Sie sind auf Seite 1von 51

LIST OF ATTEMPTED QUESTIONS AND ANSWERS Multiple Choice Single Answer Question In UNIX, a file is represented by an :Correct Answer

Inode Your Answer Inode Match The Following Question Correct Answer Your Answer Bounded-buffer Fixed size buffer Fixed size buffer Producer Produces process Produces process Consumer Consumes process Consumes process Unbounded-buffer No limit on size of buffer No limit on size of buffer Multiple Choice Multiple Answer Question Find out the human-interface devices :Correct Answer Screen , Keyboard , Mouse Your Answer Keyboard , Mouse Match The Following Question Correct Answer Your Answer RAM Main Memory Main Memory Monitor mode Supervisor mode Supervisor mode System call Monitor call Monitor call Cache Faster storage Faster storage Multiple Choice Single Answer Question If the process is waiting to be assigned to CPU then it is said to be in :Correct Answer Ready state Your Answer Waiting state True/False Question Whenever the operating system gains control of the computer, it is in monitor mode. Correct Answer True Your Answer True Multiple Choice Multiple Answer Question We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes? Correct Answer User mode , Monitor mode Your Answer User mode , Monitor mode Multiple Choice Multiple Answer Question The Linux system is composed of three main bodies of code, in line with most traditional UNIX implementations. Which are :Correct Answer Kernel , System libraries , System utilities Your Answer Kernel , System libraries , System utilities Multiple Choice Single Answer Question Changing a standard file in UNIX system is known as :Correct Answer I/O redirection Your Answer I/O redirection

Multiple Choice Single Answer Question Each object has a unique :Correct Answer Name Your Answer Name Select The Blank Question A product is considered ________ if it is significantly less expensive to adopt on new hardware or platform. Correct Answer Portable Your Answer Portable True/False Question A state is safe if the system can allocate resources to each process (upto its maximum) in some order and still avoid a deadlock. Correct Answer True Your Answer True Select The Blank Question ________ is the ability to handle error conditions, including the ability of the operating system to protect itself and its users from defective or malicious software. Correct Answer Reliability Your Answer Reliability Multiple Choice Multiple Answer Question There are two types of Message passing, they are :Correct Answer Synchronous , Asynchronous Your Answer Synchronous , Asynchronous Multiple Choice Single Answer Question The wraping up of data and methods in a single unit (class) is known as : Correct Answer Encapsulation Your Answer Encapsulation Multiple Choice Single Answer Question Protection can improve :Correct Answer Reliability Your Answer Reliability Select The Blank Question In queuing diagram, the arrow indicates the flow of ________ in the system. Correct Answer Processes Your Answer Processes Multiple Choice Multiple Answer Question In a uniprocessor system, there is :Correct Answer Single processor , Single running process Your Answer Single processor , Single running process , Unique process Multiple Choice Single Answer Question The concept of OOPS was first introduced in Correct Answer Simula Language Your Answer FORTRAN language Select The Blank Question During execution, ________ register holds the sector for the data segment. Correct Answer DS Your Answer CS Multiple Choice Single Answer Question In JAVA , the derived class is known as Correct Answer Subclass Your Answer Reference class

True/False Question At Physical level, the site or sites containing the computer systems must be physically secured against armed or surreptitious entry by intruders. Correct Answer True Your Answer True True/False Question In UNIX, the user refers to a file by a path name, whereas the file system uses the inode as its definition of a file. Correct Answer True Your Answer True Multiple Choice Single Answer Question In MULTICS TLB address of 'n', the most recently referenced pages are kept, where 'n' can have a value :Correct Answer 16 Your Answer 16 True/False Question Object-oriented programming focuses on the integrated data and functionality as discrete units that have both knowledge (data) and capabilities (functions). Procedural programs, on the other hand, focus on functions and how they act on data. Correct Answer True Your Answer True Select The Blank Question ________ describes segments local to each program, including its code, data, stack etc. Correct Answer LDT Your Answer MMU Multiple Choice Multiple Answer Question Memory management system is divided into :Correct Answer A low level MMU handler , A page fault handler that is part of the kernel , An external pager running in user space Your Answer A low level MMU handler , An external pager running in user space , Page tracker Multiple Choice Single Answer Question Policies for resource use may vary depending on the :Correct Answer Application Your Answer Application Select The Blank Question A variation of the Trojan horse is a program that ________ a login program. Correct Answer Emulates Your Answer Emulates True/False Question An unsafe state may lead to a deadlock. Correct Answer True Your Answer True True/False Question LRU algorithm can not be implemented without special hardware. Correct Answer True Your Answer False Multiple Choice Multiple Answer Question The device number consists of which two parts in UNIX? Correct Answer Major device number , Minor device number Your Answer Major device number , Minor device number Multiple Choice Multiple Answer

Question Computer system consists of :Correct Answer CPU , Multiple device controller Your Answer CPU , Multiple device controller , Multiple memory controller Multiple Choice Single Answer Question The main difference between structure and class is Correct Answer Structure does not support OOPS Class Supports OOPS. Your Answer Structure does not support OOPS Class Supports OOPS. Select The Blank Question Each entry in the access matrix consists of a set of ________ . Correct Answer Access right Your Answer Access right Multiple Choice Multiple Answer Question Linux presents standard interfaces to whom? Correct Answer Programmer , User Your Answer Programmer , User Multiple Choice Single Answer Question The separation of policy and mechanism is important for which purpose? Correct Answer Flexibility Your Answer Flexibility Multiple Choice Single Answer Question When computer is powered up or rebooted, it needs to have an initial program to run. This initial program is known as :Correct Answer Bootstrap program Your Answer Bootstrap program True/False Question A major security problem for operating system is authentication. Correct Answer True Your Answer False Multiple Choice Multiple Answer Question There are components to the module support under Linux, identify them :Correct Answer Module management , Driver registration , Conflict-resolution mechanism Your Answer Module management , Driver registration , Conflict-resolution mechanism Multiple Choice Multiple Answer Question Once the I/O is started , which two courses of action are possible? Correct Answer Synchronous I/O , Asynchronous I/O , Simple I/O Your Answer Synchronous I/O , Asynchronous I/O True/False Question In evolutionary model, the management activities are emphasised with respect to inception, elaboration, construction & transition. Correct Answer True Your Answer True Select The Blank Question If the granularity field is ________ the limit field is the exact segment size, upto 1 MB. Correct Answer 0 Your Answer 8 Multiple Choice Single Answer Question Policies for resource use may be subject to change over :Correct Answer Time Your Answer Time True/False

Question The principle of polymorphism helps to extend and modify the system scope through appropriate messaging mechanism. Correct Answer True Your Answer True Select The Blank Question The processes in the system can execute concurrently, and they must be created and deleted ________ . Correct Answer Dynamically Your Answer Dynamically Select The Blank Question In Linux, the allocator uses a ________ algorithm to keep track of available physical pages. Correct Answer Buddy-heap Your Answer Buddy-heap ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Multiple Choice Multiple Answer Question Various storage systems available possesses which two characteristics? Correct Answer Volatile , Non-volatile Your Answer Volatile , Non-volatile Multiple Choice Multiple Answer Question Most CPUs have two interrupt request lines. Which are they? Correct Answer Maskable , Non maskable Your Answer Maskable , Non maskable Select The Blank Question A ________ is a group of NT server machines that share a common security policy and user databases. Correct Answer Domain Your Answer Domain Select The Blank Question An ________ is a dedicated, special purpose CPU found in mainframes and in other high-end systems. Correct Answer I/O channel Your Answer I/O channel Multiple Choice Single Answer Question The CPU is allocated to the selected process by the :Correct Answer Dispatcher Your Answer Dispatcher Multiple Choice Single Answer Question In JAVA , the derived class is known as Correct Answer Subclass Your Answer Subclass Select The Blank Question The Pentium supports four protection levels with ________ as least privileged level.

