Ece Os Mid-Ii Bits
Ece Os Mid-Ii Bits
Ece Os Mid-Ii Bits
2. Which is an integer variable, a part from initialization, is accessed only through two
standard atomic operations: wait & signal is called as
(A) Critical Section (B) Semaphore (C) Monitor (D) None
3. Which is a semaphore with an integer value that can range only between 0 & 1, is called as
(A) Critical Section (B) Monitor (C) Binary Semaphore (D) None
8. Critical region is
(A) A part of the operating system which is not allowed to be accessed by any process
(B) A set of instructions that access common shared resource which exclude one another in
time
(C) The set of primitive functions upon which the rest of operating system functions are built
up
(D) None of the above
9. A solution to the Dining Philosophers Problem which avoids deadlock is
(A) Ensure that all philosophers pick up the left fork before the right fork
(B) Ensure that all philosophers pick up the right fork before the left fork
(C) Ensure that one particular philosopher picks up the left fork before the right fork, and that
all other philosophers pick up the right fork before the left fork
(D) None of the above
10. Consider the methods used by processes P1 and P2 for accessing their critical sections
whenever needed, as given below. The initial values of shared boolean variables S1 and S2
are randomly assigned.
15. Which process can be affected by other processes executing in the system?
(A) cooperating process (B) child process (C) parent process (D) init process
16. When several processes access the same data concurrently and the outcome of the
execution depends on the particular order in which the access takes place, is called
(A) dynamic condition (B) race condition
(C) essential condition (D) critical condition
17. Bounded waiting implies that there exists a bound on the number of times a process is
allowed to enter its critical section :
(A) after a process has made a request to enter its critical section and before the request is
granted
(B) when another process is in its critical section
(C) before a process has made a request to enter its critical section
(D) None of these
18. A minimum of _____ variable(s) is/are required to be shared between processes to solve
the critical section problem.
(A) one (B) two (C) three (D) four
19. A situation where several processes access and manipulate the same data concurrently
and the outcome of the execution depends on the particular order in which access takes place
is called :
(A) data consistency (B) race condition (C) aging (D) starvation
20. The segment of code in which the process may change common variables, update tables,
write into files is known as:
(A) program (B) critical section (C) non – critical section (D) synchronizing
21. To avoid the race condition, the number of processes that may be simultaneously inside
their critical section is
(A) they are not sufficient for many process (B)they require busy waiting
(C) they are unreliable sometimes (D) they are too complex for programmers
26. The wait operation of the semaphore basically works on the basic _______ system call.
(B) it is invalid
(C) no operation can be further performed on it until the signal operation is performed on it
29. What will happen if a non-recursive mutex is locked more than once ?
30. A mutex :
(A) Must be accessed from only one process (B) is a binary mutex
(A) System calls (B) System protection (C) IPC mechanisms (D) None of these
33. .............. Refers to a situation in which a process is ready to execute but is continuously
denied access to a processor in deference to other processes.
34. A procedure defined within a ________ can access only those variables declared locally
within the _______ and its formal parameters.
(A) process, semaphore (B) process, monitor
(C) semaphore, semaphore (D) monitor, monitor
36. The two atomic operations permissible on semaphores are : (choose two)
(A) wait, signal (B) stop (C) hold (D) None
(A) Niklaus Wirth and David Gries (B) Brian Kernighan and P. J. Plauger
UNIT-IV
2. Which of the following page replacement algorithm suffers from belady’s anomaly ?
A) Optimal replacement (B) L.R.U (C) F.I.F.O (D)F.I.F.0
&L.R.U
3. The first fit, best fit and worst fit algorithm can be used for
(A) Contiguous allocation of memory (B) Linked allocation of memory
(C) Indexed allocation of memory (D) Hash allocation
5. Virtual memory is
(A) An extremely large main memory (B)An extremely large secondary memory
(C) An illusion of an extremely large memory (D)A type of memory used in super
computer
6. The run time mapping from virtual to physical address is done by____
(A) Compiler (B) o.s (C) cpu (D) memory management
unit
7.______algorithm fits process unit into the hole that is large enough to hold the process
and closes in size to the requirements of that process
(A) first fit (B) best fit (C) worst fit (D)zero fit
11. Replace the page that has that has not been used for the longest period of time. This
is_______
(A) F I F O (B) L R U (C) optimal algorithm (D)L F U
12. Which algorithm searches the list of holes and allocate the first memory area that is large
enough
(A) first fit (B) best fit (C) worst fit (D)zero fit
15. The page replacement policy that sometimes leads to more page faults when the size of
the memory is increased is
(A) FIFO (B) LRU (C) SJF (D)None
16. In page memory system if the page is increased then the internal fragmentation generally
(A) Becomes less (B) Becomes more (C) constant (D) None
18. When total memory is available to satisfy the requirement of the process is not contiguous
it is called _________ fragmentation?
(A) External (B) Internal (C) Max (D) Min
19. When the space with in the block is unused by the process residing in that block it is
called _____ fragmentation
(A) External (B) Internal (C) Maximum (D) Minimum
21. Shuffle memory contents to place all free memory together in one large block to some
external fragmentation is
(A) Compaction (B) Controlling (C) Paging (D) None
28. Replace the page that will not be used for the longest period of time
(A) FIFO (B) optimal (C) LRU (D)None
29. The page replacement algorithm that replaces the oldest page is
(A) FIFO (B) optimal (C) LRU (D)None
30. The valid-invalid bit in the page table entry is used for
(A) page is in main memory (B) page is not in main memory
(C) Both a&b (D)None
32. Overlay is
(A) A part of an operating system (B) A specific memory location (C) A single
contiguous memory that was used in the olden days for running large programs by swapping
(D) overloading the system with many user files
33. Fragmentation is
(A) Dividing the secondary memory into equal sized fragments (B) Dividing the main
memory into equal-sized fragments (C) fragments of memory words used in a page (D)
fragments of memory words unused in a page
35. The size of the virtual memory depends on the size of the
(A) Data bus (B) Main memory (C) Address bus (D) none of the above
38. Thrasing
(A) Reduces page I/O (B) Decreases the degree of multiprogramming
(C) Implies excessive page I/O (D) Improves the system performance
UNIT - 3 KEY
A B C C C
D B 8. B 9. C 10. A
11. C 12. D 13. C 14. A 15. A
16. B 17. A 18. B 19. B 20. B
21. B 22. D 23. B 24. C 25. B
26. C 27.A 28. C 29. D 30. A
31. C 32. B 33. D 34. D 35. C
36. A 37. A 38. A 39. C 40. A
UNIT – 4 KEY
C C A A C
D 7. B 8. C 9. A 10. B
11. B 12. A 13. C 14. B 15.A
16. B 17. B 18. A 19. B 20.D
21. A 22. A 23. B 24. C 25. D
26. A 27. D 28. B 29. A 30. C
31. D 32. C 33. D 34. D 35. C
36. C 37. B 38. C 39. C 40. A