Wecome to all SCDLians

Hello Guys, i am requesting to all audience of this blog to like any thing that should be available for other students so please co-operate me and if you have any test papers as latest as that could be published with your reference. Please send with your name at the e-mail skdwivedi2009@gmail.com

Thank You !!
Showing posts with label Operating System. Show all posts
Showing posts with label Operating System. Show all posts

Thursday, October 28, 2010

Operating System








True/False
Question
Firewall monitors and logs all connections.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
Which of the following Operating System has no memory protection ?
Correct Answer
Windows 3.1
Your Answer
Windows 3.1

Multiple Choice Single Answer
Question
The main difference between structure and class is
Correct Answer
Structure does not support OOPS Class Supports OOPS.
Your Answer
Structure does not support OOPS Class Supports OOPS.

Multiple Choice Single Answer
Question
DMA stands for :-
Correct Answer
Direct Memory Access
Your Answer
Direct Memory Access

Multiple Choice Single Answer
Question
A major problem with the Priority scheduling algorithm is :-
Correct Answer
Starvation
Your Answer
Starvation

Multiple Choice Single Answer
Question
How big is a class object?
Correct Answer
Is as big as sum of the sizes of its member variables
Your Answer
Is as big as sum of the sizes of its member variables

Multiple Choice Single Answer
Question
The First version of UNIX was developed in 1969 by Ken Thompson of the Research Group at :-
Correct Answer
Bell Laboratories
Your Answer
Bell Laboratories

Multiple Choice Single Answer
Question
When computer is powered up or rebooted, it needs to have an initial program to run. This initial program is known as :-
Correct Answer
Bootstrap program
Your Answer
Bootstrap program

True/False
Question
Processes represents the executions of single programs whereas threads represent separate, concurrent execution contexts within a single process running a single program.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
If Dog derives from Mammal, and Mammal derives from Animal, then -
Correct Answer
Dog inherits Animal's functions and data
Your Answer
Dog inherits Animal's functions and data

Multiple Choice Single Answer
Question
The wraping up of data and methods in a single unit (class) is known as :
Correct Answer
Encapsulation
Your Answer
Encapsulation

True/False
Question
LRU algorithm can not be implemented without special hardware.
Correct Answer
True
Your Answer
False

Select The Blank
Question
The Solaris developers reimplemented the ________ using in-kernel thread to eliminate the context switch involved in moving each character between daemons and the kernel.
Correct Answer
Telnet daemon
Your Answer
Telnet daemon

Multiple Choice Single Answer
Question
All user processes are descendents of one original process, Which is that process?
Correct Answer
Init process
Your Answer
Init process

Select The Blank
Question
Terminals and line printers are ________ .
Correct Answer
Character devices
Your Answer
Character devices

Multiple Choice Multiple Answer
Question
Many-to-may model is supported by following operating systems :-
Correct Answer
Solaris , IRIX , Digital UNIX
Your Answer
Solaris , IRIX , Digital UNIX

Multiple Choice Multiple Answer
Question
find out the services provided by kernel related to I/O :
Correct Answer
I/O Scheduling , Buffering , Spooling
Your Answer
I/O Scheduling , Buffering , Spooling

Multiple Choice Single Answer
Question
The long-term scheduler controls the :-
Correct Answer
Degree of multiprogramming
Your Answer
Degree of multiprogramming

Select The Blank
Question
The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________.
Correct Answer
Ring
Your Answer
Ring

Multiple Choice Multiple Answer
Question
In Linux, the main objects defined by the virtual file system are :-
Correct Answer
Inode-object , File-object , File-system object
Your Answer
Inode-object , File-object , File-system object

Multiple Choice Single Answer
Question
Collection of similar datatypes is called as
Correct Answer
Array
Your Answer
Array

Multiple Choice Multiple Answer
Question
We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes?
Correct Answer
User mode , Monitor mode
Your Answer
User mode , Monitor mode

Match The Following
Question
Correct Answer
Your Answer
Class Shape
Triangle, rectangle, circle, ellipse
Triangle, rectangle, circle, ellipse
Class Vehicle
Scooter, car, truck, tractor
Scooter, car, truck, tractor
Class Animal
Cat, dog, cow, tiger
Cat, dog, cow, tiger
Class Color
Red, yellow, blue, green
Red, yellow, blue, green

Select The Blank
Question
The virtual memory portion of the NT executive is the ________.
Correct Answer
Virtual memory manager
Your Answer
Virtual memory manager

True/False
Question
An asynchronous call returns immediately, without waiting for the I/O to complete.
Correct Answer
True
Your Answer
True

True/False
Question
Modem is a random-access device.
Correct Answer
False
Your Answer
False

Multiple Choice Multiple Answer
Question
A mailbox can be owned by :-
Correct Answer
Process , Operating system
Your Answer
Process , Operating system

Multiple Choice Multiple Answer
Question
The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :-
Correct Answer
Explicit , Implicit
Your Answer
Explicit , Implicit

Select The Blank
Question
In windows NT, the ________ facility is used to pass requests and results between client and server processes within a single machine.
Correct Answer
Local-procedure-call
Your Answer
Remote-procedure-call

True/False
Question
A major security problem for operating system is authentication.
Correct Answer
True
Your Answer
True

True/False
Question
In a blocking system call, the application is moved from the OS's run queue to a wait queue.
Correct Answer
True
Your Answer
True

True/False
Question
Device speeds range from a few bytes per second to a few gigabytes per second.
Correct Answer
True
Your Answer
True

Multiple Choice Multiple Answer
Question
Various storage systems available possesses which two characteristics?
Correct Answer
Volatile , Non-volatile
Your Answer
Volatile , Non-volatile

Match The Following
Question
Correct Answer
Your Answer
We can define abstract operation on abstract data
Data abstraction
Data abstraction
Process of sharing properties of the higher level object or class
Inheritance
Inheritance
Ability to inherit attributes and methods from 2 or more objects or classes
Multiple inheritance
Multiple inheritance
Ability to send a message to several objects and to allow receiving object to respond method specified on the object.
Ploymorphism
Ploymorphism

Multiple Choice Single Answer
Question
As process enter the system, they are put into :-
Correct Answer
Job queue
Your Answer
Job queue

Multiple Choice Multiple Answer
Question
The role of the operating system in computer I/O is to :-
Correct Answer
Manage I/O operation and devices , Control I/O operation and devices
Your Answer
Manage I/O operation and devices , Control I/O operation and devices

Select The Blank
Question
The ________ is a layer of software that hides hardware differences from upper levels of the operating system.
Correct Answer
Hardware abstraction layer
Your Answer
Hardware abstraction layer

Select The Blank
Question
A ________ is a computer or router that sits between the trusted and untrusted systems.
Correct Answer
Firewall
Your Answer
Firewall

Multiple Choice Multiple Answer
Question
The Moriss Internet Worm was made up of which of the two programs?
Correct Answer
Grappling hook program , Main program
Your Answer
Grappling hook program , Main program

Multiple Choice Multiple Answer
Question
In UNIX, a device is distinguished by two things, which are :-
Correct Answer
Device-class , Device number
Your Answer
Device-class , Device number

Multiple Choice Single Answer
Question
In general , the access matrix will be :-
Correct Answer
Sparse
Your Answer
Sparse

True/False
Question
Applications normally access block devices through a file system interface.
Correct Answer
True
Your Answer
True

Multiple Choice Multiple Answer
Question
User thread libraries include :-
Correct Answer
POSIX Pthreads , Mach C-threads , Solaris threads
Your Answer
POSIX Pthreads , Mach C-threads , Solaris threads

Select The Blank
Question
The positioning time sometimes called the ________.
Correct Answer
Random-access time
Your Answer
Random-access time

Multiple Choice Single Answer
Question
The concept of OOPS was first introduced in
Correct Answer
Simula Language
Your Answer
Simula Language

Select The Blank
Question
________ passwords prevent improper authentication due to password exposure.
Correct Answer
One-time
Your Answer
One-time

Multiple Choice Single Answer
Question
The linking of procedure call to the code to be executed in response to that call is referred as
Correct Answer
Binding
Your Answer
Binding
Multiple Choice Multiple Answer
Question
locate the transmission devices :-
Correct Answer
Network cards , Modems
Your Answer
Tapes , Network cards , Modems

True/False
Question
The user process issues a network I/O system call to send the character to the remote machine.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
The process by which objects of one class acquire properties of objects of other class is called
Correct Answer
Inheritance
Your Answer
Inheritance

True/False
Question
Windows NT uses a message passing implementation for I/O.
Correct Answer
True
Your Answer
True

Multiple Choice Multiple Answer
Question
We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes?
Correct Answer
User mode , Monitor mode
Your Answer
User mode , Monitor mode

Match The Following
Question
Correct Answer
Your Answer
Round-robin
Time quantum
Time quantum
First-come First-served
First come job
First come job
Shortest job
Shortest job
Shortest job
Priority
Highest priority job
Highest priority job

Multiple Choice Single Answer
Question
The segment is :-
Correct Answer
Logical entity
Your Answer
Logical entity

Multiple Choice Single Answer
Question
In UNIX, decisions regarding which process to swap in or out are made by whom?
Correct Answer
Swapper
Your Answer
Memory handler

Select The Blank
Question
A ________ is a client-server mechanism that enables an application on one machine to make a procedure call to code on another machine.
Correct Answer
Remote-procedure-call
Your Answer
Remote-procedure-call

Multiple Choice Single Answer
Question
When each process that wants to communicate must explicitly name the recipient or sender of the communication, then such communication is called as :-
Correct Answer
Direct communication
Your Answer
Indirect communication

Select The Blank
Question
In Linux, the allocator uses a ________ algorithm to keep track of available physical pages.
Correct Answer
Buddy-heap
Your Answer
Binary-search

Multiple Choice Single Answer
Question
What does the rows of the access matrix represents?
Correct Answer
Domains
Your Answer
Domains

Multiple Choice Single Answer
Question
Every change in policy requires a change in the underlying :-
Correct Answer
Mechanism
Your Answer
System

Select The Blank
Question
A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote.
Correct Answer
Redirector
Your Answer
Domain

Multiple Choice Multiple Answer
Question
In Solaris 2, user-level threads may be:-
Correct Answer
Bound , Unbound
Your Answer
Bound , Unbound

Multiple Choice Multiple Answer
Question
An audit log records which things about an object ?
Correct Answer
Time , User , Type of access
Your Answer
Time , User , Type of access

Multiple Choice Multiple Answer
Question
One-to-one model is supported by following systems :-
Correct Answer
Windows NT , OS/2
Your Answer
OS/2 , Windows NT

Multiple Choice Multiple Answer
Question
To protect the system, we must take security measures at two levels, such as :-
Correct Answer
Physical level , Human level
Your Answer
Human level , Global level

Multiple Choice Single Answer
Question
If the process is waiting for some event to occur then it is said to be in :-
Correct Answer
Waiting state
Your Answer
Waiting state

Multiple Choice Single Answer
Question
A common representation for a discussion of process scheduling is a :-
Correct Answer
Queuing diagram
Your Answer
Process state diagram

True/False
Question
At Physical level, the site or sites containing the computer systems must be physically secured against armed or surreptitious entry by intruders.
Correct Answer
True
Your Answer
True

Select The Blank
Question
When you express user-system interaction, the scenario in the model is called ________
Correct Answer
Case model
Your Answer
Case model

True/False
Question
Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention.
Correct Answer
False
Your Answer
True

True/False
Question
A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .
Correct Answer
False
Your Answer
False

Multiple Choice Single Answer
Question
Polymorphism means ability to take
Correct Answer
More than one form
Your Answer
More than one form

True/False
Question
Aging algorithm is based on LRU.
Correct Answer
True
Your Answer
True

Select The Blank
Question
The virtual memory portion of the NT executive is the ________.
Correct Answer
Virtual memory manager
Your Answer
Virtual memory manager

Multiple Choice Multiple Answer
Question
There are two types of Message passing, they are :-
Correct Answer
Synchronous , Asynchronous
Your Answer
Synchronous , Asynchronous

Select The Blank
Question
Web servers use the ________ protocol to communicate with web browsers.
Correct Answer
http
Your Answer
http

Multiple Choice Multiple Answer
Question
The security of a system can be improved by two management techniques, such as :-
Correct Answer
Threat monitoring , Audit Log
Your Answer
Audit Log , Threat finding

Select The Blank
Question
The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________.
Correct Answer
Ring
Your Answer
Ring

True/False
Question
We say that a system is secure if its resources are used and accessed as intended under all circumstances.
Correct Answer
True
Your Answer
True

Select The Blank
Question
The ________ controller is the controller at the computer end of the bus.
Correct Answer
Host
Your Answer
Cpu

Multiple Choice Multiple Answer
Question
In Linux, the paging system can be divided into sections, namely:-
Correct Answer
Policy algorithm , Paging mechanism
Your Answer
Policy algorithm , Paging mechanism

True/False
Question
Keyboard is a sharable device.
Correct Answer
True
Your Answer
False

True/False
Question
Transfer of data from disk to memory is usually controlled by the operating system.
Correct Answer
True
Your Answer
True

True/False
Question
Prototyping not only helps to build a quality design but also enables the designer to build the system decremantally.
Correct Answer
False
Your Answer
True

Select The Blank
Question
The UNIX system uses ________ to avoid the necessity of keeping its password list secret.
Correct Answer
Encryption
Your Answer
Encryption

Match The Following
Question
Correct Answer
Your Answer
Read-write devices
Disks
Disks
Dedicated devices
Tape
CD-ROM
Read-only devices
CD-ROM
Tape
Write-only devices
Graphics controller
Keyboard

Multiple Choice Single Answer
Question
A procedure call, request to execute a method is termed as
Correct Answer
Message
Your Answer
Message

Select The Blank
Question
Context switch times are highly dependent on ________ support.
Correct Answer
Hardware
Your Answer
Hardware

Multiple Choice Multiple Answer
Question
Two main jobs of a computer are :-
Correct Answer
I/O , Processing
Your Answer
I/O , Processing

Multiple Choice Single Answer
Question
The 4.3BSD operating system is the version of :-
Correct Answer
UNIX
Your Answer
UNIX

