0% found this document useful (0 votes)
286 views16 pages

ÔN TẬP CUỐI MÔN OS

1. An operating system operates between users and computer hardware. 2. The program counter register contains the memory address of the next instruction to be fetched. 3. The /etc/inittab file is read by init to get the default run level.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
286 views16 pages

ÔN TẬP CUỐI MÔN OS

1. An operating system operates between users and computer hardware. 2. The program counter register contains the memory address of the next instruction to be fetched. 3. The /etc/inittab file is read by init to get the default run level.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

ÔN TẬP CUỐI MÔN NLHĐH

Đề bài
1) An operating system is a program that operates between users and _____
a) Computer hardware
b) Computer software
c) The application programs
d) CPU
2) What is the register that contains the memory address of the next instruction to be
fetched?
a) Stack pointer
b) Program counter
c) Program status word
d) None of the mentioned
3) To get the default run level, which function is read by init?
a) /etc/inittab
b) /etc/kernel
c) /etc/boot
d) /etc/init
4) The main function of the command interpreter is _____
a) To provide the interface between the API and application program
b) To get an execute the next user-specified command
c) To handle the files in operating system
d) None of the mentioned
5) What is not the major objective of operating systems?
a) To act as a File server to client machines requiring such service
b) To act as a resource manager for multiple tasks running on the CPU, the memory
and disk resources
c) To provide a programming interface to the user
d) To act as an uniform abstract machine on top of a variety of different hardware
platforms
6) What are basic memory address spaces?
a) Logical and virtual address space
b) Logical and physical address space
c) Virtual and physical address space
d) Virtual, logical and physical address space.
7) What is the base register?
a) The base address of the instruction.
b) The smallest unit of RAM.
c) The smallest unit of ROM.
d) The base address of storage devices.
8) Most computers have two modes of operation, these are _____
a) User mode and CPU mode
b) Kernel mode and User mode
c) Kernel mode and CPU mode
d) MMU mode and CPU mode
9) A process is selected from the _____ queue by the _____ scheduler, to be executed.
a) ready, short term
b) blocked, short term
c) wait, long term
d) ready, long term
10)How many types of schedulers mainly used? Name?
a) 2 types: Large - term scheduler, Small - term scheduler.
b) 3 types: Long - term scheduler, Medium - term scheduler, Short -term scheduler.
c) 2 types: Long - term scheduler, Short -term scheduler.
d) 3 types: Large - term scheduler, Medium - term scheduler, Small - term scheduler.
11)An entry of the Process table is called _____
a) Process control block
b) Process check block
c) Process management block
d) All of the mentioned
12)Which of the following cannot be shared among different threads of a process?
a) File handles
b) Stack and register
c) Process code
d) Process data
13)A _____ is a portion of a process that can run independently
a) Thread
b) Program
c) Miniprocess
d) Subprocess
14)Which of the following process state transitions is correct, when the external event for
which a process was waiting happens?
a) Running -> ready
b) Blocked (waiting) -> ready
c) Running -> Blocked (waiting)
d) Ready -> running
15)The new process consists of a copy of the _____ of the original process. This
mechanism allows the parent process to communicate easily with its child process.
a) Address space
b) Process state
c) Process number
d) Process identifiers
16)Using Priority Scheduling algorithm, find the average waiting time for the following
set of processes given with their priorities (0 is the highest priority) in the order:
Process : Burst Time : Priority respectively.
P1 : 10 : 3
P2 : 1 : 1
P3 : 2 : 4
P4 : 1 : 5
P5 : 5 : 2
a) 8 milliseconds
b) 7.75 milliseconds
c) 3 milliseconds
d) 8.2 milliseconds
17)An address space of 8 pages, each page is 1K in size and mapped into 32 page frames
in memory. How many bits must be used to represent the logical address of this
address space?
offset =1K = 1024 words
Number of bits in page# field of the logical address = log28 = 3 bits
Offset bits = log21024 = 10 bits
Number of bits in frame# field of the Physical address = log232 bits = 5 bits
logical address = 3 + 10 = 13 bits
Physical address = 5 + 10 = 15 bits

