Rtos MCQ
Rtos MCQ
Rtos MCQ
2) Hard real time operating system has ______________ jitter than a soft real time operating system.
a) less
b) more
c) equal
d) none of the mentioned
7) Time duration required for scheduling dispatcher to stop one process and start another is known as
____________
a) process latency
b) dispatch latency
c) execution latency
d) interrupt latency
8) Time required to synchronous switch from the context of one thread to the context of another
thread is called?
a) threads fly-back time
b) jitter
c) context switch time
d) none of the mentioned
17) The amount of time required for the scheduling dispatcher to stop one process and start another is
known as ______________
a) event latency
b) interrupt latency
c) dispatch latency
d) context switch
18) The most effective technique to keep dispatch latency low is to ____________
a) provide non preemptive kernels
b) provide preemptive kernels
c) make it user programmed
d) run less number of processes at a time
22) Antilock brake systems, flight management systems, pacemakers are examples of ____________
a) safety critical system
b) hard real time system
c) soft real time system
d) safety critical system and hard real time system
23) In a ______ real time system, it is guaranteed that critical real time tasks will be completed within
their deadlines.
a) soft
b) hard
c) critical
d) none of the mentioned
24) Some of the properties of real time systems include ____________
a) single purpose
b) inexpensively mass produced
c) small size
d) all of the mentioned
28) The technique in which the CPU generates physical addresses directly is known as ____________
a) relocation register method
b) real addressing
c) virtual addressing
d) none of the mentioned
30) A process P1 has a period of 50 and a CPU burst of t1 = 25, P2 has a period of 80 and a CPU burst of
35. The total CPU utilization is ____________
a) 0.90
b) 0.74
c) 0.94
d) 0.80
31) A process P1 has a period of 50 and a CPU burst of t1 = 25, P2 has a period of 80 and a CPU burst of
35., the priorities of P1 and P2 are?
a) remain the same throughout
b) keep varying from time to time
c) may or may not be change
d) none of the mentioned
32) A process P1 has a period of 50 and a CPU burst of t1 = 25, P2 has a period of 80 and a CPU burst of
35., can the two processes be scheduled using the EDF algorithm without missing their respective
deadlines?
a) Yes
b) No
c) Maybe
d) None of the mentioned
33) Using EDF algorithm practically, it is impossible to achieve 100 percent utilization due to __________
a) the cost of context switching
b) interrupt handling
c) power consumption
d) all of the mentioned
34) T shares of time are allocated among all processes out of N shares in __________ scheduling
algorithm.
a) rate monotonic
b) proportional share
c) earliest deadline first
d) none of the mentioned
35) If there are a total of T = 100 shares to be divided among three processes, A, B and C. A is assigned
50 shares, B is assigned 15 shares and C is assigned 20 shares.
A will have ______ percent of the total processor time.
a) 20
b) 15
c) 50
d) none of the mentioned
36) If there are a total of T = 100 shares to be divided among three processes, A, B and C. A is assigned 50
shares, B is assigned 15 shares and C is assigned 20 shares.
B will have ______ percent of the total processor time.
a) 20
b) 15
c) 50
d) none of the mentioned
37) If there are a total of T = 100 shares to be divided among three processes, A, B and C. A is assigned 50
shares, B is assigned 15 shares and C is assigned 20 shares.
C will have ______ percent of the total processor time.
a) 20
b) 15
c) 50
d) none of the mentioned
38) If there are a total of T = 100 shares to be divided among three processes, A, B and C. A is assigned
50 shares, B is assigned 15 shares and C is assigned 20 shares.
If a new process D requested 30 shares, the admission controller would __________
a) allocate 30 shares to it
b) deny entry to D in the system
c) all of the mentioned
d) none of the mentioned
40) If the period of a process is ‘p’, then what is the rate of the task?
a) p2
b) 2*p
c) 1/p
d) p
42) The ____________ scheduling algorithm schedules periodic tasks using a static priority policy with
preemption.
a) earliest deadline first
b) rate monotonic
c) first cum first served
d) priority
44) In rate monotonic scheduling, a process with a shorter period is assigned __________
a) a higher priority
b) a lower priority
c) higher & lower priority
d) none of the mentioned
45) There are two processes P1 and P2, whose periods are 50 and 100 respectively. P1 is assigned higher
priority than P2. The processing times are t1 = 20 for P1 and t2 = 35 for P2. Is it possible to schedule
these tasks so that each meets its deadline using Rate monotonic scheduling?
