Operating System Concepts (CSIT123)-Semester II

Semester II Operating System Concepts (CSIT123)-Semester II
We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: amitymbaassignment@gmail.com
Call/what’s app: +91 8290772200
What’s app: +91 8800352777
Amity assignment solution help, Amity assignment answers help, Assignment Help

                                 MODULE 1  MODULE 1 INTRODUCTION TO OPERATING SYSTEM .

Question 1
What else is a command interpreter called?

Select one:
a. Prompt
b. shell
c. Command
d. Kernel

Question 2
Multiprogramming of the computer system increases

Select one:
a. Multiprogramming of the computer system increases
b. Storage
c. CPU – Utilization
d. cost

Question 3
When was the first operating system developed?

Select one:
a. 1947
b. 1963
c. 1950
d. 1943

Question 4
BIOS is used?

Select one:
a. Operatiing System
b. aplication Software
c. By compiler
d. interpreter

Question 5
What is the main function of the command interpreter?

Select one:
a. to get and execute the next user-specified command
b. to provide the interface between the API and application program
c. to handle the files in operating system
d. none of the mentioned

Question 6
Which of the following is not an operating system?

Select one:
a. Linux
b. Windows
c. oracle
d. unix

Question 7
Another type of multiple-CPU system is the

Select one:
a. clustered System
b. Mini Computer
c. Super Computer
d. both b and c

Question 8
Environment in which programs of the computer system are executed is:

Select one:
a. Operatiing System
b. Node
c. Clustered System
d. both a and b

Question 9
Which is the Linux operating system?

Select one:
a. Private operating system
b. Windows operating system
c. Open-source operating system
d. None of these

Question 10
What is the full name of FAT?

Select one:
a. File Allocation Table
b. File attribute table
c. Front attribute table
d. Format attribute table

Question 11
The OS X has __

Select one:
a. monolithic kernel
b. hybrid kernel
c. microkernel
d. monolithic kernel with modules

Question 12
Which one of the following is not a real time operating system?

Select one:
a. VxWorks
b. QNX
c. RTLinux
d. Palm OS

Question 13
To access the services of operating system, the interface is provided by the _

Select one:
a. System calls
b. API
c. Library
d. Assembly instructions

Question 14
Multiprocessor system have advantage of

Select one:
a. Increased Throughput
b. Expensive hardware
c. operating system
d. both a and b

Question 15
The eye is an interface between the object and the part of the brain that processes __

Select one:
a. Visual data
b. Graphic data
c. Audio data
d. Text data

Question 16
Which of the following is an example of a spooled device?

Select one:
a. A graphic display device
b. A line printer used to print the output of a number of jobs
c. A secondary storage device in a virtual memory system
d. A terminal used to enter input data to a running program

Question 17
What is the name of the operating system that reads and reacts in terms of actual time?

Select one:
a. Real time system
b. Time sharing system
c. Quick response system
d. Batch system

We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: amitymbaassignment@gmail.com
Call/what’s app: +91 8290772200
What’s app: +91 8800352777
Amity assignment solution help, Amity assignment answers help, Assignment Help

MODULE II : PROCESSES MANAGEMENT

Question 1

Select one:
a. Long term Scheduler
b. Short term Scheduler
c. Mid term Scheduler
d. All of the mentioned

Question 2
Which of the following scheduling algorithms gives minimum average waiting time?

Select one:
a. FCFS
b. SJF
c. Round – robin
d. Priority
b. SJF

Question 3
If a process fails, most operating system write the error information to a __

Select one:
a. log file
b. another running process
c. new file
d. none of the mentioned

Question 4
What is FIFO algorithm?

Select one:
a. first executes the job that came in last in the queue
b. first executes the job that came in first in the queue
c. first executes the job that came in first in the queue
d. first executes the job that has maximum processor needs

Question 5
What is ‘Aging’?

Select one:
a. keeping track of cache contents
b. keeping track of cache contents
c. keeping track of how many times a given page is referenced
d. increasing the priority of jobs to ensure termination in a finite time

Question 6
Round robin scheduling falls under the category of __

Select one:
a. Non-preemptive scheduling
b. Preemptive scheduling
c. All of the mentioned
d. None of the mentioned

Question 7
A solution to the problem of indefinite blockage of low – priority processes is __

Select one:
a. Starvation
b. Wait queue
c. Ready queue
d. Aging

Question 8
Which is the most optimal scheduling algorithm?

