Home / Computer Science / Operating System :: section-7

Computer Science :: Operating System

  1. In which addressing mode, the address of the location of the operand is given explicitly as a part of the instruction.

  2. A.

     absolute mode

    B.

     immediate mode

    C.

     index mode

    D.

     modulus mode

    E.

     None of the above


  3. Under virtual storage,

  4. A.

     a single program is processed by two or more CPUs

    B.

     two or more programs are stored concurrently in primary storage

    C.

     only the active pages of a program are stored in primary storage

    D.

     interprogram interference may occur

    E.

     None of the above


  5. A base register table

  6. A.

     allows the programmer to write base registers and displacements explicitly in the source program.

    B.

     is used to remember which of the general-purpose registers are currently available as base registers, and what base addresses they contain.

    C.

     allows multiple programs to reside in separate areas of core at the same time.

    D.

     is a term that refers to the control programs of an operating system.

    E.

     None of the above


  7. File record length

  8. A.

     should always be fixed

    B.

     Should always be variable

    C.

     depends upon the size of the file

    D.

     should be chosen to match the data characteristics

    E.

     None of the above


  9. A relationship between processes such that each has some part (critical section) which must not be executed while the critical section of another is being executed, is known as

  10. A.

     semaphore

    B.

     mutual exclusion

    C.

     multiprogramming

    D.

     multitasking

    E.

     None of the above


  11. What is the name of the operating system which was originally designed by scientists and engineers for use by scientists and engineers?

  12. A.

     XENIX

    B.

     UNIX

    C.

     OS/2

    D.

     MS DOS

    E.

     None of the above


  13. The most common security failure is

  14. A.

     carelessness by users

    B.

     depending on passwords

    C.

     too much emphasis on preventing physical access

    D.

     insufficient technology used to prevent breaches

    E.

     None of the above


  15. Terminal Table

  16. A.

     contains all constants in the program

    B.

     a permanent table of decision rules in the form of patterns for matching with the uniform symbol table to discover syntactic structure.

    C.

     consists of a full or partial list of the token's as they appear in the program. Created by Lexical analysis and used for syntax analysis and interpretation

    D.

     a permanent table which lists all key words and special symbols of the language in symbolic form.

    E.

     None of the above


  17. Block or buffer caches are used

  18. A.

     to improve disk performance

    B.

     to handle interrupts

    C.

     to increase the capacity of main memory

    D.

     to speed up main memory read operation

    E.

     None of the above


  19. The practice of "bundling" refers to

  20. A.

     selling computers alone

    B.

     selling peripheral devices with computer

    C.

     selling software to run on computers

    D.

     giving away software with a computer purchase

    E.

     None of the above