a) yes
b) no
c) maybe
d) none of the mentioned
46) If a set of processes cannot be scheduled by rate monotonic scheduling algorithm, then __________
a) they can be scheduled by EDF algorithm
b) they cannot be scheduled by EDF algorithm
c) they cannot be scheduled by any other algorithm
d) none of the mentioned
47) A process P1 has a period of 50 and a CPU burst of t1 = 25, P2 has a period of 80 and a CPU burst of
35. The total CPU utilization is?
a) 0.90
b) 0.74
c) 0.94
d) 0.80
48) A process P1 has a period of 50 and a CPU burst of t1 = 25, P2 has a period of 80 and a CPU burst of
35. Can the processes be scheduled without missing the deadlines?
a) Yes
b) No
c) Maybe
d) None of the mentioned
49) _______ OS pays more attention on the meeting of the time limits.
a) Distributed
b) Network
c) Real time
d) Online
56) In which scheduling certain amount of CPU time is allocated to each process?
a) earliest deadline first scheduling
b) proportional share scheduling
c) equal share scheduling
d) none of the mentioned
58) Identify the category of the following real-time systems as “hard, soft or firm”
a) An on-line celebrity cricket bat auction
b) A patient monitoring system in an ICU
c) A library book reservation system
d) A bank’s credit card defaulters notice generation program
59) Which of the following describes the RTOS design philiosophy best
a) Maximize the throughput of the system
b) Maximize the processor utilization
c) Minimizing the response time
d) Response within certain stipulated time period
60) Scheduling of tasks is a very important consideration in RTOS. Which of the following best described
the scheduling policy design:
a) The scheduler must follow a pre-emptive policy
b) The scheduler must not use pre-emptive policy option
c) The scheduler must not only use pre-emptive policy options with the priority considerations.
d) The scheduler must not use pre-emptive policy option, but must employ priority consideration.
61) Keeping a task’s schedulability in mind, which way a task may be scheduled: Operating
Systems/Real-time OS and Micro controllers Multiple Choice Questions
a) The task has a predetermined time after which it may be scheduled.
b) The task has a predetermined time before which it may be scheduled
c) The task has a predetermined time interval during which it must be scheduled any time.
d) The task start has a worst case delay estimate before which it must be scheduled.
62) Describe which of these scheduling policies is most suited for controlling a set of periodic tasks.
a) FCFS
b) Least laxity first
c) Earliest dead line first
d) Rate monotonic policy schedule
63) Which of the following strategy is employed for overcoming the priority inversion problem?
a) Abandon the notion of priorities altogether
b) Have only two priority levels
c) Allow for temporarily raising the priority of lower level priority process
d) Use pre-emptive policies strictly based on priorities
64) Is it true that, in general, in an embedded system the application tasks have higher priority than
system tasks?
a) Yes
b) No
65) Where are the device drivers located in RTOSs with a microkernel:
a) In the kernel space
b) In the user space
c) In separately allocated space which is neither kernel space nor user space.
69) Consider the following inequalities with respect to a Real-Time system with N tasks and total
utilization u
1. u < N(21/N – 1)
2. u<1
which among the following is TRUE for a RM schedulable task set.
a) Both 1 and 2 are necessary
b) 1 is necessary and 2 is sufficient
c) 2 is necessary and 1 is sufficient
d) Both 1 and 2 are sufficient
70) Consideration of storage, input and output devices are considered as requirement of
a) hardware requirement
b) communication requirement
c) software requirement
d) process requirement
81) Which of the following pair of CPU utilization % and Zone type is/are correct ...
a) 83–99, questionable
b) 70–82, dangerous
c) 26–50, very safe
d) None of the above
93) In signaling between devices is it is important to have a mechanism for “recording” the appearance
of that signal for later processing. This process is called ...
