SlideShare ist ein Scribd-Unternehmen logo
1 von 40
ANHNH OSG202
ĐỀ 1 CH
1)_____ is a small computer that fits in a shirt pocket and performs a small number of
functions, such as an electronic address book and memo pad *
A. Personal Digital Assistant B. Personal Device
C. Personal Computer D. Personal Operating System
2)Each process is associated with _________ *
A. address space, set of program’s source files, pointer, etc
B. address memory, linker, compiler, etc
C. all of the others
D. address space, set of resources, registers, etc
3)How many ways are Thread implemented? *
A.1 B.2 C.3 D.4
4)The Joliet Extensions provide ________ *
A. Directory nesting deeper than 8 levels B. Directory names with extensions
C. All of the others D. Long file name is supported Unicode character
5)A disk queue with requests for I/O blocks on cylinders in orders: 10, 22, 20, 2, 40, 6, 38.
Assume that the disk head is initially at cylinder 9. How many cylinders do Total head
movement using SSF algorithms? *
A. None of the others B. 69 C. 47 D. 45
6)What’s different between preemptable and non-preemptable resources? *
A. All of the others
B. Effecting on process or system can occur when those resources are taken way
C. None of the others
D. Preemptable resources can be separated
7)Which of the following statement is a disadvantage of separating I/O and memory space? *
A. Caching a device control register would be disastrous
B. The set of all the I/O ports is protected so that the ordinary users must use 2 instructions
C. All of the others
D. Since the control registers of devices are mapped into the memory space, device drivers
can be written without using Assembly language
8)Which of the following synchronization mechanisms does rely on busy waiting? *
A. All of the others B. Peterson's algorithm
C. Monitors D. Message passing
9)Rearrange the layers in I/O software starting at the bottom: 1. User-level I/O software; 2.
Device drivers; 3. Interrupt handlers; 4. Hardware; 5. Device-independent OS software. *
A. 15234 B. 12345 C. 54321 D. 43251
10)Which deadlock condition does order resources numerically attack? *
A. Hold and wait B. Circular wait
C. Mutual exclusion D. None of the others
11)How many ways are to used to keep track of free block in disk space management? *
A. A bitmap method B. A linked list method
C. All of the others D. A indexed method
12)Which method is used to prevent the communication deadlock? *
A. Acknowledge signal B. Handling alarm
C. Timeouts D. All of the others
13)An interrupt that does not meet these requirements is called a(n) ______ *
A. Required interrupt B. Precise interrupt
C. Disappointed interrupt D. Imprecise interrupt
14)If there are 64 pages and the page size is 4096 words, what is the length of logical
address? *
A.12 bits B. 8 bits C. 16 bits D. 18 bits
15)Suppose a virtual address space of 2^24 words and the page size is 2^12 words. If the
virtual address is 1234567 in Hexadecimal, what would be the page number in Hexadecimal? *
A. 123 B. 1234 C. 246 D. 2468
16)What is a “tripping” in RAID? *
A. Get undressed B. All of the others
C. Take away possessions from someone D. Distributing data over multiple drives
17)Which statement about the Producer-Consumer Problem to get trouble is true? *
A. The wake up signal is lost
B. All of the others
C. The consumer and producer will sleep forever
D. Access to count variable is unconstrained
18)Which operating system structure is communication between requesting process and
responding process by message passing? *
A. Monolithic Systems B. All of the others
C. Client – Server Model D. MS – DOS
19)A system has five processes and three allocated resources. The current allocation and
request needs are as following figure. What do the processes progress in sequence?
A. ABCDE B. ADCEB C. ADECB D. ACDEB
20)Where is all the information about each process stored in operating systems? *
A. Process table B. Program table
C. Page table D. Virtual table
21)Which problem is described two following statements? 1. No reader will be kept waiting
unless a writer has already obtained permission to use the shared object. Or, readers have
higher priorities; 2. Once a writer is ready, the writer performs its write as soon as possible *
A. Readers-Writers B. Bankers
C. All of the others D. Producer-Consumer
22)Which of the following is a synchronization primitive that is implemented by hardware? *
A. Lock variables B. The TSL instructions
C. Peterson's Solution D. Strict Alternation
23)Five batch jobs A through E, arrive at a computer center at almost the same time. They
have estimated running times of 8, 6, 2, 10, and 4 minutes. Their (externally determined)
priorities are 3, 5, 2, 1, and 4, respectively, with 5 being the highest priority. Determine the
mean process 'average waiting time for priority scheduling'. Ignore process switching
overhead. *
A. 54 minutes B. 12,8 minutes
C. 10,8 minutes D.16,8 minutes
24)Which strategy is a simplest design for speeding up Paging? *
A. Page table is loaded into disk
B. Page table is loaded into TLB
C. Page table is loaded into registers
D. Page table is loaded into main memory
25)Which solution is used to solve the “missing block” problem in file system consistency? *
A. The file system checker allocate the free block, then copy the duplicate block in used to
there
B. None of the others
C. The file system checker adds the missing blocks to the free list
D. The file system checker rebuilds the free list
26)Which are file types? *
A. Block special files B. Regular files
C. Character special files D. All of the others
27)A(n) _________ is provided to make system calls from some programming languages *
A. None of the others B. pointer
C. operator D. procedure library
28)In a directed graphs model, a possible of deadlock can occur: *
A. None of the others
B. If graph contains a cycle and only one instance process per resource type
C. If graph contains a cycle and several instances per resource type
D. If graph contains no cycle
29)Operating system abstraction supports the ability to have ______ operation even when there
is only one CPU available *
A. None of the others B. parallel C. multiple D. pseudoparallelism
30)Which solutions are used to solve the shared libraries? *
A. Relocation on the fly and position-independent code
B. None of the others
C. Static reallocation and position-independent code
D. Copy on write and position-independent code
31)Why is Shortest Job First scheduling algorithm optimal? *
A. Each process is assigned a time interval during which it is allowed to run
B. None of the others
C. Minimize average waiting time of each process
D. Each process is assigned a priority that the process with the highest priority is allowed to
run
32) Five batch jobs A through E, arrive at a computer center at almost the same time. They
have estimated running times of 8, 6, 2, 10, and 4 minutes and arrival times at 0, 4, 6, 10 and
12. Determine the mean process 'average turnaround time' for FCFS (First-Come First Served)
scheduling. Ignore process switching overhead. *
A. 6,4 minutes B. 62 minutes C. 12,4 minutes D. 32 minute
33)A system has five processes and three allocated resources. The current allocation and
maximum needs are as following figure. What is the smallest value of x for which this is a safe
state? *
A. 3 B. 2 C. 1 D. 0
34)To specify an address in this segmented memory, the _____ form is used *
A. <segment-number, offset> B.<virtual address, offset>
C.<process, offset D. <physical address, offset>
35) What is the “sequential processes” concept? *
A. There are both many CPU and many PC
B. None of the others
C. All process is executed in concurrency
D. No concurrency inside a process; everything happens sequentially
36)Consider an i-node which contains 10 direct addresses of 4 bytes each and all disk blocks
are 1 KB. Also consider that the i-node contains an additional “single and double indirect
address” that is used for containing more disk block addresses. What is the largest possible
file? *
A. 10 KB B. 65536 KB C. 65802 KB D. 266 KB
37)The number on the address lines is used as an index into a table to fetch a new program
counter. What is the table’s name? *
A. Interrupt table B. Address table
C. Interrupt vector D. Address lines table
38)Which method is used to implement files with file’s size larger than 2 GB in UNIX V7? *
A. FAT 16
B. FAT 32
C. i-node with single indirect block
D. i-node with triple indirect block
39.) Which method is used to implement files to keep each file as a linked list of disk blocks? *
A. Contiguous Allocation B. Linked List Allocation
C. i-node D. File Allocation Table
40) In “No Memory Abstraction”, the static relocation technique is ____ *
A. After the program is loaded at address n, the constant n is stored at a particular register.
B. None of the others
C. When the program is compiled, the address of program is added with the constant value
where the program will be loaded
D. When the program is loaded at address n, the constant n was added to every program
address
41) Which mechanism is described as “the device controller sneaks in and steals an occasional
bus cycle from the CPU once in a while, delaying it slightly”? *
A. Interrupt stealing B. All of the others
C. Cycle sneaking D. Cycle stealing
42) Which concept is described as “disk sectors are just numbered consecutively starting at 0,
without regard to the disk geometry”? *
A. Logical block addressing B. Physical block addressing
C. Virtual block addressing D. None of the others
43) What is one directory containing all files called in the simplest form of directory system? *
A. Parent directory B. Root directory
C. Volume D. User directory
44) A disk queue with requests for I/O blocks on cylinders in orders: 10, 22, 20, 2, 40, 6, 38.
Assume that the disk head is initially at cylinder 38. Which the ordering cylinder in progress
do using a slight modification of elevator algorithms? *
A. 38 38 40 22 20 10 6 2
B. 38 38 40 2 6 10 20 22
C. 38 38 22 20 10 6 2 40
D. 38 40 2 6 10 20 22 38
45) Which keyword is appropriate described in the following statement: “While memory sizes
are increasing rapidly, software sizes are increasing much faster”? *
A. swapping B. bloatware C. overlays D. paging
46) The File System Performance is implemented by _____ *
A. Buffer cache B. Defragmenting Disks D. Block Read Ahead E. All of the others
47) One of way to prevent a deadlock is ________ *
A. Kills one of the processes B. Rollback
C. Spool everything D. Locks one of the processes
48) What is the correct approach with requesting the dedicated devices to solve deadlock using
Ostrich algorithm? *
A. The device driver stops the current jobs and releases the devices
B. The device driver kills those requesting processes
C. The device driver decides blocking and returning an error code
D. All of the others
49) Assume that the Page Table below is in effect. The number of lines per page is 400. The
actual memory location for line 1634 is ____. *
A. 3 B. None of the others C. 4434 D. 1634
50) A memory free in 3 frames. How many times do the page fault occur? Assume that the
running as the following page 7, 0 , 1, 2 , 0, 3, 0 , 4, 2 , 3 , 0 , 3 , 2 , 1, 2, 0, 1, 0 , 7 using
LRU. *
A. 7 times B. 6 times C. 12 times D. 13 times
51)What is the advantage of the exokernel scheme? *
A. Try to use somebody else’s resource
B. All of the others
C. Maintain tables to remap disk address
D. Save a layer of mapping
52) Assume jobs A-D arrive in quick succession in the READY queue. Using round robin
scheduling (quantum=4), the average turnaround time for each job is ____. *
A. 5 B. 73 C. 18.25 D. 20
53) What’s different between asynchronous and synchronous transfer in principles of I/O
software? *
A. None of the others
B. All of the others
C. The CPU starts the transfer and goes off to do something else until the data are available in
the buffer
D. The CPU starts the transfer and goes off to do something else until the interrupt arrives
54) A memory free in 3 frames. Which values do the page frame contain after the 4th page is
accessed? Assume that the running as the following page 7, 0 , 1, 2 , 0, 3, 0 , 4, 2 , 3 , 0 , 3 , 2 ,
1, 2, 0, 1, 0 , 7 using LRU. *
A. 7, 0, 1 B. 4, 0, 3 C. 1, 0, 7 D. 3, 0, 4
55) Assume that process A-D make up the set of runnable processes on memory asB1 B2 B3
A1 A2 A5 A7 D3 D4 D6 C1 C6 C5. Suppose D gets a page fault. Which page is replaced using
the local policy? Assume that the replaced page is always a last page. *
A. B3 B. C5 C. D6 D. None of the others
56) Which mechanism is implemented by writing to the log file in file system management and
optimization? *
A. Log-Structured File Systems B. None of the others
C. Virtual File Systems D. Journaling File Systems
57) Which of these statements about the Inverted Page Table are true? *
A. An entry contains the pair (segment, virtual page) mapped into the corresponding page
frame
B. An entry contains the pair (process, virtual page) mapped into the corresponding page
frame
C. An entry contains the pair (segment, offset) mapped into the corresponding page frame
D. An entry contains the pair (process, offset) mapped into the corresponding page frame
58) Consider a swapping system in which the memory consists of the following hole sizes:
10K, 4K, 20K, 15K, 9K. Assume worst fit algorithm is used. Which holes are taken for
successive segment requests of 8K, 12K, 10K? *
A. 9K, 15K, 10K B. 20K, 15K, 10K
C. 10K, 15K, 20K D. 10K, 20K, 15K
59) Which thread does the arrival of a message cause the system to create a new thread to
handle the message? *
A. Upcall B. Pop-up C. Distributed D. Activator
60) The live lock is resolved by ________ *
A. All of the others
B. Killing the process itself.
C. Restricting all users to one process, one open file, and one everything
D. None of the others
ĐỀ 2 CH
61) Which mechanism is described as “the device controller sneaks in and steals an occasional
bus cycle from the CPU once in a while, delaying it slightly”? *
A. Cycle stealing B. Interrupt stealing
C. All of the others D. Cycle sneaking
62) A ____ is a portion of a process that can run independently *
A. subprocess B. thread C. program D. miniprocess
63) Dijkstra’s Banker’s Algorithm require the system to maintain the resource information for
each process, including (choose 1 answer only): *
A. A count of the system’s total resources
B. The number of resources currently acquired by the process
C. The maximum resources that can be requested by the process and The number of resources
currently acquired by the process
D. The maximum resources that can be requested by the process
64) The special files are (choose 1 answer only): *
A. block special file
B. none of the other choices
C. character special file
D. character special files and block special files
65) Which of the following is an advantage of Memory-mapped I/O? *
A. None of the other choices
B. Since there is only one address space, all I/O devices must examine all memory references
. to see which ones to response to
C. Since the control registers of devices are mapped into the memory space, device drivers
can be written without using Assembly language
D. Using memory mapped I/O, caching a device control register is not acceptable
66) Which of the following statements is incorrect about Translation Look-aside Buffer
(TLB)? *
A. None of the other choices
B. The use of TLB eliminates the need for keeping a page table in memory
C. TLB only maintains a subset of the entries stored in the full memory-based page table
D. When there is a TLB miss the system needs to access the page table
67) Linux and __________ are often used as operating systems on supercomputers,
mainframes, and servers. *
A. Windows B. UNIX
C. Mac OS D. None of the other choices
68) Which of the following is not correct about the reliability of different RAID levels? *
A. All RAID levels can survive one disk crash
B. In RAID level 2, a single bit error in a word can be detected AND corrected
C. In RAID levels 3, 4, 5 a single bit error in a word can be detected
D. There is no reliability support in RAID level 0
69) Typical approaches to handle deadlocks do not include *
A. Detection B. Deterrence C. Prevention D. Avoidance
70) Which of the following process state transitions is illegal? *
A. blocked -> running B. ready -> running
C. blocked -> ready D. running -> ready
71) Which of the following is not correct about hard links and symbolic links? *
A. Symbolic links can point to files in the network
B. Hard links can point to files on other machines
C. Hard links do not require extra disk space
D. Symbolic links need space to store the name of the file pointed to
72) What are the allocation methods of disk blocks for files: *
A. Linked allocation B. Contiguous allocation
C. All of the other choices D. Indexed allocation
73) The I/O technique where the processor busily waits for an I/O operation to complete is
called: *
A. None of the other choices B. Programmed I/O
C. Direct Memory Access (DMA D. Interrupt-driven I/O
74) A page fault means that we referenced a page *
A. that was outside the memory boundaries
B. that was not in main memory
C. that was not in secondary storage
D. with an incorrect I/O request
75) Personal desktop computers use a __________ operating system. *
A. real-time B. multiuser C. single-user, multitask D. single-user, single-task
76) Which of the following conditions of semaphore variable “s” implies a busy critical
region? *
A. s < 0 B. s = 0 C. None of the other choices D. s > 0
77) Which of the following synchronization mechanisms does not rely on busy-waiting? *
A. Lock variables B. Semaphores C. Peterson’s algorithm. D. Strict alternation
78)Which strategy is used in the Banker’s algorithm for dealing with deadlocks? *
A. Deadlock prevention B. Deadlock detection
C. Deadlock avoidance D. Deadlock ignorance
79) What is not correct about contiguous allocation of files? *
A. It is widely used on CD-ROMs
B. It does not cause disk fragmentation
C. It leads to excellent read performance
D. It is simple to implement
80) Five batch jobs A through E, arrive at a computer center at almost the same time. They
have estimated running times of 8, 6, 2, 10, and 4 minutes. Their (externally determined)
priorities are 3, 5, 2, 1, and 4, respectively, with 5 being the highest priority. Determine the
mean process average turnaround time for priority scheduling. Ignore process switching
overhead . *
A. 12,8 minutes B. 16,8 minutes C. 54 minutes D. 10,8 minutes
81) Which of the following statements about semaphores is true? *
A. A semaphore implementation should guarantee that processes do not suffer indefinite
postponement
B.P and V (Down and Up) operations should be indivisible operations
C. If several processes attempt a P(S) operation simultaneously, only one process should be
allowed to proceed
D. All of the other choices
82) Which of the following statements is incorrect about I/O using DMA? *
A. DMA helps free up the CPU during the I/O to do other work
B. None of the other choices
C. In essence, DMA is programmed I/O, except the fact that DMA, instead of the CPU, does
all the work
D. DMA helps reduce the number of interrupts
83) Which of the following statements about segmentation is false? *
A. Sharing of procedures between different users can be facilitated
B. The total address space can be more than the size of physical memory
C. None of the other choices
D. There are several linear address spaces
84) A computer has four page frames. The time of loading, time of last access, and the R and
M bits for each page are as shown below (the times are in clock ticks). Which page will
Second Chance replace? *
A. 0 B. 2 C. 3 D. 1
85.In general, which is the best technique for I/O Data transfer? *
A. Direct Memory Access
B. Programmed I/O
C. Interrupt-Driven I/O
D. None of the other choices
86) All deadlocks involve conflicting needs for resources by *
A. Two or more processes
B. One or more processes
C. Three or more processes
D. None of the other choices
87)Which of the following is a hardware solution to the critical region problem? *
A.TSL B. Shared memory
C. None of the other choices D.Semaphore
88) A directory in UNIX/Linux consists of the following *
A. file name, file size, location of the file on disk
B. i-node number and file name
C. None of the other choices
D. file name, file size, location of the file on disk, date created, owner ID
89)A table in main memory storing linked list allocation of disk blocks is called: *
A. File allocation table B. File list table
C. Disk allocation table D.. Linked list table
90)With paging, when is the internal fragmentation possible? *
A. The virtual memory assigned to the program is less than the physical memory assigned to
it
B. The last page of the job is less than the maximum page size
C. Page does not fit the frame
D. Such thing cannot happen
91) Which of the following is not a well-known technique for organizing the physical storage
blocks for a file? *
A. Linked list block allocation B. Contiguous block allocation
C. Indexed block allocation D. Sparse block allocation
92) A disk queue with requests for I/O blocks on cylinders in orders: 10, 22, 20, 2, 36, 6, 38.
Assume that the disk head is initially at cylinder 9. How many cylinder do total head
movement using SSF algorithms? *
A. None of the others B. 43 C. 67 D.45
93) In which of the following environments preemption is essential? *
A. Interactive
B. Real time
C. Batch
D. None of the other choices
94) Assume that the Page Table below is in effect. The number of lines per page is 400. The
actual memory location for line 433 is ____. *
1/1
A. 4000 B. 33 C. 4033 D.1
95)Consider the following state of a system with four processes P1, P2, P3 and P4 and five
types of resources RS1, RS2, RS3, RS4 and RS5 as figure below. Deadlocked processes are
___ *
A. P1, P4
B. P1, P2
C. P2, P3
D. P1, P3
96)Which of the following is specified to indicate the directory where the file is located? *
A. Root directory B. Extension C. Sub-directory D. Path name
97) Which deadlock condition does order resources numerically attack? *
A. Mutual exclusion B. None of the other choices
C. No preemption D. Hold and wait
98) Which of the following actions generates an external interrupt? *
A. A system call instruction is executed.
B. An input/output operation is completed.
C. A page that does not exist in the main memory is accessed by the virtual storage
management.
D. Division by zero occurs.
99) The simplest way to break a deadlock is to *
A. kills one of the processes
B. locks one of the processes
C. preempt a resource
D. rollback
100)Assume jobs A-D arrive in quick succession in the READY queue. Using round robin
scheduling (quantum=4), the average turnaround time for each job is ____. *
A. 5 B. 18.25 C. 73 D. 20
