01.
If a magnetic disc drive has 100 cylinders, each containing 10 tracks of 10 sectors, and each sector
cancontain 128 bytes, what is the maximum capacity of the disc drive in KB?
A. 160,000 B. 1,280
C. 1,250 D. 1,280,000
The maximum capacity of the disk is 1280000 bytes.
Given data :
1 sector contains 128 bytes.
There are 10 sectors in one track.
One cylinder contains 10 tracks.
There are 100 cylinders.
• The total number of tracks
= Number of cylinders × Tracks in one cylinder
= 100×10
= 1000
• Number of sectors
= Number of tracks × Sectors in one track
= 1000×10
= 10000
• Total amount of data
= Total number of sector × data present in one sector
= 10000×128
= 1280000 bytes
The total capacity of data in terms of bytes is 1280000 bytes
02. According to the specifications of a particular hard disk, a seek time takes 0.3 milliseconds
betweenadjacent tracks. If the disk has 100 cylinders how long will it take for the head to move from the
innermost cylinder to the outermost cylinder.
A. 30 milliseconds B. 300 microseconds
C. 3000 microseconds D 0.3 seconds
03. A computer that is advertised as having a 96K byte DRAM memory and a 2.1 Gigabyte hard
drivehas
A. 96K bytes of secondary memory and 2.1 Gigabytes of primary memory
B. 2.1 Gigabytes of auxiliary memory and 96 K bytes of primary memory
C. 96K bytes of cache, 2.1 Gigabytes of primary memory
D. 2.1 Gigabytes of auxiliary memory, 96 K bytes of primary memory and 96 bytes of cache
04. The average time required to reach a storage location in memory and obtain its contents is called the
A. Seek time B. Turnaround time
C. Access time D. Transfer time
05. The amount of time required to read a block of data from a disk into memory is composed of
seektime, rotational latency, and transfer time. Rotational latency refers to
A. The time it takes for the platter to make a full rotation
B. The time it takes for the read-write head to move into position over the appropriate track
C. The time it takes for the platter to rotate the correct sector under the head
D. None of the others
06. The method of placing the heads and the discs in an air tight environment is called as ……..
A. RAID Arrays B. ATP tech
C. Winchester technology D. Fleming reduction
Explanation: <numeric> The Disks and the heads operate faster due to the absence of the dust particles.
07. Which of the following is a component of the disk system?
A. Disk B. Disk drive
C. Disk controller D. All of the others
08. If the drive has 20 surfaces, how many heads will it have?
A. 1 B. 5
C. 10 D. 20
Explanation: <numeric> Each surface will have its own head to perform read/write operation.
09. The...............process divides the disk into sectors and tracks.
A. Creation B. Initiation
C. Formatting D. Modification
Explanation: <numeric> The formatting process deletes the data present and does the creation ofsectors and tracks.
10. The data can be accessed from the disk using ……….
A. Surface number B. Sector number
C. Track number D. All of the others
11. The..............is the minimum storage unit of a hard drive.
A. Track B. Sector
C. Cluster D. Cylinder
12. To distinguish between two sectors we make use of ……….
A. Inter sector gap B. Splitting bit
C. Numbering bit D. None of the others
Explanation: <numeric> This means that we leave <để lại> a little gap between each sectors todifferentiate
between them.
13................is used to deal with the difference in the transfer rates between the drive and the bus.
A. Data repeaters B. Enhancers
C. Data buffers D. None of the others
Explanation: <numeric> The buffers are added to store the data from the fast device and to send it tothe slower device at its
rate.
