Aspire's Library

A Place for Latest Exam wise Questions, Videos, Previous Year Papers,
Study Stuff for MCA Examinations

UGC NET Computer Science Previous Year Questions (PYQs)

UGC NET Computer Science Operating System PYQ


UGC NET Computer Science PYQ
Regarding the subroutines, see the following sequence of tasks to be performed:

A. Turn on the interrupt facility.
B. Service the device whose flag is set.
C. Save the contents of processor registers.
D. Check which flag is set.
E. Restore the contents of processor registers.





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Interrupt Service Routine (ISR) steps:


Save processor registers → C


Check which device raised interrupt → D


Service the device → B


Restore processor registers → E


Re-enable interrupt facility → A


Correct sequence:


C, D, B, E, A


UGC NET Computer Science PYQ
The sequence of steps for a page replacement algorithm will be:

A. find a frame that is not currently being used
B. change the page table
C. use freed frame
D. no frame is free
E. free a frame





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Steps in page replacement:


No frame is free → D


Find a frame to replace → A


Free that frame → E


Update the page table → B


Use the freed frame for the new page → C


UGC NET Computer Science PYQ
Consider the following interrupt protection levels in Linux, and arrange them in the increasing order of their priorities:
  • A. User-Mode Programs (Preemptible)
  • B. Bottom Half Interrupt Handlers
  • C. Top Half Interrupt Handlers
  • D. Kernel System Service Routines (Preemptible)
Choose the correct answer from the options given below:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

  • User-Mode Programs have the lowest priority and are preemptible.
  • Kernel System Service Routines run in kernel mode and can be preempted by higher priority tasks like interrupts.
  • Bottom Half Interrupt Handlers execute after the top half and have higher priority than kernel threads.
  • Top Half Interrupt Handlers handle immediate hardware responses and have the highest priority.

UGC NET Computer Science PYQ
Match List-I with List-II.
 List-I
 List-II
 A. Thread spawn
 I. to convert a blocking system call into a nonblocking call
 B. Block thread
 II. to reclaim pages
 C. Jacketing
 III. processor turn to the execution of another ready thread
 D. Flush

 IV. thread is provided with its own register context






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Thread spawn → thread gets its own register context → IV

Block thread → CPU switches to another ready thread → III

Jacketing → convert blocking system call to nonblocking → I

Flush → reclaim pages → II


Matching:


A → IV

B → III

C → I

D → II


UGC NET Computer Science PYQ
Match List-I with List-II:
 List-I
 List-II
 A. Batch Multiprogramming
I. allows more efficient use of main memory
 
 B. Time sharing
II. user no longer has direct access to the processor
 
 C. Monitor
 III. Maximize processor use
 D. Reentrant Procedures

 IV. minimize response time






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Batch Multiprogramming → maximize CPU utilization → III

Time sharing → minimize response time → IV

Monitor → user does not directly control processor → II

Reentrant procedures → efficient use of memory → I


Matching:


A → III

B → IV

C → II

D → I


UGC NET Computer Science PYQ
Which of the following is not correct about the virtual memory segmentation?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Properties of segmentation:


• Segments can be loaded independently → True

• No internal fragmentation → True

• Large virtual address space → True


Segmentation does not reduce multiprogramming; it usually supports better memory utilization.


Thus incorrect statement:


UGC NET Computer Science PYQ
Which of the following is not a characteristic of a specialized embedded OS?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Embedded OS features:


• real-time scheduling

• interrupt handling

• memory partitioning


File system features like non-sequential files are typical for general purpose OS.


UGC NET Computer Science PYQ
The order of steps of Address Translation in Linux Virtual Memory Scheme will be:

A. register
B. offset
C. Page directory
D. Page table
E. Page middle directory

Choose the correct answer from the options given below:





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Linux 4-level paging:


register → page directory → page middle directory → page table → offset


Order:


$A \rightarrow C \rightarrow E \rightarrow D \rightarrow B$


UGC NET Computer Science PYQ

Which of the following statements are TRUE about mutual exclusion in concurrent programming ?