101) Which part of a disk is used to boot the computer? *
A. MBR B. Boot block C. Root block D. Super block
102) Which of the following statements is incorrect about user mode and kernel mode? *
A. In kernel mode, the OS can execute every instruction in the instruction set
B. In user mode, user program can execute only a subset of instructions
C. None of the other choices
D.Having two modes of operation helps prevent user programs from accessing critical
instructions
103) Consider a swapping system in which the memory consists of the following hole sizes: 10
K, 4 K, 20 K, 15 K, 9 K. Assume best fit algorithm is used. Which holes are taken for
successive segment requests of 8 K, 12 K, 10 K? *
A. 10 K, 20 K, 15 K B. 9 K, 15 K, 10 K
C. None of the other choices D. 20 K, 15 K, 4 K
104) Which of the following is a preemptive scheduling algorithm *
A. Shortest Job First B. None of the other choices
C. FCFS D. Round Robin
105) Which of the following systems is used in time-critical environments where data must be
processed within a strict time limit? *
A. Interactive B. Hybrid C. Embedded D. Real-time
106) ____ is the partitioning of a single server, each of which can support a different
operating *
A. Multithreading B. Multiprocessing C. Virtualization D. Shared processing
107) The File Manager writes the volume name and other descriptive information on an easy-
to-access place on each unit: ____ of the CD or DVD *
A. stored at the beginning of the volume
B. the innermost part
C. the outermost part
D. immediately following the master file directory
108) Which statement about disabling interrupts to resolve race conditions is wrong? *
A. User-mode programs are the best place to invoke disableInterrupt()
B. In theory, a program can disable interrupts when it enters a critical section, and re-enable
interrupts when finished with a critical section, to eliminate race conditions
C. Disabling/enabling interrupts may negatively affect the I/O system
D. Programs with infinite loops in their critical sections are a significant problem with the
interrupt-based approach
109) Working set model is used for: *
A. Finding the average number of frames a job will need to run smoothly
B. Finding the minimum number of frames necessary for a job so that jobs can be run without
“thrashing”
C. Determining whether page replacement is needed
D. All of the other choices
110) Consider a swapping system in which the memory consists of the following hole sizes: 10
K, 4 K, 20 K, 15 K, 9 K. Assume worst fit algorithm is used. Which holes are taken for
successive segment requests of 8 K, 12 K, 10 K? *
A. None of the other choices
B. 10 K, 20 K, 15 K
C. 9 K, 15 K, 10 K
D. 20 K, 15 K, left over of 20 K
111) Which is a wrong statement about the quantum used in Round Robin algorithm? *
A. A reasonable value of quantum is around 20-50 ms
B. None of the other choices
C. If the quantum is very small, the CPU efficiency is reduced
D. If the quantum is very large, RR is essentially FCFS
112) Which of the following statements about interrupts and trap instructions is incorrect? *
A. An interrupt is a hardware-generated change of control flow within the system
B. A trap instruction is a software-generated interrupt
C. None of the other choices
D. An interrupt handler deals with the cause of the interrupt
113) Which of the following statements is incorrect about Memory-mapped I/O and
Programmed I/O? *
A. None of the other choices
B. Programmed I/O may use memory-mapped I/O to fulfill the I/O tasks
C. Memory-mapped I/O is a way to control the device
D. Programmed I/O is a way to actually carry out the I/O operations
114) What is the weakness of the Banker’s algorithm? *
A. Enabling the number of resources to fluctuate
B. Requiring that processes state their maximum needs in advance
C. Allowing the population of processes to vary over time
D. Enabling processes to hold their resources indefinitely
115) Which of the following statements about the CPU’s handling interrupts is incorrect? *
A. The processor ceases to execute the current sequence of instructions
B. The hardware saves the old PC location
C. The CPU branches to a new instruction sequence
D. None of the other choices
116) In a directed graphs model, a possible of deadlock can occur: *
A. None of the others
B. If graph contains no cycle
C. If graph contains a cycle and only one instance per resource type
D. If graph contains a cycle and several instances per resource type
117) What is interrupt vector? *
A. None of the other choices
B. A signal an I/O device sends to CPU
C. A signal CPU sends to I/O device
D. Part of memory which contains the addresses of interrupt handlers
118) Information that must be saved prior to the processor transferring control to the interrupt
handler routine includes: *
A. PSW and Contents of processor registers
B. PSW and PC
C. None of the other choices
D. PSW
119) Which of the following statements is incorrect about Translation Look-aside Buffer
(TLB)? *
A.A TLB miss implies a disk operation will follow
B. A TLB is sometimes known as an associative memory
C. Each entry of a TLB contains the information about one page, including the virtual page
number and the corresponding page frame
D. None of the other choices
120) Each of the following characteristics applies to deadlock avoidance except *
A. None of the other choices
B. Inherently conservative strategy
C. Relying on ability to predict effect of satisfying allocation requests
D. Widely used in modern operating systems
ĐỀ 4 CH
121)Assume jobs A-D arrive in quick succession in the READY queue. Using round robin
scheduling (quantum=4), the turnaround time for job A is ____. *
A.22 B. 20 C. 7 D. 24
122) Which does the power of CPU decrease to if it run at half speed? *
A. None of the other choices B. 1/8 C. ¼ D. 1/2
123) A(n) _________ is provided to make system calls from some programming languages *
A. procedure library B. operator
C. none of the other choices D. pointer
124) What is correct about trap instructions and interrupts? *
A. A trap instruction is caused by a user program to invoke functions in the OS kernel
B. An interrupt is caused by an external event
C. Trap instruction switches the execution mode of a CPU from the user mode to the kernel mode.
D. All of the other choices
125) Which of the following is not a task of I/O management of OS? *
A. Mapping files onto secondary storage
B. Manage main memory for the devices using caching, buffering, and spooling
C. Maintain and provide a general device-driver interfaces
D. Drivers for specific hardware devices
126) Which method is used to implement files to keep each file as a linked list of disk
blocks? *
A. Linked List Allocation B. Contiguous Allocation
C. i-node D. File Allocation Table
127) Assuming that it takes 10 nsec to copy a byte, how much time does it take to completely
rewrite the screen of a 1200 x 800 pixels graphics with 24- bit color? *
A. 28.8 msec B. 288 micro-sec
C. 288 msec D. 28.8 micro-sec
128) Which is not a DVD Improvement on CDs to increase the capacity? *
A. A kind laser (red, blue) B. Diameter of disc
C. Smaller pits D. A tighter spiral
129) A simplest way to break a deadlock is to *
A. rollback B. preempt a resource
C. kills one of the processes D. locks one of the processes
130) Which of the following is an Operating System component? *
A. Space Management B. Speed Management
C. Time Management D. Process Management
131) Each of the following characteristics applies to deadlock avoidance except *
A. None of the other choices
B. Inherently conservative strategy
C. Widely used in modern operating systems
D. Relying on ability to predict effect of satisfying resource allocation requests
132) A computer has four page-frames. The time of loading, time of last access, and the R and
M bits for each page are as shown below (the times are in clock ticks). Which page will FIFO
replace? *
A. 1
B. 2
C. 0
D. 3
133) How much cylinder skew is needed for a 7200- RPM (rotate per minute) disk with the
track-to-track seek time of 1 msec? The disk has 200 sectors of 512 bytes on each track. *
A. 12 sectors B. 36 sectors C. 24 sectors D. 18 sectors
134) Of the three components of access time in a disk, ____ is the longest. *
A. Delay time B. Transfer time C. Search time D. Seek time
135) An algorithm designed to detect starvation by tracking how long each job has been
waiting for resources is the same concept as ____. *
A. Aging B. Preemption C. Round robin D. Deadlock
136) Which FAT type is used, if the maximum partition size is 256 MB and the block size is
4KB? *
A. FAT-32 B.FAT-12 C. None of the other choices D. FAT-16
137) To specify an address in this segmented memory, the _____ form is used *
A. <process, offset> B. <physical address, offset>
C. <segment-number, offset> D. <virtual address, offset>
138)Which of the following statements is not correct about Graphic adapter? *
A. Supports different method of coding pixel color
B. Contains a special memory called video RAM
C. None of the other choices
D. Supports some number of screen sizes (resolution)
139) Strategy used for dumping a disk to tapes is: *
A. None of the other choices B. Both physical dump and logical dump
C. Logical dump D. Physical dump
140) Assuming that it takes 10 nsec to copy a byte, how much time, does it take to completely
rewrite the screen of a 150 characters x 20 line text mode memory-mapped screen? *
A. 10 micro-sec B. 20 micro-sec C. 40 micro-sec D. 30 micro-sec
141) Dijkstra’s Banker's Algorithm require the system to maintain the resource information for
each process, including: *
A. The number of resources currently acquired by the process
B. Both The maximum resources that can be requested and The number of resources currently acquired by
the process
C. A count of the system's total resources
D. The maximum resources that can be requested by the process
142) The scheduling strategy where each process in the queue is given a certain amount of
time. After this time has elapsed, the process is preempted and added to the end of the ready
queue is referred to as: *
A. Prioritization B. LIFO C. All of the other choices D. Round-Robin
143) ____ is the partitioning of a single server, each of which can support a different operating
system. *
A. Multiprocessing B. Shared processing C. Virtualization D. Multithreading
144) Failure to lock database records before updating them may result in a ____ between
processes *
A. Deadlock B. Livelock C. Struggle D. Race
145) Assume jobs A-D arrive at almost the same time in the READY queue. Determine the
average turnaround time for Round Robin scheduling (quantum=2). Ignore process switching
overhead. Job: A B C D; CPU cycle: 5 2 6 4 *
A. 10.5 B. 12.5 C. 9.0 D. 5.5
146) Which RAID level duplicates all the disks? *
A. 4 B. 2 C. 1 D. 3
147) Where should be put the page replacement algorithm In Mach model of Page fault
handling with an external pager? *
A. In the low-level MMU handler
B. All of the other choices
C. In the external pager running in user space
D. In the page fault handler that is part of the kernel
148) In terms of main memory efficiency the method of “Backing up pages dynamically” in
comparison with the method of “Paging to a static swap area” is *
A. Nearly equal B. Equal C. Worse D. Better
149) Which is space efficiency, if 4KB-file using file system with 8KB-block? *
A. 75% B. 50% C. 100% D. 25%
150) Personal desktop computers use a __________ operating system. *
A. single-user, single-task B. multiuser C. real-time D. single-user, multitask
151) In modern printing systems, a disk accepts output from several users, Deadlock occurs
when ____. *
A. Too many users attempt to access the printer at the same time.
B. The printer needs all of a job’s output before it will begin printing, but the spooling system fills the
available disk space with only partially completed output.
C. The network connection for the printer overflows with too many requests to use the printer.
D. The buffer fills up with too many print jobs and the printer cannot decide which one to print.
152) Which RAID level employs a Hamming code to correct single bit errors and detect double
bit errors? *
A. 2 B. 1 C. 3 D. 4
153) Consider an i-node, which contains 10 direct addresses of 4 bytes each and all disk blocks
are 1 KB. Also, consider that the i-node contains an additional “single indirect address” that is
used for containing more disk block addresses. What is the largest possible file? *
A. 264 KB
B. 266 KB
C. 262 KB
D. 268 KB
154) Consider the following state of a system with four processes, P1, P2, P3 and P4, and five
types of resources RS1, RS2, RS3, RS4 and RS5 as figure below. Deadlocked processes are: *
1 point
A. P1, P4
B. P3, P4
C. P1, P2
D. P1, P3
155) What is the correct approach with the “No preemption condition” to prevent Deadlock? *
A. Order resources numerically B. Spool everything
C. Take resources away D. Request all resources initially
156) One of way to prevent a deadlock is ________ *
A. Spool everything B. Kills one of the processes
C. Locks one of the processes D. Rollback
157) Which ways are used to keep track of free block in disk space management? *
A. None of the other choices
B. Both linked list method and bitmap method
C. A linked list method
D. A bitmap method
158) The Joliet Extensions provide ________ *
A. Long file name supported Unicode character
B. All of the other choices
C. Directory nesting deeper than 8 levels
D. Directory names with extensions
159) Which is the maximum partition size, if the FAT type is FAT-32 and the block size is 4
KB? *
A. 1 TB B. 256 MB C. 128 MB D. 512 MB
160) A disk queue with requests for I/O blocks on cylinders in orders: 10, 22, 20, 2, 40, 6, 38.
Assume that the disk head is initially at cylinder 37. Which the ordering cylinder in progress
do using a SSF algorithms? *
A. 37 38 40 2 20 10 6 22
B. 37 38 40 2 6 10 20 22
C. 37 10 22 20 2 40 6 38
D. 37 38 40 22 20 10 6 2
161) Which deadlock condition does “Take resources away” attack? *
A. Mutual exclusion
B. No preemption
C. Hold and wait
D. Circular-wait condition
162) Which deadlock condition does “Request all resources initially” attack? *
A. Hold and wait
B. Circular-wait condition
C. Mutual exclusion
D. No preemption
163) A computer uses a programmable clock in square-wave mode. If 500 MHz crystal is used,
what should be the value of the holding register to achieve a clock resolution of 10 msec
(Clock tick)? *
A. 500,000
B. 50,000
C. 50,000,000
D. 5,000,000
164) The File Manager writes the volume name and other descriptive information on an easy-
to-access place on each unit: ____ of the CD or DVD *
A. Immediately following the master file directory
B. The outermost part
C. The innermost part
D. Stored at the beginning of the volume
165) Which is not a goal of a scheduling algorithm for batch systems? *
A. Throughput
B. Response time
C. CPU utilization
D. Turnaround time
166) Dual-layer, double-sided DVD can hold ____ . *
A. 17 GB
B. 9.4 GB
C. 8.5 GB
D. 4.7 GB
167) The methods determine where page is on the disk when it is paged out is *
A. Backing up pages dynamically
B. Paging to a static swap area
C. Both Paging to a static swap area and Backing up pages dynamically
D. None of the other choices
168) Which solutions are used to solve the shared libraries? *
A. Static reallocation and position-independent code
B. Position-independent code
C. Relocation on the fly and position-independent code
D. None of the other choices
169) A system has five processes and three allocated resources. The current allocation and
maximum needs are as following figure. What is the smallest value of x for which this is a safe
state? *
1 point
A. 1
B. 2
C. 3
D. 0
170 )A disk queue with requests for I/O blocks on cylinders in orders: 10, 22, 20, 2, 40, 6, 38.
Assume that the disk head is initially at cylinder 20. How many cylinder do Total head
movement using FCFS? *
A. None of the others B. 146 C. 58 D. 60
171) A page fault means that we referenced a page *
A. With an incorrect I/O request
B. That was not in secondary storage
C. That was outside the memory boundaries
D. That was not in main memory
172) Five batch jobs A through E, arrive at a computer center at almost the same time. They
have estimated running times of 8, 6, 2, 10, and 4 minutes. Determine the average waiting time
for FCFS scheduling. Ignore process switching overhead. *
A . 18 minutes B.17 minutes C. 12,8 minutes D. 18.8 minutes
173) The scheme of ____ removes the possibility of a circular wait and therefore guarantees
the removal of deadlocks. *
A. Requesting all resources before job run B. Saving and restoring job state
C/ Preemption D. Hierarchical ordering
174) Which is not attribute of MS-DOS file? *
A. Lock B. Archived C. Read-Only D. Hidden, System
175) A simple structuring model for monolithic system includes: *
A. A main program that invokes the requested service procedure
B. A set of utility procedures that help the service procedures
C. All of the other choices
D. A set of service procedures that carry out the system calls
176) An operation concerning Stable Storage is: *
A. Crash recovery B. All of the other choices C. Stable Reads D. Stable writes
177) VMware Workstation is: *
A. Guest Operating system B. Type 1 Hypervisor C. Host Operating system D. Type 2 Hypervisor
178) Some systems increase the priority of jobs that have been in the system for an unusually
long time to expedite their exit, which is known as ____.? *
A. Aging B. Bumping C. Accelerated priority D. Lagging
179) Which of the following environments preemption is essential? *
A. Batch B. Real time C. Interactive D. None of the other choices
180) Five batch jobs A through E, arrive at a computer center at almost the same time. They
have estimated running times of 8, 6, 2, 10, and 4 minutes. Their (externally determined)
priorities are 3, 5, 2, 1, and 4, respectively, with 5 being the highest priority. Determine the
average turnaround time for priority scheduling. Ignore process switching overhead. *
A. 18.8 minutes
B. 16.8 minutes
C. 6 minutes
D. 12.8 minutes
ĐỀ 3 MINH
181) A directory in UNIX/Linux consists of the following *
A. i-node number and file name
B. file name, file size, location of the file on disk
C. file name, file size, location of the file on disk, date created, owner ID
D. none of the other choices
182) A paging system where page size is 2^12 words and the physical memory contains 2^24
words, what is the length of the physical address? *
A. 32 bits B. 16 bits C. 24 bits D. 36 bits
183) If in a resource-allocation graph, each resource type has exactly one instance, which of
the following indicates a deadlock situation? *
A. The graph has no cycle
B. The graph is not connected
C. The graph has at least one cycle
D. The graph is connected
184). In the hierarchical structure for managing, I/O, which layer is closest to the hardware? *
A. Device-independent OS software B. Interrupt handlers
C. Device drivers D. None of the other choices
185) What kind of I/O devices that disks and tapes belong to? *
A. Block-oriented devices B. None of the other choices
C. Character-oriented devices D. Stream-oriented devices
186. The language of the CPU is known as its *
A. Control unit set
B. Instruction set
C. Register set
D. None of the other choices
187) The interface between the operating system kernel and the user programs is defined by
the set of ___ that the operating system provides *
A. System calls B. Functions C. Processes D. Threads
188) Which of the following statements about interrupts and system calls is incorrect? *
A. System calls are caused by internal (synchronous) events
B. Interrupts are caused by external events
C. Interrupts are asynchronous
D. None of the other choices
189) A ____ is a portion of a process that can run independently *
A. thread B. program C. subprocess D. miniprocess
190) A possibility of deadlock can occur: *
A. If a system is in instable state B. If a system is in unsafe state
B. None of the other choices D. If a system is in safe state
191) When a virtual memory system manages memory in fixed length units, which of the
following terms correctly represents its unit? *
A. IO devices B. Segment C. Page D. Frame
192) What happens when a thread calls Down ( S ) when it wants to enter its critical section,
where S is a binary semaphore set to 1? *
A. None of the other choices
B. The thread is allowed to enter its critical section and S is decremented
C. The semaphore is set to 2
D. The thread is blocked and added to a queue of waiting threads
193) Which statement about DMA is incorrect? *
A. The controller does not need to wait for the CPU to transfer data to/from memory
B. It is always true that DMA is less expensive than CPU-mediate data transfers
C. The CPU needs not to be concerned with the time it takes to transfer data
D. The CPU can start a DMA block transfer, and in the mean time do other work
194) The File Manager writes the volume name and other descriptive information on an easy-
to-access place on each unit: ____ of the CD or DVD *
A. the innermost part
B. stored at the beginning of the volume
C. the outermost part
D. immediately following the master file directory
195) Which of the following synchronization mechanisms does not rely on busy-waiting? *
A. Peterson’s algorithm B. Semaphores
C. Lock variables D. Strict alternation
196) Which of the following statements is incorrect about Memory-mapped I/O and
Programmed I/O? *
A. Memory-mapped I/O is a way to control the device
B. Programmed I/O is a way to actually carry out the I/O operations
C. None of the other choices
D. Programmed I/O may use memory-mapped I/O to fulfill the I/O tasks
197) Each of the following characteristics applies to deadlock avoidance except *
A. Inherently conservative strategy
B. None of the other choices
C. Widely used in modern operating systems
D. Relying on ability to predict effect of satisfying allocation requests
198) Which of the following information bits used by the various page replacement policies
indicates if the page has been called lately? *
A. Referenced bit
B. Status bit
C. Locality bit
D. Modified bit
199) Dijkstra’s Banker’s Algorithm require the system to maintain the resource information for
each process, including: *
A. The maximum resources that can be requested by the process
B. The maximum resources that can be requested by the process AND The number of
resources currently acquired by the process
C. The number of resources currently acquired by the process
D. A count of the system’s total resources
200) In general, which is the best technique for I/O Data transfer? *
A. Programmed I/O B. None of the other choices
C. Direct Memory Access D. Interrupt-Driven I/O
Which of the following is a preemptive scheduling algorithm *?
A. None of the other choices
B. FCFS
C. Round Robin
D. Shortest Job First
