Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
A) program
B) language
C) translator
D) package
2. A process is _________________
D) program in execution
A) Computer system
B) distributed system
C) network
B) well separated
C) independent
D) dependent
A) Kernel
B) Layered
C) Extended
D) Virtual machine
A) init
B) fork
C) create
D) new
A) RAM
B) virtual memory
C) BIOS
D) Operating System
9. ______________is responsible for allocating primary memory to processes and for assisting
the programmer in loading and storing the contents of the primary memory.
A) Operating system
B) Memory manager
C) Database administrator
D) RAM
10. ______________ refers to the technology in which some space in hard disk is used as an
extension of main memory.
A) Cache memory
B) Paging
C) Virtual memory
D) Associative memory
11. ______________ selects a process from among the ready processes to execute on the
CPU.
A) CPU Scheduler
B) Loader
C) Dispatcher
D) Compiler
12. The time taken by the Dispatcher to stop one process and start another running is known as
_________________.
A) Turnaround time
B) Dispatch Latency
C) Access time
D) Response time
13. When resources have multiple instances ________ is used for deadlock Avoidance.
A) Banker’s algorithm
C) semaphores
D) all of these
14. ______________ is a situation in which two computer programs sharing the same resource
are effectively preventing each other from accessing the resource, resulting in both programs
ceasing to function.
A) Semaphore
B) Deadlock
C) Mutual Exclusion
D) No preemption
15. _______________occurs when two or more execution flows are able to run simultaneously.
a) Deadlock
b) Concurrency
c) race condition
d) interrupt
16.______________ occurs when multiple processes or threads read and write data items so that
the final result depends on the order of execution of instructions in the multiple processes.
a) Race condition
b) Mutual exclusion
c) Exception
d) Interrupt
17. In Multics, a process could have up to 256K segments, but each segment was limited to
A) 64K
B) 32K
C) 1024K
D)112K
B) very slow
C) human errors
D) all of these
19. Because the I/O devices are not synchronized with the CPU, some information must be
exchanged between the CPU and the device to ensure that the data is received reliably. This
interaction between the CPU and an I/O device is usually referred to as ____________
A) polling
B) arbitration
C) handshaking
D) interrupting
20. ____________approach can place the data directly into the memory or take the data directly
from the memory without direct intervention from the processor.
A) DMA
D) none of these
21. ____________ file system allows sharing in multiple different locations grouped under one
folder.
A) Direct
B) distributed
C) sequential
D) parallel
A) NTFS
B) EFS
C) FEFS
D) EFFS
23. In___________, the requesting device or devices assert the signal bus_request.
C) Priority arbitration
A) CPU
B) MSDOS
C) UNIX kernel
A) One
B) Two
C) Five
D) Eight
A) cold-hot boot
B) hot boot
C) hot strap
D) cold boot
29. Creation of a semaphore set is done using the _______system call.
A) semget()
B) semsget()
C) mknod()
D) sempget()
A) semget()
B) msgrcv()
C) shmget()
D) mknod()
31. The _________takes any characters from standard input, and then echoes them to
standard output.
A) kill character
B) cat command
C) cate command
D) control command
A) UNIX systems originally came with a command interpreter called the Bourne Shell.
B) The cat command takes any characters from standard input, and then echoes them to
standard output.
C) A pipe is a means of taking the output of one command and directing it as another command.
D) The manual entry is called a man page, even though it is often more than one page long.
A) The cat command cares which file it receives as input or where the input goes.
B) Relative pathnames begin with something other than the slash character
34. When copying more than one file at a time, you must specify an existing directory as the
___________
A) Source
B) Sub directory
C) Destination.
D) Path name
35. The find command is different from most UNIX commands in that each of the
_____________
A) action expression
B) Boolean expression.
C) Boolean constant
D) Search qualifiers
A) Unlimited path
B) Unlimited directory
C) Limited path
D) Limited file
A) su-pwd
B) su-pd
C) su - userID
D) Sue- ID
39. ___________variable is not automatically created on all UNIX systems but is used by so
many programs that it is considered a standard environment variable.
A) IFS
B) MAIL
C) TERM
D) PATH
A) In computer terminology, variables are symbols which stand for some value.
B) An alternative method for executing the commands in the file backup is to make the file as
directory.
C) The restricted shell gives more control to the system administrator and restricts the options of
the user.
D) The decision making done by computer programs is in the form of conditional execution.