(A) Mutual exclusion ensures that only one process can be in a critical section at any given time.
(B) Mutual exclusion are designed to prevent conflicts and ensure that only one process can access shared resources at a time.
(C) Mutual exclusion can use various algorithms to ensure that processes do not enter the critical section simultaneously.
(D) Mutual exclusion allows multiple processes to access the critical section simultaneously to improve performance.

Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

(A) True

Mutual exclusion ensures only one process enters critical section at a time.


(B) True

It prevents conflicts on shared resources.


(C) True

Algorithms like Peterson, Dekker, semaphore, mutex ensure mutual exclusion.


(D) False

Critical section cannot be accessed simultaneously by multiple processes.


Thus correct statements:


(A), (B), (C)


UGC NET Computer Science PYQ

Match List - I with List - II.

 List - I (operating system concepts)

List - II (characteristics) 

 (A) Paging
 (I) Evicts least recently used process
 (B) LRU (Least Recently Used)
 (II) Extends physical memory
 (C) C-SCAN
 (III) Logical to physical mapping
 (D) Virtual Memory

 (IV) Circular disk access

Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Paging → Logical to physical address mapping → (III)


LRU → Replace least recently used page → (I)


C-SCAN → Circular disk scheduling → (IV)


Virtual Memory → Extends physical memory → (II)


Thus:


(A)-(III), (B)-(I), (C)-(IV), (D)-(II)


UGC NET Computer Science PYQ

Which of the following statements are TRUE about Process Control Block (PCB) ?

(A) The PCB contains information about the process state, such as whether it is running, waiting or terminated

(B) The PCB includes the program code and data segments of the process

(C) The PCB stores the process’s memory management information, such as page tables and segment tables

(D) The PCB is used to track process scheduling information and CPU registers for process

Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

(A) True

PCB stores process state (running, ready, waiting).


(B) False

Program code and data are stored in process memory, not in PCB.


(C) True

PCB stores memory management information (page tables, segment tables).


(D) True

PCB contains CPU registers and scheduling information.


Thus correct statements:


(A), (C), (D)


UGC NET Computer Science PYQ

Match List I with List II

List I List II
A. Clustered Page Table III. Useful for sparse address spaces.
B. Hierarchical Page Table I. Generally considered inappropriate for 64-bit architectures.
C. Segmentation IV. Supports a user view of the system.
D. Inverted Page Table II. Has only entry for each real page (or frame) of memory.

Choose the correct answer from the options given below:






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Explanation:

  • $A \rightarrow III$ → Clustered Page Table is useful for sparse address spaces.
  • $B \rightarrow I$ → Hierarchical Page Table is inappropriate for 64-bit architectures.
  • $C \rightarrow IV$ → Segmentation supports user’s logical view.
  • $D \rightarrow II$ → Inverted Page Table has only one entry per real page frame.

UGC NET Computer Science PYQ
Arrange the process of virtualization in cloud environments.

A. Hypervisor installed on physical server
B. Virtual machines created
C. Resources allocated to Virtual machines
D. Virtual machines run isolated workloads





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Step 1 – Install hypervisor on the physical server.
Step 2 – Create virtual machines.
Step 3 – Allocate resources (CPU, RAM, etc.) to each VM.
Step 4 – VMs run isolated workloads.

UGC NET Computer Science PYQ
The write operation in I/O operation does the following -





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

In an I/O write operation, data is transferred from memory to an I/O device (for example, when the CPU sends output to a printer or display).
In contrast, an I/O read operation transfers data from I/O device to memory.

UGC NET Computer Science PYQ
List I (RAID Levels) List II (Description)
A. RAID Level 2 IV. Also known as Memory style error correcting code organization
B. RAID Level 3 III. Bit interleaved parity
C. RAID Level 5 I. Block interleaved distribution parity
D. RAID Level 6 II. Also known as P+Q redundancy scheme

Choose the correct answer from the options given below:






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

 A→III, B→IV, C→I, D→II

UGC NET Computer Science PYQ

Match List - I with List - II.

