Correct Answer Is B)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

Q1. Which of the following is single user, single tasking Operating System.

a) Linux
b) DOS
c) Windows Xp
d) Windows 98
Correct answer is b)

Q2. Linux Operating System was written by

a) Linux Trovald
b) Bill Gates
c) Dennis Ritchie
d) Bill Joy
Correct answer is a)

Q3. Main advantage of Multiprocessor system is

a) Increase throughput
b) Economy of scale
c) Increase reliability
d) All the above
Correct answer is b)

Q4. __________ guarantees that critical task be completed on time.

a) Hard real time


b) Soft real time
c) Both a, b
d) None of them
Correct answer is c)

Q5. UNIX OS supports

a) User Level Thread


b) Kernel Level Thread
c) Both
d) None
Correct answer is c)

Q6. Short term scheduling refers to

a) Job scheduling
b) CPU scheduling
c) Disk scheduling
d) None of the above

Imran Aziz Ahmed ([email protected]) Page - 1 -


Correct answer is b)

Q7. The process of CPU switching to other process is called as ___________ switching

a) Context
b) Process
c) Scheduler
d) Thread
Correct answer is a)

Q8. Which of the scheduling algorithms have best response time?

a) First come first serve


b) Time sharing
c) Shortest job first
d) Priority Algorithm
Correct answer is b)

Q9. The solution to Critical Section problem must satisfy

a) Mutual Exclusion
b) Progress
c) Bounded wait
d) All the above
Correct answer is d)

Q10. Which of them is not necessary condition for deadlock?

a) Mutual Exclusion
b) Preemption
c) Hold and wait
d) Circular wait
Correct answer is b)

Q11. The address generated by CPU is commonly referred as _____________ address

a) Physical
b) Logical
c) Relocatable
d) Absolute
Correct answer is b)
It is also known as „virtual‟ address

Q12. Compaction is the solution to __________

a) Internal Fragmentation

Imran Aziz Ahmed ([email protected]) Page - 2 -


b) External Fragmentation
c) Segmentation
d) Paging
Correct answer is b)

Q13. Virtual memory is separation of user _______ memory from ______ memory.

a) Program, Data
b) Physical, Local
c) Static, Dynamic
d) Physical, Logical
Refer first two pages of “virtual memory” chapter (galvin)

Q14. High Paging activity is called __________.


a) Framing
b) Thrashing
c) Buffering
d) Mapping
Correct answer is b)

Q15.Cycle Stealing can _________ CPU computation.

a) Increase
b) Decrease
c) Will not effect
d) Depends upon degree of programming
Correct answer is a)

Q16. The first block on the disk is

a) Super Block
b) Boot Block
c) Data Block
d) Free Block
Correct answer is b)

Q17. ___________ system call is used to create a file in LINUX

a) create
b) open
c) make
d) cat
Correct answer is a)

Q18. RAID level 3 is also called as ___________

Imran Aziz Ahmed ([email protected]) Page - 3 -


a) Memory style correction code organization
b) Bit-interleaved parity organization
c) Block-interleaved parity organization
d) Block-interleaved distributed parity

Q19. On DOS when you club all the commands into one file, than the file is called as

a) Batch
b) Executable
c) Com
d) Text
Correct answer is a)

Q20. Echo is a

a) External command
b) Internal command
c) Shell command
d) None of the above
Correct answer is b)

Q21. _______________ shell script is always executed when the user log in

a) .bashrc
b) .bashprofile
c) .bashhistroy
d) .gconf
Correct answer is a)

Q22. GRUB is a

a) Operating system
b) Shell script
c) Library routine
d) Boot Loader
Correct answer is d)

Q23. For a shell script ___ gives the number of parameter passed.

a) $#
b) $$
c) $*
d) $@
Correct answer is a)

Q24. _____ used to evaluate an arithmetic expression is shell script.

