Operating System (OS) QUESTIONS AND ANSWERS

Slides:



Advertisements
Similar presentations
Computer-System Structures Er.Harsimran Singh
Advertisements

More on Processes Chapter 3. Process image _the physical representation of a process in the OS _an address space consisting of code, data and stack segments.
Chapter 3 Process Description and Control
Basic Operating System Concepts
Chapter 10 Operating Systems.
Review: Chapters 1 – Chapter 1: OS is a layer between user and hardware to make life easier for user and use hardware efficiently Control program.
CMPT 300: Final Review Chapters 8 – Memory Management: Ch. 8, 9 Address spaces Logical (virtual): generated by the CPU Physical: seen by the memory.
Dr Mohamed Menacer College of Computer Science and Engineering Taibah University CS-334: Computer.
Operating System. Main goal of OS: –Run programs efficiently –Make the computer easier to use Provide a user-friendly interface –Improve the efficiency.
CMPT 300: Operating Systems Review THIS REIVEW SHOULD NOT BE USED AS PREDICTORS OF THE ACTUAL QUESTIONS APPEARING ON THE FINAL EXAM.
CMPT 300: Final Review Chapters 8 – Memory Management: Ch. 8, 9 Address spaces Logical (virtual): generated by the CPU Physical: seen by the memory.
Chapter 11 Operating Systems
Device Management.
Computer Organization and Architecture
1 Operating Systems Ch An Overview. Architecture of Computer Hardware and Systems Software Irv Englander, John Wiley, Bare Bones Computer.
CS364 CH08 Operating System Support TECH Computer Science Operating System Overview Scheduling Memory Management Pentium II and PowerPC Memory Management.
Layers and Views of a Computer System Operating System Services Program creation Program execution Access to I/O devices Controlled access to files System.
Operating System A program that controls the execution of application programs An interface between applications and hardware 1.
General What is an OS? What do you get when you buy an OS? What does the OS do? What are the parts of an OS? What is the kernel? What is a device.
1 I/O Management and Disk Scheduling Chapter Categories of I/O Devices Human readable Used to communicate with the user Printers Video display terminals.
Chapter 5 Operating System Support. Outline Operating system - Objective and function - types of OS Scheduling - Long term scheduling - Medium term scheduling.
Recall: Three I/O Methods Synchronous: Wait for I/O operation to complete. Asynchronous: Post I/O request and switch to other work. DMA (Direct Memory.
Lecture 3 Process Concepts. What is a Process? A process is the dynamic execution context of an executing program. Several processes may run concurrently,
Computers Operating System Essentials. Operating Systems PROGRAM HARDWARE OPERATING SYSTEM.
30 October Agenda for Today Introduction and purpose of the course Introduction and purpose of the course Organization of a computer system Organization.
Mid Term review CSC345.
OPERATING SYSTEMS - I. What is an Operating System OS is a program that manages the computer hardware It provides a basis for application programs and.
1 Computer Systems II Introduction to Processes. 2 First Two Major Computer System Evolution Steps Led to the idea of multiprogramming (multiple concurrent.
1 Rutgers UniversityCS 416: Operating Systems Final exam details December 22, pm-3pm. Venue: SEC 118. Tips: Spend time reading the questions before.
CSE 153 Design of Operating Systems Winter 2015 Midterm Review.
What is an Operating System? Various systems and their pros and cons –E.g. multi-tasking vs. Batch OS definitions –Resource allocator –Control program.
CSCI/CMPE 4334 Operating Systems Review: Exam 1 1.
lecture 5: CPU Scheduling
Chapter 2: Computer-System Structures(Hardware)
Chapter 2: Computer-System Structures
Processes and threads.
Operating System Interview Question and Answers
EEE Embedded Systems Design Process in Operating Systems 서강대학교 전자공학과
William Stallings Computer Organization and Architecture
Operating System I/O System Monday, August 11, 2008.
Section 10: Last section! Final review.
Intro to Processes CSSE 332 Operating Systems
Mass-Storage Structure
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 2: Computer-System Structures Computer System Operation I/O Structure Storage.
Lecture 45 Syed Mansoor Sarwar
Process management Information maintained by OS for process management
Chapter 9: Virtual-Memory Management
Chapter 6: CPU Scheduling
Chapter 15 – Part 1 The Internal Operating System
Operating Systems.
Computer-System Architecture
Module 2: Computer-System Structures
So far…. Firmware identifies hardware devices present
Selecting a Disk-Scheduling Algorithm
Mid Term review CSC345.
Operating Systems.
Process Description and Control
Chapter 10 Operating Systems.
Operating Systems Lecture 1.
Module 2: Computer-System Structures
February 5, 2004 Adrienne Noble
Chapter 2 Processes and Threads 2.1 Processes 2.2 Threads
Chapter 2 Operating System Overview
Chapter 2: Computer-System Structures
Chapter 2: Computer-System Structures
Module 2: Computer-System Structures
Module 2: Computer-System Structures
CSE 153 Design of Operating Systems Winter 2019
COMP755 Advanced Operating Systems
Presentation transcript:

Operating System (OS) QUESTIONS AND ANSWERS

Which of the following can be said about a segmentation fault caused when a process is active? It will recover from the fault transparently to the user, by moving the required page from the secondary memory The fault’s cause may most likely be an error in programming It will not abruptly terminate the process and a core image of the process will be saved for further observations It will cause the process to go into the ‘blocked’ state It will most likely be caused by a hardware fault. A common programming construct for implementing mutual exclusion which uses condition variables is called Suppose requests have recently arrived for data on cylinders 25, 46, 12, and 3, in that order, and that the read-write head is currently at cylinder 20. If the disk scheduling policy is SSTF, the outstanding requests will be serviced in the order (a) Semaphore (b) Deadlock (c) Monitor (d) Locking interrupts (e) Threads. (a) 25, 46, 12, 3 (b) 25, 46, 3, 12 (c) 3, 12, 25, 46 (d) 25, 12, 3, 46 (e) 12,3,25,46. DMA stands for Direct Management access (c) Dual memory access (e) Dual memory array. (b) Direct memory access (d) Data memory access

Which of the following disk-scheduling methods is most likely to lead to starvation for requests on inner or outer cylinders? FCFS (b) SSTF (c) SCAN (d) C-SCAN (e) b-SCAN. Which of the following is in correct order of size, smallest first? (a) Cylinder, track, sector (b) Cylinder, sector, track (c) (e) Sector, track, cylinder Track, cylinder, sector. (d) Sector, cylinder, track process that executes a READ instruction for a data record currently on disk will undergo a process state transition from Ready to blocked (b)Running to blocked (c) Blocked to ready (d) Blocked to running (e) Terminated. In a certain system, process A has just arrived at time 0, process B at time 3, and process C at time 6. A needs 5 seconds in the CPU, B 3 seconds, and C 1 second. All processes are totally CPU-bound and process-switching time is negligible, so that after 9 seconds all processes have completed. At what time does process B complete if the process-scheduling algorithm is preemptive SJF and the quantum is 1 second? (a) 6 (b) 7 (c) 8 (d) 9 (e) 10. If the value of a binary semaphore S is 0, and a process executes a WAIT instruction on S, then S will remain zero and the process will proceed S will remain zero and the process will be placed on a queue S will become one and the process will proceed S will become one and the process will be placed on a queue S will become -1 and the process will not be placed on a queue.

The process of collecting fragments of available memory space into contiguous blocks by moving programs and data in a computer's memory or disk is known as Compaction (b) Coalescing (c) Segmentation (d) Fragmentation (e) Paging. Which of the following controls all the computer resources and provides the base upon which the application programs can be written? Which of the following system call loads a process into memory? Load (b) Create (c) Fork (d) Execv (e) Copy. Expand the term UNICS Uniplexed Information Computing System Unipoint Information Computing System Uniplexed Instruction Computing System Unipoint Instruction Computing System Union Instruction Common System. Which of the following software layer is used between the kernel and the user computations in the network O.S? Which of the following allows many users to share the computer simultaneously? (a) Application Software (b) C.P.U (c) Operating System (d) Bare Hardware (e) Device Drivers. (a) Local O.S (b) Network O.S (c) Global O.S (d) Distributed O.S (e) Remote O.S. (a) Time Sharing O.S (b) Real Time O.S (c) Interactive O.S (d) Batch O.S (e) Network O.S.