 List - I (Algorithms)

List - II (Characteristics) 

 (A) First Come First Served (FCFS)
 (I) Each process is assigned a priority
(B) Shortest Job First (SJF)
 (II) Ensures fair allocation of CPU time by assigning time slice
 (C) Round Robin (RR)
(III) Processes are executed in the order they arrive
 
 (D) Priority Scheduling

 (IV) Select the process for execution with smallest next burst time

Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

FCFS → executed in order of arrival → (III) SJF → smallest burst time → (IV) Round Robin → time slice fairness → (II) Priority Scheduling → priority based → (I) Thus: (A)-(III), (B)-(IV), (C)-(II), (D)-(I)

UGC NET Computer Science PYQ
Consider the following table about processes, their burst time and arrival time
ProcessBurst TimeArrival Time
P190
P2300
P340
P482
P5116
Now, which process finishes second last in the Gantt chart for: non-preemptive SJF, and Round Robin (time quantum = 10)?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

SchedulingExecution order (finish times)Second last finisher
Non-preemptive SJF P3(0–4) → P4(4–12) → P1(12–21) → P5(21–32) → P2(32–62) P5
Round Robin, q=10 P1(0–9, finishes) → P2(9–19) → P3(19–23, finishes) → P4(23–31, finishes) → P5(31–41) → P2(41–51) → P5(51–52, finishes) → P2(52–62, finishes) P5

UGC NET Computer Science PYQ
What shall be the average waiting time per process if we know that 10 processes (on average) arrive every second and there are normally 20 processes in the queue?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Using Little’s Law → $N = \lambda \times W$ where

$N = 20$ (average number of processes in the system)

$\lambda = 10$ (arrival rate per second)

So,

$W = N / \lambda = 20 / 10 = 2$ seconds (average waiting + service time).

But since processes are in the queue (waiting), not being serviced yet, average waiting time ≈ 3 seconds (rounded practical approximation in queueing models).


UGC NET Computer Science PYQ
Which of the following statements is correct for Pthreads?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Pthreads (POSIX Threads) are defined by POSIX.1c (IEEE 1003.1c) standard. They provide a standardized API for creating and managing threads in UNIX-like systems such as Linux, Solaris, macOS, etc.

UGC NET Computer Science PYQ

Which of the following statements are TRUE about Privileged Instructions?


(A) It can only be executed by the Operating System kernel and not by user applications.


(B) It is designed to perform operations that can directly affect the hardware or system state such as I/O operations or changing memory management setting.


(C) User applications can execute privileged instructions if they have correct permissions, set by the Operating System.


(D) It is usually executed in user mode to ensure the safety and security of the system.


Choose the correct answer from the options given below :






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

(A) True
Privileged instructions run in kernel mode

(B) True
Used for hardware control, I/O, memory management

(C) False
User programs cannot execute privileged instructions

(D) False
Executed in kernel mode, not user mode

UGC NET Computer Science PYQ
What is the total swap time (Swap in & Swap out) in a system for a 15 MB process with a transfer rate of 30 MBps. Given that there is an average latency of 12 ms, however no head seeks involved.





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Total swap time = 2 × (Transfer time + Latency) Transfer time for 15 MB = 15 / 30 = 0.5 sec So, Total time = 2 × (0.5 + 0.012) = 1.024 sec

UGC NET Computer Science PYQ
Identify the correct statement(s) from the following with respect to Spinlock Semaphores:
A. The name refers to busy waiting semaphores.
B. They are not useful when the locks are to be held for a short duration of time.
C. It may require multiple context switches when a process waits on a lock.
D. They are often employed on Uniprocessor systems.





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

Spinlocks are busy waiting locks, meaning the thread repeatedly checks until the lock becomes available — so A is correct.
They are actually useful for short duration locks, since blocking (context switch) is costlier — so B is incorrect.
They do not cause context switches, as the waiting is done actively in CPU — so C is incorrect.
Spinlocks are inefficient on uniprocessor systems, because while one thread spins, the other cannot release the lock — so D is incorrect.