201) Consider an i-node which contains 10 direct addresses of 4 bytes each and all disk blocks
are 1 KB. Also consider that the i-node contains an additional “single indirect address” that is
used for containing more disk block addresses. What is the largest possible file? *
A. 262 KB B. 266 KB C. 264 KB D. 268 KB
202) Which of the following statements is incorrect about Translation Look-aside Buffer
(TLB)? *
A. A TLB miss implies a disk operation will follow
B. A TLB is sometimes known as an associative memory
C. None of the other choices
D. Each entry of a TLB contains the information about one page, including the virtual page
number and the corresponding page frame
203) A fetched instruction is normally loaded into *
A. Program Counter B. Accumulator
C. None of the other choices D. Instruction Register
204) What is the correct approach with the Mutual Exclusion condition to prevent Deadlock? *
A. Request all resources initially B. Order resources numerically
C. Spool everything D. Take resources away
206) Which statement about disabling interrupts to resolve race conditions is wrong? *
A. In theory, a program can disable interrupts when it enters a critical section, and re-enable
interrupts when finished with a critical section, to eliminate race conditions.
B. Disabling/enabling interrupts may negatively affect the I/O system.
C. User-mode programs are the best place to invoke disable Interrupt().
D. Programs with infinite loops in their critical sections are a significant problem with the
interrupt-based approach.
207) The special files are: *
A. character special files and block special files
B. None of the other choices
C. block special file
D. character special file
208) An example of the key differences that can exist across (and even in) classes of I/O
devices is: *
A. Data representation
B. Data rate
C. Error conditions
D. All of the other choices
209) Which RAID level employs a Hamming code to correct single bit errors and detect double
bit errors? *
A. 1 B. 2 C. 3 D.4
210) Which of the following is a hardware solution to the critical region problem? *
A. None of the other choices B. Semaphore
C. TSL D. Shared memory
211) Which of the following process state transitions is illegal? *
A. ready -> running B. blocked -> ready
C. running -> ready D. blocked -> running
212) Which of the following is true about the block size in disk space management *
A. the larger the block size, the worse the disk space utilization
B. the larger the block size, the lesser the disk space
C. the larger the block size, the lower the data rate
D. none of the other choices
213) Which of the following is not a well-known technique for organizing the physical storage
blocks for a file? *
A. Indexed block allocation
B. Contiguous block allocation
C. Sparse block allocation
D. Linked list block allocation
214) Which of the following statements is incorrect about user mode and kernel mode? *
A. Having two modes of operation helps prevent user programs from accessing critical
instructions
B. In kernel mode, the OS can execute every instruction in the instruction set
C. In user mode, user program can execute only a subset of instructions
D. None of the other choices
215) The simplest way to break a deadlock is to *
A. locks one of the processes B. kills one of the processes
C. rollback D. preempt a resource
217) Which of the following is specified to indicate the directory where the file is located? *
A. Sub-directory B. Path name
C. Extension D. Root directory
218) Which of the following statements is not correct about DMA? *
A. DMA controller has access to the system bus independent of the CPU
B. The operating system can only use DMA if the hardware has a DMA controller
C. DMA helps reduce the number of interrupts (in comparison with interrupt-driven I/O)
D. DMA controller is usually faster than CPU
219) When there is an excessive amount of page swapping between main memory and
secondary storage, the operation becomes inefficient, which is called ____. *
A. thrashing B. over swapping
C. hot swapping D. excessive demand paging
220) Consider a swapping system in which the memory consists of the following hole sizes: 10
K, 4 K, 20 K, 15 K, 9 K. Assume first fit algorithm is used. Which holes are taken for
successive segment requests of 8 K, 12 K, 10 K? *
A.9 K, 15 K, 10 K
B.10 K, 20 K, 15 K
C.20 K, 15 K, 4 K.
D.None of the others
221) A file is generally defined to be: *
A. A collection of similar records
B. A collection of related fields
C. All of the other choices
D. A basic element of data
222) Five batch jobs A through E, arrive at a computer center at almost the same time. They
have estimated running times of 8, 6, 2, 10, and 4 minutes. Determine the mean process
average turnaround time for FCFS scheduling. Ignore process switching overhead. *
A. 18.8 minutes B. 18 minutes C. 19 minutes D. 17 minutes
223) In a single processor system, mutual exclusion can be guaranteed by: *
A. Interleaving processes B. Disabling interrupts
C. All of the other choices D. Overlapping processes
224) Which of the following is appropriate to release page table and pages? *
A. Process creation B. Process execution
C. Page fault time D. Process termination time
225) Which of the following is not a condition for deadlocks? *
A. Preemption B. Hold and Wait
C. Circular Wait D. Mutual exclusion
226) A system has four processes and five allocated resources. The current allocation and need
are as following figure. What is the smallest value of x for which this is a safe state? *
1/1
A. 3 B. 1 C. 2 C.0
227) The ___ is the essential component of the operating system that remains in RAM when
your computer is powered on. *
A. core B. system file C. registry D. kernel
228) ____ is when, in modern printing systems, a disk accepts output from several users and
acts as a temporary storage area for all output until the printer is ready to accept it. *
A. Spooling B. Buffering C. Spoofing D. Lagging
229) Which is NOT a file attribute? *
A. Owner B. Shape C. Size D. Time of Access
230) Which of the following is not a CPU scheduling criterion? *
A. Burst time
B. Response time
C. Throughput
D. CPU utilization
231) If there are 64 pages and the page size is 2048 words, what is the length of logical
address? *
A. 15 bits B. 17 bits C. 14 bits D. 16 bits
232) Typical approaches to handle deadlocks do not include *
A. Prevention B. Deterrence C. Detection D. Avoidance
233) Which of the following systems is used in time-critical environments where data must be
processed within a strict time limit? *
A. Interactive B. Embedded C. Real-time D. Hybrid
234) Page replacement algorithms determine *
A. how many pages should be added to main memory
B. when the system should update page table entries
C. which pages should be brought into memory because a process is likely to reference them
soon
D. which page to remove to provide space for an incoming page
235) Consider a swapping system in which the memory consists of the following hole sizes: 10
K, 4 K, 20 K, 15 K, 9 K. Assume best fit algorithm is used. Which holes are taken for
successive segment requests of 8 K, 12 K, 10 K? *
A. 9 K, 15 K, 10 K B. None of the other choices
C. 20 K, 15 K, 4 K D. 10 K, 20 K, 15 K
236) Which strategy is used in the Banker’s algorithm for dealing with deadlocks? *
A. Deadlock avoidance B. Deadlock ignorance
C. Deadlock detection D. Deadlock prevention
237) The modified/dirty bit is used for the purpose of: *
A. Dynamic allocation of memory used by one process to another
B. Reduce the average time required to service page faults
C. None of the other choices
D. Implementing FIFO page replacement algorithm
238) ____ is the act of allowing only one process to have access to a dedicated resource *
A. No preemption B. Circular wait
C. Mutual exclusion D. Resource holding
239) The two basic types of processor registers are: *
A. Control and status registers
B. General and special registers
C. None of the other choices
D. User-visible and user-invisible register
240) Which of the following is an advantage of Memory-mapped I/O? *
A. Using memory-mapped I/O, caching a device control register is not acceptable
B. None of the other choices
C. Since the control registers of devices are mapped into the memory space, device drivers
can be written without using Assembly language
D, Since there is only one address space, all I/O devices must examine all memory references
to see which ones to response to
241) Multiprogramming increases processor efficiency by *
A. Eliminating all idle processor cycles
B. Taking advantage of time wasted by long wait I/O handling
C. All of the other choices
D. Increasing processor speed
ĐỀ 2 MINH
241) Which is a wrong statement about the quantum used in Round Robin algorithm? *
A. If the quantum is very large, RR is essentially FCFS
B. A reasonable value of quantum is around 20-50 ms
C. If the quantum is very small, the CPU efficiency is reduced
D. None of the other choices
242) What are the allocation methods of disk blocks for files: *
A. Linked allocation
B. Contiguous allocation
C. All of the other choices
D. Indexed allocation
243) Assume jobs A-D arrive in quick succession in the READY queue. Using round robin
scheduling (quantum=4), the average turnaround time for each job is ____. *
A. 5 B.20 C. 18.25 D.73
244) What is interrupt vector? *
A. Part of memory which contains the addresses of interrupt handlers
B. A signal an I/O device sends to CPU
C. None of the other choices
D. A signal CPU sends to I/O device
245) Which of the following statements is incorrect about user mode and kernel mode? *
A. None of the other choices
B. In user mode, user program can execute only a subset of instructions
C. Having two modes of operation helps prevent user programs from accessing critical
instructions
D. In kernel mode, the OS can execute every instruction in the instruction set
246) Which of the following statements about the CPU’s handling interrupts is incorrect? *
A. None of the other choices
B. The CPU branches to a new instruction sequence
C. The processor ceases to execute the current sequence of instructions
D. The hardware saves the old PC location
247) Which strategy is used in the Banker’s algorithm for dealing with deadlocks? *
A. Deadlock prevention B. Deadlock ignorance
C. Deadlock avoidance D. Deadlock detection
248) Which deadlock condition does order resources numerically attack? *
A. Mutual exclusion B. No preemption
C. Hold and wait D. None of the other choices
249) Dijkstra’s Banker’s Algorithm require the system to maintain the resource information for
each process, including (choose 1 answer only): *
A count of the system’s total resources
The maximum resources that can be requested by the process
The maximum resources that can be requested by the process and The number of resources
currently acquired by the process
The number of resources currently acquired by the process
250) Which of the following statements is incorrect about I/O using DMA? *
DMA helps free up the CPU during the I/O to do other work
In essence, DMA is programmed I/O, except the fact that DMA, instead of the CPU, does all
the work
DMA helps reduce the number of interrupts
None of the other choices
251) The I/O technique where the processor busily waits for an I/O operation to complete is
called: *
Direct Memory Access (DMA)
Interrupt-driven I/O
Programmed I/O
None of the other choices
252) A table in main memory storing linked list allocation of disk blocks is called: *
File list table Disk allocation table
Linked list table File allocation table
253) Personal desktop computers use a __________ operating system. *
single-user, single-task
single-user, multitask
real-time
multiuser
254) The simplest way to break a deadlock is to *
rollback
kills one of the processes
preempt a resource
locks one of the processes
255) The special files are (choose 1 answer only): *
character special file
none of the other choices
character special files and block special files
block special file
257) In general, which is the best technique for I/O Data transfer? *
Programmed I/O
Direct Memory Access
None of the other choices
Interrupt-Driven I/O
258) Assume that the Page Table below is in effect. The number of lines per page is 400. The
actual memory location for line 433 is ____. *
1/1
1
33
4033
4000
259) Which of the following is not correct about hard links and symbolic links? *
Hard links do not require extra disk space
Symbolic links can point to files in the network
Symbolic links need space to store the name of the file pointed to
Hard links can point to files on other machines
260) Consider a swapping system in which the memory consists of the following hole sizes: 10
K, 4 K, 20 K, 15 K, 9 K. Assume worst fit algorithm is used. Which holes are taken for
successive segment requests of 8 K, 12 K, 10 K? *
9 K, 15 K, 10 K
10 K, 20 K, 15 K
None of the other choices
20 K, 15 K, left over of 20 K
261) A computer has four page frames. The time of loading, time of last access, and the R and
M bits for each page are as shown below (the times are in clock ticks). Which page will
Second Chance replace? *
1/1
3
1
0
2
262) Which statement about disabling interrupts to resolve race conditions is wrong? *
In theory, a program can disable interrupts when it enters a critical section, and re-enable
interrupts when finished with a critical section, to eliminate race conditions
Programs with infinite loops in their critical sections are a significant problem with the
interrupt-based approach
Disabling/enabling interrupts may negatively affect the I/O system
User-mode programs are the best place to invoke disableInterrupt()
Correct answer
In theory, a program can disable interrupts when it enters a critical section, and re-enable
interrupts when finished with a critical section, to eliminate race conditions
263) In a directed graphs model, a possible of deadlock can occur: *
If graph contains a cycle and only one instance per resource type
If graph contains no cycle
None of the others
If graph contains a cycle and several instances per resource type
264) ____ is the partitioning of a single server, each of which can support a different
operating *
Multiprocessing
Multithreading
Virtualization
Shared processing
265) Which of the following statements about segmentation is false? *
None of the other choices
Sharing of procedures between different users can be facilitated
The total address space can be more than the size of physical memory
There are several linear address spaces
266) Which of the following is an advantage of Memory-mapped I/O? *
Using memory-mapped I/O, caching a device control register is not acceptable
Since the control registers of devices are mapped into the memory space, device drivers can
be written without using Assembly language
None of the other choices
Since there is only one address space, all I/O devices must examine all memory references to
see which ones to response to
267) Which of the following actions generates an external interrupt? *
A system call instruction is executed.
A page that does not exist in the main memory is accessed by the virtual storage management.
Division by zero occurs.
An input/output operation is completed.
268) Working set model is used for: *
All of the other choices
Determining whether page replacement is needed
Finding the minimum number of frames necessary for a job so that jobs can be run without
“thrashing”
Finding the average number of frames a job will need to run smoothly
269) Information that must be saved prior to the processor transferring control to the interrupt
handler routine includes: *
PSW
PSW and PC
None of the other choices
PSW and Contents of processor registers
270) Which part of a disk is used to boot the computer? *
Super block
Root block
Boot block
MBR
271) Linux and __________ are often used as operating systems on supercomputers,
mainframes, and servers. *
Mac OS UNIX
None of the other choices Windows
272) Which mechanism is described as “the device controller sneaks in and steals an
occasional bus cycle from the CPU once in a while, delaying it slightly”? *
Cycle sneaking Cycle stealing
Interrupt stealing All of the others
273) Which of the following statements about semaphores is true? *
P and V (Down and Up) operations should be indivisible operations
All of the other choices
If several processes attempt a P(S) operation simultaneously, only one process should be
allowed to proceed
A semaphore implementation should guarantee that processes do not suffer indefinite
postponement
274) Five batch jobs A through E, arrive at a computer center at almost the same time. They
have estimated running times of 8, 6, 2, 10, and 4 minutes. Their (externally determined)
priorities are 3, 5, 2, 1, and 4, respectively, with 5 being the highest priority. Determine the
mean process average turnaround time for priority scheduling. Ignore process switching
overhead . *
10,8 minutes
12,8 minutes
16,8 minutes
54 minutes
275) Typical approaches to handle deadlocks do not include *
Avoidance
Deterrence
Prevention
Detection
276) What is not correct about contiguous allocation of files? *
It leads to excellent read performance
It is widely used on CD-ROMs
It is simple to implement
It does not cause disk fragmentation
277) Which of the following systems is used in time-critical environments where data must be
processed within a strict time limit? *
Real-time
Embedded
Interactive
Hybrid
278) What is the weakness of the Banker’s algorithm? *
Allowing the population of processes to vary over time
Enabling the number of resources to fluctuate
Enabling processes to hold their resources indefinitely
Requiring that processes state their maximum needs in advance
279) Which of the following statements is incorrect about Memory-mapped I/O and
Programmed I/O? *
Programmed I/O may use memory-mapped I/O to fulfill the I/O tasks
Memory-mapped I/O is a way to control the device
Programmed I/O is a way to actually carry out the I/O operations
None of the other choices
Correct answer
None of the other choices
280) Which of the following is a preemptive scheduling algorithm *
Shortest Job First
None of the other choices
FCFS
Round Robin
281) In which of the following environments preemption is essential? *
Interactive
Real time
None of the other choices
Batch
282) Consider a swapping system in which the memory consists of the following hole sizes: 10
K, 4 K, 20 K, 15 K, 9 K. Assume best fit algorithm is used. Which holes are taken for
successive segment requests of 8 K, 12 K, 10 K? *
9 K, 15 K, 10 K
None of the other choices
10 K, 20 K, 15 K
20 K, 15 K, 4 K
283) Which of the following is not a well-known technique for organizing the physical storage
blocks for a file? *
Indexed block allocation
Sparse block allocation
Contiguous block allocation
Linked list block allocation
284) Which of the following is not correct about the reliability of different RAID levels? *
1/1
In RAID levels 3, 4, 5 a single bit error in a word can be detected
There is no reliability support in RAID level 0
In RAID level 2, a single bit error in a word can be detected AND corrected
All RAID levels can survive one disk crash
285) A ____ is a portion of a process that can run independently *
1/1
miniprocess
subprocess
program
thread
286) With paging, when is the internal fragmentation possible? *
Page does not fit the frame
The virtual memory assigned to the program is less than the physical memory assigned to it
Such thing cannot happen
The last page of the job is less than the maximum page size
287) Which of the following statements is incorrect about Translation Look-aside Buffer
(TLB)? *
None of the other choices
TLB only maintains a subset of the entries stored in the full memory-based page table
The use of TLB eliminates the need for keeping a page table in memory
288) When there is a TLB miss the system needs to access the page table
A directory in UNIX/Linux consists of the following *
i-node number and file name
None of the other choices
file name, file size, location of the file on disk, date created, owner ID
File name, file size, location of the file on disk
289) A page fault means that we referenced a page *
that was not in main memory
that was outside the memory boundaries
that was not in secondary storage
with an incorrect I/O request
290 ) Which of the following statements is incorrect about Translation Look-aside Buffer
(TLB)? *
A TLB is sometimes known as an associative memory
None of the other choices
A TLB miss implies a disk operation will follow
Each entry of a TLB contains the information about one page, including the virtual page
number and the corresponding page frame
291) A disk queue with requests for I/O blocks on cylinders in orders: 10, 22, 20, 2, 36, 6, 38.
Assume that the disk head is initially at cylinder 9. How many cylinder do total head
movement using SSF algorithms? *
67
43
45
None of the others
292) Each of the following characteristics applies to deadlock avoidance except *
Inherently conservative strategy
Widely used in modern operating systems
None of the other choices
Relying on ability to predict effect of satisfying allocation requests
293) Consider the following state of a system with four processes P1, P2, P3 and P4 and five
types of resources RS1, RS2, RS3, RS4 and RS5 as figure below. Deadlocked processes are
___ *
1/1
P2, P3
P1, P2
P1, P3
P1, P4
294) Which of the following statements about interrupts and trap instructions is incorrect? *
A trap instruction is a software-generated interrupt
None of the other choices
An interrupt is a hardware-generated change of control flow within the system
An interrupt handler deals with the cause of the interrupt
All deadlocks involve conflicting needs for resources by *
None of the other choices
One or more processes
Two or more processes
Three or more processes
295) Which of the following synchronization mechanisms does not rely on busy-waiting? *
Strict alternation
Lock variables
Peterson’s algorithm
Semaphores
296) The File Manager writes the volume name and other descriptive information on an easy-
to-access place on each unit: ____ of the CD or DVD *
the outermost part
stored at the beginning of the volume
immediately following the master file directory
the innermost part
297) Which of the following process state transitions is illegal? *
blocked -> ready blocked -> running
running -> ready ready -> running
298) Which of the following is a hardware solution to the critical region problem? *
TSL None of the other choices
Semaphore Shared memory
299) Which of the following is specified to indicate the directory where the file is located? *
Path name Extension
Sub-directory Root director
300 )Which of the following conditions of semaphore variable “s” implies a busy critical
region? *
1/1
s = 0 s > 0 s < 0 None of the other choices