A) main memory
B) secondary memory
C) virtual memory
42. In layered approach each layer uses the functions and services of ------------------
A) kernel
B) lower-level layers
C) higher-level layers
D) all of these
A) Processes
B) Threads
C) Context switching
D) none of these
44.__________ deals with when a modified page should be written out to secondary memory.
A) Cleaning policy
B) Fetch policy
C) Frame locking
D) None of these
45. A solution to starvation is _____________.
A) segmentation
B) Aging
C) Paging
D) virtual memory
A) Deadlock Prevention
B) Livelock
C) Deadlock avoidance
D) none of these
A) SIGCHLD
B) EDEADLK
C) WNOHANG
D) SEDECHLD
48. ______________is a mechanism the prevents two or more processes from accessing a
shared resource simultaneously.
A) Livelock
B)Preemption
C) Semaphore
D) either a) or b)
49. A two-byte integer called ____________is interpreted as an index into an array of inodes in
a fixed, known location on disk.
A) an inode
B) an inumber
C) an imap
D) an imark
A) 40 Mbytes
B) 60 Mbytes
C) 40 Gbytes
D) 60 Gbytes
51. The controller can access memory in memory cycles which are not used by the particular
bank of memory into which the DMA controller is writing data. This approach, called _________
A) interrupting
B) cycle stealing
C) swapping
D) paging
52. The two sub systems of user mode layer of windows 2000 are _________ and __________
A) excel, executive
B) environment, integral
C) orbit , kernel
D) Kernel , executive
53. A standard UNIX system includes a set of ___________ and a set of ___________.
A) Commands ,files
B) Libraries, Applications
C) Libraries, files
D) Files, Applications
54. Ext2 is the standard file system of _______ and uses a block size of_____bytes
A) MS DOS,8K
B) Linux ,1024
C)Linux, 512
D)Unix, 512
D) dot,only two
A) ii and iii
B) ii and iv
C) i and iv
D) i and iii
58.One reason why UNIX is so flexible is that each program is automatically assigned three
A) The standard input file, the standard output file, and the standard error file.
B) The backup file, the standard output file, and the standard error file.
C) The standard input file, the standard output file, and the standard hidden file.
D) The standard input file, the standard search file, and the standard error file.
A) The user ID number, login name, login password, and group name of the person who
invokes it.
B) The user password, login name, single ID number, and names of the persons who
invokes it.
C) The user password, login name, path number, and name of the person who
invokes it.
D) The user ID number, login name, group ID number, and group name of the person who
invokes it.
i. Normally, a looping construct executes all the commands between the do statement and
the done statement.
ii. In most higher level programming languages, variables are typed, meaning that they are
not restricted to certain kinds of data, such as numbers or characters.
iii. A program can get data in two ways: either it is passed to the program when it is executed
as arguments, or the program gets data interactively.
iv. Using the echo command in your program, you can determine whether a file exists,
whether it can be written to, and several other conditions.
A) i and iv
B) iii and iv
C) i, ii and iii
D) i and iii
63. Which of these is a reason for using threads in designing operating systems?
C) Because threads can share common data, they do not need to use interprocess
communication.
64. Arrange the following memories in terms of increasing access time (from low to high)
1. Registers
2. Main memory
3. Secondary memory
4. Cache
A) 1-3 -4 -2
B) 1-4-2-3
C) 3-2-4-1
D) 2-4-1-3
66. The introduction of mutual exclusion can prevent race conditions but can lead to problems
such as________________
A) deadlock
B) starvation
C) both a) and b)
D) none of these
67. Match the following
D) 1- iv , 2-ii, 3-iii, 4- i
a. System files should be kept separate from data files created by users, and hence a
separate file system is usually made for them.
b. SVR5 systems define various run levels in which a specific set of processes are allowed
to run.
d. Passwords are normally represented by a special encrypted format and are stored in the
file.
B) a-F, b- T, c- F, d-T
73. State whether the following statements are True (T) or False (F)
a. When you copy a file into a directory, cp creates the new file with the different name.
b. The name cat derives from the word gatecate, which means to connect in a series or to
link together.
c. UNIX is a multiuser operating system, which means that you share the system with
other users.
b. When a file is created, the path can inadvertently acquire printable numbers.
d. A program that takes standard file and creates standard input is sometimes called a
filter.
A) a-T,b-T,c-F,d-F
B) a-F,b-F,c-T,d-T
C) a-T,b-F,c-F,d-T
D )a-T,b-F,c-T,d-F