Multiple Choice Single Answer
Question
The number of processes that are completed per time unit is called as:-
Correct Answer
Throughput of system
Your Answer
Throughput of system

Multiple Choice Multiple Answer
Question
Once the I/O is started , which two courses of action are possible?
Correct Answer
Synchronous I/O , Asynchronous I/O , Simple I/O
Your Answer
Synchronous I/O , Asynchronous I/O

Multiple Choice Multiple Answer
Question
Security violations of the system can be categorized as :-
Correct Answer
Malicious , Accidental
Your Answer
Malicious , Accidental

Select The Blank
Question
A process migrates between the various ________ throughout its lifetime.
Correct Answer
Scheduling queues
Your Answer
Scheduling queues
Multiple Choice Multiple Answer
Question
Various storage systems available possesses which two characteristics?
Correct Answer
Volatile , Non-volatile
Your Answer
Volatile , Non-volatile

Multiple Choice Multiple Answer
Question
Most CPUs have two interrupt request lines. Which are they?
Correct Answer
Maskable , Non maskable
Your Answer
Maskable , Non maskable

Select The Blank
Question
A ________ is a group of NT server machines that share a common security policy and user databases.
Correct Answer
Domain
Your Answer
Domain

Select The Blank
Question
An ________ is a dedicated, special purpose CPU found in mainframes and in other high-end systems.
Correct Answer
I/O channel
Your Answer
I/O channel

Multiple Choice Single Answer
Question
The CPU is allocated to the selected process by the :-
Correct Answer
Dispatcher
Your Answer
Dispatcher

Multiple Choice Single Answer
Question
In JAVA , the derived class is known as
Correct Answer
Subclass
Your Answer
Subclass

Select The Blank
Question
The Pentium supports four protection levels with ________ as least privileged level.
Correct Answer
3
Your Answer
3

Select The Blank
Question
________ of an object remains unchanged even though its state and properties change.
Correct Answer
Identity
Your Answer
Identity

True/False
Question
One way to achieve portability is to write software in standard version of high level language and to develop portable system and application software .
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
Software may trigger an interrupt by executing a special operation called :-
Correct Answer
System call
Your Answer
System call

Multiple Choice Single Answer
Question
In Object Oriented technology following expression is appropriate
Correct Answer
object=data+menthods
Your Answer
object=data+menthods

Multiple Choice Multiple Answer
Question
The two versions of NT are :
Correct Answer
WindowsNT workstations , WindowsNT server
Your Answer
WindowsNT workstations , WindowsNT server

Match The Following
Question
Correct Answer
Your Answer
We can define abstract operation on abstract data
Data abstraction
Data abstraction
Process of sharing properties of the higher level object or class
Inheritance
Inheritance
Ability to inherit attributes and methods from 2 or more objects or classes
Multiple inheritance
Multiple inheritance
Ability to send a message to several objects and to allow receiving object to respond method specified on the object.
Ploymorphism
Ploymorphism

Select The Blank
Question
A________ is a memory area that stores data while they are transferred between two devices or between a device and an application.
Correct Answer
Buffer
Your Answer
Buffer

True/False
Question
In Public Key Encryption, each user has both a public and a private key.
Correct Answer
True
Your Answer
True

True/False
Question
Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention.
Correct Answer
False
Your Answer
False

Multiple Choice Multiple Answer
Question
Liner address is divided into fields like :-
Correct Answer
Dir , Page , Offset
Your Answer
Dir , Page , Offset

Multiple Choice Single Answer
Question
IPC is particularly useful in a :-
Correct Answer
Distributed environment
Your Answer
Internet environment

Multiple Choice Single Answer
Question
IPC provides a mechanism to allow processes to communicate and to synchronize their actions without sharing the same :-
Correct Answer
Address space
Your Answer
Semaphore

Multiple Choice Multiple Answer
Question
Supervisor mode is also known as :-
Correct Answer
Privileged mode , Monitor mode , System mode
Your Answer
System mode , Privileged mode , Monitor mode

Select The Blank
Question
Assuming that the segment is in memory and the offset is in range, the Pentium then adds the ________ bit base field in the descriptor to the offset to form linear address.
Correct Answer
32
Your Answer
32

Multiple Choice Multiple Answer
Question
In Solaris 2, user-level threads may be:-
Correct Answer
Bound , Unbound
Your Answer
Bound , Unbound

Multiple Choice Single Answer
Question
The concept of OOPS was first introduced in
Correct Answer
Simula Language
Your Answer
Simula Language

True/False
Question
At system boot time, the hardware starts in monitor mode.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
The main difference between structure and class is
Correct Answer
Structure does not support OOPS Class Supports OOPS.
Your Answer
Structure does not support OOPS Class Supports OOPS.

Select The Blank
Question
A ________ controller is built into each disk drive.
Correct Answer
Disk
Your Answer
Disk

Multiple Choice Single Answer
Question
If a class fruit has object mango, the relationship is expressed as :
Correct Answer
Fruit mango
Your Answer
Fruit mango

True/False
Question
The hardware allows privileged instructions to be executed in only user mode.
Correct Answer
False
Your Answer
False

Multiple Choice Multiple Answer
Question
An object type in windows NT is a system defined data type that has two things associated with it, which are they?
Correct Answer
Set of attributes , Set of methods
Your Answer
Set of attributes , Set of methods

Select The Blank
Question
The kernel module that controls a device is a ________ .
Correct Answer
Device driver
Your Answer
Device driver

Multiple Choice Single Answer
Question
If process P and Q want to communicate, they must send messages to and receive messages from each other: Thus link established between two process is known as :-
Correct Answer
Communication link
Your Answer
Direct link

Multiple Choice Multiple Answer
Question
Dispatcher functions involves the following :-
Correct Answer
Switching context , Switching to user mode
Your Answer
Switching context , Switching to user mode

Select The Blank
Question
In windows NT, the ________ facility is used to pass requests and results between client and server processes within a single machine.
Correct Answer
Local-procedure-call
Your Answer
Local-procedure-call

True/False
Question
If some of the pages are shared with other process, the pages in memory and on the disk can only be released when the last process using them has terminated.
Correct Answer
True
Your Answer
True

Select The Blank
Question
The Solaris developers reimplemented the ________ using in-kernel thread to eliminate the context switch involved in moving each character between daemons and the kernel.
Correct Answer
Telnet daemon
Your Answer
Context-switch daemon

Multiple Choice Single Answer
Question
Modern operating systems are :-
Correct Answer
Interrupt driven
Your Answer
Interrupt driven

Match The Following
Question
Correct Answer
Your Answer
Bounded-buffer
Fixed size buffer
Fixed size buffer
Producer
Produces process
Produces process
Consumer
Consumes process
Consumes process
Unbounded-buffer
No limit on size of buffer
No limit on size of buffer

Multiple Choice Multiple Answer
Question
In Linux, the paging system can be divided into sections, namely:-
Correct Answer
Policy algorithm , Paging mechanism
Your Answer
Policy algorithm , Paging mechanism

Multiple Choice Single Answer
Question
A process data section contains:-
Correct Answer
Global variables
Your Answer
Temporary data

True/False
Question
OOSAD approach is applicable only to stable systems.
Correct Answer
False
Your Answer
False

True/False
Question
Segment length may change during execution.
Correct Answer
True
Your Answer
True

Multiple Choice Multiple Answer
Question
The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :-
Correct Answer
Explicit , Implicit
Your Answer
Explicit , Implicit

Multiple Choice Single Answer
Question
Collection of similar datatypes is called as
Correct Answer
Array
Your Answer
Array

True/False
Question
At Human level, user must be screened carefully so that the chance of authorizing a user who then gives access to an intruder is reduced.
Correct Answer
True
Your Answer
True

True/False
Question
The user process issues a network I/O system call to send the character to the remote machine.
Correct Answer
True
Your Answer
False

Multiple Choice Multiple Answer
Question
Most computers have hardware clocks and timers that provide three basic functions, such as :-
Correct Answer
Give the current time , Give the elapsed time , Set a timer to trigger operation at certain time
Your Answer
Give the current time , Give the elapsed time , Set a timer to trigger operation at certain time

Multiple Choice Single Answer
Question
C++ is basically a procedural language having extension of
Correct Answer
Object Oriented technology
Your Answer
Object Oriented technology
Multiple Choice Multiple Answer
Question
locate the transmission devices :-
Correct Answer
Network cards , Modems
Your Answer
Tapes , Network cards , Modems

True/False
Question
The user process issues a network I/O system call to send the character to the remote machine.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
The process by which objects of one class acquire properties of objects of other class is called
Correct Answer
Inheritance
Your Answer
Inheritance

True/False
Question
Windows NT uses a message passing implementation for I/O.
Correct Answer
True
Your Answer
True

Multiple Choice Multiple Answer
Question
We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes?
Correct Answer
User mode , Monitor mode
Your Answer
User mode , Monitor mode

Match The Following
Question
Correct Answer
Your Answer
Round-robin
Time quantum
Time quantum
First-come First-served
First come job
First come job
Shortest job
Shortest job
Shortest job
Priority
Highest priority job
Highest priority job

Multiple Choice Single Answer
Question
The segment is :-
Correct Answer
Logical entity
Your Answer
Logical entity

Multiple Choice Single Answer
Question
In UNIX, decisions regarding which process to swap in or out are made by whom?
Correct Answer
Swapper
Your Answer
Memory handler

Select The Blank
Question
A ________ is a client-server mechanism that enables an application on one machine to make a procedure call to code on another machine.
Correct Answer
Remote-procedure-call
Your Answer
Remote-procedure-call

Multiple Choice Single Answer
Question
When each process that wants to communicate must explicitly name the recipient or sender of the communication, then such communication is called as :-
Correct Answer
Direct communication
Your Answer
Indirect communication

Select The Blank
Question
In Linux, the allocator uses a ________ algorithm to keep track of available physical pages.
Correct Answer
Buddy-heap
Your Answer
Binary-search

Multiple Choice Single Answer
Question
What does the rows of the access matrix represents?
Correct Answer
Domains
Your Answer
Domains

Multiple Choice Single Answer
Question
Every change in policy requires a change in the underlying :-
Correct Answer
Mechanism
Your Answer
System

Select The Blank
Question
A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote.
Correct Answer
Redirector
Your Answer
Domain

Multiple Choice Multiple Answer
Question
In Solaris 2, user-level threads may be:-
Correct Answer
Bound , Unbound
Your Answer
Bound , Unbound

Multiple Choice Multiple Answer
Question
An audit log records which things about an object ?
Correct Answer
Time , User , Type of access
Your Answer
Time , User , Type of access

Multiple Choice Multiple Answer
Question
One-to-one model is supported by following systems :-
Correct Answer
Windows NT , OS/2
Your Answer
OS/2 , Windows NT

Multiple Choice Multiple Answer
Question
To protect the system, we must take security measures at two levels, such as :-
Correct Answer
Physical level , Human level
Your Answer
Human level , Global level

Multiple Choice Single Answer
Question
If the process is waiting for some event to occur then it is said to be in :-
Correct Answer
Waiting state
Your Answer
Waiting state

Multiple Choice Single Answer
Question
A common representation for a discussion of process scheduling is a :-
Correct Answer
Queuing diagram
Your Answer
Process state diagram

True/False
Question
At Physical level, the site or sites containing the computer systems must be physically secured against armed or surreptitious entry by intruders.
Correct Answer
True
Your Answer
True

Select The Blank
Question
When you express user-system interaction, the scenario in the model is called ________
Correct Answer
Case model
Your Answer
Case model

True/False
Question
Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention.
Correct Answer
False
Your Answer
True

True/False
Question
A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .
Correct Answer
False
Your Answer
False

Multiple Choice Single Answer
Question
Polymorphism means ability to take
Correct Answer
More than one form
Your Answer
More than one form

True/False
Question
Aging algorithm is based on LRU.
Correct Answer
True
Your Answer
True

Select The Blank
Question
The virtual memory portion of the NT executive is the ________.
Correct Answer
Virtual memory manager
Your Answer
Virtual memory manager

Multiple Choice Multiple Answer
Question
There are two types of Message passing, they are :-
Correct Answer
Synchronous , Asynchronous
Your Answer
Synchronous , Asynchronous

Select The Blank
Question
Web servers use the ________ protocol to communicate with web browsers.
Correct Answer
http
Your Answer
http

Multiple Choice Multiple Answer
Question
The security of a system can be improved by two management techniques, such as :-
Correct Answer
Threat monitoring , Audit Log
Your Answer
Audit Log , Threat finding

Select The Blank
Question
The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________.
Correct Answer
Ring
Your Answer
Ring

True/False
Question
We say that a system is secure if its resources are used and accessed as intended under all circumstances.
Correct Answer
True
Your Answer
True

Select The Blank
Question
The ________ controller is the controller at the computer end of the bus.
Correct Answer
Host
Your Answer
Cpu

Multiple Choice Multiple Answer
Question
In Linux, the paging system can be divided into sections, namely:-
Correct Answer
Policy algorithm , Paging mechanism
Your Answer
Policy algorithm , Paging mechanism

True/False
Question
Keyboard is a sharable device.
Correct Answer
True
Your Answer
False

True/False
Question
Transfer of data from disk to memory is usually controlled by the operating system.
Correct Answer
True
Your Answer
True

True/False
Question
Prototyping not only helps to build a quality design but also enables the designer to build the system decremantally.
Correct Answer
False
Your Answer
True

Select The Blank
Question
The UNIX system uses ________ to avoid the necessity of keeping its password list secret.
Correct Answer
Encryption
Your Answer
Encryption

Match The Following
Question
Correct Answer
Your Answer
Read-write devices
Disks
Disks
Dedicated devices
Tape
CD-ROM
Read-only devices
CD-ROM
Tape
Write-only devices
Graphics controller
Keyboard

Multiple Choice Single Answer
Question
A procedure call, request to execute a method is termed as
Correct Answer
Message
Your Answer
Message

Select The Blank
Question
Context switch times are highly dependent on ________ support.
Correct Answer
Hardware
Your Answer
Hardware

Multiple Choice Multiple Answer
Question
Two main jobs of a computer are :-
Correct Answer
I/O , Processing
Your Answer
I/O , Processing

Multiple Choice Single Answer
Question
The 4.3BSD operating system is the version of :-
Correct Answer
UNIX
Your Answer
UNIX

