Description : In a demand paging memory system, page table is held in registers. The time taken to service a page fault is 8 m.sec. if an empty frame is available or if the replaced page is not modified, and it takes 20 m.secs., if the replaced ... ? (A) 11.6 m.sec. (B) 16.4 m.sec. (C) 28 m.sec. (D) 14 m.sec.
Last Answer : (B) 16.4 m.sec.
Description : A job has four pages A, B, C, D and the main memory has two page frames only. The job needs to process its pages in following order: ABACABDBACD Assuming that a page interrupt occurs when a new page is brought in the main ... replacement algorithms are (A) 9 and 7 (B) 7 and 6 (C) 9 and 8 (D) 8 and 6
Last Answer : (C) 9 and 8
Description : In a paging system, it takes 30 ns to search translation Look-aside Buffer (TLB) and 90 ns to access the main memory. If the TLB hit ratio is 70%, the effective memory access time is: (1) 48 ns (2) 147 ns (3) 120 ns (4) 84 ns
Last Answer : Answer: 2
Description : The ……………. Determines when a page should be brought into main memory. A) Fetch policy B) Placement policy C) Replacement policy D) Resident set management
Last Answer : A) Fetch policy
Description : For the implementation of a paging scheme, suppose the average process size be x bytes, the page size be y bytes, and each page entry requires z bytes. The optimum page size that minimizes the total overhead due to the page ... fragmentation loss is given by (A) x/2 (B) xz/2 (C) √2xz (D) (√xz)/2
Last Answer : (C) √2xz
Description : State true of false. i) With paging, each process is divided into relatively small, fixed-size pages. ii) Segmentation provides for the use of pieces of varying size. A) Partition management B) Memory management C) Disk management D) All of the above
Last Answer : B) Memory management
Description : ..................... provides a larger sized of virtual memory but require virtual memory which provides multidimensional memory. A) Paging method B) Segmentation method C) Paging and segmentation method D) None of these
Last Answer : B) Segmentation method
Description : With …………………. A page is written out to secondary memory only when it has been selected for replacement. A) pre-cleaning B) demand cleaning C) required cleaning D) fast cleaning
Last Answer : B) demand cleaning
Description : Consider a program that consists of 8 pages (from 0 to 7) and we have 4 page frames in the physical memory for the pages. The page reference string is : 1 2 3 2 5 6 3 4 6 3 7 3 1 5 3 6 3 4 2 4 3 4 5 ... to fill available page frames with pages): (A) 9 and 6 (B) 10 and 7 (C) 9 and 7 (D) 10 and 6
Last Answer : (B) 10 and 7
Description : Suppose that the virtual Address space has eight pages and physical memory with four page frames. If LRU page replacement algorithm is used, .............. number of page faults occur with the reference string. 0 2 1 3 5 4 6 3 7 4 7 3 3 5 5 3 1 1 1 7 2 3 4 1 (A) 11 (B) 12 (C) 10 (D) 9
Last Answer : (A) 11
Description : Arrays in C language can have ................. with reference to memory representation. (A) n-subscripts (B) two-subscripts (C) only one subscript (D) three subscripts only
Last Answer : (C) only one subscript
Description : A LRU page replacement is used with four page frames and eight pages. How many page faults will occur with the reference string 0172327103 if the four frames are initially empty? (A) 6 (B) 7 (C) 5 (D) 8
Last Answer : (B) 7
Description : Consider the reference string 0 1 2 3 0 1 4 0 1 2 3 4 If FIFO page replacement algorithm is used, then the number of page faults with three page frames and four page frames are .......... and ........... respectively. (A) 10, 9 (B) 9, 9 (C) 10, 10 (D) 9, 10
Last Answer : (D) 9, 10
Description : The advantage of ............... is that it can reference memory without paying the price of having a full memory address in the instruction. (A) Direct addressing (B) Indexed addressing (C) Register addressing (D) Register Indirect addressing
Last Answer : (D) Register Indirect addressing
Description : Which of the following is not valid with reference to Message Passing Interface (MPI)? (A) MPI can run on any hardware platform (B) The programming model is a distributed memory model. (C) All ... implicit. (D) MPI - Comm - Size returns the total number of MPI processes in specified communication.
Last Answer : (C) All parallelism is implicit.
Description : Technique to implement virtual memory where memory is divided into units of fixed size memory is _________ A. Paging B. De-fragments C. Segmentation D. None of the above
Last Answer : A. Paging
Description : Assume that variable x resides at memory location 1234, y at 1111 and p at 2222. Int x=1, y=2, *p; p=&x; y=*p; What will be the value of y after execution of above code? A) 2 B) 1 C) 1234 D) 1111
Last Answer : C) 1234
Description : Compare the memory organization schemes of contiguous memory allocation, pure segmentation, and pure paging with respect to the following issues External fragmentation?
