Sie sind auf Seite 1von 2

1.

Memory management unit is


(a) hardware
(b) software
(c) can’t say
(d) firmware
2. ___algorithm fits the process into the largest available hole
(a) worst fit
(b) first fit
(c) best fit
(d) zero fit
3. ___page replacement algorithm requires that the page with the smallest count be replaced.
(a) FIFO
(b) MFU
(c) LFU
(d) LRU
4. In paged memory system if the page is increased then the internal fragmentation generally
(a) becomes more
(b) can’t say
(c) remains constant
(d) becomes less
5. Which of the following is well suited for a time shared OS?
(a) round robin
(b) FCFS
(c) SJF
(d) elevator
6. ___scheduler determines which jobs are brought into memory for processing.
(a) medium term
(b) long term
(c) short term
(d) thread
7. Which of the following is not maskable
(a) RST7.5
(b) RST 6.5
(c) TRAP
(d) RST 5.5
8. The transfer schedule of tape is___
(a) synchronous
(b) random
(c) asynchronous
(d) sequential
9. ____is a memory area that stores data while the calls are transferred between two devices or
between a device
and an application
(a) port
(b) Buffer
(c) bus
(d) controller
10. Pick the odd man out
(a) device controller
(b) bus
(c) device driver
(d) device
11. A disk queue with requests for I/O to blocks on cylinders. 98, 183, 37, 122, 14, 124, 65, 67 in that
order. If the disk
is initially at cylinder 53.The total head movement is _____cylinders( FCFS)
(a) 620
(b) 640
(c) 630
(d) 639
12. Before a disk can store data it must be divided into sectors that the disk controller can read /write.
This process
is called ____formatting
(a) physical
(b) logical
(c) low level
(d) low level or physical
13. The extension etc indicates ___file type.
(a) executable
(b) word processor
(c) Text
(d) batch
14. An incremental backup
(a) uses more tapes
(b) saves only files that have recently changed
(c) saves all files
(d) should be done each month
15. The file structure that redefines its first record at a base of zero uses the term
(a) relative organization
(b) hashing
(c) dynamic reallocation
(d) key fielding
16. Let N= surfaces, C=cylinders , K=sectors per track. Then the total number of sectors on a disk
=____
(a) N+K-C
(b) N*K*C
(c) N+C-K
(d) N/K-C
17. Pick the odd man out
(a) files
(b) memory segment
(c) programs
(d) semaphores
18. The security of a system can be improved by______
(a) threat monitoring & audit log
(b) neither threat monitoring nor audit log
(c) threat monitoring
(d) audit log
19. Boot strap or vector is called
(a) primary storage
(b) grappling hook program
(c) main program
(d) secondary program
20. The most common systems security method is
(a) keycard systems
(b) man trap
(c) keycard systems & man trap
(d) passwords

Das könnte Ihnen auch gefallen