True/False
Question
Firewall monitors and logs all connections.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
Which of the following Operating System has no memory protection ?
Correct Answer
Windows 3.1
Your Answer
Windows 3.1
Multiple Choice Single Answer
Question
The main difference between structure and class is
Correct Answer
Structure does not support OOPS Class Supports OOPS.
Your Answer
Structure does not support OOPS Class Supports OOPS.
Multiple Choice Single Answer
Question
DMA stands for :-
Correct Answer
Direct Memory Access
Your Answer
Direct Memory Access
Multiple Choice Single Answer
Question
A major problem with the Priority scheduling algorithm is :-
Correct Answer
Starvation
Your Answer
Starvation
Multiple Choice Single Answer
Question
How big is a class object?
Correct Answer
Is as big as sum of the sizes of its member variables
Your Answer
Is as big as sum of the sizes of its member variables
Multiple Choice Single Answer
Question
The First version of UNIX was developed in 1969 by Ken Thompson of the Research Group at :-
Correct Answer
Bell Laboratories
Your Answer
Bell Laboratories
Multiple Choice Single Answer
Question
When computer is powered up or rebooted, it needs to have an initial program to run. This initial program is known as :-
Correct Answer
Bootstrap program
Your Answer
Bootstrap program
True/False
Question
Processes represents the executions of single programs whereas threads represent separate, concurrent execution contexts within a single process running a single program.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
If Dog derives from Mammal, and Mammal derives from Animal, then -
Correct Answer
Dog inherits Animal's functions and data
Your Answer
Dog inherits Animal's functions and data
Multiple Choice Single Answer
Question
The wraping up of data and methods in a single unit (class) is known as :
Correct Answer
Encapsulation
Your Answer
Encapsulation
True/False
Question
LRU algorithm can not be implemented without special hardware.
Correct Answer
True
Your Answer
False
Select The Blank
Question
The Solaris developers reimplemented the ________ using in-kernel thread to eliminate the context switch involved in moving each character between daemons and the kernel.
Correct Answer
Telnet daemon
Your Answer
Telnet daemon
Multiple Choice Single Answer
Question
All user processes are descendents of one original process, Which is that process?
Correct Answer
Init process
Your Answer
Init process
Select The Blank
Question
Terminals and line printers are ________ .
Correct Answer
Character devices
Your Answer
Character devices
Multiple Choice Multiple Answer
Question
Many-to-may model is supported by following operating systems :-
Correct Answer
Solaris , IRIX , Digital UNIX
Your Answer
Solaris , IRIX , Digital UNIX
Multiple Choice Multiple Answer
Question
find out the services provided by kernel related to I/O :
Correct Answer
I/O Scheduling , Buffering , Spooling
Your Answer
I/O Scheduling , Buffering , Spooling
Multiple Choice Single Answer
Question
The long-term scheduler controls the :-
Correct Answer
Degree of multiprogramming
Your Answer
Degree of multiprogramming
Select The Blank
Question
The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________.
Correct Answer
Ring
Your Answer
Ring
Multiple Choice Multiple Answer
Question
In Linux, the main objects defined by the virtual file system are :-
Correct Answer
Inode-object , File-object , File-system object
Your Answer
Inode-object , File-object , File-system object
Multiple Choice Single Answer
Question
Collection of similar datatypes is called as
Correct Answer
Array
Your Answer
Array
Multiple Choice Multiple Answer
Question
We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes?
Correct Answer
User mode , Monitor mode
Your Answer
User mode , Monitor mode
Match The Following
Question
Correct Answer
Your Answer
Class Shape
Triangle, rectangle, circle, ellipse
Triangle, rectangle, circle, ellipse
Class Vehicle
Scooter, car, truck, tractor
Scooter, car, truck, tractor
Class Animal
Cat, dog, cow, tiger
Cat, dog, cow, tiger
Class Color
Red, yellow, blue, green
Red, yellow, blue, green
Select The Blank
Question
The virtual memory portion of the NT executive is the ________.
Correct Answer
Virtual memory manager
Your Answer
Virtual memory manager
True/False
Question
An asynchronous call returns immediately, without waiting for the I/O to complete.
Correct Answer
True
Your Answer
True
True/False
Question
Modem is a random-access device.
Correct Answer
False
Your Answer
False
Multiple Choice Multiple Answer
Question
A mailbox can be owned by :-
Correct Answer
Process , Operating system
Your Answer
Process , Operating system
Multiple Choice Multiple Answer
Question
The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :-
Correct Answer
Explicit , Implicit
Your Answer
Explicit , Implicit
Select The Blank
Question
In windows NT, the ________ facility is used to pass requests and results between client and server processes within a single machine.
Correct Answer
Local-procedure-call
Your Answer
Remote-procedure-call
True/False
Question
A major security problem for operating system is authentication.
Correct Answer
True
Your Answer
True
True/False
Question
In a blocking system call, the application is moved from the OS's run queue to a wait queue.
Correct Answer
True
Your Answer
True
True/False
Question
Device speeds range from a few bytes per second to a few gigabytes per second.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
Various storage systems available possesses which two characteristics?
Correct Answer
Volatile , Non-volatile
Your Answer
Volatile , Non-volatile
Match The Following
Question
Correct Answer
Your Answer
We can define abstract operation on abstract data
Data abstraction
Data abstraction
Process of sharing properties of the higher level object or class
Inheritance
Inheritance
Ability to inherit attributes and methods from 2 or more objects or classes
Multiple inheritance
Multiple inheritance
Ability to send a message to several objects and to allow receiving object to respond method specified on the object.
Ploymorphism
Ploymorphism
Multiple Choice Single Answer
Question
As process enter the system, they are put into :-
Correct Answer
Job queue
Your Answer
Job queue
Multiple Choice Multiple Answer
Question
The role of the operating system in computer I/O is to :-
Correct Answer
Manage I/O operation and devices , Control I/O operation and devices
Your Answer
Manage I/O operation and devices , Control I/O operation and devices
Select The Blank
Question
The ________ is a layer of software that hides hardware differences from upper levels of the operating system.
Correct Answer
Hardware abstraction layer
Your Answer
Hardware abstraction layer
Select The Blank
Question
A ________ is a computer or router that sits between the trusted and untrusted systems.
Correct Answer
Firewall
Your Answer
Firewall
Multiple Choice Multiple Answer
Question
The Moriss Internet Worm was made up of which of the two programs?
Correct Answer
Grappling hook program , Main program
Your Answer
Grappling hook program , Main program
Multiple Choice Multiple Answer
Question
In UNIX, a device is distinguished by two things, which are :-
Correct Answer
Device-class , Device number
Your Answer
Device-class , Device number
Multiple Choice Single Answer
Question
In general , the access matrix will be :-
Correct Answer
Sparse
Your Answer
Sparse
True/False
Question
Applications normally access block devices through a file system interface.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
User thread libraries include :-
Correct Answer
POSIX Pthreads , Mach C-threads , Solaris threads
Your Answer
POSIX Pthreads , Mach C-threads , Solaris threads
Select The Blank
Question
The positioning time sometimes called the ________.
Correct Answer
Random-access time
Your Answer
Random-access time
Multiple Choice Single Answer
Question
The concept of OOPS was first introduced in
Correct Answer
Simula Language
Your Answer
Simula Language
Select The Blank
Question
________ passwords prevent improper authentication due to password exposure.
Correct Answer
One-time
Your Answer
One-time
Multiple Choice Single Answer
Question
The linking of procedure call to the code to be executed in response to that call is referred as
Correct Answer
Binding
Your Answer
Binding
Question
Firewall monitors and logs all connections.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
Which of the following Operating System has no memory protection ?
Correct Answer
Windows 3.1
Your Answer
Windows 3.1
Multiple Choice Single Answer
Question
The main difference between structure and class is
Correct Answer
Structure does not support OOPS Class Supports OOPS.
Your Answer
Structure does not support OOPS Class Supports OOPS.
Multiple Choice Single Answer
Question
DMA stands for :-
Correct Answer
Direct Memory Access
Your Answer
Direct Memory Access
Multiple Choice Single Answer
Question
A major problem with the Priority scheduling algorithm is :-
Correct Answer
Starvation
Your Answer
Starvation
Multiple Choice Single Answer
Question
How big is a class object?
Correct Answer
Is as big as sum of the sizes of its member variables
Your Answer
Is as big as sum of the sizes of its member variables
Multiple Choice Single Answer
Question
The First version of UNIX was developed in 1969 by Ken Thompson of the Research Group at :-
Correct Answer
Bell Laboratories
Your Answer
Bell Laboratories
Multiple Choice Single Answer
Question
When computer is powered up or rebooted, it needs to have an initial program to run. This initial program is known as :-
Correct Answer
Bootstrap program
Your Answer
Bootstrap program
True/False
Question
Processes represents the executions of single programs whereas threads represent separate, concurrent execution contexts within a single process running a single program.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
If Dog derives from Mammal, and Mammal derives from Animal, then -
Correct Answer
Dog inherits Animal's functions and data
Your Answer
Dog inherits Animal's functions and data
Multiple Choice Single Answer
Question
The wraping up of data and methods in a single unit (class) is known as :
Correct Answer
Encapsulation
Your Answer
Encapsulation
True/False
Question
LRU algorithm can not be implemented without special hardware.
Correct Answer
True
Your Answer
False
Select The Blank
Question
The Solaris developers reimplemented the ________ using in-kernel thread to eliminate the context switch involved in moving each character between daemons and the kernel.