14. What common characteristics are shared by all RAID levels?
A. Set of physical disk drives viewed by the operating system as a single logical drive
B. Data are distributed across the physical drives of an array in a scheme known as striping
C. Redundant disk capacity is used to store parity information, which guarantees data recoverability incase of
a disk failure
D. All of the others
15. The solution to the problem of reliability is the introduction of ……….
A. Aging B. Scheduling
C. Redundancy D. Disks
16. RAID splits file(s) into many segments, and sends the segments to several disks. Files that have
beensegmented in this way are called:
A. Striped File B. Striped Data
C. Striped Array D. None of the others
17. Which of the following is the RAID level no redundant?
A. 0 B. 1
C. 2 D. 3
18. Which of the following is the RAID level refers to memory-style ECC organization?
A. 1 B. 2
C. 3 D. 4
19. Which of the following is the RAID level distributes parity and data across all the disks?
A. 3 B. 4
C. 5 D. 6
20. RAID level 1+0 is used because RAID level 1 provides ………. whereas RAID level 0 provides ……….
A. Performance, Redundancy B. Performance, Reliability
C. Redundancy, Performance D. Reliability, Performance
01. register keeps tracks of the instructions stored in program stored in memory.
A. AR (Address Register) B. XR (Index Register)
C. PC (Program Counter) D. AC (Accumulator)
02. An interface that provides a method for transferring binary information between internal storage
andexternal devices is called as …
A. I/O interface B. Input interface
C. Output interface D. I/O bus
03. An interface that provides I/O transfer of data directly to or form the memory unit and peripheral is
termed as …
A. DDA B. Serial interface
C. BR D. DMA
04. External, or peripheral, devices include:
A. Human readable B. Machine readable
C. Communication D. All of the others
05. With the functions of an I/O module, which of the following statements is false:
A. Control and timing
B. A module only connects to a peripheral device
C. Exchange information with the processor, with peripherals
D. Data buffers, error detection
06. I/O addressing methods:
A. Memory-mapped I/O
B. Isolated I/O
C. Both memory-mapped I/O and isolated I/O
D. None of the others
07. In memory-mapped I/O…
A. The I/O devices and the memory share the same address space
B. The I/O devices have a seperate address space
C. The memory and I/O devices have an associated address space
D. A part of the memory is specifically set aside for the I/O operation
Explanation: It’s the different modes of accessing the i/o devices.
08. With isolated I/O, ...
A. The I/O devices and the memory share the same address space
B. The I/O devices have a seperate address space
C. The memory and I/O devices have an associated address space
D. A part of the memory is specifically set aside for the I/O operation
Explanation: It’s the different modes of accessing the i/o devices.
09. There are three methods for performing I/O:
A. Interrupt-driven I/O, System-driven I/O, DMA
B. Interrupt-driven I/O, System-driven I/O, Programmed I/O
C. Programmed I/O, Interrupt-driven I/O, DMA
D. Programmed I/O, System-driven I/O, DMA
10. The method of accessing the I/O devices by repeatedly checking the status flags is …
A. Programmed I/O B. Memory-mapped I/O
C. I/O mapped D. None of the others
Explanation: In this method the processor constantly checks the status flags , and when it finds that theflag is set it
performs the appropriate operation.
11. The method of synchronising the processor with the I/O device in which the device sends a
signalwhen it is ready is …
A. Exceptions B. Signal handling
C. Interrupt-driven I/O D. DMA
Explanation: This is a method of accessing the I/O devices which gives the complete power to thedevices, enabling
them to intimate the processor when they’re ready for transfer.
12. The process where in the processor constantly checks the status flags is called as …
A. Polling B. Inspection
C. Reviewing D. Echoing
13. With Programmed I/O, which of the following statements is false:
A. Use input/output commands in the program to exchange data with the I/O ports
B. Peripherals are active objects in data exchange
C. When executing the program, encountering input/output commands, the CPU controls data
exchangewith peripherals
D. Peripherals are passive objects in data exchange
14. With Programmed I/O, which of the following statements is true:
A. This is the simplest method to exchange data
B. This is the fastest method to data exchange
C. Complex circuit design
D. None of the others
15. With Interrupt-driven I/O, which of the following statements is false:
A. Peripherals are the active object in data exchange
B. CPU does not have to wait for the availability of peripherals
C. CPU have to wait for the availability of I/O module
D. I/O module interrupt CPU when it is in ready state
16. With Interrupt-driven I/O, which of the following statements is true:
A. Peripherals are the active object in data exchange
B. The method is fully processed by hardware
C. CPU is an active object in data exchange
D. The method is fully processed by software
17. The DMA differs from the interrupt mode by …
A. The involvement of the processor for the operation
B. The method accessing the I/O devices
C. The amount of data transfer possible
D. Both the involvement of the processor for the operation and the amount of data transfer possible
Explanation: DMA is an approach of performing data transfers in bulk between memory and theexternal device
without the intervention of the processor.
