Q241. Pre-emptive scheduling, is the strategy of temporarily suspending a running process
a) when it requests (I/O)
b) to allow starving processes to run
c) before the CPU time slice expires
d) none of the above
Answer : c
Q242. Some computer systems support dual mode operation—the user mode and the supervisor or monitor mode. These refer to the modes
a) of memory access
b) by which user programs handle their data
c) by which the operating system executes user programs
d) in which the processor and the associated hardware operate
Answer : d
Q243. In Round Robin CPU scheduling, as the time quantum is increased, the average turn around
a) remains constant
b) varies irregularly
c) increases
d) decrease
Answer : b
Q244. To obtain better memory utilization, dynamic loading is used. With dynamic loading a routine is not loaded until it is called for. For implementing dynamic loading,
a) special support from operating system is essential
b) special support from hardware is essential
c) special support from both hardware and operating system are essential
d) user programs can implement dynamic loading without any special support from the operating system or the hardware.
Answer : d
Q245. Semaphores are used to solve the problem of
a) race condition
b) mutual exclusion
c) process synchronization
d) Both (B) and (C)
Answer : d
Q246. Dijkstra’s banking algorithm in an operating system solves the problem of
a) mutual exclusion
b) context switching
c) deadlock avoidance
d) deadlock recovery
Answer : c
Q.247 Overlay is
a) a specific memory location
b) a part of an operating system
c) overloading the system with many user files
d) a single contiguous memory that was used in the olden days for running large programs by swapping.
Answer : d
Q248. The only state transition that is initiated by the user process itself is
a) block
b) wakeup
c) dispatch
d) none of the above
Answer : a
Q249. Kernel is
a) the software which monitors the operating system
b) the set of primitive functions upon which the rest of operating system functions are built up
c) considered as the critical part of the operating system
d) none of the above
Answer : b
Q250. Dirty bit is used to show the
a) wrong page in the memory
b) page with corrupted data
c) page that is less frequently accessed
d) page that is modified after being loaded into cache memory
Answer : d