Professional Documents
Culture Documents
Rushali Patil
TE Comp A
2.8 The extension file that is must for a file to be a. .OBJ file II A
accepted by the LINK as a valid object file is b. .EXE file
c. .MASM file
d. DEBUG file
2.9 Binder performs the functions of a. allocation II D
b. relocation
c. linking
d. All of these
2.10 Resolution of externally defined symbols is a. Linker II A
performed by b. Loader
c. Compiler
d. Editor
2.11 Relocatable programs a. cannot be used with fixed II B
partitions
b. can be loaded almost
anywhere in memory
c. do not need a linker
d. can be loaded only at one
specific location
2.12 Static memory allocation is typically performed a. compilation II A
during _____________ b. execution
c. loading
d. linking
2.13 Loading process can be divided into two separate a. Linkage editor II B
programs, to solve some problems. The first is b. Module Loader
binder the other is? c. Relocator
d. None of these
2.14 What is a macro? a. a small program inside a II C
program
b. set of special instructions
c. a unit of specification for
program generation through
expansion
d. None of the above
2.15 A macro definition consists of a. A macro prototype II D
statement
b. One or more model
statements
c. Macro pre-processor
statements
d. All of the above
2.16 The translator which perform macro expansion is a. Macro processor II C
called a b. Macro pre-processor
c. Micro pre-processor
d. assembler
2.17 A _______ statement declare the name of macro. a. macro prototype II A
b. macro definition
c. macro identification
d. None of the above
2.18 During macro expansion each statement is replaced a. the original program II B
by b. the sequence of assembly
statement
c. by specific symbols
d. None of the above
2.19 Each macro statement is marked with the a. + II A
__________ sign preceded it. b. @
c. ~
d. $
2.20 The flow control during macro expansion is a. combination II D
b. chronological
c. indexable
d. sequential
2.21 A model statement contains call for another macro a. referential macro call II B
is called as b. nested macro call
c. inbuilt macro call
d. inherited macro call
2.22 Expansion time variables are used a. Before expansion of micro II B
calls
b. only during expansion of
macro calls
c. After expansion of micro
calls
d. Any one of the above
2.23 Macro processor is an inbuilt function of? a. Loader II D
b. Editor
c. Linker
d. Assembler
2.24 The time required for execution of a macro is ……… a. greater than II B
that of procedure. b. less than
c. equal to
d. none of the mentioned
2.25 Which of the following statements is incorrect? a. complete code of II C
instruction string is inserted
at each place, wherever the
macroname appears
b. macro requires less time of
execution than that of
procedure
c. macro uses stack memory
d. macro name can be
anything except registers and
mnemonics
2.26 The beginning of the macro can be represented as a. START II C
b. BEGIN
c. MACRO
d. none of the mentioned
2.27 Nested Macro calls are expanded using the a. FIFO rule (First in first out) II B
b. LIFO (Last in First out)
c. FILO rule (First in last out)
d. None of the above
2.28 What are x and y in the following macro definition? a. variables II C
macro Add x, y Load y Mul x Store y Mend b. identifiers
c. formal parameters
d. actual parameters
2.29 The conditional expansion facility of macro a. to expand certain model II C
processor is provided to statements depending upon
the value of a condition
during the execution of the
expanded program
b. test a condition during the
execution of the expanded
program
c. Both (a) and (b)
d. to expand certain model
statements depending upon
the value of a condition
during the process of macro
expansion.
2.30 Relocation bits used by relocating loader are a. linker II A
specified by b. assembler
c. macro processor
d. relocating loader itself
2.31 Which of the following system program forgoes the a. Linker II D
production of object code to generate absolute b. Macroprocessor
machine code and load it into the physical main c. Two pass assembler
storage location from which it will be executed d. Load-and-go-assembler
immediately
3.43 Indicate which of the following is not true about a. Interpreter generate an III D
interpreter? object program from the
source program
b. Interpreter analyses each
source statement every time
it is to be executed
c. Interpreter is a kind of
translator
d. All of above
3.44 When is the type checking usually done? a. Syntax directed translation III B
b. Lexical analysis
c. Code optimization
d. Syntax Analysis
3.45 Which of the following is a phase of a compilation a. Lexical analysis III C
process? b. Code generation
c. Both (a) and (b)
d. None of these
3.46 Uniform symbol table a. contains all constants in III B
the program
b. a permanent table which
lists all key words and special
symbols of the language in
symbolic form.
c. is a permanent table of
decision rules in the form of
patterns for matching with
the uniform symbol table to
discover syntactic structure.
d. consists of full or partial
list of the token's as they
appear in the program
created by Lexical analysis
and used for syntax analysis
and interpretation.