a) 32 bit
b) 8 bit
c) 13 bit
d) 24 bit
18)What is the best description of memory swapping?
a) A computer technology that enables an operating system to extent the storage
space when needed.
b) A computer technology that enables an operating system to provide more memory
to a running application or process than is available in physical RAM.
c) A computer technology that enables an operating system to provide more storage
space while installing that operating system.
d) A computer technology that enables an operating system to provide more
virtual RAM space while installing that operating system.
19)What are two ways to keep track of memory usages?
a) Bit Maps and Linked Lists.
b) Physical and Virtual Lists.
c) Virtual and Linked Lists.
d) Physical and Linked Lists.
20)What are Dynamic Storage-Allocation strategies?
a) First-fit; Next fit; Best-fit.
b) First-fit; Next fit; Best-fit; Worst-fit.
c) First-fit; Second-fit; Best-fit; Worst-fit.
d) First-fit; Second-fit; Third-fit; Last-fit.
21)What is the virtual memory?
a) A part of hard disk.
b) A part of RAM.
c) A part of USB device.
d) A part of ROM BIOS.
22)What methods can virtual memory be implemented via?
a) Paging and fragmentation.
b) Paging and segmentation.
c) Fragmentation and defragmentation.
d) Fragmentation and segmentation.
23)File type can be represented by _____
a) file extension
b) file name
c) file identifier
d) None of the mentioned
24)What is the mounting of file system?
a) crating of a filesystem
b) attaching portion of the file system into a directory structure
c) deleting a filesystem
d) removing the portion of the file system into a directory structure
25)Mapping of file is managed by _____
a) file metadata
b) page table
c) virtual memory
d) file system
26)Mapping of network file system protocol to local file system is done by _____
a) network file system
b) local file system
c) volume manager
d) remote mirror
27)_____ are special files with listings of filenames and their attributes.
a) Directories
b) Programs
c) Data files
d) Databases
28)Which part of a HDD disk is used to boot the computer?
a) Super block
b) MBR
c) Root block
d) Free block
29)Which class of I/O devices that HDD belong to?
a) Block devices
b) Character devices
c) Stream devices
d) None of the mentioned
30)Which class of I/O devices that keyboard belong to?
a) Block devices
b) Character devices
c) Stream devices
d) None of the mentioned
31)In the hierarchical structure for managing I/O, which layer is closest to the hardware?
a) Interrupt handlers
b) Device drivers
c) Device-independent OS software
d) None of the mentioned
32)Consider a disk queue with requests for I/O to blocks on cylinders: 98 183 37 122 14
124 65 67. Considering SSTF (shortest seek time first) scheduling, the total number of
head movements is, if the disk head is initially at 53 is?
a) 224
b) 245
c) 240
d) 236
33)What is a trap/exception?
a) software generated interrupt caused by an error
b) hardware generated interrupt caused by an error
c) user generated interrupt caused by an error
d) None of the mentioned
34)Why is the Software interrupt required by the processor?
a) Return from subroutine.
b) Obtain system services, which need execution of privileged instruction.
c) Test the interrupt system of the processor.
d) Implement co-routines.
35)If all page frames are initially empty, and a process is allocated 3 page frames in real
memory and references its pages in the order 1 2 3 2 4 5 2 3 2 4 1 and the page
replacement is FIFO, the total number of page faults caused by the process will be
_____
a) 8
b) 11
c) 9
d) 10
1 2 3 4 5 2 3 2 4 1
F1 1 1 1 4 4 4 3 3 3 3
F2 2 2 2 5 5 5 5 4 4
F3 3 3 3 2 2 2 2 1
Pf f f f f f f f f f

36)Deadlock prevention is a set of methods _____


a) to ensure that all of the necessary conditions do not hold
b) to ensure that at least one of the necessary conditions cannot hold
c) to decide if the requested resources for a process have to be given or not
d) to avoid deadlock
37)Which important things do the Inter-Process Communication (IPC) involve?
a) Race condition, Critical Region, and Mutual Exclusion
b) Race condition, Critical Region, and Dedicated device
c) Domain Problem, Race Condition, and Mutual Exclusion
d) Scheduling, Critical Region, and Dedicated device
38)Which strategy is used in the Banker's algorithm for dealing with deadlocks?
a) Deadlock ignorance
b) Deadlock avoidance
c) Deadlock detection
d) Deadlock prevention
39)An example of preemptable resources is _____
a) Memory
b) CD-ROM device
c) DVD device
d) None of the mentioned
40)The permanent blocking of a set of processes that compete for system resources is
called _____
a) Starvation
b) Deadlock
c) Prioritization
d) None of the mentioned

