Wednesday, 16 April 2014

Important Questions For System Software and Operating System

Important Questions For System Software and Operating System

1-Translator for low level programming language were termed as-Assembler

2-Analysis which determines the meaning of a statement once its grammatical structure becomes known is termed as-Semantic analysis

3-Load address for the first word of the program is called-load address origin

4-Symbolic names can be associated with-data or instruction

5-The translator which perform macro expansion is called a-Macro pre-processor

6-Shell is the exclusive feature of-UNIX

7-A program in execution is called-Process

8-Interval between the time of submission and completion of the job is called-Turnaround time

9-A scheduler which selects processes from secondary storage device is called-Medium term scheduler.

10-The scheduling in which CPU is allocated to the process with least CPU-burst time is called-Shortest job first Scheduling

11-The term ‘page traffic’ describes-the movement of pages in and out of memory.

12-The “turn-around” time of a user job is the-total time taken to execute the job.

13-Which of the following can be used as a criterion for classification of data structures used in language processing. 
           A-nature of a data structure 
           B-purpose of a data structure 
           C-lifetime of  a data structure 

14-Memory utilization factor shall be computed as follows-memory in use/total memory connected.

15-Program ‘preemption’ is-forced de allocation of the CPU from a program which is executing on the CPU.

16-An assembler is-machine dependant.

17-Which of the following is not a fundamental process state-
           (A) ready 
           (B) terminated
           (C) executing 
           (D) blocked  

18-Which of the following is true?
           (A) Block cipher technique is an encryption technique.
           (B) Steam cipher technique is an encryption technique.
           (C) Both (A) and (B).
           (D) Neither of (A) and (B).                       Ans-C

19-Which of the following approaches do not require knowledge of the system state?
           (A) deadlock detection. (B) deadlock prevention.
           (C) deadlock avoidance. (D) none of the above.                  Ans-D

20-Program generation activity aims at-Automatic generation of program

21-Which amongst the following is not an advantage of Distributed systems?
           (A) Reliability (B) Incremental growth
           (C) Resource sharing (D) None of the above           Ans: (A)

22- An imperative statement- Indicates an action to be performed during execution of assembled program

23- Which of the following loader is executed when a system is first turned on or
Restarted- Bootstrap loader

24- Poor response time is usually caused by-
           (A) Process busy (B) High I/O rates
           (C) High paging rates (D) Any of the above                               Ans-D

25- “Throughput” of a system is- Number of programs processed by it per unit time

26- The “blocking factor” of a file is- The number of logical records in one physical record

27- Which of these is a component of a process precedence sequence?
           (A) Process name (B) Sequence operator ‘;’
           (C) Concurrency operator ‘,’ (D) All of the above                        Ans-D

28- Which amongst the following is valid syntax of the Fork and Join Primitive?
(A) Fork
      Join >                                        Join
(C) For                                     (D) Fork
     Join                                          join                       Ans-A

29- Nested Macro calls are expanded using the- FILO rule (First in last out)

30- A parser which is a variant of top-down parsing without backtracking is- Recursive Descend.

31- The expansion of nested macro calls follows- LIFO rule

32- In a two-pass assembler, the task of the Pass II is to- synthesize the target program.

33- A linker program- links the program with other programs needed for its execution.

34- Which scheduling policy is most suitable for a time-shared operating system-RR(Round-Robin.)

35- A critical section is a program segment- where shared resources are accessed.

36- An operating system contains 3 user processes each requiring 2 units of resource
R .The minimum number of units of R such that no deadlocks will ever arise is-4

37- Locality of reference implies that the page reference being made by a process- is likely to be the one of the pages used in the last few page references.

38- Which of these is not a part of Synthesis phase- Perform LC processing

39-The syntax of the assembler directive EQU is-<symbol>EQU>

40-The following features are needed to implement top down parsing
           (A) Source string marker
           (B) Prediction making mechanism
           (C) Matching and Backtracking mechanism
           (D) All of the above                                                                Ans-D

41-A macro definition consists of
           (A) A macro prototype statement (B) One or more model statements
           (C) Macro pre-processor statements (D) All of the above    Ans-D

42-The main reason to encrypt a file is to-Secure it for transmission

43-Which of the following is not a key piece of information, stored in single page table
entry, assuming pure paging and virtual memory-A reference for the disk block that stores the page

44-A UNIX device driver is-Structured into two halves called top half and bottom half

45-The following is not a layer of IO management module-MCS (Management Control System)

46-Which amongst the following is not a valid page replacement policy?- RU policy (Recurrently used)

47-An assembly language is a-low level programming language

48-TII stands for-Table of incomplete instructions

49-An analysis, which determines the syntactic structure of the source statement, is Called-Syntax analysis

50-Action implementing instruction’s meaning are a actually carried out by-instruction execution

51-The field that contains a segment index or an internal index is called-target datum

52-A program in execution is called-process

53-Jobs which are admitted to the system for processing is called-long-term scheduling

54-A set of techniques that allow to execute a program which is not entirely in memor is called-virtual memory

55-SSTF stands for-Shortest-Seek-time-first scheduling

56-Before proceeding with its execution, each process must acquire all the resources
it needs is called-hold and wait

57-Virtual memory is-used in all major commercial operating systems

58-Relocation bits used by relocating loader are specified by-Assembler or Translator

59-Resolution of externally defined symbols is performed by-Linker

60-Relocatable programs-can be loaded almost anywhere in memory

61-Page stealing- is taking page frames other working sets

62-The total time to prepare a disk drive mechanism for a block of data to be read from is its-latency plus seek time

63-To avoid race condition, the maximum number of processes that may be simultaneously inside the critical section is-one

64-The memory allocation scheme subject to “external” fragmentation is-segmentation

65-Page fault frequency in an operating system is reduced when the-locality of reference is applicable to the process

66-In which of the following page replacement policies Balady’s anomaly occurs?- FIFO

67-Virtual memory can be implemented with-Segmentation &  Paging

68-Recognition of basic syntactic constructs through reductions, this task is performed By-Syntax analysis

69-A grammar for a programming language is a formal description of-Structure

70-Swapping - is a technique of temporarily removing inactive programs from the memory of computer system

71-Ageing-is a technique of improving the priority of process waiting in Queue for CPU allocation

72-Latency Time-is the time required by a sector to reach below read/write head.

73-Which of the following is most general phase structured grammar?Context – Sensitive

74-File record length-Should be chosen to match the data characteristics.

75-A public key encryption system-Allows only the correct receiver to decode the data


Post a Comment