You are on page 1of 1

1. Which of the following page replacement algorithm suffers form beladys anomaly?

(a) LRU
(b) optimal replacement
(c) FIFO & LRU
(d) FIFO
2. The size of virtual memory depends on
(a) the size of the data bus
(b) the size of the main memory
(c) the size of the address bus
(d) the size of secondary memory
3. A process refers to 5 pages A,B,C,D,E in the following order A,B,C,D,A,B,E,A,B,C,D,E. if the page replacement
algorithm is FIFO, the number of Page transfer with an empty internal store of 3 frames is
(a) 10
(b) 8
(c) 7
(d) 9
4.

is a technique to solve the problems of external fragmentation


(a) paging
(b) swapping
(c) segmentation
(d) loading

5. Which of the following is well suited for a time shared OS?


(a) elevator
(b) SJF
(c) round robin
(d) FCFS
6.

scheduler determines which jobs are brought into memory for processing.
(a) short term
(b) long term
(c) thread
(d) medium term

7. Which of the following is not maskable


(a) RST7.5
(b) RST 5.5
(c) TRAP
(d) RST 6.5
8. The transfer schedule of tape is
(a) asynchronous
(b) random
(c) synchronous
(d) sequential
9.

is an example for storage device


(a) mouse
(b) tape
(c) modem
(d) network card

10. The kernel module that controls a device is a


(a) device controller
(b) device driver
(c) bus
(d) device
11. A disk queue with requests for I/O to blocks on cylinders. 98, 183, 37, 122, 14, 124, 65, 67 in that order. If the disk
is initially at cylinder 53.In SCAN scheduling
cylinder is served first
(a) 122
(b) 183
(c) 37
(d) 98
12. Before a disk can store data it must be divided into sectors that the disk controller can read /write. This process
is called
formatting
(a) low level
(b) physical
(c) logical
(d) low level or physical
13. The extension sh indicates

file type.

(a) batch
(b) Text
(c) object
(d) class
14. Wild card specifiers
(a) can be used when writing a file
(b) provide an easy way of finding groups of related files
(c) allow several files to be read simultaneously
(d) are only used when printing the contents of files
15. Disadvantage of single level directory is
(a) the confusion of files names between users
(b) the confusion of neither file name nor file data
(c) the confusion of both file names & file data
(d) the confusion of files data
16. Let N= surfaces, C=cylinders, K=sectors per track .Then N*K*C represents total number of
(a) surfaces
(b) cylinders
(c) sectors
(d) tracks
17. Pick the odd man out
(a) semaphore
(b) tape drive
(c) CPU
(d) memory segment
18. Audit log can not be used to
(a) determine how the problem occurred
(b) determine when the problem occurred
(c) find the name of the owner
(d) what amount of damage was done
19. The most common approach to authenticating a user identity is
(a) hardware device
(b) user log in
(c) user log in & hardware device
(d) user passwords
20. Malicious access are
(a) authorized modification of data
(b) authorized reading of data
(c) unauthorized reading of data
(d) authorized destruction of data

on a disk

You might also like