Multiple Choice Single Answer
Question
The number of processes that are completed per time unit is called as:-
Correct Answer
Throughput of system
Your Answer
Throughput of system

Multiple Choice Multiple Answer
Question
Once the I/O is started , which two courses of action are possible?
Correct Answer
Synchronous I/O , Asynchronous I/O , Simple I/O
Your Answer
Synchronous I/O , Asynchronous I/O

Multiple Choice Multiple Answer
Question
Security violations of the system can be categorized as :-
Correct Answer
Malicious , Accidental
Your Answer
Malicious , Accidental

Select The Blank
Question
A process migrates between the various ________ throughout its lifetime.
Correct Answer
Scheduling queues
Your Answer
Scheduling queues
Select The Blank
Question
static binding allows to hold certain properties fixed and rigid, whereas ________ binding allows object to behave as per conditions emerge.
Correct Answer
Dynamic
Your Answer
Dynamic

Multiple Choice Single Answer
Question
DVMA stands for :-
Correct Answer
Direct Virtual Memory Access
Your Answer
Direct Virtual Memory Access

True/False
Question
Since caches have limited size, cache management is an important design problem.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
C++ is basically a procedural language having extension of
Correct Answer
Object Oriented technology
Your Answer
Object Oriented technology

Multiple Choice Single Answer
Question
The system call checks the arguments given by the application, builds a data structure to convey the arguments to the kernel and then executes a special instruction called as :-
Correct Answer
Software interrupt
Your Answer
Software interrupt

Multiple Choice Single Answer
Question
A system consists of collection of :-
Correct Answer
Processes
Your Answer
Processes

Select The Blank
Question
A________ is a memory area that stores data while they are transferred between two devices or between a device and an application.
Correct Answer
Buffer
Your Answer
Buffer

Multiple Choice Multiple Answer
Question
Find out the human-interface devices :-
Correct Answer
Screen , Keyboard , Mouse
Your Answer
Screen , Keyboard , Mouse

Multiple Choice Single Answer
Question
A procedure body implementing an operation is termed as
Correct Answer
Method
Your Answer
Method

Select The Blank
Question
The designer of a program or system might leave a hole, or ________ , in the software that only he is capable of using.
Correct Answer
Trap door
Your Answer
Trap door

True/False
Question
The principle of polymorphism helps to extend and modify the system scope through appropriate messaging mechanism.
Correct Answer
True
Your Answer
True

Multiple Choice Multiple Answer
Question
The Linux system is composed of three main bodies of code, in line with most traditional UNIX implementations. Which are :-
Correct Answer
Kernel , System libraries , System utilities
Your Answer
Kernel , System libraries , System utilities

Select The Blank
Question
Web servers use the ________ protocol to communicate with web browsers.
Correct Answer
http
Your Answer
http

Multiple Choice Single Answer
Question
The pure Object Oriented language is
Correct Answer
Java
Your Answer
Java

Multiple Choice Multiple Answer
Question
User level threads are generally :-
Correct Answer
Fast to create , Easy to manage
Your Answer
Fast to create , Easy to manage

True/False
Question
Switching the cpu to another process requires saving the state of the old process and loading the saved state for the new process.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
The process by which objects of one class acquire properties of objects of other class is called
Correct Answer
Inheritance
Your Answer
Inheritance

Multiple Choice Single Answer
Question
In Object Oriented technology following expression is appropriate
Correct Answer
object=data+menthods
Your Answer
object=data+menthods

True/False
Question
A copy of inode is kept in main memory while a file is open.
Correct Answer
True
Your Answer
True

Multiple Choice Multiple Answer
Question
The advantage of dynamic loading is
Correct Answer
Unused routine is never loaded , Useful when large amount of code are needed to handle infrequently occurring cases, such as error routines , It does not require special support from the operating system
Your Answer
It does not require special support from the operating system , Unused routine is never loaded , Useful when large amount of code are needed to handle infrequently occurring cases, such as error routines

Select The Blank
Question
OOSAD begins with identification of actors, what activities they perform and building ________ model for the function.
Correct Answer
Use-case
Your Answer
Use-case

Multiple Choice Single Answer
Question
If a class fruit has object mango, the relationship is expressed as :
Correct Answer
Fruit mango
Your Answer
Fruit mango

Multiple Choice Single Answer
Question
The class bird should have object
Correct Answer
Egale
Your Answer
Egale

Select The Blank
Question
The ________ controller is the controller at the computer end of the bus.
Correct Answer
Host
Your Answer
Host

Multiple Choice Single Answer
Question
The insulation of data from direct access by the program is known as :
Correct Answer
Data hiding
Your Answer
Data hiding

Multiple Choice Multiple Answer
Question
Liner address is divided into fields like :-
Correct Answer
Dir , Page , Offset
Your Answer
Dir , Page , Offset

Multiple Choice Single Answer
Question
Every change in policy requires a change in the underlying :-
Correct Answer
Mechanism
Your Answer
Mechanism

Multiple Choice Single Answer
Question
UNIX operating system is written mostly in :-
Correct Answer
C language
Your Answer
C language

Multiple Choice Single Answer
Question
In UNIX, a file is represented by an :-
Correct Answer
Inode
Your Answer
Inode

Select The Blank
Question
If paging is enabled, the liner address is interpreted as virtual address and mapped to the physical address using ________ table.
Correct Answer
Page
Your Answer
Page

Multiple Choice Multiple Answer
Question
What are the forms of malicious access?
Correct Answer
Unauthorized destruction of data , Unauthorized reading of data , Unauthorized modification of data
Your Answer
Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data

Multiple Choice Multiple Answer
Question
What are the components to memory management under Linux?
Correct Answer
Physical memory manager , Virtual memory manager
Your Answer
Physical memory manager , Virtual memory manager

Multiple Choice Single Answer
Question
IPC is particularly useful in a :-
Correct Answer
Distributed environment
Your Answer
Distributed environment

Select The Blank
Question
Context switch times are highly dependent on ________ support.
Correct Answer
Hardware
Your Answer
Hardware

Multiple Choice Multiple Answer
Question
kernel threads are supported by following operating systems :-
Correct Answer
Windows NT , Solaris , Digital UNIX
Your Answer
Windows NT , Solaris , Digital UNIX

Select The Blank
Question
A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote.
Correct Answer
Redirector
Your Answer
Redirector

Multiple Choice Multiple Answer
Question
In a uniprocessor system, there is :-
Correct Answer
Single processor , Single running process
Your Answer
Single processor , Single running process

True/False
Question
The basic difference between SSAD life cycle models and OOSAD life cycle models is that one is evolutionary & iterative while the other is sequential in stages of analysis, design, coding, unit test, integrated test and system test.
Correct Answer
True
Your Answer
True

Match The Following
Question
Correct Answer
Your Answer
Ready state
Process waiting for cpu
Process waiting for cpu
New state
Process created
Process created
Running state
Executing process
Executing process
Waiting state
Waiting process
Waiting process

Match The Following
Question
Correct Answer
Your Answer
Parent process
Child process
Child process
Foreground processes
Interactive processes
Interactive processes
Background processes
Batch processes
Batch processes
Light-Weight processes
Thread
Thread

Multiple Choice Single Answer
Question
In how many number of classes does the NRU algorithm divides pages, depending on the state of R and M?
Correct Answer
4
Your Answer
4

True/False
Question
When application issues a blocking I/O system call, the request is placed on the queue for that device.
Correct Answer
True
Your Answer
True

Select The Blank
Question
During execution, ________ register holds the sector for the data segment.
Correct Answer
DS
Your Answer
DS

True/False
Question
Banker's algorithm is a deadlock-avoidance algorithm.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
Model of protection can be viewed abstractly as a matrix which is known as :-
Correct Answer
Access matrix
Your Answer
Access matrix

Multiple Choice Multiple Answer
Question
Kernel threads are generally :-
Correct Answer
Slower to create , Difficult to manage
Your Answer
Slower to create , Difficult to manage

Multiple Choice Multiple Answer
Question
One-to-one model is supported by following systems :-
Correct Answer
Windows NT , OS/2
Your Answer
Windows NT , OS/2
Multiple Choice Multiple Answer
Question
Kernel threads are generally :-
Correct Answer
Slower to create , Difficult to manage
Your Answer
Slower to create , Difficult to manage

Select The Blank
Question
If the user-supplied password matches the password stored in the system, the system assumes that the user is ________.
Correct Answer
Legitimate
Your Answer
Legitimate

Multiple Choice Single Answer
Question
In general , the access matrix will be :-
Correct Answer
Sparse
Your Answer
Sparse

True/False
Question
Encryption is one common method of protecting information that is transmitted over unreliable links.
Correct Answer
True
Your Answer
False

Select The Blank
Question
A ________ is a full duplex connection between a device driver and a user-level process.
Correct Answer
Stream
Your Answer
Stream

Multiple Choice Single Answer
Question
In how many number of classes does the NRU algorithm divides pages, depending on the state of R and M?
Correct Answer
4
Your Answer
8

Select The Blank
Question
The Pentium page size is fixed at ________ KB.
Correct Answer
4
Your Answer
4

True/False
Question
Volatile storage loses its contents when the power to the device is removed.
Correct Answer
True
Your Answer
True

Multiple Choice Multiple Answer
Question
The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :-
Correct Answer
Explicit , Implicit
Your Answer
Explicit , Implicit

Select The Blank
Question
In queuing diagram, the arrow indicates the flow of ________ in the system.
Correct Answer
Processes
Your Answer
Processes

Multiple Choice Multiple Answer
Question
What are the forms of malicious access?
Correct Answer
Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data
Your Answer
Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data

Select The Blank
Question
A bit called the ________ , is added to the hardware of the computer to indicate the current mode.
Correct Answer
Mode bit
Your Answer
Mode bit

Multiple Choice Multiple Answer
Question
In Windows NT , kernel uses which two sets of objects?
Correct Answer
Dispatcher objects , Control objects
Your Answer
Dispatcher objects , Complex objects

Multiple Choice Single Answer
Question
The smallest addressable portion of a disk is :-
Correct Answer
Sector
Your Answer
Sector

True/False
Question
In FIFO algorithm the page removed from memory is the one which most recently used.
Correct Answer
False
Your Answer
False

Select The Blank
Question
A process is ________, if it cannot affect or be affected by the other processes executing in the system.
Correct Answer
Independent
Your Answer
Independent

Multiple Choice Multiple Answer
Question
Linux presents standard interfaces to whom?
Correct Answer
Programmer , User
Your Answer
Programmer , User , System administrator

Select The Blank
Question
The kernel module that controls a device is a ________ .
Correct Answer
Device driver
Your Answer
Device daemon

True/False
Question
Whenever a trap or interrupt occurs, the hardware switches from user mode to monitor mode.
Correct Answer
True
Your Answer
True

Select The Blank
Question
A ________ is a computer or router that sits between the trusted and untrusted systems.
Correct Answer
Firewall
Your Answer
Firewall

Multiple Choice Multiple Answer
Question
Find out the basic I/O hardware elements from the following :-
Correct Answer
Ports , Buses , Device controllers
Your Answer
Ports , Buses , Device controllers

True/False
Question
Object-oriented programming focuses on the integrated data and functionality as discrete units that have both knowledge (data) and capabilities (functions). Procedural programs, on the other hand, focus on functions and how they act on data.
Correct Answer
True
Your Answer
True

Match The Following
Question
Correct Answer
Your Answer
User mode
Mode bit 1
Mode bit 1
Serial port
Modem
Monitor mode
Parallel port
Printer
Printer
Privileged instructions
Monitor mode
Mode bit 0

True/False
Question
In segmentation the total address space can exceed the size of physical memory.
Correct Answer
True
Your Answer
False

Multiple Choice Single Answer
Question
Because of the concept of independent objects responding to messages, object orientation is a natural way to implement
Correct Answer
Event driven programming
Your Answer
Message deiven programming

Multiple Choice Single Answer
Question
In UNIX, everything below the system-call interface and above the physical hardware is the :-
Correct Answer
Kernel
Your Answer
I/O system

Multiple Choice Multiple Answer
Question
Different multithreading models available are :-
Correct Answer
Many-to-one model , One-to-one model , Many-to-many model
Your Answer
Many-to-one model , One-to-one model , Many-to-many model

Multiple Choice Multiple Answer
Question
An object type in windows NT is a system defined data type that has two things associated with it, which are they?
Correct Answer
Set of attributes , Set of methods
Your Answer
Object-type , Object-processing

Multiple Choice Multiple Answer
Question
When memory reference occurs in MULTICS the things which takes place are :-
Correct Answer
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address
Your Answer
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined

Multiple Choice Single Answer
Question
The interval from the time of submission of a process to the time of completion is :-
Correct Answer
Turnaround time
Your Answer
Turnaround time

True/False
Question
Context switch times are highly dependent on hardware support.
Correct Answer
True
Your Answer
True

True/False
Question
Procedure and data can be distinguished and separately protected in segmentation
Correct Answer
True
Your Answer
True

Multiple Choice Multiple Answer
Question
Dispatcher functions involves the following :-
Correct Answer
Switching context , Switching to user mode
Your Answer
Switching context , Switching to user mode

Multiple Choice Single Answer
Question
The First version of UNIX was developed in 1969 by Ken Thompson of the Research Group at :-
Correct Answer
Bell Laboratories
Your Answer
Bell Laboratories

Multiple Choice Single Answer
Question
In Object Oriented technology following expression is appropriate
Correct Answer
object=data+menthods
Your Answer
object=data+menthods

Multiple Choice Single Answer
Question
A procedure body implementing an operation is termed as
Correct Answer
Method
Your Answer
Method

Select The Blank
Question
During execution, ________ register holds the sector for the code segment.
Correct Answer
CS
Your Answer
PS

True/False
Question
In some operating system, spooling is managed by a system daemon process.
Correct Answer
True
Your Answer
False

Select The Blank
Question
Each column in the access matrix can be implemented as an ________ for one object.
Correct Answer
Access list
Your Answer
Capability list

Multiple Choice Single Answer
Question
Policies for resource use may vary depending on the :-
Correct Answer
Application
Your Answer
System

Multiple Choice Multiple Answer
Question
A mailbox can be owned by :-
Correct Answer
Process , Operating system
Your Answer
User , Process , Program