a) Latching
b) Tristate logic
c) Triggering
d) None of the above
95) Using EDF algorithm practically, it is impossible to achieve 100 percent utilization due to
a) the cost of context switching
b) interrupt handling
c) power consumption
d) all of the mentioned
101) Upon receipt of the interrupt signal, the contents of the program counter are saved to a
designated memory location called the…
a) Status register
b) Interrupt-handler location
c) Interrupt return location
d) None of the above
103) Intel 82093AA I/O Advanced Programmable Interrupt Controller supports …… programmable
interrupts
a) 24
b) 32
c) 16
d) None of the above
2 . There are 10 different processes running on a workstation . Idle processes are waiting for an input
event in the input queue. Busy processes are
1. tQ = 15ms
2. tQ = 40ms
3. tQ = 45ms
4. tQ = 50ms
3. Consider the following set of processes, the length of the CPU burst time given in milliseconds :
Process Burst time
P1 6
P2 8
P3 7
P4 3
Assuming the above process being scheduled with the SJF scheduling algorithm :
1. The waiting time for process P1 is 3ms
2. The waiting time for process P1 is 0ms
3. The waiting time for process P1 is 16ms
4. The waiting time for process P1 is 9ms
4. The_______scheduling algorithm schedules periodic tasks using a static priority policy with
preemption.
1. earliest deadline first
2. rate monotonic
3. first come first served
4. priority
5. The method munlock( ) method does
1. Unlock complete process address.
2, Lock complete process address.
3. Unlock region Locked using mlock
4. None of the above
9. Rate Monotonic Algorithm upper bound for a system with 4 tasks is:
1. 0.66
2. 0.95
3. 0.44
4. 0.76
12. which RTOS scheduling algorithm cannot use CPU upto 100% ?
1. Propostional share
2. Earliest deadline frist
3. Rate Monotonic Scheduling
4. Hone of the above
13. when high priority task is indirectly preempted by medium priority task effectively inverting the
relative priority of the two tasks, the
1. Priority Inversion
2. Priority Removal
3. Priority Exchange
4. Priority Modification
14. A process Pl has a period of 50 and a CPU burst of t1 = 25, P2 has a period
of 80 and a CPU burst of 35. The total cru utilization is :
1. 0.90
2. 9.74
3. 0.94
4. 0.80
20. If there are a total of T = 100 shares to be divided among three processes A, B, and C. A is assigned 50
shares, B is assigned 15 shares, C is assigned 20 shares,
A will have _____percent of the total processor time.
1. 20
2. 15
3. 50
4. None of these
21. There are two processes pi and P2, whose periods are so and 100 respectively. P1 is
1. yes
2. no
3. maybe
4. none of the mentioned
22. RTAI API is used to execute semaphore only if calling process is not blocked:
1. rtf_sea_post( )
2. rif sea wait ( )
3. ref_sem_trywait( )
4. rif sem_timed wait()
27. Assume a task set: { (1,3), (1,5), (1,6), (2,10) } what is the CPU utilization time?
1. 0.84
2. 0.89
3. 0.92
4. 0.93
28. A_________of a task is the time at which the release of a task will produce the largest response time.
1. soft instance
2. hard instance
3. critical instance
4. None of the above
34. The Cortex-M3 port includes which of the following standard FreeRTOS features
1. Pre-emptive or co-operative operation
2. very flexible task priority
3. Queues
4. Mutex
5. All of the above
35. In a round robin scheduler the execution window is set for 2 time slots and three tasks T1, 12 & T3
were defined with 3,4,2 time slots of execution respectively. Which task will complete first and what is
the overall execution time to finish one cycle of all tasks
1. T1, 10
2. T3, 9
3. T2, 10
4. T3, 10
40. If a set of processes cannot be scheduled by rate monotonic scheduling algorithm, then_______
1. They can be scheduled by EDF algorithm
2. They cannot be scheduled by EDF algorithm
3. They cannot be scheduled by any other algorithm
4. None of the above
1. For real time operating systems, interrupt latency should be
1. Maximum
2. Minimal
3. Zero
4. Dependent on the scheduling
2 . There are 10 different processes running on a workstation . Idle processes are waiting
for an input event in the input queue. Busy processes are
1. tQ = 15ms
2. tQ = 40ms
3. tQ = 45ms
4. tQ = 50ms
3. Consider the following set of processes, the length of the CPU burst time given in
milliseconds :
Process Burst time
P1 6
P2 8
P3 7
P4 3
Assuming the above process being scheduled with the SJF scheduling algorithm :
1. The waiting time for process P1 is 3ms
2. The waiting time for process P1 is 0ms
3. The waiting time for process P1 is 16ms
4. The waiting time for process P1 is 9ms
12. which RTOS scheduling algorithm cannot use CPU upto 100% ?
