Professional Documents
Culture Documents
MC0070-Operating Systems With Unix Model Question Paper
MC0070-Operating Systems With Unix Model Question Paper
Marks: 140
D) Operating System
9. ______________is responsible for allocating primary memory to processes and for assisting
the programmer in loading and storing the contents of the primary memory.
A) Operating system
B) Memory manager
C) Database administrator
D) RAM
10. ______________ refers to the technology in which some space in hard disk is used as an
extension of main memory.
A) Cache memory
B) Paging
C) Virtual memory
D) Associative memory
11. ______________ selects a process from among the ready processes to execute on the
CPU.
A) CPU Scheduler
B) Loader
C) Dispatcher
D) Compiler
12. The time taken by the Dispatcher to stop one process and start another running is known as
_________________.
A) Turnaround time
B) Dispatch Latency
C) Access time
D) Response time
13. When resources have multiple instances ________ is used for deadlock Avoidance.
A) Bankers algorithm
B) Resource Allocation Graph
C) semaphores
D) all of these
14. ______________ is a situation in which two computer programs sharing the same resource
are effectively preventing each other from accessing the resource, resulting in both programs
ceasing to function.
A) Semaphore
B) Deadlock
C) Mutual Exclusion
D) No preemption
15. _______________occurs when two or more execution flows are able to run simultaneously.
a) Deadlock
b) Concurrency
c) race condition
d) interrupt
16.______________ occurs when multiple processes or threads read and write data items so that
the final result depends on the order of execution of instructions in the multiple processes.
a) Race condition
b) Mutual exclusion
c) Exception
d) Interrupt
17. In Multics, a process could have up to 256K segments, but each segment was limited to
__________________ 64K words.
A) 64K
B) 32K
C) 1024K
D)112K
18.The problem with logical dumping is ________________
A) very costly
B) very slow
C) human errors
D) all of these
19. Because the I/O devices are not synchronized with the CPU, some information must be
exchanged between the CPU and the device to ensure that the data is received reliably. This
interaction between the CPU and an I/O device is usually referred to as ____________
A) polling
B) arbitration
C) handshaking
D) interrupting
20. ____________approach can place the data directly into the memory or take the data directly
from the memory without direct intervention from the processor.
A) DMA
B) Daisy chain arbitration
C) polling
D) none of these
21. ____________ file system allows sharing in multiple different locations grouped under one
folder.
A) Direct
B) distributed
C) sequential
D) parallel
22. Windows 2000 supports -------------- type of file system
A) NTFS
B) EFS
C) FEFS
D) EFFS
23. In___________, the requesting device or devices assert the signal bus_request.
A) Priority encoded arbitration
B) Distributed arbitration by self-selection
C) Priority arbitration
D) Daisy chain arbitration
24. SRM stands for
A) Security Resource Manager
B) Secret Resource Manager
C) Security Reference Monitor
D) The manual entry is called a man page, even though it is often more than one page long.
33. Which one of the following statements is true?
A) The cat command cares which file it receives as input or where the input goes.
B) Relative pathnames begin with something other than the slash character
C) UNIX shells never remember their current working directory (CWD).
D) The cat command interprets -X as an option character rather than a pathname.
34. When copying more than one file at a time, you must specify an existing directory as the
___________
A) Source
B) Sub directory
C) Destination.
D) Path name
35. The find command is different from most UNIX commands in that each of the
argument expressions following the beginning path name is considered a
_____________
A) action expression
B) Boolean expression.
C) Boolean constant
D) Search qualifiers
36. One of the wonderful things about UNIX is its ___________names.
A) Unlimited path
B) Unlimited directory
C) Limited path
D) Limited file
37. RPN stands for
A) Reverse Polish Notation
B) Record Police Notation
C) Record Polish Notation
D) Reverse Police Negation
38. The usual su command syntax is
A) su-pwd
B) su-pd
C) su - userID
D) Sue- ID
39. ___________variable is not automatically created on all UNIX systems but is used by so
many programs that it is considered a standard environment variable.
A) IFS
B) MAIL
C) TERM
D) PATH
40.Choose the correct statement from the following.
A) In computer terminology, variables are symbols which stand for some value.
B) An alternative method for executing the commands in the file backup is to make the file as
directory.
C) The restricted shell gives more control to the system administrator and restricts the options of
the user.
D) The decision making done by computer programs is in the form of conditional execution.
