You are on page 1of 3

Higher Technological Institute (HTI)

Department of Computer Science


Academic Year 2022-2023 Term: Second Term
Exam Midterm Time: 40 Min.
Subject Operating Systems Code: CSC 222
Examiners Dr. Yasser Fouad - Dr. Basel Hafiz Model: 1

Choose the best answer – Each question deserves one degree:

1. The operating system


a- Can operate in either the user mode or the kernel mode. c- Must have a graphical-user interface.
b- Must not use the computer hardware in an efficient manner. d- Has three modes of operation.
2. The non-volatile memory
a- Loses its information upon entering the standby mode. c- Loses its information upon power outage.
b- Preserves its information upon power outage. d- None of the above.
3. The cache memory
a- Has a faster access compared to the main memory. c- Is nonvolatile.
b- Does not have a connection with the hard disk. d- None of the above.
4. The users of the operating system
a- Must be aware of all the details of the operating system. c- Includes other computers.
b- Should modify the programming of the operating system. d- All the above.
5. The device controller
a- Manages the corresponding device. c- Is a hardware element.
b- Must have some means of communication with the operating system. d- All the above.
6. The disk surface is divided into
a- Folders and files. c- Sectors and tracks.
b- Files and directories. d- Bits and bytes.
7. The multiprogramming includes
a- Job scheduling. c- Dispensing the cache memory.
b- Increasing the memory capacity. d- None of the above
8. The device driver
a- Shouldn’t be installed for proper operation. c- Is a hardware element.
b- Communicates with the user. d- None of the above.
9. The concept of caching is
a- Making a copy of the information in another memory with a higher capacity.
b- Making a copy of the information in another memory with a faster access.
c- Making a copy of the information in the hard disk.
d- Deleting the information.
10. The application programs
a- Cannot be considered part of the operating system. c- May be launched by mouse click.
b- Can be run by the user. d- All of the above.
11. The virtualization
a- Does not require a complier. c- Includes developing applications for multiple operating systems.
b- Uses virtual-machine manager. d- All the above.
12. In asymmetric multiprocessing,
a- Each processor is concerned with a specific task. c- Each processor is concerned with all tasks.
b- Each processor must enter the sleep mode for a certain time interval. d- None of the above.

Page 1|3
Higher Technological Institute (HTI)
Department of Computer Science
Academic Year 2022-2023 Term: Second Term
Exam Midterm Time: 40 Min.
Subject Operating Systems Code: CSC 222
Examiners Dr. Yasser Fouad - Dr. Basel Hafiz Model: 1

13.In the nonuniform-memory access,


a- Each processor has a communication with all memory units.
b- Each processor has a communication with all the other processors.
c- Each processor must be connected with an interconnect.
d- All the above.
14. The program counter is a register that
a- Stores the code of the current instruction. c- Stores the address of the code of the next instruction.
b- Stores the code of the next instruction. d- Stores the address of the code of the current instruction.

15. The hard disk


a- Has a faster access compared to the main memory. c- Has a lower capacity compared to the main memory.
b- Does not have a connection with the operating system. d- None of the above.

16. The process is


a- An active entity. c- Part of the system codes.
b- A passive entity. d- The same as the program.
17. The main memory
a- Has a faster access compared to the hard disk. c- Does not have a connection with the hard disk.
b- Is nonvolatile. d- None of the above.
18. The user interface
a- Includes the command-line interpreter. c- Must be programmed by the user.
b- Does not communicate with the operating system. d- All the above.
19. The program that is running all the time on the computer is
a- The kernel. c- The middleware.
b- The application program. d- None of the above.
20. A trap is
a- A request by the user to the device to perform an operation. c- A hardware-generated interrupt.
b- A software-generated interrupt. d- None of the above.
21. The operating system must be able to
a- Load the user program into memory. c- Identify the abnormal operation of the user program.
b- Execute the user program. d- All the above.
22. The access time of the memory is
a- The time required to read or write the data in the memory.
b- The time required by the data bus to load the data in the memory.
c- The time required by the operating system to identify the errors in the read data.
d- None of the above.
23. Caching makes the access process
a- Slower. c- Safer.
b- Cheaper. d- None of the above.
24. The throughput is
a- The amount of data used by the operating system. c- The power consumed by the hardware.
b- The amount of work completed in a unit of time. d- All the above.

Page 2|3
Higher Technological Institute (HTI)
Department of Computer Science
Academic Year 2022-2023 Term: Second Term
Exam Midterm Time: 40 Min.
Subject Operating Systems Code: CSC 222
Examiners Dr. Yasser Fouad - Dr. Basel Hafiz Model: 1

25. The computer resources include


a- The memory.
b- The CPU.
c- The input and output devices.
d- All the above.
26. The application programs include
a- Word processors.
b- Web browsers.
c- Database systems.
d- All the above.
27. The interrupt vector
a- Determines the interrupted device.
b- Identifies the required service.
c- Includes the addresses of all the service routines.
d- None of the above.
28. The system call
a- Is a request to the operating system.
b- Is a request to the main memory.
c- Is a request to an input device.
d- Is a request to an output device.
29. Direct memory access is the
a- Direct transfer of information between the input/output devices and memory.
b- Direct transfer of information between the main memory and the hard disk.
c- Direct transfer of information between the cache memory and the main memory.
d- Direct transfer of information between the processor and the input/output devices.
30. A computer can address more memory than the amount physically installed on the system. This extra
memory is called cache memory.
a- True b- False

With our best wishes.

Page 3|3

You might also like