Multiple Choice Single Answer
Question
The ready queue is generally stored as a :-
Correct Answer
Linked list
Your Answer
Queue

Select The Blank
Question
A ________ is region of fast memory that hold copies of data .
Correct Answer
Cache
Your Answer
Cache

Multiple Choice Multiple Answer
Question
What are the components to memory management under Linux?
Correct Answer
Physical memory manager , Virtual memory manager
Your Answer
Physical memory manager , Virtual memory manager

Match The Following
Question
Correct Answer
Your Answer
Bounded-buffer
Fixed size buffer
Fixed size buffer
Producer
Produces process
Produces process
Consumer
Consumes process
Consumes process
Unbounded-buffer
No limit on size of buffer
No limit on size of buffer

True/False
Question
The inode contains 15 pointers to the disk blocks containing the data contents of the file.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
When computer is powered up or rebooted, it needs to have an initial program to run. This initial program is known as :-
Correct Answer
Bootstrap program
Your Answer
Bootstrap program
True/False
Question
Prototyping is a tool to test the design of system
Correct Answer
True
Your Answer
False

Multiple Choice Multiple Answer
Question
Kernel threads are generally :-
Correct Answer
Slower to create , Difficult to manage
Your Answer
Difficult to manage , Faster than user thread , Faster to create

Multiple Choice Single Answer
Question
The concept of OOPS was first introduced in
Correct Answer
Simula Language
Your Answer
Simula Language

Multiple Choice Single Answer
Question
The insulation of data from direct access by the program is known as :
Correct Answer
Data hiding
Your Answer
Abstraction

True/False
Question
Many to Many model multiplexes many user level threads to a smaller or equal number of kernel threads.
Correct Answer
True
Your Answer
True

Select The Blank
Question
Like worms, ________ are designed to spread into other programs and can wreak havoc in a system.
Correct Answer
Viruses
Your Answer
Viruses

Multiple Choice Multiple Answer
Question
The two versions of NT are :
Correct Answer
WindowsNT workstations , WindowsNT server
Your Answer
WindowsNT workstations , WindowsNT server

True/False
Question
A virus is a fragment of code embedded in a legitimate program
Correct Answer
True
Your Answer
False

True/False
Question
An I/O bound process spend more of its time doing I/O than it spends doing computations.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
It has been said that Pascal and C programs are collections of procedures and C++ programs are collections of
Correct Answer
Classes
Your Answer
Classes

Multiple Choice Single Answer
Question
The process by which objects of one class acquire properties of objects of other class is called
Correct Answer
Inheritance
Your Answer
Inheritance

Select The Blank
Question
A ________ is a buffer that holds output for a device such as printers.
Correct Answer
Spool
Your Answer
Spool

Multiple Choice Single Answer
Question
C++ is basically a procedural language having extension of
Correct Answer
Object Oriented technology
Your Answer
Object Oriented technology

True/False
Question
Object-oriented programming focuses on the integrated data and functionality as discrete units that have both knowledge (data) and capabilities (functions). Procedural programs, on the other hand, focus on functions and how they act on data.
Correct Answer
True
Your Answer
True

Multiple Choice Multiple Answer
Question
Most CPUs have two interrupt request lines. Which are they?
Correct Answer
Maskable , Non maskable
Your Answer
Maskable , Non maskable

True/False
Question
The I/O scheduler rearranges the order of the queue to improve the overall system efficiency and the average response time experienced by application
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
How big is a class object?
Correct Answer
Is as big as sum of the sizes of its member variables
Your Answer
Is as big as sum of the sizes of its member variables

Multiple Choice Single Answer
Question
In UNIX, files are organized in tree-structured :-
Correct Answer
Directories
Your Answer
Directories

Multiple Choice Single Answer
Question
The number of processes that are completed per time unit is called as:-
Correct Answer
Throughput of system
Your Answer
Throughput of system

Multiple Choice Multiple Answer
Question
There are two types of Message passing, they are :-
Correct Answer
Synchronous , Asynchronous
Your Answer
Synchronous , Asynchronous

Multiple Choice Single Answer
Question
If Dog derives from Mammal, and Mammal derives from Animal, then -
Correct Answer
Dog inherits Animal's functions and data
Your Answer
Dog inherits Animal's functions and data

Select The Blank
Question
The positioning time sometimes called the ________.
Correct Answer
Random-access time
Your Answer
Seek time

Multiple Choice Single Answer
Question
Collection of similar datatypes is called as
Correct Answer
Array
Your Answer
Array

Multiple Choice Single Answer
Question
The pure Object Oriented language is
Correct Answer
Java
Your Answer
Java

Multiple Choice Multiple Answer
Question
To protect the system, we must take security measures at two levels, such as :-
Correct Answer
Physical level , Human level
Your Answer
Local level , Global level

Select The Blank
Question
In some operating system, spooling is handled by an ________ .
Correct Answer
In-kernel thread
Your Answer
User thread

Multiple Choice Multiple Answer
Question
Supervisor mode is also known as :-
Correct Answer
System mode , Privileged mode , Monitor mode
Your Answer
Privileged mode , Monitor mode , Special mode

Match The Following
Question
Correct Answer
Your Answer
Thread
Light-weight process
Light-weight process
Process
PCB
Thread library
User thread
Thread library
PCB
Kernel thread
Operating system
Operating system

Select The Blank
Question
The ________ of a process is represented in the PCB of a process.
Correct Answer
Context
Your Answer
Control

Select The Blank
Question
________ is defined as a cooperation between object codes produced by different software vendors & written in different programming languages.
Correct Answer
Interoperability
Your Answer
Interoperability

Multiple Choice Multiple Answer
Question
In a uniprocessor system, there is :-
Correct Answer
Single processor , Single running process
Your Answer
Single processor , Single running process

Multiple Choice Single Answer
Question
In UNIX operating system, each process is identified by its :-
Correct Answer
Process identifier
Your Answer
Process identifier

Multiple Choice Single Answer
Question
As process enter the system, they are put into :-
Correct Answer
Job queue
Your Answer
Job queue

Match The Following
Question
Correct Answer
Your Answer
Algorithm where in it takes largest available hole
Worst fit
Worst fit
The algorithm in which memory manager scans along the list of segments until it finds a hole that is big enough
First fit
First fit
Algorithm in which keeps the track of suitable hole
Next fit
Optimal fit
Algorithm which searches entire list and takes smallest hole that is adequate
Best fit
Best fit

True/False
Question
Linux is a multi-user, multitasking system with a full set of UNIX-compatible tools.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
The main difference between structure and class is
Correct Answer
Structure does not support OOPS Class Supports OOPS.
Your Answer
Structure does not support OOPS Class Supports OOPS.

Multiple Choice Multiple Answer
Question
Find out the basic I/O hardware elements from the following :-
Correct Answer
Ports , Buses , Device controllers
Your Answer
Ports , Buses , Device controllers

Multiple Choice Single Answer
Question
The interval from the time of submission of a process to the time of completion is :-
Correct Answer
Turnaround time
Your Answer
Completion time

True/False
Question
In Public Key Encryption, each user has both a public and a private key.
Correct Answer
True
Your Answer
False

Multiple Choice Single Answer
Question
If the process is waiting to be assigned to CPU then it is said to be in :-
Correct Answer
Ready state
Your Answer
Waiting state

Select The Blank
Question
A ________ controller is built into each disk drive.
Correct Answer
Disk
Your Answer
Disk

Multiple Choice Multiple Answer
Question
Linux presents standard interfaces to whom?
Correct Answer
Programmer , User
Your Answer
Programmer , User , System administrator

True/False
Question
As an object-oriented systems NT uses objects for all its services and entities.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
A procedure body implementing an operation is termed as
Correct Answer
Method
Your Answer
Method

True/False
Question
Main Memory is a volatile storage device that loses its contents when power is turned off.
Correct Answer
True
Your Answer
True

Multiple Choice Multiple Answer
Question
Once the I/O is started , which two courses of action are possible?
Correct Answer
Synchronous I/O , Asynchronous I/O , Simple I/O
Your Answer
Waiting I/O , Simple I/O

Select The Blank
Question
________ passwords prevent improper authentication due to password exposure.
Correct Answer
One-time
Your Answer
Encrypted
Multiple Choice Single Answer
Question
Each object is associated with the data of type class with which they are created. A class is thus a collection of objects of
Correct Answer
Similar type
Your Answer
Similar type

Multiple Choice Single Answer
Question
C++ is also named as
Correct Answer
C with classes
Your Answer
Visual C++

Select The Blank
Question
The ________ of a process is represented in the PCB of a process.
Correct Answer
Context
Your Answer
Control

Multiple Choice Multiple Answer
Question
In windows NT, naming of objects is of two types :-
Correct Answer
Permanent name , Temporary name
Your Answer
Permanent name , Object-primary name

Match The Following
Question
Correct Answer
Your Answer
Class Shape
Triangle, rectangle, circle, ellipse
Triangle, rectangle, circle, ellipse
Class Vehicle
Scooter, car, truck, tractor
Scooter, car, truck, tractor
Class Animal
Cat, dog, cow, tiger
Cat, dog, cow, tiger
Class Color
Red, yellow, blue, green
Red, yellow, blue, green

Multiple Choice Multiple Answer
Question
Computer system consists of :-
Correct Answer
CPU , Multiple device controller
Your Answer
CPU , Multiple device controller

Multiple Choice Single Answer
Question
In JAVA , the derived class is known as
Correct Answer
Subclass
Your Answer
Subclass

Select The Blank
Question
To make as interval call, the CALL instruction must contain ________.
Correct Answer
Selector
Your Answer
Address

True/False
Question
In Lock-key mechanism, users are allowed to examine or modify the list of keys or locks directly.
Correct Answer
False
Your Answer
True

Multiple Choice Single Answer
Question
A major problem with the Priority scheduling algorithm is :-
Correct Answer
Starvation
Your Answer
CPU time

Select The Blank
Question
________ of an object remains unchanged even though its state and properties change.
Correct Answer
Identity
Your Answer
Identity

Multiple Choice Single Answer
Question
The process by which objects of one class acquire properties of objects of other class is called
Correct Answer
Inheritance
Your Answer
Polymorphism

Select The Blank
Question
________allows us to define abstract operations on abstract data.
Correct Answer
Data abstraction
Your Answer
Data abstraction

True/False
Question
An asynchronous call returns immediately, without waiting for the I/O to complete.
Correct Answer
True
Your Answer
True

Multiple Choice Multiple Answer
Question
locate the storage devices from the following :-
Correct Answer
Disks , Tapes
Your Answer
Disks , Tapes

Multiple Choice Single Answer
Question
Mango, apple and orange are members of class
Correct Answer
Fruit
Your Answer
Fruit

Multiple Choice Single Answer
Question
The pure Object Oriented language is
Correct Answer
Java
Your Answer
C++

Select The Blank
Question
Web servers use the ________ protocol to communicate with web browsers.
Correct Answer
http
Your Answer
http

Select The Blank
Question
________ is the ability to handle error conditions, including the ability of the operating system to protect itself and its users from defective or malicious software.
Correct Answer
Reliability
Your Answer
Security

Multiple Choice Multiple Answer
Question
One-to-one model is supported by following systems :-
Correct Answer
Windows NT , OS/2
Your Answer
Solaris , Windows NT

Multiple Choice Single Answer
Question
Collection of similar datatypes is called as
Correct Answer
Array
Your Answer
Array

Multiple Choice Single Answer
Question
C++ is basically a procedural language having extension of
Correct Answer
Object Oriented technology
Your Answer
Graphic user interface

Multiple Choice Single Answer
Question
In Object Oriented technology following expression is appropriate
Correct Answer
object=data+menthods
Your Answer
method= data + object

Multiple Choice Single Answer
Question
If a class fruit has object mango, the relationship is expressed as :
Correct Answer
Fruit mango
Your Answer
Fruit mango

Multiple Choice Multiple Answer
Question
Find out the basic I/O hardware elements from the following :-
Correct Answer
Ports , Buses , Device controllers
Your Answer
Ports , Buses , Device controllers

Multiple Choice Single Answer
Question
Model of protection can be viewed abstractly as a matrix which is known as :-
Correct Answer
Access matrix
Your Answer
Access matrix

Multiple Choice Single Answer
Question
The 4.3BSD operating system is the version of :-
Correct Answer
UNIX
Your Answer
UNIX

True/False
Question
When application issues a blocking I/O system call, the request is placed on the queue for that device.
Correct Answer
True
Your Answer
False

Select The Blank
Question
________ is defined as a cooperation between object codes produced by different software vendors & written in different programming languages.
Correct Answer
Interoperability
Your Answer
Interoperability

True/False
Question
Linux is a multi-user, multitasking system with a full set of UNIX-compatible tools.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
DMA stands for :-
Correct Answer
Direct Memory Access
Your Answer
Direct Memory Access

Match The Following
Question
Correct Answer
Your Answer
Light-Weight processes
Thread
Solaris process
Parent process
Child process
Unix process
Foreground processes
Interactive processes
Interactive processes
Background processes
Batch processes
Thread

Multiple Choice Multiple Answer
Question
Find out the human-interface devices :-
Correct Answer
Screen , Keyboard , Mouse
Your Answer
Screen , Keyboard , Mouse

Select The Blank
Question
A process is ________ if it can affect or be affected by the other processes executing in the system.
Correct Answer
Cooperating
Your Answer
Independent

Multiple Choice Multiple Answer
Question
Liner address is divided into fields like :-
Correct Answer
Dir , Page , Offset
Your Answer
Dir , Page , File

True/False
Question
An I/O bound process spend more of its time doing I/O than it spends doing computations.
Correct Answer
True
Your Answer
False

Multiple Choice Single Answer
Question
In some systems, if a process terminates, then all its children must also be terminated. This phenomenon referred to as :-
Correct Answer
Cascading termination
Your Answer
Removing all

Multiple Choice Multiple Answer
Question
find out the services provided by kernel related to I/O :
Correct Answer
I/O Scheduling , Buffering , Spooling
Your Answer
I/O Scheduling , Buffering , I/o subsystem

True/False
Question
The language Classic-Ada is not OOPL
Correct Answer
False
Your Answer
True