If a program is under execution by CPU then we say the process is under Each process is represented in the operating system by its own Thread (b) PCB (c) State (d) Instructions (e) PCC. The amount of time that a job waits in a ready queue for getting selected by CPU is called Turnaround time (b) Waiting time (c) Completion time (d) Submission time (e) Throughput. The process of storing and restoring from PCB is called Which of the following memory management scheme loads all pages of a program from disk into main memory? (a) CPU Burst (b) Process (c) I/O Burst (d) Ready Queue (e) New State. (a) Loading (b) Relocation (c) Dispatcher (d) Process (e) context switch. (a) Paging (b) Demand paging (c) (e) Segmentation Demand segmentation. (d) Segmentation with paging Which of the following page replacement algorithm use the technique of replace that page which is not used in the near future? LRU (b) LFU (c) ORA (d) FIFO (e) MFU. The set of pages that a process is currently using is called as (a) Program (b) Page Group (c) Working Group (d) Working Set (e) None of the above.

Which of the following registers contains starting address of the program in the main memory? The process of converting logical address into physical address is known as (a) Address register (b) Base register (c) GPR (d) Index register (e) Limit register. (a) Conversion (b) Displacement (d) Transfer (c) Relocation (e) None of the above. In a segmentation scheme the logical memory will be divided into Pages (b) Frames (c) Blocks (d) Cells (e) Segments. Which of the following area is used to store the O.S programs in the main memory? In Unix which of the following system calls returns the meta data about a file? fstat (b) mstat (c) Metacall (d) Sigabort (e) fork. Information in the file is processed in order, one record after another. This mode of access is called . Relative (b) Sequential (c) Direct (d) Index (e) Indexed- sequential. Which of the technique is used to recover the process from starvation situation? Paging (b) Aging (c) Compaction (d) Starvation (e) Reduction. Before we store data into a disk, it must be divided into sectors and from where the disk controller can read and write. This is known as_ _. (a) User memory area (b) Monitor memory area (c) Heap area (d) Stack area (e) Data area. (a) Low-level formatting (b) Fragmenting (c) High-level formatting (d) Cleaning (e) Portioning a disk.

51.The disk controller can be told to replace each bad sector logically with one of the spare sectors in the disk. This scheme is known as _. (a) Sector sparing (d) Back word replacing (b) Sector slipping (c) Forwarding (e) Sector replace. Controlling the access of programs, processes or users to the resources defined by the system is known as . The _________ are reserved for events such as unrecoverable memory errors. a)nonmaskable interrupts b) blocked interrupts c) maskable interrupts d) None of these Which of the following mechanism is used to achieve concurrency control? Every process before starting execution should know what resources are allocated to it. This is known as The ability to execute an operation on an object is known as The time required to move the disk head to the desired track is known as (a) Prevention (b) Security (c) Protection (d) Access stop (e) Access right. (a) Clusters (b) Triggers (c) Control access (d) Cursors (e) Locks. (a) Know-to-need (b) Need-to-Know (c) Know about what (d) Need-to-use (e) Know-to-use. (a) Access Right (b) Access Control (c) Domain Knowledge (d) Control Right (e) Protection. (a) Access Time (b) Track Time (c) Latency Time (d) Seek Time (e) Block Time.

58. distributed system is a collection of processors that do not share . CPU (b) Memory (c) I/O devices (d) Network (e) File. The name of the file does not reveal any hint of the file’s physical storage location is called_ _. Location independence (b) Protection (c) Location transparency (d) File migration (e) Inter-machine interface. Software entity running on one or more machines and providing a particular type of function to a priori unknown clients is called . Client (b) Server (c) Service (d) Process (e) None of the above.

Thanks…