Sie sind auf Seite 1von 7

LIST OF ATTEMPTED QUESTIONS AND ANSWERS

Multiple Choice Multiple Answer


Question locate the storage devices from the following :-

Correct Answer Disks , Tapes

Your Answer Disks , Tapes

True/False
Question Linux is a multi-user, multitasking system with a full set of UNIX-compatible tools.

Correct Answer True

Your Answer True

Select The Blank


Question ________ includes disks and tapes.

Correct Answer Block devices

Your Answer Block devices

Multiple Choice Single Answer


Question A system consists of collection of :-

Correct Answer Processes

Your Answer Processes

Multiple Choice Single Answer


Question If Dog derives from Mammal, and Mammal derives from Animal, then -

Correct Answer Dog inherits Animal's functions and data

Your Answer Mammal inherits Animal's functions and data

Multiple Choice Single Answer


Question A common representation for a discussion of process scheduling is a :-

Correct Answer Queuing diagram

Your Answer Queuing diagram

Select The Blank


Question The application refers to the data by a ________.

Correct Answer File name

Your Answer Byte.


LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Multiple Choice Multiple Answer
Question Kernel threads are generally :-

Correct Answer Slower to create , Difficult to manage

Your Answer Faster to create , Faster than user thread

Multiple Choice Single Answer


Question When computer is powered up or rebooted, it needs to have an initial
program to run. This initial program is known as :-
Correct Answer Bootstrap program

Your Answer Bootstrap program

Multiple Choice Multiple Answer


Question The security of a system can be improved by two management
techniques, such as :-
Correct Answer Threat monitoring , Audit Log

Your Answer Threat monitoring , Audit Log

Multiple Choice Multiple Answer


Question The movement of information between levels of a storage hierarchy
may be of two types depending on the hardware design and the
controlling operating system software such as :-
Correct Answer Explicit , Implicit

Your Answer Direct , Indirect

Select The Blank


Question OOSAD begins with identification of actors, what activities they
perform and building ________ model for the function.
Correct Answer Use-case

Your Answer Use-case

True/False
Question Main memory can be viewed as a fast cache for secondary memory,
since data on secondary storage must be copied into main memory
for use.
Correct Answer True

Your Answer True

Multiple Choice Multiple Answer


Question find out the services provided by kernel related to I/O :
LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Multiple Choice Single Answer
Question Anomaly example in which FIFO caused more page faults with
four pages than three is :-
Correct Answer Belady's anomaly

Your Answer Belady's anomaly

Multiple Choice Single Answer


Question UNIX operating system is written mostly in :-

Correct Answer C language

Your Answer C language

Select The Blank


Question When you express user-system interaction, the scenario in the
model is called ________
Correct Answer Case model

Your Answer Case model

Select The Blank


Question During execution, ________ register holds the sector for the
data segment.
Correct Answer DS

Your Answer DS

Multiple Choice Single Answer


Question The list of processes waiting for a particular I/O device is called a
:-
Correct Answer Device queue

Your Answer Job queue

Multiple Choice Single Answer


Question Interrupt mechanism accepts an address and this address is an
offset in a table called the :-
Correct Answer Interrupt vector

Your Answer Interrupt vector

True/False
Question Aging algorithm is based on LRU.

Correct Answer True

Das könnte Ihnen auch gefallen