McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Master of Science in Computer Science (MSc CS) .
51. |
Process are classified into different groups in |
A. | shortest job scheduling algorithm |
B. | round robin scheduling algorithm |
C. | priority scheduling algorithm |
D. | multilevel queue scheduling algorithm |
Answer» D. multilevel queue scheduling algorithm |
52. |
In multilevel feedback scheduling algorithm |
A. | a process can move to a different classified ready queue |
B. | classification of ready queue is permanent |
C. | processes are not classified into groups |
D. | none of the mentioned |
Answer» A. a process can move to a different classified ready queue |
53. |
Which one of the following can not be scheduled by the kernel? |
A. | kernel level thread |
B. | user level thread |
C. | process |
D. | none of the mentioned |
Answer» B. user level thread |
54. |
What is the reusable resource? |
A. | that can be used by one process at a time and is not depleted by that use |
B. | that can be used by more than one process at a time |
C. | that can be shared between various threads |
D. | none of the mentioned |
Answer» A. that can be used by one process at a time and is not depleted by that use |
55. |
Which of the following condition is required for deadlock to be possible? |
A. | mutual exclusion |
B. | a process may hold allocated resources while awaiting assignment of other resources |
C. | no resource can be forcibly removed from a process holding it |
D. | all of the mentioned |
Answer» D. all of the mentioned |
56. |
A system is in the safe state if |
A. | the system can allocate resources to each process in some order and still avoid a deadlock |
B. | there exist a safe sequence |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» C. both (a) and (b) |
57. |
The circular wait condition can be prevented by |
A. | defining a linear ordering of resource types |
B. | using thread |
C. | using pipes |
D. | all of the mentioned |
Answer» A. defining a linear ordering of resource types |
58. |
Which one of the following is the deadlock avoidance algorithm? |
A. | banker’s algorithm |
B. | round-robin algorithm |
C. | elevator algorithm |
D. | karn’s algorithm |
Answer» A. banker’s algorithm |
59. |
What is the drawback of banker’s algorithm? |
A. | in advance processes rarely know that how much resource they will need |
B. | the number of processes changes as time progresses |
C. | resource once available can disappear |
D. | all of the mentioned |
Answer» D. all of the mentioned |
60. |
For effective operating system, when to check for deadlock? |
A. | every time a resource request is made |
B. | at fixed time intervals |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» C. both (a) and (b) |
61. |
A problem encountered in multitasking when a process is perpetually denied necessary resources is called |
A. | deadlock |
B. | starvation |
C. | inversion |
D. | aging |
Answer» B. starvation |
62. |
Which one of the following is a visual ( mathematical ) way to determine the deadlock occurrence? |
A. | resource allocation graph |
B. | starvation graph |
C. | inversion graph |
D. | none of the mentioned |
Answer» A. resource allocation graph |
63. |
To avoid deadlock |
A. | there must be a fixed number of resources to allocate |
B. | resource allocation must be done only once |
C. | all deadlocked processes must be aborted |
D. | inversion technique can be used |
Answer» A. there must be a fixed number of resources to allocate |
64. |
CPU fetches the instruction from memory according to the value of |
A. | program counter |
B. | status register |
C. | instruction register |
D. | program status word |
Answer» A. program counter |
65. |
A memory buffer used to accommodate a speed differential is called |
A. | stack pointer |
B. | cache |
C. | accumulator |
D. | disk buffer |
Answer» B. cache |
66. |
Which one of the following is the address generated by CPU? |
A. | physical address |
B. | absolute address |
C. | logical address |
D. | none of the mentioned |
Answer» C. logical address |
67. |
Run time mapping from virtual to physical address is done by |
A. | memory management unit |
B. | cpu |
C. | pci |
D. | none of the mentioned |
Answer» A. memory management unit |
68. |
Memory management technique in which system stores and retrieves data from secondary storage for use in main memory is called |
A. | fragmentation |
B. | paging |
C. | mapping |
D. | none of the mentioned |
Answer» B. paging |
69. |
The address of a page table in memory is pointed by |
A. | stack pointer |
B. | page table base register |
C. | page register |
D. | program counter |
Answer» B. page table base register |
70. |
Program always deals with |
A. | logical address |
B. | absolute address |
C. | physical address |
D. | relative address |
Answer» A. logical address |
71. |
The page table contains |
A. | base address of each page in physical memory |
B. | page offset |
C. | page size |
D. | none of the mentioned |
Answer» A. base address of each page in physical memory |
72. |
What is compaction? |
A. | a technique for overcoming internal fragmentation |
B. | a paging technique |
C. | a technique for overcoming external fragmentation |
D. | a technique for overcoming fatal error |
Answer» C. a technique for overcoming external fragmentation |
73. |
Operating System maintains the page table for |
A. | each process |
B. | each thread |
C. | each instruction |
D. | each address |
Answer» A. each process |
74. |
In segmentation, each address is specified by : |
A. | a segment number |
B. | an offset |
C. | a value |
D. | a key |
Answer» B. an offset |
75. |
In paging the user provides only ________, which is partitioned by the hardware into ________ and ______. |
A. | one address, page number, offset |
B. | one offset, page number, address |
C. | page number, offset, address |
D. | none of these |
Answer» A. one address, page number, offset |
76. |
Each entry in a segment table has a : |
A. | segment base |
B. | segment peak |
C. | segment limit |
D. | segment value |
Answer» C. segment limit |
77. |
The segment base contains the : |
A. | starting logical address of the process |
B. | starting physical address of the segment in memory |
C. | segment length |
D. | none of these |
Answer» B. starting physical address of the segment in memory |
78. |
The segment limit contains the : |