18. The DMA transfers are performed by a control circuit called as …
A. Device interface B. DMA controller
C. Data controller D. Overlooker
Explanation: The Controller performs the functions that would normally be carried out by the processor.
19. In DMA transfers, the required signals and addresses are given by the …
A. Processor B. Device drivers
C. DMA controller D. The program itself
Explanation: The DMA controller acts like a processor for DMA transfers and overlooks <bỏ qua> the entire process.
20. The technique whereby the DMA controller steals the access cycles of the processor to
operate iscalled as …
A. Fast conning B. Memory Con
C. Cycle stealing D. Memory stealing
Explanation: The controller takes over the processor’s access cycles and performs memory operations.
01. The operating system is an example of a computer ……….
A. Object B. File system
C. Program D. Desktop
02. Which of the following is the primary purpose of an operating system?
A. To make the most efficient use of the computer hardware
B. To allow people to use the computer
C. To keep systems programmers employed
D. To make computers easier to use
03. The key services provided by an OS:
A. Create and execute programs
B. Control access to I/O devices, files and system resources
C. Accounting, error detection and response
D. All of the others
04. One of the function of operating system is it serves an interface between user and ……….
A. Software B. Hardware
C. Utilities D. Data ware
05. In an...............system the user/programmer interacts directly with the computer, usually through a
keyboard/display terminal to request the execution of a job or to perform a transaction.
A. Batch B. Multiprogramming
C. Interactive D. None of the others
06. Which of the following is NOT a function of operating system?
A. Resource Manager B. Storage Manager
C. Process Manager D. Software Manager
07. Long-term scheduling is:
A. The decision to add which programs to the system for processes
B. The decision to add to the number of processes that are partially or fully in main memory
C. The decision as to which available process will be executed by the processor.
D. The decision as to which process's pending I/O request shall be handled by an available I/O device.
08. Medium-term scheduling is:
A. The decision as to which process's pending I/O request shall be handled by an available I/O device.
B. The decision as to which available process will be executed by the processor.
C. The decision to add to the number of processes that are partially or fully in main memory
D. The decision to add which programs to the system for processes
09. Short-term scheduling is:
A. The decision to add which programs to the system for processes
B. The decision as to which available process will be executed by the processor.
C. The decision to add to the number of processes that are partially or fully in main memory
D. The decision as to which process's pending I/O request shall be handled by an available I/O device.
10. What is a process?
A. A program in execution
B. A *.exe file
C. A executable file stored in external memory
D. None of the others
11. What is the purpose of the process?
A. Multiprocessing B. Multiprogramming
C. Multicore D. All of the others
12. In the process state transition diagram, which state corresponding to a program is admitted by
theLong-term scheduler?
A. New B. Ready
C. Running D. Halted
13. In the process state transition diagram,.................will initialize the process, moving it to the ready state.
A. Long-term scheduler B. Medium-term scheduler
C. Short-term scheduler D. None of the others
14. In the process state transition diagram, the transition from the READY state to the RUNNING state
indicates that:
A. A process was preempted by another process
B. A process has blocked for a semaphore or other operation
C. A process is done waiting for an I/O operation
D. A process was just created
15. The state corresponding to the process has terminated and will be destroyed by the OS is called:
A. New B. Ready
C. Running D. Halted
16. Copying a process from memory to disk to allow space for other processes is called?
A. Page Fault B. Deadlock
C. Demand Paging D. Swapping
17. The purpose of swapping is:
A. To remove processes not in a ready state
B. To provide for efficient use of main memory for processes execution
C. To add processes in a ready state to main memory
D. None of the others
18. Swapping is executed by ..........
A. Long-term scheduler B. Medium-term scheduler
C. Short-term scheduler D. None of the others
19. If a process may be dynamically assigned to different locations in main
memory, what is implicationfor the addressing mechanism?