Correct Answer 3 Your Answer 3 Select The Blank Question ________ of an object remains unchanged even though its state and properties change. Correct Answer Identity Your Answer Identity True/False Question One way to achieve portability is to write software in standard version of high level language and to develop portable system and application software . Correct Answer True Your Answer True Multiple Choice Single Answer Question Software may trigger an interrupt by executing a special operation called :Correct Answer System call Your Answer System call Multiple Choice Single Answer Question In Object Oriented technology following expression is appropriate Correct Answer object=data+menthods Your Answer object=data+menthods Multiple Choice Multiple Answer Question The two versions of NT are : Correct Answer WindowsNT workstations , WindowsNT server Your Answer WindowsNT workstations , WindowsNT server Match The Following Question Correct Answer Your Answer We can define abstract operation on abstract data Data abstraction Data abstraction Process of sharing properties of the higher level object or class Inheritance Inheritance Ability to inherit attributes and methods from 2 or more objects or classes Multiple inheritance Multiple inheritance Ability to send a message to several objects and to allow receiving object to respond method specified on the object. Ploymorphism Ploymorphism Select The Blank Question A________ is a memory area that stores data while they are transferred between two devices or between a device and an application. Correct Answer Buffer

Your Answer Buffer True/False Question In Public Key Encryption, each user has both a public and a private key. Correct Answer True Your Answer True True/False Question Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention. Correct Answer False Your Answer False Multiple Choice Multiple Answer Question Liner address is divided into fields like :Correct Answer Dir , Page , Offset Your Answer Dir , Page , Offset Multiple Choice Single Answer Question IPC is particularly useful in a :Correct Answer Distributed environment Your Answer Internet environment Multiple Choice Single Answer Question IPC provides a mechanism to allow processes to communicate and to synchronize their actions without sharing the same :Correct Answer Address space Your Answer Semaphore Multiple Choice Multiple Answer Question Supervisor mode is also known as :Correct Answer Privileged mode , Monitor mode , System mode Your Answer System mode , Privileged mode , Monitor mode Select The Blank Question Assuming that the segment is in memory and the offset is in range, the Pentium then adds the ________ bit base field in the descriptor to the offset to form linear address. Correct Answer 32 Your Answer 32 Multiple Choice Multiple Answer Question In Solaris 2, user-level threads may be:Correct Answer Bound , Unbound Your Answer Bound , Unbound Multiple Choice Single Answer Question

The concept of OOPS was first introduced in Correct Answer Simula Language Your Answer Simula Language True/False Question At system boot time, the hardware starts in monitor mode. Correct Answer True Your Answer True Multiple Choice Single Answer Question The main difference between structure and class is Correct Answer Structure does not support OOPS Class Supports OOPS. Your Answer Structure does not support OOPS Class Supports OOPS. Select The Blank Question A ________ controller is built into each disk drive. Correct Answer Disk Your Answer Disk Multiple Choice Single Answer Question If a class fruit has object mango, the relationship is expressed as : Correct Answer Fruit mango Your Answer Fruit mango True/False Question The hardware allows privileged instructions to be executed in only user mode. Correct Answer False Your Answer False Multiple Choice Multiple Answer Question An object type in windows NT is a system defined data type that has two things associated with it, which are they? Correct Answer Set of attributes , Set of methods Your Answer Set of attributes , Set of methods Select The Blank Question The kernel module that controls a device is a ________ . Correct Answer Device driver Your Answer Device driver Multiple Choice Single Answer Question If process P and Q want to communicate, they must send messages to and receive messages from each other: Thus link established between two process is known as :Correct Answer Communication link Your Answer Direct link

Multiple Choice Multiple Answer Question Dispatcher functions involves the following :Correct Answer Switching context , Switching to user mode Your Answer Switching context , Switching to user mode Select The Blank Question In windows NT, the ________ facility is used to pass requests and results between client and server processes within a single machine. Correct Answer Local-procedure-call Your Answer Local-procedure-call True/False Question If some of the pages are shared with other process, the pages in memory and on the disk can only be released when the last process using them has terminated. Correct Answer True Your Answer True Select The Blank Question The Solaris developers reimplemented the ________ using in-kernel thread to eliminate the context switch involved in moving each character between daemons and the kernel. Correct Answer Telnet daemon Your Answer Context-switch daemon Multiple Choice Single Answer Question Modern operating systems are :Correct Answer Interrupt driven Your Answer Interrupt driven Match The Following Question Correct Answer Your Answer Bounded-buffer Fixed size buffer Fixed size buffer Producer Produces process Produces process Consumer Consumes process Consumes process Unbounded-buffer No limit on size of buffer No limit on size of buffer Multiple Choice Multiple Answer Question In Linux, the paging system can be divided into sections, namely:Correct Answer Policy algorithm , Paging mechanism Your Answer Policy algorithm , Paging mechanism

Multiple Choice Single Answer Question A process data section contains:Correct Answer Global variables Your Answer Temporary data True/False Question OOSAD approach is applicable only to stable systems. Correct Answer False Your Answer False True/False Question Segment length may change during execution. Correct Answer True Your Answer True Multiple Choice Multiple Answer Question The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :Correct Answer Explicit , Implicit Your Answer Explicit , Implicit Multiple Choice Single Answer Question Collection of similar datatypes is called as Correct Answer Array Your Answer Array True/False Question At Human level, user must be screened carefully so that the chance of authorizing a user who then gives access to an intruder is reduced. Correct Answer True Your Answer True True/False Question The user process issues a network I/O system call to send the character to the remote machine. Correct Answer True Your Answer False Multiple Choice Multiple Answer Question Most computers have hardware clocks and timers that provide three basic functions, such as :Correct Answer Give the current time , Give the elapsed time , Set a timer to trigger operation at certain time Your Answer Give the current time , Give the elapsed time , Set a timer to trigger operation at certain time Multiple Choice Single Answer Question C++ is basically a procedural language having extension of Correct Answer

Object Oriented technology Your Answer Object Oriented technology +++ LIST OF ATTEMPTED QUESTIONS AND ANSWERS Multiple Choice Multiple Answer Question locate the transmission devices :Correct Answer Network cards , Modems Your Answer Tapes , Network cards , Modems True/False Question The user process issues a network I/O system call to send the character to the remote machine. Correct Answer True Your Answer True Multiple Choice Single Answer Question The process by which objects of one class acquire properties of objects of other class is called Correct Answer Inheritance Your Answer Inheritance True/False Question Windows NT uses a message passing implementation for I/O. Correct Answer True Your Answer True Multiple Choice Multiple Answer Question We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes? Correct Answer User mode , Monitor mode Your Answer User mode , Monitor mode Match The Following Question Correct Answer Your Answer Round-robin Time quantum Time quantum First-come First-served First come job First come job Shortest job Shortest job Shortest job Priority Highest priority job Highest priority job Multiple Choice Single Answer Question The segment is :Correct Answer Logical entity

