..................... provides a larger sized of virtual memory but require virtual memory which provides  multidimensional memory.
A) Paging method
B) Segmentation method
C) Paging and segmentation method
D) None of these

1 Answer

Answer :

B) Segmentation method

Related questions

Description : State true of false. i) With paging, each process is divided into relatively small, fixed-size pages. ii) Segmentation provides for the use of pieces of varying size. A) Partition management B) Memory management C) Disk management D) All of the above

Last Answer : B) Memory management

Description : Technique to implement virtual memory where memory is divided into units of fixed size memory is _________ A. Paging B. De-fragments C. Segmentation D. None of the above

Last Answer : A. Paging

Description : Compare the memory organization schemes of contiguous memory allocation, pure segmentation, and pure paging with respect to the following issues External fragmentation?

Last Answer : 1. Compare the memory organization schemes of contiguous memory allocation, pure segmentation, and pure paging with respect to the following issues: a. External fragmentationb. Internal fragmentation

Description : The process of division on memory spaces is called ______________ a) Paging b) Segmentation c) Bifurcation d) Dynamic Division

Last Answer : Answer: b Explanation: The memory space is divided into segments of dynamic size. The programmer is aware of the segmentation and can reallocate the segments accordingly

Description : With ................ a page is brought into main memory only when the reference is made to a location on that page. A) demand paging B) main paging C) prepaging D) postpaging

Last Answer : A) demand paging

Description : In a demand paging memory system, page table is held in registers. The time taken to service a page fault is 8 m.sec. if an empty frame is available or if the replaced page is not modified, and it takes 20 m.secs., if the replaced ... ? (A) 11.6 m.sec. (B) 16.4 m.sec. (C) 28 m.sec. (D) 14 m.sec.

Last Answer : (B) 16.4 m.sec. 

Description : In a paging system, it takes 30 ns to search translation Look-aside Buffer (TLB) and 90 ns to access the main memory. If the TLB hit ratio is 70%, the effective memory access time is: (1) 48 ns (2) 147 ns (3) 120 ns (4) 84 ns

Last Answer : Answer: 2

Description : Which of the following is the MAIN advantage of multivariable segmentation: A)provides more information about the individuals in each segment B)allows the company to develop a marketing mix that will ... a larger number of segments D)allows more than one variable to be used to segment markets

Last Answer : B)allows the company to develop a marketing mix that will satisfy customers in a segment more precisely

Description : Working set model is used in memory management to implement the concept of (A) Swapping (B) Principal of Locality (C) Segmentation (D) Thrashing

Last Answer : (B) Principal of Locality

Description : For the implementation of a paging scheme, suppose the average process size be x bytes, the page size be y bytes, and each page entry requires z bytes. The optimum page size that minimizes the total overhead due to the page ... fragmentation loss is given by (A) x/2 (B) xz/2 (C) √2xz (D) (√xz)/2

Last Answer : (C) √2xz 

Description : The name of the protocol which provides virtual terminal in TCP/IP model is. A) Telnet B) SMTP C) HTTP

Last Answer : A) Telnet

Description : Which of the following statements is incorrect for Parallel Virtual Machine (PVM)? (A) The PVM Communication model provides asynchronous blocking send, asynchronous blocking receive and non-blocking receive function. ... of such messages. (D) In PVM Model, the message order is not preserved. 

Last Answer : (D) In PVM Model, the message order is not preserved.

Description : Consider the following statements: (a) Depth - first search is used to traverse a rooted tree. (b) Pre - order, Post-order and Inorder are used to list the vertices of an ordered rooted tree. (c) Huffman's algorithm is used to find an optimal ... (d) (C) (a) , (b) and (c) (D) (a), (b) , (c) and (d)

Last Answer : (D) (a), (b) , (c) and (d)

Description : Which of the following channel provides paging signals from base station to all mobiles in the cell? a) RACH b) AGCH c) DCCH d) PCH

Last Answer : d) PCH

Description : A process that execute only in main memory is referred to as ……………… and that allocated in disk is referred to a ……………. A) virtual memory, true memory B) virtual memory, real memory C) real memory, virtual memory D) imaginary memory, real memory

Last Answer : C) real memory, virtual memory

Description : Which of the following information not included in memory table? A) The allocation of main memory to process. B) The allocation of secondary memory to process C) Any information needed to manage virtual memory D) Any information about the existence of file

Last Answer : D) Any information about the existence of file

Description : .................. is a facility that allows programmers to address memory from a logical point of view, without regard to the main memory, physically available. A) Visual memory B) Real memory C) Virtual memory D) Secondary memory

Last Answer : C) Virtual memory

Description : A thread is usually defined as a light weight process because an Operating System (OS) maintains smaller data structure for a thread than for a process. In relation to this, which of the following ... separate stack for each thread. (D) OS does not maintain virtual memory state for each thread.