Weitere ähnliche Inhalte

Was ist angesagt?

Chương 1, tư tưởng hchinh
Chương 1, tư tưởng hchinhChương 1, tư tưởng hchinh
Chương 1, tư tưởng hchinhmai_mai_yb
 
Phan 1 may tinh can ban - dap an
Phan 1   may tinh can ban - dap anPhan 1   may tinh can ban - dap an
Phan 1 may tinh can ban - dap anVũ Ngọc Tuấn
 
Phat trien cong dong
Phat trien cong dongPhat trien cong dong
Phat trien cong dongforeman
 
TƯ TƯỞNG HỒ CHÍ MINH VỀ CHỦ NGHĨA XÃ HỘI
TƯ TƯỞNG HỒ CHÍ MINH VỀ CHỦ NGHĨA XÃ HỘITƯ TƯỞNG HỒ CHÍ MINH VỀ CHỦ NGHĨA XÃ HỘI
TƯ TƯỞNG HỒ CHÍ MINH VỀ CHỦ NGHĨA XÃ HỘIBee Bee
 
Câu hỏi và lời giải nguyên lý chủ nghĩa Mác - Lê Nin ZALO 093 189 2701
Câu hỏi và lời giải nguyên lý chủ nghĩa Mác - Lê Nin ZALO 093 189 2701Câu hỏi và lời giải nguyên lý chủ nghĩa Mác - Lê Nin ZALO 093 189 2701
Câu hỏi và lời giải nguyên lý chủ nghĩa Mác - Lê Nin ZALO 093 189 2701Viết thuê báo cáo thực tập giá rẻ
 
Tư Tưởng HCM về Tính Tất Yếu của CNXH và Con đường quá độ
Tư Tưởng HCM về Tính Tất Yếu của CNXH và Con đường quá độTư Tưởng HCM về Tính Tất Yếu của CNXH và Con đường quá độ
Tư Tưởng HCM về Tính Tất Yếu của CNXH và Con đường quá độĐức Lê
 
Hiểu về bạo lực gia đình
Hiểu về bạo lực gia đìnhHiểu về bạo lực gia đình
Hiểu về bạo lực gia đìnhphongnq
 
300 câu hỏi trắc nghiệm lý luận chính trị ( có đáp án )201 300
300 câu hỏi trắc nghiệm lý luận chính trị ( có đáp án )201 300300 câu hỏi trắc nghiệm lý luận chính trị ( có đáp án )201 300
300 câu hỏi trắc nghiệm lý luận chính trị ( có đáp án )201 300ghost243
 
Vấn nạn bạo lực học đường
Vấn nạn bạo lực học đường Vấn nạn bạo lực học đường
Vấn nạn bạo lực học đường Dat Ngo
 
Slide thuyết trình - Tư tưởng Hồ Chí Minh
Slide thuyết trình - Tư tưởng Hồ Chí MinhSlide thuyết trình - Tư tưởng Hồ Chí Minh
Slide thuyết trình - Tư tưởng Hồ Chí MinhNgọc Hưng
 
56 câu hỏi tự luận và đáp án môn Tư tưởng Hồ Chí Minh
56 câu hỏi tự luận và đáp án môn Tư tưởng Hồ Chí Minh 56 câu hỏi tự luận và đáp án môn Tư tưởng Hồ Chí Minh
56 câu hỏi tự luận và đáp án môn Tư tưởng Hồ Chí Minh Phước Nguyễn
 
Bài giảng dao động kỹ thuật - Đặng Văn hiếu
Bài giảng dao động kỹ thuật  - Đặng Văn hiếuBài giảng dao động kỹ thuật  - Đặng Văn hiếu
Bài giảng dao động kỹ thuật - Đặng Văn hiếuTrung Thanh Nguyen
 
Kiến trúc máy tính và hợp ngữ bài 04
Kiến trúc máy tính và hợp ngữ bài 04Kiến trúc máy tính và hợp ngữ bài 04
Kiến trúc máy tính và hợp ngữ bài 04Nhóc Nhóc
 
Bài tiểu luận lịch sử đảng cộng sản việt nam
Bài tiểu luận lịch sử đảng cộng sản việt namBài tiểu luận lịch sử đảng cộng sản việt nam
Bài tiểu luận lịch sử đảng cộng sản việt namvoxeoto68
 
Hệ điều hành (chương 3)
Hệ điều hành (chương 3)Hệ điều hành (chương 3)
Hệ điều hành (chương 3)realpotter
 
Bài giảng môn xác suất thống kê
Bài giảng môn xác suất thống kêBài giảng môn xác suất thống kê
Bài giảng môn xác suất thống kêHọc Huỳnh Bá
 

Was ist angesagt? (20)

Chương 1, tư tưởng hchinh
Chương 1, tư tưởng hchinhChương 1, tư tưởng hchinh
Chương 1, tư tưởng hchinh
 
Phan 1 may tinh can ban - dap an
Phan 1   may tinh can ban - dap anPhan 1   may tinh can ban - dap an
Phan 1 may tinh can ban - dap an
 
Phat trien cong dong
Phat trien cong dongPhat trien cong dong
Phat trien cong dong
 
LV: Công tác xã hội cá nhân trong việc hỗ trợ người cao tuổi tại xã Minh Quang.
LV: Công tác xã hội cá nhân trong việc hỗ trợ người cao tuổi tại xã Minh Quang.LV: Công tác xã hội cá nhân trong việc hỗ trợ người cao tuổi tại xã Minh Quang.
LV: Công tác xã hội cá nhân trong việc hỗ trợ người cao tuổi tại xã Minh Quang.
 
TƯ TƯỞNG HỒ CHÍ MINH VỀ CHỦ NGHĨA XÃ HỘI
TƯ TƯỞNG HỒ CHÍ MINH VỀ CHỦ NGHĨA XÃ HỘITƯ TƯỞNG HỒ CHÍ MINH VỀ CHỦ NGHĨA XÃ HỘI
TƯ TƯỞNG HỒ CHÍ MINH VỀ CHỦ NGHĨA XÃ HỘI
 
Câu hỏi và lời giải nguyên lý chủ nghĩa Mác - Lê Nin ZALO 093 189 2701
Câu hỏi và lời giải nguyên lý chủ nghĩa Mác - Lê Nin ZALO 093 189 2701Câu hỏi và lời giải nguyên lý chủ nghĩa Mác - Lê Nin ZALO 093 189 2701
Câu hỏi và lời giải nguyên lý chủ nghĩa Mác - Lê Nin ZALO 093 189 2701
 
Tư Tưởng HCM về Tính Tất Yếu của CNXH và Con đường quá độ
Tư Tưởng HCM về Tính Tất Yếu của CNXH và Con đường quá độTư Tưởng HCM về Tính Tất Yếu của CNXH và Con đường quá độ
Tư Tưởng HCM về Tính Tất Yếu của CNXH và Con đường quá độ
 
Hiểu về bạo lực gia đình
Hiểu về bạo lực gia đìnhHiểu về bạo lực gia đình
Hiểu về bạo lực gia đình
 
300 câu hỏi trắc nghiệm lý luận chính trị ( có đáp án )201 300
300 câu hỏi trắc nghiệm lý luận chính trị ( có đáp án )201 300300 câu hỏi trắc nghiệm lý luận chính trị ( có đáp án )201 300
300 câu hỏi trắc nghiệm lý luận chính trị ( có đáp án )201 300
 
Vấn nạn bạo lực học đường
Vấn nạn bạo lực học đường Vấn nạn bạo lực học đường
Vấn nạn bạo lực học đường
 
Slide thuyết trình - Tư tưởng Hồ Chí Minh
Slide thuyết trình - Tư tưởng Hồ Chí MinhSlide thuyết trình - Tư tưởng Hồ Chí Minh
Slide thuyết trình - Tư tưởng Hồ Chí Minh
 
Game show Đuổi hình bắt chữ
Game show Đuổi hình bắt chữGame show Đuổi hình bắt chữ
Game show Đuổi hình bắt chữ
 
Luận văn: Chăm sóc sức khỏe tinh thần cho công nhân lao động
Luận văn: Chăm sóc sức khỏe tinh thần cho công nhân lao độngLuận văn: Chăm sóc sức khỏe tinh thần cho công nhân lao động
Luận văn: Chăm sóc sức khỏe tinh thần cho công nhân lao động
 
56 câu hỏi tự luận và đáp án môn Tư tưởng Hồ Chí Minh
56 câu hỏi tự luận và đáp án môn Tư tưởng Hồ Chí Minh 56 câu hỏi tự luận và đáp án môn Tư tưởng Hồ Chí Minh
56 câu hỏi tự luận và đáp án môn Tư tưởng Hồ Chí Minh
 
Bài giảng dao động kỹ thuật - Đặng Văn hiếu
Bài giảng dao động kỹ thuật  - Đặng Văn hiếuBài giảng dao động kỹ thuật  - Đặng Văn hiếu
Bài giảng dao động kỹ thuật - Đặng Văn hiếu
 
Kiến trúc máy tính và hợp ngữ bài 04
Kiến trúc máy tính và hợp ngữ bài 04Kiến trúc máy tính và hợp ngữ bài 04
Kiến trúc máy tính và hợp ngữ bài 04
 
Bài tiểu luận lịch sử đảng cộng sản việt nam
Bài tiểu luận lịch sử đảng cộng sản việt namBài tiểu luận lịch sử đảng cộng sản việt nam
Bài tiểu luận lịch sử đảng cộng sản việt nam
 
Hệ điều hành (chương 3)
Hệ điều hành (chương 3)Hệ điều hành (chương 3)
Hệ điều hành (chương 3)
 
CÂU HỎI và ĐÁP ÁN ôn thi Môn Triết học - cao học ( Thạc sĩ).
CÂU HỎI và ĐÁP ÁN ôn thi Môn Triết học - cao học ( Thạc sĩ).CÂU HỎI và ĐÁP ÁN ôn thi Môn Triết học - cao học ( Thạc sĩ).
CÂU HỎI và ĐÁP ÁN ôn thi Môn Triết học - cao học ( Thạc sĩ).
 