Correct Answer
Telnet daemon
Your Answer
Telnet daemon
Multiple Choice Single Answer
Question
All user processes are descendents of one original process, Which is that process?
Correct Answer
Init process
Your Answer
Init process
Select The Blank
Question
Terminals and line printers are ________ .
Correct Answer
Character devices
Your Answer
Character devices
Multiple Choice Multiple Answer
Question
Many-to-may model is supported by following operating systems :-
Correct Answer
Solaris , IRIX , Digital UNIX
Your Answer
Solaris , IRIX , Digital UNIX
Multiple Choice Multiple Answer
Question
find out the services provided by kernel related to I/O :
Correct Answer
I/O Scheduling , Buffering , Spooling
Your Answer
I/O Scheduling , Buffering , Spooling
Multiple Choice Single Answer
Question
The long-term scheduler controls the :-
Correct Answer
Degree of multiprogramming
Your Answer
Degree of multiprogramming
Select The Blank
Question
The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________.
Correct Answer
Ring
Your Answer
Ring
Multiple Choice Multiple Answer
Question
In Linux, the main objects defined by the virtual file system are :-
Correct Answer
Inode-object , File-object , File-system object
Your Answer
Inode-object , File-object , File-system object
Multiple Choice Single Answer
Question
Collection of similar datatypes is called as
Correct Answer
Array
Your Answer
Array
Multiple Choice Multiple Answer
Question
We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes?
Correct Answer
User mode , Monitor mode
Your Answer
User mode , Monitor mode
Match The Following
Question
Correct Answer
Your Answer
Class Shape
Triangle, rectangle, circle, ellipse
Triangle, rectangle, circle, ellipse
Class Vehicle
Scooter, car, truck, tractor
Scooter, car, truck, tractor
Class Animal
Cat, dog, cow, tiger
Cat, dog, cow, tiger
Class Color
Red, yellow, blue, green
Red, yellow, blue, green
Select The Blank
Question
The virtual memory portion of the NT executive is the ________.
Correct Answer
Virtual memory manager
Your Answer
Virtual memory manager
True/False
Question
An asynchronous call returns immediately, without waiting for the I/O to complete.
Correct Answer
True
Your Answer
True
True/False
Question
Modem is a random-access device.
Correct Answer
False
Your Answer
False
Multiple Choice Multiple Answer
Question
A mailbox can be owned by :-
Correct Answer
Process , Operating system
Your Answer
Process , Operating system
Multiple Choice Multiple Answer
Question
The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :-
Correct Answer
Explicit , Implicit
Your Answer
Explicit , Implicit
Select The Blank
Question
In windows NT, the ________ facility is used to pass requests and results between client and server processes within a single machine.
Correct Answer
Local-procedure-call
Your Answer
Remote-procedure-call
True/False
Question
A major security problem for operating system is authentication.
Correct Answer
True
Your Answer
True
True/False
Question
In a blocking system call, the application is moved from the OS's run queue to a wait queue.
Correct Answer
True
Your Answer
True
True/False
Question
Device speeds range from a few bytes per second to a few gigabytes per second.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
Various storage systems available possesses which two characteristics?
Correct Answer
Volatile , Non-volatile
Your Answer
Volatile , Non-volatile
Match The Following
Question
Correct Answer
Your Answer
We can define abstract operation on abstract data
Data abstraction
Data abstraction
Process of sharing properties of the higher level object or class
Inheritance
Inheritance
Ability to inherit attributes and methods from 2 or more objects or classes
Multiple inheritance
Multiple inheritance
Ability to send a message to several objects and to allow receiving object to respond method specified on the object.
Ploymorphism
Ploymorphism
Multiple Choice Single Answer
Question
As process enter the system, they are put into :-
Correct Answer
Job queue
Your Answer
Job queue
Multiple Choice Multiple Answer
Question
The role of the operating system in computer I/O is to :-
Correct Answer
Manage I/O operation and devices , Control I/O operation and devices
Your Answer
Manage I/O operation and devices , Control I/O operation and devices
Select The Blank
Question
The ________ is a layer of software that hides hardware differences from upper levels of the operating system.
Correct Answer
Hardware abstraction layer
Your Answer
Hardware abstraction layer
Select The Blank
Question
A ________ is a computer or router that sits between the trusted and untrusted systems.
Correct Answer
Firewall
Your Answer
Firewall
Multiple Choice Multiple Answer
Question
The Moriss Internet Worm was made up of which of the two programs?
Correct Answer
Grappling hook program , Main program
Your Answer
Grappling hook program , Main program
Multiple Choice Multiple Answer
Question
In UNIX, a device is distinguished by two things, which are :-
Correct Answer
Device-class , Device number
Your Answer
Device-class , Device number
Multiple Choice Single Answer
Question
In general , the access matrix will be :-
Correct Answer
Sparse
Your Answer
Sparse
True/False
Question
Applications normally access block devices through a file system interface.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
User thread libraries include :-
Correct Answer
POSIX Pthreads , Mach C-threads , Solaris threads
Your Answer
POSIX Pthreads , Mach C-threads , Solaris threads
Select The Blank
Question
The positioning time sometimes called the ________.
Correct Answer
Random-access time
Your Answer
Random-access time
Multiple Choice Single Answer
Question
The concept of OOPS was first introduced in
Correct Answer
Simula Language
Your Answer
Simula Language
Select The Blank
Question
________ passwords prevent improper authentication due to password exposure.
Correct Answer
One-time
Your Answer
One-time
Multiple Choice Single Answer
Question
The linking of procedure call to the code to be executed in response to that call is referred as
Correct Answer
Binding
Your Answer
Binding
Multiple Choice Multiple Answer
Question
locate the transmission devices :-
Correct Answer
Network cards , Modems
Your Answer
Tapes , Network cards , Modems
True/False
Question
The user process issues a network I/O system call to send the character to the remote machine.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
The process by which objects of one class acquire properties of objects of other class is called
Correct Answer
Inheritance
Your Answer
Inheritance
True/False
Question
Windows NT uses a message passing implementation for I/O.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes?
Correct Answer
User mode , Monitor mode
Your Answer
User mode , Monitor mode
Match The Following
Question
Correct Answer
Your Answer
Round-robin
Time quantum
Time quantum
First-come First-served
First come job
First come job
Shortest job
Shortest job
Shortest job
Priority
Highest priority job
Highest priority job
Multiple Choice Single Answer
Question
The segment is :-
Correct Answer
Logical entity
Your Answer
Logical entity
Multiple Choice Single Answer
Question
In UNIX, decisions regarding which process to swap in or out are made by whom?
Correct Answer
Swapper
Your Answer
Memory handler
Select The Blank
Question
A ________ is a client-server mechanism that enables an application on one machine to make a procedure call to code on another machine.
Correct Answer
Remote-procedure-call
Your Answer
Remote-procedure-call
Multiple Choice Single Answer
Question
When each process that wants to communicate must explicitly name the recipient or sender of the communication, then such communication is called as :-
Correct Answer
Direct communication
Your Answer
Indirect communication
Select The Blank
Question
In Linux, the allocator uses a ________ algorithm to keep track of available physical pages.
Correct Answer
Buddy-heap
Your Answer
Binary-search
Multiple Choice Single Answer
Question
What does the rows of the access matrix represents?
Correct Answer
Domains
Your Answer
Domains
Multiple Choice Single Answer
Question
Every change in policy requires a change in the underlying :-
Correct Answer
Mechanism
Your Answer
System
Select The Blank
Question
A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote.
Correct Answer
Redirector
Your Answer
Domain
Multiple Choice Multiple Answer
Question
In Solaris 2, user-level threads may be:-
Correct Answer
Bound , Unbound
Your Answer
Bound , Unbound
Multiple Choice Multiple Answer
Question
An audit log records which things about an object ?
Correct Answer
Time , User , Type of access
Your Answer
Time , User , Type of access
Multiple Choice Multiple Answer
Question
One-to-one model is supported by following systems :-
Correct Answer
Windows NT , OS/2
Your Answer
OS/2 , Windows NT
Multiple Choice Multiple Answer
Question
To protect the system, we must take security measures at two levels, such as :-
Correct Answer
Physical level , Human level
Your Answer
Human level , Global level
Multiple Choice Single Answer
Question
If the process is waiting for some event to occur then it is said to be in :-
Correct Answer
Waiting state
Your Answer
Waiting state
Multiple Choice Single Answer
Question
A common representation for a discussion of process scheduling is a :-
Correct Answer
Queuing diagram
Your Answer
Process state diagram
True/False
Question
At Physical level, the site or sites containing the computer systems must be physically secured against armed or surreptitious entry by intruders.
Correct Answer
True
Your Answer
True
Select The Blank
Question
When you express user-system interaction, the scenario in the model is called ________
Correct Answer
Case model
Your Answer
Case model
True/False
Question
Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention.
Correct Answer
False
Your Answer
True
True/False
Question
A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .
Correct Answer
False
Your Answer
False
Multiple Choice Single Answer
Question
Polymorphism means ability to take
Correct Answer
More than one form
Your Answer
More than one form
True/False
Question
Aging algorithm is based on LRU.
Correct Answer
True
Your Answer
True
Select The Blank
Question
The virtual memory portion of the NT executive is the ________.