Select The Blank
Question
In Linux, the allocator uses a ________ algorithm to keep track of available physical pages.
Correct Answer
Buddy-heap
Your Answer
Sort-first

Select The Blank
Question
________ describes segments local to each program, including its code, data, stack etc.
Correct Answer
LDT
Your Answer
LDT

True/False
Question
A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .
Correct Answer
False
Your Answer
False

True/False
Question
A copy of inode is kept in main memory while a file is open.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
The separation of policy and mechanism is important for which purpose?
Correct Answer
Flexibility
Your Answer
Costing

Select The Blank
Question
A ________ is a group of NT server machines that share a common security policy and user databases.
Correct Answer
Domain
Your Answer
Domain

Multiple Choice Single Answer
Question
If Dog derives from Mammal, and Mammal derives from Animal, then -
Correct Answer
Dog inherits Animal's functions and data
Your Answer
Dog inherits Animal's functions and data

True/False
Question
Keyboard is a sharable device.
Correct Answer
True
Your Answer
False
Multiple Choice Multiple Answer
Question
A mailbox can be owned by :-
Correct Answer
Operating system , Process
Your Answer
User , Process

Multiple Choice Single Answer
Question
Software may trigger an interrupt by executing a special operation called :-
Correct Answer
System call
Your Answer
Interrupt call

Match The Following
Question
Correct Answer
Your Answer
User mode
Mode bit 1
Monitor mode
Serial port
Modem
Modem
Parallel port
Printer
Printer
Privileged instructions
Monitor mode
UPS

Multiple Choice Multiple Answer
Question
The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :-
Correct Answer
Explicit , Implicit
Your Answer
Implicit , Indirect

Multiple Choice Multiple Answer
Question
What are the ways in which a request for kernel-mode execution can occur in Linux?
Correct Answer
Explicitly , Implicitly
Your Answer
Implicitly , Function call

Multiple Choice Multiple Answer
Question
Supervisor mode is also known as :-
Correct Answer
System mode , Privileged mode , Monitor mode
Your Answer
Privileged mode , Special mode

Multiple Choice Multiple Answer
Question
The role of the operating system in computer I/O is to :-
Correct Answer
Manage I/O operation and devices , Control I/O operation and devices
Your Answer
Manage I/O operation and devices , I/O processing

True/False
Question
In UNIX, first two names in every directory are "." and ".."
Correct Answer
True
Your Answer
False

Multiple Choice Multiple Answer
Question
Various storage systems available possesses which two characteristics?
Correct Answer
Volatile , Non-volatile
Your Answer
Primary storage , Secondary storage

Multiple Choice Single Answer
Question
A program in execution is:-
Correct Answer
Process
Your Answer
Operation

Select The Blank
Question
In some operating system, spooling is handled by an ________ .
Correct Answer
In-kernel thread
Your Answer
In-kernel thread

Select The Blank
Question
The hardware to measure elapsed time to trigger operations is called a ________.
Correct Answer
Programmable interval timer
Your Answer
Elapsed timer

True/False
Question
NFU algorithm requires a software counter associated with each page initially zero.
Correct Answer
True
Your Answer
True

True/False
Question
Volatile storage loses its contents when the power to the device is removed.
Correct Answer
True
Your Answer
False

Match The Following
Question
Correct Answer
Your Answer
MFT
Multi programming with fixed task
Multi programming with fixed task
RAM
Volatile memory
Volatile memory
ROM
Read only memory
Read only memory
BIOS
Basic input output system
Basic input output system

Select The Blank
Question
________ includes disks and tapes.
Correct Answer
Block devices
Your Answer
Socket interfaces

Select The Blank
Question
The process could create a new ________ and wait for its termination.
Correct Answer
Sub process
Your Answer
Child

True/False
Question
The cipher text can be stored in a readable file or transmitted over unprotected channels.
Correct Answer
True
Your Answer
True

Select The Blank
Question
The virtual memory portion of the NT executive is the ________.
Correct Answer
Virtual memory manager
Your Answer
Page-memory manager

Multiple Choice Single Answer
Question
The main difference between structure and class is
Correct Answer
Structure does not support OOPS Class Supports OOPS.
Your Answer
Structure is used in OOPS. Classes are used in procedural programs.

Multiple Choice Multiple Answer
Question
Find out different types of I/O buses :-
Correct Answer
EIDE , SCSI
Your Answer
EIDE , SCSI

Select The Blank
Question
________ passwords prevent improper authentication due to password exposure.
Correct Answer
One-time
Your Answer
Encrypted

Select The Blank
Question
Like worms, ________ are designed to spread into other programs and can wreak havoc in a system.
Correct Answer
Viruses
Your Answer
Trojan horses

Select The Blank
Question
A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote.
Correct Answer
Redirector
Your Answer
Director

Select The Blank
Question
One interface that is available in many operating systems, including UNIX and WindowsNT, is the network ________ interface.
Correct Answer
Socket
Your Answer
Device

True/False
Question
In Windows NT, kernel can be paged out of memory and its executions can be preempted.
Correct Answer
False
Your Answer
True

Multiple Choice Single Answer
Question
The insulation of data from direct access by the program is known as :
Correct Answer
Data hiding
Your Answer
Abstraction

Multiple Choice Single Answer
Question
The concept of OOPS was first introduced in
Correct Answer
Simula Language
Your Answer
Simula Language

Multiple Choice Multiple Answer
Question
locate the transmission devices :-
Correct Answer
Network cards , Modems
Your Answer
Network cards , Modems

Multiple Choice Single Answer
Question
How big is a class object?
Correct Answer
Is as big as sum of the sizes of its member variables
Your Answer
Is as big as sum of the sizes of its member variables

Multiple Choice Single Answer
Question
The system call checks the arguments given by the application, builds a data structure to convey the arguments to the kernel and then executes a special instruction called as :-
Correct Answer
Software interrupt
Your Answer
Special system call

Multiple Choice Multiple Answer
Question
Security violations of the system can be categorized as :-
Correct Answer
Malicious , Accidental
Your Answer
Unauthorized , Authorized

Select The Blank
Question
Most computers have ________ clocks and timers.
Correct Answer
Hardware
Your Answer
In-built

Multiple Choice Single Answer
Question
A domain is a collection of :-
Correct Answer
Access rights
Your Answer
Objects

True/False
Question
In paging the total address space can exceed the size of physical memory
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
Objects may communicate with each other through
Correct Answer
Methods
Your Answer
Methods

Multiple Choice Single Answer
Question
A system consists of collection of :-
Correct Answer
Processes
Your Answer
Processes

Multiple Choice Multiple Answer
Question
An audit log records which things about an object ?
Correct Answer
Time , User , Type of access
Your Answer
Time , Type of access

Multiple Choice Single Answer
Question
It has been said that Pascal and C programs are collections of procedures and C++ programs are collections of
Correct Answer
Classes
Your Answer
Classes

Select The Blank
Question
OOSAD begins with identification of actors, what activities they perform and building ________ model for the function.
Correct Answer
Use-case
Your Answer
Use-case

Multiple Choice Single Answer
Question
The smallest addressable portion of a disk is :-
Correct Answer
Sector
Your Answer
Sector

True/False
Question
OOSAD approach is applicable only to stable systems.
Correct Answer
False
Your Answer
True

True/False
Question
To perform a disk I/O operation, the computer places a command into the host controller, typically using memory-mapped I/O ports.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
The number of processes that are completed per time unit is called as:-
Correct Answer
Throughput of system
Your Answer
Efficiency of system

Multiple Choice Single Answer
Question
In MULTICS TLB address of 'n', the most recently referenced pages are kept, where 'n' can have a value :-
Correct Answer
16
Your Answer
8

True/False
Question
The job of I/O channel is to offload I/O work from the main CPU.
Correct Answer
True
Your Answer
False
Multiple Choice Multiple Answer
Question
Kernel threads are generally :-
Correct Answer
Slower to create , Difficult to manage
Your Answer
Slower to create , Difficult to manage

Select The Blank
Question
If the user-supplied password matches the password stored in the system, the system assumes that the user is ________.
Correct Answer
Legitimate
Your Answer
Legitimate

Multiple Choice Single Answer
Question
In general , the access matrix will be :-
Correct Answer
Sparse
Your Answer
Sparse

True/False
Question
Encryption is one common method of protecting information that is transmitted over unreliable links.
Correct Answer
True
Your Answer
False

Select The Blank
Question
A ________ is a full duplex connection between a device driver and a user-level process.
Correct Answer
Stream
Your Answer
Stream

Multiple Choice Single Answer
Question
In how many number of classes does the NRU algorithm divides pages, depending on the state of R and M?
Correct Answer
4
Your Answer
8

Select The Blank
Question
The Pentium page size is fixed at ________ KB.
Correct Answer
4
Your Answer
4

True/False
Question
Volatile storage loses its contents when the power to the device is removed.
Correct Answer
True
Your Answer
True

Multiple Choice Multiple Answer
Question
The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :-
Correct Answer
Explicit , Implicit
Your Answer
Explicit , Implicit

Select The Blank
Question
In queuing diagram, the arrow indicates the flow of ________ in the system.
Correct Answer
Processes
Your Answer
Processes

Multiple Choice Multiple Answer
Question
What are the forms of malicious access?
Correct Answer
Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data
Your Answer
Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data

Select The Blank
Question
A bit called the ________ , is added to the hardware of the computer to indicate the current mode.
Correct Answer
Mode bit
Your Answer
Mode bit

Multiple Choice Multiple Answer
Question
In Windows NT , kernel uses which two sets of objects?
Correct Answer
Dispatcher objects , Control objects
Your Answer
Dispatcher objects , Complex objects

Multiple Choice Single Answer
Question
The smallest addressable portion of a disk is :-
Correct Answer
Sector
Your Answer
Sector

True/False
Question
In FIFO algorithm the page removed from memory is the one which most recently used.
Correct Answer
False
Your Answer
False

Select The Blank
Question
A process is ________, if it cannot affect or be affected by the other processes executing in the system.
Correct Answer
Independent
Your Answer
Independent

Multiple Choice Multiple Answer
Question
Linux presents standard interfaces to whom?
Correct Answer
Programmer , User
Your Answer
Programmer , User , System administrator

Select The Blank
Question
The kernel module that controls a device is a ________ .
Correct Answer
Device driver
Your Answer
Device daemon

True/False
Question
Whenever a trap or interrupt occurs, the hardware switches from user mode to monitor mode.
Correct Answer
True
Your Answer
True

Select The Blank
Question
A ________ is a computer or router that sits between the trusted and untrusted systems.
Correct Answer
Firewall
Your Answer
Firewall

Multiple Choice Multiple Answer
Question
Find out the basic I/O hardware elements from the following :-
Correct Answer
Ports , Buses , Device controllers
Your Answer
Ports , Buses , Device controllers

True/False
Question
Object-oriented programming focuses on the integrated data and functionality as discrete units that have both knowledge (data) and capabilities (functions). Procedural programs, on the other hand, focus on functions and how they act on data.
Correct Answer
True
Your Answer
True

Match The Following
Question
Correct Answer
Your Answer
User mode
Mode bit 1
Mode bit 1
Serial port
Modem
Monitor mode
Parallel port
Printer
Printer
Privileged instructions
Monitor mode
Mode bit 0

True/False
Question
In segmentation the total address space can exceed the size of physical memory.
Correct Answer
True
Your Answer
False

Multiple Choice Single Answer
Question
Because of the concept of independent objects responding to messages, object orientation is a natural way to implement
Correct Answer
Event driven programming
Your Answer
Message deiven programming

Multiple Choice Single Answer
Question
In UNIX, everything below the system-call interface and above the physical hardware is the :-
Correct Answer
Kernel
Your Answer
I/O system

Multiple Choice Multiple Answer
Question
Different multithreading models available are :-
Correct Answer
Many-to-one model , One-to-one model , Many-to-many model
Your Answer
Many-to-one model , One-to-one model , Many-to-many model

Multiple Choice Multiple Answer
Question
An object type in windows NT is a system defined data type that has two things associated with it, which are they?
Correct Answer
Set of attributes , Set of methods
Your Answer
Object-type , Object-processing

Multiple Choice Multiple Answer
Question
When memory reference occurs in MULTICS the things which takes place are :-
Correct Answer
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address
Your Answer
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined

Multiple Choice Single Answer
Question
The interval from the time of submission of a process to the time of completion is :-
Correct Answer
Turnaround time
Your Answer
Turnaround time

True/False
Question
Context switch times are highly dependent on hardware support.
Correct Answer
True
Your Answer
True

True/False
Question
Procedure and data can be distinguished and separately protected in segmentation
Correct Answer
True
Your Answer
True

Multiple Choice Multiple Answer
Question
Dispatcher functions involves the following :-
Correct Answer
Switching context , Switching to user mode
Your Answer
Switching context , Switching to user mode

Multiple Choice Single Answer
Question
The First version of UNIX was developed in 1969 by Ken Thompson of the Research Group at :-
Correct Answer
Bell Laboratories
Your Answer
Bell Laboratories

Multiple Choice Single Answer
Question
In Object Oriented technology following expression is appropriate
Correct Answer
object=data+menthods
Your Answer
object=data+menthods

Multiple Choice Single Answer
Question
A procedure body implementing an operation is termed as
Correct Answer
Method
Your Answer
Method

Select The Blank
Question
During execution, ________ register holds the sector for the code segment.
Correct Answer
CS
Your Answer
PS

True/False
Question
In some operating system, spooling is managed by a system daemon process.
Correct Answer
True
Your Answer
False

Select The Blank
Question
Each column in the access matrix can be implemented as an ________ for one object.
Correct Answer
Access list
Your Answer
Capability list

Multiple Choice Single Answer
Question
Policies for resource use may vary depending on the :-
Correct Answer
Application
Your Answer
System

Multiple Choice Multiple Answer
Question
A mailbox can be owned by :-
Correct Answer
Process , Operating system
Your Answer
User , Process , Program

Multiple Choice Single Answer
Question
The ready queue is generally stored as a :-
Correct Answer
Linked list
Your Answer
Queue

Select The Blank
Question
A ________ is region of fast memory that hold copies of data .
Correct Answer
Cache
Your Answer
Cache

