1 2 3
51-The field
that contains a segment index or an internal index is called-Target Datum
52-A program
in execution is called-Process
53-Jobs which
are admitted to the system for processing is called-Long-Term Scheduling
54-A set of
techniques that allow to execute a program which is not entirely in memory is called-Virtual
memory
55-SSTF stands
for-Shortest-Seek-time-first scheduling
56-Before
proceeding with its execution, each process must acquire all the resources it needs is
called-Hold and Wait
57-Virtual
memory is-used in all major commercial operating systems
58-Relocation
bits used by relocating loader are specified by-Assembler or Translator
59-Resolution
of externally defined symbols is performed by-Linker
60-Relocatable
programs-can be loaded almost anywhere in memory
61-Page
stealing-is taking page frames other working sets
62-The total
time to prepare a disk drive mechanism for a block of data to be read from is
its-latency plus seek time
63-To avoid
race condition, the maximum number of processes that may be simultaneously
inside the critical section is-one
64-The memory
allocation scheme subject to “external” fragmentation is-segmentation
65-Page fault
frequency in an operating system is reduced when the locality of reference is
applicable to the process
66-In which of
the following page replacement policies Balady’s anomaly occurs?- FIFO
67-Virtual
memory can be implemented with-Segmentation & Paging
68-Recognition
of basic syntactic constructs through reductions, this task is performed by-Syntax
analysis
69-A grammar
for a programming language is a formal description of-Structure
70-Swapping -
is a technique of temporarily removing inactive programs from the memory of
computer system
71-Ageing-is a
technique of improving the priority of process waiting in Queue for CPU
allocation
72-Latency
Time-is the time required by a sector to reach below read/write head.
73-Which of
the following is most general phase structured grammar?
Context – Sensitive
74-File record
length-Should be chosen to match the data characteristics.
75-A public
key encryption system-Allows only the correct receiver to decode the data