IBPS SO IT Officer is amongst the most reputed jobs in the Banking Sector and many Aspirants work hard to get this job. The exam for this post consists of various subjects other than the common subjects in Bank exams. Here we are providing you with a quiz based on Information Technology which will cover Operating System. Practice with the questions based on the most updated pattern.
Q1. Which of the following is used to transfer data intended for a peripheral device into a disk so that it can be transmitted to the peripheral device at a more suitable time or in bulk?
Virtual programming
Multi programming
Caching
Multitasking
Spooling
Solution:
Spooling is a technique to hold data temporarily in the computer memory and provide to devices when they need it. The temporary holding area of the memory is sometimes referred to as the buffer. One common example of spooling is printing, where files are stored in the buffer and sent to the printer when it is ready.
Q2. What are the ways of dealing with deadlock?
Deadlock prevention
Deadlock recovery
Deadlock detection
All of the above
Deadlock breakup.
Solution:
A deadlock is a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function. There are four methods to deal with deadlock- Deadlock prevention, Deadlock recovery, Deadlock detection and ignore the problem.
Q3. What is Multiprogramming system?
it is easier to develop than single programming systems
it executes each job faster
it executes more jobs in the same time
it is used only on large main frame computers
None of these
Solution:
multiprogramming refers to having multiple (programs, processes, tasks, threads) running at the same time. This term is used in modern operating systems when multiple tasks share a common processing resource (e.g., CPU and Memory).
Q4. A direct Memory Access (DMA) transfer implies:
Direct transfer of data between memory and accumulator
Direct transfer of data between memory and I/O devise without the use of microprocessor
Transfer of data exclusively within microprocessor registers
A fast transfer of data between microprocessor and I/O devices
None of these
Solution:
direct memory access (DMA) is a means of having a peripheral device control a processor's memory bus directly. DMA permits the peripheral, such as a UART, to transfer data directly to or from memory without having each byte (or word) handled by the processor.
Q5. What is use of "touch" command in Linux?
create a file
remove a file
Show the manual page
Show home directory
Copy files
Solution:
The touch command is used to create a file. It can be anything, from an empty txt file to an empty zip file.
Q6. Which of the following is the time interval between the submission and completion of job?
Waiting time
Turnaround time
Throughput
Response time
Seek time
Solution:
Turnaround time is the time interval from the time of submission of a process to the time of the completion of the process.
Q7. What is Optimal Page Replacement algorithm?
Replace the page that will not be used for a long time
Replace the page that has been used for a long time
Replace the Page that has not been used for a long time
Replace Page not in memory
Used to extract page in main memory
Solution:
In optimal page replacement algorithm, pages are replaced which are not used for the longest duration of time in the future.
Q8. What is effect of thrashing in CPU utilization?
Increase CPU utilization
Decrease CPU utilization
Keeps constant
NO effect on CPU
None of these
Solution:
Thrashing or disk thrashing describes when a hard drive is being overworked by moving information between the system memory and virtual memory excessively. Thrashing occurs when the system does not have enough memory, the system swap file is not properly configured, too much is running at the same time, or has low system resources. When thrashing occurs, you will notice the computer hard drive always working and a decrease in system performance.
Q9. Which of the following is true about compaction in operating system?
It is a technique for overcoming fatal error
It is a page management technique
It helps to solve the problem of fragmentation
Allocate the address of physical memory
None of these
Solution:
Compaction refers to combining all the empty spaces together and processes. Compaction helps to solve the problem of fragmentation, but it requires too much of CPU time.
Q10. Banker's Algorithm is used for:
Deadlock Detection
Deadlock Prevention
Deadlock Avoidance
Page Scheduling
CPU Scheduling
Solution:
The banker’s algorithm is a resource allocation and deadlock avoidance algorithm that tests for safety by simulating the allocation for predetermined maximum possible amounts of all resources. Banker's algorithm is a deadlock avoidance algorithm. It is named so because this algorithm is used in banking systems to determine whether a loan can be granted or not.
Q11.The processes that are residing in main memory and are ready and waiting to execute are kept on a list called:
job queue
ready queue
execution queue
process queue
priority queue
Solution:
Ready queue keeps a set of all processes residing in main memory, ready and waiting to execute. A new process is always put in this queue.
Q12. Which of the following is the time between a command request and the beginning of a response?
Throughput
Waiting time
Response time
Turnaround time
Beginning time
Solution:
Response time is the time difference between the issuance of a command and the start of a response to that command.
Q13.Which of the following is the condition of mutual exclusion occurrence?
It occurs between two disjoint processes that do not interact
among processes that share resources
among processes that do not use the same resource
process holding a resource.
None of these
Solution:
In mutual exclusion at least one unsharable resource - processes claim exclusive control of resources they need.
Q14. What is Dirty Bit in operating system?
page with corrupted data
wrong page in the memory
page that is modified after being loaded into cache memory
page that is less frequently accessed
None of these
Solution:
A dirty bit is a flag that indicates whether an attribute needs to be updated. Such situations usually occur when a bit in a memory cache or virtual memory page that has been changed by a processor but has not been updated in the storage.
Q15.Which of the following UNIX command is used to remove or delete files?