3.47 A programmer, by mistake, writes an instruction to a. compiler III D
divide, instead of a multiply, such error can be b. interpreter
detected by a/an c. compiler or interpreter test
d. None of these
3.48 The identification of common sub-expression and a. constant folding III A
replacement of run-time computations by compile- b. data flow analysis
time computations is c. loop optimization
d. local optimization
3.49 Generation of intermediate code based on a a. it enhances the portability III A
abstract machine model is useful in compilers of the front end of the
because compiler
b. it makes implementation
of lexical analysis and syntax
analysis easier
c. syntax directed
translations can be written
for intermediate code
generation
d. it is not possible to
generate code for real
machines directly from high
level language programs
3.50 A language L allows declaration of arrays whose a. a compiler using dynamic III A
sizes are not known during compilation. It is memory allocation can be
required to make efficient use of memory. Which written for L
one of the following is true? b. a compiler cannot be
written for L ; an interpreter
must be used
c. a compiler using static
memory allocation can be
written for L
d. none of these
4.22 Which page is selected by the Optimal Page a. The page that has been IV D
Replacement Algorithm? used for maximum.
b. The page that has been
used minimum.
c. The page that has not been
used for the longest time in
the past.
d. The page that will not be
used for the longest time in
the future.
4.23 Which of the following is / are the essential a. Page frame number IV A
contents in each entry of a page table? b. Virtual page number
c. Access right information
d. Both page frame number
and virtual page number
4.24 Which of the following statements is not true for a. Deadlock avoidance is less IV B
the deadlock prevention and deadlock avoidance restrictive than deadlock
schemes? prevention.
b. In deadlock prevention,
the request for resources is
always granted, if the
resulting state is safe.
c. It is the priority to have the
knowledge of resource
requirements for deadlock
avoidance.
d. In deadlock avoidance, the
request for resources is
always granted, if the
resulting state is safe.
4.25 Consider a uniprocessor computer system that has a. Round Robin scheduling IV A
2 processes and both of them alternate 10ms CPU with a time quantum of 5ms
bursts with 90ms I / O bursts. Both the processes b. First Come First Served
were created at nearly the same time and can scheduling
proceed in parallel. What is the scheduling strategy c. Shortest remaining time
for this system that will result in the least CPU first
utilization (over a long period of time)? d. Static priority scheduling
with different priorities for
the two processes
4.26 A system has 'm' number of resources of same type a. m = 15 IV C
and 3 processes A, B, C. Share these resources A, B, b. m = 8
C which have the peak demand of 3, 4 and 6 c. m = 13
respectively. Deadlock will not occur if the value of d. m = 9
'm' is __________.
Process
P0
P1
P2
5.7 The minimum number of page frames that must be a. the instruction set V A
allocated to a running process in a virtual memory architecture
environment is determined by b. page size
c. physical memory size
d. number of processes in
memory
5.8 In a system with 32 bit virtual addresses and 1 KB a. the large amount of V C
page size, use of one-level page tables for virtual to internal fragmentation
physical address translation is not practical because b. the large amount of
of external fragmentation
c. the large memory
overhead in maintaining page
tables
d. the large computation
overhead in the translation
process
5.9 Let the page fault service time be 10ms in a a. 21ns V B
computer with average memory access time being b. 30ns
20ns. If one page fault is generated for every 10^6 c. 23ns
memory accesses, what is the effective access time d. 35ns
for the memory?
5.10 A multilevel page table is preferred in comparison a. It reduces the memory V B
to a single level page table for translating virtual access time to read or write a
address to physical address because memory location.
b. It helps to reduce the size
of page table needed to
implement the virtual
address space of a process.
c. It is required by the
translation lookaside buffer.
d. It helps to reduce the
number of page faults in
page replacement
algorithms.
5.11 A virtual memory system uses First In First Out a. Both P and Q are true, and V B
(FIFO) page replacement policy and allocates a fixed Q is the reason for P
number of frames to a process. Consider the b. Both P and Q are true, but
following statements: Q is not the reason for P.
P: Increasing the number of page frames allocated c. P is false, but Q is true
to a process sometimes increases the page fault d. Both P and Q are false.
rate.
Q: Some programs do not exhibit locality of
reference. Which one of the following is TRUE?