Bài giảng môn xác suất thống kê
Bài giảng môn xác suất thống kêBài giảng môn xác suất thống kê
Bài giảng môn xác suất thống kê
 

Ähnlich wie ANHNH OSG202 ĐỀ 1 CH

Bt0062 fundamentals of it model question paper
Bt0062 fundamentals of it model question paperBt0062 fundamentals of it model question paper
Bt0062 fundamentals of it model question paperAnimish Puttu
 
Assignment unix & shell programming
Assignment  unix  & shell programmingAssignment  unix  & shell programming
Assignment unix & shell programmingMohit Aggarwal
 
Computer knowledge-old-papers
Computer knowledge-old-papersComputer knowledge-old-papers
Computer knowledge-old-papersneha rawat
 
Collection of-cs-multiple-choice-questions-mcqs
Collection of-cs-multiple-choice-questions-mcqsCollection of-cs-multiple-choice-questions-mcqs
Collection of-cs-multiple-choice-questions-mcqsShusil Baral
 
Samples of competitive examination questions: part II
Samples of competitive examination questions: part IISamples of competitive examination questions: part II
Samples of competitive examination questions: part IIAli I. Al-Mosawi
 
INTRODUCTION TO COMPUTING.pdf
INTRODUCTION TO COMPUTING.pdfINTRODUCTION TO COMPUTING.pdf
INTRODUCTION TO COMPUTING.pdfoscardarius
 
DIGITAL FLUENCY MULTIPLE QUESTION ANSWERS
DIGITAL FLUENCY MULTIPLE QUESTION ANSWERSDIGITAL FLUENCY MULTIPLE QUESTION ANSWERS
DIGITAL FLUENCY MULTIPLE QUESTION ANSWERSsddppml
 
Basic computer question
Basic computer questionBasic computer question
Basic computer questionABHISHEK KUMAR
 
Computer general awareness bank po's, bank clerk
Computer general awareness bank po's, bank clerkComputer general awareness bank po's, bank clerk
Computer general awareness bank po's, bank clerksuvendu83
 
1)Today, the overwhelming world leader in microprocessor sales i.pdf
1)Today, the overwhelming world leader in microprocessor sales i.pdf1)Today, the overwhelming world leader in microprocessor sales i.pdf
1)Today, the overwhelming world leader in microprocessor sales i.pdfisenbergwarne4100
 
Digital Planet Tomorrows Technology and You Complete 10th Edition Beekman Tes...
Digital Planet Tomorrows Technology and You Complete 10th Edition Beekman Tes...Digital Planet Tomorrows Technology and You Complete 10th Edition Beekman Tes...
Digital Planet Tomorrows Technology and You Complete 10th Edition Beekman Tes...Germaneas
 
Axes Tech
Axes TechAxes Tech
Axes Techncct
 
computer basics from bismark
computer basics from bismark computer basics from bismark
computer basics from bismark BISMARK AMOAH
 
資管所作業系統補充考卷(適用交大、政大、中山、成大)
資管所作業系統補充考卷(適用交大、政大、中山、成大)資管所作業系統補充考卷(適用交大、政大、中山、成大)
資管所作業系統補充考卷(適用交大、政大、中山、成大)逸 張
 
Basic computer question
Basic computer questionBasic computer question
Basic computer questionABHISHEK KUMAR
 

Ähnlich wie ANHNH OSG202 ĐỀ 1 CH (20)

Bt0062 fundamentals of it model question paper
Bt0062 fundamentals of it model question paperBt0062 fundamentals of it model question paper
Bt0062 fundamentals of it model question paper
 
Assignment unix & shell programming
Assignment  unix  & shell programmingAssignment  unix  & shell programming
Assignment unix & shell programming
 
Computer knowledge-old-papers
Computer knowledge-old-papersComputer knowledge-old-papers
Computer knowledge-old-papers
 
RTOS.docx
RTOS.docxRTOS.docx
RTOS.docx
 
Collection of-cs-multiple-choice-questions-mcqs
Collection of-cs-multiple-choice-questions-mcqsCollection of-cs-multiple-choice-questions-mcqs
Collection of-cs-multiple-choice-questions-mcqs
 
Samples of competitive examination questions: part II
Samples of competitive examination questions: part IISamples of competitive examination questions: part II
Samples of competitive examination questions: part II
 
final_2014.pdf
final_2014.pdffinal_2014.pdf
final_2014.pdf
 
INTRODUCTION TO COMPUTING.pdf
INTRODUCTION TO COMPUTING.pdfINTRODUCTION TO COMPUTING.pdf
INTRODUCTION TO COMPUTING.pdf
 
DIGITAL FLUENCY MULTIPLE QUESTION ANSWERS
DIGITAL FLUENCY MULTIPLE QUESTION ANSWERSDIGITAL FLUENCY MULTIPLE QUESTION ANSWERS
DIGITAL FLUENCY MULTIPLE QUESTION ANSWERS
 
Operating system quiz
Operating system quizOperating system quiz
Operating system quiz
 
Basic computer question
Basic computer questionBasic computer question
Basic computer question
 
Computer general awareness bank po's, bank clerk
Computer general awareness bank po's, bank clerkComputer general awareness bank po's, bank clerk
Computer general awareness bank po's, bank clerk
 
1)Today, the overwhelming world leader in microprocessor sales i.pdf
1)Today, the overwhelming world leader in microprocessor sales i.pdf1)Today, the overwhelming world leader in microprocessor sales i.pdf
1)Today, the overwhelming world leader in microprocessor sales i.pdf
 
Digital Planet Tomorrows Technology and You Complete 10th Edition Beekman Tes...
Digital Planet Tomorrows Technology and You Complete 10th Edition Beekman Tes...Digital Planet Tomorrows Technology and You Complete 10th Edition Beekman Tes...
Digital Planet Tomorrows Technology and You Complete 10th Edition Beekman Tes...
 
Axes Tech
Axes TechAxes Tech
Axes Tech
 
chapter-3-digital-forensics.pdf
chapter-3-digital-forensics.pdfchapter-3-digital-forensics.pdf
chapter-3-digital-forensics.pdf
 
computer basics from bismark
computer basics from bismark computer basics from bismark
computer basics from bismark
 
Big data quiz
Big data quizBig data quiz
Big data quiz
 
資管所作業系統補充考卷(適用交大、政大、中山、成大)
資管所作業系統補充考卷(適用交大、政大、中山、成大)資管所作業系統補充考卷(適用交大、政大、中山、成大)
資管所作業系統補充考卷(適用交大、政大、中山、成大)
 
Basic computer question
Basic computer questionBasic computer question
Basic computer question
 

Kürzlich hochgeladen

THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSTHE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSRoshniSingh312153
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiBlayneRush1
 
Alexis OConnell mugshot Lexileeyogi 512-840-8791
Alexis OConnell mugshot Lexileeyogi 512-840-8791Alexis OConnell mugshot Lexileeyogi 512-840-8791
Alexis OConnell mugshot Lexileeyogi 512-840-8791BlayneRush1
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.2020000445musaib
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaAbheet Mangleek
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
Conditions Restricting Transfer Under TPA,1882
Conditions Restricting Transfer Under TPA,1882Conditions Restricting Transfer Under TPA,1882
Conditions Restricting Transfer Under TPA,18822020000445musaib
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicableSaraSantiago44
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxAdityasinhRana4
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsAbdul-Hakim Shabazz
 
Illinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guideIllinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guideillinoisworknet11
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxAnto Jebin
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksFinlaw Associates
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Centerejlfernandez22
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeBlayneRush1
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfssuser3e15612
 
Guide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docxGuide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docxjennysansano2
 

Kürzlich hochgeladen (20)

THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSTHE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
 
Alexis OConnell mugshot Lexileeyogi 512-840-8791
Alexis OConnell mugshot Lexileeyogi 512-840-8791Alexis OConnell mugshot Lexileeyogi 512-840-8791
Alexis OConnell mugshot Lexileeyogi 512-840-8791
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in India
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
Conditions Restricting Transfer Under TPA,1882
Conditions Restricting Transfer Under TPA,1882Conditions Restricting Transfer Under TPA,1882
Conditions Restricting Transfer Under TPA,1882
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicable
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptx
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
 
Illinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guideIllinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guide
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Center
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
 
Guide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docxGuide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docx
 

