Description : Which are the condition that should be met in order to produce a deadlock. a. Mutual exclusion b. Hold and Wait Cc. No preemption d. Circular wait e. Allofthese
Last Answer : e. Allofthese
Description : emaphore provides mutual exclusion for accesses to the buffer pool and is initialized to the value: a. Mutex b. Mutual Cc. Memory d. __ Allof these
Last Answer : Mutex
Description : Which are the method for handling deadlocks. a. Deadlock prevention b. Deadlock avoidance c. Deadlock detection d. Allof these
Last Answer : d. Allof these
Description : A direct method of deadlock prevention is to prevent the occurrence of ………….. A) Mutual exclusion B) Hold and wait C) Circular waits D) No preemption
Last Answer : C) Circular waits
Description : The following conditions of policy must be present for a deadlock to be possible. i) Mutual exclusion ii) Hold and wait iii) No preemption iv) Circular wait A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv
Last Answer : D) All i, ii, iii and iv
Description : A direct method of deadlock prevention is to prevent the occurrences of ................... A) Mutual exclusion B) Hold and wait C) Circular waits D) No preemption
Description : Match the following. i) Mutual exclusion a) A process may hold allocated resources while waiting assignment. ii) Hold and wait b) No resource can be forcibly removed from a process holding it. iii) No preemption c) Only one process may use ... , ii-c, iii-b C) i-b, ii-c, iii-a D) i-c, ii-a, iii-b
Last Answer : D) i-c, ii-a, iii-b
Description : NUMA stands for. a. Number Uniform memory access b. Not Uniform memory access Cc. Non Uniform memory access d. __ Allof these
Last Answer : a. Number Uniform memory access
Description : Necessary conditions for deadlock are: a) Non preemptive and circular wait b) Mutual exclusion and partial allocation c) Both of The Above d) None of The Above
Last Answer : b) are privileged calls that are used to perform resource management functions, which are controlled by the operating system
Description : Who change the address in the program counter and cause the flow of control to be altered: a Shift manipulation b. Circular manipulation c. Program control instruction d. __ Allof these
Last Answer : c. Program control instruction
Description : How many methods for handling deadlocks: a. 1 b 2 c. 3 d 4
Last Answer : c. 3
Description : In which section only one process is allowed to access the shared variable and all other have to wait. a. Critical section b. Racing section Cc. Entry section d. Remainder section
Last Answer : . Critical section
Description : In every transfer, selection of register by bus is decided by: a. Control signal b No signal c. All signal d. Allof above
Last Answer : a. Control signal
Description : The attributes of a file are. a. Name b. Identifier c. Types d. Location e. Size f. Protection g. Time, date and user identification h. Allof these
Last Answer : h. Allof these
Description : Which operations are to be performed on a directory are: a. Search for a file b. Create a file c. Delete a file d. List a directory e. Rename a file f. Traverse the file system g. Allof these
Last Answer : g. Allof these
Description : Which are the system of arithmetic, which are often used in digital system: a. Binary digit b. Decimal digit c. Hexadecimal digit d. Octal digit e. Allof these
Last Answer : e. Allof these
Description : Various machine level components are: a. Address register > Program counter c Data register d. Accumulator register e. Memory of 2K,16 bits/word RAM f. Multiplexers g. Allof these
Description : Which is the input of control unit: a. Master clock signal b. Instruction register c. Flags d. Control signals from bus e. Allof these
Description : Which is the common program control instructions are. a Branch b. Jump c Call a subroutine d. Return e. Allof these f None of these
Description : Hello, I won a dispute over the apartment, the opponents were obliged to vacate the apartment and hand over the vacated one to me, during the proceedings it was privatized and transferred to the cooperative, ... and ask for the damage they have to pay me from the above forgive the court, thank you
Last Answer : What is the "contract is relatively invalid" decision? The court must decide whether or not the contract applies.
