Professional Documents
Culture Documents
(a) LRU
(b) optimal replacement
(c) FIFO & LRU
(d) FIFO
2. The size of virtual memory depends on
(a) the size of the data bus
(b) the size of the main memory
(c) the size of the address bus
(d) the size of secondary memory
3. A process refers to 5 pages A,B,C,D,E in the following order A,B,C,D,A,B,E,A,B,C,D,E. if the page replacement
algorithm is FIFO, the number of Page transfer with an empty internal store of 3 frames is
(a) 10
(b) 8
(c) 7
(d) 9
4.
scheduler determines which jobs are brought into memory for processing.
(a) short term
(b) long term
(c) thread
(d) medium term
file type.
(a) batch
(b) Text
(c) object
(d) class
14. Wild card specifiers
(a) can be used when writing a file
(b) provide an easy way of finding groups of related files
(c) allow several files to be read simultaneously
(d) are only used when printing the contents of files
15. Disadvantage of single level directory is
(a) the confusion of files names between users
(b) the confusion of neither file name nor file data
(c) the confusion of both file names & file data
(d) the confusion of files data
16. Let N= surfaces, C=cylinders, K=sectors per track .Then N*K*C represents total number of
(a) surfaces
(b) cylinders
(c) sectors
(d) tracks
17. Pick the odd man out
(a) semaphore
(b) tape drive
(c) CPU
(d) memory segment
18. Audit log can not be used to
(a) determine how the problem occurred
(b) determine when the problem occurred
(c) find the name of the owner
(d) what amount of damage was done
19. The most common approach to authenticating a user identity is
(a) hardware device
(b) user log in
(c) user log in & hardware device
(d) user passwords
20. Malicious access are
(a) authorized modification of data
(b) authorized reading of data
(c) unauthorized reading of data
(d) authorized destruction of data
on a disk