ANHNH OSG202 ĐỀ 1 CH

  • 1. ANHNH OSG202 ĐỀ 1 CH 1)_____ is a small computer that fits in a shirt pocket and performs a small number of functions, such as an electronic address book and memo pad * A. Personal Digital Assistant B. Personal Device C. Personal Computer D. Personal Operating System 2)Each process is associated with _________ * A. address space, set of program’s source files, pointer, etc B. address memory, linker, compiler, etc C. all of the others D. address space, set of resources, registers, etc 3)How many ways are Thread implemented? * A.1 B.2 C.3 D.4 4)The Joliet Extensions provide ________ * A. Directory nesting deeper than 8 levels B. Directory names with extensions C. All of the others D. Long file name is supported Unicode character 5)A disk queue with requests for I/O blocks on cylinders in orders: 10, 22, 20, 2, 40, 6, 38. Assume that the disk head is initially at cylinder 9. How many cylinders do Total head movement using SSF algorithms? * A. None of the others B. 69 C. 47 D. 45 6)What’s different between preemptable and non-preemptable resources? * A. All of the others B. Effecting on process or system can occur when those resources are taken way C. None of the others D. Preemptable resources can be separated 7)Which of the following statement is a disadvantage of separating I/O and memory space? * A. Caching a device control register would be disastrous B. The set of all the I/O ports is protected so that the ordinary users must use 2 instructions C. All of the others D. Since the control registers of devices are mapped into the memory space, device drivers can be written without using Assembly language 8)Which of the following synchronization mechanisms does rely on busy waiting? * A. All of the others B. Peterson's algorithm C. Monitors D. Message passing
  • 2. 9)Rearrange the layers in I/O software starting at the bottom: 1. User-level I/O software; 2. Device drivers; 3. Interrupt handlers; 4. Hardware; 5. Device-independent OS software. * A. 15234 B. 12345 C. 54321 D. 43251 10)Which deadlock condition does order resources numerically attack? * A. Hold and wait B. Circular wait C. Mutual exclusion D. None of the others 11)How many ways are to used to keep track of free block in disk space management? * A. A bitmap method B. A linked list method C. All of the others D. A indexed method 12)Which method is used to prevent the communication deadlock? * A. Acknowledge signal B. Handling alarm C. Timeouts D. All of the others 13)An interrupt that does not meet these requirements is called a(n) ______ * A. Required interrupt B. Precise interrupt C. Disappointed interrupt D. Imprecise interrupt 14)If there are 64 pages and the page size is 4096 words, what is the length of logical address? * A.12 bits B. 8 bits C. 16 bits D. 18 bits 15)Suppose a virtual address space of 2^24 words and the page size is 2^12 words. If the virtual address is 1234567 in Hexadecimal, what would be the page number in Hexadecimal? * A. 123 B. 1234 C. 246 D. 2468 16)What is a “tripping” in RAID? * A. Get undressed B. All of the others C. Take away possessions from someone D. Distributing data over multiple drives 17)Which statement about the Producer-Consumer Problem to get trouble is true? * A. The wake up signal is lost B. All of the others C. The consumer and producer will sleep forever D. Access to count variable is unconstrained 18)Which operating system structure is communication between requesting process and responding process by message passing? * A. Monolithic Systems B. All of the others C. Client – Server Model D. MS – DOS 19)A system has five processes and three allocated resources. The current allocation and request needs are as following figure. What do the processes progress in sequence?
  • 3. A. ABCDE B. ADCEB C. ADECB D. ACDEB 20)Where is all the information about each process stored in operating systems? * A. Process table B. Program table C. Page table D. Virtual table 21)Which problem is described two following statements? 1. No reader will be kept waiting unless a writer has already obtained permission to use the shared object. Or, readers have higher priorities; 2. Once a writer is ready, the writer performs its write as soon as possible * A. Readers-Writers B. Bankers C. All of the others D. Producer-Consumer 22)Which of the following is a synchronization primitive that is implemented by hardware? * A. Lock variables B. The TSL instructions C. Peterson's Solution D. Strict Alternation 23)Five batch jobs A through E, arrive at a computer center at almost the same time. They have estimated running times of 8, 6, 2, 10, and 4 minutes. Their (externally determined) priorities are 3, 5, 2, 1, and 4, respectively, with 5 being the highest priority. Determine the mean process 'average waiting time for priority scheduling'. Ignore process switching overhead. * A. 54 minutes B. 12,8 minutes C. 10,8 minutes D.16,8 minutes 24)Which strategy is a simplest design for speeding up Paging? * A. Page table is loaded into disk B. Page table is loaded into TLB C. Page table is loaded into registers D. Page table is loaded into main memory 25)Which solution is used to solve the “missing block” problem in file system consistency? * A. The file system checker allocate the free block, then copy the duplicate block in used to there
  • 4. B. None of the others C. The file system checker adds the missing blocks to the free list D. The file system checker rebuilds the free list 26)Which are file types? * A. Block special files B. Regular files C. Character special files D. All of the others 27)A(n) _________ is provided to make system calls from some programming languages * A. None of the others B. pointer C. operator D. procedure library 28)In a directed graphs model, a possible of deadlock can occur: * A. None of the others B. If graph contains a cycle and only one instance process per resource type C. If graph contains a cycle and several instances per resource type D. If graph contains no cycle 29)Operating system abstraction supports the ability to have ______ operation even when there is only one CPU available * A. None of the others B. parallel C. multiple D. pseudoparallelism 30)Which solutions are used to solve the shared libraries? * A. Relocation on the fly and position-independent code B. None of the others C. Static reallocation and position-independent code D. Copy on write and position-independent code 31)Why is Shortest Job First scheduling algorithm optimal? * A. Each process is assigned a time interval during which it is allowed to run B. None of the others C. Minimize average waiting time of each process D. Each process is assigned a priority that the process with the highest priority is allowed to run 32) Five batch jobs A through E, arrive at a computer center at almost the same time. They have estimated running times of 8, 6, 2, 10, and 4 minutes and arrival times at 0, 4, 6, 10 and 12. Determine the mean process 'average turnaround time' for FCFS (First-Come First Served) scheduling. Ignore process switching overhead. * A. 6,4 minutes B. 62 minutes C. 12,4 minutes D. 32 minute 33)A system has five processes and three allocated resources. The current allocation and maximum needs are as following figure. What is the smallest value of x for which this is a safe state? *
  • 5. A. 3 B. 2 C. 1 D. 0 34)To specify an address in this segmented memory, the _____ form is used * A. <segment-number, offset> B.<virtual address, offset> C.<process, offset D. <physical address, offset> 35) What is the “sequential processes” concept? * A. There are both many CPU and many PC B. None of the others C. All process is executed in concurrency D. No concurrency inside a process; everything happens sequentially 36)Consider an i-node which contains 10 direct addresses of 4 bytes each and all disk blocks are 1 KB. Also consider that the i-node contains an additional “single and double indirect address” that is used for containing more disk block addresses. What is the largest possible file? * A. 10 KB B. 65536 KB C. 65802 KB D. 266 KB 37)The number on the address lines is used as an index into a table to fetch a new program counter. What is the table’s name? * A. Interrupt table B. Address table C. Interrupt vector D. Address lines table 38)Which method is used to implement files with file’s size larger than 2 GB in UNIX V7? * A. FAT 16 B. FAT 32 C. i-node with single indirect block D. i-node with triple indirect block 39.) Which method is used to implement files to keep each file as a linked list of disk blocks? * A. Contiguous Allocation B. Linked List Allocation C. i-node D. File Allocation Table 40) In “No Memory Abstraction”, the static relocation technique is ____ *
  • 6. A. After the program is loaded at address n, the constant n is stored at a particular register. B. None of the others C. When the program is compiled, the address of program is added with the constant value where the program will be loaded D. When the program is loaded at address n, the constant n was added to every program address 41) Which mechanism is described as “the device controller sneaks in and steals an occasional bus cycle from the CPU once in a while, delaying it slightly”? * A. Interrupt stealing B. All of the others C. Cycle sneaking D. Cycle stealing 42) Which concept is described as “disk sectors are just numbered consecutively starting at 0, without regard to the disk geometry”? * A. Logical block addressing B. Physical block addressing C. Virtual block addressing D. None of the others 43) What is one directory containing all files called in the simplest form of directory system? * A. Parent directory B. Root directory C. Volume D. User directory 44) A disk queue with requests for I/O blocks on cylinders in orders: 10, 22, 20, 2, 40, 6, 38. Assume that the disk head is initially at cylinder 38. Which the ordering cylinder in progress do using a slight modification of elevator algorithms? * A. 38 38 40 22 20 10 6 2 B. 38 38 40 2 6 10 20 22 C. 38 38 22 20 10 6 2 40 D. 38 40 2 6 10 20 22 38 45) Which keyword is appropriate described in the following statement: “While memory sizes are increasing rapidly, software sizes are increasing much faster”? * A. swapping B. bloatware C. overlays D. paging 46) The File System Performance is implemented by _____ * A. Buffer cache B. Defragmenting Disks D. Block Read Ahead E. All of the others 47) One of way to prevent a deadlock is ________ * A. Kills one of the processes B. Rollback C. Spool everything D. Locks one of the processes 48) What is the correct approach with requesting the dedicated devices to solve deadlock using Ostrich algorithm? * A. The device driver stops the current jobs and releases the devices B. The device driver kills those requesting processes C. The device driver decides blocking and returning an error code D. All of the others
  • 7. 49) Assume that the Page Table below is in effect. The number of lines per page is 400. The actual memory location for line 1634 is ____. * A. 3 B. None of the others C. 4434 D. 1634 50) A memory free in 3 frames. How many times do the page fault occur? Assume that the running as the following page 7, 0 , 1, 2 , 0, 3, 0 , 4, 2 , 3 , 0 , 3 , 2 , 1, 2, 0, 1, 0 , 7 using LRU. * A. 7 times B. 6 times C. 12 times D. 13 times 51)What is the advantage of the exokernel scheme? * A. Try to use somebody else’s resource B. All of the others C. Maintain tables to remap disk address D. Save a layer of mapping 52) Assume jobs A-D arrive in quick succession in the READY queue. Using round robin scheduling (quantum=4), the average turnaround time for each job is ____. * A. 5 B. 73 C. 18.25 D. 20 53) What’s different between asynchronous and synchronous transfer in principles of I/O software? * A. None of the others B. All of the others C. The CPU starts the transfer and goes off to do something else until the data are available in the buffer D. The CPU starts the transfer and goes off to do something else until the interrupt arrives 54) A memory free in 3 frames. Which values do the page frame contain after the 4th page is accessed? Assume that the running as the following page 7, 0 , 1, 2 , 0, 3, 0 , 4, 2 , 3 , 0 , 3 , 2 , 1, 2, 0, 1, 0 , 7 using LRU. *
  • 8. A. 7, 0, 1 B. 4, 0, 3 C. 1, 0, 7 D. 3, 0, 4 55) Assume that process A-D make up the set of runnable processes on memory asB1 B2 B3 A1 A2 A5 A7 D3 D4 D6 C1 C6 C5. Suppose D gets a page fault. Which page is replaced using the local policy? Assume that the replaced page is always a last page. * A. B3 B. C5 C. D6 D. None of the others 56) Which mechanism is implemented by writing to the log file in file system management and optimization? * A. Log-Structured File Systems B. None of the others C. Virtual File Systems D. Journaling File Systems 57) Which of these statements about the Inverted Page Table are true? * A. An entry contains the pair (segment, virtual page) mapped into the corresponding page frame B. An entry contains the pair (process, virtual page) mapped into the corresponding page frame C. An entry contains the pair (segment, offset) mapped into the corresponding page frame D. An entry contains the pair (process, offset) mapped into the corresponding page frame 58) Consider a swapping system in which the memory consists of the following hole sizes: 10K, 4K, 20K, 15K, 9K. Assume worst fit algorithm is used. Which holes are taken for successive segment requests of 8K, 12K, 10K? * A. 9K, 15K, 10K B. 20K, 15K, 10K C. 10K, 15K, 20K D. 10K, 20K, 15K 59) Which thread does the arrival of a message cause the system to create a new thread to handle the message? * A. Upcall B. Pop-up C. Distributed D. Activator 60) The live lock is resolved by ________ * A. All of the others B. Killing the process itself. C. Restricting all users to one process, one open file, and one everything D. None of the others ĐỀ 2 CH 61) Which mechanism is described as “the device controller sneaks in and steals an occasional bus cycle from the CPU once in a while, delaying it slightly”? * A. Cycle stealing B. Interrupt stealing C. All of the others D. Cycle sneaking
  • 9. 62) A ____ is a portion of a process that can run independently * A. subprocess B. thread C. program D. miniprocess 63) Dijkstra’s Banker’s Algorithm require the system to maintain the resource information for each process, including (choose 1 answer only): * A. A count of the system’s total resources B. The number of resources currently acquired by the process C. The maximum resources that can be requested by the process and The number of resources currently acquired by the process D. The maximum resources that can be requested by the process 64) The special files are (choose 1 answer only): * A. block special file B. none of the other choices C. character special file D. character special files and block special files 65) Which of the following is an advantage of Memory-mapped I/O? * A. None of the other choices B. Since there is only one address space, all I/O devices must examine all memory references . to see which ones to response to C. Since the control registers of devices are mapped into the memory space, device drivers can be written without using Assembly language D. Using memory mapped I/O, caching a device control register is not acceptable 66) Which of the following statements is incorrect about Translation Look-aside Buffer (TLB)? * A. None of the other choices B. The use of TLB eliminates the need for keeping a page table in memory C. TLB only maintains a subset of the entries stored in the full memory-based page table D. When there is a TLB miss the system needs to access the page table 67) Linux and __________ are often used as operating systems on supercomputers, mainframes, and servers. * A. Windows B. UNIX C. Mac OS D. None of the other choices 68) Which of the following is not correct about the reliability of different RAID levels? * A. All RAID levels can survive one disk crash B. In RAID level 2, a single bit error in a word can be detected AND corrected C. In RAID levels 3, 4, 5 a single bit error in a word can be detected D. There is no reliability support in RAID level 0 69) Typical approaches to handle deadlocks do not include * A. Detection B. Deterrence C. Prevention D. Avoidance
  • 10. 70) Which of the following process state transitions is illegal? * A. blocked -> running B. ready -> running C. blocked -> ready D. running -> ready 71) Which of the following is not correct about hard links and symbolic links? * A. Symbolic links can point to files in the network B. Hard links can point to files on other machines C. Hard links do not require extra disk space D. Symbolic links need space to store the name of the file pointed to 72) What are the allocation methods of disk blocks for files: * A. Linked allocation B. Contiguous allocation C. All of the other choices D. Indexed allocation 73) The I/O technique where the processor busily waits for an I/O operation to complete is called: * A. None of the other choices B. Programmed I/O C. Direct Memory Access (DMA D. Interrupt-driven I/O 74) A page fault means that we referenced a page * A. that was outside the memory boundaries B. that was not in main memory C. that was not in secondary storage D. with an incorrect I/O request 75) Personal desktop computers use a __________ operating system. * A. real-time B. multiuser C. single-user, multitask D. single-user, single-task 76) Which of the following conditions of semaphore variable “s” implies a busy critical region? * A. s < 0 B. s = 0 C. None of the other choices D. s > 0 77) Which of the following synchronization mechanisms does not rely on busy-waiting? * A. Lock variables B. Semaphores C. Peterson’s algorithm. D. Strict alternation 78)Which strategy is used in the Banker’s algorithm for dealing with deadlocks? * A. Deadlock prevention B. Deadlock detection C. Deadlock avoidance D. Deadlock ignorance 79) What is not correct about contiguous allocation of files? * A. It is widely used on CD-ROMs B. It does not cause disk fragmentation C. It leads to excellent read performance
  • 11. D. It is simple to implement 80) Five batch jobs A through E, arrive at a computer center at almost the same time. They have estimated running times of 8, 6, 2, 10, and 4 minutes. Their (externally determined) priorities are 3, 5, 2, 1, and 4, respectively, with 5 being the highest priority. Determine the mean process average turnaround time for priority scheduling. Ignore process switching overhead . * A. 12,8 minutes B. 16,8 minutes C. 54 minutes D. 10,8 minutes 81) Which of the following statements about semaphores is true? * A. A semaphore implementation should guarantee that processes do not suffer indefinite postponement B.P and V (Down and Up) operations should be indivisible operations C. If several processes attempt a P(S) operation simultaneously, only one process should be allowed to proceed D. All of the other choices 82) Which of the following statements is incorrect about I/O using DMA? * A. DMA helps free up the CPU during the I/O to do other work B. None of the other choices C. In essence, DMA is programmed I/O, except the fact that DMA, instead of the CPU, does all the work D. DMA helps reduce the number of interrupts 83) Which of the following statements about segmentation is false? * A. Sharing of procedures between different users can be facilitated B. The total address space can be more than the size of physical memory C. None of the other choices D. There are several linear address spaces 84) A computer has four page frames. The time of loading, time of last access, and the R and M bits for each page are as shown below (the times are in clock ticks). Which page will Second Chance replace? * A. 0 B. 2 C. 3 D. 1
  • 12. 85.In general, which is the best technique for I/O Data transfer? * A. Direct Memory Access B. Programmed I/O C. Interrupt-Driven I/O D. None of the other choices 86) All deadlocks involve conflicting needs for resources by * A. Two or more processes B. One or more processes C. Three or more processes D. None of the other choices 87)Which of the following is a hardware solution to the critical region problem? * A.TSL B. Shared memory C. None of the other choices D.Semaphore 88) A directory in UNIX/Linux consists of the following * A. file name, file size, location of the file on disk B. i-node number and file name C. None of the other choices D. file name, file size, location of the file on disk, date created, owner ID 89)A table in main memory storing linked list allocation of disk blocks is called: * A. File allocation table B. File list table C. Disk allocation table D.. Linked list table 90)With paging, when is the internal fragmentation possible? * A. The virtual memory assigned to the program is less than the physical memory assigned to it B. The last page of the job is less than the maximum page size C. Page does not fit the frame D. Such thing cannot happen 91) Which of the following is not a well-known technique for organizing the physical storage blocks for a file? * A. Linked list block allocation B. Contiguous block allocation C. Indexed block allocation D. Sparse block allocation 92) A disk queue with requests for I/O blocks on cylinders in orders: 10, 22, 20, 2, 36, 6, 38. Assume that the disk head is initially at cylinder 9. How many cylinder do total head movement using SSF algorithms? * A. None of the others B. 43 C. 67 D.45 93) In which of the following environments preemption is essential? * A. Interactive
  • 13. B. Real time C. Batch D. None of the other choices 94) Assume that the Page Table below is in effect. The number of lines per page is 400. The actual memory location for line 433 is ____. * 1/1 A. 4000 B. 33 C. 4033 D.1 95)Consider the following state of a system with four processes P1, P2, P3 and P4 and five types of resources RS1, RS2, RS3, RS4 and RS5 as figure below. Deadlocked processes are ___ * A. P1, P4 B. P1, P2 C. P2, P3 D. P1, P3 96)Which of the following is specified to indicate the directory where the file is located? * A. Root directory B. Extension C. Sub-directory D. Path name 97) Which deadlock condition does order resources numerically attack? * A. Mutual exclusion B. None of the other choices C. No preemption D. Hold and wait 98) Which of the following actions generates an external interrupt? * A. A system call instruction is executed. B. An input/output operation is completed. C. A page that does not exist in the main memory is accessed by the virtual storage management.