Your Answer Logical entity Multiple Choice Single Answer Question In UNIX, decisions regarding which process to swap in or out are made by whom? Correct Answer Swapper Your Answer Memory handler Select The Blank Question A ________ is a client-server mechanism that enables an application on one machine to make a procedure call to code on another machine. Correct Answer Remote-procedure-call Your Answer Remote-procedure-call Multiple Choice Single Answer Question When each process that wants to communicate must explicitly name the recipient or sender of the communication, then such communication is called as :Correct Answer Direct communication Your Answer Indirect communication Select The Blank Question In Linux, the allocator uses a ________ algorithm to keep track of available physical pages. Correct Answer Buddy-heap Your Answer Binary-search Multiple Choice Single Answer Question What does the rows of the access matrix represents? Correct Answer Domains Your Answer Domains Multiple Choice Single Answer Question Every change in policy requires a change in the underlying :Correct Answer Mechanism Your Answer System Select The Blank Question A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote. Correct Answer Redirector Your Answer Domain Multiple Choice Multiple Answer Question In Solaris 2, user-level threads may be:Correct Answer Bound , Unbound Your Answer Bound , Unbound Multiple Choice Multiple Answer Question

An audit log records which things about an object ? Correct Answer Time , User , Type of access Your Answer Time , User , Type of access Multiple Choice Multiple Answer Question One-to-one model is supported by following systems :Correct Answer Windows NT , OS/2 Your Answer OS/2 , Windows NT Multiple Choice Multiple Answer Question To protect the system, we must take security measures at two levels, such as :Correct Answer Physical level , Human level Your Answer Human level , Global level Multiple Choice Single Answer Question If the process is waiting for some event to occur then it is said to be in :Correct Answer Waiting state Your Answer Waiting state Multiple Choice Single Answer Question A common representation for a discussion of process scheduling is a :Correct Answer Queuing diagram Your Answer Process state diagram True/False Question At Physical level, the site or sites containing the computer systems must be physically secured against armed or surreptitious entry by intruders. Correct Answer True Your Answer True Select The Blank Question When you express user-system interaction, the scenario in the model is called ________ Correct Answer Case model Your Answer Case model True/False Question Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention. Correct Answer False Your Answer True True/False Question A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX . Correct Answer False Your Answer False

Multiple Choice Single Answer Question Polymorphism means ability to take Correct Answer More than one form Your Answer More than one form True/False Question Aging algorithm is based on LRU. Correct Answer True Your Answer True Select The Blank Question The virtual memory portion of the NT executive is the ________. Correct Answer Virtual memory manager Your Answer Virtual memory manager Multiple Choice Multiple Answer Question There are two types of Message passing, they are :Correct Answer Synchronous , Asynchronous Your Answer Synchronous , Asynchronous Select The Blank Question Web servers use the ________ protocol to communicate with web browsers. Correct Answer http Your Answer http Multiple Choice Multiple Answer Question The security of a system can be improved by two management techniques, such as :Correct Answer Threat monitoring , Audit Log Your Answer Audit Log , Threat finding Select The Blank Question The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________. Correct Answer Ring Your Answer Ring True/False Question We say that a system is secure if its resources are used and accessed as intended under all circumstances. Correct Answer True Your Answer True Select The Blank Question The ________ controller is the controller at the computer end of the bus. Correct Answer Host

Your Answer Cpu Multiple Choice Multiple Answer Question In Linux, the paging system can be divided into sections, namely:Correct Answer Policy algorithm , Paging mechanism Your Answer Policy algorithm , Paging mechanism True/False Question Keyboard is a sharable device. Correct Answer True Your Answer False True/False Question Transfer of data from disk to memory is usually controlled by the operating system. Correct Answer True Your Answer True True/False Question Prototyping not only helps to build a quality design but also enables the designer to build the system decremantally. Correct Answer False Your Answer True Select The Blank Question The UNIX system uses ________ to avoid the necessity of keeping its password list secret. Correct Answer Encryption Your Answer Encryption Match The Following Question Correct Answer Your Answer Read-write devices Disks Disks Dedicated devices Tape CD-ROM Read-only devices CD-ROM Tape Write-only devices Graphics controller Keyboard Multiple Choice Single Answer Question A procedure call, request to execute a method is termed as Correct Answer Message Your Answer Message Select The Blank Question

Context switch times are highly dependent on ________ support. Correct Answer Hardware Your Answer Hardware Multiple Choice Multiple Answer Question Two main jobs of a computer are :Correct Answer I/O , Processing Your Answer I/O , Processing Multiple Choice Single Answer Question The 4.3BSD operating system is the version of :Correct Answer UNIX Your Answer UNIX Multiple Choice Single Answer Question The number of processes that are completed per time unit is called as:Correct Answer Throughput of system Your Answer Throughput of system Multiple Choice Multiple Answer Question Once the I/O is started , which two courses of action are possible? Correct Answer Synchronous I/O , Asynchronous I/O , Simple I/O Your Answer Synchronous I/O , Asynchronous I/O Multiple Choice Multiple Answer Question Security violations of the system can be categorized as :Correct Answer Malicious , Accidental Your Answer Malicious , Accidental Select The Blank Question A process migrates between the various ________ throughout its lifetime. Correct Answer Scheduling queues Your Answer Scheduling queues +++ LIST OF ATTEMPTED QUESTIONS AND ANSWERS True/False Question Firewall monitors and logs all connections. Correct Answer True Your Answer True Multiple Choice Single Answer Question Which of the following Operating System has no memory protection ? Correct Answer Windows 3.1

Your Answer Windows 3.1 Multiple Choice Single Answer Question The main difference between structure and class is Correct Answer Structure does not support OOPS Class Supports OOPS. Your Answer Structure does not support OOPS Class Supports OOPS. Multiple Choice Single Answer Question DMA stands for :Correct Answer Direct Memory Access Your Answer Direct Memory Access Multiple Choice Single Answer Question A major problem with the Priority scheduling algorithm is :Correct Answer Starvation Your Answer Starvation Multiple Choice Single Answer Question How big is a class object? Correct Answer Is as big as sum of the sizes of its member variables Your Answer Is as big as sum of the sizes of its member variables Multiple Choice Single Answer Question The First version of UNIX was developed in 1969 by Ken Thompson of the Research Group at :Correct Answer Bell Laboratories Your Answer Bell Laboratories Multiple Choice Single Answer Question When computer is powered up or rebooted, it needs to have an initial program to run. This initial program is known as :Correct Answer Bootstrap program Your Answer Bootstrap program True/False Question Processes represents the executions of single programs whereas threads represent separate, concurrent execution contexts within a single process running a single program. Correct Answer True Your Answer True Multiple Choice Single Answer Question If Dog derives from Mammal, and Mammal derives from Animal, then Correct Answer Dog inherits Animals functions and data Your Answer Dog inherits Animals functions and data Multiple Choice Single Answer Question

The wraping up of data and methods in a single unit (class) is known as : Correct Answer Encapsulation Your Answer Encapsulation True/False Question LRU algorithm can not be implemented without special hardware. Correct Answer True Your Answer False Select The Blank Question The Solaris developers reimplemented the ________ using in-kernel thread to eliminate the context switch involved in moving each character between daemons and the kernel. Correct Answer Telnet daemon Your Answer Telnet daemon Multiple Choice Single Answer Question All user processes are descendents of one original process, Which is that process? Correct Answer Init process Your Answer Init process Select The Blank Question Terminals and line printers are ________ . Correct Answer Character devices Your Answer Character devices Multiple Choice Multiple Answer Question Many-to-may model is supported by following operating systems :Correct Answer Solaris , IRIX , Digital UNIX Your Answer Solaris , IRIX , Digital UNIX Multiple Choice Multiple Answer Question find out the services provided by kernel related to I/O : Correct Answer I/O Scheduling , Buffering , Spooling Your Answer I/O Scheduling , Buffering , Spooling Multiple Choice Single Answer Question The long-term scheduler controls the :Correct Answer Degree of multiprogramming Your Answer Degree of multiprogramming Select The Blank Question The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________. Correct Answer Ring