A. The addressing mechanism must keep track of the physical addresses of the
process
B. The addressing mechanism must keep track of the logical addresses used for
swapping out theprocess
C. The addressing mechanism must keep track of the physical addresses of the
process, as well as thelogical addresses used for swapping out the process
D. None of the others
20. The purpose of a TLB is:
A. To cache page translation information
B. To cache frequently used data
C. To hold register values while a process is waiting to be run
To hold the start and length of the page table
1. What is Address Binding?
A. going to an address in memory
B. locating an address with the help of another address
C. binding two addresses together to form a new address in a different memory space
D. a mapping from one address space to another
2. Binding of instructions and data to memory addresses can be done at
A. Compile time
B. Load time
C. Execution time
D. All of the mentioned
3. If the process can be moved during its execution from one memory segment to another, then
binding must be
A. delayed until run time
B. preponed to compile time
C. preponed to load time
D. none of the mentioned
4. What is Dynamic loading?
A. loading multiple routines dynamically
B. loading a routine only when it is called
C. loading multiple routines randomly
D. none of the mentioned
5. What is the advantage of dynamic loading?
A. A used routine is used multiple times
B. An unused routine is never loaded
C. CPU utilization increases
D. All of the mentioned
6. The idea of overlays is to
A. data that are needed at any given time
B. enable a process to be larger than the amount of memory allocated to it
C. keep in memory only those instructions
D. all of the mentioned
7. The must design and program the overlay structure.
A. programmer
B. system architect
C. system designer
D. none of the mentioned
8. The swaps processes in and out of the memory.
A. Memory manager
B. CPU
C. CPU manager
D. User
9. If binding is done at assembly or load time, then the process be moved to different locations after
being swapped out and in again.
A. Can
B. Must
C. can never
D. may
10. In a system that does not support swapping
A. the compiler normally binds symbolic addresses (variables) to relocatable addresses
B. the compiler normally binds symbolic addresses to physical addresses
C. the loader binds relocatable addresses to physical addresses
D. binding of symbolic addresses to physical addresses normally takes place during execution
11. Which of the following is TRUE?
A. Overlays are used to increase the size of physical memory
B. Overlays are used to increase the logical address space
C. When overlays are used, the size of a process is not limited to the size of the physical memory
D. Overlays are used whenever the physical address space is smaller than the logical address space
12. The address generated by the CPU is referred to as
A. Physical address
B. Logical address
C. Neither physical nor logical
D. None of the mentioned
13. The address loaded into the memory address register of the memory is referred to as
A. Physical address
B. Logical address
C. Neither physical nor logical
D. None of the mentioned
14. The run time mapping from virtual to physical addresses is done by a hardware device called the
A. Virtual to physical mapper
B. Memory management unit
C. Memory mapping unit
D. None of the mentioned
15. The base register is also known as the
A. basic register
B. regular register
C. relocation register
D. delocation register
16. The size of a process is limited to the size of
A. physical memory
B. external storage
C. secondary storage
D. none of the mentioned
17. If execution time binding is being used, then a process be swapped to a different memory space.
A. has to be
B. can never
C. must
D. may
18. Swapping requires a
A. Motherboard
B. Keyboard
C. Monitor
D. backing store
19. The backing store is generally a
A. fast disk
B. disk large enough to accommodate copies of all memory images for all users
C. disk to provide direct access to the memory images
D. all of the mentioned
20. The consists of all processes whose memory images are in the backing store or in memory
and are ready to run.
A. wait queue
B. ready queue
C. cpu
D. secondary storage
21. The time in a swap out of a running process and swap in of a new process into the memory
is very high.
A. context – switch
B. waiting
C. execution
D. all of the mentioned
22. The major part of swap time is time.
A. Waiting
B. Transfer
C. Execution
D. none of the mentioned
23. Swapping be done when a process has pending I/O, or has to execute I/O operations only
into operating system buffers.