Đề bài
41)What is the virtual memory?
a) A part of hard disk.
b) A part of RAM.
c) A part of USB device.
d) A part of ROM BIOS.
42)What method can virtual memory be implemented via?
a) Paging and fragmentation.
b) Paging and segmentation.
c) Fragmentation and defragmentation.
d) Fragmentation and segmentation.
43)File type can be represented by _____
a) file extension
b) file name
c) file identifier
d) None of the mentioned
44)What is the mounting of file system?
a) crating of a filesystem
b) attaching portion of the file system into a directory structure
c) deleting a filesystem
d) removing the portion of the file system into a directory structure
45)Mapping of file is managed by _____
a) file metadata
b) page table
c) virtual memory
d) file system
46)Mapping of network file system protocol to local file system is done by _____
a) network file system
b) local file system
c) volume manager
d) remote mirror
47)_____ are special files with listings of filenames and their attributes.
a) Directories
b) Programs
c) Data files
d) Databases
48)Which part of a HDD disk is used to boot the computer?
a) Super block
b) MBR
c) Root block
d) Free block
49)Which class of I/O devices that HDD belong to?
a) Block devices
b) Character devices
c) Stream devices
d) None of the mentioned
50)Which class of I/O devices that keyboard belong to?
a) Block devices
b) Character devices
c) Stream devices
d) None of the mentioned
51)In the hierarchical structure for managing I/O, which layer is closest to the hardware?
a) Interrupt handlers
b) Device drivers
c) Device-independent OS software
d) None of the mentioned
52)Consider a disk queue with requests for I/O to blocks on cylinders: 98 183 37 122 14
124 65 67. Considering SSTF (shortest seek time first) scheduling, the total number of
head movements is, if the disk head is initially at 53 is?
a) 224
b) 245
c) 240
d) 236
53)What is a trap/exception?
a) software generated interrupt caused by an error
b) hardware generated interrupt caused by an error
c) user generated interrupt caused by an error
d) None of the mentioned
54)Why is the Software interrupt required by the processor?
a) Return from subroutine.
b) Obtain system services, which need execution of privileged instruction.
c) Test the interrupt system of the processor.
d) Implement co-routines.
55)If all page frames are initially empty, and a process is allocated 3 page frames in real
memory and references its pages in the order 1 2 3 2 4 5 2 3 2 4 1 and the page
replacement is FIFO, the total number of page faults caused by the process will be
_____
a) 8
b) 11
c) 9
d) 10
56)Deadlock prevention is a set of methods _____
a) to ensure that all of the necessary conditions do not hold
b) to ensure that at least one of the necessary conditions cannot hold
c) to decide if the requested resources for a process have to be given or not
d) to avoid deadlock
57)Which important things do the Inter-Process Communication (IPC) involve?
a) Race condition, Critical Region, and Mutual Exclusion
b) Race condition, Critical Region, and Dedicated device
c) Domain Problem, Race Condition, and Mutual Exclusion
d) Scheduling, Critical Region, and Dedicated device
58)Which strategy is used in the Banker's algorithm for dealing with deadlocks?
a) Deadlock ignorance
b) Deadlock avoidance
c) Deadlock detection
d) Deadlock prevention
59)An example of preemptable resources is _____
a) Memory
b) CD-ROM device
c) DVD device
d) None of the mentioned
60)The permanent blocking of a set of processes that compete for system resources is
called _____
a) Starvation
b) Deadlock
c) Prioritization
d) None of the mentioned
61)An operating system is a program that operates between users and _____
a) Computer hardware
b) Computer software
c) The application programs
d) CPU
62)What is the register that contains the memory address of the next instruction to be
fetched?
a) Stack pointer
b) Program counter
c) Program status word
d) None of the mentioned
63)To get the default run level, which function is read by init?
a) /etc/inittab
b) /etc/kernel
c) /etc/boot
d) /etc/init
64)The main function of the command interpreter is _____
a) To provide the interface between the API and application program
