True

False

 

Which of the following is NOT a Hardware Resource.

CPU

OS

I/O Devices

Memory


Hardware provide basic computing resource.

True

False

 

__________ scheduler selects the process from the job pool and put them in main memory.

Select correct option:

Long term

Short term

Medium term

Swapper

 

_____________ is a preemptive scheduling algorithm.

Select correct option:

First Come First Serve

Shortest Job First

Round Robin

None of these

 

The priorities of processes in the __________ group remain fixed.

Select correct option:

Kernel

User

 

Taking the CPU from one process and giving the CPU to another process is termed as

Select correct option:

Context Switching

Dispatching

Swapping

Tracking

 

A solution to the critical section problem must satisfy the following requirements except

Select correct option:

 Progress

Mutual Exclusion

Bounded Waiting

Race Condition

 

___________ is used in real time operating systems.

Select correct option:

 Non-preemptive scheduling

 Preemptive scheduling

 Dispatching scheduling

 FCFS scheduling

 

The process of switching from one process to another is called latency.

Select correct option:

True

False

 

The major advantage of multi-programming system is

Select correct option:

More than one jobs can be processed at a given time

CPU utilization can be increases

Jobs can be completed quickly

All of the options are correct

 

In Unix/ Linux, by default the standard input file is attached to the ___________

Select correct option:

Mouse

Keyboard

Light pen

Joystick

 

The nice value helps in assigning ______ to a process.

Select correct option:

Priority

Weight

Time

Scheduling

 

 

 

 

The problem with priority scheduling algorithm is ________.

Select correct option:

Deadlock

Starvation

Aging

Nice value

 

OS helps manages the following except

Select correct option:

Application software

Memory

Virtual memory

Bus speed of the system

 

 

___________ is a piece of code in a cooperating process in which the process may updates shared data (variable, file, database, etc.).

Select correct option:

Critical Analysis

Critical Section

Critical path

Critical code

 

 

_____________ is a preemptive scheduling algorithm.

Select correct option:

First Come First Serve

Shortest Job First

Round Robin

None of these

 

The procedure "The time at which the process finished working MINUS the arrival time of the process MINUS CPU burst for that process" will help calculate the _________.

Select correct option:

 on-preemptive Shortest Job First scheduling.

 Preemptive Shortest Job First scheduling.

 FCFS

 RR Scheduling

 

The Operating system is a layer of software between _________ and ___________.

Select correct option:

Hardware, software application

Kernel, hardware

Dos, Windows

Windows, Kernel

 

 

 

_______________ scheduling algorithm can be preemptive or non-preemptive.

Select correct option:

First Come First Serve

Shortest Job First

Round Robin

Priority

 

First _______ entries in Per Process File Descriptor Table are used as soon as the process is created.

1

2

4

3

 

 

Batch programs are usually __________ programs.

Interactive

Non- Interactive

Foreground

Preemptive

 

__________ integer shows the highest priority of a process in CPU scheduling

Small

Large

 



--
Zindagi mein 2 Logo ka buhat khayal rahkoooo
Ist woh jiss ney tumhari jeet ke Liye buhat kuch hara hoo
(Father)
2nd woh jiss ko tum ney har dukh me pukaara hoo (Mother)
Regards,
Umair Saulat Mc100403250

--
We say, "Be one as Pakistani Nation and grow up for Pakistan's Future". Wish you all the best. Join www.vuaskari.com,
To post to this group, send email to vuaskari_com@googlegroups.com
Visit these groups:
This (Main) Group:http://groups.google.com/group/vuaskari_com?hl=en?hl=en
MIT/MCS Group: http://groups.google.com/group/vu_askarimit?hl=en?hl=en
HRM Group: http://groups.google.com/group/askari_hrm?hl=en?hl=en
Banking Group: http://groups.google.com/group/askari_banking?hl=en?hl=en
Management: https://groups.google.com/group/vuaskari_mgt?hl=en
Marketing: https://groups.google.com/group/vuaskari_mkt?hl=en
MIS Group: http://groups.google.com/group/askari_mis?hl=en
 
 

Comments

Popular posts from this blog

Re: ::: vuaskari.com ::: CS408 - FINAL TERM SUBJECTIVE WITH REFERENCE SOLVED BY UMAIR SAULAT

GREAT WORK On Wed, Feb 20, 2013 at 11:30 PM, Umair Saulat < saulat.umair@gmail.com > wrote: CS408- Human Computer Interaction Solved Subjective Fall Semester 2012   QNo.1    it has been observed that most computer users use menu option for input instead of keyboard accelerator. What is the reason behind it? (2 Marks) Answer:- 1.        Menu options are easier to find. 2.        You don't have to memories the keys for menu option but for key board accelerators you have to memories them REF:: Handouts Page No. 127   QNo.2    Define active intervention.  (2 Marks) Answer:- Active intervention with the participant and actively probes the participant understands of whatever is being tested. REF:: Handouts Page No. 276 QNo.3    what is Ubiquitous Computing? (2 Marks) Answer:- The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indi

Updating our Google Account inactivity policy

Every day Google works hard to keep you and your private information safe and secure by preventing unauthorized access to your Google Account with our built-in security protections. And keeping you safe means having strong privacy practices across our products that minimize how long we store your personal files and any data associated with them. We want to protect your private information and prevent any unauthorized access to your account even if you're no longer using our services. Therefore, we are updating the inactivity period for a Google Account to two years across all our products and services. This change starts rolling out today and will apply to any Google Account that's been inactive, meaning it has not been signed into or used within a two-year period. An inactive account and any content in it will be eligible for deletion from December 1, 2023. What this means for you: These changes do not impact you unless you h

Re: ::: vuaskari.com ::: I CAN HELP YOU IN INTERNSHIP REPORT AND VIVA PRESENTATION ETC.

Assalam u Alaikum Sir 2013/14 me M.B.A me admission tha...freeze kar dia due to family issues...doobara se unfreeze ho sakta hai? Mc090204573 ye id thi On Tue, Feb 9, 2016, 11:52 AM 'Ambreen Shahzadi' via ::: www.vuaskari.com ::: < vuaskari_com@googlegroups.com > wrote: I need the help that how to improve my c.g.p in short time to give b.cz i m doing job in bnk and here is too much taugh secdule so plz hlp nd guide me after 4 smster i cant able to achv 2+ cgp thats why not slct the spclization...tellme what to do in this case... On Sat, 2/14/15, Ahsen Abbasbukhary < ahsen.green.mba@gmail.com > wrote:  Subject: ::: vuaskari.com ::: I CAN HELP YOU IN INTERNSHIP REPORT AND VIVA PRESENTATION ETC.  To: vuaskari_com@googlegroups.com  Date: Saturday, February 14, 2015, 1:49 AM  Dear all fallows,     I have cleared my internship report and  VIVA Presentation and over all  my MBA program in 2014. I am receiving my degree in VU 6th  convocation in