Tuesday, January 17, 2012

Operating System-SET 06


In which of the following page replacement policies Baladys anomaly occurs?
(A) FIFO                                         (B)  LRU
(C)  LFU                                          (D)  NRU

Ans: (A)



Which of the following are language processors?
(A) Assembler                                      (B) Compiler
(C) Interpreter                                       (D) All of the above

Ans: (D)



Virtual memory can be implemented with
(A) Segmentation                                  (B) Paging
(C) None                                               (D) all of the above

Ans: (D)


A grammar for a programming language is a formal description of
(A) Syntax                                             (B) Semantics
(C) Structure                                         (D) Code

Ans: (C)







                                    is a technique of temporarily removing inactive programs from the memory  of computer system
(A) Swapping                                         (B) Spooling
(C) Semaphore                                       (D) Scheduler

Ans: (A)




                            is a technique of improving the priority of process waiting in Queue for CPU  allocation
(A) Starvation                                      (B) Ageing
(C) Revocation                                     (D) Relocation

Ans: (B)



                           is the time required by a sector to reach below read/write head.
(A) Seek Time                                    (B) Latency Time
(C) Access time                                  (D) None

Ans: (B)




Which of the following is most general phase structured grammar?
(A) Context Sensitive                        (B) Regular
(C) Context Free                               (D) None of the above

Ans: (A)



File record length
(A) Should always be fixed
(B) Should always be variable
(C) Depends upon the size of file
(D) Should be chosen to match the data characteristics.

Ans: (D)



A public key encryption system
(A) Allows only the correct receiver to decode the data
(B) Allows only one to decode the transmission.
(C) Allows only the correct sender to decode the data.
(D) Does not encode the data before transmitting it.

Ans: (A)






Please Share it! :)

Ditulis Oleh : Nangraj Hari: 3:16 AM Kategori:

0 comments:

Post a Comment

 
PLEASE VISIT MY OTHER BLOG TO DOWNLOAD LATEST FULL CRACKED SOFTWARES,GAMES,COMPUTER NOTES,VIDEO TUTORIALS,AND MUCH MORECLICK HERE