Multiple Choice Multiple Answer
Question
What are the components to memory management under Linux?
Correct Answer
Physical memory manager , Virtual memory manager
Your Answer
Physical memory manager , Virtual memory manager

Match The Following
Question
Correct Answer
Your Answer
Bounded-buffer
Fixed size buffer
Fixed size buffer
Producer
Produces process
Produces process
Consumer
Consumes process
Consumes process
Unbounded-buffer
No limit on size of buffer
No limit on size of buffer

True/False
Question
The inode contains 15 pointers to the disk blocks containing the data contents of the file.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
When computer is powered up or rebooted, it needs to have an initial program to run. This initial program is known as :-
Correct Answer
Bootstrap program
Your Answer
Bootstrap program
Select The Blank
Question
Like worms, ________ are designed to spread into other programs and can wreak havoc in a system.
Correct Answer
Viruses
Your Answer
Viruses

Multiple Choice Multiple Answer
Question
The advantage of dynamic loading is
Correct Answer
Unused routine is never loaded , Useful when large amount of code are needed to handle infrequently occurring cases, such as error routines , It does not require special support from the operating system
Your Answer
Useful when large amount of code are needed to handle infrequently occurring cases, such as error routines , It does not require special support from the operating system , Unused routine is never loaded

Select The Blank
Question
Terminals and line printers are ________ .
Correct Answer
Character devices
Your Answer
Socket interfaces

Multiple Choice Multiple Answer
Question
A mailbox can be owned by :-
Correct Answer
Process , Operating system
Your Answer
Process , Operating system

Select The Blank
Question
A process is ________, if it cannot affect or be affected by the other processes executing in the system.
Correct Answer
Independent
Your Answer
Cooperating

True/False
Question
NFU is crude attempt to approximate LRU.
Correct Answer
True
Your Answer
False

True/False
Question
A copy of inode is kept in main memory while a file is open.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
The class bird should have object
Correct Answer
Egale
Your Answer
Egale

Multiple Choice Multiple Answer
Question
User thread libraries include :-
Correct Answer
POSIX Pthreads , Mach C-threads , Solaris threads
Your Answer
Mach C-threads , Solaris threads

True/False
Question
We can include dynamic protection in the access-matrix model by considering the domains and the access matrix itself as objects.
Correct Answer
True
Your Answer
True

True/False
Question
The capability list is associated with a domain.
Correct Answer
True
Your Answer
True

Select The Blank
Question
A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote.
Correct Answer
Redirector
Your Answer
Redirector

Select The Blank
Question
The ________ is a compromise between access lists and capability lists.
Correct Answer
Lock-Key Schemes
Your Answer
Protected procedures

Match The Following
Question
Correct Answer
Your Answer
Bit showing the availability of page in memory for which that entry belongs to
Present / absent bit
Modified bit
In page table entry, the access permitted are stored in
Protection bit
Protection bit
Bit is set when the page is referenced
Referenced bit
Referenced bit
Bit which keeps track of page usage
Modified bit
Security bit

Multiple Choice Single Answer
Question
In UNIX, files are organized in tree-structured :-
Correct Answer
Directories
Your Answer
Directories

Match The Following
Question
Correct Answer
Your Answer
We can define abstract operation on abstract data
Data abstraction
Data abstraction
Process of sharing properties of the higher level object or class
Inheritance
Inheritance
Ability to inherit attributes and methods from 2 or more objects or classes
Multiple inheritance
Multiple inheritance
Ability to send a message to several objects and to allow receiving object to respond method specified on the object.
Ploymorphism
Ploymorphism

Select The Blank
Question
The Solaris developers reimplemented the ________ using in-kernel thread to eliminate the context switch involved in moving each character between daemons and the kernel.
Correct Answer
Telnet daemon
Your Answer
Context-switch daemon

Multiple Choice Single Answer
Question
If the process is waiting for some event to occur then it is said to be in :-
Correct Answer
Waiting state
Your Answer
Ready state

True/False
Question
Cache is a non-volatile storage system.
Correct Answer
False
Your Answer
False

Multiple Choice Single Answer
Question
The wraping up of data and methods in a single unit (class) is known as :
Correct Answer
Encapsulation
Your Answer
Encapsulation

True/False
Question
A process is a victim of starvation if it becomes stuck in a scheduling queue indefinitely.
Correct Answer
True
Your Answer
True

Select The Blank
Question
________ file access can be layered on top of block-device drivers.
Correct Answer
Memory-mapped
Your Answer
Memory-mapped

Multiple Choice Multiple Answer
Question
find out the services provided by kernel related to I/O :
Correct Answer
I/O Scheduling , Buffering , Spooling
Your Answer
I/O Scheduling , Buffering , Spooling

Multiple Choice Multiple Answer
Question
The role of the operating system in computer I/O is to :-
Correct Answer
Manage I/O operation and devices , Control I/O operation and devices
Your Answer
Manage I/O operation and devices , Control I/O operation and devices

True/False
Question
In Lock-key mechanism, a process executing in a domain can access an object if that domain has a key that matches one of the locks of the objects.
Correct Answer
True
Your Answer
False

Multiple Choice Multiple Answer
Question
There are components to the module support under Linux, identify them :-
Correct Answer
Module management , Driver registration , Conflict-resolution mechanism
Your Answer
Module management , Driver registration , Conflict-resolution mechanism

Multiple Choice Single Answer
Question
The 4.3BSD operating system is the version of :-
Correct Answer
UNIX
Your Answer
UNIX

Select The Blank
Question
Each entry in the access matrix consists of a set of ________ .
Correct Answer
Access right
Your Answer
Access right

Multiple Choice Single Answer
Question
In UNIX, a file is represented by an :-
Correct Answer
Inode
Your Answer
Block

Multiple Choice Single Answer
Question
The segment is :-
Correct Answer
Logical entity
Your Answer
Logical entity

True/False
Question
In Windows NT, each process has one or more threads, which are the units of execution dispatched by the kernel.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
UNIX operating system is written mostly in :-
Correct Answer
C language
Your Answer
C++ language

Multiple Choice Multiple Answer
Question
Security violations of the system can be categorized as :-
Correct Answer
Malicious , Accidental
Your Answer
Malicious , Authorized

Multiple Choice Single Answer
Question
The smallest addressable portion of a disk is :-
Correct Answer
Sector
Your Answer
Sector

Select The Blank
Question
Associations are generally ________.
Correct Answer
Bidirectional
Your Answer
Bidirectional

Multiple Choice Multiple Answer
Question
Find out the human-interface devices :-
Correct Answer
Screen , Keyboard , Mouse
Your Answer
Screen , Keyboard , Mouse

Select The Blank
Question
________allows us to define abstract operations on abstract data.
Correct Answer
Data abstraction
Your Answer
Data abstraction

Multiple Choice Multiple Answer
Question
Once the I/O is started , which two courses of action are possible?
Correct Answer
Synchronous I/O , Asynchronous I/O , Simple I/O
Your Answer
Synchronous I/O , Asynchronous I/O , Simple I/O

Multiple Choice Multiple Answer
Question
In windows NT, naming of objects is of two types :-
Correct Answer
Permanent name , Temporary name
Your Answer
Permanent name , Temporary name

True/False
Question
Turnaround time is inversely proportional to throughput.
Correct Answer
True
Your Answer
True

Select The Blank
Question
The hardware to measure elapsed time to trigger operations is called a ________.
Correct Answer
Programmable interval timer
Your Answer
Programmable elapsed timer

Multiple Choice Multiple Answer
Question
User level threads are generally :-
Correct Answer
Fast to create , Easy to manage
Your Answer
Fast to create , Easy to manage

Multiple Choice Single Answer
Question
In MULTICS TLB address of 'n', the most recently referenced pages are kept, where 'n' can have a value :-
Correct Answer
16
Your Answer
16

Multiple Choice Single Answer
Question
C++ is also named as
Correct Answer
C with classes
Your Answer
C with classes

Multiple Choice Multiple Answer
Question
Liner address is divided into fields like :-
Correct Answer
Dir , Page , Offset
Your Answer
Dir , Page , Offset

Multiple Choice Single Answer
Question
DVMA stands for :-
Correct Answer
Direct Virtual Memory Access
Your Answer
Direct Virtual Memory Access

True/False
Question
An asynchronous call returns immediately, without waiting for the I/O to complete.
Correct Answer
True
Your Answer
True
Select The Blank
Question
Web servers use the ________ protocol to communicate with web browsers.
Correct Answer
http
Your Answer
http

True/False
Question
Cache-coherency is usually a software problem and handled above the operating system level.
Correct Answer
False
Your Answer
True

Multiple Choice Multiple Answer
Question
Two main jobs of a computer are :-
Correct Answer
I/O , Processing
Your Answer
I/O , Processing

Multiple Choice Multiple Answer
Question
What are the ways in which a request for kernel-mode execution can occur in Linux?
Correct Answer
Explicitly , Implicitly
Your Answer
Explicitly , Implicitly

Select The Blank
Question
If the user-supplied password matches the password stored in the system, the system assumes that the user is ________.
Correct Answer
Legitimate
Your Answer
Legitimate

True/False
Question
Single-indirect block is an index block which contains data of the files to which it points.
Correct Answer
False
Your Answer
True

True/False
Question
Volatile storage loses its contents when the power to the device is removed.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
SCSI stands for :-
Correct Answer
Small Computer-Systems Interface
Your Answer
System Call-System Interrupt

Multiple Choice Multiple Answer
Question
Which are the Division D security systems ?
Correct Answer
Windows 3.1 , MS-DOS
Your Answer
Windows NT , UNIX

Select The Blank
Question
static binding allows to hold certain properties fixed and rigid, whereas ________ binding allows object to behave as per conditions emerge.
Correct Answer
Dynamic
Your Answer
Dynamic

Multiple Choice Multiple Answer
Question
What are the components to memory management under Linux?
Correct Answer
Physical memory manager , Virtual memory manager
Your Answer
Physical memory manager , Virtual memory manager

Multiple Choice Single Answer
Question
The First version of UNIX was developed in 1969 by Ken Thompson of the Research Group at :-
Correct Answer
Bell Laboratories
Your Answer
Bell Laboratories

True/False
Question
XML is a meta data language developed to specify data with a goal of improving interoperatability of different data sources.
Correct Answer
True
Your Answer
True

True/False
Question
One way to achieve portability is to write software in standard version of high level language and to develop portable system and application software .
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
C++ is basically a procedural language having extension of
Correct Answer
Object Oriented technology
Your Answer
Object Oriented technology

Select The Blank
Question
The ________ of a process is represented in the PCB of a process.
Correct Answer
Context
Your Answer
Context

Select The Blank
Question
In windows NT, the ________ facility is used to pass requests and results between client and server processes within a single machine.
Correct Answer
Local-procedure-call
Your Answer
Remote-procedure-call

Multiple Choice Single Answer
Question
In how many number of classes does the NRU algorithm divides pages, depending on the state of R and M?
Correct Answer
4
Your Answer
4

Multiple Choice Multiple Answer
Question
When memory reference occurs in MULTICS the things which takes place are :-
Correct Answer
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address
Your Answer
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address

Multiple Choice Multiple Answer
Question
Supervisor mode is also known as :-
Correct Answer
System mode , Privileged mode , Monitor mode
Your Answer
System mode , Privileged mode , Monitor mode

Multiple Choice Single Answer
Question
How big is a class object?
Correct Answer
Is as big as sum of the sizes of its member variables
Your Answer
Is as big as sum of the sizes of its member variables

Multiple Choice Multiple Answer
Question
The device number consists of which two parts in UNIX?
Correct Answer
Major device number , Minor device number
Your Answer
Major device number , Minor device number

Select The Blank
Question
The context switch time is pure ________, because system does no useful work while switching.
Correct Answer
Overhead
Your Answer
Wastage

Multiple Choice Multiple Answer
Question
In Solaris 2, user-level threads may be:-
Correct Answer
Bound , Unbound
Your Answer
Bound , Unbound

Match The Following
Question
Correct Answer
Your Answer
Random-access devices
CD-ROM
CD-ROM
Character devices.
Terminal
Keyboard
Block devices
Disk
Tape
Sequential devices
Modem
Terminal

Multiple Choice Single Answer
Question
The main difference between structure and class is
Correct Answer
Structure does not support OOPS Class Supports OOPS.
Your Answer
Structure does not support OOPS Class Supports OOPS.

