Correct : A. stopping other sites from displaying images
2. For best speed position of CSS code should be at
Correct : C. at the top of the code
3. What is not the work of database optimization?
Correct : D. delete database
4. Which of the following is the Waterfall tool?
Correct : A. webpagetest.org
5. Which of the following is not the layer of the OSI Model?
Correct : D. atomic layer
6. Which browser gives maximum parallel connections per host?
Correct : A. opera 10
7. Which of the following help to meet and prove real-time constraints?
Correct : D. compiler
8. Which of the following is an important ingredient of all power optimization?
Correct : B. power model
9. Who proposed the first power model?
Correct : C. tiwari
10. Who proposed the third power model?
Correct : D. russell and jacome
11. Which compiler is based on the precise measurements of two fixed configurations?
Correct : C. third power model
12. What does SPM stand for?
Correct : A. scratch pad memories
13. Which model is based on precise measurements using real hardware?
Correct : A. encc energy-aware compiler
14. What is the solution to the knapsack problem?
Correct : D. one-to-one mapping
15. How can one compute the power consumption of the cache?
Correct : D. cacti
16. In real time operating system
Correct : B. a task must be serviced by its deadline period
17. For real time operating systems, interrupt latency should be
Correct : A. minimal
18. In rate monotonic scheduling
Correct : A. shorter duration job has higher priority
19. In which scheduling certain amount of CPU time is allocated to each process?
Correct : B. proportional share scheduling
20. The problem of priority inversion can be solved by
Correct : A. priority inheritance protocol
21. Time duration required for scheduling dispatcher to stop one process and start another is known as
Correct : B. dispatch latency
22. Which one of the following is a real time operating system?
Correct : D. all of the mentioned
23. VxWorks is centered around
Correct : A. wind microkernel
24. Identify the standard software components that can be reused?
Correct : B. operating system
25. What does WCTE stand for?
Correct : C. worst case execution time
26. For which of the following WCET can be computed?
Correct : D. program without recursion
27. The WCET of which component can be computed if the task is mapped to hardware?
Correct : A. hardware
28. Which estimation approach is used by Jha and Dutt for hardware?
Correct : B. estimated cost and performance value
29. Which estimate approach is more precise?
Correct : B. accurate cost and performance value
30. Which estimate approach takes more time to consume?
Correct : C. accurate cost and performance value
31. Which estimation technique can be used if interfaces to software synthesis tools and hardware synthesis tools exist?
Correct : D. accurate cost and performance value
32. Which of the following is the base for scheduling algorithm?
Correct : A. wcet
33. To schedule the processes, they are considered
Correct : B. periodic
34. If the period of a process is ‘p’, then what is the rate of the task?
Correct : C. 1/p
35. The scheduler admits a process using
Correct : C. busy wait polling
36. Rate monotonic scheduling assumes that the
Correct : A. processing time of a periodic process is same for each cpu burst
37. In rate monotonic scheduling, a process with a shorter period is assigned
Correct : A. a higher priority
38. Is it possible to schedule these tasks so that each meets its deadline using Rate monotonic scheduling?
Correct : A. yes
39. If a set of processes cannot be scheduled by rate monotonic scheduling algorithm, then
Correct : C. they cannot be scheduled by any other algorithm
40. A process P1 has a period of 50 and a CPU burst of t1 = 25, P2 has a period of 80 and a CPU burst of 35. Can the processes be scheduled without missing the deadlines?