A. must
B. can
C. must never
D. maybe
24. Swap space is allocated
A. as a chunk of disk
B. separate from a file system
C. into a file system
D. all of the mentioned
25. CPU fetches the instruction from memory according to the value of
A. program counter
B. status register
C. instruction register
D. program status word
26. A memory buffer used to accommodate a speed differential is called
A. stack pointer
B. cache
C. accumulator
D. disk buffer
27. Which one of the following is the address generated by CPU?
A. physical address
B. absolute address
C. logical address
D. none of the mentioned
28. Run time mapping from virtual to physical address is done by
A. Memory management unit
B. CPU
C. PCI
D. None of the mentioned
29. Memory management technique in which system stores and retrieves data from secondary storage
for use in main memory is called?
A. fragmentation
B. paging
C. mapping
D. none of the mentioned
30. The address of a page table in memory is pointed by
A. stack pointer
B. page table base register
C. page register
D. program counter
31. Program always deals with
A. logical address
B. absolute address
C. physical address
D. relative address
.
32. The page table contains
A. base address of each page in physical memory
B. page offset
C. page size
D. none of the mentioned
33. What is compaction?
A. a technique for overcoming internal fragmentation
B. a paging technique
C. a technique for overcoming external fragmentation
D. a technique for overcoming fatal error
34. Operating System maintains the page table for
A. each process
B. each thread
C. each instruction
D. each address
35. The main memory accommodates
A. operating system
B. cpu
C. user processes
D. all of the mentioned
.
