This set of Embedded Systems Multiple Choice Questions & Answers (MCQs) focuses on “Resource Protection-II”.
1. Which of the following uses a swap file to provide the virtual memory?
a) windows NT
b) kernel
c) memory
d) memory management unit
View Answer
Explanation: The Windows NT use a swap file for providing a virtual memory environment. This file is dynamic and varies with the amount of memory that all the software including the device driver, operating systems and so on.
2. What is the size of the swap file in Windows 3.1?
a) 25 Mbytes
b) 30 Mbytes
c) 50 Mbytes
d) 100 Mbytes
View Answer
Explanation: The Windows 3.1 have a swap file of size 25 Mbytes.
3. What is the nature of the swap file in the Windows NT?
a) static
b) dynamic
c) linear
d) non-linear
View Answer
Explanation: The swap file used in the Windows NT is dynamic and it varies with the amount of memory that all the software including the device driver, operating systems and so on.
4. What limits the amount of virtual memory in Windows 3.1?
a) size of the swap file
b) nature of swap file
c) static file
d) dynamic file
View Answer
Explanation: The swap file of Windows 3.1 have a size of 25 Mbytes and thus limits the amount of virtual memory that it can support.
5. Which of the following control and supervises the memory requirements of an operating system?
a) processor
b) physical memory manager
c) virtual memory manager
d) ram
View Answer
Explanation: The virtual memory manager can control and supervises the memory requirements of the operating system.
6. What is the size of the linear address in the virtual memory manager?
a) 2 Gbytes
b) 12 Gbytes
c) 4 Gbytes
d) 16 Gbytes
View Answer
Explanation: The virtual memory manager can allocate a linear address space of size 4 Gbytes to each process which is unique and cannot be accessed by the other processes.
7. How many modes are used to isolate the kernel and the other components of the operating system?
a) 2
b) 3
c) 4
d) 5
View Answer
Explanation: There are two modes that are used for isolating the kernel and the other components of the operating system from any process and user applications that are running. These are kernel mode and the user mode.
8. Which are the two modes used in the isolation of the kernel and the user?
a) real mode and virtual mode
b) real mode and user mode
c) user mode and kernel mode
d) kernel mode and real mode
View Answer
Explanation: The two modes are kernel mode and the user mode which are used for isolating the kernel and the other components of the operating system from any process and user applications that are running.
9. Which of the following must be used to isolate the access in the user mode?
a) device driver
b) software driver
c) on-chip memory
d) peripherals
View Answer
Explanation: The device driver is used to control and isolate the access when it is in user mode. This is used to ensure that no conflict is caused.
10. Which mode uses 16 higher real-time class priority levels?
a) real mode
b) user mode
c) kernel mode
d) protected mode
View Answer
Explanation: The kernel mode processes use the 16 higher real-time class priority levels and the operating system processes will take the preference over the user applications.
Sanfoundry Global Education & Learning Series – Embedded System.
To practice all areas of Embedded System, here is complete set of 1000+ Multiple Choice Questions and Answers.