search anything

Wednesday, 9 October 2024

Computer Science and Application MP Set Exam 2022 Q-91to 100

 91. A system call is invoked by :

(A) Polling

(B) Software interrupt

(C) Instruction

(D) Jump

Answer: (B)

92. Suppose we have 12 identical resources and 3 processes Pj, P2 and P3. The maximum claims of the processes are 10, 5, 3 respectively. Currently, the process Pj holds 8 resources, P2 holds 2 resources and P3 holds 1 resource. Which of the following is/are correct ?

(i) The system is in safe state.

(ii) The system is in unsafe state.

(iii) The minimum one more resource is needed to make it safe state.

(iv) The unsafe system does not employ the existence of deadlock.

(A) (i) and (iv)

(B) (ii) and (iii)

(C) (ii) and (iv)

(D) (ii), (iii) and (iv)

Answer: (D)

93. One thread immediately terminates the target thread is called ;

(A) Asynchronous cancellation

(B) Deferred cancellation

(C) Synchronous cancellation

(D) None of the above

Answer: (A)

94. Consider the situation where several processes access and manipulate the same data concurrently and the outcome of the execution depends on the particular order in which the access takes place. The situation is called :-.

(A) Deadlock

(B) Process synchronization

(C) Race condition

(D) Unsafe condition

Answer: (C)

95. The TLB hit ratio is 98%.  It takes 20 nanoseconds to search the TLB and 100 nanoseconds to access memory. What will be the effective memory access time ?

(A) 100 nanoseconds

(B) 122 nanoseconds

(C) 130 nanoseconds

(D) 140 nanoseconds

Answer: (B)

96. A computer system has 6 identical resources. There are n processes competing for them. Each process may need 2 resources. What will be the maximum value of n so that the system is deadlock free ?

(A) 2

(B) 3

(C) 4

(D) 5

Answer: (D)

97. A critical region is :

(A) One which is enclosed by a pair of P and V operations on semaphores.

(B) A program segment that has not been proved bug-free.

(C) A program segment that often causes unexpected system crashes.

(D) A program segment where shared resources are accessed.

Answer: (D)

98. A virus that mutates with every infection is :

(A) Stealth virus

(B) Metamorphic virus

(C) Polymorphic virus

(D) Ultramorphic virus

Answer: (C)

99. The represents a commonly used group of codes in a source programming language.

(A) Loop

(B) Branch Statements

(C) Macro

(D) Functions

Answer: (D)

100. A system uses paging and segmentation, the virtual address space consists of up to 8 segments where each segment can be up to 2^9 bytes long. The hardware page each segment into 256-byte pages. How many bits in the virtual address are needed for page numbers ?

(A) 3

(B) 8

(C) 32

(D) 21

Answer: (D)

No comments:

Post a Comment