NEW**UGC NET Solved Papers Held On June 2015

Download Admit Card
                                Important Dates      Schedule Of Examination       Eligibility      

April 14, 2013

Important Questions For System Software and Operating System



1-Translator for low level programming language were termed as-Assembler
2-Analysis which determines the meaning of a statement once its grammatical structure
becomes known is termed as-Semantic analysis
3-Load address for the first word of the program is called-load address origin
4-Symbolic names can be associated with-data or instruction
5-The translator which perform macro expansion is called a-Macro pre-processor
6-Shell is the exclusive feature of-UNIX
7-A program in execution is called-Process
8-Interval between the time of submission and completion of the job is called-Turnaround time
9-A scheduler which selects processes from secondary storage device is called-Medium term scheduler.
10-The scheduling in which CPU is allocated to the process with least CPU-burst time
is called-Shortest job first Scheduling
11-The term ‘page traffic’ describes-the movement of pages in and out of memory.
12-The “turn-around” time of a user job is the-total time taken to execute the job.
13-Which of the following can be used as a criterion for classification of data
structures used in language processing. A-nature of a data structure B-purpose of a data structure C-lifetime of a data structure D-All  Ans-D
14-Memory utilization factor shall be computed as follows-memory in use/total memory connected.
15-Program ‘preemption’ is-forced de allocation of the CPU from a program which is executing on the CPU.
16-An assembler is-machine dependant.
17-Which of the following is not a fundamental process state-(A) ready (B) terminated
(C) executing (D) blocked  Ans-D
18-Which of the following is true?
(A) Block cipher technique is an encryption technique.
(B) Steam cipher technique is an encryption technique.
(C) Both (A) and (B).
(D) Neither of (A) and (B).                       Ans-C
19-Which of the following approaches do not require knowledge of the system state?
(A) deadlock detection. (B) deadlock prevention.
(C) deadlock avoidance. (D) none of the above.                  Ans-D
20-Program generation activity aims at-Automatic generation of program
21-Which amongst the following is not an advantage of Distributed systems?
(A) Reliability (B) Incremental growth
(C) Resource sharing (D) None of the above           Ans: (A)
22- An imperative statement- Indicates an action to be performed during execution of assembled program
23- Which of the following loader is executed when a system is first turned on or
Restarted- Bootstrap loader
24- Poor response time is usually caused by-(A) Process busy (B) High I/O rates
(C) High paging rates (D) Any of the above                               Ans-D
25- “Throughput” of a system is- Number of programs processed by it per unit time
26- The “blocking factor” of a file is- The number of logical records in one physical record
27- Which of these is a component of a process precedence sequence?
(A) Process name (B) Sequence operator ‘;’
(C) Concurrency operator ‘,’ (D) All of the above                        Ans-D
28- Which amongst the following is valid syntax of the Fork and Join Primitive?
(A) Fork <label>                                (B) Fork <label>
      Join <var>                                        Join <label>
(C) For <var>                                    (D) Fork <var>
     Join <var>                                         join <var>                      Ans-A
29- Nested Macro calls are expanded using the- FILO rule (First in last out)
30- A parser which is a variant of top-down parsing without backtracking is- Recursive Descend.
31- The expansion of nested macro calls follows- LIFO rule
32- In a two-pass assembler, the task of the Pass II is to- synthesize the target program.
33- A linker program- links the program with other programs needed for its execution.
34- Which scheduling policy is most suitable for a time-shared operating system-RR(Round-Robin.)
35- A critical section is a program segment- where shared resources are accessed.
36- An operating system contains 3 user processes each requiring 2 units of resource
R .The minimum number of units of R such that no deadlocks will ever arise is-4
37- Locality of reference implies that the page reference being made by a process- is likely to be the one of the pages used in the last few page references.
38- Which of these is not a part of Synthesis phase- Perform LC processing
39-The syntax of the assembler directive EQU is-<symbol>EQU<address space>
40-The following features are needed to implement top down parsing
(A) Source string marker
(B) Prediction making mechanism
(C) Matching and Backtracking mechanism
(D) All of the above                                                                Ans-D
41-A macro definition consists of
(A) A macro prototype statement (B) One or more model statements
(C) Macro pre-processor statements (D) All of the above    Ans-D
42-The main reason to encrypt a file is to-Secure it for transmission
43-Which of the following is not a key piece of information, stored in single page table
entry, assuming pure paging and virtual memory-A reference for the disk block that stores the page
44-A UNIX device driver is-Structured into two halves called top half and bottom half
45-The following is not a layer of IO management module-MCS (Management Control System)
46-Which amongst the following is not a valid page replacement policy?- RU policy (Recurrently used)
47-An assembly language is a-low level programming language
48-TII stands for-Table of incomplete instructions
49-An analysis, which determines the syntactic structure of the source statement, is
Called-Syntax analysis
50-Action implementing instruction’s meaning are a actually carried out by-instruction execution
51-The field that contains a segment index or an internal index is called-target datum
52-A program in execution is called-process
53-Jobs which are admitted to the system for processing is called-long-term scheduling
54-A set of techniques that allow to execute a program which is not entirely in memory
is called-virtual memory
55-SSTF stands for-Shortest-Seek-time-first scheduling
56-Before proceeding with its execution, each process must acquire all the resources
it needs is called-hold and wait
57-Virtual memory is-used in all major commercial operating systems
58-Relocation bits used by relocating loader are specified by-Assembler or Translator
59-Resolution of externally defined symbols is performed by-Linker
60-Relocatable programs-can be loaded almost anywhere in memory
61-Page stealing-is taking page frames other working sets
62-The total time to prepare a disk drive mechanism for a block of data to be read
from is its-latency plus seek time
63-To avoid race condition, the maximum number of processes that may be
simultaneously inside the critical section is-one
64-The memory allocation scheme subject to “external” fragmentation is-segmentation
65-Page fault frequency in an operating system is reduced when the-locality of reference is applicable to the process
66-In which of the following page replacement policies Balady’s anomaly occurs?- FIFO
67-Virtual memory can be implemented with-Segmentation &  Paging
68-Recognition of basic syntactic constructs through reductions, this task is performed
By-Syntax analysis
69-A grammar for a programming language is a formal description of-Structure
70-Swapping - is a technique of temporarily removing inactive programs from the
memory of computer system
71-Ageing-is a technique of improving the priority of process waiting in Queue
for CPU allocation
72-Latency Time-is the time required by a sector to reach below read/write head.
73-Which of the following is most general phase structured grammar? Context – Sensitive
74-File record length-Should be chosen to match the data characteristics.
75-A public key encryption system-Allows only the correct receiver to decode the data

No comments:

Post a Comment