Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

8. Which of the following statement regarding memory is incorrect? (A) When the

ID: 3912520 • Letter: 8

Question

8. Which of the following statement regarding memory is incorrect? (A) When the processor attempts to read a
byte or word, it will first check with the cache memory. (B) The main memory is usually large and slow. (C)
The cache size has impacts on performance of the processor. (D) As the cache block size increases, the hit ratio
will decrease. (E) None of the above.
9. Which of the following technique is not used for I/O operations? (A) Programmed I/O (B) Interrupt-driven I/O
(C) Direct Memory Access (D) Peripheral polling I/O (E) None of the above
10. Which of the following defines the system call interface to operating systems and hardware resources? (A) ABI
(B) ISA (C) API (D) HLL (E) None of the above
11. The error-correction techniques in RAID disks uses the method of (A) spatial redundancy (B) temporal
redundancy (C) information redundancy (D) physical redundancy (E) All of the above
12. A copy of an application’s state saved in some storage to be immune to the future failure is called (A) process
isolation (B) virtual machine (C) checkpoints (D) concurrency control (E) None of the above
13. In Android operating systems, the installation and removal of an app is handled by (A) Activity Manager (B)
Resource Manager (C) Package Manager (D) Content Providers (E) None of the above
14. In a five-state model, if a process control block is created, but the process has not loaded into the main memory,
this process is in the state of (A) Running (B) Ready (C) Blocked (D) New (E) Exit
15. In a five-state model, which of the following event will cause the process into Exit state (A) Admitted (B)
Dispatch (C) Time-out (D) Release (E) Event wait
16. Which of the following is not included in the user Process Image (A) User Data (B) User Program (C) stack (D)
Process Control Block (E) None of the above
17. When a user process is running and an instruction is executed that requests a file-open operation, which of the
following event will occur? (A) Supervisor call (B) Trap (C) I/O interrupt (D) Fault (E) None of the above
18. In Android system, an e-mail application that shows a list of new emails, composes an email, or reads an email
is called (A) Service (B) Thread (C) Activity (D) Communication (E) None of the above.
19. In Solaris operating systems, a thread that has been terminated is in the state of (A) Sleep (B) Stop (C) Zombie
(D) Free (E) None of the above
20. Which of the following statement regarding Android operating systems is incorrect? (A) The activities are
arranged in first-in-first-out in the order where each activity is created. (B) Killing one or more activities may
reclaim memory. (C) The user may revoke and return to killed activities. (D) An Empty process can be used for
caching purpose to improve startup time. (E) None of the above

Explanation / Answer

8. Which of the following statement regarding memory is incorrect? (A) When the processor attempts to read a

Answer: D

as the cache block size increases, the hit ratio

will decrease.

explanation:

The cache hit ratio will increase

9. Which of the following technique is not used for I/O operations?

Answer: E

none of the above

explanation:

all techniques are used for I/O operations..

10. Which of the following defines the system call interface to operating systems and hardware resources?

Answer: A

ABI

eplanation :

ABI defines the system call to os and hardware

11. The error-correction techniques in RAID disks uses the method of

Answer:B

temporal redundancy

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote