Operating Systems Concepts – Section 2


Warning: Undefined variable $ext in /www/wwwroot/gkfeed.com/public_html/wp-content/plugins/show-hidecollapse-expand/bg_show_hide.php on line 281

Warning: Undefined variable $ext in /www/wwwroot/gkfeed.com/public_html/wp-content/plugins/show-hidecollapse-expand/bg_show_hide.php on line 281

Warning: Undefined variable $ext in /www/wwwroot/gkfeed.com/public_html/wp-content/plugins/show-hidecollapse-expand/bg_show_hide.php on line 281

Warning: Undefined variable $ext in /www/wwwroot/gkfeed.com/public_html/wp-content/plugins/show-hidecollapse-expand/bg_show_hide.php on line 281

Warning: Undefined variable $ext in /www/wwwroot/gkfeed.com/public_html/wp-content/plugins/show-hidecollapse-expand/bg_show_hide.php on line 281

6. Block caches or buffer caches are used

A. to improve disk performance
B. to handle interrupts
C. to increase the capacity of the main memory
D. to speed up main memory read operation
E. None of the above

Correct Answer: A. to improve disk performance
Advertisement

7. Which of the following statements is false?

A. a small page size causes large page tables
B. internal fragmentation is increased with small pages
C. a large page size causes instructions and data that will not be referenced brought into primary storage
D. I/O transfers are more efficient with large pages
E. None of the above

Correct Answer: B. internal fragmentation is increased with small pages
Advertisement

8. The action of parsing the source program into the proper syntactic classes is known as

A. syntax analysis
B. lexical analysis
C. interpretation analysis
D. general syntax analysis
E. None of the above

Correct Answer: B. lexical analysis
Advertisement

9. Which, of the following is not true about the description of a decision table?

A. A decision table is easy to modify
B. A decision table is directly understood by the computer
C. A decision table is easy to understand
D. All of the above
E. None of the above

Correct Answer: B. A decision table is directly understood by the computer
Advertisement

10. Trojan-Horse programs

A. are legitimate programs that allow unauthorized access
B. do not usually work
C. are hidden programs that do not show up on the system
D. usually are immediately discovered
E. None of the above

Correct Answer: A. are legitimate programs that allow unauthorized access
Advertisement

Warning: Undefined variable $in_same_cat in /www/wwwroot/gkfeed.com/public_html/wp-content/plugins/EXP.GKFEED.COM/function.php on line 27

Warning: Undefined variable $excluded_categories in /www/wwwroot/gkfeed.com/public_html/wp-content/plugins/EXP.GKFEED.COM/function.php on line 27

Leave A Comment?