1. Propostional share
2. Earliest deadline frist
3. Rate Monotonic Scheduling
4. Hone of the above
13. when high priority task is indirectly preempted by medium priority task effectively
inverting the relative priority of the two tasks, the
1. Priority Inversion
2. Priority Removal
3. Priority Exchange
4. Priority Modification
14. A process Pl has a period of 50 and a CPU burst of t1 = 25, P2 has a period
of 80 and a CPU burst of 35. The total cru utilization is :
1. 0.90
2. 9.74
3. 0.94
4. 0.80
20. If there are a total of T = 100 shares to be divided among three processes A, B, and C. A
is assigned 50 shares, B is assigned 15 shares, C is assigned 20 shares,
A will have _____percent of the total processor time.
1. 20
2. 15
3. 50
4. None of these
21. There are two processes pi and P2, whose periods are so and 100 respectively. P1 is
1. yes
2. no
3. maybe
4. none of the mentioned
22. RTAI API is used to execute semaphore only if calling process is not blocked:
1. rtf_sea_post( )
2. rif sea wait ( )
3. ref_sem_trywait( )
4. rif sem_timed wait()
27. Assume a task set: { (1,3), (1,5), (1,6), (2,10) } what is the CPU utilization time?
1. 0.84
2. 0.89
3. 0.92
4. 0.93
28. A_________of a task is the time at which the release of a task will produce the largest
response time.
1. soft instance
2. hard instance
3. critical instance
4. None of the above
29. Reentrant function is one that
1, should be executed by only one task at a time otherwise data corruption occurs
2. will allow 2 tasks to use it but not more than 2
3. will allow any number of task to execute it without data corruption
4. None of the above
30. Which of the following is not work of the Real time executive?
1. Task Management
2. IPC
3. Memory Management And File 10
4. Scheduling
35. In a round robin scheduler the execution window is set for 2 time slots and three tasks
T1, 12 & T3 were defined with 3,4,2 time slots of execution respectively. Which task will
complete first and what is the overall execution time to finish one cycle of all tasks
1. T1, 10
2. T3, 9
3. T2, 10
4. T3, 10
1. What will the output after executing the following code of segment?
main() {
fork();
fork();
fork();
printf("Hello"); }
How many child processes will be created in this?
A. 3
B. 4
C. 6
D. 8
2. Relocatable programs
A. cannot be used with fixed partitions
B. can be loaded almost anywhere in memory
C. do not need a linker
D. can be loaded only at one specific location
3. Preemption is
A. forced de allocation of the CPU from a program which is executing on the CPU
B. release of CPU by the program after completing its task
C. forced allotment of CPU by a program to itself
D. a program terminating itself due to detection of an error
6. To avoid race condition, the number of processes that may be simultaneously inside
their critical section is
A. 8
B. 1
C. 16
D. 0
9. The interval from the time of submission of a process to the time of completion is
termed as
A. waiting time
B. turnaround time
C. response time
D. throughput
10. Which of the following is page replacement policy using this strategy “Replace the
page that hasn‟t been used for the longest period of time” ?
A. least recently used page replacement
B. optimal page replacement
C. fifo page replacement
D. second chance page replacement
11. Time quantum is defined in
A. shortest job scheduling algorithm
B. round robin scheduling algorithm
C. priority scheduling algorithm
D. multilevel queue scheduling algorithm
13. What is the return value of read system call when end of file occurs?
A. 0
B. a positive number
C. -1
D. none of these
16. Using optimal page replacement algorithm calculate the number of page faults in
referencing the following string of page numbers with the number of frames 3
7,0,1,2,0,3,0,4,2,3,0,3,2,1,2,0,1,7,0,1
A. 6
B. 8
C. 9
D. 10
17. Thrashing
A. is a natural consequence of virtual memory systems
B. can always be avoided by swapping
C. always occurs on large computers
D. can be caused by poor paging algorithms
18. Using priority scheduling algorithm, find the average waiting time for the following set
of processes waiting time for the following set of processes given with their priorities in
the order:
Process Burst Time Priority
P1 10 3
P2 1 1
P3 2 4
P4 1 5
P5 5 2
A. 8
B. 8.2
C. 7.75
D. 3
20. If the resources are always preempted from the same process, …………. can occur.
A. deadlock
B. system crash
C. aging
D. starvation
23. With the FIFO page replacement policy and enough space for storing 3 page frames,
the memory page reference string „ABCABDDCABCD‟ would produce:
A. 5 page faults
B. 6 page faults
C. 7 page faults
D. 8 page faults
24. When the valid – invalid bit is set to valid, it means that the associated page:
A. is in the TLB
B. has data in it
C. is in the process’s logical address space
D. is the system‟s physical address space
25. Situation where two or more processes are reading or writing some shared data and
the final result depends upon who runs precisely is called?