Description : Which are the events concerning RAG can occur in a system: a. Request for a resource b. Allocation of a resource c. Release of resource d. Allof these
Description : Which system is used to refer amount of things. a. Number system b. Number words c. Number symbols d. — Allof these
Last Answer : a. Number system
Description : _are made with some part of body, usually the hands. a. Number words b. Number symbols c. Number gestures d. __ Allof these
Last Answer : c. Number gestures
Description : A binary number with 8 bits is called asa___ a. Bytes b. Bits c. Nibble d. __ Allof these
Last Answer : a. Bytes
Description : ___in all digital systems actually performs addition that can handle only two number at a time: a Register b. circuit c digital d. — Allof these
Last Answer : b. circuit
Description : sof anumber from another can be accomplished by adding the complement of the subtrahend to the minuend. a. Subtraction b. Multiply c. Divide d. — Allof these
Last Answer : a. Subtraction
Description : Which are the types of binary codes number: a. Sign magnitude b. —_1’s complement code c. 2’s complement code d. __ Allof these
Last Answer : c. 2’s complement code
Description : Which are the types of important ideas to notice about these odometer readings: a. The MSB is the sign bit .O for a +sign and 1 for a— sign b. The negative number represent the 2’s complement of the positive number c. Both d. __ Allof these
Last Answer : c. Both
Description : Which is an algorithm or techniques used to multiply two numbers. a. Addition algorithm b. Subtraction algorithm c. Multiplication algorithm d. __ Allof these
Last Answer : c. Multiplication algorithm
Description : The simple procedure istouse a. Binary-triplet method b. Decimal-triplet method c. Octal-triplet method d. __ Allof these
Last Answer : a. Binary-triplet method
Description : One way to convert from decimal to hexadecimalisthe a. Double dabble method b. Hex dabble method c. Binary dabble method d. __ Allof these
Last Answer : b. Hex dabble method
Description : Which are the causes of the interrupt: a. In any single device b. In processor poll devices c. In a device whose ID number is stored on the address bus d. Allof these
Description : Which are the operation of versatility: a. exchange of information with the outside world via I/O device b. Transfer of data internally with in the central processing unit c. Performs of the basic arithmetic operations d. = Allof these
Last Answer : d. = Allof these
Description : Which operations are used for addition, subtraction, increment, decrement and complement function: a. Bus b. Memory transfer c. Arithmetic operation d. Allof these
Description : Which language is termed as the symbolic depiction used for indicating the series: a. Random transfer language b. Register transfer language c. Arithmetic transfer language d. __ Allof these
Last Answer : b. Register transfer language
Description : Which are the operation that a computer performs on data that put in register: a. Register transfer b. Arithmetic c. Logical d. Allof these
Description : Which micro operations carry information from one register to another. a. Register transfer b. Arithmetic c. Logical d. — Allof these
Last Answer : a. Register transfer
Description : In memory read the operation puts memory address on to a register known as : a. PC b. ALU ce. MAR d. — Allof these
Last Answer : ce. MAR
Description : Which operation are implemented using a binary counter or combinational circuit: a Register transfer b. Arithmetic c. Logical d. __ Allof these
Last Answer : b. Arithmetic
Description : Which language specifies a digital system which uses specified notation: a. Register transfer b. Arithmetic c. Logical d. — Allof these
Description : Which control transfer passes the function viacontrol_ a Logic b. Operation ce. Circuit d. __ Allof these
Last Answer : ce. Circuit
Description : The memory bus is also referred as _ a. Databus b. Address bus c. Memory bus d. — Allof these
Last Answer : a. Databus
Description : Arithmetic left shift is used to multiply a signed number by____ a. One b. Two c Three d. __ Allof these
Last Answer : b. Two
Description : which of the following are types of assembler entities: a. Absolute entities b. Relative entities c. Object program d. Allof these
Description : Markers in subroutine cannot be accepted as limits whereas this markers stands for: a. Top of stack b. Bottom of stack c. Middle of stack d. Allof these
Last Answer : a. Top of stack
Description : What is the purpose of microinstruction executions. a. Generate a control signal b. Generate a control signal to compile c. Generate a control signal to execute d. Allof these
Last Answer : c. Generate a control signal to execute
Description : Copy of instruction in cache memory is known as: a Execution cache b. Data cache c. Instruction cache d. Allof these
Last Answer : c. Instruction cache
Description : Full form of FSM is: a. Finite state machine b. Fix state machine c. Fun source metal d. Allof these
Last Answer : a. Finite state machine
Description : Rules of FSM are encoded in. a. ROM b. Random logic c. Programmable logic array d. Allof these
Description : Jump has 3 major states are: a. Fetch b. Decode c. Complete d= Allof these
Last Answer : d= Allof these