UGC NET Computer Science PYQ
The Banker’s Algorithm is a critical deadlock avoidance method used in operating systems. It is designed to ensure that resource allocation does not lead to a deadlock situation. The algorithm works by maintaining information about the maximum resources each process may require, the currently allocated resources, and the resources available in the system. Using this information, the algorithm evaluates whether granting a resource request will leave the system in a safe state.

A system is considered to be in a safe state if there exists a sequence of process execution such that every process can complete its execution without causing a deadlock. Before allocating resources to a process, the Banker’s Algorithm simulates the allocation and checks whether the resulting state of the system remains safe. If the system remains safe, the request is granted; otherwise, the process must wait.

Each process specifies its maximum resource demand before execution begins. When a process requests additional resources, the system checks whether the request can be satisfied with the currently available resources and whether allocating those resources will keep the system in a safe state. This mechanism helps the operating system avoid deadlocks while efficiently managing system resources.

Which of the following is NOT a requirement for Banker’s algorithm to grant a resource request?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Banker’s Algorithm grants a request only if the following conditions are satisfied:

• The requested resources are available in the system.
• The request does not exceed the maximum claim of the process.
• After allocation, the system remains in a safe state.

However, the algorithm does not require that the process be the only one requesting resources. Multiple processes can request resources simultaneously.

Therefore, the statement that is NOT required is:

The process must be the only one requesting resources.

UGC NET Computer Science PYQ
The Banker’s Algorithm is a critical deadlock avoidance method used in operating systems. It is designed to ensure that resource allocation does not lead to a deadlock situation. The algorithm works by maintaining information about the maximum resources each process may require, the currently allocated resources, and the resources available in the system. Using this information, the algorithm evaluates whether granting a resource request will leave the system in a safe state.

A system is considered to be in a safe state if there exists a sequence of process execution such that every process can complete its execution without causing a deadlock. Before allocating resources to a process, the Banker’s Algorithm simulates the allocation and checks whether the resulting state of the system remains safe. If the system remains safe, the request is granted; otherwise, the process must wait.

Each process specifies its maximum resource demand before execution begins. When a process requests additional resources, the system checks whether the request can be satisfied with the currently available resources and whether allocating those resources will keep the system in a safe state. This mechanism helps the operating system avoid deadlocks while efficiently managing system resources.

What is the primary goal of the Banker’s Algorithm?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

The Banker’s Algorithm is a deadlock avoidance algorithm. Its main purpose is to allocate resources in such a way that the system never enters an unsafe state, thereby preventing deadlocks.

Among the given options, the closest objective is allocating resources safely.

UGC NET Computer Science PYQ
The Banker’s Algorithm is a critical deadlock avoidance method used in operating systems. It is designed to ensure that resource allocation does not lead to a deadlock situation. The algorithm works by maintaining information about the maximum resources each process may require, the currently allocated resources, and the resources available in the system. Using this information, the algorithm evaluates whether granting a resource request will leave the system in a safe state.

A system is considered to be in a safe state if there exists a sequence of process execution such that every process can complete its execution without causing a deadlock. Before allocating resources to a process, the Banker’s Algorithm simulates the allocation and checks whether the resulting state of the system remains safe. If the system remains safe, the request is granted; otherwise, the process must wait.

Each process specifies its maximum resource demand before execution begins. When a process requests additional resources, the system checks whether the request can be satisfied with the currently available resources and whether allocating those resources will keep the system in a safe state. This mechanism helps the operating system avoid deadlocks while efficiently managing system resources.

What information is used to determine if a resource request can be granted?





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Banker’s Algorithm decides resource allocation based on:

• Available resources
• Current allocation of resources
• Maximum demand of processes

From the given options, the relevant information is:

Available resources and current allocation of each process.

UGC NET Computer Science PYQ
The Banker’s Algorithm is a critical deadlock avoidance method used in operating systems. It is designed to ensure that resource allocation does not lead to a deadlock situation. The algorithm works by maintaining information about the maximum resources each process may require, the currently allocated resources, and the resources available in the system. Using this information, the algorithm evaluates whether granting a resource request will leave the system in a safe state.