Last Answer : (B) OS maintains only CPU registers for each thread.

Description : A virtual memory based memory management algorithm partially swaps out a process. This is an example of (A) short term scheduling (B) long term scheduling (C) medium term scheduling (D) mutual exclusion

Last Answer : (C) medium term scheduling

Description : A part of Windows 2000 operating system that is not portable is (A) Device Management (B) Virtual Memory Management (C) Processor Management (D) User Interface

Last Answer : (B) Virtual Memory Management

Description : What is the most appropriate function of Memory Management Unit (MMU) ? (A) It is an associative memory to store TLB (B) It is a technique of supporting multiprogramming by creating dynamic partitions ... to physical address (D) It is an algorithm to allocate and deallocate main memory to a process 

Last Answer : (C) It is a chip to map virtual address to physical address

Description : A virtual memory has a page size of 1K words. There are eight pages and four blocks. The associative memory page table contains the following entries:  Which of the following list of virtual addresses (in ... 1234, 4012, 5000, 6200 (C) 1020, 3012, 6120, 8100 (D) 2021, 4050, 5112, 7100

Last Answer : Answer: C Explanation: The pages which are not in main memory are: 1020 will not cause page fault (1024-2047) 3012 will not cause page fault (3072-4095) 6120 will not cause page fault (4096-5119) 8100 will not cause page fault (6144-7167)

Description : Suppose that the virtual Address space has eight pages and physical memory with four page frames. If LRU page replacement algorithm is used, .............. number of page faults occur with the reference string. 0 2 1 3 5 4 6 3 7 4 7 3 3 5 5 3 1 1 1 7 2 3 4 1 (A) 11 (B) 12 (C) 10 (D) 9

Last Answer : (A) 11

Description : Which of the following is incorrect for virtual memory? (1) Large programs can be written (2) More I/O is required (3) More addressable memory available (4) Faster and easy swapping of process

Last Answer : Answer: 2

Description : Blind image deconvolution is ................ (A) Combination of blur identification and image restoration (B) Combination of segmentation and classification (C) Combination of blur and non-blur image (D) None of the above

Last Answer : (A) Combination of blur identification and image restoration 

Description : Discovery of cross sales opportunities is called as ............... (A) Association (B) Visualization (C) Correlation (D) Segmentation 

Last Answer : (A) Association

Description : As compared to rental and leasing methods to acquire computer systems for a Management Information System (MIS), purchase method has following advantage : (A) It has high level of flexibility (B) It doesn’t require cash up-front (C) It is a business investment (D) Little risk of obsolescence

Last Answer : (C) It is a business investment

Description : Sometimes, Session layer is also called ______ layer a. Virtual layer b. Port layer c. Segmentation layer d. Process layer

Last Answer : b. Port layer

Description : A firm with limited resources can compete with much larger organization by : 1. concentrating its efforts on a single segment 2. using a multi-segment targeting strategy 3. ... segmentation variable 4. using multivaluable segmentation 5. concentrating its efforts on the total population

Last Answer : concentrating its efforts on a single segment

Description : A firm with limited resources can compete with much larger organisations by: A)concentrating its efforts on a single segment B)using a multi-segment targeting strategy C)using ... segmentation variable D)using multivariable segmentation E)concentrating its efforts on the total population

Last Answer : A)concentrating its efforts on a single segment

Description : What are the two kinds of multidimensional arrays? Briefly describe each.

Last Answer : Multidimensional arrays can be either rectangular arrays or jagged arrays. A rectangular array can be thought of as a table, where each row has the same number of columns. Rectangular arrays with ... dimensional jagged array is like a table where each row might have a different number of columns.

Description : Write some code to implement a multidimensional array.

Last Answer : int[,] b = {{0, 1}, {2, 3}, {4, 5}, {6, 7}, {8, 9}}; 

Description : The Multidimensional Poverty Index has been developed by a. The UNDP b. Oxford HDI c. The UNO d. Morris D Morris

Last Answer : b. Oxford HDI The MPI concept is developed by the Oxford Human Development Initiative. It has three main dimensions to it.