Select one:
a. FCFS – First come First served
b. SJF – Shortest Job First
c. RR – Round Robin
d. None of the mentioned

Question 9
Choose one of the disadvantages of the priority scheduling algorithm?

Select one:
a. it schedules in a very complex manner
b. its scheduling takes up a lot of time
c. it can lead to some low priority process waiting indefinitely for the CPU
d. none of the mentioned

Question 10
What is the main function of the command interpreter?

Select one:
a. to get and execute the next user-specified command
b. to provide the interface between the API and application program
c. to handle the files in operating system
d. none of the mentioned

Question 11
The real difficulty with SJF in short term scheduling is __

Select one:
a. it is too good an algorithm
b. knowing the length of the next CPU request
c. it is too complex to understand
d. it is too complex to understand

Question 12

Complex scheduling algorithms __

Select one:
a. are very appropriate for very large computers
b. use minimal resources
c. use many resources
d. all of the mentioned

Question 13
The FCFS algorithm is particularly troublesome for __

Select one:
a. time sharing systems
b. multiprogramming systems
c. multiprocessor systems
d. operating system

Question 14
Preemptive Shortest Job First scheduling is sometimes called _

Select one:
a. Fast SJF scheduling
b. EDF scheduling – Earliest Deadline First
c. HRRN scheduling – Highest Response Ratio Next
d. SRTN scheduling – Shortest Remaining Time Next

Question 15
Which one of the followingstatement is true

i) Shortest remaining time first scheduling may cause starvation

ii) Preemptive scheduling may cause starvation

iii) Round robin is better than FCFS in terms of response time

Select one:
a. i only
b. i and iii only
c. ii and iii only
d. i, ii and iii

Question 16
There are 10 different processes running on a workstation. Idle processes are waiting for an input event in the input queue. Busy processes are scheduled with the Round-Robin time sharing method. Which out of the following quantum times is the best value for small response times, if the processes have a short runtime, e.g. less than 10ms?

Select one:
a. tQ = 15ms
b. tQ = 40ms
c. tQ = 45ms
d. tQ = 50ms

Question 17
Consider the following set of processes, the length of the CPU burst time given in milliseconds. Process Burst time

P1 6

P2 8

P3 7

P4 3

Assuming the above process being scheduled with the SJF scheduling algorithm.

Select one:
a. The waiting time for process P1 is 3ms
b. The waiting time for process P1 is 0ms
c. The waiting time for process P1 is 16ms
d. The waiting time for process P1 is 9ms

We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: amitymbaassignment@gmail.com
Call/what’s app: +91 8290772200
What’s app: +91 8800352777
Amity assignment solution help, Amity assignment answers help, Assignment Help

MODULE-III: MEMORY MANAGEMENT

Question 1

When memory is divided into several fixed sized partitions, each partition may contain __.
Select one:
a. exactly one process
b. atleast one process
c. multiple processes at once
d. None of these

Question 2

A memory buffer used to accommodate a speed differential is called:
Select one:
a. stack pointer
b. cache
c. accumulator
d. disk buffer

Question 3

Which one of the following is the address generated by CPU?
Select one:
a. physical address
b. absolute address
c. logical address
d. none of the mentioned

Question 4

Sometimes the overhead of keeping track of a hole might be :
Select one:
a. larger than the memory
b. larger than the hole itself
c. very small
d. All of these

Question 5

Memories are normally classified according to their
Select one:
a. speed
b. cost
c. indexes
d. both a and b

Question 6

Run time mapping from virtual to physical address is done by
Select one:
a. memory management unit
b. CPU
c. PCI
d. none of the mentioned

Question 7

Because of virtual memory, the memory can be shared among:
Select one:
a. processes
b. threads
c. instructions
d. none of the mentioned

Question 8

Main memory of computer system is also called
Select one:
a. non volatile
b. volatile
c. reserved
d. large

Question 9
Swap space exists in:
Select one:
a. primary memory
b. secondary memory
c. CPU
d. none of the mentioned