Imran Aziz Ahmed ([email protected]) Page - 4 -


a) Expr
b) Export
c) Eval
d) Set
Correct answer is a)

Q25. _____ command is used to pass control information to device drivers

a) Open
b) Close
c) Read
d) Ioctl
Correct answer is d)

Q26. The size of /dev/null file is always

a) Zero
b) 1 Block size
c) Infinite
d) 8 Byte

Q27. By default LINUX always opens __________ file

a) stdin
b) stdout
c) stderr
d) All the above
Correct answer is d)

Q28. ls –l commands give ___ column

a) 6
b) 7
c) 8
d) 9

Q29. For debugging a C file in gdb. The C file must be compiled with _____option.

a) c
b) d
c) g
d) b
Correct answer is c)

Q30. _________ is used to create a child process

Imran Aziz Ahmed ([email protected]) Page - 5 -


a) Fork
b) Exec
c) Create
d) Open
Correct answer is a)

Q31. File with permission –r-xr-xr-x can never be

a) Executed
b) Read
c) Write
d) Appended
Correct answer is c)

Q32. Which one is invalid

a) x=`expr $x + 1`
b) x=`expr $x - 1`
c) x=`expr $x * 1`
d) x=`expr $x / 1`
all are valid

Q33 . _________ is used to make a line comment line is shell script

a) #
b) ;
c) //
d) /* Comment */
Correct answer is a)

Q34. On a 32 bit machine size of Integer in C is

a) 2 Byte
b) 4 Byte
c) 6 Byte
d) 8 Byte
Correct answer is b)

Q46. The command to copy 5 lines in vi editor is __________-

a) 5dd
b) 5cc
c) 5yy
d) None of the above.
Correct answer is c)

Imran Aziz Ahmed ([email protected]) Page - 6 -


Q47. Variables defined in parent shell are accessible is child shell if they are

a) Imported
b) Exported
c) Forked
d) Global
Correct answer is b)

Q48. The file descriptor associated with stdin is

a) 0
b) 1
c) 2
d) 3
Correct answer is a)

Q49. To run the job is background on a Linux system we use

a) $
b) ..
c) ~
d) &
Correct answer is d)

Q50. Which of the environment variable stores the LINUX prompt.

a) HOME
b) LOGNAME
c) PS1
d) PS2
Correct answer is c)

1) Instructions of a program are executed when it is in the _____ state.

1) wait
2) new
3) ready
4) all of the above
5) none of the above
Answer 5

2) The FCFS CPU scheduling policy can be conveniently implemented using the
following data structure:

1) LIFO-stack
2) Binary tree

Imran Aziz Ahmed ([email protected]) Page - 7 -


3) Directed acylic graph
4) Queue
5) None of the above
Answer 4

3) LINUX uses _________________________ mechanism.

1) Deadlock prevention by providing process termination


2) Banker’s algorithm for deadlock avoidance
3) Deadlock prevention by providing resource pre-emption
4) All of the above
5) None of the above
Answer 5

4) The memory management scheme used by 8085 microprocessor


is _______________________.

1) Paging (using the higher order address bus lines A9 to A16)


2) Segmentation (using B-C and H-L register pairs to hold
information related to number of segments and base address
of each segment)
3) Both paging as well as segmentation
4) None of the above
Answer 4

5) ______________________ is the time for the disk arm to move the


heads to the cylinder containing the desired sector.

1) Turn-around time
2) Rotational latency
3) Seek time
4) None of the above
Answer 3

6) FAT in the context of file systems expands to __________________.

1) File Access Tree


2) File Access Table
3) File Allocation Table
4) None of the above
Answer 3

7) Linux uses _________________ type of directory structures.

1) single level
2) two level

Imran Aziz Ahmed ([email protected]) Page - 8 -


3) tree structured
4) all of the above
5) none of the above
Answer 3

8) Which of the following statements are TRUE with respect to DMA


(Direct Memory Access)?

a) Requires a DMA Controller (hardware device)


b) Requires a DMA Controller (simulated by system software)
c) Used to avoid Programmed I/O for large data movement
d) Bypasses CPU to transfer data directly between I/O
device and memory

1) a) and b)
2) a), c) and d)
3) a), b) and d)
4) all are true
5) all are un-true
Answer 2

9) “Programs, users and systems should be given just enough


privileges to perform their tasks”. This principle is more
popularly known as _____________________________.

1) Principle of least privilege


2) Banker’s principle for allocation of permissions
3) Belady’s algorithm for granting permissions
4) None of the above
Answer 1

10) The Segment-Table-Length-Register (STLR) specifies ______________.