Correct Answer
Virtual memory manager
Your Answer
Virtual memory manager
Multiple Choice Multiple Answer
Question
There are two types of Message passing, they are :-
Correct Answer
Synchronous , Asynchronous
Your Answer
Synchronous , Asynchronous
Select The Blank
Question
Web servers use the ________ protocol to communicate with web browsers.
Correct Answer
http
Your Answer
http
Multiple Choice Multiple Answer
Question
The security of a system can be improved by two management techniques, such as :-
Correct Answer
Threat monitoring , Audit Log
Your Answer
Audit Log , Threat finding
Select The Blank
Question
The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________.
Correct Answer
Ring
Your Answer
Ring
True/False
Question
We say that a system is secure if its resources are used and accessed as intended under all circumstances.
Correct Answer
True
Your Answer
True
Select The Blank
Question
The ________ controller is the controller at the computer end of the bus.
Correct Answer
Host
Your Answer
Cpu
Multiple Choice Multiple Answer
Question
In Linux, the paging system can be divided into sections, namely:-
Correct Answer
Policy algorithm , Paging mechanism
Your Answer
Policy algorithm , Paging mechanism
True/False
Question
Keyboard is a sharable device.
Correct Answer
True
Your Answer
False
True/False
Question
Transfer of data from disk to memory is usually controlled by the operating system.
Correct Answer
True
Your Answer
True
True/False
Question
Prototyping not only helps to build a quality design but also enables the designer to build the system decremantally.
Correct Answer
False
Your Answer
True
Select The Blank
Question
The UNIX system uses ________ to avoid the necessity of keeping its password list secret.
Correct Answer
Encryption
Your Answer
Encryption
Match The Following
Question
Correct Answer
Your Answer
Read-write devices
Disks
Disks
Dedicated devices
Tape
CD-ROM
Read-only devices
CD-ROM
Tape
Write-only devices
Graphics controller
Keyboard
Multiple Choice Single Answer
Question
A procedure call, request to execute a method is termed as
Correct Answer
Message
Your Answer
Message
Select The Blank
Question
Context switch times are highly dependent on ________ support.
Correct Answer
Hardware
Your Answer
Hardware
Multiple Choice Multiple Answer
Question
Two main jobs of a computer are :-
Correct Answer
I/O , Processing
Your Answer
I/O , Processing
Multiple Choice Single Answer
Question
The 4.3BSD operating system is the version of :-
Correct Answer
UNIX
Your Answer
UNIX
Multiple Choice Single Answer
Question
The number of processes that are completed per time unit is called as:-
Correct Answer
Throughput of system
Your Answer
Throughput of system
Multiple Choice Multiple Answer
Question
Once the I/O is started , which two courses of action are possible?
Correct Answer
Synchronous I/O , Asynchronous I/O , Simple I/O
Your Answer
Synchronous I/O , Asynchronous I/O
Multiple Choice Multiple Answer
Question
Security violations of the system can be categorized as :-
Correct Answer
Malicious , Accidental
Your Answer
Malicious , Accidental
Select The Blank
Question
A process migrates between the various ________ throughout its lifetime.
Correct Answer
Scheduling queues
Your Answer
Scheduling queues
Question
locate the transmission devices :-
Correct Answer
Network cards , Modems
Your Answer
Tapes , Network cards , Modems
True/False
Question
The user process issues a network I/O system call to send the character to the remote machine.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
The process by which objects of one class acquire properties of objects of other class is called
Correct Answer
Inheritance
Your Answer
Inheritance
True/False
Question
Windows NT uses a message passing implementation for I/O.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes?
Correct Answer
User mode , Monitor mode
Your Answer
User mode , Monitor mode
Match The Following
Question
Correct Answer
Your Answer
Round-robin
Time quantum
Time quantum
First-come First-served
First come job
First come job
Shortest job
Shortest job
Shortest job
Priority
Highest priority job
Highest priority job
Multiple Choice Single Answer
Question
The segment is :-
Correct Answer
Logical entity
Your Answer
Logical entity
Multiple Choice Single Answer
Question
In UNIX, decisions regarding which process to swap in or out are made by whom?
Correct Answer
Swapper
Your Answer
Memory handler
Select The Blank
Question
A ________ is a client-server mechanism that enables an application on one machine to make a procedure call to code on another machine.
Correct Answer
Remote-procedure-call
Your Answer
Remote-procedure-call
Multiple Choice Single Answer
Question
When each process that wants to communicate must explicitly name the recipient or sender of the communication, then such communication is called as :-
Correct Answer
Direct communication
Your Answer
Indirect communication
Select The Blank
Question
In Linux, the allocator uses a ________ algorithm to keep track of available physical pages.
Correct Answer
Buddy-heap
Your Answer
Binary-search
Multiple Choice Single Answer
Question
What does the rows of the access matrix represents?
Correct Answer
Domains
Your Answer
Domains
Multiple Choice Single Answer
Question
Every change in policy requires a change in the underlying :-
Correct Answer
Mechanism
Your Answer
System
Select The Blank
Question
A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote.
Correct Answer
Redirector
Your Answer
Domain
Multiple Choice Multiple Answer
Question
In Solaris 2, user-level threads may be:-
Correct Answer
Bound , Unbound
Your Answer
Bound , Unbound
Multiple Choice Multiple Answer
Question
An audit log records which things about an object ?
Correct Answer
Time , User , Type of access
Your Answer
Time , User , Type of access
Multiple Choice Multiple Answer
Question
One-to-one model is supported by following systems :-
Correct Answer
Windows NT , OS/2
Your Answer
OS/2 , Windows NT
Multiple Choice Multiple Answer
Question
To protect the system, we must take security measures at two levels, such as :-
Correct Answer
Physical level , Human level
Your Answer
Human level , Global level
Multiple Choice Single Answer
Question
If the process is waiting for some event to occur then it is said to be in :-
Correct Answer
Waiting state
Your Answer
Waiting state
Multiple Choice Single Answer
Question
A common representation for a discussion of process scheduling is a :-
Correct Answer
Queuing diagram
Your Answer
Process state diagram
True/False
Question
At Physical level, the site or sites containing the computer systems must be physically secured against armed or surreptitious entry by intruders.
Correct Answer
True
Your Answer
True
Select The Blank
Question
When you express user-system interaction, the scenario in the model is called ________
Correct Answer
Case model
Your Answer
Case model
True/False
Question
Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention.
Correct Answer
False
Your Answer
True
True/False
Question
A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .
Correct Answer
False
Your Answer
False
Multiple Choice Single Answer
Question
Polymorphism means ability to take
Correct Answer
More than one form
Your Answer
More than one form
True/False
Question
Aging algorithm is based on LRU.
Correct Answer
True
Your Answer
True
Select The Blank
Question
The virtual memory portion of the NT executive is the ________.
Correct Answer
Virtual memory manager
Your Answer
Virtual memory manager
Multiple Choice Multiple Answer
Question
There are two types of Message passing, they are :-
Correct Answer
Synchronous , Asynchronous
Your Answer
Synchronous , Asynchronous
Select The Blank
Question
Web servers use the ________ protocol to communicate with web browsers.
Correct Answer
http
Your Answer
http
Multiple Choice Multiple Answer
Question
The security of a system can be improved by two management techniques, such as :-
Correct Answer
Threat monitoring , Audit Log
Your Answer
Audit Log , Threat finding
Select The Blank
Question
The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________.
Correct Answer
Ring
Your Answer
Ring
True/False
Question
We say that a system is secure if its resources are used and accessed as intended under all circumstances.
Correct Answer
True
Your Answer
True
Select The Blank
Question
The ________ controller is the controller at the computer end of the bus.
Correct Answer
Host
Your Answer
Cpu
Multiple Choice Multiple Answer
Question
In Linux, the paging system can be divided into sections, namely:-
Correct Answer
Policy algorithm , Paging mechanism
Your Answer
Policy algorithm , Paging mechanism
True/False
Question
Keyboard is a sharable device.
Correct Answer
True
Your Answer
False
True/False
Question
Transfer of data from disk to memory is usually controlled by the operating system.
Correct Answer
True
Your Answer
True
True/False
Question
Prototyping not only helps to build a quality design but also enables the designer to build the system decremantally.
Correct Answer
False
Your Answer
True
Select The Blank
Question
The UNIX system uses ________ to avoid the necessity of keeping its password list secret.
Correct Answer
Encryption
Your Answer
Encryption
Match The Following
Question
Correct Answer
Your Answer
Read-write devices
Disks
Disks
Dedicated devices
Tape
CD-ROM
Read-only devices
CD-ROM
Tape
Write-only devices
Graphics controller
Keyboard
Multiple Choice Single Answer
Question
A procedure call, request to execute a method is termed as
Correct Answer
Message
Your Answer
Message
Select The Blank
Question
Context switch times are highly dependent on ________ support.
Correct Answer
Hardware
Your Answer
Hardware
Multiple Choice Multiple Answer
Question
Two main jobs of a computer are :-
Correct Answer
I/O , Processing
Your Answer
I/O , Processing
Multiple Choice Single Answer
Question
The 4.3BSD operating system is the version of :-
Correct Answer
UNIX
Your Answer
UNIX
Multiple Choice Single Answer
Question
The number of processes that are completed per time unit is called as:-
Correct Answer
Throughput of system
Your Answer
Throughput of system
Multiple Choice Multiple Answer
Question
Once the I/O is started , which two courses of action are possible?