Question 10
External fragmentation exists when :
Select one:
a. enough total memory exists to satisfy a request but it is not contiguous
b. the total memory is insufficient to satisfy a request
c. a request cannot be satisfied even when the total memory is free
d. None of these

Question 11

_ is the concept in which a process is copied into main memory from the secondary memory according to the requirement.
Select one:
a. Paging
b. Demand paging
c. Segmentation
d. Swapping

Question 12

The relocation register helps in :
Select one:
a. providing more address space to processes
b. a different address space to processes
c. to protect the address spaces of processes
d. None of these

Question 13
In internal fragmentation, memory is internal to a partition and :
Select one:
a. is being used
b. is not being used
c. is always used
d. None of these

Question 14
The first fit, best fit and worst fit are strategies to select a __.
Select one:
a. process from a queue to put in memory
b. processor to run the next process
c. free hole from a set of available holes
d. All of these

Question 15
Memory management technique in which system stores and retrieves data from secondary storage for use in main memory is called:
Select one:
a. fragmentation
b. paging
c. mapping
d. none of the mentioned

Question 16
Consider a virtual memory system with FIFO page replacement policy. For an arbitrary page access pattern, increasing the number of page frames in main memory will
Select one:
a. Always decrease the number of page faults
b. Always increase the number of page faults
c. Some times increase the number of page faults
d. Never affect the number of page faults

Question 17
Suppose the time to service a page fault is on the average 10 milliseconds, while a memory access takes 1 microsecond. Then a 99.99% hit ratio results in average memory access time of
Select one:
a. 1.9999 milliseconds
b. 1 millisecond
c. 9.999 microseconds
d. 1.9999 microseconds

We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: amitymbaassignment@gmail.com
Call/what’s app: +91 8290772200
What’s app: +91 8800352777
Amity assignment solution help, Amity assignment answers help, Assignment Help

MODULE IV : FILE AND DEVICE MANAGEMENT

Question 1

Which of the following is not an appropriate criterion for file organisation?
Select one:
a. Larger access time
b. ease of update
c. simple maintenance
d. economy of storage

Question 2

Allocated size of a file comes under?
Select one:
a. basic information
b. address information
c. access control information
d. usage information

Question 3

  1. _ itself is a file owned by the operating system
    Select one:
    a. Logical file
    b. Record
    c. Database
    d. Directory

Question 4

A filename without path information.
Select one:
a. File name
b. Complete filename
c. Directory name
d. Relative filename

Question 5

When will file system fragmentation occur?
Select one:
a. unused space or single file are not contiguous
b. used space is not contiguous
c. unused space is non-contiguous
d. multiple files are non-contiguous

Question 6
Mapping of file is managed by __
Select one:
a. virtual memory
b. file metadata
c. file system
d. None of the above

Question 7

MFD stands for?
Select one:
a. Main File Directory
b. Memory File Directory
c. Master File Directory
d. Master Format Directory

Question 8

Which one of the following explains the sequential file access method?
Select one:
a. random access according to the given byte number
b. read/write randomly by record
c. read bytes one at a time, in order
d. read/write sequentially by record

Question 9

What is the mounting of file system?
Select one:
a. attaching portion of the file system into a directory structure
b. removing the portion of the file system into a directory structure
c. rating of a filesystem
d. deleting a filesystem

Question 10

A basic element of data in a file.
Select one:
a. Memory
b. Record
c. Field
d. Value

Question 11

Typically, ………………… is on an individual block basis where each block contains a pointer to the next block in the chain.
Select one:
a. Variable allocation
b. Indexed allocation
c. Chained allocation
d. contiguous allocation

Question 12

…………………… are used mostly in applications where data are rarely processed exhaustively.
Select one:
a. sequential file
b. indexed file
c. indexed sequential file
d. pile

Question 13

An interactive user or a process has associated with pathname is a current directory which is often referred to as the …………………….
Select one:
a. working directory
b. list directory
c. update directory
d. create directory

Question 14

………………….. is a preallocation strategy, using variable size portions where the file allocation table needs just a single entry for each file, showing the starting block and the length of the file.
Select one:
a. Contiguous allocation
b. Variable allocation
c. Chained allocation
d. Indexed allocation