A) an inode
B) an inumber
C) an imap
D) an imark
50. A SCSI device can transfer up to----------- of information per second.
A) 40 Mbytes
B) 60 Mbytes
C) 40 Gbytes
D) 60 Gbytes
51. The controller can access memory in memory cycles which are not used by the particular
bank of memory into which the DMA controller is writing data. This approach, called _________
A) interrupting
B) cycle stealing
C) swapping
D) paging
52. The two sub systems of user mode layer of windows 2000 are _________ and __________
A) excel, executive
B) environment, integral
C) orbit , kernel
D) Kernel , executive
53. A standard UNIX system includes a set of ___________ and a set of ___________.
A) Commands ,files
B) Libraries, Applications
C) Libraries, files
D) Files, Applications
54. Ext2 is the standard file system of _______ and uses a block size of_____bytes
A) MS DOS,8K
B) Linux ,1024
C)Linux, 512
D)Unix, 512
55. An orphan process is automatically inherited by the _____and becomes a
_______ of this process.
A) 'init' process, father
B) 'init' process, child
C) 'initial process, father
D) 'it' process, child
56. An option commonly takes the form of a _____followed by __________characters.
A) dot, one or more
B) dash, only one
C) dash, one or more
D) dot,only two
57. Which of the following statements are true?
i.
ii.
iii.
To change your umask, enter mask and a two digit number that specifies your new
umask.
iv.
Named pipes enable you to communicate with a running program by reference to a file.
A) ii and iii
B) ii and iv
C) i and iv
D) i and iii
58.One reason why UNIX is so flexible is that each program is automatically assigned three
standard files. They are
A) The standard input file, the standard output file, and the standard error file.
B) The backup file, the standard output file, and the standard error file.
C) The standard input file, the standard output file, and the standard hidden file.
D) The standard input file, the standard search file, and the standard error file.
59. The id command reports four things. They are
A) The user ID number, login name, login password, and group name of the person who
invokes it.
B) The user password, login name, single ID number, and names of the persons who
invokes it.
C) The user password, login name, path number, and name of the person who
invokes it.
D) The user ID number, login name, group ID number, and group name of the person who
invokes it.
60. Which of the following statements are true?
i. Normally, a looping construct executes all the commands between the do statement and
the done statement.
ii. In most higher level programming languages, variables are typed, meaning that they are
not restricted to certain kinds of data, such as numbers or characters.
iii. A program can get data in two ways: either it is passed to the program when it is executed
as arguments, or the program gets data interactively.
iv. Using the echo command in your program, you can determine whether a file exists,
whether it can be written to, and several other conditions.
A) i and iv
B) iii and iv
C) i, ii and iii
D) i and iii
2. Library system
3. secondary storage
4.
Main memory
i. Bell Labs
b) MPI
ii. CPU
c) gCore
A) 1-3 -4 -2
B) 1-4-2-3
C) 3-2-4-1
D) 2-4-1-3
65. Match the following
1. pipes
2. livelock
ii) WNOHANG
3. Killing Zombies
4. argument
66. The introduction of mutual exclusion can prevent race conditions but can lead to problems
such as________________
A) deadlock
B) starvation
C) both a) and b)
D) none of these
i. polled I/O
2.
3.
DMA
2. IPC manager
3. PNP manager
4. Window manager
2-iv, 3- i, 4-iii
b) Operating system
c) Unix commands
d) Novell
i. FIFO
b) renice command
c) child process
d) semaphore
iv. zombie
i. version of C shell
b) tcsh
c) eof
d) TERM
When you copy a file into a directory, cp creates the new file with the different name.
b.
The name cat derives from the word gatecate, which means to connect in a series or to
link together.
c.
UNIX is a multiuser operating system, which means that you share the system with
other users.
d.
74. State whether the following statements are True (T) or False (F)
a. The ls command can also accept a filename as a command line parameter.
b. When a file is created, the path can inadvertently acquire printable numbers.
c. The -size n expression is a good example of a search criterion that is evaluated
numerically.
d.
A program that takes standard file and creates standard input is sometimes called a
filter.
A) a-T,b-T,c-F,d-F
B) a-F,b-F,c-T,d-T
C) a-T,b-F,c-F,d-T
D )a-T,b-F,c-T,d-F
75. Match the following
a) getty program
i. Default value is $.
b) PS1
c) PS2
d) Shell variables
Answer Keys
Part - A
Q. No.
Ans. Key
Part - B
Q. No.
Ans. Key
Q. No.
Ans. Key
Part - C
Q. No.
Ans. Key
1 A
21 B
41 A
61 A
2 D
22 A
42 B
62 D
3 B
23 D
43 B
63 C
4 A
24 C
44 A
64 B
5 A
25 C
45 B
65 B
6 B
26 B
46 C
66 C
7 B
27 C
47 A
67 A
8 D
28 D
48 C
68 B
9 B
29 A
49 B
69 B
10 C
30 C
50 A
70 D
11 A
31 B
51 B
71 D
12 B
32 C
52 B
72 C
13 A
33 B
53 B
73 D
14 B
34 C
54 B
74 D
15 B
35 B
55 B
75 C
16 A
36 A
56 C
17 A
37 A
57 C
18 B
38 C
58 A
19 C
39 C
59 D
20 A
40 C
60 D