A. | starting logical address of the process |
B. | starting physical address of the segment in memory |
C. | segment length |
D. | none of these |
Answer» C. segment length |
79. |
The offset ‘d’ of the logical address must be : |
A. | greater than segment limit |
B. | between 0 and segment limit |
C. | between 0 and the segment number |
D. | greater than the segment number |
Answer» B. between 0 and segment limit |
80. |
If the offset is legal : |
A. | it is used as a physical memory address itself |
B. | it is subtracted from the segment base to produce the physical memory address |
C. | it is added to the segment base to produce the physical memory address |
D. | none of these |
Answer» A. it is used as a physical memory address itself |
81. |
When the entries in the segment tables of two different processes point to the same physical location : |
A. | the segments are invalid |
B. | the processes get blocked |
C. | segments are shared |
D. | all of these |
Answer» C. segments are shared |
82. |
The protection bit is 0/1 based on : (choose all that apply) |
A. | write only |
B. | read only |
C. | read – write |
D. | none of these |
Answer» C. read – write |
83. |
If there are 32 segments, each of size 1Kb, then the logical address should have : |
A. | 13 bits |
B. | 14 bits |
C. | 15 bits |
D. | 16 bits |
Answer» A. 13 bits |
84. |
It uses a direct mapping scheme for cache management. How many different main memory blocks can map onto a given physical cache block ? |
A. | 2048 |
B. | 256 |
C. | 64 |
D. | 8 |
Answer» C. 64 |
85. |
A multilevel page table is preferred in comparison to a single level page table for translating virtual address to physical address because : |
A. | it reduces the memory access time to read or write a memory location |
B. | it helps to reduce the size of page table needed to implement the virtual address space of a process |
C. | it is required by the translation look aside buffer |
D. | it helps to reduce the number of page faults in page replacement algorithms |
Answer» B. it helps to reduce the size of page table needed to implement the virtual address space of a process |
86. |
The three general methods for delivering content from a server to a client across a network are : |
A. | unicasting |
B. | duplex-casting |
C. | broadcasting |
D. | multicasting |
Answer» D. multicasting |
87. |
Unicasting delivers the content to : |
A. | a single client |
B. | all clients, regardless whether they want the content or not |
C. | a group of receivers who indicate they wish to receive the content |
D. | none of these |
Answer» A. a single client |
88. |
Broadcasting delivers the content to : |
A. | a single client |
B. | all clients, regardless whether they want the content or not |
C. | a group of receivers who indicate they wish to receive the content |
D. | none of these |
Answer» B. all clients, regardless whether they want the content or not |
89. |
Multicasting delivers the content to : |
A. | a single client |
B. | all clients, regardless whether they want the content or not |
C. | a group of receivers who indicate they wish to receive the content |
D. | none of these |
Answer» C. a group of receivers who indicate they wish to receive the content |
90. |
RTSP stands for : |
A. | real time streaming policy |
B. | real time streaming protocol |
C. | real time systems protocol |
D. | read time streaming policy |
Answer» B. real time streaming protocol |
91. |
HTTP is __________. (choose two) |
A. | a stateful protocol |
B. | a stateless protocol |
C. | a protocol that maintains the status of its connection with the client |
D. | a protocol that does not maintain the status of its connection with the client |
Answer» D. a protocol that does not maintain the status of its connection with the client |
92. |
In the SETUP state : |
A. | the server is setup |
B. | the client is setup |
C. | the server allocates resources for the client session |
D. | the client sends requests to the server |
Answer» C. the server allocates resources for the client session |
93. |
In the TEARDOWN state : |
A. | the server breaks down the connection and releases the resources allocated for the session |
B. | the client breaks down the connection and releases the resources allocated for the session |
C. | the system crashes |
D. | none of these |
Answer» A. the server breaks down the connection and releases the resources allocated for the session |
94. |
RTP stands for : |
A. | real time protocol |
B. | real time transmission control protocol |
C. | real time transmission protocol |
D. | real time transport protocol |
Answer» D. real time transport protocol |
95. |
The problem with unicast delivery is that the : |
A. | memory allocation is difficult |
B. | server must establish a seperate unicast session for each client |
C. | the routers must support unicasting |
D. | the clients must be close to the server |
Answer» B. server must establish a seperate unicast session for each client |
96. |
The difficulty with multicasting from a practical point of view is : (choose all that apply) |
A. | memory allocation is difficult |
B. | server must establish a seperate unicast session for each client |
C. | the routers must support multicasting |
D. | the clients must be close to the server |
Answer» D. the clients must be close to the server |
97. |
To let a client have random access to a media stream : |
A. | the protocol used must not be stateless |
B. | the server must support download |
C. | the stream should give access rights to the client |
D. | all of these |
Answer» A. the protocol used must not be stateless |
98. |
The model in which one kernel thread is mapped to many user-level threads is called : |
A. | many to one model |
B. | one to many model |
C. | many to many model |
D. | one to one model |
Answer» A. many to one model |
99. |
The model in which one user-level thread is mapped to many kernel level threads is called : |
A. | many to one model |
B. | one to many model |
C. | many to many model |
D. | one to one model |
Answer» B. one to many model |
100. |
In the Many to One model, if a thread makes a blocking system call : |
A. | the entire process will be blocked |
B. | a part of the process will stay blocked, with the rest running |
C. | the entire process will run |
D. | none of these |
Answer» A. the entire process will be blocked |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.