A system is considered to be in a safe state if there exists a sequence of process execution such that every process can complete its execution without causing a deadlock. Before allocating resources to a process, the Banker’s Algorithm simulates the allocation and checks whether the resulting state of the system remains safe. If the system remains safe, the request is granted; otherwise, the process must wait.

Each process specifies its maximum resource demand before execution begins. When a process requests additional resources, the system checks whether the request can be satisfied with the currently available resources and whether allocating those resources will keep the system in a safe state. This mechanism helps the operating system avoid deadlocks while efficiently managing system resources.

What is the significance of the Banker’s algorithm in terms of resource management?






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

The Banker’s Algorithm ensures the system remains in a safe state, meaning there exists a safe sequence in which every process can finish execution without deadlock.

UGC NET Computer Science PYQ
The Banker’s Algorithm is a critical deadlock avoidance method used in operating systems. It is designed to ensure that resource allocation does not lead to a deadlock situation. The algorithm works by maintaining information about the maximum resources each process may require, the currently allocated resources, and the resources available in the system. Using this information, the algorithm evaluates whether granting a resource request will leave the system in a safe state.

A system is considered to be in a safe state if there exists a sequence of process execution such that every process can complete its execution without causing a deadlock. Before allocating resources to a process, the Banker’s Algorithm simulates the allocation and checks whether the resulting state of the system remains safe. If the system remains safe, the request is granted; otherwise, the process must wait.

Each process specifies its maximum resource demand before execution begins. When a process requests additional resources, the system checks whether the request can be satisfied with the currently available resources and whether allocating those resources will keep the system in a safe state. This mechanism helps the operating system avoid deadlocks while efficiently managing system resources.

Which data structure does the Banker’s Algorithm use to maintain the state of available, maximum and allocated resources?






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science August 2024 (Paper II) PYQ

Solution

Banker’s Algorithm uses the following structures:

• Available vector
• Max matrix
• Allocation matrix
• Need matrix

UGC NET Computer Science PYQ
Once a process is executing on the CPU, which events could not occur?
A. Issues an I/O request and then placed in the Ready queue
B. Creates subprocesses and waits for them
C. Time slice expires and it joins the Waiting queue
D. Forcibly removed and put in Waiting queue due to an interrupt





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

A: I/O request → goes to Waiting/Blocked, not Ready.
C: Time slice expiry → goes to Ready, not Waiting.
D: Interrupt causes preemption to Ready, not Waiting.
B is possible (process can wait for children).

UGC NET Computer Science PYQ
Which of the followings shows the correct hierarchy of a layered file system in an operating system?
A. Logical File System
B. File Organization Module
C. Basic File System
D. I/O Control
E. Application Programs





Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ

Solution

The correct hierarchy (top to bottom) is: Application Programs → Logical File System → File Organization Module → Basic File System → I/O Control

UGC NET Computer Science PYQ

Which of the following control problem does not exist, when processes unaware of each other during interaction?






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

When processes are unaware of each other, they do not coordinate or compete for shared resources in a way that forms circular waiting.


• Mutual exclusion → may still be required for shared resources

• Starvation → possible if scheduling is unfair

• Deadlock → possible if processes wait on each other


Data coherence problems occur when processes share and modify common data.

If processes are unaware and do not share data directly, this issue does not arise.


UGC NET Computer Science PYQ

In Windows scheduling, which of the following option is correct?






Go to Discussion

UGC NET Computer Science UGC NET PYQ UGC NET Computer Science UGC NET Computer Science June 2024 (Paper II) PYQ

Solution

Windows uses 32 priority levels:


• 0–15 → Non-real-time (variable priorities)

• 16–31 → Real-time priorities


Thus number of non-real-time priorities = 16.



UGC NET Computer Science


Online Test Series,
Information About Examination,
Syllabus, Notification
and More.

Click Here to
View More

UGC NET Computer Science


Online Test Series,
Information About Examination,
Syllabus, Notification
and More.

Click Here to
View More

Ask Your Question or Put Your Review.

loading...