BCA - Cpu Scheduling
Questions No: 1/42

What is the major drawback of the Shortest Job First (SJF) scheduling algorithm?

Questions No: 2/42

Page fault occurs when:

Questions No: 3/42

Which of the following is a memory allocation scheme?

Questions No: 4/42

Which of the following conditions is necessary for a deadlock to occur?

Questions No: 5/42

Which of the following I/O techniques allows the CPU to do other tasks while the I/O operation is in progress?

Questions No: 6/42

In system security, a Trojan horse is:

Questions No: 7/42

Which of the following is a deadlock prevention technique?

Questions No: 8/42

The issue of internal fragmentation arises in which of the following?

Questions No: 9/42

Which of the following is NOT an I/O device?

Questions No: 10/42

Which of the following is a process scheduling algorithm?

Questions No: 11/42

Arrange the following scheduling algorithms from lowest to highest priority in terms of process execution speed:

1️⃣ First-Come, First-Served (FCFS)

2️⃣ Round Robin

3️⃣ Shortest Job First (SJF)

4️⃣ Priority Scheduling

Questions No: 12/42

The Banker\'s algorithm is used for:

Questions No: 13/42

Which of these is a method to secure a system against unauthorized access?

Questions No: 14/42

The security policy that restricts the rights of users and systems to perform certain tasks is:

Questions No: 15/42

The time taken for the desired sector of a disk to rotate to the disk head is known as:

Questions No: 16/42

Which of the following ensures the integrity of data?

Questions No: 17/42

A firewall is used to:

Questions No: 18/42

In Round Robin scheduling, if the time quantum is too small, it leads to:

Questions No: 19/42

Which of the following is NOT a type of kernel architecture?

Questions No: 20/42

Which disk scheduling algorithm gives the best performance for a random workload?

Questions No: 21/42

Which of the following is a secondary storage device?

Questions No: 22/42

Which type of attack involves sending massive amounts of traffic to a system to exhaust resources?

Questions No: 23/42

A process in the \'waiting\' state transitions to which state once its event occurs?

Questions No: 24/42

Which of the following is NOT a goal of system protection?

Questions No: 25/42

Which OS component is responsible for providing a user interface?

Questions No: 26/42

Which of these system calls is used to create a new process?

Questions No: 27/42

Which of the following is an example of a real-time operating system?

Questions No: 28/42

Spooling is used for:

Questions No: 29/42

Access control matrix is used to define:

Questions No: 30/42

Which of the following is responsible for file manipulation in the OS?

Questions No: 31/42

Which file allocation method suffers from external fragmentation?

Questions No: 32/42

Which of the following is a common threat to system security?

Questions No: 33/42

The principle of least privilege means:

Questions No: 34/42

A microkernel uses which approach for OS services?

Questions No: 35/42

In demand paging, pages are:

Questions No: 36/42

Consider three processes P1, P2, P3, which require 24, 3, 3 units of CPU time respectively. For time quantum of 4 units and Round - Robin scheduling policy, the sequence in which the processes be executed for each time quantum is __________.
तीन प्रक्रियाओं P1, P2, P3 पर विचार करें, जिसमें क्रमशः 24, 3, 3 यूनिट CPU समय की आवश्यकता होती है। समय के लिए 4 इकाइयों की मात्रा और राउंड-रॉबिन शेड्यूलिंग नीति, वह क्रम जिसमें प्रक्रियाएँ हों प्रत्येक बार क्वांटम के लिए क्रियान्वित __________ है।

Questions No: 37/42

Which of the following is not a function of an operating system?

Questions No: 38/42

The kernel in an operating system is:

Questions No: 39/42

Virtual memory is:

Questions No: 40/42

Which of the following is NOT a file access method?

Questions No: 41/42

Which of the following is NOT a memory management technique?

Questions No: 42/42

Which scheduling algorithm may suffer from the \'convoy effect\'?