LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Multiple Choice Multiple Answer
Question
locate the transmission devices :-
Correct Answer
Network cards , Modems
Your Answer
Tapes , Network cards , Modems
True/False
Question
The user process issues a network I/O system call to send the character to the remote machine.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
The process by which objects of one class acquire properties of objects of other class is called
Correct Answer
Inheritance
Your Answer
Inheritance
True/False
Question
Windows NT uses a message passing implementation for I/O.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes?
Correct Answer
User mode , Monitor mode
Your Answer
User mode , Monitor mode
Match The Following
Question
Correct Answer
Your Answer
Round-robin
Time quantum
Time quantum
First-come First-served
First come job
First come job
Shortest job
Shortest job
Shortest job
Priority
Highest priority job
Highest priority job
Multiple Choice Single Answer
Question
The segment is :-
Correct Answer
Logical entity
Your Answer
Logical entity
Multiple Choice Single Answer
Question
In UNIX, decisions regarding which process to swap in or out are made by whom?
Correct Answer
Swapper
Your Answer
Memory handler
Select The Blank
Question
A ________ is a client-server mechanism that enables an application on one machine to make a procedure call to code on another machine.
Correct Answer
Remote-procedure-call
Your Answer
Remote-procedure-call
Multiple Choice Single Answer
Question
When each process that wants to communicate must explicitly name the recipient or sender of the communication, then such communication is called as :-
Correct Answer
Direct communication
Your Answer
Indirect communication
Select The Blank
Question
In Linux, the allocator uses a ________ algorithm to keep track of available physical pages.
Correct Answer
Buddy-heap
Your Answer
Binary-search
Multiple Choice Single Answer
Question
What does the rows of the access matrix represents?
Correct Answer
Domains
Your Answer
Domains
Multiple Choice Single Answer
Question
Every change in policy requires a change in the underlying :-
Correct Answer
Mechanism
Your Answer
System
Select The Blank
Question
A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote.
Correct Answer
Redirector
Your Answer
Domain
Multiple Choice Multiple Answer
Question
In Solaris 2, user-level threads may be:-
Correct Answer
Bound , Unbound
Your Answer
Bound , Unbound
Multiple Choice Multiple Answer
Question
An audit log records which things about an object ?
Correct Answer
Time , User , Type of access
Your Answer
Time , User , Type of access
Multiple Choice Multiple Answer
Question
One-to-one model is supported by following systems :-
Correct Answer
Windows NT , OS/2
Your Answer
OS/2 , Windows NT
Multiple Choice Multiple Answer
Question
To protect the system, we must take security measures at two levels, such as :-
Correct Answer
Physical level , Human level
Your Answer
Human level , Global level
Multiple Choice Single Answer
Question
If the process is waiting for some event to occur then it is said to be in :-
Correct Answer
Waiting state
Your Answer
Waiting state
Multiple Choice Single Answer
Question
A common representation for a discussion of process scheduling is a :-
Correct Answer
Queuing diagram
Your Answer
Process state diagram
True/False
Question
At Physical level, the site or sites containing the computer systems must be physically secured against armed or surreptitious entry by intruders.
Correct Answer
True
Your Answer
True
Select The Blank
Question
When you express user-system interaction, the scenario in the model is called ________
Correct Answer
Case model
Your Answer
Case model
True/False
Question
Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention.
Correct Answer
False
Your Answer
True
True/False
Question
A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .
Correct Answer
False
Your Answer
False
Multiple Choice Single Answer
Question
Polymorphism means ability to take
Correct Answer
More than one form
Your Answer
More than one form
True/False
Question
Aging algorithm is based on LRU.
Correct Answer
True
Your Answer
True
Select The Blank
Question
The virtual memory portion of the NT executive is the ________.
Correct Answer
Virtual memory manager
Your Answer
Virtual memory manager
Multiple Choice Multiple Answer
Question
There are two types of Message passing, they are :-
Correct Answer
Synchronous , Asynchronous
Your Answer
Synchronous , Asynchronous
Select The Blank
Question
Web servers use the ________ protocol to communicate with web browsers.
Correct Answer
http
Your Answer
http
Multiple Choice Multiple Answer
Question
The security of a system can be improved by two management techniques, such as :-
Correct Answer
Threat monitoring , Audit Log
Your Answer
Audit Log , Threat finding
Select The Blank
Question
The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________.
Correct Answer
Ring
Your Answer
Ring
True/False
Question
We say that a system is secure if its resources are used and accessed as intended under all circumstances.
Correct Answer
True
Your Answer
True
Select The Blank
Question
The ________ controller is the controller at the computer end of the bus.
Correct Answer
Host
Your Answer
Cpu
Multiple Choice Multiple Answer
Question
In Linux, the paging system can be divided into sections, namely:-
Correct Answer
Policy algorithm , Paging mechanism
Your Answer
Policy algorithm , Paging mechanism
True/False
Question
Keyboard is a sharable device.
Correct Answer
True
Your Answer
False
True/False
Question
Transfer of data from disk to memory is usually controlled by the operating system.
Correct Answer
True
Your Answer
True
True/False
Question
Prototyping not only helps to build a quality design but also enables the designer to build the system decremantally.
Correct Answer
False
Your Answer
True
Select The Blank
Question
The UNIX system uses ________ to avoid the necessity of keeping its password list secret.
Correct Answer
Encryption
Your Answer
Encryption
Match The Following
Question
Correct Answer
Your Answer
Read-write devices
Disks
Disks
Dedicated devices
Tape
CD-ROM
Read-only devices
CD-ROM
Tape
Write-only devices
Graphics controller
Keyboard
Multiple Choice Single Answer
Question
A procedure call, request to execute a method is termed as
Correct Answer
Message
Your Answer
Message
Select The Blank
Question
Context switch times are highly dependent on ________ support.
Correct Answer
Hardware
Your Answer
Hardware
Multiple Choice Multiple Answer
Question
Two main jobs of a computer are :-
Correct Answer
I/O , Processing
Your Answer
I/O , Processing
Multiple Choice Single Answer
Question
The 4.3BSD operating system is the version of :-
Correct Answer
UNIX
Your Answer
UNIX
Multiple Choice Single Answer
Question
The number of processes that are completed per time unit is called as:-
Correct Answer
Throughput of system
Your Answer
Throughput of system
Multiple Choice Multiple Answer
Question
Once the I/O is started , which two courses of action are possible?
Correct Answer
Synchronous I/O , Asynchronous I/O , Simple I/O
Your Answer
Synchronous I/O , Asynchronous I/O
Multiple Choice Multiple Answer
Question
Security violations of the system can be categorized as :-
Correct Answer
Malicious , Accidental
Your Answer
Malicious , Accidental
Select The Blank
Question
A process migrates between the various ________ throughout its lifetime.
Correct Answer
Scheduling queues
Your Answer
Scheduling queues
No comments:
Post a Comment