Correct Answer
Synchronous I/O , Asynchronous I/O , Simple I/O
Your Answer
Synchronous I/O , Asynchronous I/O
Multiple Choice Multiple Answer
Question
Security violations of the system can be categorized as :-
Correct Answer
Malicious , Accidental
Your Answer
Malicious , Accidental
Select The Blank
Question
A process migrates between the various ________ throughout its lifetime.
Correct Answer
Scheduling queues
Your Answer
Scheduling queues
Multiple Choice Multiple Answer
Question
Various storage systems available possesses which two characteristics?
Correct Answer
Volatile , Non-volatile
Your Answer
Volatile , Non-volatile
Multiple Choice Multiple Answer
Question
Most CPUs have two interrupt request lines. Which are they?
Correct Answer
Maskable , Non maskable
Your Answer
Maskable , Non maskable
Select The Blank
Question
A ________ is a group of NT server machines that share a common security policy and user databases.
Correct Answer
Domain
Your Answer
Domain
Select The Blank
Question
An ________ is a dedicated, special purpose CPU found in mainframes and in other high-end systems.
Correct Answer
I/O channel
Your Answer
I/O channel
Multiple Choice Single Answer
Question
The CPU is allocated to the selected process by the :-
Correct Answer
Dispatcher
Your Answer
Dispatcher
Multiple Choice Single Answer
Question
In JAVA , the derived class is known as
Correct Answer
Subclass
Your Answer
Subclass
Select The Blank
Question
The Pentium supports four protection levels with ________ as least privileged level.
Correct Answer
3
Your Answer
3
Select The Blank
Question
________ of an object remains unchanged even though its state and properties change.
Correct Answer
Identity
Your Answer
Identity
True/False
Question
One way to achieve portability is to write software in standard version of high level language and to develop portable system and application software .
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
Software may trigger an interrupt by executing a special operation called :-
Correct Answer
System call
Your Answer
System call
Multiple Choice Single Answer
Question
In Object Oriented technology following expression is appropriate
Correct Answer
object=data+menthods
Your Answer
object=data+menthods
Multiple Choice Multiple Answer
Question
The two versions of NT are :
Correct Answer
WindowsNT workstations , WindowsNT server
Your Answer
WindowsNT workstations , WindowsNT server
Match The Following
Question
Correct Answer
Your Answer
We can define abstract operation on abstract data
Data abstraction
Data abstraction
Process of sharing properties of the higher level object or class
Inheritance
Inheritance
Ability to inherit attributes and methods from 2 or more objects or classes
Multiple inheritance
Multiple inheritance
Ability to send a message to several objects and to allow receiving object to respond method specified on the object.
Ploymorphism
Ploymorphism
Select The Blank
Question
A________ is a memory area that stores data while they are transferred between two devices or between a device and an application.
Correct Answer
Buffer
Your Answer
Buffer
True/False
Question
In Public Key Encryption, each user has both a public and a private key.
Correct Answer
True
Your Answer
True
True/False
Question
Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention.
Correct Answer
False
Your Answer
False
Multiple Choice Multiple Answer
Question
Liner address is divided into fields like :-
Correct Answer
Dir , Page , Offset
Your Answer
Dir , Page , Offset
Multiple Choice Single Answer
Question
IPC is particularly useful in a :-
Correct Answer
Distributed environment
Your Answer
Internet environment
Multiple Choice Single Answer
Question
IPC provides a mechanism to allow processes to communicate and to synchronize their actions without sharing the same :-
Correct Answer
Address space
Your Answer
Semaphore
Multiple Choice Multiple Answer
Question
Supervisor mode is also known as :-
Correct Answer
Privileged mode , Monitor mode , System mode
Your Answer
System mode , Privileged mode , Monitor mode
Select The Blank
Question
Assuming that the segment is in memory and the offset is in range, the Pentium then adds the ________ bit base field in the descriptor to the offset to form linear address.
Correct Answer
32
Your Answer
32
Multiple Choice Multiple Answer
Question
In Solaris 2, user-level threads may be:-
Correct Answer
Bound , Unbound
Your Answer
Bound , Unbound
Multiple Choice Single Answer
Question
The concept of OOPS was first introduced in
Correct Answer
Simula Language
Your Answer
Simula Language
True/False
Question
At system boot time, the hardware starts in monitor mode.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
The main difference between structure and class is
Correct Answer
Structure does not support OOPS Class Supports OOPS.
Your Answer
Structure does not support OOPS Class Supports OOPS.
Select The Blank
Question
A ________ controller is built into each disk drive.
Correct Answer
Disk
Your Answer
Disk
Multiple Choice Single Answer
Question
If a class fruit has object mango, the relationship is expressed as :
Correct Answer
Fruit mango
Your Answer
Fruit mango
True/False
Question
The hardware allows privileged instructions to be executed in only user mode.
Correct Answer
False
Your Answer
False
Multiple Choice Multiple Answer
Question
An object type in windows NT is a system defined data type that has two things associated with it, which are they?
Correct Answer
Set of attributes , Set of methods
Your Answer
Set of attributes , Set of methods
Select The Blank
Question
The kernel module that controls a device is a ________ .
Correct Answer
Device driver
Your Answer
Device driver
Multiple Choice Single Answer
Question
If process P and Q want to communicate, they must send messages to and receive messages from each other: Thus link established between two process is known as :-
Correct Answer
Communication link
Your Answer
Direct link
Multiple Choice Multiple Answer
Question
Dispatcher functions involves the following :-
Correct Answer
Switching context , Switching to user mode
Your Answer
Switching context , Switching to user mode
Select The Blank
Question
In windows NT, the ________ facility is used to pass requests and results between client and server processes within a single machine.
Correct Answer
Local-procedure-call
Your Answer
Local-procedure-call
True/False
Question
If some of the pages are shared with other process, the pages in memory and on the disk can only be released when the last process using them has terminated.
Correct Answer
True
Your Answer
True
Select The Blank
Question
The Solaris developers reimplemented the ________ using in-kernel thread to eliminate the context switch involved in moving each character between daemons and the kernel.
Correct Answer
Telnet daemon
Your Answer
Context-switch daemon
Multiple Choice Single Answer
Question
Modern operating systems are :-
Correct Answer
Interrupt driven
Your Answer
Interrupt driven
Match The Following
Question
Correct Answer
Your Answer
Bounded-buffer
Fixed size buffer
Fixed size buffer
Producer
Produces process
Produces process
Consumer
Consumes process
Consumes process
Unbounded-buffer
No limit on size of buffer
No limit on size of buffer
Multiple Choice Multiple Answer
Question
In Linux, the paging system can be divided into sections, namely:-
Correct Answer
Policy algorithm , Paging mechanism
Your Answer
Policy algorithm , Paging mechanism
Multiple Choice Single Answer
Question
A process data section contains:-
Correct Answer
Global variables
Your Answer
Temporary data
True/False
Question
OOSAD approach is applicable only to stable systems.
Correct Answer
False
Your Answer
False
True/False
Question
Segment length may change during execution.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :-
Correct Answer
Explicit , Implicit
Your Answer
Explicit , Implicit
Multiple Choice Single Answer
Question
Collection of similar datatypes is called as
Correct Answer
Array
Your Answer
Array
True/False
Question
At Human level, user must be screened carefully so that the chance of authorizing a user who then gives access to an intruder is reduced.
Correct Answer
True
Your Answer
True
True/False
Question
The user process issues a network I/O system call to send the character to the remote machine.
Correct Answer
True
Your Answer
False
Multiple Choice Multiple Answer
Question
Most computers have hardware clocks and timers that provide three basic functions, such as :-
Correct Answer
Give the current time , Give the elapsed time , Set a timer to trigger operation at certain time
Your Answer
Give the current time , Give the elapsed time , Set a timer to trigger operation at certain time
Multiple Choice Single Answer
Question
C++ is basically a procedural language having extension of
Correct Answer
Object Oriented technology
Your Answer
Object Oriented technology
Question
Various storage systems available possesses which two characteristics?
Correct Answer
Volatile , Non-volatile
Your Answer
Volatile , Non-volatile
Multiple Choice Multiple Answer
Question
Most CPUs have two interrupt request lines. Which are they?
Correct Answer
Maskable , Non maskable
Your Answer
Maskable , Non maskable
Select The Blank
Question
A ________ is a group of NT server machines that share a common security policy and user databases.
Correct Answer
Domain
Your Answer
Domain
Select The Blank
Question
An ________ is a dedicated, special purpose CPU found in mainframes and in other high-end systems.
Correct Answer
I/O channel
Your Answer
I/O channel
Multiple Choice Single Answer
Question
The CPU is allocated to the selected process by the :-
Correct Answer
Dispatcher
Your Answer
Dispatcher
Multiple Choice Single Answer
Question
In JAVA , the derived class is known as
Correct Answer
Subclass
Your Answer
Subclass
Select The Blank
Question
The Pentium supports four protection levels with ________ as least privileged level.
Correct Answer
3
Your Answer
3
Select The Blank
Question
________ of an object remains unchanged even though its state and properties change.
Correct Answer
Identity
Your Answer
Identity
True/False
Question
One way to achieve portability is to write software in standard version of high level language and to develop portable system and application software .
