Professional Documents
Culture Documents
Operating Systems-Objectives-Mid-II
Operating Systems-Objectives-Mid-II
Operating Systems-Objectives-Mid-II
Page 1
Operating Systems -Mid -II
Page 2
Operating Systems -Mid -II
QUESTION TEXT
Which of the following page replacement algorithms suffers from Belady’s anomaly?
What is the swap space in the disk used for?
Increasing the RAM of a computer typically improves performance because
Virtual memory is
Page fault occurs when
Thrashing occurs when
The essential content(s) in each entry of a page table is / are
Assume that there are 3 page frames which are initially empty. If the page reference string is 1, 2, 3, 4, 2, 1, 5, 3, 2, 4
Which of the following is not a form of memory?
The optimal page replacement algorithm will select the page that
If the size of logical address space is 2 to the power of m, and a page size is 2 to the power of n addressing units, t
What is compaction?
The wait-for graph is a deadlock detection algorithm that is applicable when ____________
If the wait for graph contains a cycle ____________
What is the disadvantage of invoking the detection algorithm for every request?
.______ is a unique tag, usually a number, identifies the file within the file system.
File type can be represented by
Which file is a sequence of bytes organized into blocks understandable by the system’s linker?
RAID level 3 supports a lower number of I/Os per second, because _______________.
RAID level _____ is also known as block interleaved parity organisation and uses block level striping and keeps a
RAID level 5 is also known as :
RAID level 0+1 is used because, RAID level 0 provides ______ whereas RAID level 1 provides
Which of the following are forms of malicious attack ?
What are common security threats?
Which of the following is a good practice?
What is not a good practice for user administration ?
Which of the following is least secure method of authentication?
Which happens first authorization or authentication ?
What is characteristics of Authorization ?
What is breach of integrity ?
Page 3
Operating Systems -Mid -II
Page 4
Operating Systems -Mid -II
Page 5
Operating Systems -Mid -II
Page 6