1) Size of a segment in memory


2) Base address of a segment in memory
3) Size of a segment in the virtual address space
4) Base address of a segment in the virtual address space
5) None of the above
Answer 5

11) Potential security violation is known as __________________.

1) Attack
2) Virus
3) Threat
4) Theft

Imran Aziz Ahmed ([email protected]) Page - 9 -


5) None of the above
Answer 3

12) EIDE, ATA, SATA, USB, Fibre Channel, SCSI are ____________.

1) Memory buses
2) I/O buses
3) Host controllers
4) Disk drivers
5) All of the above
Answer 2

13) One of the main objectives of Disk Scheduling is to _________.

1) Minimize seek time


2) Minimize turn around time
3) Maximize through-put
4) Maximize rotational latency
5) All of the above
Answer 1

14) Which of the following statements are TRUE with respect to an I/O
request that is issued by a process?

a) Whether the operation is input or output


b) What the disk address for the transfer is
c) What the memory address for the transfer is
d) What the number of sectors to be transferred is

1. a) and b)
2. a), c) and d)
3. a), b) and d)
4. all are true
5. all are un-true
Answer 4

15) The Elevator Algorithm for disk scheduling is based on ______.

1) SSTF (Shortest Seek Time First)


2) SCAN
3) First Come First Serve (FCFS)
4) LOOK
Answer 2

16) The ability of an Operating System to execute different parts of a


program simultaneously is known as _______________________.

Imran Aziz Ahmed ([email protected]) Page - 10 -


1) Multi-tasking
2) Multi-programming
3) Multi-threading
4) Multi-scheduling
Answer 3

17) Maximize CPU utilization, maximize system throughput, minimize turnaround


time and minimize waiting time are the main objectives
of ________________________.

1) Paging
2) Segmentation
3) Both paging as well as segmentation
4) None of the above
Answer 4

18) Pre-emptive type of Shortest-Job-First (SJF) scheduling is also


known as ________________________________.

1) Shortest Remaining Time First


2) First Come First Serve
3) Priority Scheduling
4) Quantum based scheduling
Answer 1

19) Incase of race conditions, the outcome of the execution depends


on _______________________________________.

1) the critical section


2) the sequence in which the access takes place
3) CPU Scheduling
4) proper synchronization mechanisms
5) None of the above
Answer 2

20) The four conditions for deadlocks to occur are given


by ______________________________________________.

1) mutual exclusion ; hold and wait ;


pre-emption ; circular wait
2) mutual exclusion ; hold and wait ;
no pre-emption ; circular wait
3) mutual exclusion ; hold and release ;
pre-emption ; circular wait
4) mutual exclusion ; hold and release ;

Imran Aziz Ahmed ([email protected]) Page - 11 -


no pre-emption ; circular wait
Answer 1

21) A pair of base and limit registers define the __________________.

1) logical address space


2) physical address space
3) both logical as well as physical address space
4) None of the above
Answer 1

22) First-fit and best-fit algorithms for dynamic memory allocation


are _________________ than worst-fit in terms of storage utilization
and speed.

1) worst
2) better
3) neither worst nor best
4) below average level
Answer 2

23) A vi editor can be stored as ____________________________.

1) shared pages
2) segmented pages
3) both shared pages as well as segmented pages
4) all of the above
Answer 4

24) The LRU (Least Recently Used) algorithm for page replacement can
be implemented using __________________.

1) clocks and counters


2) FIFO queue
3) De-queue
4) None of the above
Answer 1

25) The objectives of Demand Paging are ______________________.