A. race condition
B. critical section
C. mutual exclusion
D. message passing
34. Time duration required for scheduling dispatcher to stop one process and start
another is known as
A. process latency
B. dispatch latency
C. execution latency
D. interrupt latency
36. A task executing in the ready state cannot be moved into which of the following
states?
A. wait, ISR state
B. running state
C. dormant state
D. both (B) and (C)
37. The ......................... scheduling algorithm schedules periodic tasks using a static
priority policy with preemption.
A. earliest deadline first
B. rate monotonic
C. first cum first served
D. priority
38. A conventional real time task can be allocated
A. only fixed size stack, decided by kernel
B. variable size stack, decided by developer
C. dynamically expandable stack
D. all of the above
3. The interrupt latency should be _________ for real time operating systems.
A. maximum
B. minimal
C. dependent on the scheduling
D. zero
Answer: B
5. When the System processes data instructions without any delay is called as
A. online system
B. real-time system
C. instruction system
D. offline system
Answer : B
9. The technique in which the CPU generates physical addresses directly is known as .
A.relocation register
B.real addressing method
C.virtual addressing
D.none of the mentioned
Answer: B
4. The WCET of which component can be computed if the task is mapped to hardware?
a) hardware
b) task
c) both task and hardware
d) application manager
Answer: a
8. Which estimation technique can be used if interfaces to software synthesis tools and
hardware synthesis tools exist?
a) Performance value
b) estimated cost
c) estimated cost and performance value
d) accurate cost and performance value
Answer: d
1. What type of fault remains in the system for some period and then disappears?
a) Permanent
b) Transient
c) Intermittent
d) All of the mentioned
Answer: b
3. A system maintaining its integrity while accepting a temporary halt in its operation is
said to be in a state of
a) Full Fault Tolerance
b) Graceful Degradation
c) Fail Soft
d) Fail Safe
Answer: d
4. Which of the following Error Detection checks is not a part of Application detection?
a) Hardware checks
b) Timing checks
c) Reversal checks
d) Coding checks
Answer: a
8. In Log-based fault tolerance, logs of undetermined events are saved and replayed on
failure.
a) True
b) False
Answer: a
2. If timestamps of two events are same, then the events are ____________
a) concurrent
b) non-concurrent
c) monotonic
d) non-monotonic
Answer: a
6. In the token passing approach of distributed systems, processes are organized in a ring
structure ____________
a) logically
b) physically
c) both logically and physically
d) none of the mentioned
Answer: a
10. According to the ring algorithm, links between processes are ____________
a) bidirectional
b) unidirectional
c) both bidirectional and unidirectional
d) none of the mentioned
Answer: b
2. Which of the following decides which task can have the next time slot?
a) single task operating system
b) applications
c) kernel
d) software
Answer: c
3. Which of the following controls the time slicing mechanism in a multitasking operating
system?
a) kernel
b) single tasking kernel
c) multitasking kernel
d) application manager
Answer: c
4. Which of the following provides a time period for the context switch?
a) timer
b) counter
c) time slice
d) time machine
Answer: c
8. Which of the following stores all the task information that the system requires?
a) task access block
b) register
c) accumulator
d) task control block
Answer: d
9. Which of the following contains all the task and their status?
a) register
b) ready list
c) access list
d) task list
Answer: b
10. Which determines the sequence and the associated task’s priority?
a) scheduling algorithm
b) ready list
c) task control block
d) application register
Answer: a
12. Which can control the memory sharing between the tasks?
a) kernel
b) application
c) software
d) OS
Answer: a
13. Which of the following can implement the message passing and control?
a) application software
b) operating system
c) software
d) kernel
Answer: d
14. How many types of messages are associated with the real-time operating system?
a) 2
b) 3
c) 4
d) 5
Answer: a
15. Which of the following can carry information and control task?
a) semaphore
b) messages
c) flags
d) address message
Answer: b