36. What is the operating system?
A. in the low memory
B. in the high memory
C. either low or high memory (depending on the location of interrupt vector)
D. none of the mentioned
37. In contiguous memory allocation
A. each process is contained in a single contiguous section of memory
B. all processes are contained in a single contiguous section of memory
C. the memory space is contiguous
D. none of the mentioned
38. The relocation register helps in
A. providing more address space to processes
B. a different address space to processes
C. to protect the address spaces of processes
D. none of the mentioned
39. With relocation and limit registers, each logical address must be the limit register
A. less than
B. equal to
C. greater than
D. none of the mentioned
40. The operating system and the other processes are protected from being modified by an already
running process because
A. they are in different memory spaces
B. they are in different logical addresses
C. they have a protection algorithm
D. every address generated by the CPU is being checked against the relocation and limit registers
41. Transient operating system code is code that
A. is not easily accessible
B. comes and goes as needed
C. stays in the memory always
D. never enters the memory space
42. Using transient code, the size of the operating system during program execution.
A. Increases
B. Decreases
C. Changes
D. maintains
43. When memory is divided into several fixed sized partitions, each partition may contain
A. exactly one process
B. at least one process
C. multiple processes at once
D. none of the mentioned
44. In fixed size partition, the degree of multiprogramming is bounded by
A. the number of partitions
B. the CPU utilization
C. the memory size
D. all of the mentioned
45. The first fit, best fit and worst fit are strategies to select a
A. process from a queue to put in memory
B. processor to run the next process
C. free hole from a set of available holes
D. all of the mentioned
46. In internal fragmentation, memory is internal to a partition and
A. is being used
B. is not being used
C. is always used
D. none of the mentioned
47. A solution to the problem of external fragmentation is
A. compaction
B. larger memory space
C. smaller memory space
D. none of the mentioned
48. Another solution to the problem of external fragmentation problem is to
A. permit the logical address space of a process to be noncontiguous
B. permit smaller processes to be allocated memory at last
C. permit larger processes to be allocated memory at last
D. all of the mentioned
t
49. If relocation is static and is done at assembly or load time, compaction
A. cannot be done
B. must be done
C. must not be done
D. can be done
50. The disadvantage of moving all process to one end of memory and all holes to the other
direction, producing one large hole of available memory is
A. the cost incurred
B. the memory used
C. the CPU used
D. all of the mentioned
51. is generally faster than and
A. first fit, best fit, worst fit
B. best fit, first fit, worst fit
C. worst fit, best fit, first fit
D. none of the mentioned
52. External fragmentation exists when?
A. enough total memory exists to satisfy a request but it is not contiguous
B. the total memory is insufficient to satisfy a request
C. a request cannot be satisfied even when the total memory is free
D. none of the mentioned
53. External fragmentation will not occur when?
A. first fit is used
B. best fit is used
C. worst fit is used
D. no matter which algorithm is used, it will always occur
54. Sometimes the overhead of keeping track of a hole might be
A. larger than the memory
B. larger than the hole itself
C. very small
D. all of the mentioned
55. When the memory allocated to a process is slightly larger than the process, then
A. internal fragmentation occurs
B. external fragmentation occurs
C. both internal and external fragmentation occurs
D. neither internal nor external fragmentation occurs
56. Physical memory is broken into fixed-sized blocks called
A. Frames
B. Pages
C. backing store
D. none of the mentioned
57. Logical memory is broken into blocks of the same size called
A. frames
B. pages
C. backing store
D. none of the mentioned
58. Every address generated by the CPU is divided into two parts. They are
A. frame bit & page number
B. page number & page offset
C. page offset & frame bit
D. frame offset & page offset
59. The is used as an index into the page table.
A. frame bit
B. page number
C. page offset
D. frame offset
60. The table contains the base address of each page in physical memory.
A. process
B. memory
C. page
D. frame
61. The size of a page is typically
A. varied
B. power of 2
C. power of 4
D. none of the mentioned
62. If the size of logical address space is 2 to the power of m, and a page size is 2 to the power of n
addressing units, then the high order bits of a logical address designate the page number, and the
low order bits designate the page offset.
A. m, n
B. n, m
C. m – n, m
D. m – n, n
63. With paging there is no fragmentation.
A. Internal
B. External
C. either type of
D. none of the mentioned
64. The operating system maintains table that keeps track of how many frames have been
a
allocated, how many are there, and how many are available.
A. page
B. mapping
C. frame
D. memory
65. Paging increases the time.
A. waiting
B. execution
C. context – switch
D. all of the mentioned
66. Smaller page tables are implemented as a set of
A. Queues
B. Stacks
C. Counters
D. registers
67. The page table registers should be built with
A. very low speed logic
B. very high speed logic
C. a large memory space
D. none of the mentioned
68. For larger page tables, they are kept in main memory and a points to the page table
A. page table base register
B. page table base pointer
C. page table register pointer
D. page table base
69. For every process there is a
A. page table
B. copy of page table
C. pointer to page table
D. all of the mentioned
70. Time taken in memory access through PTBR is
A. extended by a factor of 3
B. extended by a factor of 2
C. slowed by a factor of 3
D. slowed by a factor of 2
71. Each entry in a translation lookaside buffer (TLB) consists of
A. key
B. value
C. bit value
D. constant
72. An uniquely identifies processes and is used to provide address space protection for
that process.
A. address space locator
B. address space identifier
C. address process identifier
D. none of the mentioned
73. Memory protection in a paged environment is accomplished by
A. protection algorithm with each page
B. restricted access rights to users
C. restriction on page visibility
D. protection bit with each page
74. When the valid – invalid bit is set to valid, it means that the associated page
A. is in the TLB
B. has data in it
C. is in the process’s logical address space
D. is the system’s physical address space
75. Illegal addresses are trapped using the bit.
A. error
B. protection
C. valid – invalid
D. access
76. When there is a large logical address space, the best way of paging would be
A. not to page
B. a two level paging algorithm
C. the page table itself
D. all of the mentioned
77. In paged memory systems, if the page size is increased, then the internal fragmentation generally
A. becomes less
B. becomes more
C. remains constant
D. none of the mentioned
78. How are jobs processed in a single-user system?
A. sequentially
B. randomly
C. intermittently
D. the longest job is processed first
79. What is another name for a fixed partition?
A. complete partition
B. direct partition
C. static partition
D. sized partition
80. What is the first step in the algorithm to load a job in a fixed partition?
A. Compare job size to size of largest partition
B. Determine job’s requested memory size
C. Set counter to 1
D. No partition available at this time, put job in waiting queue
81. In the partition scheme, the Memory Manager uses a table to keep track of jobs. What are the
components of the table?