Last Answer : 1. Compare the memory organization schemes of contiguous memory allocation, pure segmentation, and pure paging with respect to the following issues: a. External fragmentationb. Internal fragmentation
Description : The process of division on memory spaces is called ______________ a) Paging b) Segmentation c) Bifurcation d) Dynamic Division
Last Answer : Answer: b Explanation: The memory space is divided into segments of dynamic size. The programmer is aware of the segmentation and can reallocate the segments accordingly
Description : Let the page fault service time be 10 millisecond(ms) in a computer with average memory access time being 20 nanosecond(ns). If one page fault is generated for every 106 memory accesses, what is the effective access time for memory? (A) 21 ns (B) 23 ns (C) 30 ns (D) 35 ns
Last Answer : (C) 30 ns
Description : Suppose that the number of instructions executed between page faults is directly proportional to the number of page frames allocated to a program. If the available memory is doubled, the mean interval between page faults is also ... memory were available? (A) 60 sec (B) 30 sec (C) 45 sec (D) 10 sec
Last Answer : Answer: C Explanation: T = Ninstr x 1µs + 15,000 x 2,000 µs = 60s Ninstr x 1µs = 60,000,000 µs - 30,000,000 µs = 30,000,000 µs Ninstr = 30,000,000 The number of instruction ... doesn't mean that the program runs twice as fast as on the first system. Here, the performance increase is of 25%.
Description : A virtual memory has a page size of 1K words. There are eight pages and four blocks. The associative memory page table contains the following entries: Which of the following list of virtual addresses (in ... 1234, 4012, 5000, 6200 (C) 1020, 3012, 6120, 8100 (D) 2021, 4050, 5112, 7100
Last Answer : Answer: C Explanation: The pages which are not in main memory are: 1020 will not cause page fault (1024-2047) 3012 will not cause page fault (3072-4095) 6120 will not cause page fault (4096-5119) 8100 will not cause page fault (6144-7167)
Description : A memory management system has 64 pages with 512 bytes page size. Physical memory consists of 32 page frames. Number of bits required in logical and physical address are respectively: (1) 14 and 15 (2) 14 and 29 (3) 15 and 14 (4) 16 and 32
Last Answer : (3) 15 and 14
Description : A process that execute only in main memory is referred to as ……………… and that allocated in disk is referred to a ……………. A) virtual memory, true memory B) virtual memory, real memory C) real memory, virtual memory D) imaginary memory, real memory
Last Answer : C) real memory, virtual memory
Description : Which of the following is/are correct with reference to Abstract class and interface ? (a) A class can inherit only one Abstract class but may inherit several interfaces. (b) An Abstract class can provide complete and default ... true (C) Both (a) and (b) are true (D) Neither (a) nor (b) is true
Last Answer : Answer: C
Description : Which of the following statements are true with reference to the way of describing XML data ? (a) XML uses DTD to describe the data (b) XML uses XSL to describe the data (c) XML uses a description node to describe the data Codes : (A) (a) only (B) (b) only (C) (a) and (b) (D) (a) and (c)
Last Answer : Answer: D
Description : In Unix, files can be protected by assigning each one a 9-bit mode called rights bits. Now, consider the following two statements: I. A mode of 641 (octal) means that the owner can read and write the file, other ... (B) Only II is correct (C) Both I and II are correct (D) Both I and II are incorrect
Last Answer : (C) Both I and II are correct
Description : Which of the following statement(s) is/are correct with reference to curve generation? I. Hermite curves are generated using the concepts of interpolation. II. Bezier curves are generated using the concepts of approximation. III. The ... (B) II and III only (C) I and II only (D) I, II and III only
Last Answer : (D) I, II and III only
Description : In TCP/IP Reference model, the job of ............... layer is to permit hosts to inject packets into any network and travel them independently to the destination. (A) Physical (B) Transport (C) Application (D) Host-to-network
Last Answer : Answer: Marks to all
Description : ………. Involves treating main memory as a resource to be allocated to and shared among a number of active processes. A) Partition management B) Memory management C) Disk management D) All of the above
Description : Which of the following information not included in memory table? A) The allocation of main memory to process. B) The allocation of secondary memory to process C) Any information needed to manage virtual memory D) Any information about the existence of file
Last Answer : D) Any information about the existence of file
Description : .................. is a facility that allows programmers to address memory from a logical point of view, without regard to the main memory, physically available. A) Visual memory B) Real memory C) Virtual memory D) Secondary memory
Last Answer : C) Virtual memory
Description : In ............. generation of operating system, operating system designers develop the concept of multiprogramming in which several jobs are in main memory at once. A) First B) Second C) Third D) Fourth
Last Answer : C) Third
Description : Which of the following statements is not true about disk-arm scheduling algorithms ? (A) SSTF (shortest seek time first) algorithm increases performance of FCFS. (B) The number of requests for disk ... arm movements. (D) SCAN and C-SCAN algorithms are less likely to have a starvation problem.