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
Software may trigger an interrupt by executing a special operation called :-
Correct Answer
System call
Your Answer
System call
Multiple Choice Single Answer
Question
In Object Oriented technology following expression is appropriate
Correct Answer
object=data+menthods
Your Answer
object=data+menthods
Multiple Choice Multiple Answer
Question
The two versions of NT are :
Correct Answer
WindowsNT workstations , WindowsNT server
Your Answer
WindowsNT workstations , WindowsNT server
Match The Following
Question
Correct Answer
Your Answer
We can define abstract operation on abstract data
Data abstraction
Data abstraction
Process of sharing properties of the higher level object or class
Inheritance
Inheritance
Ability to inherit attributes and methods from 2 or more objects or classes
Multiple inheritance
Multiple inheritance
Ability to send a message to several objects and to allow receiving object to respond method specified on the object.
Ploymorphism
Ploymorphism
Select The Blank
Question
A________ is a memory area that stores data while they are transferred between two devices or between a device and an application.
Correct Answer
Buffer
Your Answer
Buffer
True/False
Question
In Public Key Encryption, each user has both a public and a private key.
Correct Answer
True
Your Answer
True
True/False
Question
Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention.
Correct Answer
False
Your Answer
False
Multiple Choice Multiple Answer
Question
Liner address is divided into fields like :-
Correct Answer
Dir , Page , Offset
Your Answer
Dir , Page , Offset
Multiple Choice Single Answer
Question
IPC is particularly useful in a :-
Correct Answer
Distributed environment
Your Answer
Internet environment
Multiple Choice Single Answer
Question
IPC provides a mechanism to allow processes to communicate and to synchronize their actions without sharing the same :-
Correct Answer
Address space
Your Answer
Semaphore
Multiple Choice Multiple Answer
Question
Supervisor mode is also known as :-
Correct Answer
Privileged mode , Monitor mode , System mode
Your Answer
System mode , Privileged mode , Monitor mode
Select The Blank
Question
Assuming that the segment is in memory and the offset is in range, the Pentium then adds the ________ bit base field in the descriptor to the offset to form linear address.
Correct Answer
32
Your Answer
32
Multiple Choice Multiple Answer
Question
In Solaris 2, user-level threads may be:-
Correct Answer
Bound , Unbound
Your Answer
Bound , Unbound
Multiple Choice Single Answer
Question
The concept of OOPS was first introduced in
Correct Answer
Simula Language
Your Answer
Simula Language
True/False
Question
At system boot time, the hardware starts in monitor mode.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
The main difference between structure and class is
Correct Answer
Structure does not support OOPS Class Supports OOPS.
Your Answer
Structure does not support OOPS Class Supports OOPS.
Select The Blank
Question
A ________ controller is built into each disk drive.
Correct Answer
Disk
Your Answer
Disk
Multiple Choice Single Answer
Question
If a class fruit has object mango, the relationship is expressed as :
Correct Answer
Fruit mango
Your Answer
Fruit mango
True/False
Question
The hardware allows privileged instructions to be executed in only user mode.
Correct Answer
False
Your Answer
False
Multiple Choice Multiple Answer
Question
An object type in windows NT is a system defined data type that has two things associated with it, which are they?
Correct Answer
Set of attributes , Set of methods
Your Answer
Set of attributes , Set of methods
Select The Blank
Question
The kernel module that controls a device is a ________ .
Correct Answer
Device driver
Your Answer
Device driver
Multiple Choice Single Answer
Question
If process P and Q want to communicate, they must send messages to and receive messages from each other: Thus link established between two process is known as :-
Correct Answer
Communication link
Your Answer
Direct link
Multiple Choice Multiple Answer
Question
Dispatcher functions involves the following :-
Correct Answer
Switching context , Switching to user mode
Your Answer
Switching context , Switching to user mode
Select The Blank
Question
In windows NT, the ________ facility is used to pass requests and results between client and server processes within a single machine.
Correct Answer
Local-procedure-call
Your Answer
Local-procedure-call
True/False
Question
If some of the pages are shared with other process, the pages in memory and on the disk can only be released when the last process using them has terminated.
Correct Answer
True
Your Answer
True
Select The Blank
Question
The Solaris developers reimplemented the ________ using in-kernel thread to eliminate the context switch involved in moving each character between daemons and the kernel.
Correct Answer
Telnet daemon
Your Answer
Context-switch daemon
Multiple Choice Single Answer
Question
Modern operating systems are :-
Correct Answer
Interrupt driven
Your Answer
Interrupt driven
Match The Following
Question
Correct Answer
Your Answer
Bounded-buffer
Fixed size buffer
Fixed size buffer
Producer
Produces process
Produces process
Consumer
Consumes process
Consumes process
Unbounded-buffer
No limit on size of buffer
No limit on size of buffer
Multiple Choice Multiple Answer
Question
In Linux, the paging system can be divided into sections, namely:-
Correct Answer
Policy algorithm , Paging mechanism
Your Answer
Policy algorithm , Paging mechanism
Multiple Choice Single Answer
Question
A process data section contains:-
Correct Answer
Global variables
Your Answer
Temporary data
True/False
Question
OOSAD approach is applicable only to stable systems.
Correct Answer
False
Your Answer
False
True/False
Question
Segment length may change during execution.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :-
Correct Answer
Explicit , Implicit
Your Answer
Explicit , Implicit
Multiple Choice Single Answer
Question
Collection of similar datatypes is called as
Correct Answer
Array
Your Answer
Array
True/False
Question
At Human level, user must be screened carefully so that the chance of authorizing a user who then gives access to an intruder is reduced.
Correct Answer
True
Your Answer
True
True/False
Question
The user process issues a network I/O system call to send the character to the remote machine.
Correct Answer
True
Your Answer
False
Multiple Choice Multiple Answer
Question
Most computers have hardware clocks and timers that provide three basic functions, such as :-
Correct Answer
Give the current time , Give the elapsed time , Set a timer to trigger operation at certain time
Your Answer
Give the current time , Give the elapsed time , Set a timer to trigger operation at certain time
Multiple Choice Single Answer
Question
C++ is basically a procedural language having extension of
Correct Answer
Object Oriented technology
Your Answer
Object Oriented technology
Multiple Choice Multiple Answer
Question
locate the transmission devices :-
Correct Answer
Network cards , Modems
Your Answer
Tapes , Network cards , Modems
True/False
Question
The user process issues a network I/O system call to send the character to the remote machine.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
The process by which objects of one class acquire properties of objects of other class is called
Correct Answer
Inheritance
Your Answer
Inheritance
True/False
Question
Windows NT uses a message passing implementation for I/O.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes?
Correct Answer
User mode , Monitor mode
Your Answer
User mode , Monitor mode
Match The Following
Question
Correct Answer
Your Answer
Round-robin
Time quantum
Time quantum
First-come First-served
First come job
First come job
Shortest job
Shortest job
Shortest job
Priority
Highest priority job
Highest priority job
Multiple Choice Single Answer
Question
The segment is :-
Correct Answer
Logical entity
Your Answer
Logical entity
Multiple Choice Single Answer
Question
In UNIX, decisions regarding which process to swap in or out are made by whom?
Correct Answer
Swapper
Your Answer
Memory handler
Select The Blank
Question
A ________ is a client-server mechanism that enables an application on one machine to make a procedure call to code on another machine.
Correct Answer
Remote-procedure-call
Your Answer
Remote-procedure-call
Multiple Choice Single Answer
Question
When each process that wants to communicate must explicitly name the recipient or sender of the communication, then such communication is called as :-
Correct Answer
Direct communication
Your Answer
Indirect communication
Select The Blank
Question
In Linux, the allocator uses a ________ algorithm to keep track of available physical pages.
Correct Answer
Buddy-heap
Your Answer
Binary-search
Multiple Choice Single Answer
Question
What does the rows of the access matrix represents?
Correct Answer
Domains
Your Answer
Domains
Multiple Choice Single Answer
Question
Every change in policy requires a change in the underlying :-
Correct Answer
Mechanism
Your Answer
System
Select The Blank
Question
A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote.
Correct Answer
Redirector
Your Answer
Domain
Multiple Choice Multiple Answer
Question
In Solaris 2, user-level threads may be:-
Correct Answer
Bound , Unbound
Your Answer
Bound , Unbound
Multiple Choice Multiple Answer
Question
An audit log records which things about an object ?
Correct Answer
Time , User , Type of access
Your Answer
Time , User , Type of access
Multiple Choice Multiple Answer
Question
One-to-one model is supported by following systems :-
Correct Answer
Windows NT , OS/2
Your Answer
OS/2 , Windows NT
Multiple Choice Multiple Answer
Question
To protect the system, we must take security measures at two levels, such as :-
Correct Answer
Physical level , Human level
Your Answer
Human level , Global level
Multiple Choice Single Answer
Question
If the process is waiting for some event to occur then it is said to be in :-
Correct Answer
Waiting state
Your Answer
Waiting state
Multiple Choice Single Answer
Question
A common representation for a discussion of process scheduling is a :-
Correct Answer
Queuing diagram
Your Answer
Process state diagram
True/False
Question
At Physical level, the site or sites containing the computer systems must be physically secured against armed or surreptitious entry by intruders.
Correct Answer
True
Your Answer
True
Select The Blank
Question
When you express user-system interaction, the scenario in the model is called ________
Correct Answer
Case model
Your Answer
Case model
True/False
Question
Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention.
Correct Answer
False
Your Answer
True
True/False
Question
A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .
Correct Answer
False
Your Answer
False
Multiple Choice Single Answer
Question
Polymorphism means ability to take
Correct Answer
More than one form
Your Answer
More than one form
True/False
Question
Aging algorithm is based on LRU.