6.1 Using a larger block size in a fixed block size file a. better disk throughput but VI A
system leads to poorer disk space utilization
b. better disk throughput and
better disk space utilization
c. poorer disk throughput but
better disk space utilization
d. poorer disk throughput
and poorer disk space
utilization
6.2 An application loads 100 libraries at startup. a. 0.50s VI B
Loading each library requires exactly one disk b. 1.50s
access. The seek time of the disk to a random c. 1.25s
location is given as 10ms. Rotational speed of disk is d. 1.00s
6000rpm. If all 100 libraries are loaded from
random locations on the disk, how long does it take
to load all libraries? (The time to transfer data from
the disk block once the head has been positioned at
the start of the block may be neglected)
6.16 When device A has a cable that plugs into device B, a. port VI B
and device B has a cable that plugs into device C b. daisy chain
and device C plugs into a port on the computer, this c. bus
arrangement is called a _________ d. cable
6.28 In the _______ algorithm, the disk head moves from a. LOOK VI C
one end to the other, servicing requests along the b. SCAN
way. When the head reaches the other end, it c. C-SCAN
immediately returns to the beginning of the disk d. C-LOOK
without servicing any requests on the return trip.
6.29 In the ______ algorithm, the disk arm goes as far as a. LOOK VI A
the final request in each direction, then reverses b. SCAN
direction immediately without going to the end of c. C-SCAN
the disk. d. C-LOOK
6.30 In SCSI disks used in high end PCs, the controller a. destroyed blocks, high VI C
maintains a list of _________ on the disk. The disk is level formatting
initialized during ________ formatting which sets b. bad blocks, partitioning
aside spare sectors not visible to the operating c. bad blocks, low level
system. formatting
d. destroyed blocks,
partitioning
6.31 An unrecoverable error is known as ________ a. hard error VI A
b. tough error
c. soft error
d. none of the mentioned
6.32 The two steps the operating system takes to use a a. partitioning & logical VI A
disk to hold its files are _______ and _____ formatting
b. swap space creation &
caching
c. caching & logical
formatting
d. logical formatting & swap
space creation
6.33 The header and trailer of a sector contain a. main section & disk VI B
information used by the disk controller such as identifier
_________ and _____ b. error correcting codes
(ECC) & sector number
c. sector number & main
section
d. disk identifier & sector
number
6.34 The data structure for a sector typically contains a. header VI D
_____ b. data area
c. trailer
d. all of the mentioned
6.35 The process of dividing a disk into sectors that the a. partitioning VI C
disk controller can read and write, before a disk can b. swap space creation
store data is known as ________ c. low-level formatting
d. none of the mentioned
6.36 Access matrix model for user authentication a. a list of objects VI D
contains _____ b. a list of domains
c. a function which returns an
object’s type
d. all of the mentioned
6.37 In UNIX, domain switch is accomplished via ______ a. file system VI A
b. user
c. superuser
d. none of the mentioned
6.38 Which principle states that programs, users and a. principle of operating VI B
even the systems be given just enough privileges to system
perform their task? b. principle of least privilege
c. principle of process
scheduling
d. none of the mentioned
6.39 _____ is an approach to restricting system access to a. Role-based access control VI A
authorized users. b. Process-based access
control
c. Job-based access control
d. None of the mentioned
6.40 For system protection, a process should access a. all the resources VI B
_____ b. only those resources for
which it has authorization
c. few resources but
authorization is not required
d. all of the mentioned
6.41 WORM stands for _______ a. write only, read mandatory VI B
b. write once, read many
times
c. write only once, read
multiple
d. none of the mentioned
6.42 ____ is a unique tag, usually a number identifies the a. File identifier VI A
file within the file system. b. File name
c. File type
d. None of the mentioned
6.43 What is the mounting of file system? a. creating of a filesystem VI C
b. deleting a filesystem
c. attaching portion of the file
system into a directory
structure
d. removing the portion of
the file system into a
directory structure
6.44 Which one of the following explains the sequential a. random access according VI B
file access method? to the given byte number
b. read bytes one at a time,
in order
c. read/write sequentially by
record
d. read/write randomly by
record
6.45 When will file system fragmentation occur? a. unused space or single file VI A
are not contiguous
b. used space is not
contiguous
c. unused space is non-
contiguous
d. multiple files are non-
contiguous
6.46 What is raw disk? a. disk without file system VI A
b. empty disk
c. disk lacking logical file
system
d. disk having file system
6.47 What will happens when a process closes the file? a. per-process table entry is VI B
not removed
b. system wide entry’s open
count is decremented
c. all of the mentioned
d. none of the mentioned
6.48 The operating system keeps a small table containing a. system table VI B
information about all open files called ____ b. open-file table
c. file table
d. directory table
6.49 Which of the following are the two parts of the file a. name & identifier VI C
name? b. identifier & type
c. extension & name
d. type & extension
6.50 In UNIX, what will the open system call return? a. pointer to the entry in the VI A
open file table
b. pointer to the entry in the
system wide table
c. a file to the process calling
it
d. none of the mentioned