A. partition size, memory address, status
B. status, access, memory address
C. partition size, status, access
D. partition size, memory address, access, status
82. When does a fixed partition scheme work well?
A. when jobs have the same size
B. when job sizes are not known in advance
C. when jobs have different sizes
D. when all jobs are under 100K
83. What is the name for fragments of free memory between blocks of allocated memory?
A. inefficient fit
B. external fragmentation
C. indirect partitioning
D. internal fragmentation
84. Which memory allocation scheme places jobs in the first partition fitting the requirements?
A. fixed partitioning
B. dynamic fit memory allocation
C. first-fit memory allocation
D. best-fit memory allocation
85. Which memory allocation scheme results in the smallest amount of wasted space?
A. fixed partitioning
B. dynamic fit memory allocation
C. first-fit memory allocation
D. best-fit memory allocation
86. Consider the following space requirements for jobs 1-4 and memory blocks. Assuming a first-fit
scheme is used, which job is not able to run?
Jobs:
J1 10K
J2 20K
J3 30K
J4 10K
Blocks:
B1 30K
B2 15K
B3 50K
B4 20K
A. J1
B. J3
C. J2
D. J4
87. Consider the following space requirements for jobs 1-4 and memory blocks. Assuming a best-fit
scheme is used, which job is placed in the last block?
Jobs:
J1 10K
J2 20K
J3 30K
J4 10K
99999
Blocks:
B1 30K
B2 15K
B3 50K
B4 20K
A. J1
B. J3
C. J2
D. J4
88. The following algorithm can be described as-------------.
I. Set counter to 1
II. Do while counter <= number of blocks in memory
If job_size > memory_size(counter)
Then counter = counter + 1
Else
load job into memory_size(counter)
adjust free/busy memory lists
go to step 4
End do
III. Put job in waiting queue
IV. Go fetch next job
A. first-fit memory allocation
B. least-fit memory allocation
C. best-fit memory allocation
D. fixed partition memory allocation
89. The following algorithm can be described as-------------.
I. Initialize memory_block(0) = 99999
II. Compute initial_memory_waste = memory_block(0) – job_size
III. Initialize subscript = 0
IV. Set counter to 1
V. Do while counter <= number of blocks in
memory If job_size > memory_size(counter)
Then counter = counter + 1
Else
memory_waste = memory_size(counter) – job_size
If initial_memory_waste > memory_waste
Then subscript = counter
initial_memory_waste = memory_waste
counter = counter + 1
End do
VI. If subscript = 0
Then put job in waiting queue
Else
Load job into memory_size(subscript)
adjust free/busy memory lists
VII. Go fetch next job
A. first-fit memory allocation
B. least-fit memory allocation
C. best-fit memory allocation
D. fixed partition memory allocation
90. Assume the Memory Manager receives a request for a block of 200. When the best-fit algorithm
is used, what is the beginning address of the block granted by the Memory Manager?
Beginning Address Memory Block Size
4075 105
5225 5
6785 600
7560 20
7600 205
10250 4050
15125 230
24500 1000
A. 6785
B. 10250
C. 7600
D. 15125
91. How does an operating system reclaim fragmented memory space?
A. deallocation
B. compaction
C. redirection
D. reallocation
92. The--------------contains the value that must be added to each address referenced in the program
so it will be able to access the correct memory addresses after relocation.
A. busy list
B. relocation register
C. compaction monitor
D. bounds register
93. When should compaction be performed?
A. when a certain percentage of memory becomes busy
B. only when there are jobs waiting to get in
C. after a prescribed amount of time has elapsed
D. Any of the above, depending on the system
94. What is the actual memory address for a job that starts at 18K?
A. 1,800
B. 18,432
C. 18,000
D. 180,000
95. In a fixed partition scheme, what is the problem with partitions that are too large?
A. small jobs will have to wait
B. external fragmentation
C. large jobs will have to wait
D. wasted memory
96. A single user contiguous memory management system
A. has the advantage of simplicity in writing operating systems
B. has the disadvantage of wasting memory for most jobs
C. both a and b
D. neither a nor b
97. Static partitioning systems were instituted to allow
A. non-contiguous loading of programs
B. multiprogramming
C. both a&b
D. non of them
98. Given the following static allocation scheme:
Partition Contents Size
1 operating system 32K
2 free 32K
3 free 64K
Where will a job requiring 96K bytes of memory be stored?