Your Answer Ring Multiple Choice Multiple Answer Question In Linux, the main objects defined by the virtual file system are :Correct Answer Inode-object , File-object , File-system object Your Answer Inode-object , File-object , File-system object Multiple Choice Single Answer Question Collection of similar datatypes is called as Correct Answer Array Your Answer Array Multiple Choice Multiple Answer Question We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes? Correct Answer User mode , Monitor mode Your Answer User mode , Monitor mode Match The Following Question Correct Answer Your Answer Class Shape Triangle, rectangle, circle, ellipse Triangle, rectangle, circle, ellipse Class Vehicle Scooter, car, truck, tractor Scooter, car, truck, tractor Class Animal Cat, dog, cow, tiger Cat, dog, cow, tiger Class Color Red, yellow, blue, green Red, yellow, blue, green Select The Blank Question The virtual memory portion of the NT executive is the ________. Correct Answer Virtual memory manager Your Answer Virtual memory manager True/False Question An asynchronous call returns immediately, without waiting for the I/O to complete. Correct Answer True Your Answer True True/False Question Modem is a random-access device. Correct Answer False Your Answer False

Multiple Choice Multiple Answer Question A mailbox can be owned by :Correct Answer Process , Operating system Your Answer Process , Operating system Multiple Choice Multiple Answer Question The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :Correct Answer Explicit , Implicit Your Answer Explicit , Implicit Select The Blank Question In windows NT, the ________ facility is used to pass requests and results between client and server processes within a single machine. Correct Answer Local-procedure-call Your Answer Remote-procedure-call True/False Question A major security problem for operating system is authentication. Correct Answer True Your Answer True True/False Question In a blocking system call, the application is moved from the OSs run queue to a wait queue. Correct Answer True Your Answer True True/False Question Device speeds range from a few bytes per second to a few gigabytes per second. Correct Answer True Your Answer True Multiple Choice Multiple Answer Question Various storage systems available possesses which two characteristics? Correct Answer Volatile , Non-volatile Your Answer Volatile , Non-volatile Match The Following Question Correct Answer Your Answer We can define abstract operation on abstract data Data abstraction Data abstraction Process of sharing properties of the higher level object or class Inheritance Inheritance Ability to inherit attributes and methods from 2 or more objects or classes

Multiple inheritance Multiple inheritance Ability to send a message to several objects and to allow receiving object to respond method specified on the object. Ploymorphism Ploymorphism Multiple Choice Single Answer Question As process enter the system, they are put into :Correct Answer Job queue Your Answer Job queue Multiple Choice Multiple Answer Question The role of the operating system in computer I/O is to :Correct Answer Manage I/O operation and devices , Control I/O operation and devices Your Answer Manage I/O operation and devices , Control I/O operation and devices Select The Blank Question The ________ is a layer of software that hides hardware differences from upper levels of the operating system. Correct Answer Hardware abstraction layer Your Answer Hardware abstraction layer Select The Blank Question A ________ is a computer or router that sits between the trusted and untrusted systems. Correct Answer Firewall Your Answer Firewall Multiple Choice Multiple Answer Question The Moriss Internet Worm was made up of which of the two programs? Correct Answer Grappling hook program , Main program Your Answer Grappling hook program , Main program Multiple Choice Multiple Answer Question In UNIX, a device is distinguished by two things, which are :Correct Answer Device-class , Device number Your Answer Device-class , Device number Multiple Choice Single Answer Question In general , the access matrix will be :Correct Answer Sparse Your Answer Sparse True/False Question Applications normally access block devices through a file system interface. Correct Answer True Your Answer True

Multiple Choice Multiple Answer Question User thread libraries include :Correct Answer POSIX Pthreads , Mach C-threads , Solaris threads Your Answer POSIX Pthreads , Mach C-threads , Solaris threads Select The Blank Question The positioning time sometimes called the ________. Correct Answer Random-access time Your Answer Random-access time Multiple Choice Single Answer Question The concept of OOPS was first introduced in Correct Answer Simula Language Your Answer Simula Language Select The Blank Question ________ passwords prevent improper authentication due to password exposure. Correct Answer One-time Your Answer One-time Multiple Choice Single Answer Question The linking of procedure call to the code to be executed in response to that call is referred as Correct Answer Binding Your Answer Binding ++++ LIST OF ATTEMPTED QUESTIONS AND ANSWERS Multiple Choice Multiple Answer Question Kernel threads are generally :Correct Answer Slower to create , Difficult to manage Your Answer Slower to create , Difficult to manage Select The Blank Question If the user-supplied password matches the password stored in the system, the system assumes that the user is ________. Correct Answer Legitimate Your Answer Legitimate Multiple Choice Single Answer Question In general , the access matrix will be :Correct Answer Sparse Your Answer Sparse True/False Question Encryption is one common method of protecting information that is transmitted over unreliable links.

Correct Answer True Your Answer False Select The Blank Question A ________ is a full duplex connection between a device driver and a user-level process. Correct Answer Stream Your Answer Stream Multiple Choice Single Answer Question In how many number of classes does the NRU algorithm divides pages, depending on the state of R and M? Correct Answer 4 Your Answer 8 Select The Blank Question The Pentium page size is fixed at ________ KB. Correct Answer 4 Your Answer 4 True/False Question Volatile storage loses its contents when the power to the device is removed. Correct Answer True Your Answer True Multiple Choice Multiple Answer Question The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :Correct Answer Explicit , Implicit Your Answer Explicit , Implicit Select The Blank Question In queuing diagram, the arrow indicates the flow of ________ in the system. Correct Answer Processes Your Answer Processes Multiple Choice Multiple Answer Question What are the forms of malicious access? Correct Answer Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data Your Answer Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data Select The Blank Question A bit called the ________ , is added to the hardware of the computer to indicate the current mode. Correct Answer Mode bit Your Answer Mode bit

Multiple Choice Multiple Answer Question In Windows NT , kernel uses which two sets of objects? Correct Answer Dispatcher objects , Control objects Your Answer Dispatcher objects , Complex objects Multiple Choice Single Answer Question The smallest addressable portion of a disk is :Correct Answer Sector Your Answer Sector True/False Question In FIFO algorithm the page removed from memory is the one which most recently used. Correct Answer False Your Answer False Select The Blank Question A process is ________, if it cannot affect or be affected by the other processes executing in the system. Correct Answer Independent Your Answer Independent Multiple Choice Multiple Answer Question Linux presents standard interfaces to whom? Correct Answer Programmer , User Your Answer Programmer , User , System administrator Select The Blank Question The kernel module that controls a device is a ________ . Correct Answer Device driver Your Answer Device daemon True/False Question Whenever a trap or interrupt occurs, the hardware switches from user mode to monitor mode. Correct Answer True Your Answer True Select The Blank Question A ________ is a computer or router that sits between the trusted and untrusted systems. Correct Answer Firewall Your Answer Firewall Multiple Choice Multiple Answer Question Find out the basic I/O hardware elements from the following :Correct Answer Ports , Buses , Device controllers