Correct Answer
True
Your Answer
True
Select The Blank
Question
The virtual memory portion of the NT executive is the ________.
Correct Answer
Virtual memory manager
Your Answer
Virtual memory manager
Multiple Choice Multiple Answer
Question
There are two types of Message passing, they are :-
Correct Answer
Synchronous , Asynchronous
Your Answer
Synchronous , Asynchronous
Select The Blank
Question
Web servers use the ________ protocol to communicate with web browsers.
Correct Answer
http
Your Answer
http
Multiple Choice Multiple Answer
Question
The security of a system can be improved by two management techniques, such as :-
Correct Answer
Threat monitoring , Audit Log
Your Answer
Audit Log , Threat finding
Select The Blank
Question
The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________.
Correct Answer
Ring
Your Answer
Ring
True/False
Question
We say that a system is secure if its resources are used and accessed as intended under all circumstances.
Correct Answer
True
Your Answer
True
Select The Blank
Question
The ________ controller is the controller at the computer end of the bus.
Correct Answer
Host
Your Answer
Cpu
Multiple Choice Multiple Answer
Question
In Linux, the paging system can be divided into sections, namely:-
Correct Answer
Policy algorithm , Paging mechanism
Your Answer
Policy algorithm , Paging mechanism
True/False
Question
Keyboard is a sharable device.
Correct Answer
True
Your Answer
False
True/False
Question
Transfer of data from disk to memory is usually controlled by the operating system.
Correct Answer
True
Your Answer
True
True/False
Question
Prototyping not only helps to build a quality design but also enables the designer to build the system decremantally.
Correct Answer
False
Your Answer
True
Select The Blank
Question
The UNIX system uses ________ to avoid the necessity of keeping its password list secret.
Correct Answer
Encryption
Your Answer
Encryption
Match The Following
Question
Correct Answer
Your Answer
Read-write devices
Disks
Disks
Dedicated devices
Tape
CD-ROM
Read-only devices
CD-ROM
Tape
Write-only devices
Graphics controller
Keyboard
Multiple Choice Single Answer
Question
A procedure call, request to execute a method is termed as
Correct Answer
Message
Your Answer
Message
Select The Blank
Question
Context switch times are highly dependent on ________ support.
Correct Answer
Hardware
Your Answer
Hardware
Multiple Choice Multiple Answer
Question
Two main jobs of a computer are :-
Correct Answer
I/O , Processing
Your Answer
I/O , Processing
Multiple Choice Single Answer
Question
The 4.3BSD operating system is the version of :-
Correct Answer
UNIX
Your Answer
UNIX
Multiple Choice Single Answer
Question
The number of processes that are completed per time unit is called as:-
Correct Answer
Throughput of system
Your Answer
Throughput of system
Multiple Choice Multiple Answer
Question
Once the I/O is started , which two courses of action are possible?
Correct Answer
Synchronous I/O , Asynchronous I/O , Simple I/O
Your Answer
Synchronous I/O , Asynchronous I/O
Multiple Choice Multiple Answer
Question
Security violations of the system can be categorized as :-
Correct Answer
Malicious , Accidental
Your Answer
Malicious , Accidental
Select The Blank
Question
A process migrates between the various ________ throughout its lifetime.
Correct Answer
Scheduling queues
Your Answer
Scheduling queues
Question
locate the transmission devices :-
Correct Answer
Network cards , Modems
Your Answer
Tapes , Network cards , Modems
True/False
Question
The user process issues a network I/O system call to send the character to the remote machine.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
The process by which objects of one class acquire properties of objects of other class is called
Correct Answer
Inheritance
Your Answer
Inheritance
True/False
Question
Windows NT uses a message passing implementation for I/O.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes?
Correct Answer
User mode , Monitor mode
Your Answer
User mode , Monitor mode
Match The Following
Question
Correct Answer
Your Answer
Round-robin
Time quantum
Time quantum
First-come First-served
First come job
First come job
Shortest job
Shortest job
Shortest job
Priority
Highest priority job
Highest priority job
Multiple Choice Single Answer
Question
The segment is :-
Correct Answer
Logical entity
Your Answer
Logical entity
Multiple Choice Single Answer
Question
In UNIX, decisions regarding which process to swap in or out are made by whom?
Correct Answer
Swapper
Your Answer
Memory handler
Select The Blank
Question
A ________ is a client-server mechanism that enables an application on one machine to make a procedure call to code on another machine.
Correct Answer
Remote-procedure-call
Your Answer
Remote-procedure-call
Multiple Choice Single Answer
Question
When each process that wants to communicate must explicitly name the recipient or sender of the communication, then such communication is called as :-
Correct Answer
Direct communication
Your Answer
Indirect communication
Select The Blank
Question
In Linux, the allocator uses a ________ algorithm to keep track of available physical pages.
Correct Answer
Buddy-heap
Your Answer
Binary-search
Multiple Choice Single Answer
Question
What does the rows of the access matrix represents?
Correct Answer
Domains
Your Answer
Domains
Multiple Choice Single Answer
Question
Every change in policy requires a change in the underlying :-
Correct Answer
Mechanism
Your Answer
System
Select The Blank
Question
A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote.
Correct Answer
Redirector
Your Answer
Domain
Multiple Choice Multiple Answer
Question
In Solaris 2, user-level threads may be:-
Correct Answer
Bound , Unbound
Your Answer
Bound , Unbound
Multiple Choice Multiple Answer
Question
An audit log records which things about an object ?
Correct Answer
Time , User , Type of access
Your Answer
Time , User , Type of access
Multiple Choice Multiple Answer
Question
One-to-one model is supported by following systems :-
Correct Answer
Windows NT , OS/2
Your Answer
OS/2 , Windows NT
Multiple Choice Multiple Answer
Question
To protect the system, we must take security measures at two levels, such as :-
Correct Answer
Physical level , Human level
Your Answer
Human level , Global level
Multiple Choice Single Answer
Question
If the process is waiting for some event to occur then it is said to be in :-
Correct Answer
Waiting state
Your Answer
Waiting state
Multiple Choice Single Answer
Question
A common representation for a discussion of process scheduling is a :-
Correct Answer
Queuing diagram
Your Answer
Process state diagram
True/False
Question
At Physical level, the site or sites containing the computer systems must be physically secured against armed or surreptitious entry by intruders.
Correct Answer
True
Your Answer
True
Select The Blank
Question
When you express user-system interaction, the scenario in the model is called ________
Correct Answer
Case model
Your Answer
Case model
True/False
Question
Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention.
Correct Answer
False
Your Answer
True
True/False
Question
A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .
Correct Answer
False
Your Answer
False
Multiple Choice Single Answer
Question
Polymorphism means ability to take
Correct Answer
More than one form
Your Answer
More than one form
True/False
Question
Aging algorithm is based on LRU.
Correct Answer
True
Your Answer
True
Select The Blank
Question
The virtual memory portion of the NT executive is the ________.
Correct Answer
Virtual memory manager
Your Answer
Virtual memory manager
Multiple Choice Multiple Answer
Question
There are two types of Message passing, they are :-
Correct Answer
Synchronous , Asynchronous
Your Answer
Synchronous , Asynchronous
Select The Blank
Question
Web servers use the ________ protocol to communicate with web browsers.
Correct Answer
http
Your Answer
http
Multiple Choice Multiple Answer
Question
The security of a system can be improved by two management techniques, such as :-
Correct Answer
Threat monitoring , Audit Log
Your Answer
Audit Log , Threat finding
Select The Blank
Question
The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________.
Correct Answer
Ring
Your Answer
Ring
True/False
Question
We say that a system is secure if its resources are used and accessed as intended under all circumstances.
Correct Answer
True
Your Answer
True
Select The Blank
Question
The ________ controller is the controller at the computer end of the bus.
Correct Answer
Host
Your Answer
Cpu
Multiple Choice Multiple Answer
Question
In Linux, the paging system can be divided into sections, namely:-
Correct Answer
Policy algorithm , Paging mechanism
Your Answer
Policy algorithm , Paging mechanism
True/False
Question
Keyboard is a sharable device.
Correct Answer
True
Your Answer
False
True/False
Question
Transfer of data from disk to memory is usually controlled by the operating system.
Correct Answer
True
Your Answer
True
True/False
Question
Prototyping not only helps to build a quality design but also enables the designer to build the system decremantally.
Correct Answer
False
Your Answer
True
Select The Blank
Question
The UNIX system uses ________ to avoid the necessity of keeping its password list secret.
Correct Answer
Encryption
Your Answer
Encryption
Match The Following
Question
Correct Answer
Your Answer
Read-write devices
Disks
Disks
Dedicated devices
Tape
CD-ROM
Read-only devices
CD-ROM
Tape
Write-only devices
Graphics controller
Keyboard
Multiple Choice Single Answer
Question
A procedure call, request to execute a method is termed as
Correct Answer
Message
Your Answer
Message
Select The Blank
Question
Context switch times are highly dependent on ________ support.
Correct Answer
Hardware
Your Answer
Hardware
Multiple Choice Multiple Answer
Question
Two main jobs of a computer are :-
Correct Answer
I/O , Processing
Your Answer
I/O , Processing
Multiple Choice Single Answer
Question
The 4.3BSD operating system is the version of :-
Correct Answer
UNIX
Your Answer
UNIX
Multiple Choice Single Answer
Question
The number of processes that are completed per time unit is called as:-
Correct Answer
Throughput of system
Your Answer
Throughput of system
Multiple Choice Multiple Answer
Question
Once the I/O is started , which two courses of action are possible?
