Professional Documents
Culture Documents
The initial program that is run when the computer is powered up is called :
a. boot program
b. bootloader
c. initializer
d. bootstrap program
Answer: (d).bootstrap program
d. None of these
4. What is an ISR ?
d. None of these
d. Both a and c
Answer: (d).Both a and c
7. In a memory mapped input/output :
a. the CPU uses polling to watch the control bit constantly, looping to see if device is ready
b. the CPU writes one data byte to the data register and sets a bit in control register to show that a byte is
available
c. the CPU receives an interrupt when the device is ready for the next byte
Answer: (b).the CPU writes one data byte to the data register and sets a bit in control register to show that a byte is
available
8. In a programmed input/output(PIO) :
a. the CPU uses polling to watch the control bit constantly, looping to see if device is ready
b. the CPU writes one data byte to the data register and sets a bit in control register to show that a byte is
available
c. the CPU receives an interrupt when the device is ready for the next byte
Answer: (a).the CPU uses polling to watch the control bit constantly, looping to see if device is ready
a. the CPU uses polling to watch the control bit constantly, looping to see if device is ready
b. the CPU writes one data byte to the data register and sets a bit in control register to show that a byte is
available
c. the CPU receives an interrupt when the device is ready for the next byte
Answer: (c).the CPU receives an interrupt when the device is ready for the next byte
10. In the layered approach of Operating Systems :
d. Both b and c
Answer: (d).Both b and c
11. How does the Hardware trigger an interrupt ?
c. Once done handling, bringing back the system to the original state it was before the interrupt occurred
d. All of these
Answer: (d).All of these
13. Why is the Software interrupt required by the processor?
d. Implement co-routines.
a. a – 2, b – 1, c – 3, d - 4
b. a – 4, b – 1, c – 3, d - 2
c. a – 2, b – 3, c – 1, d - 4
d. a – 3, b – 4, c – 2, d - 1
c. FS (File System)
17. If one or more devices use a common set of wires to communicate with the computer system, the connection is
called ______
a. CPU
b. Monitor
c. Wirefull
d. Bus
Answer: (d).Bus
18. A ____ a set of wires and a rigidly defined protocol that specifies a set of messages that can be sent on the wires.
a. port
b. node
c. bus
d. none of the mentioned
Answer: (c).bus
19. When device A has a cable that plugs into device B, and device B has a cable that plugs into device C and device
C plugs into a port on the computer, this arrangement is called a _________
a. port
b. daisy chain
c. bus
d. cable
Answer: (b).daisy chain
20. The _________ present a uniform device-access interface to the I/O subsystem, much as system calls provide a
standard interface between the application and the operating system.
a. Devices
b. Buses
c. Device drivers
d. I/O systems
Answer: (c).Device drivers
a. controller
b. driver
c. host
d. bus
Answer: (a).controller
22. An I/O port typically consists of four registers status, control, ________ and ________ registers.
d. input, output
a. flow in
b. flow out
c. data in
d. data out
Answer: (c).data in
a. status
b. control
c. data in
d. data out
Answer: (d).data out
25. The hardware mechanism that allows a device to notify the CPU is called _______
a. polling
b. interrupt
c. driver
d. controlling
Answer: (b).interrupt
26. The CPU hardware has a wire called __________ that the CPU senses after executing every instruction.
b. interrupt bus
b. device driver
c. interrupt handler
Answer: (c).interrupt handler
a. nonmaskable interrupts
b. blocked interrupts
c. maskable interrupts
Answer: (a).nonmaskable interrupts
30. The ________ can be turned off by the CPU before the execution of critical instruction sequences that must not
be interrupted.
a. nonmaskable interrupt
b. blocked interrupt
c. maskable interrupt
Answer:nonmaskable interrupts
a. nonmaskable interrupt
b. blocked interrupt
c. maskable interrupt
a. the interrupts
33. Division by zero, accessing a protected or non existent memory address, or attempting to execute a privileged
instruction from user mode are all categorized as ________
a. errors
b. exceptions
c. interrupt handlers
d. all of the mentioned
Answer: (b).exceptions
a. dma
b. programmed I/O
c. controller register
Answer: (a).dma
a. block stream
b. set of blocks
c. character stream
Answer: (c).character stream
39. In polling :
a. busy – wait cycles wait for I/O from device
d. is too slow
a. same as
44. Caching :
a. holds a copy of the data
b. is fast memory
45. Spooling :
b. is fast memory
46. The ________ keeps state information about the use of I/O components.
a. CPU
b. OS
c. kernel
d. shell
a. process table
a. message – passing
b. draft – passing
c. secondary memory
d. cache
Answer: (a).message – passing
49. A ________ is a full duplex connection between a device driver and a user level process.
a. Bus
b. I/O operation
c. Stream
d. Flow
Answer: (c).Stream
a. major factor
b. minor factor
c. does not matter
Answer: (a).major factor
51
If the number of cycles spent busy – waiting is not excessive, then :
.