Your Answer Ports , Buses , Device controllers True/False Question Object-oriented programming focuses on the integrated data and functionality as discrete units that have both knowledge (data) and capabilities (functions). Procedural programs, on the other hand, focus on functions and how they act on data. Correct Answer True Your Answer True Match The Following Question Correct Answer Your Answer User mode Mode bit 1 Mode bit 1 Serial port Modem Monitor mode Parallel port Printer Printer Privileged instructions Monitor mode Mode bit 0 True/False Question In segmentation the total address space can exceed the size of physical memory. Correct Answer True Your Answer False Multiple Choice Single Answer Question Because of the concept of independent objects responding to messages, object orientation is a natural way to implement Correct Answer Event driven programming Your Answer Message deiven programming Multiple Choice Single Answer Question In UNIX, everything below the system-call interface and above the physical hardware is the :Correct Answer Kernel Your Answer I/O system Multiple Choice Multiple Answer Question Different multithreading models available are :Correct Answer Many-to-one model , One-to-one model , Many-to-many model Your Answer Many-to-one model , One-to-one model , Many-to-many model Multiple Choice Multiple Answer Question An object type in windows NT is a system defined data type that has two things associated with it, which are they? Correct Answer Set of attributes , Set of methods Your Answer Object-type , Object-processing

Multiple Choice Multiple Answer Question When memory reference occurs in MULTICS the things which takes place are :Correct Answer Segment number is used to find segment descriptor , Check is made to see if segments page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address Your Answer Segment number is used to find segment descriptor , Check is made to see if segments page table is in memory , Page table entry for requested virtual page is examined Multiple Choice Single Answer Question The interval from the time of submission of a process to the time of completion is :Correct Answer Turnaround time Your Answer Turnaround time True/False Question Context switch times are highly dependent on hardware support. Correct Answer True Your Answer True True/False Question Procedure and data can be distinguished and separately protected in segmentation Correct Answer True Your Answer True Multiple Choice Multiple Answer Question Dispatcher functions involves the following :Correct Answer Switching context , Switching to user mode Your Answer Switching context , Switching to user mode Multiple Choice Single Answer Question The First version of UNIX was developed in 1969 by Ken Thompson of the Research Group at :Correct Answer Bell Laboratories Your Answer Bell Laboratories Multiple Choice Single Answer Question In Object Oriented technology following expression is appropriate Correct Answer object=data+menthods Your Answer object=data+menthods Multiple Choice Single Answer Question A procedure body implementing an operation is termed as Correct Answer Method Your Answer Method Select The Blank Question During execution, ________ register holds the sector for the code segment. Correct Answer

CS Your Answer PS True/False Question In some operating system, spooling is managed by a system daemon process. Correct Answer True Your Answer False Select The Blank Question Each column in the access matrix can be implemented as an ________ for one object. Correct Answer Access list Your Answer Capability list Multiple Choice Single Answer Question Policies for resource use may vary depending on the :Correct Answer Application Your Answer System Multiple Choice Multiple Answer Question A mailbox can be owned by :Correct Answer Process , Operating system Your Answer User , Process , Program Multiple Choice Single Answer Question The ready queue is generally stored as a :Correct Answer Linked list Your Answer Queue Select The Blank Question A ________ is region of fast memory that hold copies of data . Correct Answer Cache Your Answer Cache Multiple Choice Multiple Answer Question What are the components to memory management under Linux? Correct Answer Physical memory manager , Virtual memory manager Your Answer Physical memory manager , Virtual memory manager Match The Following Question Correct Answer Your Answer Bounded-buffer Fixed size buffer Fixed size buffer Producer Produces process Produces process

Consumer Consumes process Consumes process Unbounded-buffer No limit on size of buffer No limit on size of buffer True/False Question The inode contains 15 pointers to the disk blocks containing the data contents of the file. Correct Answer True Your Answer True Multiple Choice Single Answer Question When computer is powered up or rebooted, it needs to have an initial program to run. This initial program is known as :Correct Answer Bootstrap program Your Answer Bootstrap program +++ LIST OF ATTEMPTED QUESTIONS AND ANSWERS Select The Blank Question static binding allows to hold certain properties fixed and rigid, whereas ________ binding allows object to behave as per conditions emerge. Correct Answer Dynamic Your Answer Dynamic Multiple Choice Single Answer Question DVMA stands for :Correct Answer Direct Virtual Memory Access Your Answer Direct Virtual Memory Access True/False Question Since caches have limited size, cache management is an important design problem. Correct Answer True Your Answer True Multiple Choice Single Answer Question C++ is basically a procedural language having extension of Correct Answer Object Oriented technology Your Answer Object Oriented technology Multiple Choice Single Answer Question The system call checks the arguments given by the application, builds a data structure to convey the arguments to the kernel and then executes a special instruction called as :Correct Answer Software interrupt Your Answer Software interrupt Multiple Choice Single Answer Question

A system consists of collection of :Correct Answer Processes Your Answer Processes Select The Blank Question A________ is a memory area that stores data while they are transferred between two devices or between a device and an application. Correct Answer Buffer Your Answer Buffer Multiple Choice Multiple Answer Question Find out the human-interface devices :Correct Answer Screen , Keyboard , Mouse Your Answer Screen , Keyboard , Mouse Multiple Choice Single Answer Question A procedure body implementing an operation is termed as Correct Answer Method Your Answer Method Select The Blank Question The designer of a program or system might leave a hole, or ________ , in the software that only he is capable of using. Correct Answer Trap door Your Answer Trap door True/False Question The principle of polymorphism helps to extend and modify the system scope through appropriate messaging mechanism. Correct Answer True Your Answer True Multiple Choice Multiple Answer Question The Linux system is composed of three main bodies of code, in line with most traditional UNIX implementations. Which are :Correct Answer Kernel , System libraries , System utilities Your Answer Kernel , System libraries , System utilities Select The Blank Question Web servers use the ________ protocol to communicate with web browsers. Correct Answer http Your Answer http Multiple Choice Single Answer Question The pure Object Oriented language is Correct Answer Java

Your Answer Java Multiple Choice Multiple Answer Question User level threads are generally :Correct Answer Fast to create , Easy to manage Your Answer Fast to create , Easy to manage True/False Question Switching the cpu to another process requires saving the state of the old process and loading the saved state for the new process. Correct Answer True Your Answer True Multiple Choice Single Answer Question The process by which objects of one class acquire properties of objects of other class is called Correct Answer Inheritance Your Answer Inheritance Multiple Choice Single Answer Question In Object Oriented technology following expression is appropriate Correct Answer object=data+menthods Your Answer object=data+menthods True/False Question A copy of inode is kept in main memory while a file is open. Correct Answer True Your Answer True Multiple Choice Multiple Answer Question The advantage of dynamic loading is Correct Answer Unused routine is never loaded , Useful when large amount of code are needed to handle infrequently occurring cases, such as error routines , It does not require special support from the operating system Your Answer It does not require special support from the operating system , Unused routine is never loaded , Useful when large amount of code are needed to handle infrequently occurring cases, such as error routines Select The Blank Question OOSAD begins with identification of actors, what activities they perform and building ________ model for the function. Correct Answer Use-case Your Answer Use-case Multiple Choice Single Answer Question If a class fruit has object mango, the relationship is expressed as : Correct Answer Fruit mango Your Answer Fruit mango