True/False
Question
Object-oriented programming focuses on the integrated data and functionality as discrete units that have both knowledge (data) and capabilities (functions). Procedural programs, on the other hand, focus on functions and how they act on data.
Correct Answer
True
Your Answer
True

Select The Blank
Question
A keyboard is an example of device that is accessed through a ________ interface.
Correct Answer
Character stream
Your Answer
Character stream

Multiple Choice Multiple Answer
Question
Find out the CPU scheduling algorithms from these options :-
Correct Answer
FCFS , RR , SJF
Your Answer
FCFS , RR , SJF

Multiple Choice Single Answer
Question
Main Memory of computer program is also called as :-
Correct Answer
RAM
Your Answer
RAM

Multiple Choice Multiple Answer
Question
The security of a system can be improved by two management techniques, such as :-
Correct Answer
Threat monitoring , Audit Log
Your Answer
Threat monitoring , Audit Log

Multiple Choice Single Answer
Question
The separation of policy and mechanism is important for which purpose?
Correct Answer
Flexibility
Your Answer
Flexibility

Match The Following
Question
Correct Answer
Your Answer
Trap in which program tries to use unmapped page
Page fault
Page fault
Memory Management Unit
MMU
MMU
Smaller units in which virtual address space is divided
Pages
Pages
Units in physical memory corresponding to pages in virtual memory
Page frame
Page frame

True/False
Question
A non-blocking call does not halt the execution of the application for an extended time.
Correct Answer
True
Your Answer
True

True/False
Question
Windows NT uses a message passing implementation for I/O.
Correct Answer
True
Your Answer
True

Multiple Choice Multiple Answer
Question
Kernel threads are generally :-
Correct Answer
Slower to create , Difficult to manage
Your Answer
Slower to create , Difficult to manage

Multiple Choice Single Answer
Question
The long-term scheduler controls the :-
Correct Answer
Degree of multiprogramming
Your Answer
Degree of multiprogramming

Multiple Choice Single Answer
Question
Objects may communicate with each other through
Correct Answer
Methods
Your Answer
Methods

Select The Blank
Question
In queuing diagram, the arrow indicates the flow of ________ in the system.
Correct Answer
Processes
Your Answer
Queue

Multiple Choice Single Answer
Question
If Dog derives from Mammal, and Mammal derives from Animal, then -
Correct Answer
Dog inherits Animal's functions and data
Your Answer
Dog inherits Animal's functions and data

Multiple Choice Single Answer
Question
Thread at user level is known as :-
Correct Answer
User thread
Your Answer
User thread

Select The Blank
Question
________ includes disks and tapes.
Correct Answer
Block devices
Your Answer
Block devices

Multiple Choice Single Answer
Question
DMA stands for :-
Correct Answer
Direct Memory Access
Your Answer
Direct Memory Access

True/False
Question
When application issues a blocking I/O system call, the request is placed on the queue for that device.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
The concept of OOPS was first introduced in
Correct Answer
Simula Language
Your Answer
Simula Language

True/False
Question
Encryption is one common method of protecting information that is transmitted over unreliable links.
Correct Answer
True
Your Answer
True

Select The Blank
Question
________ describes segments local to each program, including its code, data, stack etc.
Correct Answer
LDT
Your Answer
LDT
Multiple Choice Single Answer
Question
SCSI stands for :-
Correct Answer
Small Computer-Systems Interface
Your Answer
Small Computer-Systems Interface

Multiple Choice Multiple Answer
Question
The basic hardware elements involved in I/O are :-
Correct Answer
Buses , Device controllers , Device
Your Answer
Buses , Device controllers , Device

True/False
Question
A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .
Correct Answer
False
Your Answer
False

True/False
Question
C++ supports object oriented programming concepts of objects, classes, inheritance, polymorphism and parameterised datatypes.
Correct Answer
True
Your Answer
True

True/False
Question
I/O system calls are costly in terms of CPU consumptions.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
All user processes are descendents of one original process, Which is that process?
Correct Answer
Init process
Your Answer
Init process

Match The Following
Question
Correct Answer
Your Answer
Provides adjustment while compiling classes
Interface classes
Derived function
Identify values & relevant operations
Abstract data types
Abstract data types
Complete implementation of class
Concrete data types
Interface classes
Provides framework for other classes
Node classes
Node classes

Match The Following
Question
Correct Answer
Your Answer
Round-robin
Time quantum
Time quantum
First-come First-served
First come job
First come job
Shortest job
Shortest job
Shortest job
Priority
Highest priority job
Highest priority job

Select The Blank
Question
________ describes segments local to each program, including its code, data, stack etc.
Correct Answer
LDT
Your Answer
LDT

Multiple Choice Multiple Answer
Question
To protect the system, we must take security measures at two levels, such as :-
Correct Answer
Physical level , Human level
Your Answer
Physical level , Human level

True/False
Question
The hardware allows privileged instructions to be executed in only user mode.
Correct Answer
False
Your Answer
False

Multiple Choice Single Answer
Question
What does the rows of the access matrix represents?
Correct Answer
Domains
Your Answer
Domains

Select The Blank
Question
A bit called the ________ , is added to the hardware of the computer to indicate the current mode.
Correct Answer
Mode bit
Your Answer
Mode bit

True/False
Question
In Windows NT, each process has one or more threads, which are the units of execution dispatched by the kernel.
Correct Answer
True
Your Answer
True

Select The Blank
Question
________allows us to define abstract operations on abstract data.
Correct Answer
Data abstraction
Your Answer
Data abstraction

Select The Blank
Question
If the granularity field is ________ the limit field is the exact segment size, upto 1 MB.
Correct Answer
0
Your Answer
1

True/False
Question
Encryption is one common method of protecting information that is transmitted over unreliable links.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
Collection of similar datatypes is called as
Correct Answer
Array
Your Answer
Array

Multiple Choice Single Answer
Question
A Process which produces process is known as :-
Correct Answer
Producer
Your Answer
Producer

Multiple Choice Single Answer
Question
Interrupt mechanism accepts an address and this address is an offset in a table called the :-
Correct Answer
Interrupt vector
Your Answer
Interrupt vector

Select The Blank
Question
The process could create a new ________ and wait for its termination.
Correct Answer
Sub process
Your Answer
Sub process

Multiple Choice Single Answer
Question
Thread at user level is known as :-
Correct Answer
User thread
Your Answer
User thread

Multiple Choice Single Answer
Question
If Dog derives from Mammal, and Mammal derives from Animal, then -
Correct Answer
Dog inherits Animal's functions and data
Your Answer
Mammal inherits Animal's functions and data

Select The Blank
Question
During execution, ________ register holds the sector for the code segment.
Correct Answer
CS
Your Answer
DS

Multiple Choice Single Answer
Question
The list of processes waiting for a particular I/O device is called a :-
Correct Answer
Device queue
Your Answer
Device queue

True/False
Question
Cache is a faster storage system which stores data temporarily.
Correct Answer
True
Your Answer
True

True/False
Question
The file system does not provide a degree of protection.
Correct Answer
False
Your Answer
True

Multiple Choice Multiple Answer
Question
Liner address is divided into fields like :-
Correct Answer
Dir , Page , Offset
Your Answer
Dir , Page , Offset

True/False
Question
Volatile storage loses its contents when the power to the device is removed.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
Which of the following Operating System has no memory protection ?
Correct Answer
Windows 3.1
Your Answer
Windows 3.1

Multiple Choice Multiple Answer
Question
In windows NT, naming of objects is of two types :-
Correct Answer
Permanent name , Temporary name
Your Answer
Permanent name , Temporary name

Multiple Choice Single Answer
Question
Protection can no longer be considered solely as a matter of concern to the designer of :-
Correct Answer
Operating system
Your Answer
Operating system

Select The Blank
Question
Web servers use the ________ protocol to communicate with web browsers.
Correct Answer
http
Your Answer
http

Multiple Choice Multiple Answer
Question
locate the transmission devices :-
Correct Answer
Network cards , Modems
Your Answer
Network cards , Modems

Multiple Choice Single Answer
Question
In UNIX, the simplest form of communication between processes is by :-
Correct Answer
Pipes
Your Answer
Pipes

Select The Blank
Question
A ________ is a group of NT server machines that share a common security policy and user databases.
Correct Answer
Domain
Your Answer
Domain

Multiple Choice Multiple Answer
Question
Message passing may be :-
Correct Answer
Blocking , Non-blocking
Your Answer
Blocking , Non-blocking

Multiple Choice Multiple Answer
Question
An object type in windows NT is a system defined data type that has two things associated with it, which are they?
Correct Answer
Set of attributes , Set of methods
Your Answer
Set of attributes , Set of methods

Select The Blank
Question
The ________ of a process is represented in the PCB of a process.
Correct Answer
Context
Your Answer
Context

Select The Blank
Question
The Linux ________ file system, known as the proc file system, is an example of a file system whose contents are not actually stored anywhere, but are rather computed on demand according to user file I/o requests.
Correct Answer
Process
Your Answer
Process

True/False
Question
Objects can be both, tangible or intangible.
Correct Answer
True
Your Answer
True

Multiple Choice Multiple Answer
Question
In UNIX, a device is distinguished by two things, which are :-
Correct Answer
Device-class , Device number
Your Answer
Device-class , Device number

Multiple Choice Multiple Answer
Question
Find out the basic I/O hardware elements from the following :-
Correct Answer
Ports , Buses , Device controllers
Your Answer
Ports , Buses , Device controllers

Multiple Choice Multiple Answer
Question
Which are the Division D security systems ?
Correct Answer
Windows 3.1 , MS-DOS
Your Answer
Windows 3.1 , MS-DOS

Multiple Choice Single Answer
Question
Protection can improve :-
Correct Answer
Reliability
Your Answer
Reliability

Select The Blank
Question
The creating process is called a ________ process.
Correct Answer
Parent
Your Answer
Parent

Multiple Choice Multiple Answer
Question
When memory reference occurs in MULTICS the things which takes place are :-
Correct Answer
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address
Your Answer
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address
Multiple Choice Multiple Answer
Question
The Linux system is composed of three main bodies of code, in line with most traditional UNIX implementations. Which are :-
Correct Answer
Kernel , System libraries , System utilities
Your Answer
System libraries , Programs , Kernel

Multiple Choice Single Answer
Question
The class bird should have object
Correct Answer
Egale
Your Answer
Egale

Multiple Choice Single Answer
Question
Objects are essentially :-
Correct Answer
Abstract data type
Your Answer
Abstract data type

True/False
Question
Banker's algorithm is a deadlock-avoidance algorithm.
Correct Answer
True
Your Answer
True

True/False
Question
Aging algorithm is based on LRU.
Correct Answer
True
Your Answer
False

Select The Blank
Question
MULTICS uses a ________ in addition to file access for protection.
Correct Answer
Ring structure
Your Answer
Ring structure

True/False
Question
A virus is a fragment of code embedded in a legitimate program
Correct Answer
True
Your Answer
True

Multiple Choice Multiple Answer
Question
The basic hardware elements involved in I/O are :-
Correct Answer
Buses , Device controllers , Device
Your Answer
Keyboard , Buses , Device controllers

True/False
Question
Main Memory is a volatile storage device that loses its contents when power is turned off.
Correct Answer
True
Your Answer
True

Select The Blank
Question
In queuing diagram , each rectangular box represents a ________.
Correct Answer
Queue
Your Answer
Queue

True/False
Question
Whenever a trap or interrupt occurs, the hardware switches from user mode to monitor mode.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
As process enter the system, they are put into :-
Correct Answer
Job queue
Your Answer
Job queue

Select The Blank
Question
During execution, ________ register holds the sector for the data segment.
Correct Answer
DS
Your Answer
CS

Multiple Choice Multiple Answer
Question
The role of the operating system in computer I/O is to :-
Correct Answer
Manage I/O operation and devices , Control I/O operation and devices
Your Answer
Manage I/O operation and devices , Control I/O operation and devices

Multiple Choice Multiple Answer
Question
What are the forms of malicious access?
Correct Answer
Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data
Your Answer
Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data

Select The Blank
Question
A ________ is a computer or router that sits between the trusted and untrusted systems.
Correct Answer
Firewall
Your Answer
Firewall

Multiple Choice Multiple Answer
Question
Dispatcher functions involves the following :-
Correct Answer
Switching context , Switching to user mode
Your Answer
Switching context , Switching to user mode

Multiple Choice Multiple Answer
Question
Many-to-may model is supported by following operating systems :-
Correct Answer
Solaris , IRIX , Digital UNIX
Your Answer
IRIX , Solaris

Select The Blank
Question
A ________ controller is built into each disk drive.
Correct Answer
Disk
Your Answer
Disk

Match The Following
Question
Correct Answer
Your Answer
Parent process
Child process
Child process
Foreground processes
Interactive processes
Interactive processes
Background processes
Batch processes
Batch processes
Light-Weight processes
Thread
Thread

Select The Blank
Question
A class may be thought of as 'data-type' and object as ________ of that data-type.
Correct Answer
Variable
Your Answer
Variable

True/False
Question
In Windows NT, interrupt object binds an interrupt service routine to an interrupt source.
Correct Answer
True
Your Answer
True

True/False
Question
In Windows NT, each process has one or more threads, which are the units of execution dispatched by the kernel.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
If Dog derives from Mammal, and Mammal derives from Animal, then -
Correct Answer
Dog inherits Animal's functions and data
Your Answer
Mammal inherits Animal's functions and data

Multiple Choice Single Answer
Question
If the process is waiting to be assigned to CPU then it is said to be in :-
Correct Answer
Ready state
Your Answer
Ready state

Multiple Choice Multiple Answer
Question
What are the components to memory management under Linux?
Correct Answer
Physical memory manager , Virtual memory manager
Your Answer
Physical memory manager , Virtual memory manager

Multiple Choice Multiple Answer
Question
The Moriss Internet Worm was made up of which of the two programs?
Correct Answer
Grappling hook program , Main program
Your Answer
Target worm program , Grappling hook program

Select The Blank
Question
The ________ controller is the controller at the computer end of the bus.
Correct Answer
Host
Your Answer
Disk

True/False
Question
In Windows NT, kernel is object-oriented.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
C++ is basically a procedural language having extension of
Correct Answer
Object Oriented technology
Your Answer
Graphic user interface

Select The Blank
Question
In queuing diagram, the arrow indicates the flow of ________ in the system.
Correct Answer
Processes
Your Answer
Operation

True/False
Question
Whenever the operating system gains control of the computer, it is in monitor mode.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
C++ is also named as
Correct Answer
C with classes
Your Answer
Visual C++

Multiple Choice Single Answer
Question
The number of processes that are completed per time unit is called as:-
Correct Answer
Throughput of system
Your Answer
Efficiency of system

Select The Blank
Question
A process is ________ if it can affect or be affected by the other processes executing in the system.
Correct Answer
Cooperating
Your Answer
Competing

Multiple Choice Single Answer
Question
Collection of similar datatypes is called as
Correct Answer
Array
Your Answer
Array

Match The Following
Question
Correct Answer
Your Answer
Random-access devices
CD-ROM
CD-ROM
Character devices.
Terminal
Terminal
Block devices
Disk
Disk
Sequential devices
Modem
Modem

Multiple Choice Multiple Answer
Question
The device number consists of which two parts in UNIX?
Correct Answer
Major device number , Minor device number
Your Answer
Device-id , Device-name

Multiple Choice Single Answer
Question
The pure Object Oriented language is
Correct Answer
Java
Your Answer
C

Multiple Choice Single Answer
Question
The concept of OOPS was first introduced in
Correct Answer
Simula Language
Your Answer
C language

Multiple Choice Multiple Answer
Question
Most CPUs have two interrupt request lines. Which are they?
Correct Answer
Maskable , Non maskable
Your Answer
Maskable , Non maskable

Multiple Choice Multiple Answer
Question
Different multithreading models available are :-
Correct Answer
Many-to-one model , One-to-one model , Many-to-many model
Your Answer
Many-to-one model , One-to-one model , Many-to-many model