A. partition 1+ partition 2 +partition 3
B. partition 2+ partition 3
C. partition 3
D. none of the above
99. A static partitioned memory management system has a total of six partitions. If one is allocated
to the operating system, this will allow a total of
A. five user jobs
B. six user jobs
C. (25) user jobs
D. (25) user jobs
100. Consider the case where the Free Memory Storage List is kept in ascending order by partition
size. The attempt to place a job in the smallest free partition in which it will fit is called:
A. First Fit
B. Best Fit
C. Worst Fit
D. No Fit
101. Consider the case where the Free Memory Storage List is kept in order by memory address
(regardless of the partition size). The attempt to place a job in the first free block in which it
will fit is called:
A. First Fit
B. Best Fit
C. Worst Fit
D. No Fit
102. Given the following dynamic partition allocation tables, respond to the next 3 questions.
Allocated Partition Table
Size Address Status
8K 312K in use
32K 320K in use
-- -- no entry
120K 384K in use
-- -- no entry
Free Area Table
Size Address Status
32K 352K free
520K 504K free
-- -- no entry
-- -- no entry
1. If a job comes into the system requiring 8K of main memory, using a First Fit
allocation scheme, it will be given space from the free area of size:
A. 32K
B. 520K
C. 352K
D. 504K
2. The resulting fragment will be of size:
A. 8K
B. 24K
C. 32K
D. 40K
3. If the jobs currently running in the first two partitions finish before a new job arrives, the
free table will be augmented by a space that is of size (assume compaction)?
A. 8K
B. 24K
C. 32K
D. 40K
E. 632K
103. Relocatable partitioned memory was designed to:
A. utilize low core storage
B. reduce external fragmentation of memory
C. allow for flexible addressing mechanisms
D. all of them
104. A difficulty of all relocatable partitioning schemes, regardless of addressing mechanism is:
A. the difficulty of distinguishing number representing addresses from numbers representing
arithmetic values
B. the overhead involved in moving program instructions and data to new locations
C. all the above
D. none of the above
105. Use the following description of main memory to answer the next 3 questions.
PARTITION Partition JOB
Number SIZE SIZE
1 8K 1K
2 32K 9K
3 64K 19K
1. The space wasted by the job in partition 2 is:
A. 7K
B. 9K
C. 23K
D. 45K
2. The job in partition 3 would best fit in:
A. partition 1
B. partition 2
C. partition 3
D. none of the above
3. The length of each partition is:
A. fixed
B. variable
106. Consider the following diagram to answer the next 2
questions. Program relocation would result in a contiguous free
space of:
0
Operating System
Program A
Program B
Waste 10K
Program C
Waste 12K
Program D
640K
A. 12K
B. 22K
C. 2K
D. 120K
1. D 28. A 55. A 82. A
2. D 29. B 56. A 83. A
3. A 30. B 57. B 84. C
4. B 31. A 58. B 85. D
5. B 32. A 59. B 86. B
6. B 33. B 60. C 87. C
7. D 34. A 61. B 88. A
8. A 35. A 62. D 89. C
9. C 36. C 63. B 90. C
10. A 37. A 64. C 91. B
11. C 38. C 65. C 92. B
12. B 39. A 66. D 93. D
13. A 40. D 67. B 94. B
14. B 41. B 68. A 95. B
15. C 42. C 69. A 96. C
16. A 43. A 70. D 97. B
17. D 44. A 71. A 98. D
18. D 45. C 72. B 99. A
19. D 46. B 73. D 100. B
20. A 47. A 74. C 101. A
21. A 48. A 75. C 102. 1 A, 2B,
22. B 49. A 76. B 3D
23. C 50. A 77. B 103. B
24. A 51. A 78. A 104. B
25. A 52. A 79. C 105. 1C, 2B,
26. B 53. D 80. B 3A
27. C 54. B 81. D 106. B