Multiple Choice Single Answer Question The class bird should have object Correct Answer Egale Your Answer Egale Select The Blank Question The ________ controller is the controller at the computer end of the bus. Correct Answer Host Your Answer Host Multiple Choice Single Answer Question The insulation of data from direct access by the program is known as : Correct Answer Data hiding Your Answer Data hiding Multiple Choice Multiple Answer Question Liner address is divided into fields like :Correct Answer Dir , Page , Offset Your Answer Dir , Page , Offset Multiple Choice Single Answer Question Every change in policy requires a change in the underlying :Correct Answer Mechanism Your Answer Mechanism Multiple Choice Single Answer Question UNIX operating system is written mostly in :Correct Answer C language Your Answer C language Multiple Choice Single Answer Question In UNIX, a file is represented by an :Correct Answer Inode Your Answer Inode Select The Blank Question If paging is enabled, the liner address is interpreted as virtual address and mapped to the physical address using ________ table. Correct Answer Page Your Answer Page Multiple Choice Multiple Answer Question What are the forms of malicious access? Correct Answer Unauthorized destruction of data , Unauthorized reading of data , Unauthorized modification of data

Your Answer Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data Multiple Choice Multiple Answer Question What are the components to memory management under Linux? Correct Answer Physical memory manager , Virtual memory manager Your Answer Physical memory manager , Virtual memory manager Multiple Choice Single Answer Question IPC is particularly useful in a :Correct Answer Distributed environment Your Answer Distributed environment Select The Blank Question Context switch times are highly dependent on ________ support. Correct Answer Hardware Your Answer Hardware Multiple Choice Multiple Answer Question kernel threads are supported by following operating systems :Correct Answer Windows NT , Solaris , Digital UNIX Your Answer Windows NT , Solaris , Digital UNIX Select The Blank Question A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote. Correct Answer Redirector Your Answer Redirector Multiple Choice Multiple Answer Question In a uniprocessor system, there is :Correct Answer Single processor , Single running process Your Answer Single processor , Single running process True/False Question The basic difference between SSAD life cycle models and OOSAD life cycle models is that one is evolutionary & iterative while the other is sequential in stages of analysis, design, coding, unit test, integrated test and system test. Correct Answer True Your Answer True Match The Following Question Correct Answer Your Answer Ready state Process waiting for cpu Process waiting for cpu New state Process created Process created

Running state Executing process Executing process Waiting state Waiting process Waiting process Match The Following Question Correct Answer Your Answer Parent process Child process Child process Foreground processes Interactive processes Interactive processes Background processes Batch processes Batch processes Light-Weight processes Thread Thread Multiple Choice Single Answer Question In how many number of classes does the NRU algorithm divides pages, depending on the state of R and M? Correct Answer 4 Your Answer 4 True/False Question When application issues a blocking I/O system call, the request is placed on the queue for that device. Correct Answer True Your Answer True Select The Blank Question During execution, ________ register holds the sector for the data segment. Correct Answer DS Your Answer DS True/False Question Bankers algorithm is a deadlock-avoidance algorithm. Correct Answer True Your Answer True Multiple Choice Single Answer Question Model of protection can be viewed abstractly as a matrix which is known as :Correct Answer Access matrix Your Answer Access matrix Multiple Choice Multiple Answer Question Kernel threads are generally :Correct Answer Slower to create , Difficult to manage

Your Answer Slower to create , Difficult to manage Multiple Choice Multiple Answer Question One-to-one model is supported by following systems :Correct Answer Windows NT , OS/2 Your Answer Windows NT , OS/2 ++++ LIST OF ATTEMPTED QUESTIONS AND ANSWERS Multiple Choice Multiple Answer Question locate the transmission devices :Correct Answer Network cards , Modems Your Answer Tapes , Network cards , Modems True/False Question The user process issues a network I/O system call to send the character to the remote machine. Correct Answer True Your Answer True Multiple Choice Single Answer Question The process by which objects of one class acquire properties of objects of other class is called Correct Answer Inheritance Your Answer Inheritance True/False Question Windows NT uses a message passing implementation for I/O. Correct Answer True Your Answer True Multiple Choice Multiple Answer Question We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes? Correct Answer User mode , Monitor mode Your Answer User mode , Monitor mode Match The Following Question Correct Answer Your Answer Round-robin Time quantum Time quantum First-come First-served First come job First come job Shortest job Shortest job Shortest job Priority

Highest priority job Highest priority job Multiple Choice Single Answer Question The segment is :Correct Answer Logical entity Your Answer Logical entity Multiple Choice Single Answer Question In UNIX, decisions regarding which process to swap in or out are made by whom? Correct Answer Swapper Your Answer Memory handler Select The Blank Question A ________ is a client-server mechanism that enables an application on one machine to make a procedure call to code on another machine. Correct Answer Remote-procedure-call Your Answer Remote-procedure-call Multiple Choice Single Answer Question When each process that wants to communicate must explicitly name the recipient or sender of the communication, then such communication is called as :Correct Answer Direct communication Your Answer Indirect communication Select The Blank Question In Linux, the allocator uses a ________ algorithm to keep track of available physical pages. Correct Answer Buddy-heap Your Answer Binary-search Multiple Choice Single Answer Question What does the rows of the access matrix represents? Correct Answer Domains Your Answer Domains Multiple Choice Single Answer Question Every change in policy requires a change in the underlying :Correct Answer Mechanism Your Answer System Select The Blank Question A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote. Correct Answer Redirector Your Answer Domain Multiple Choice Multiple Answer Question

In Solaris 2, user-level threads may be:Correct Answer Bound , Unbound Your Answer Bound , Unbound Multiple Choice Multiple Answer Question An audit log records which things about an object ? Correct Answer Time , User , Type of access Your Answer Time , User , Type of access Multiple Choice Multiple Answer Question One-to-one model is supported by following systems :Correct Answer Windows NT , OS/2 Your Answer OS/2 , Windows NT Multiple Choice Multiple Answer Question To protect the system, we must take security measures at two levels, such as :Correct Answer Physical level , Human level Your Answer Human level , Global level Multiple Choice Single Answer Question If the process is waiting for some event to occur then it is said to be in :Correct Answer Waiting state Your Answer Waiting state Multiple Choice Single Answer Question A common representation for a discussion of process scheduling is a :Correct Answer Queuing diagram Your Answer Process state diagram True/False Question At Physical level, the site or sites containing the computer systems must be physically secured against armed or surreptitious entry by intruders. Correct Answer True Your Answer True Select The Blank Question When you express user-system interaction, the scenario in the model is called ________ Correct Answer Case model Your Answer Case model True/False Question Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention. Correct Answer False Your Answer True

True/False Question A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX . Correct Answer False Your Answer False Multiple Choice Single Answer Question Polymorphism means ability to take Correct Answer More than one form Your Answer More than one form True/False Question Aging algorithm is based on LRU. Correct Answer True Your Answer True Select The Blank Question The virtual memory portion of the NT executive is the ________. Correct Answer Virtual memory manager Your Answer Virtual memory manager Multiple Choice Multiple Answer Question There are two types of Message passing, they are :Correct Answer Synchronous , Asynchronous Your Answer Synchronous , Asynchronous Select The Blank Question Web servers use the ________ protocol to communicate with web browsers. Correct Answer http Your Answer http Multiple Choice Multiple Answer Question The security of a system can be improved by two management techniques, such as :Correct Answer Threat monitoring , Audit Log Your Answer Audit Log , Threat finding Select The Blank Question The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________. Correct Answer Ring Your Answer Ring True/False Question We say that a system is secure if its resources are used and accessed as intended under all circumstances. Correct Answer True