  • 14. D. Division by zero occurs. 99) The simplest way to break a deadlock is to * A. kills one of the processes B. locks one of the processes C. preempt a resource D. rollback 100)Assume jobs A-D arrive in quick succession in the READY queue. Using round robin scheduling (quantum=4), the average turnaround time for each job is ____. * A. 5 B. 18.25 C. 73 D. 20 101) Which part of a disk is used to boot the computer? * A. MBR B. Boot block C. Root block D. Super block 102) Which of the following statements is incorrect about user mode and kernel mode? * A. In kernel mode, the OS can execute every instruction in the instruction set B. In user mode, user program can execute only a subset of instructions C. None of the other choices D.Having two modes of operation helps prevent user programs from accessing critical instructions 103) Consider a swapping system in which the memory consists of the following hole sizes: 10 K, 4 K, 20 K, 15 K, 9 K. Assume best fit algorithm is used. Which holes are taken for successive segment requests of 8 K, 12 K, 10 K? * A. 10 K, 20 K, 15 K B. 9 K, 15 K, 10 K C. None of the other choices D. 20 K, 15 K, 4 K 104) Which of the following is a preemptive scheduling algorithm * A. Shortest Job First B. None of the other choices C. FCFS D. Round Robin 105) Which of the following systems is used in time-critical environments where data must be processed within a strict time limit? * A. Interactive B. Hybrid C. Embedded D. Real-time 106) ____ is the partitioning of a single server, each of which can support a different operating * A. Multithreading B. Multiprocessing C. Virtualization D. Shared processing 107) The File Manager writes the volume name and other descriptive information on an easy- to-access place on each unit: ____ of the CD or DVD *
  • 15. A. stored at the beginning of the volume B. the innermost part C. the outermost part D. immediately following the master file directory 108) Which statement about disabling interrupts to resolve race conditions is wrong? * A. User-mode programs are the best place to invoke disableInterrupt() B. In theory, a program can disable interrupts when it enters a critical section, and re-enable interrupts when finished with a critical section, to eliminate race conditions C. Disabling/enabling interrupts may negatively affect the I/O system D. Programs with infinite loops in their critical sections are a significant problem with the interrupt-based approach 109) Working set model is used for: * A. Finding the average number of frames a job will need to run smoothly B. Finding the minimum number of frames necessary for a job so that jobs can be run without “thrashing” C. Determining whether page replacement is needed D. All of the other choices 110) Consider a swapping system in which the memory consists of the following hole sizes: 10 K, 4 K, 20 K, 15 K, 9 K. Assume worst fit algorithm is used. Which holes are taken for successive segment requests of 8 K, 12 K, 10 K? * A. None of the other choices B. 10 K, 20 K, 15 K C. 9 K, 15 K, 10 K D. 20 K, 15 K, left over of 20 K 111) Which is a wrong statement about the quantum used in Round Robin algorithm? * A. A reasonable value of quantum is around 20-50 ms B. None of the other choices C. If the quantum is very small, the CPU efficiency is reduced D. If the quantum is very large, RR is essentially FCFS 112) Which of the following statements about interrupts and trap instructions is incorrect? * A. An interrupt is a hardware-generated change of control flow within the system B. A trap instruction is a software-generated interrupt C. None of the other choices D. An interrupt handler deals with the cause of the interrupt 113) Which of the following statements is incorrect about Memory-mapped I/O and Programmed I/O? * A. None of the other choices B. Programmed I/O may use memory-mapped I/O to fulfill the I/O tasks C. Memory-mapped I/O is a way to control the device D. Programmed I/O is a way to actually carry out the I/O operations
  • 16. 114) What is the weakness of the Banker’s algorithm? * A. Enabling the number of resources to fluctuate B. Requiring that processes state their maximum needs in advance C. Allowing the population of processes to vary over time D. Enabling processes to hold their resources indefinitely 115) Which of the following statements about the CPU’s handling interrupts is incorrect? * A. The processor ceases to execute the current sequence of instructions B. The hardware saves the old PC location C. The CPU branches to a new instruction sequence D. None of the other choices 116) In a directed graphs model, a possible of deadlock can occur: * A. None of the others B. If graph contains no cycle C. If graph contains a cycle and only one instance per resource type D. If graph contains a cycle and several instances per resource type 117) What is interrupt vector? * A. None of the other choices B. A signal an I/O device sends to CPU C. A signal CPU sends to I/O device D. Part of memory which contains the addresses of interrupt handlers 118) Information that must be saved prior to the processor transferring control to the interrupt handler routine includes: * A. PSW and Contents of processor registers B. PSW and PC C. None of the other choices D. PSW 119) Which of the following statements is incorrect about Translation Look-aside Buffer (TLB)? * A.A TLB miss implies a disk operation will follow B. A TLB is sometimes known as an associative memory C. Each entry of a TLB contains the information about one page, including the virtual page number and the corresponding page frame D. None of the other choices 120) Each of the following characteristics applies to deadlock avoidance except * A. None of the other choices B. Inherently conservative strategy C. Relying on ability to predict effect of satisfying allocation requests
  • 17. D. Widely used in modern operating systems ĐỀ 4 CH 121)Assume jobs A-D arrive in quick succession in the READY queue. Using round robin scheduling (quantum=4), the turnaround time for job A is ____. * A.22 B. 20 C. 7 D. 24 122) Which does the power of CPU decrease to if it run at half speed? * A. None of the other choices B. 1/8 C. ¼ D. 1/2 123) A(n) _________ is provided to make system calls from some programming languages * A. procedure library B. operator C. none of the other choices D. pointer 124) What is correct about trap instructions and interrupts? * A. A trap instruction is caused by a user program to invoke functions in the OS kernel B. An interrupt is caused by an external event C. Trap instruction switches the execution mode of a CPU from the user mode to the kernel mode. D. All of the other choices 125) Which of the following is not a task of I/O management of OS? * A. Mapping files onto secondary storage B. Manage main memory for the devices using caching, buffering, and spooling C. Maintain and provide a general device-driver interfaces D. Drivers for specific hardware devices 126) Which method is used to implement files to keep each file as a linked list of disk blocks? * A. Linked List Allocation B. Contiguous Allocation C. i-node D. File Allocation Table 127) Assuming that it takes 10 nsec to copy a byte, how much time does it take to completely rewrite the screen of a 1200 x 800 pixels graphics with 24- bit color? * A. 28.8 msec B. 288 micro-sec C. 288 msec D. 28.8 micro-sec 128) Which is not a DVD Improvement on CDs to increase the capacity? * A. A kind laser (red, blue) B. Diameter of disc C. Smaller pits D. A tighter spiral 129) A simplest way to break a deadlock is to * A. rollback B. preempt a resource C. kills one of the processes D. locks one of the processes 130) Which of the following is an Operating System component? * A. Space Management B. Speed Management C. Time Management D. Process Management 131) Each of the following characteristics applies to deadlock avoidance except *
  • 18. A. None of the other choices B. Inherently conservative strategy C. Widely used in modern operating systems D. Relying on ability to predict effect of satisfying resource allocation requests 132) A computer has four page-frames. The time of loading, time of last access, and the R and M bits for each page are as shown below (the times are in clock ticks). Which page will FIFO replace? * A. 1 B. 2 C. 0 D. 3 133) How much cylinder skew is needed for a 7200- RPM (rotate per minute) disk with the track-to-track seek time of 1 msec? The disk has 200 sectors of 512 bytes on each track. * A. 12 sectors B. 36 sectors C. 24 sectors D. 18 sectors 134) Of the three components of access time in a disk, ____ is the longest. * A. Delay time B. Transfer time C. Search time D. Seek time 135) An algorithm designed to detect starvation by tracking how long each job has been waiting for resources is the same concept as ____. * A. Aging B. Preemption C. Round robin D. Deadlock 136) Which FAT type is used, if the maximum partition size is 256 MB and the block size is 4KB? * A. FAT-32 B.FAT-12 C. None of the other choices D. FAT-16 137) To specify an address in this segmented memory, the _____ form is used * A. <process, offset> B. <physical address, offset> C. <segment-number, offset> D. <virtual address, offset> 138)Which of the following statements is not correct about Graphic adapter? * A. Supports different method of coding pixel color B. Contains a special memory called video RAM C. None of the other choices D. Supports some number of screen sizes (resolution) 139) Strategy used for dumping a disk to tapes is: *
  • 19. A. None of the other choices B. Both physical dump and logical dump C. Logical dump D. Physical dump 140) Assuming that it takes 10 nsec to copy a byte, how much time, does it take to completely rewrite the screen of a 150 characters x 20 line text mode memory-mapped screen? * A. 10 micro-sec B. 20 micro-sec C. 40 micro-sec D. 30 micro-sec 141) Dijkstra’s Banker's Algorithm require the system to maintain the resource information for each process, including: * A. The number of resources currently acquired by the process B. Both The maximum resources that can be requested and The number of resources currently acquired by the process C. A count of the system's total resources D. The maximum resources that can be requested by the process 142) The scheduling strategy where each process in the queue is given a certain amount of time. After this time has elapsed, the process is preempted and added to the end of the ready queue is referred to as: * A. Prioritization B. LIFO C. All of the other choices D. Round-Robin 143) ____ is the partitioning of a single server, each of which can support a different operating system. * A. Multiprocessing B. Shared processing C. Virtualization D. Multithreading 144) Failure to lock database records before updating them may result in a ____ between processes * A. Deadlock B. Livelock C. Struggle D. Race 145) Assume jobs A-D arrive at almost the same time in the READY queue. Determine the average turnaround time for Round Robin scheduling (quantum=2). Ignore process switching overhead. Job: A B C D; CPU cycle: 5 2 6 4 * A. 10.5 B. 12.5 C. 9.0 D. 5.5 146) Which RAID level duplicates all the disks? * A. 4 B. 2 C. 1 D. 3 147) Where should be put the page replacement algorithm In Mach model of Page fault handling with an external pager? * A. In the low-level MMU handler B. All of the other choices C. In the external pager running in user space D. In the page fault handler that is part of the kernel 148) In terms of main memory efficiency the method of “Backing up pages dynamically” in comparison with the method of “Paging to a static swap area” is * A. Nearly equal B. Equal C. Worse D. Better 149) Which is space efficiency, if 4KB-file using file system with 8KB-block? * A. 75% B. 50% C. 100% D. 25% 150) Personal desktop computers use a __________ operating system. * A. single-user, single-task B. multiuser C. real-time D. single-user, multitask
  • 20. 151) In modern printing systems, a disk accepts output from several users, Deadlock occurs when ____. * A. Too many users attempt to access the printer at the same time. B. The printer needs all of a job’s output before it will begin printing, but the spooling system fills the available disk space with only partially completed output. C. The network connection for the printer overflows with too many requests to use the printer. D. The buffer fills up with too many print jobs and the printer cannot decide which one to print. 152) Which RAID level employs a Hamming code to correct single bit errors and detect double bit errors? * A. 2 B. 1 C. 3 D. 4 153) Consider an i-node, which contains 10 direct addresses of 4 bytes each and all disk blocks are 1 KB. Also, consider that the i-node contains an additional “single indirect address” that is used for containing more disk block addresses. What is the largest possible file? * A. 264 KB B. 266 KB C. 262 KB D. 268 KB 154) Consider the following state of a system with four processes, P1, P2, P3 and P4, and five types of resources RS1, RS2, RS3, RS4 and RS5 as figure below. Deadlocked processes are: * 1 point A. P1, P4 B. P3, P4 C. P1, P2 D. P1, P3 155) What is the correct approach with the “No preemption condition” to prevent Deadlock? * A. Order resources numerically B. Spool everything C. Take resources away D. Request all resources initially 156) One of way to prevent a deadlock is ________ * A. Spool everything B. Kills one of the processes C. Locks one of the processes D. Rollback 157) Which ways are used to keep track of free block in disk space management? * A. None of the other choices
  • 21. B. Both linked list method and bitmap method C. A linked list method D. A bitmap method 158) The Joliet Extensions provide ________ * A. Long file name supported Unicode character B. All of the other choices C. Directory nesting deeper than 8 levels D. Directory names with extensions 159) Which is the maximum partition size, if the FAT type is FAT-32 and the block size is 4 KB? * A. 1 TB B. 256 MB C. 128 MB D. 512 MB 160) A disk queue with requests for I/O blocks on cylinders in orders: 10, 22, 20, 2, 40, 6, 38. Assume that the disk head is initially at cylinder 37. Which the ordering cylinder in progress do using a SSF algorithms? * A. 37 38 40 2 20 10 6 22 B. 37 38 40 2 6 10 20 22 C. 37 10 22 20 2 40 6 38 D. 37 38 40 22 20 10 6 2 161) Which deadlock condition does “Take resources away” attack? * A. Mutual exclusion B. No preemption C. Hold and wait D. Circular-wait condition 162) Which deadlock condition does “Request all resources initially” attack? * A. Hold and wait B. Circular-wait condition C. Mutual exclusion D. No preemption 163) A computer uses a programmable clock in square-wave mode. If 500 MHz crystal is used, what should be the value of the holding register to achieve a clock resolution of 10 msec (Clock tick)? * A. 500,000 B. 50,000 C. 50,000,000 D. 5,000,000 164) The File Manager writes the volume name and other descriptive information on an easy- to-access place on each unit: ____ of the CD or DVD * A. Immediately following the master file directory B. The outermost part C. The innermost part D. Stored at the beginning of the volume
  • 22. 165) Which is not a goal of a scheduling algorithm for batch systems? * A. Throughput B. Response time C. CPU utilization D. Turnaround time 166) Dual-layer, double-sided DVD can hold ____ . * A. 17 GB B. 9.4 GB C. 8.5 GB D. 4.7 GB 167) The methods determine where page is on the disk when it is paged out is * A. Backing up pages dynamically B. Paging to a static swap area C. Both Paging to a static swap area and Backing up pages dynamically D. None of the other choices 168) Which solutions are used to solve the shared libraries? * A. Static reallocation and position-independent code B. Position-independent code C. Relocation on the fly and position-independent code D. None of the other choices 169) A system has five processes and three allocated resources. The current allocation and maximum needs are as following figure. What is the smallest value of x for which this is a safe state? * 1 point A. 1 B. 2 C. 3 D. 0
  • 23. 170 )A disk queue with requests for I/O blocks on cylinders in orders: 10, 22, 20, 2, 40, 6, 38. Assume that the disk head is initially at cylinder 20. How many cylinder do Total head movement using FCFS? * A. None of the others B. 146 C. 58 D. 60 171) A page fault means that we referenced a page * A. With an incorrect I/O request B. That was not in secondary storage C. That was outside the memory boundaries D. That was not in main memory 172) Five batch jobs A through E, arrive at a computer center at almost the same time. They have estimated running times of 8, 6, 2, 10, and 4 minutes. Determine the average waiting time for FCFS scheduling. Ignore process switching overhead. * A . 18 minutes B.17 minutes C. 12,8 minutes D. 18.8 minutes 173) The scheme of ____ removes the possibility of a circular wait and therefore guarantees the removal of deadlocks. * A. Requesting all resources before job run B. Saving and restoring job state C/ Preemption D. Hierarchical ordering 174) Which is not attribute of MS-DOS file? * A. Lock B. Archived C. Read-Only D. Hidden, System 175) A simple structuring model for monolithic system includes: * A. A main program that invokes the requested service procedure B. A set of utility procedures that help the service procedures C. All of the other choices D. A set of service procedures that carry out the system calls 176) An operation concerning Stable Storage is: * A. Crash recovery B. All of the other choices C. Stable Reads D. Stable writes 177) VMware Workstation is: * A. Guest Operating system B. Type 1 Hypervisor C. Host Operating system D. Type 2 Hypervisor 178) Some systems increase the priority of jobs that have been in the system for an unusually long time to expedite their exit, which is known as ____.? * A. Aging B. Bumping C. Accelerated priority D. Lagging 179) Which of the following environments preemption is essential? * A. Batch B. Real time C. Interactive D. None of the other choices 180) Five batch jobs A through E, arrive at a computer center at almost the same time. They have estimated running times of 8, 6, 2, 10, and 4 minutes. Their (externally determined) priorities are 3, 5, 2, 1, and 4, respectively, with 5 being the highest priority. Determine the average turnaround time for priority scheduling. Ignore process switching overhead. * A. 18.8 minutes B. 16.8 minutes C. 6 minutes D. 12.8 minutes
  • 24. ĐỀ 3 MINH 181) A directory in UNIX/Linux consists of the following * A. i-node number and file name B. file name, file size, location of the file on disk C. file name, file size, location of the file on disk, date created, owner ID D. none of the other choices 182) A paging system where page size is 2^12 words and the physical memory contains 2^24 words, what is the length of the physical address? * A. 32 bits B. 16 bits C. 24 bits D. 36 bits 183) If in a resource-allocation graph, each resource type has exactly one instance, which of the following indicates a deadlock situation? * A. The graph has no cycle B. The graph is not connected C. The graph has at least one cycle D. The graph is connected 184). In the hierarchical structure for managing, I/O, which layer is closest to the hardware? * A. Device-independent OS software B. Interrupt handlers C. Device drivers D. None of the other choices 185) What kind of I/O devices that disks and tapes belong to? * A. Block-oriented devices B. None of the other choices C. Character-oriented devices D. Stream-oriented devices 186. The language of the CPU is known as its * A. Control unit set B. Instruction set C. Register set D. None of the other choices 187) The interface between the operating system kernel and the user programs is defined by the set of ___ that the operating system provides * A. System calls B. Functions C. Processes D. Threads 188) Which of the following statements about interrupts and system calls is incorrect? * A. System calls are caused by internal (synchronous) events B. Interrupts are caused by external events C. Interrupts are asynchronous D. None of the other choices 189) A ____ is a portion of a process that can run independently * A. thread B. program C. subprocess D. miniprocess
  • 25. 190) A possibility of deadlock can occur: * A. If a system is in instable state B. If a system is in unsafe state B. None of the other choices D. If a system is in safe state 191) When a virtual memory system manages memory in fixed length units, which of the following terms correctly represents its unit? * A. IO devices B. Segment C. Page D. Frame 192) What happens when a thread calls Down ( S ) when it wants to enter its critical section, where S is a binary semaphore set to 1? * A. None of the other choices B. The thread is allowed to enter its critical section and S is decremented C. The semaphore is set to 2 D. The thread is blocked and added to a queue of waiting threads 193) Which statement about DMA is incorrect? * A. The controller does not need to wait for the CPU to transfer data to/from memory B. It is always true that DMA is less expensive than CPU-mediate data transfers C. The CPU needs not to be concerned with the time it takes to transfer data D. The CPU can start a DMA block transfer, and in the mean time do other work 194) The File Manager writes the volume name and other descriptive information on an easy- to-access place on each unit: ____ of the CD or DVD * A. the innermost part B. stored at the beginning of the volume C. the outermost part D. immediately following the master file directory 195) Which of the following synchronization mechanisms does not rely on busy-waiting? * A. Peterson’s algorithm B. Semaphores C. Lock variables D. Strict alternation 196) Which of the following statements is incorrect about Memory-mapped I/O and Programmed I/O? * A. Memory-mapped I/O is a way to control the device B. Programmed I/O is a way to actually carry out the I/O operations C. None of the other choices D. Programmed I/O may use memory-mapped I/O to fulfill the I/O tasks 197) Each of the following characteristics applies to deadlock avoidance except * A. Inherently conservative strategy B. None of the other choices C. Widely used in modern operating systems D. Relying on ability to predict effect of satisfying allocation requests