Correct : B. no
41. What type of fault remains in the system for some period and then disappears?
Correct : B. transient
42. Which of the following approaches are used to achieve reliable systems?
Correct : D. all of the mentioned
43. A system maintaining its integrity while accepting a temporary halt in its operation is said to be in a state of
Correct : D. fail safe
44. Which of the following Error Detection checks is not a part of Application detection?
Correct : A. hardware checks
45. Exception handling is a type of
Correct : A. forward error recovery mechanism
46. Non-occurrence of improper alteration of information is known as
Correct : D. integral dependability
47. In N-version programming which is the independent generation of N, the value of N is
Correct : C. greater than 2
48. In Log-based fault tolerance, logs of undetermined events are saved and replayed on failure.
Correct : A. true
49. All fault-tolerant techniques rely on
Correct : C. redundancy
50. In distributed systems, a logical clock is associated with
Correct : B. each process
51. If timestamps of two events are same, then the events are
Correct : A. concurrent
52. If a process is executing in its critical section
Correct : B. no other process can execute in its critical section
53. For proper synchronization in distributed systems
Correct : C. prevention from the deadlock & starvation is must
54. In the token passing approach of distributed systems, processes are organized in a ring structure
Correct : A. logically
55. In distributed systems, what will the transaction coordinator do?
Correct : D. all of the mentioned
56. 5 CLOCK SYNCHRONISATION
Correct : C. both bully and ring algorithm
57. In distributed systems, election algorithms assumes that
Correct : A. a unique priority number is associated with each active process in system
58. According to the ring algorithm, links between processes are
Correct : B. unidirectional
59. Which of the following works by dividing the processor’s time?
Correct : B. multitask operating system
60. Which of the following decides which task can have the next time slot?
Correct : C. kernel
61. Which of the following controls the time slicing mechanism in a multitasking operating system?
Correct : C. multitasking kernel
62. Which of the following provides a time period for the context switch?
Correct : C. time slice
63. Which of the following can periodically trigger the context switch?
Correct : B. hardware interrupt
64. Which interrupt provides system clock in the context switching?
Correct : B. hardware interrupt
65. The special tale in the multitasking operating system is also known as
Correct : A. task control block
66. Which of the following stores all the task information that the system requires?
Correct : D. task control block
67. Which of the following contains all the task and their status?
Correct : B. ready list
68. Which determines the sequence and the associated task’s priority?
Correct : A. scheduling algorithm
69. Which can control memory usage?
Correct : D. kernel
70. Which can control the memory sharing between the tasks?
Correct : A. kernel
71. Which of the following can carry information and control task?
Correct : B. messages
72. How many types of messages are associated with the real-time operating system?
Correct : A. 2
73. For real time operating systems, interrupt latency should be
Correct : A. minimal
74. In rate monotonic scheduling
Correct : A. shorter duration job has higher priority
75. In which scheduling certain amount of CPU time is allocated to each process?
Correct : B. proportional share scheduling
76. The problem of priority inversion can be solved by
Correct : A. priority inheritance protocol
77. Time duration required for scheduling dispatcher to stop one process and start another is known as
Correct : B. dispatch latency
78. Time required to synchronous switch from the context of one thread to the context of another thread is called?
Correct : C. context switch time
79. VxWorks is centered around
Correct : A. wind microkernel
80. Message passing system allows processes to
Correct : A. communicate with one another without resorting to shared data
81. Which of the following two operations are provided by the IPC facility?
Correct : D. receive & send message
82. Messages sent by a process
Correct : C. can be fixed or variable sized
83. The link between two processes P and Q to send and receive messages is called
Correct : A. communication link
84. Which of the following are TRUE for direct communication?
Correct : B. a communication link can be associated with exactly two processes
85. In indirect communication between processes P and Q
Correct : C. there is a mailbox to help communication between p and q
86. In the non blocking send
Correct : B. the sending process sends the message and resumes operation
87. In the Zero capacity queue
Correct : B. the sender blocks until the receiver receives the message
88. The Zero Capacity queue
Correct : B. is referred to as a message system with no buffering
89. Bounded capacity and Unbounded capacity queues are referred to as
Correct : B. automatic buffering
90. During the execution of the instructions, a copy of the instructions is placed in the
Correct : D. cache
91. A processor performing fetch or decoding of different instruction during the execution of another instruction is called
Correct : B. pipe-lining
92. For a given FINITE number of instructions to be executed, which architecture of the processor provides for a faster execution?
Correct : C. super-scalar
93. An optimizing Compiler does
Correct : B. takes advantage of the type of processor and reduces its process time
94. The ultimate goal of a compiler is to
Correct : A. reduce the clock cycles for a programming task
95. SPEC stands for
Correct : C. system performance evaluation corporation
96. As of 2000, the reference system to find the performance of a system is
Correct : A. ultra sparc 10
97. When Performing a looping operation, the instruction gets stored in the
Correct : B. cache
98. The average number of steps taken to execute the set of instructions can be made to be less than one by following
Correct : C. super-scaling
99. If a processor clock is rated as 1250 million cycles per second, then its clock period is
Correct : D. 8 * 10-10 sec
100. If the instruction, Add R1, R2, R3 is executed in a system that is pipe-lined, then the value of S is (Where S is a term of the Basic performance equation)?