Description : Define what are multidimensional arrays?

Last Answer : Multidimensional arrays are capable of storing data in a two or more dimensional structure. For example, you can use a 2-dimensional array to store the current position of pieces in a chess game, or position of players in a tic-tac-toe program.

Description : What are the different Multidimensional analysis methods available in Business Objects?

Last Answer : There are 2 Multidimensional analysis methods available in BO, they are Slice and Dice Drill Down

Description : When scanning an irregular-sized identity document (larger than 8.5x14) be sure to?

Last Answer : What is the answer ?

Description : Which of the following statements about copper wire sized by the AWG rating is correct? A. Number 12 AWG wire has a higher current rating than number 10 AWG wire. B. Number 10 AWG wire has a higher ... Number 12 AWG wire at 25°C has more resistance per 1000 feet than No. 10 AWG wire at 25°C.

Last Answer : Answer: D

Description : Which of the following statements concerning copper wire sized by AWG numbers is correct? A. Number 12 AWG wire has a higher current rating than 10 AWG wire. B. Number 12 AWG wire at 25°C has more ... dielectric strength than 12 AWG wire. D. Number 12 AWG wire is larger than number 10 AWG wire.

Last Answer : Answer: B

Description : A first order reaction requires two unequal sized CSTR. Which of thefollowing gives higher yield? (A) Large reactor followed by smaller one (B) Smaller reactor followed by larger one (C) Either of the arrangement (A) or (B) will give the same yield (D) Data insufficient, can't be predicted

Last Answer : (C) Either of the arrangement (A) or (B) will give the same yield

Description : Which of the following statements is not true about disk-arm scheduling algorithms ? (A) SSTF (shortest seek time first) algorithm increases performance of FCFS. (B) The number of requests for disk ... arm movements. (D) SCAN and C-SCAN algorithms are less likely to have a starvation problem.

Last Answer : (B) The number of requests for disk service are not influenced by file allocation method.

Description : In ............. method, the word is written to the block in both the cache and main memory, in parallel. (A) Write through (B) Write back (C) Write protected (D) Direct mapping

Last Answer : (A) Write through 

Description : The primary advantage of automatic vending as a form of retailing is that : 1. it provides continuous service to customers 2. it eliminates the need for sales personnel 3. vending machines require little maintenance 4. it offers low cost, personal method of selling 5. none of these

Last Answer : it eliminates the need for sales personnel

Description : The primary advantage of automatic vending as a form of retailing is that: A)it provides continuous service to customers. B)it eliminates the need for sales personnel. C)vending machines require little maintenance. D)it offers a low cost, personal method of selling.

Last Answer : B)it eliminates the need for sales personnel.

Description : The compiled java program can run on any ..................... plateform having Java Virtual Machine (JVM) installed on it. A) program B) java C) hardware D) non java

Last Answer : C) hardware

Description : Which of the following characteristics of constructor are true. i) They should be declared in the public section. ii) They are invoked automatically when the objects are created. iii) They do not have return type and void also. ... and v C) Only i, iii, iv and v D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : Which of the following is an application layer service? A) Network virtual terminal B) File transfer, access and management C) Mail service D) All of the above

Last Answer : C) Mail service

Description : Which of the following correctly describes overloading of functions? (A) Virtual polymorphism (B) Transient polymorphism (C) Ad-hoc polymorphism (D) Pseudo polymorphism

Last Answer : (C) Ad-hoc polymorphism

Description : The virtual address generated by a CPU is 32 bits. The Translation Lookaside Buffer (TLB) can hold total 64 page table entries and a 4-way set associative (i.e. with 4- cache lines in the set). The page size is 4 KB. The minimum size of TLB tag is (A) 12 bits (B) 15 bits (C) 16 bits (D) 20 bits

Last Answer : (C) 16 bits Explanation: VirtualAddress = 32 bits PageSize = 4KB = 12 bits therefore : VPNTag = 20 bits, OffsetTag = 12 bits TLBEntryLength = VPNTag = 20 bits TotalTLBEntries = 64, 4-way implies ... therefore : TLBIndex = 4 bits TLBTag = TLBEntryLength - TLBIndex = 20 - 4 = 16 bits

Description : Which of the following is not a member of class ? (A) Static function (B) Friend function (C) Const function (D) Virtual function

Last Answer : (B) Friend function

Description : Which of the following, in C++, is inherited in a derived class from base class ? (A) constructor (B) destructor (C) data members (D) virtual methods

Last Answer : (C) data members