  • 26. 198) Which of the following information bits used by the various page replacement policies indicates if the page has been called lately? * A. Referenced bit B. Status bit C. Locality bit D. Modified bit 199) Dijkstra’s Banker’s Algorithm require the system to maintain the resource information for each process, including: * A. The maximum resources that can be requested by the process B. The maximum resources that can be requested by the process AND The number of resources currently acquired by the process C. The number of resources currently acquired by the process D. A count of the system’s total resources 200) In general, which is the best technique for I/O Data transfer? * A. Programmed I/O B. None of the other choices C. Direct Memory Access D. Interrupt-Driven I/O Which of the following is a preemptive scheduling algorithm *? A. None of the other choices B. FCFS C. Round Robin D. Shortest Job First 201) Consider an i-node which contains 10 direct addresses of 4 bytes each and all disk blocks are 1 KB. Also consider that the i-node contains an additional “single indirect address” that is used for containing more disk block addresses. What is the largest possible file? * A. 262 KB B. 266 KB C. 264 KB D. 268 KB 202) Which of the following statements is incorrect about Translation Look-aside Buffer (TLB)? * A. A TLB miss implies a disk operation will follow B. A TLB is sometimes known as an associative memory C. None of the other choices D. Each entry of a TLB contains the information about one page, including the virtual page number and the corresponding page frame 203) A fetched instruction is normally loaded into * A. Program Counter B. Accumulator C. None of the other choices D. Instruction Register 204) What is the correct approach with the Mutual Exclusion condition to prevent Deadlock? * A. Request all resources initially B. Order resources numerically C. Spool everything D. Take resources away 206) Which statement about disabling interrupts to resolve race conditions is wrong? *
  • 27. A. In theory, a program can disable interrupts when it enters a critical section, and re-enable interrupts when finished with a critical section, to eliminate race conditions. B. Disabling/enabling interrupts may negatively affect the I/O system. C. User-mode programs are the best place to invoke disable Interrupt(). D. Programs with infinite loops in their critical sections are a significant problem with the interrupt-based approach. 207) The special files are: * A. character special files and block special files B. None of the other choices C. block special file D. character special file 208) An example of the key differences that can exist across (and even in) classes of I/O devices is: * A. Data representation B. Data rate C. Error conditions D. All of the other choices 209) Which RAID level employs a Hamming code to correct single bit errors and detect double bit errors? * A. 1 B. 2 C. 3 D.4 210) Which of the following is a hardware solution to the critical region problem? * A. None of the other choices B. Semaphore C. TSL D. Shared memory 211) Which of the following process state transitions is illegal? * A. ready -> running B. blocked -> ready C. running -> ready D. blocked -> running 212) Which of the following is true about the block size in disk space management * A. the larger the block size, the worse the disk space utilization B. the larger the block size, the lesser the disk space C. the larger the block size, the lower the data rate D. none of the other choices 213) Which of the following is not a well-known technique for organizing the physical storage blocks for a file? * A. Indexed block allocation B. Contiguous block allocation C. Sparse block allocation D. Linked list block allocation 214) Which of the following statements is incorrect about user mode and kernel mode? *
  • 28. A. Having two modes of operation helps prevent user programs from accessing critical instructions B. In kernel mode, the OS can execute every instruction in the instruction set C. In user mode, user program can execute only a subset of instructions D. None of the other choices 215) The simplest way to break a deadlock is to * A. locks one of the processes B. kills one of the processes C. rollback D. preempt a resource 217) Which of the following is specified to indicate the directory where the file is located? * A. Sub-directory B. Path name C. Extension D. Root directory 218) Which of the following statements is not correct about DMA? * A. DMA controller has access to the system bus independent of the CPU B. The operating system can only use DMA if the hardware has a DMA controller C. DMA helps reduce the number of interrupts (in comparison with interrupt-driven I/O) D. DMA controller is usually faster than CPU 219) When there is an excessive amount of page swapping between main memory and secondary storage, the operation becomes inefficient, which is called ____. * A. thrashing B. over swapping C. hot swapping D. excessive demand paging 220) Consider a swapping system in which the memory consists of the following hole sizes: 10 K, 4 K, 20 K, 15 K, 9 K. Assume first fit algorithm is used. Which holes are taken for successive segment requests of 8 K, 12 K, 10 K? * A.9 K, 15 K, 10 K B.10 K, 20 K, 15 K C.20 K, 15 K, 4 K. D.None of the others 221) A file is generally defined to be: * A. A collection of similar records B. A collection of related fields C. All of the other choices D. A basic element of data 222) Five batch jobs A through E, arrive at a computer center at almost the same time. They have estimated running times of 8, 6, 2, 10, and 4 minutes. Determine the mean process average turnaround time for FCFS scheduling. Ignore process switching overhead. * A. 18.8 minutes B. 18 minutes C. 19 minutes D. 17 minutes 223) In a single processor system, mutual exclusion can be guaranteed by: *
  • 29. A. Interleaving processes B. Disabling interrupts C. All of the other choices D. Overlapping processes 224) Which of the following is appropriate to release page table and pages? * A. Process creation B. Process execution C. Page fault time D. Process termination time 225) Which of the following is not a condition for deadlocks? * A. Preemption B. Hold and Wait C. Circular Wait D. Mutual exclusion 226) A system has four processes and five allocated resources. The current allocation and need are as following figure. What is the smallest value of x for which this is a safe state? * 1/1 A. 3 B. 1 C. 2 C.0 227) The ___ is the essential component of the operating system that remains in RAM when your computer is powered on. * A. core B. system file C. registry D. kernel 228) ____ is when, in modern printing systems, a disk accepts output from several users and acts as a temporary storage area for all output until the printer is ready to accept it. * A. Spooling B. Buffering C. Spoofing D. Lagging 229) Which is NOT a file attribute? * A. Owner B. Shape C. Size D. Time of Access 230) Which of the following is not a CPU scheduling criterion? * A. Burst time B. Response time C. Throughput D. CPU utilization 231) If there are 64 pages and the page size is 2048 words, what is the length of logical address? * A. 15 bits B. 17 bits C. 14 bits D. 16 bits
  • 30. 232) Typical approaches to handle deadlocks do not include * A. Prevention B. Deterrence C. Detection D. Avoidance 233) Which of the following systems is used in time-critical environments where data must be processed within a strict time limit? * A. Interactive B. Embedded C. Real-time D. Hybrid 234) Page replacement algorithms determine * A. how many pages should be added to main memory B. when the system should update page table entries C. which pages should be brought into memory because a process is likely to reference them soon D. which page to remove to provide space for an incoming page 235) Consider a swapping system in which the memory consists of the following hole sizes: 10 K, 4 K, 20 K, 15 K, 9 K. Assume best fit algorithm is used. Which holes are taken for successive segment requests of 8 K, 12 K, 10 K? * A. 9 K, 15 K, 10 K B. None of the other choices C. 20 K, 15 K, 4 K D. 10 K, 20 K, 15 K 236) Which strategy is used in the Banker’s algorithm for dealing with deadlocks? * A. Deadlock avoidance B. Deadlock ignorance C. Deadlock detection D. Deadlock prevention 237) The modified/dirty bit is used for the purpose of: * A. Dynamic allocation of memory used by one process to another B. Reduce the average time required to service page faults C. None of the other choices D. Implementing FIFO page replacement algorithm 238) ____ is the act of allowing only one process to have access to a dedicated resource * A. No preemption B. Circular wait C. Mutual exclusion D. Resource holding 239) The two basic types of processor registers are: * A. Control and status registers B. General and special registers C. None of the other choices D. User-visible and user-invisible register 240) Which of the following is an advantage of Memory-mapped I/O? * A. Using memory-mapped I/O, caching a device control register is not acceptable B. None of the other choices C. Since the control registers of devices are mapped into the memory space, device drivers can be written without using Assembly language D, Since there is only one address space, all I/O devices must examine all memory references to see which ones to response to
  • 31. 241) Multiprogramming increases processor efficiency by * A. Eliminating all idle processor cycles B. Taking advantage of time wasted by long wait I/O handling C. All of the other choices D. Increasing processor speed ĐỀ 2 MINH 241) Which is a wrong statement about the quantum used in Round Robin algorithm? * A. If the quantum is very large, RR is essentially FCFS B. A reasonable value of quantum is around 20-50 ms C. If the quantum is very small, the CPU efficiency is reduced D. None of the other choices 242) What are the allocation methods of disk blocks for files: * A. Linked allocation B. Contiguous allocation C. All of the other choices D. Indexed allocation 243) Assume jobs A-D arrive in quick succession in the READY queue. Using round robin scheduling (quantum=4), the average turnaround time for each job is ____. * A. 5 B.20 C. 18.25 D.73 244) What is interrupt vector? * A. Part of memory which contains the addresses of interrupt handlers B. A signal an I/O device sends to CPU C. None of the other choices D. A signal CPU sends to I/O device 245) Which of the following statements is incorrect about user mode and kernel mode? * A. None of the other choices B. In user mode, user program can execute only a subset of instructions C. Having two modes of operation helps prevent user programs from accessing critical instructions D. In kernel mode, the OS can execute every instruction in the instruction set 246) Which of the following statements about the CPU’s handling interrupts is incorrect? * A. None of the other choices B. The CPU branches to a new instruction sequence C. The processor ceases to execute the current sequence of instructions
  • 32. D. The hardware saves the old PC location 247) Which strategy is used in the Banker’s algorithm for dealing with deadlocks? * A. Deadlock prevention B. Deadlock ignorance C. Deadlock avoidance D. Deadlock detection 248) Which deadlock condition does order resources numerically attack? * A. Mutual exclusion B. No preemption C. Hold and wait D. None of the other choices 249) Dijkstra’s Banker’s Algorithm require the system to maintain the resource information for each process, including (choose 1 answer only): * A count of the system’s total resources The maximum resources that can be requested by the process The maximum resources that can be requested by the process and The number of resources currently acquired by the process The number of resources currently acquired by the process 250) Which of the following statements is incorrect about I/O using DMA? * DMA helps free up the CPU during the I/O to do other work In essence, DMA is programmed I/O, except the fact that DMA, instead of the CPU, does all the work DMA helps reduce the number of interrupts None of the other choices 251) The I/O technique where the processor busily waits for an I/O operation to complete is called: * Direct Memory Access (DMA) Interrupt-driven I/O Programmed I/O None of the other choices 252) A table in main memory storing linked list allocation of disk blocks is called: * File list table Disk allocation table Linked list table File allocation table 253) Personal desktop computers use a __________ operating system. * single-user, single-task single-user, multitask real-time multiuser 254) The simplest way to break a deadlock is to * rollback kills one of the processes preempt a resource locks one of the processes
  • 33. 255) The special files are (choose 1 answer only): * character special file none of the other choices character special files and block special files block special file 257) In general, which is the best technique for I/O Data transfer? * Programmed I/O Direct Memory Access None of the other choices Interrupt-Driven I/O 258) Assume that the Page Table below is in effect. The number of lines per page is 400. The actual memory location for line 433 is ____. * 1/1 1 33 4033 4000 259) Which of the following is not correct about hard links and symbolic links? * Hard links do not require extra disk space Symbolic links can point to files in the network Symbolic links need space to store the name of the file pointed to Hard links can point to files on other machines 260) Consider a swapping system in which the memory consists of the following hole sizes: 10 K, 4 K, 20 K, 15 K, 9 K. Assume worst fit algorithm is used. Which holes are taken for successive segment requests of 8 K, 12 K, 10 K? * 9 K, 15 K, 10 K 10 K, 20 K, 15 K None of the other choices 20 K, 15 K, left over of 20 K
  • 34. 261) A computer has four page frames. The time of loading, time of last access, and the R and M bits for each page are as shown below (the times are in clock ticks). Which page will Second Chance replace? * 1/1 3 1 0 2 262) Which statement about disabling interrupts to resolve race conditions is wrong? * In theory, a program can disable interrupts when it enters a critical section, and re-enable interrupts when finished with a critical section, to eliminate race conditions Programs with infinite loops in their critical sections are a significant problem with the interrupt-based approach Disabling/enabling interrupts may negatively affect the I/O system User-mode programs are the best place to invoke disableInterrupt() Correct answer In theory, a program can disable interrupts when it enters a critical section, and re-enable interrupts when finished with a critical section, to eliminate race conditions 263) In a directed graphs model, a possible of deadlock can occur: * If graph contains a cycle and only one instance per resource type If graph contains no cycle None of the others If graph contains a cycle and several instances per resource type 264) ____ is the partitioning of a single server, each of which can support a different operating * Multiprocessing Multithreading
  • 35. Virtualization Shared processing 265) Which of the following statements about segmentation is false? * None of the other choices Sharing of procedures between different users can be facilitated The total address space can be more than the size of physical memory There are several linear address spaces 266) Which of the following is an advantage of Memory-mapped I/O? * Using memory-mapped I/O, caching a device control register is not acceptable Since the control registers of devices are mapped into the memory space, device drivers can be written without using Assembly language None of the other choices Since there is only one address space, all I/O devices must examine all memory references to see which ones to response to 267) Which of the following actions generates an external interrupt? * A system call instruction is executed. A page that does not exist in the main memory is accessed by the virtual storage management. Division by zero occurs. An input/output operation is completed. 268) Working set model is used for: * All of the other choices Determining whether page replacement is needed Finding the minimum number of frames necessary for a job so that jobs can be run without “thrashing” Finding the average number of frames a job will need to run smoothly 269) Information that must be saved prior to the processor transferring control to the interrupt handler routine includes: * PSW PSW and PC None of the other choices PSW and Contents of processor registers 270) Which part of a disk is used to boot the computer? * Super block Root block Boot block MBR
  • 36. 271) Linux and __________ are often used as operating systems on supercomputers, mainframes, and servers. * Mac OS UNIX None of the other choices Windows 272) Which mechanism is described as “the device controller sneaks in and steals an occasional bus cycle from the CPU once in a while, delaying it slightly”? * Cycle sneaking Cycle stealing Interrupt stealing All of the others 273) Which of the following statements about semaphores is true? * P and V (Down and Up) operations should be indivisible operations All of the other choices If several processes attempt a P(S) operation simultaneously, only one process should be allowed to proceed A semaphore implementation should guarantee that processes do not suffer indefinite postponement 274) Five batch jobs A through E, arrive at a computer center at almost the same time. They have estimated running times of 8, 6, 2, 10, and 4 minutes. Their (externally determined) priorities are 3, 5, 2, 1, and 4, respectively, with 5 being the highest priority. Determine the mean process average turnaround time for priority scheduling. Ignore process switching overhead . * 10,8 minutes 12,8 minutes 16,8 minutes 54 minutes 275) Typical approaches to handle deadlocks do not include * Avoidance Deterrence Prevention Detection 276) What is not correct about contiguous allocation of files? * It leads to excellent read performance It is widely used on CD-ROMs
  • 37. It is simple to implement It does not cause disk fragmentation 277) Which of the following systems is used in time-critical environments where data must be processed within a strict time limit? * Real-time Embedded Interactive Hybrid 278) What is the weakness of the Banker’s algorithm? * Allowing the population of processes to vary over time Enabling the number of resources to fluctuate Enabling processes to hold their resources indefinitely Requiring that processes state their maximum needs in advance 279) Which of the following statements is incorrect about Memory-mapped I/O and Programmed I/O? * Programmed I/O may use memory-mapped I/O to fulfill the I/O tasks Memory-mapped I/O is a way to control the device Programmed I/O is a way to actually carry out the I/O operations None of the other choices Correct answer None of the other choices 280) Which of the following is a preemptive scheduling algorithm * Shortest Job First None of the other choices FCFS Round Robin 281) In which of the following environments preemption is essential? * Interactive Real time None of the other choices Batch 282) Consider a swapping system in which the memory consists of the following hole sizes: 10 K, 4 K, 20 K, 15 K, 9 K. Assume best fit algorithm is used. Which holes are taken for successive segment requests of 8 K, 12 K, 10 K? * 9 K, 15 K, 10 K None of the other choices
  • 38. 10 K, 20 K, 15 K 20 K, 15 K, 4 K 283) Which of the following is not a well-known technique for organizing the physical storage blocks for a file? * Indexed block allocation Sparse block allocation Contiguous block allocation Linked list block allocation 284) Which of the following is not correct about the reliability of different RAID levels? * 1/1 In RAID levels 3, 4, 5 a single bit error in a word can be detected There is no reliability support in RAID level 0 In RAID level 2, a single bit error in a word can be detected AND corrected All RAID levels can survive one disk crash 285) A ____ is a portion of a process that can run independently * 1/1 miniprocess subprocess program thread 286) With paging, when is the internal fragmentation possible? * Page does not fit the frame The virtual memory assigned to the program is less than the physical memory assigned to it Such thing cannot happen The last page of the job is less than the maximum page size 287) Which of the following statements is incorrect about Translation Look-aside Buffer (TLB)? * None of the other choices TLB only maintains a subset of the entries stored in the full memory-based page table The use of TLB eliminates the need for keeping a page table in memory 288) When there is a TLB miss the system needs to access the page table A directory in UNIX/Linux consists of the following * i-node number and file name None of the other choices file name, file size, location of the file on disk, date created, owner ID File name, file size, location of the file on disk
  • 39. 289) A page fault means that we referenced a page * that was not in main memory that was outside the memory boundaries that was not in secondary storage with an incorrect I/O request 290 ) Which of the following statements is incorrect about Translation Look-aside Buffer (TLB)? * A TLB is sometimes known as an associative memory None of the other choices A TLB miss implies a disk operation will follow Each entry of a TLB contains the information about one page, including the virtual page number and the corresponding page frame 291) A disk queue with requests for I/O blocks on cylinders in orders: 10, 22, 20, 2, 36, 6, 38. Assume that the disk head is initially at cylinder 9. How many cylinder do total head movement using SSF algorithms? * 67 43 45 None of the others 292) Each of the following characteristics applies to deadlock avoidance except * Inherently conservative strategy Widely used in modern operating systems None of the other choices Relying on ability to predict effect of satisfying allocation requests 293) Consider the following state of a system with four processes P1, P2, P3 and P4 and five types of resources RS1, RS2, RS3, RS4 and RS5 as figure below. Deadlocked processes are ___ * 1/1
  • 40. P2, P3 P1, P2 P1, P3 P1, P4 294) Which of the following statements about interrupts and trap instructions is incorrect? * A trap instruction is a software-generated interrupt None of the other choices An interrupt is a hardware-generated change of control flow within the system An interrupt handler deals with the cause of the interrupt All deadlocks involve conflicting needs for resources by * None of the other choices One or more processes Two or more processes Three or more processes 295) Which of the following synchronization mechanisms does not rely on busy-waiting? * Strict alternation Lock variables Peterson’s algorithm Semaphores 296) The File Manager writes the volume name and other descriptive information on an easy- to-access place on each unit: ____ of the CD or DVD * the outermost part stored at the beginning of the volume immediately following the master file directory the innermost part 297) Which of the following process state transitions is illegal? * blocked -> ready blocked -> running running -> ready ready -> running 298) Which of the following is a hardware solution to the critical region problem? * TSL None of the other choices Semaphore Shared memory 299) Which of the following is specified to indicate the directory where the file is located? * Path name Extension Sub-directory Root director 300 )Which of the following conditions of semaphore variable “s” implies a busy critical region? * 1/1 s = 0 s > 0 s < 0 None of the other choices