Question 15

To solve the problem of external fragmentation __ needs to be done periodically.
Select one:
a. compaction
b. check
c. formatting
d. replacing memory

Question 16

On systems where there are multiple operating system, the decision to load a particular one is done by _
Select one:
a. boot loader
b. bootstrap
c. process control block
d. file control block

Question 17

If too little space is allocated to a file _
Select one:
a. the file will not work
b. there will not be any space for the data, as the FCB takes it all
c. the file cannot be extended
d. the file cannot be opened

We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: amitymbaassignment@gmail.com
Call/what’s app: +91 8290772200
What’s app: +91 8800352777
Amity assignment solution help, Amity assignment answers help, Assignment Help

MODULE V : SECURITY AND PROTECTION

Question 1
Which principle states that programs, users and even the systems be given just enough privileges to perform their task?
Select one:
a. Principle of operating system
b. Principle of least privilege
c. Principle of process scheduling
d. None of the mentioned

Question 2

_ is an approach to restricting system access to authorized users.
Select one:
a. Role-based access control
b. Process-based access control
c. Job-based access control
d. None of the mentioned

Question 3
For system protection, a process should access _
Select one:
a. all the resources
b. few resources but authorization is not required
c. only those resources for which it has authorization
d. All of the mentioned

Question 4
From the following, which is not a common file permission?
Select one:
a. Write
b. Execute
c. Stop
d. Read

Question 5
The protection domain of a process contains _
Select one:
a. object name
b. rights-set
c. both object name and rights-set
d. None of the mentioned

Question 6
Who can add new rights and remove some rights?
Select one:
a. Copy
b. Trfer
c. Limited copy
d. Owner

Question 7
For system protection, a process should access _
Select one:
a. all the resources
b. only those resources for which it has authorization
c. few resources but authorization is not required
d. all of the mentioned

Question 8
Which of the following is a strong password?
Select one:
a. 19thAugust88
b. Darshan025
c. Engineering
d. P@assw0rd

Question 9
If the set of resources available to the process is fixed throughout the process’s lifetime then its domain is _
Select one:
a. static
b. dynamic
c. neither static nor dynamic
d. both static as well as dynamic

Question 10
The protection domain of a process contains _
Select one:
a. object name
b. rights-set
c. both object name and rights-set
d. None of the mentioned

Question 11
What forces the user to change password at first logon ?
Select one:
a. Default behavior of OS
b. Part of AES encryption practice
c. Devices being accessed forces the user
d. Account administrator

Question 12
Which Design Principles of Security states that unless the subject is given explicit access to the object it should be denied access to that object?
Select one:
a. Principles of least privileges
b. Principles of separation of privileges
c. Principles of least common mechanism
d. Principles of fail safe defaults

Question 13
What forces the user to change password at first logon ?
Select one:
a. Default behavior of OS
b. Part of AES encryption practice
c. Devices being accessed forces the user
d. Account administrator

Question 14
Which Design Principles of Security states that subject should be given only those privileges that it requires?
Select one:
a. Principles of least privileges
b. Principles of separation of privileges
c. Principles of least common mechanism
d. Principles of fail safe defaults

Question 15
What is not a good practice for user administration ?
Select one:
a. Isolating a system after a compromise
b. Perform random auditing procedures
c. Granting privileges on a per host basis
d. Using telnet and FTP for remote access

Question 16
Why is one time password safe ?
Select one:
a. It is easy to generated
b. It cannot be shared
c. It is different for every access
d. It is a complex enctypted password

Question 17
What is characteristic of RADIUS system ?
Select one:
a. It is essential for centralized encryption and authentication
b. It works on Network layer to deny access to unauthorized people
c. It provides centralized authentication mechanism via network devices
d. It’s a strong File access system.
We Also Provide SYNOPSIS AND PROJECT.
Contact www.kimsharma.co.in for best and lowest cost solution or
Email: amitymbaassignment@gmail.com
Call/what’s app: +91 8290772200
What’s app: +91 8800352777
Amity assignment solution help, Amity assignment answers help, Assignment Help

Leave a Reply

Your email address will not be published. Required fields are marked *