Select The Blank
Question
The ________ of a process is represented in the PCB of a process.
Correct Answer
Context
Your Answer
Block
Multiple Choice Multiple Answer
Question
locate the transmission devices :-
Correct Answer
Network cards , Modems
Your Answer
Tapes , Network cards , Modems

True/False
Question
The user process issues a network I/O system call to send the character to the remote machine.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
The process by which objects of one class acquire properties of objects of other class is called
Correct Answer
Inheritance
Your Answer
Inheritance

True/False
Question
Windows NT uses a message passing implementation for I/O.
Correct Answer
True
Your Answer
True

Multiple Choice Multiple Answer
Question
We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes?
Correct Answer
User mode , Monitor mode
Your Answer
User mode , Monitor mode

Match The Following
Question
Correct Answer
Your Answer
Round-robin
Time quantum
Time quantum
First-come First-served
First come job
First come job
Shortest job
Shortest job
Shortest job
Priority
Highest priority job
Highest priority job

Multiple Choice Single Answer
Question
The segment is :-
Correct Answer
Logical entity
Your Answer
Logical entity

Multiple Choice Single Answer
Question
In UNIX, decisions regarding which process to swap in or out are made by whom?
Correct Answer
Swapper
Your Answer
Memory handler

Select The Blank
Question
A ________ is a client-server mechanism that enables an application on one machine to make a procedure call to code on another machine.
Correct Answer
Remote-procedure-call
Your Answer
Remote-procedure-call

Multiple Choice Single Answer
Question
When each process that wants to communicate must explicitly name the recipient or sender of the communication, then such communication is called as :-
Correct Answer
Direct communication
Your Answer
Indirect communication

Select The Blank
Question
In Linux, the allocator uses a ________ algorithm to keep track of available physical pages.
Correct Answer
Buddy-heap
Your Answer
Binary-search

Multiple Choice Single Answer
Question
What does the rows of the access matrix represents?
Correct Answer
Domains
Your Answer
Domains

Multiple Choice Single Answer
Question
Every change in policy requires a change in the underlying :-
Correct Answer
Mechanism
Your Answer
System

Select The Blank
Question
A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote.
Correct Answer
Redirector
Your Answer
Domain

Multiple Choice Multiple Answer
Question
In Solaris 2, user-level threads may be:-
Correct Answer
Bound , Unbound
Your Answer
Bound , Unbound

Multiple Choice Multiple Answer
Question
An audit log records which things about an object ?
Correct Answer
Time , User , Type of access
Your Answer
Time , User , Type of access

Multiple Choice Multiple Answer
Question
One-to-one model is supported by following systems :-
Correct Answer
Windows NT , OS/2
Your Answer
OS/2 , Windows NT

Multiple Choice Multiple Answer
Question
To protect the system, we must take security measures at two levels, such as :-
Correct Answer
Physical level , Human level
Your Answer
Human level , Global level

Multiple Choice Single Answer
Question
If the process is waiting for some event to occur then it is said to be in :-
Correct Answer
Waiting state
Your Answer
Waiting state

Multiple Choice Single Answer
Question
A common representation for a discussion of process scheduling is a :-
Correct Answer
Queuing diagram
Your Answer
Process state diagram

True/False
Question
At Physical level, the site or sites containing the computer systems must be physically secured against armed or surreptitious entry by intruders.
Correct Answer
True
Your Answer
True

Select The Blank
Question
When you express user-system interaction, the scenario in the model is called ________
Correct Answer
Case model
Your Answer
Case model

True/False
Question
Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention.
Correct Answer
False
Your Answer
True

True/False
Question
A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .
Correct Answer
False
Your Answer
False

Multiple Choice Single Answer
Question
Polymorphism means ability to take
Correct Answer
More than one form
Your Answer
More than one form

True/False
Question
Aging algorithm is based on LRU.
Correct Answer
True
Your Answer
True

Select The Blank
Question
The virtual memory portion of the NT executive is the ________.
Correct Answer
Virtual memory manager
Your Answer
Virtual memory manager

Multiple Choice Multiple Answer
Question
There are two types of Message passing, they are :-
Correct Answer
Synchronous , Asynchronous
Your Answer
Synchronous , Asynchronous

Select The Blank
Question
Web servers use the ________ protocol to communicate with web browsers.
Correct Answer
http
Your Answer
http

Multiple Choice Multiple Answer
Question
The security of a system can be improved by two management techniques, such as :-
Correct Answer
Threat monitoring , Audit Log
Your Answer
Audit Log , Threat finding

Select The Blank
Question
The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________.
Correct Answer
Ring
Your Answer
Ring

True/False
Question
We say that a system is secure if its resources are used and accessed as intended under all circumstances.
Correct Answer
True
Your Answer
True

Select The Blank
Question
The ________ controller is the controller at the computer end of the bus.
Correct Answer
Host
Your Answer
Cpu

Multiple Choice Multiple Answer
Question
In Linux, the paging system can be divided into sections, namely:-
Correct Answer
Policy algorithm , Paging mechanism
Your Answer
Policy algorithm , Paging mechanism

True/False
Question
Keyboard is a sharable device.
Correct Answer
True
Your Answer
False

True/False
Question
Transfer of data from disk to memory is usually controlled by the operating system.
Correct Answer
True
Your Answer
True

True/False
Question
Prototyping not only helps to build a quality design but also enables the designer to build the system decremantally.
Correct Answer
False
Your Answer
True

Select The Blank
Question
The UNIX system uses ________ to avoid the necessity of keeping its password list secret.
Correct Answer
Encryption
Your Answer
Encryption

Match The Following
Question
Correct Answer
Your Answer
Read-write devices
Disks
Disks
Dedicated devices
Tape
CD-ROM
Read-only devices
CD-ROM
Tape
Write-only devices
Graphics controller
Keyboard

Multiple Choice Single Answer
Question
A procedure call, request to execute a method is termed as
Correct Answer
Message
Your Answer
Message

Select The Blank
Question
Context switch times are highly dependent on ________ support.
Correct Answer
Hardware
Your Answer
Hardware

Multiple Choice Multiple Answer
Question
Two main jobs of a computer are :-
Correct Answer
I/O , Processing
Your Answer
I/O , Processing

Multiple Choice Single Answer
Question
The 4.3BSD operating system is the version of :-
Correct Answer
UNIX
Your Answer
UNIX

Multiple Choice Single Answer
Question
The number of processes that are completed per time unit is called as:-
Correct Answer
Throughput of system
Your Answer
Throughput of system

Multiple Choice Multiple Answer
Question
Once the I/O is started , which two courses of action are possible?
Correct Answer
Synchronous I/O , Asynchronous I/O , Simple I/O
Your Answer
Synchronous I/O , Asynchronous I/O

Multiple Choice Multiple Answer
Question
Security violations of the system can be categorized as :-
Correct Answer
Malicious , Accidental
Your Answer
Malicious , Accidental

Select The Blank
Question
A process migrates between the various ________ throughout its lifetime.
Correct Answer
Scheduling queues
Your Answer
Scheduling queues
True/False
Question: An asynchronous call returns immediately, without waiting for the I/O to complete.
Correct Answer: True
Your Answer: True

True/False
Question: Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention.
Correct Answer: False
Your Answer: False

Select The Blank
Question: The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________.
Correct Answer: Ring
Your Answer: Ring

Multiple Choice Single Answer
Question: A domain is a collection of :-
Correct Answer: Access rights
Your Answer: Protection policies

Match The Following
Question: Correct Answer Your Answer
Volatile Memory Primary memory RAM
CPU registers Volatile storage Primary memory
Magnetic disks Non volatile storage Non volatile storage
Floppy disk Secondary storage Secondary storage

Multiple Choice Single Answer
Question: Each object has a unique :-
Correct Answer: Name
Your Answer: Name

True/False
Question: Once class is defined we can create limited number of objects belonging to that class.
Correct Answer: False
Your Answer: False

Multiple Choice Multiple Answer
Question: A mailbox can be owned by :-
Correct Answer: Process , Operating system
Your Answer: User , Process

Multiple Choice Single Answer
Question: C++ is basically a procedural language having extension of
Correct Answer: Object Oriented technology
Your Answer: Object Oriented technology

True/False
Question: In Lock-key mechanism, users are allowed to examine or modify the list of keys or locks directly.
Correct Answer: False
Your Answer: False

Multiple Choice Multiple Answer
Question: Most CPUs have two interrupt request lines. Which are they?
Correct Answer: Maskable , Non maskable
Your Answer: Maskable , Non maskable

Match The Following
Question: Correct Answer: Your Answer:
We can define abstract Data abstraction Data abstraction
operation on abstract data
Process of sharing properties of the Inheritance Inheritance
higher level object or class
Ability to inherit attributes and Multiple inheritance Multiple inheritance
methods from 2 or more objects
or classes
Ability to send a message to several Ploymorphism Ploymorphism
objects and to allow receiving object
to respond method specified on the object.

Select The Blank
Question: The ________ is a layer of software that hides hardware differences from upper levels of the operating system.
Correct Answer: Hardware abstraction layer
Your Answer: Hardware abstraction layer

Multiple Choice Single Answer
Question: The ready queue is generally stored as a :-
Correct Answer: Linked list
Your Answer: Queue

Multiple Choice Single Answer
Question: How big is a class object?
Correct Answer: Is as big as sum of the sizes of its member variables
Your Answer: Is as big as sum of the sizes of its member variables

True/False
Question: In FIFO algorithm the page removed from memory is the one which most recently used.
Correct Answer: False
Your Answer: False

True/False
Question: I/O system calls are costly in terms of CPU consumptions.
Correct Answer: True
Your Answer: True

Multiple Choice Single Answer
Question: Policies for resource use may be subject to change over :-
Correct Answer: Time
Your Answer: Time

True/False
Question: A functionality prototype can be designed that does not have the final user interface, but allows users to try out various features, such as forwarding messages or attaching files without worrying about the final interface.
Correct Answer: True
Your Answer: True


Multiple Choice Single Answer
Question: The main difference between structure and class is
Correct Answer: Structure does not support OOPS Class Supports OOPS.
Your Answer: Structure does not support OOPS Class Supports OOPS.

Multiple Choice Single Answer
Question: The First version of UNIX was developed in 1969 by Ken Thompson of the Research Group at :-
Correct Answer: Bell Laboratories
Your Answer: Bell Laboratories

Multiple Choice Single Answer
Question: Collection of similar datatypes is called as
Correct Answer: Array
Your Answer: Array

Multiple Choice Single Answer
Question: The pure Object Oriented language is
Correct Answer: Java
Your Answer: Java

Multiple Choice Single Answer
Question: The concept of OOPS was first introduced in
Correct Answer: Simula Language
Your Answer: Simula Language

Multiple Choice Single Answer
Question: The class bird should have object
Correct Answer: Egale
Your Answer: Egale

Select The Blank
Question: ________ of an object remains unchanged even though its state and properties change.
Correct Answer: Identity
Your Answer: Location

Multiple Choice Multiple Answer
Question: The Linux system is composed of three main bodies of code, in line with most traditional UNIX implementations. Which are :-
Correct Answer: Kernel , System libraries , System utilities
Your Answer: Kernel , System libraries , System utilities

Multiple Choice Multiple Answer
Question: An audit log records which things about an object ?
Correct Answer: Time , User , Type of access
Your Answer: User , Type of access , Operation

Select The Blank
Question: The virtual memory portion of the NT executive is the ________.
Correct Answer: Virtual memory manager
Your Answer: Page-memory manager

Multiple Choice Single Answer
Question: A system consists of collection of :-
Correct Answer: Processes
Your Answer: Procedures

Multiple Choice Multiple Answer
Question: Linux presents standard interfaces to whom?
Correct Answer: Programmer , User
Your Answer: Programmer , User

Multiple Choice Multiple Answer
Question: Most computers have hardware clocks and timers that provide three basic functions, such as :-
Correct Answer: Give the current time , Give the elapsed time , Set a timer to trigger operation at certain time
Your Answer: Give the current time , Give the elapsed time , Set a timer to trigger operation at certain time

Select The Blank
Question: The UNIX system uses ________ to avoid the necessity of keeping its password list secret.
Correct Answer: Encryption
Your Answer: Encryption

Multiple Choice Single Answer
Question: A solution to the problem of indefinite blockage of low-priority processes in Priority scheduling is :-
Correct Answer: Aging
Your Answer: Starvation

Multiple Choice Multiple Answer
Question: In a uniprocessor system, there is :-
Correct Answer: Single processor , Single running process
Your Answer: Single processor , Single running process

Multiple Choice Single Answer
Question: The process by which objects of one class acquire properties of objects of other class is called
Correct Answer: Inheritance
Your Answer: Inheritance

Select The Blank
Question: A segment shorter than ________ M will have a page directory with single entry, a pointer to its one and only page table.
Correct Answer: 4
Your Answer: 8

Multiple Choice Single Answer
Question: If Dog derives from Mammal, and Mammal derives from Animal, then -
Correct Answer: Dog inherits Animal's functions and data
Your Answer: Dog inherits Animal's functions and data

Multiple Choice Multiple Answer
Question: Passwords can be generated by :-
Correct Answer: System , User
Your Answer: System , User , Password software

Multiple Choice Multiple Answer
Question: kernel threads are supported by following operating systems :-
Correct Answer: Windows NT , Solaris , Digital UNIX
Your Answer: Windows NT , Solaris , Digital UNIX

Select The Blank
Question: The hardware to measure elapsed time to trigger operations is called a ________.
Correct Answer: Programmable interval timer
Your Answer: Hardware timer

Multiple Choice Multiple Answer
Question: In Windows NT , kernel uses which two sets of objects?
Correct Answer: Dispatcher objects , Control objects
Your Answer: Dispatcher objects , Control objects

True/False
Question: Firewall monitors and logs all connections.
Correct Answer: True
Your Answer: True

Select The Blank
Question: During execution, ________ register holds the sector for the code segment.
Correct Answer: CS
Your Answer: CS

Select The Blank
Question: The creating process is called a ________ process.
Correct Answer: Parent
Your Answer: Parent

True/False
Question: Objects can not interact unless they know the details of each others data or code.
Correct Answer: False
Your Answer: False

Select The Blank
Question: Web servers use the ________ protocol to communicate with web browsers.
Correct Answer: http
Your Answer: http





"To view papers click to above link or "+""