Your Answer True Select The Blank Question The ________ controller is the controller at the computer end of the bus. Correct Answer Host Your Answer Cpu Multiple Choice Multiple Answer Question In Linux, the paging system can be divided into sections, namely:Correct Answer Policy algorithm , Paging mechanism Your Answer Policy algorithm , Paging mechanism True/False Question Keyboard is a sharable device. Correct Answer True Your Answer False True/False Question Transfer of data from disk to memory is usually controlled by the operating system. Correct Answer True Your Answer True True/False Question Prototyping not only helps to build a quality design but also enables the designer to build the system decremantally. Correct Answer False Your Answer True Select The Blank Question The UNIX system uses ________ to avoid the necessity of keeping its password list secret. Correct Answer Encryption Your Answer Encryption Match The Following Question Correct Answer Your Answer Read-write devices Disks Disks Dedicated devices Tape CD-ROM Read-only devices CD-ROM Tape Write-only devices Graphics controller Keyboard Multiple Choice Single Answer Question

A procedure call, request to execute a method is termed as Correct Answer Message Your Answer Message Select The Blank Question Context switch times are highly dependent on ________ support. Correct Answer Hardware Your Answer Hardware Multiple Choice Multiple Answer Question Two main jobs of a computer are :Correct Answer I/O , Processing Your Answer I/O , Processing Multiple Choice Single Answer Question The 4.3BSD operating system is the version of :Correct Answer UNIX Your Answer UNIX Multiple Choice Single Answer Question The number of processes that are completed per time unit is called as:Correct Answer Throughput of system Your Answer Throughput of system Multiple Choice Multiple Answer Question Once the I/O is started , which two courses of action are possible? Correct Answer Synchronous I/O , Asynchronous I/O , Simple I/O Your Answer Synchronous I/O , Asynchronous I/O Multiple Choice Multiple Answer Question Security violations of the system can be categorized as :Correct Answer Malicious , Accidental Your Answer Malicious , Accidental Select The Blank Question A process migrates between the various ________ throughout its lifetime. Correct Answer Scheduling queues Your Answer Scheduling queues +++ LIST OF ATTEMPTED QUESTIONS AND ANSWERS Multiple Choice Multiple Answer Question A mailbox can be owned by :Correct Answer Operating system , Process

Your Answer User , Process Multiple Choice Single Answer Question Software may trigger an interrupt by executing a special operation called :Correct Answer System call Your Answer Interrupt call Match The Following Question Correct Answer Your Answer User mode Mode bit 1 Monitor mode Serial port Modem Modem Parallel port Printer Printer Privileged instructions Monitor mode UPS Multiple Choice Multiple Answer Question The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :Correct Answer Explicit , Implicit Your Answer Implicit , Indirect Multiple Choice Multiple Answer Question What are the ways in which a request for kernel-mode execution can occur in Linux? Correct Answer Explicitly , Implicitly Your Answer Implicitly , Function call Multiple Choice Multiple Answer Question Supervisor mode is also known as :Correct Answer System mode , Privileged mode , Monitor mode Your Answer Privileged mode , Special mode Multiple Choice Multiple Answer Question The role of the operating system in computer I/O is to :Correct Answer Manage I/O operation and devices , Control I/O operation and devices Your Answer Manage I/O operation and devices , I/O processing True/False Question In UNIX, first two names in every directory are . and .. Correct Answer True Your Answer False

Multiple Choice Multiple Answer Question Various storage systems available possesses which two characteristics? Correct Answer Volatile , Non-volatile Your Answer Primary storage , Secondary storage Multiple Choice Single Answer Question A program in execution is:Correct Answer Process Your Answer Operation Select The Blank Question In some operating system, spooling is handled by an ________ . Correct Answer In-kernel thread Your Answer In-kernel thread Select The Blank Question The hardware to measure elapsed time to trigger operations is called a ________. Correct Answer Programmable interval timer Your Answer Elapsed timer True/False Question NFU algorithm requires a software counter associated with each page initially zero. Correct Answer True Your Answer True True/False Question Volatile storage loses its contents when the power to the device is removed. Correct Answer True Your Answer False Match The Following Question Correct Answer Your Answer MFT Multi programming with fixed task Multi programming with fixed task RAM Volatile memory Volatile memory ROM Read only memory Read only memory BIOS Basic input output system Basic input output system Select The Blank Question ________ includes disks and tapes. Correct Answer

Block devices Your Answer Socket interfaces Select The Blank Question The process could create a new ________ and wait for its termination. Correct Answer Sub process Your Answer Child True/False Question The cipher text can be stored in a readable file or transmitted over unprotected channels. Correct Answer True Your Answer True Select The Blank Question The virtual memory portion of the NT executive is the ________. Correct Answer Virtual memory manager Your Answer Page-memory manager Multiple Choice Single Answer Question The main difference between structure and class is Correct Answer Structure does not support OOPS Class Supports OOPS. Your Answer Structure is used in OOPS. Classes are used in procedural programs. Multiple Choice Multiple Answer Question Find out different types of I/O buses :Correct Answer EIDE , SCSI Your Answer EIDE , SCSI Select The Blank Question ________ passwords prevent improper authentication due to password exposure. Correct Answer One-time Your Answer Encrypted Select The Blank Question Like worms, ________ are designed to spread into other programs and can wreak havoc in a system. Correct Answer Viruses Your Answer Trojan horses Select The Blank Question A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote. Correct Answer Redirector Your Answer Director Select The Blank Question One interface that is available in many operating systems, including UNIX and WindowsNT, is the network ________

interface. Correct Answer Socket Your Answer Device True/False Question In Windows NT, kernel can be paged out of memory and its executions can be preempted. Correct Answer False Your Answer True Multiple Choice Single Answer Question The insulation of data from direct access by the program is known as : Correct Answer Data hiding Your Answer Abstraction Multiple Choice Single Answer Question The concept of OOPS was first introduced in Correct Answer Simula Language Your Answer Simula Language Multiple Choice Multiple Answer Question locate the transmission devices :Correct Answer Network cards , Modems Your Answer Network cards , Modems Multiple Choice Single Answer Question How big is a class object? Correct Answer Is as big as sum of the sizes of its member variables Your Answer Is as big as sum of the sizes of its member variables Multiple Choice Single Answer Question The system call checks the arguments given by the application, builds a data structure to convey the arguments to the kernel and then executes a special instruction called as :Correct Answer Software interrupt Your Answer Special system call Multiple Choice Multiple Answer Question Security violations of the system can be categorized as :Correct Answer Malicious , Accidental Your Answer Unauthorized , Authorized Select The Blank Question Most computers have ________ clocks and timers. Correct Answer Hardware Your Answer In-built

Multiple Choice Single Answer Question A domain is a collection of :Correct Answer Access rights Your Answer Objects True/False Question In paging the total address space can exceed the size of physical memory Correct Answer True Your Answer True Multiple Choice Single Answer Question Objects may communicate with each other through Correct Answer Methods Your Answer Methods Multiple Choice Single Answer Question A system consists of collection of :Correct Answer Processes Your Answer Processes Multiple Choice Multiple Answer Question An audit log records which things about an object ? Correct Answer Time , User , Type of access Your Answer Time , Type of access Multiple Choice Single Answer Question It has been said that Pascal and C programs are collections of procedures and C++ programs are collections of Correct Answer Classes Your Answer Classes Select The Blank Question OOSAD begins with identification of actors, what activities they perform and building ________ model for the function. Correct Answer Use-case Your Answer Use-case Multiple Choice Single Answer Question The smallest addressable portion of a disk is :Correct Answer Sector Your Answer Sector True/False Question OOSAD approach is applicable only to stable systems. Correct Answer False

