Monday, 30 November 2015

IBPS SO Mock Test (IT Officer): Operating System Quiz - 55

1. The LRU algorithm
(a) pages out pages that have been used recently
(b) pages out pages that have not been used recently
(c) pages out pages that have been least used recently
(d) pages out the first page in a given area
 
2. Which of the following systems software does the job of merging the records from two files into one?
(a) Security software       
(b) Utility program          
(c) Networking software              
(d) Documentation system

3. Which of the following statements is false?
(a) the technique of storage compaction involves moving all occupied areas of storage to one end or  other of main storage
(b) compaction does not involve relocation of programs
(c) compaction is also known as garbage collection
(d) the system must stop everything while it performs the compaction

4. User-Friendly systems are:
(a) required for object-oriented programming   
(b) easy to develop         
(c) common among traditional  mainframe operating systems         
(d) becoming more common

5. Which of the following addressing modes, facilitates access to an operand whose location is defined relative to the beginning of the data structure in which it appears?
(a) Ascending     
(b) Sorting           
(c) Index              
(d) None of these

6. The FIFO algorithm
(a) executes first the job that last entered the queue
(b) executes first the job that first  job entered the queue
(c) execute first the job that has been in the queue the longest
(d) executes first the job with the least processor needs

7. Assemble code data base is associated with
(a) assembly language version of the program which is created by the code generation phase and is input to the assemble phase
(b) a permanent table of decision rules in the form of patterns for matching with the uniform symbol table to discover syntactic structure
(c) consists of a full or partial  list or the token’s as they appear in the program. Created by lexical analysis and interpretation
(d) a permanent table which lists all key words and special symbols of the language in symbolic form

8. In which addressing mode the effective address of the operand is the contents of a register specified in the instruction and after accessing the operand is the contents of this register is incremented to point to the next item in the list?
(a) index addressing       
(b) indirect addressing   
(c) auto  increment         
(d) auto decrement

9. In which addressing mode the contents of a register specified in the instruction are first decremented, and then these contents are used as the effective address of the operands?
(a) index addressing      
(b) indirect addressing   
(c) auto  increment          
(d) auto decrement

10. What is the name given to the values that are automatically provided by software to reduce keystrokes and improve a computer user’s productivity?
(a) Defined values           
(b) Fixed values  
(c) Default values             
(d) Special values

11. The Register-to-Register (RR) instructions
(a) have both their operands in the main store
(b) which perform an operation on a register operand and an operand which is located in the main store, generally leaving the result in the register, except in the case of store operation when it is also written into the specified storage location
(c) which perform indicated operations on two fast registers of the machine and leave the result in one of the registers
(d) All of the above

12. The process of transferring data intended for a peripheral device into a disk (or intermediate store) so that it can be transferred to peripheral at a more convenient time or in bulk, is known as
(a)  multiprogramming   
(b) spooling        
(c) caching           
(d) virtual programming

13. ______ is a closed chain of processes exist such that each process holds at least one resource needed by another process in the chain
(a) Mutual Exclusion      
(b) Hold & Wait 
(c) No pre-emption         
(d) Circular wait

14. The action of parsing the source program into the proper syntactic classes is known as
(a) syntax analysis           
(b) lexical analysis          
(c) interpretation analysis           
(d) general syntax analysis

15. Banker’s algorithm for resource allocation deals with
(a) deadlock prevention              
(b) deadlock avoidance  
(c) deadlock recovery     
(d) mutual exclusion

16. Relocation bits used by relocating loader are specified (generated) by
(a) relocating loader itself            
(b) linker             
(c) assembler of translator          
(d) macro processor

17. Which of the following scheduling objectives should be applied to the following: the system should admit jobs to create a mix that will keep most devices busy
(a) to be fair       
(b) to balance resource utilization           
(c) to obey priorities       
(d) to be predictable

18. The higher versions of the operating systems are so written that programs designed for earlier versions can still be run. What is it called?
(a) upgradability             
(b) upward mobility        
(c) universality   
(d) upward compatibility

19. Which policy replaces a page if it is not in the favoured subset of a process’s pages?
(a) FIFO               
(b) LRU  
(c) LFU   
(d) Working set

20. Which of the following can be accesses by transfer vector approach of linking?
(a) external data segments         
(b) external subroutines              
(c) data located in other procedures            
(d) All of the above

Aslo useful article and quiz:

No comments:

Post a Comment

Advertisement