Correct Answer
Synchronous I/O , Asynchronous I/O , Simple I/O
Your Answer
Synchronous I/O , Asynchronous I/O
Multiple Choice Multiple Answer
Question
Security violations of the system can be categorized as :-
Correct Answer
Malicious , Accidental
Your Answer
Malicious , Accidental
Select The Blank
Question
A process migrates between the various ________ throughout its lifetime.
Correct Answer
Scheduling queues
Your Answer
Scheduling queues
Select The Blank
Question
static binding allows to hold certain properties fixed and rigid, whereas ________ binding allows object to behave as per conditions emerge.
Correct Answer
Dynamic
Your Answer
Dynamic
Multiple Choice Single Answer
Question
DVMA stands for :-
Correct Answer
Direct Virtual Memory Access
Your Answer
Direct Virtual Memory Access
True/False
Question
Since caches have limited size, cache management is an important design problem.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
C++ is basically a procedural language having extension of
Correct Answer
Object Oriented technology
Your Answer
Object Oriented technology
Multiple Choice Single Answer
Question
The system call checks the arguments given by the application, builds a data structure to convey the arguments to the kernel and then executes a special instruction called as :-
Correct Answer
Software interrupt
Your Answer
Software interrupt
Multiple Choice Single Answer
Question
A system consists of collection of :-
Correct Answer
Processes
Your Answer
Processes
Select The Blank
Question
A________ is a memory area that stores data while they are transferred between two devices or between a device and an application.
Correct Answer
Buffer
Your Answer
Buffer
Multiple Choice Multiple Answer
Question
Find out the human-interface devices :-
Correct Answer
Screen , Keyboard , Mouse
Your Answer
Screen , Keyboard , Mouse
Multiple Choice Single Answer
Question
A procedure body implementing an operation is termed as
Correct Answer
Method
Your Answer
Method
Select The Blank
Question
The designer of a program or system might leave a hole, or ________ , in the software that only he is capable of using.
Correct Answer
Trap door
Your Answer
Trap door
True/False
Question
The principle of polymorphism helps to extend and modify the system scope through appropriate messaging mechanism.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
The Linux system is composed of three main bodies of code, in line with most traditional UNIX implementations. Which are :-
Correct Answer
Kernel , System libraries , System utilities
Your Answer
Kernel , System libraries , System utilities
Select The Blank
Question
Web servers use the ________ protocol to communicate with web browsers.
Correct Answer
http
Your Answer
http
Multiple Choice Single Answer
Question
The pure Object Oriented language is
Correct Answer
Java
Your Answer
Java
Multiple Choice Multiple Answer
Question
User level threads are generally :-
Correct Answer
Fast to create , Easy to manage
Your Answer
Fast to create , Easy to manage
True/False
Question
Switching the cpu to another process requires saving the state of the old process and loading the saved state for the new process.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
The process by which objects of one class acquire properties of objects of other class is called
Correct Answer
Inheritance
Your Answer
Inheritance
Multiple Choice Single Answer
Question
In Object Oriented technology following expression is appropriate
Correct Answer
object=data+menthods
Your Answer
object=data+menthods
True/False
Question
A copy of inode is kept in main memory while a file is open.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
The advantage of dynamic loading is
Correct Answer
Unused routine is never loaded , Useful when large amount of code are needed to handle infrequently occurring cases, such as error routines , It does not require special support from the operating system
Your Answer
It does not require special support from the operating system , Unused routine is never loaded , Useful when large amount of code are needed to handle infrequently occurring cases, such as error routines
Select The Blank
Question
OOSAD begins with identification of actors, what activities they perform and building ________ model for the function.
Correct Answer
Use-case
Your Answer
Use-case
Multiple Choice Single Answer
Question
If a class fruit has object mango, the relationship is expressed as :
Correct Answer
Fruit mango
Your Answer
Fruit mango
Multiple Choice Single Answer
Question
The class bird should have object
Correct Answer
Egale
Your Answer
Egale
Select The Blank
Question
The ________ controller is the controller at the computer end of the bus.
Correct Answer
Host
Your Answer
Host
Multiple Choice Single Answer
Question
The insulation of data from direct access by the program is known as :
Correct Answer
Data hiding
Your Answer
Data hiding
Multiple Choice Multiple Answer
Question
Liner address is divided into fields like :-
Correct Answer
Dir , Page , Offset
Your Answer
Dir , Page , Offset
Multiple Choice Single Answer
Question
Every change in policy requires a change in the underlying :-
Correct Answer
Mechanism
Your Answer
Mechanism
Multiple Choice Single Answer
Question
UNIX operating system is written mostly in :-
Correct Answer
C language
Your Answer
C language
Multiple Choice Single Answer
Question
In UNIX, a file is represented by an :-
Correct Answer
Inode
Your Answer
Inode
Select The Blank
Question
If paging is enabled, the liner address is interpreted as virtual address and mapped to the physical address using ________ table.
Correct Answer
Page
Your Answer
Page
Multiple Choice Multiple Answer
Question
What are the forms of malicious access?
Correct Answer
Unauthorized destruction of data , Unauthorized reading of data , Unauthorized modification of data
Your Answer
Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data
Multiple Choice Multiple Answer
Question
What are the components to memory management under Linux?
Correct Answer
Physical memory manager , Virtual memory manager
Your Answer
Physical memory manager , Virtual memory manager
Multiple Choice Single Answer
Question
IPC is particularly useful in a :-
Correct Answer
Distributed environment
Your Answer
Distributed environment
Select The Blank
Question
Context switch times are highly dependent on ________ support.
Correct Answer
Hardware
Your Answer
Hardware
Multiple Choice Multiple Answer
Question
kernel threads are supported by following operating systems :-
Correct Answer
Windows NT , Solaris , Digital UNIX
Your Answer
Windows NT , Solaris , Digital UNIX
Select The Blank
Question
A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote.
Correct Answer
Redirector
Your Answer
Redirector
Multiple Choice Multiple Answer
Question
In a uniprocessor system, there is :-
Correct Answer
Single processor , Single running process
Your Answer
Single processor , Single running process
True/False
Question
The basic difference between SSAD life cycle models and OOSAD life cycle models is that one is evolutionary & iterative while the other is sequential in stages of analysis, design, coding, unit test, integrated test and system test.
Correct Answer
True
Your Answer
True
Match The Following
Question
Correct Answer
Your Answer
Ready state
Process waiting for cpu
Process waiting for cpu
New state
Process created
Process created
Running state
Executing process
Executing process
Waiting state
Waiting process
Waiting process
Match The Following
Question
Correct Answer
Your Answer
Parent process
Child process
Child process
Foreground processes
Interactive processes
Interactive processes
Background processes
Batch processes
Batch processes
Light-Weight processes
Thread
Thread
Multiple Choice Single Answer
Question
In how many number of classes does the NRU algorithm divides pages, depending on the state of R and M?
Correct Answer
4
Your Answer
4
True/False
Question
When application issues a blocking I/O system call, the request is placed on the queue for that device.
Correct Answer
True
Your Answer
True
Select The Blank
Question
During execution, ________ register holds the sector for the data segment.
Correct Answer
DS
Your Answer
DS
True/False
Question
Banker's algorithm is a deadlock-avoidance algorithm.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
Model of protection can be viewed abstractly as a matrix which is known as :-
Correct Answer
Access matrix
Your Answer
Access matrix
Multiple Choice Multiple Answer
Question
Kernel threads are generally :-
Correct Answer
Slower to create , Difficult to manage
Your Answer
Slower to create , Difficult to manage
Multiple Choice Multiple Answer
Question
One-to-one model is supported by following systems :-
Correct Answer
Windows NT , OS/2
Your Answer
Windows NT , OS/2
Question
static binding allows to hold certain properties fixed and rigid, whereas ________ binding allows object to behave as per conditions emerge.
Correct Answer
Dynamic
Your Answer
Dynamic
Multiple Choice Single Answer
Question
DVMA stands for :-
Correct Answer
Direct Virtual Memory Access
Your Answer
Direct Virtual Memory Access
True/False
Question
Since caches have limited size, cache management is an important design problem.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
C++ is basically a procedural language having extension of
Correct Answer
Object Oriented technology
Your Answer
Object Oriented technology
Multiple Choice Single Answer
Question
The system call checks the arguments given by the application, builds a data structure to convey the arguments to the kernel and then executes a special instruction called as :-
Correct Answer
Software interrupt
Your Answer
Software interrupt
Multiple Choice Single Answer
Question
A system consists of collection of :-
Correct Answer
Processes
Your Answer
Processes
Select The Blank
Question
A________ is a memory area that stores data while they are transferred between two devices or between a device and an application.
Correct Answer
Buffer
Your Answer
Buffer
Multiple Choice Multiple Answer
Question
Find out the human-interface devices :-
Correct Answer
Screen , Keyboard , Mouse
Your Answer
Screen , Keyboard , Mouse
Multiple Choice Single Answer
Question
A procedure body implementing an operation is termed as
Correct Answer
Method
Your Answer
Method
Select The Blank
Question
The designer of a program or system might leave a hole, or ________ , in the software that only he is capable of using.