Your Answer True True/False Question To perform a disk I/O operation, the computer places a command into the host controller, typically using memorymapped I/O ports. Correct Answer True Your Answer True Multiple Choice Single Answer Question The number of processes that are completed per time unit is called as:Correct Answer Throughput of system Your Answer Efficiency of system Multiple Choice Single Answer Question In MULTICS TLB address of n, the most recently referenced pages are kept, where n can have a value :Correct Answer 16 Your Answer 8 True/False Question The job of I/O channel is to offload I/O work from the main CPU. Correct Answer True Your Answer False +++ LIST OF ATTEMPTED QUESTIONS AND ANSWERS Multiple Choice Single Answer Question Each object is associated with the data of type class with which they are created. A class is thus a collection of objects of Correct Answer Similar type Your Answer Similar type Multiple Choice Single Answer Question C++ is also named as Correct Answer C with classes Your Answer Visual C++ Select The Blank Question The ________ of a process is represented in the PCB of a process. Correct Answer Context Your Answer Control Multiple Choice Multiple Answer Question In windows NT, naming of objects is of two types :Correct Answer Permanent name , Temporary name Your Answer Permanent name , Object-primary name

Match The Following Question Correct Answer Your Answer Class Shape Triangle, rectangle, circle, ellipse Triangle, rectangle, circle, ellipse Class Vehicle Scooter, car, truck, tractor Scooter, car, truck, tractor Class Animal Cat, dog, cow, tiger Cat, dog, cow, tiger Class Color Red, yellow, blue, green Red, yellow, blue, green Multiple Choice Multiple Answer Question Computer system consists of :Correct Answer CPU , Multiple device controller Your Answer CPU , Multiple device controller Multiple Choice Single Answer Question In JAVA , the derived class is known as Correct Answer Subclass Your Answer Subclass Select The Blank Question To make as interval call, the CALL instruction must contain ________. Correct Answer Selector Your Answer Address True/False Question In Lock-key mechanism, users are allowed to examine or modify the list of keys or locks directly. Correct Answer False Your Answer True Multiple Choice Single Answer Question A major problem with the Priority scheduling algorithm is :Correct Answer Starvation Your Answer CPU time Select The Blank Question ________ of an object remains unchanged even though its state and properties change. Correct Answer Identity Your Answer Identity Multiple Choice Single Answer Question The process by which objects of one class acquire properties of objects of other class is called Correct Answer

Inheritance Your Answer Polymorphism Select The Blank Question ________allows us to define abstract operations on abstract data. Correct Answer Data abstraction Your Answer Data abstraction True/False Question An asynchronous call returns immediately, without waiting for the I/O to complete. Correct Answer True Your Answer True Multiple Choice Multiple Answer Question locate the storage devices from the following :Correct Answer Disks , Tapes Your Answer Disks , Tapes Multiple Choice Single Answer Question Mango, apple and orange are members of class Correct Answer Fruit Your Answer Fruit Multiple Choice Single Answer Question The pure Object Oriented language is Correct Answer Java Your Answer C++ Select The Blank Question Web servers use the ________ protocol to communicate with web browsers. Correct Answer http Your Answer http Select The Blank Question ________ is the ability to handle error conditions, including the ability of the operating system to protect itself and its users from defective or malicious software. Correct Answer Reliability Your Answer Security Multiple Choice Multiple Answer Question One-to-one model is supported by following systems :Correct Answer Windows NT , OS/2 Your Answer Solaris , Windows NT Multiple Choice Single Answer Question

Collection of similar datatypes is called as Correct Answer Array Your Answer Array Multiple Choice Single Answer Question C++ is basically a procedural language having extension of Correct Answer Object Oriented technology Your Answer Graphic user interface Multiple Choice Single Answer Question In Object Oriented technology following expression is appropriate Correct Answer object=data+menthods Your Answer method= data + object Multiple Choice Single Answer Question If a class fruit has object mango, the relationship is expressed as : Correct Answer Fruit mango Your Answer Fruit mango Multiple Choice Multiple Answer Question Find out the basic I/O hardware elements from the following :Correct Answer Ports , Buses , Device controllers Your Answer Ports , Buses , Device controllers Multiple Choice Single Answer Question Model of protection can be viewed abstractly as a matrix which is known as :Correct Answer Access matrix Your Answer Access matrix Multiple Choice Single Answer Question The 4.3BSD operating system is the version of :Correct Answer UNIX Your Answer UNIX True/False Question When application issues a blocking I/O system call, the request is placed on the queue for that device. Correct Answer True Your Answer False Select The Blank Question ________ is defined as a cooperation between object codes produced by different software vendors & written in different programming languages. Correct Answer Interoperability Your Answer Interoperability

True/False Question Linux is a multi-user, multitasking system with a full set of UNIX-compatible tools. Correct Answer True Your Answer True Multiple Choice Single Answer Question DMA stands for :Correct Answer Direct Memory Access Your Answer Direct Memory Access Match The Following Question Correct Answer Your Answer Light-Weight processes Thread Solaris process Parent process Child process Unix process Foreground processes Interactive processes Interactive processes Background processes Batch processes Thread Multiple Choice Multiple Answer Question Find out the human-interface devices :Correct Answer Screen , Keyboard , Mouse Your Answer Screen , Keyboard , Mouse Select The Blank Question A process is ________ if it can affect or be affected by the other processes executing in the system. Correct Answer Cooperating Your Answer Independent Multiple Choice Multiple Answer Question Liner address is divided into fields like :Correct Answer Dir , Page , Offset Your Answer Dir , Page , File True/False Question An I/O bound process spend more of its time doing I/O than it spends doing computations. Correct Answer True Your Answer False Multiple Choice Single Answer Question In some systems, if a process terminates, then all its children must also be terminated. This phenomenon referred to as :-

Correct Answer Cascading termination Your Answer Removing all Multiple Choice Multiple Answer Question find out the services provided by kernel related to I/O : Correct Answer I/O Scheduling , Buffering , Spooling Your Answer I/O Scheduling , Buffering , I/o subsystem True/False Question The language Classic-Ada is not OOPL Correct Answer False Your Answer True Select The Blank Question In Linux, the allocator uses a ________ algorithm to keep track of available physical pages. Correct Answer Buddy-heap Your Answer Sort-first Select The Blank Question ________ describes segments local to each program, including its code, data, stack etc. Correct Answer LDT Your Answer LDT True/False Question A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX . Correct Answer False Your Answer False True/False Question A copy of inode is kept in main memory while a file is open. Correct Answer True Your Answer True Multiple Choice Single Answer Question The separation of policy and mechanism is important for which purpose? Correct Answer Flexibility Your Answer Costing Select The Blank Question A ________ is a group of NT server machines that share a common security policy and user databases. Correct Answer Domain Your Answer Domain Multiple Choice Single Answer Question

If Dog derives from Mammal, and Mammal derives from Animal, then Correct Answer Dog inherits Animals functions and data Your Answer Dog inherits Animals functions and data True/False Question Keyboard is a sharable device. Correct Answer True Your Answer False

Das könnte Ihnen auch gefallen