Last Answer : (B) The number of requests for disk service are not influenced by file allocation method.
Description : What is the most appropriate function of Memory Management Unit (MMU) ? (A) It is an associative memory to store TLB (B) It is a technique of supporting multiprogramming by creating dynamic partitions ... to physical address (D) It is an algorithm to allocate and deallocate main memory to a process
Last Answer : (C) It is a chip to map virtual address to physical address
Description : The ............... transfers the executable image of a C++ program from hard disk to main memory. (A) Compiler (B) Linker (C) Debugger (D) Loader
Last Answer : (D) Loader
Description : In ............. method, the word is written to the block in both the cache and main memory, in parallel. (A) Write through (B) Write back (C) Write protected (D) Direct mapping
Last Answer : (A) Write through
Description : Consider the following justifications for commonly using the two-level CPU scheduling : I. It is used when memory is too small to hold all the ready processes. II. Because its performance is same as that of the FIFO. III. Because it ... ? (A) I, III and IV (B) I and II (C) III and IV (D) I and III
Last Answer : (D) I and III
Description : Which of the following statements regarding the features of the objectoriented approach to databases are true ? (a) The ability to develop more realistic models of the real world. (b) The ability to represent the world in a non-geometric way. ( ... ) and (d) (C) (a), (d) and (e) (D) (c), (d) and (e)
Last Answer : (A) (a), (b) and (c)
Description : Consider the following conditions : (a) The solution must be feasible, i.e. it must satisfy all the supply and demand constraints. (b) The number of positive allocations must be equal to m+n-1, where m is the number of rows and n is ... B) (a) and (c) only (C) (b) and (c) only (D) (a), (b) and (c)
Last Answer : (D) (a), (b) and (c)
Description : What is the difference between Call by value and Call by reference?
Last Answer : A: Call By Value : When a function is called by value, then the value of the actual parameter is copied to the formal parameter (i.e. a separate copy is made). Any changes made with the ... with the values at that address of the formal parameter affects (changes) the value of the actual parameter.
Description : A ……………. takes a reference to an object of the same class as itself as an argument. A) Reference constructor B) Copy Constructor C) Self Constructor
Last Answer : B) Copy Constructor
Description : Automatic initialization of object is carried out using a special member function called ………… A) Friend B) Casting C) Reference Parameter D) Constructor
Last Answer : D) Constructor
Description : Which of the following cannot be passed to a function? A) Reference variable B) Arrays C) Class objects D) Header files
Last Answer : D) Header files
Description : State True or False. 1. Term of reference is the final output of Feasibility Study 2. Design specification report is the final output of System Analysis A) 1-true, 2-true B) 1-false, 2-true C) 1-true, 2-false D) 1-false, 2-false
Last Answer : A) 1-true, 2-true
Description : The output of problem definition stage is …………….. A) Master Development Plan B) Terms of reference C) Feasibility report D) Final product
Last Answer : B) Terms of reference
Description : Which of the following points lies on the same side as the origin, with reference to the line 3x+7y=2 ? (A) (3, 0) (B) (1, 0) (C) (0.5, 0.5) (D) (0.5, 0)
Last Answer : (D) (0.5, 0) Explanation: If (0.5, 0) is substituted in the equation, we get 1.5 which is less than 2, then it lies on the same side as that of the origin.
Description : Which layer of OSI reference model is responsible for decomposition of messages and generation of sequence numbers to ensure correct re-composition from end to end of the network? (A) Physical (B) Data-link (C) Transport (D) Application
Last Answer : (C) Transport
Description : Which layers of the OSI reference model are host-to-host layers ? (A) Transport, Session, Presentation, Application (B) Network, Transport, Session, Presentation (C) Data-link, Network, Transport, Session (D) Physical, Data-link, Network, Transport
Last Answer : (A) Transport, Session, Presentation, Application
Description : In XML, DOCTYPE declaration specifies to include a reference to ............ file. (A) Document Type Definition (B) Document Type Declaration (C) Document Transfer Definition (D) Document Type language
Last Answer : (A) Document Type Definition