1. Which one of the followings is NOT true about OS’s Command Interpreter?
A. A command interpreter is a program that processes the command entered by the user in the terminalB. A command interpreter is located between the software applications and the kernelC. A command interpreter can communicate with the kernel by calling API D. Only one type of command interpreters can be running at a time
2. Which one of the followings is NOT true about OS?A. OS manages memory, processors, files, devices, security and communication B. OS provides users an environment in which a user can execute programs conveniently and efficientlyC. The only purpose of OS is to interpret users/application commands to the language the hardware understands D. OS serves as an intermediary between users, hardware, and software applications
3. Which one of the followings is NOT true about System Calls in OS?A. System calls are functions (procedures) that you/applications use to interact with the kernelB. System call is a program for passing messages between software applications C. With API, programmers does not need to know the details of how the service is done D. Open() is an example of system call for opening a file
4. Which one of the followings is NOT considered as a benefit of Micro Kernel?A. Use less space in the User Space as majority of codes are running in the kernel B. Easy to construct and debug C. Easier to port the OS to new architecture D. Less code is running in kernel mode, therefore is more reliable
5. Which of the following is NOT true about Process Control Block (PCB)? A. Context switching is a situation where the CPU is switching from running the current process to another processB. When a CPU switches to another process, the system must first load the PCB of the new process before saving the state of the old process C. Program counter indicates the location of instruction that the CPU needs to execute next D. A process contains text section, current activity, stack, data section and heap 6. Which of the following is NOT true about Process Scheduling?
ISCG5401-1152 Day Page 3 of 9 pages Printed 16/06/2015 6. Which of the following is NOT true about Process Scheduling? A. CPU process scheduling criteria are CPU utilisation maximisation, throughput minimisation, waiting time minimisation, response time minimisation and turnaround
time minimisation B. Turnaround time = Execution time + Waiting time C. In multilevel queue scheduling, foreground processes have a higher priority over the background processes D. The goal of a CPU scheduler is to ensure that each process has a fair share of the CPU
7. Which of the following is NOT true about CPU Scheduling?A. Ready queue is a set of all processes in RAM that are ready and waiting to be executed B. In multilevel queue scheduling, ready queue is partitioned into multiple queue and each queue has its own priorityC. CPU Bound Program is a program that has short CPU burst and short I/O wait D. CPU Scheduler selects which process in ready queue needs to be executed next by the CPU
8. Which of the following is NOT true about a Linux Command? A. rmdir is a command used to remove/delete a directory B. ps is a command used to view the list of running processes C. rm is a command to delete a file D. echo is a command used to view the user’s password
9. Which of the following Linux commands can be used for displaying the content of a text file? A. tasklistB. catC. topD. ls 10. Which of following is NOT true about Process Creation and Termination?A. Parent may temporarily halt the execution of a child process via wait() B. Parent may terminate a child process via abort()C. fork() system call creates a new process D. exit() is a system call used to indicate OS that the process has finished executing all of its instructions and OS may delete it from RAM
11. What is the maximum number of values which can be shown in a binary (2-bit) system?A. 2 B. 3C. 4 D. 5
12. Which component converts logical memory addresses to physical addresses? A. ALUB. MMUC. CPU D. FPU
13. Which one is NOT among the benefits of Virtual Memory (VM)? A. Faster deadlock detection B. More programs can be run at the same timeC. Possibly each program can run faster D. A program would no longer be constrained by the amount of physical memory
14. How can a deadlock be prevented before occurring?A. By having Multi-threadingB. By having Multi-tasking C. By having Virtual Memory program D. By having a Resource Management program
15. Which one is NOT among the deadlock recovery solutions? A. Kill all deadlocked processes B. Roll back C. Kill one or more processesD. Reallocating current processes in memory
16. Dividing/marking a disk into sectors that the disk controller can read and write is called: A. Physical formattingB. MBR C. PartitioningD. Logical formatting
17. Identity theft at financial services company is particularly done by:A. CrimewareB. Adware C. Rootkit D. Spyware
18. Which one is mostly true about the different types of computer storage?A. CPU registers are the most expensive, large size, and very fast type of storage B. Cache is very expensive, small size, and very fast type of storageC. Hard disk is expensive, large size and fast type of storageD. RAM is expensive, small size, and fast type of storage
19. Prevention of legitimate use by overloading the targeted computer is called:A. Breach of availability B. Theft of serviceC. Masquerading D. Denial Of Service
20. Granting access control for system’s resources is the responsibility of:A. Normal user B. Guest useC. Root user D. Intruder
SECTION B MATCHING QUESTIONS 20 Marks Instruction(s): Match the best answer from left column to the questions on the right. Each answer may be used once only and each question is worth 2 marks. A. Demand Paging 1. Is a child process which has been terminated but it has no parent waiting to collect its output.B. UserID 2. Is detaching a file system from the main file system.C. Resident Virus 3. Maps each logical address to a physical address.D. Queue Buffer 4. Is the process that is currently running in memory but is not on display.E. Zombie 5. Is common bootstrap loader, which allows user to select the type of OS/kernel that user wants to use.F. Page Table 6. Is the list of all/part of instructions from a program that are loaded from the Hard Disk Drive into the RAM.G. Unmounting 7. Is used to decide which pages of a process need to be moved from virtual Memory to RAM and vice versa.H. Stack 8. Remains in RAM after the system has been infected.I. GRUB 9. Is the part of memory which is used to temporarily share information between processes.J. Background Process 10. Is the unique number used to identify each user.
SECTION C ANALYTICAL QUESTIONS 50 Marks 1. Name at least four types of operating systems. [4 marks]
2. Briefly describe the way the OS is structured in the Layered approach and list 2 advantages of the Layered approach over the Monolithic approach. [6 marks]
3. List 5 possible states of a process and briefly describe one of them. [6 marks]
4. Why does operating system need Inter Process Communications (IPC) and list two IPC models? [3 marks]
5. Which type of Shared Memory Buffer (Unbounded-queue, Bounded-queue or Both): A. Has an unlimited buffer size? [1 mark] B. Forces the producing process to stop sharing/placing information into the C. buffer when the buffer is already full? [1 mark] D. Has empty buffer problem? [1 mark]
6. What is a process deadlock and what causes processes getting into a Deadlock? [4 marks]
7. List two methods of dividing memory and briefly describe each of them. [6 marks]
8. Which type of Memory Fragmentation (Internal or External):A. Occurs because the freely available space in the memory is not contiguous and so cannot be used? [1 mark] B. Occurs because a process has requested more memory than is needed and so the available space cannot be used? [1 mark]C. Can be solved by redesigning the program so it allocates the amount that it really requires? [1 mark]D. Can be solved through Compaction? [1 mark]
9. List two attributes of a file system and name one of the file systems used in Mac OS and one of the file systems used in Linux [4 marks] 10. List two main differences between the Two-level Directory and Tree-Structured Directory structures. [4 marks]
11. For each of the following malware, please specify by “Yes” or “No” whether they are standalone programs, can replicate themselves and can create backdoors: [6 marks]
Standalone Self-replicating Creates backdoorsWorms a) b) c)Trojan d) e) f)
Is this question part of your Assignment?
We can help
Our aim is to help you get A+ grades on your Coursework.
We handle assignments in a multiplicity of subject areas including Admission Essays, General Essays, Case Studies, Coursework, Dissertations, Editing, Research Papers, and Research proposals
Header Button Label: Get Started NowGet Started Header Button Label: View writing samplesView writing samples