Professional Documents
Culture Documents
Memory management
9. What is compaction?
a) a technique for overcoming internal fragmentation
b) a paging technique
c) a technique for overcoming external fragmentation
d) a technique for overcoming fatal error
Answer: c
Explanation: None.
21. Which of the following page replacement algorithms suffers from Belady’s
anomaly?
(A) FIFO
(B) LRU
(C) Optimal Page Replacement
(D) Both LRU and FIFO
Answer: (A)
Answer: (B)
24. A CPU generates 32-bit virtual addresses. The page size is 4 KB. The
processor has a translation look-aside buffer (TLB) which can hold a total of
128 page table entries and is 4-way set associative. The minimum size of the
TLB tag is:
(A) 11 bits
(B) 13 bits
(C) 15 bits
(D) 20 bits
Answer: (C)
25. A CPU generates 32-bit virtual addresses. The page size is 4 KB. The
processor has a translation look-aside buffer (TLB) which can hold a total of
128 page table entries and is 4-way set associative. The minimum size of the
TLB tag is:
(A) 11 bits
(B) 13 bits
(C) 15 bits
(D) 20 bits
Answer: (C)
Explanation: When there is more RAM, there would be more mapped virtual
pages in physical memory, hence fewer page faults. A page fault causes
performance degradation as the page has to be loaded from a secondary
device.
29. CPU fetches the instruction from memory according to the value of
____________
a) program counter
b) status register
c) instruction register
d) program status word
Answer: a
Answer: a
Answer: a
32. If a page number is not found in the TLB, then it is known as a ____________
a) TLB miss
b) Buffer miss
c) TLB hit
d) All of the mentioned
Answer: a
33. An ______ uniquely identifies processes and is used to provide address space
protection for that process.
a) address space locator
b) address space identifier
c) address process identifier
d) none of the mentioned
Answer: b
34. The percentage of times a page number is found in the TLB is known as
____________
a) miss ratio
b) hit ratio
c) miss percent
d) none of the mentioned
Answer: b
Answer: d
36. When the valid – invalid bit is set to valid, it means that the associated page
____________
a) is in the TLB
b) has data in it
c) is in the process’s logical address space
d) is the system’s physical address space
Answer: c
Answer: c
38. When there is a large logical address space, the best way of paging would be
____________
a) not to page
b) a two level paging algorithm
c) the page table itself
d) all of the mentioned
Answer: b
39. In a paged memory, the page hit ratio is 0.35. The required to access a page
in secondary memory is equal to 100 ns. The time required to access a page
in primary memory is 10 ns. The average time required to access a page is?
a) 3.0 ns
b) 68.0 ns
c) 68.5 ns
d) 78.5 ns
Answer: c
40. To obtain better memory utilization, dynamic loading is used. With dynamic
loading, a routine is not loaded until it is called. For implementing dynamic
loading ____________
a) special support from hardware is required
b) special support from operating system is essential
c) special support from both hardware and operating system is essential
d) user programs can implement dynamic loading without any special
support from hardware or operating system
Answer: d
Answer: A
Answer: C
44. The strategies like the first fit, best fit and worst fit are used to select a
________.
A. process from a queue to put in storage
B. process from a queue to put in memory
C. processor to run the next process
D. free hole from a set of available holes
Answer: D
45. Suppose a machine in which all memory reference instructions have only
one memory address, How many frame(s) do we need?
A. three
B. two
C. one
D. none
Answer: B
Answer: C
47. The number of ________ can be granted by the Owner of address space.
A. Computers
B. Modules
C. Pages
D. Devices
Answer: C
Answer: D
49. Which of the following options is true for virtual to physical address run-time
mapping?
A. CPU
B. Operating system
C. memory management unit
D. PCI
Answer: C
Answer: b
51. The operating system and the other processes are protected from being
modified by an already
running process because ____________
a) they are in different memory spaces
b) they are in different logical addresses
c) they have a protection algorithm
d) every address generated by the CPU is being checked against the
relocation and limit registers
Answer: d
Answer: a
Answer: a
Answer: b
Answer: a
Answer: a
58. The disadvantage of moving all process to one end of memory and all holes
to the other direction,
producing one large hole of available memory is ____________
a) the cost incurred
b) the memory used
c) the CPU used
d) all of the mentioned
Answer: a
Answer: a
Answer: a
Answer: d
Answer: b
63. When the memory allocated to a process is slightly larger than the process,
then ____________
a) internal fragmentation occurs
b) external fragmentation occurs
c) both internal and external fragmentation occurs
d) neither internal nor external fragmentation occurs
Answer: a
Answer: d
Answer: d
Answer: d
Answer: a
68. If binding is done at assembly or load time, then the process _____ be moved
to different locations after being swapped out and in again.
a) can
b) must
c) can never
d) may
Answer: c
Answer: a
71. If one or more devices use a common set of wires to communicate with the
computer system, the connection is called ______
a) CPU
b) Monitor
c) Wirefull
d) Bus
Answer: d
Answer: d
73. The _________ determines the cause of the interrupt, performs the necessary
processing and executes a return from the interrupt instruction to return the
CPU to the execution state prior to the interrupt.
a) interrupt request line
b) device driver
c) interrupt handler
d) all of the mentioned
Answer: c
74. The CPU hardware has a wire called __________ that the CPU senses after
executing every instruction.
a) interrupt request line
b) interrupt bus
c) interrupt receive line
d) interrupt sense line
View Answer
Answer: a
75. A ____ a set of wires and a rigidly defined protocol that specifies a set of
messages that can be sent on the wires.
a) port
b) node
c) bus
d) none of the mentioned
Answer: c
Answer: a
77. The _________ are reserved for events such as unrecoverable memory errors.
a) non maskable interrupts
b) blocked interrupts
c) maskable interrupts
d) none of the mentioned
Answer: a
78. An I/O port typically consists of four registers status, control, ________ and
________ registers.
a) system in, system out
b) data in, data out
c) flow in, flow out
d) input, output
Answer: b