b) To get an execute the next user-specified command
c) To handle the files in operating system
d) None of the mentioned
65)What is not the major objective of operating systems?
a) To act as a File server to client machines requiring such service
b) To act as a resource manager for multiple tasks running on the CPU, the memory
and disk resources
c) To provide a programming interface to the user
d) To act as an uniform abstract machine on top of a variety of different hardware
platforms
e) To enable loading and execution of binary code with minimum intervention by the
user.
66)What are basic memory address spaces?
a) Logical and virtual address space
b) Logical and physical address space
c) Virtual and physical address space
d) Virtual, logical and physical address space.
67)What is the base register?
a) The base address of the instruction.
b) The smallest unit of RAM.
c) The smallest unit of ROM.
d) The base address of storage devices.
68)Most computers have two modes of operation, these are _____
a) User mode and CPU mode
b) Kernel mode and User mode.
c) Kernel mode and CPU mode
d) MMU mode and CPU mode
69)A process is selected from the _____ queue by the _____ scheduler, to be executed.
a) ready, short term
b) blocked, short term
c) wait, long term
d) ready, long term
70)How many types of schedulers mainly used? Name?
a) 2 types: Large - term scheduler, Small - term scheduler.
b) 3 types: Long - term scheduler, Medium - term scheduler, Short -term
scheduler.
c) 2 types: Long - term scheduler, Short -term scheduler.
d) 3 types: Large - term scheduler, Medium - term scheduler, Small - term scheduler.
71)An entry of the Process table is called _____
a) Process control block
b) Process check block
c) Process management block
d) All of the mentioned
72)Which of the following cannot be shared among different threads of a process?
a) File handles
b) Stack
c) Process code
d) Process data
73)A _____ is a portion of a process that can run independently
a) Thread
b) Program
c) Miniprocess
d) Subprocess
74)Which of the following process state transitions is correct, when the external event for
which a process was waiting happens?
a) Running -> ready
b) Blocked (waiting) -> ready
c) Running -> Blocked (waiting)
d) Ready -> running
75)The new process consists of a copy of the _____ of the original process. This
mechanism allows the parent process to communicate easily with its child process.
a) Address space
b) Process state
c) Process number
d) Process identifiers
76)Using Priority Scheduling algorithm, find the average waiting time for the following
set of processes given with their priorities (0 is the highest priority) in the order:
Process : Burst Time : Priority respectively.
P1 : 10 : 3
P2 : 1 : 1
P3 : 2 : 4
P4 : 1 : 5
P5 : 5 : 2
a) 8 milliseconds
b) 7.75 milliseconds
c) 3 milliseconds
d) 8.2 milliseconds
77)An address space of 8 pages(logical address), each page is 1K in size and mapped
into 32 page frames(physical address) in memory. How many bits must be used to
represent the logical address of this address space?

Offset = 1k = 1024 = 2^10 = log21024


8 = 2^3
logical address = 10 +3 =13

a) 32 bit
b) 8 bit
c) 13 bit
d) 24 bit
78)What is the best description of memory swapping?
a) A computer technology that enables an operating system to extent the storage
space when needed.
b) A computer technology that enables an operating system to provide more
memory to a running application or process than is available in physical
RAM.
c) A computer technology that enables an operating system to provide more storage
space while installing that operating system.
d) A computer technology that enables an operating system to provide more virtual
RAM space while installing that operating system.
79)What are two ways to keep track of memory usages?
a) Bit Maps and Linked Lists.
b) Physical and Virtual Lists.
c) Virtual and Linked Lists.
d) Physical and Linked Lists.
80)What are Dynamic Storage-Allocation strategy?
a) First-fit; Next fit; Best-fit.
b) First-fit; Next fit; Best-fit; Worst-fit.
c) First-fit; Second-fit; Best-fit; Worst-fit.
d) First-fit; Second-fit; Third-fit; Last-fit.

You might also like