1) less I/O is needed


2) less memory is needed
3) faster response
4) more users
5) all of the above
Answer 5

Imran Aziz Ahmed ([email protected]) Page - 12 -


Fill in the blanks:

1) A situation where several processes access and manipulate the


same data concurrently is known as
_______________________________.
Correct answer is RACE CONDITION
2) If a shell script called run is executed as:
./run a b 1 2 c d 3 4 e f
then, echo $10 in the shell script will print ______________.
Correct answer is a0
3) The L1 cache is present in the __________________.
Correct answer is CPU/PROCESSOR/MICRO-PROCESSOR
4) Auto-completion of Linux commands can be achieved by hitting the
___________ key.
Correct answer is TAB
5) The Segment-Table-Length-Register (STLR) specifies
_______________________.
Correct answer is NUMBER OF SEGMENTS USED BY A PROGRAM/PROCESS
6) A pipe in a shell is similar to a _______________ amplifier in
electronics.
Correct answer is CASCADE
7) The page-replacement policy used by Windows O.S. is __________.
Correct answer is LRU [LEAST RECENTLY USED]
8) REWIND, RESET, READ, TAR, LOCATE, are operations usually carried
out on ___________________.
Correct answer is TAPE DRIVES
9) HOME, UID, PATH, DISPLAY, are ___________________ variables.
Correct answer is ENVIRONMENT

10) _________________ Operating Systems are used in Air Traffic


Control.
Correct answer is REAL TIME
11) Processes on the same computer system can communicate with
each other using ______________ memory.
Correct answer is SHARED
12) Run-time allocation of memory for a program is done from the
___________.
Correct answer is HEAP

State whether the following statements are true or false:

1) Multiprogramming decreases CPU utilization. FALSE

Imran Aziz Ahmed ([email protected]) Page - 13 -


2) One of the objectives of CPU scheduling is to maximize the
turnaround time. FALSE
3) Threads do not share the Instruction Pointer register. TRUE
4) A non-preemptive scheduler runs when the process blocks
because of an I/O operation. TRUE
5) Shortest-remaining-time-first is also known as non- preemptive
type of SJF policy. FALSE
6) The shell scripting language DOES NOT type-cast its variables.
TRUE

7) The DOWN operation of a semaphore is implemented as follows:


P(S) { while S <= 0; // no-op
S++;}
FALSE

8) The init process will always have a process id of 1. TRUE


9) The P and V operations related to semaphores need not be
indivisible. FALSE
10) The logical address is the one that is loaded into the
memory address register of the memory. FALSE
11) The worst-fit algorithm is better in terms of speed and
storage utilization as compared to first-fit technique. FALSE
12) Compared to a disk, a tape is less expensive and holds more
data, but random access is much slower. TRUE
13) Using FTP, one can even access e-mail. TRUE
14) WINE (WINdows Emulator) program in Linux is used to integrate
Windows and Linux/UNIX. FALSE
15) vi editor commands are case insensitive. FALSE
16) init-login-getty-shell is the sequence of execution of
processes in a typical UNIX system. FALSE
17) All user jobs by default are started in the background.
FALSE

Pick up the correct alternative(s) for each of the following


questions:

1) The FCFS scheduling policy can be conveniently implemented using


the following data structure:
a) LIFO-stack
b) Binary tree
c) Directed acylic graph
d) Circular queue
e) None of the above

3) UNIX uses _________________________ mechanism.


a) Deadlock prevention
b) Deadlock avoidance
c) Deadlock detection and recovery
d) All of the above
e) None of the above

4) Access mode 644 specifies ______________________.


a) rw-r-----
b) rw-r--r--
c) rw----r--

Imran Aziz Ahmed ([email protected]) Page - 14 -


d) none of the above

5) ______________________ is the time for the disk arm to move the


heads to the cylinder containing the desired sector.
a) Turn-around time
b) Rotational latency
c) Seek time
d) None of the above

6) The two options provided by BASH for debugging are


_______________.
a) –g and –x
b) –g and –v
c) –v and –x
d) –o and -g

What Linux commands are used to achieve the following:

1. Change the priority of a process


nice/renice

2. Search for a particular pattern in a set of files


grep

3. Display lines at the top of a file


head

4. Display information on file contents


file

5. Display the hostname


hostname
echo $HOSTNAME

6. Broadcast a common message to a set of users


wall
What do the following acronyms stand for?

1. FAT FILE ALLOCATION TABLE


2. DNS DOMAIN NAME SERVICE
3. AFS ANDREW FILE SYSTEM
4. CIFS COMMON INTERNET FILE SYSTEM
5. ACL ACCESS CONTROL LIST
6. USB UNIVERSAL SERIAL BUS

Imran Aziz Ahmed ([email protected]) Page - 15 -

You might also like