Correct Answer
Trap door
Your Answer
Trap door
True/False
Question
The principle of polymorphism helps to extend and modify the system scope through appropriate messaging mechanism.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
The Linux system is composed of three main bodies of code, in line with most traditional UNIX implementations. Which are :-
Correct Answer
Kernel , System libraries , System utilities
Your Answer
Kernel , System libraries , System utilities
Select The Blank
Question
Web servers use the ________ protocol to communicate with web browsers.
Correct Answer
http
Your Answer
http
Multiple Choice Single Answer
Question
The pure Object Oriented language is
Correct Answer
Java
Your Answer
Java
Multiple Choice Multiple Answer
Question
User level threads are generally :-
Correct Answer
Fast to create , Easy to manage
Your Answer
Fast to create , Easy to manage
True/False
Question
Switching the cpu to another process requires saving the state of the old process and loading the saved state for the new process.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
The process by which objects of one class acquire properties of objects of other class is called
Correct Answer
Inheritance
Your Answer
Inheritance
Multiple Choice Single Answer
Question
In Object Oriented technology following expression is appropriate
Correct Answer
object=data+menthods
Your Answer
object=data+menthods
True/False
Question
A copy of inode is kept in main memory while a file is open.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
The advantage of dynamic loading is
Correct Answer
Unused routine is never loaded , Useful when large amount of code are needed to handle infrequently occurring cases, such as error routines , It does not require special support from the operating system
Your Answer
It does not require special support from the operating system , Unused routine is never loaded , Useful when large amount of code are needed to handle infrequently occurring cases, such as error routines
Select The Blank
Question
OOSAD begins with identification of actors, what activities they perform and building ________ model for the function.
Correct Answer
Use-case
Your Answer
Use-case
Multiple Choice Single Answer
Question
If a class fruit has object mango, the relationship is expressed as :
Correct Answer
Fruit mango
Your Answer
Fruit mango
Multiple Choice Single Answer
Question
The class bird should have object
Correct Answer
Egale
Your Answer
Egale
Select The Blank
Question
The ________ controller is the controller at the computer end of the bus.
Correct Answer
Host
Your Answer
Host
Multiple Choice Single Answer
Question
The insulation of data from direct access by the program is known as :
Correct Answer
Data hiding
Your Answer
Data hiding
Multiple Choice Multiple Answer
Question
Liner address is divided into fields like :-
Correct Answer
Dir , Page , Offset
Your Answer
Dir , Page , Offset
Multiple Choice Single Answer
Question
Every change in policy requires a change in the underlying :-
Correct Answer
Mechanism
Your Answer
Mechanism
Multiple Choice Single Answer
Question
UNIX operating system is written mostly in :-
Correct Answer
C language
Your Answer
C language
Multiple Choice Single Answer
Question
In UNIX, a file is represented by an :-
Correct Answer
Inode
Your Answer
Inode
Select The Blank
Question
If paging is enabled, the liner address is interpreted as virtual address and mapped to the physical address using ________ table.
Correct Answer
Page
Your Answer
Page
Multiple Choice Multiple Answer
Question
What are the forms of malicious access?
Correct Answer
Unauthorized destruction of data , Unauthorized reading of data , Unauthorized modification of data
Your Answer
Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data
Multiple Choice Multiple Answer
Question
What are the components to memory management under Linux?
Correct Answer
Physical memory manager , Virtual memory manager
Your Answer
Physical memory manager , Virtual memory manager
Multiple Choice Single Answer
Question
IPC is particularly useful in a :-
Correct Answer
Distributed environment
Your Answer
Distributed environment
Select The Blank
Question
Context switch times are highly dependent on ________ support.
Correct Answer
Hardware
Your Answer
Hardware
Multiple Choice Multiple Answer
Question
kernel threads are supported by following operating systems :-
Correct Answer
Windows NT , Solaris , Digital UNIX
Your Answer
Windows NT , Solaris , Digital UNIX
Select The Blank
Question
A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote.
Correct Answer
Redirector
Your Answer
Redirector
Multiple Choice Multiple Answer
Question
In a uniprocessor system, there is :-
Correct Answer
Single processor , Single running process
Your Answer
Single processor , Single running process
True/False
Question
The basic difference between SSAD life cycle models and OOSAD life cycle models is that one is evolutionary & iterative while the other is sequential in stages of analysis, design, coding, unit test, integrated test and system test.
Correct Answer
True
Your Answer
True
Match The Following
Question
Correct Answer
Your Answer
Ready state
Process waiting for cpu
Process waiting for cpu
New state
Process created
Process created
Running state
Executing process
Executing process
Waiting state
Waiting process
Waiting process
Match The Following
Question
Correct Answer
Your Answer
Parent process
Child process
Child process
Foreground processes
Interactive processes
Interactive processes
Background processes
Batch processes
Batch processes
Light-Weight processes
Thread
Thread
Multiple Choice Single Answer
Question
In how many number of classes does the NRU algorithm divides pages, depending on the state of R and M?
Correct Answer
4
Your Answer
4
True/False
Question
When application issues a blocking I/O system call, the request is placed on the queue for that device.
Correct Answer
True
Your Answer
True
Select The Blank
Question
During execution, ________ register holds the sector for the data segment.
Correct Answer
DS
Your Answer
DS
True/False
Question
Banker's algorithm is a deadlock-avoidance algorithm.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
Model of protection can be viewed abstractly as a matrix which is known as :-
Correct Answer
Access matrix
Your Answer
Access matrix
Multiple Choice Multiple Answer
Question
Kernel threads are generally :-
Correct Answer
Slower to create , Difficult to manage
Your Answer
Slower to create , Difficult to manage
Multiple Choice Multiple Answer
Question
One-to-one model is supported by following systems :-
Correct Answer
Windows NT , OS/2
Your Answer
Windows NT , OS/2
Multiple Choice Multiple Answer
Question
Kernel threads are generally :-
Correct Answer
Slower to create , Difficult to manage
Your Answer
Slower to create , Difficult to manage
Select The Blank
Question
If the user-supplied password matches the password stored in the system, the system assumes that the user is ________.
Correct Answer
Legitimate
Your Answer
Legitimate
Multiple Choice Single Answer
Question
In general , the access matrix will be :-
Correct Answer
Sparse
Your Answer
Sparse
True/False
Question
Encryption is one common method of protecting information that is transmitted over unreliable links.
Correct Answer
True
Your Answer
False
Select The Blank
Question
A ________ is a full duplex connection between a device driver and a user-level process.
Correct Answer
Stream
Your Answer
Stream
Multiple Choice Single Answer
Question
In how many number of classes does the NRU algorithm divides pages, depending on the state of R and M?
Correct Answer
4
Your Answer
8
Select The Blank
Question
The Pentium page size is fixed at ________ KB.
Correct Answer
4
Your Answer
4
True/False
Question
Volatile storage loses its contents when the power to the device is removed.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :-
Correct Answer
Explicit , Implicit
Your Answer
Explicit , Implicit
Select The Blank
Question
In queuing diagram, the arrow indicates the flow of ________ in the system.
Correct Answer
Processes
Your Answer
Processes
Multiple Choice Multiple Answer
Question
What are the forms of malicious access?
Correct Answer
Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data
Your Answer
Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data
Select The Blank
Question
A bit called the ________ , is added to the hardware of the computer to indicate the current mode.
Correct Answer
Mode bit
Your Answer
Mode bit
Multiple Choice Multiple Answer
Question
In Windows NT , kernel uses which two sets of objects?
Correct Answer
Dispatcher objects , Control objects
Your Answer
Dispatcher objects , Complex objects
Multiple Choice Single Answer
Question
The smallest addressable portion of a disk is :-
Correct Answer
Sector
Your Answer
Sector
True/False
Question
In FIFO algorithm the page removed from memory is the one which most recently used.
Correct Answer
False
Your Answer
False
Select The Blank
Question
A process is ________, if it cannot affect or be affected by the other processes executing in the system.
Correct Answer
Independent
Your Answer
Independent
Multiple Choice Multiple Answer
Question
Linux presents standard interfaces to whom?
Correct Answer
Programmer , User
Your Answer
Programmer , User , System administrator
Select The Blank
Question
The kernel module that controls a device is a ________ .
Correct Answer
Device driver
Your Answer
Device daemon
True/False
Question
Whenever a trap or interrupt occurs, the hardware switches from user mode to monitor mode.
Correct Answer
True
Your Answer
True
Select The Blank
Question
A ________ is a computer or router that sits between the trusted and untrusted systems.
Correct Answer
Firewall
Your Answer
Firewall
Multiple Choice Multiple Answer
Question
Find out the basic I/O hardware elements from the following :-
Correct Answer
Ports , Buses , Device controllers
Your Answer
Ports , Buses , Device controllers
True/False
Question
Object-oriented programming focuses on the integrated data and functionality as discrete units that have both knowledge (data) and capabilities (functions). Procedural programs, on the other hand, focus on functions and how they act on data.
Correct Answer
True
Your Answer
True
Match The Following
Question
Correct Answer
Your Answer
User mode
Mode bit 1
Mode bit 1
Serial port
Modem
Monitor mode
Parallel port
Printer
Printer
Privileged instructions
Monitor mode
Mode bit 0
True/False
Question
In segmentation the total address space can exceed the size of physical memory.
Correct Answer
True
Your Answer
False
Multiple Choice Single Answer
Question
Because of the concept of independent objects responding to messages, object orientation is a natural way to implement
Correct Answer
Event driven programming
Your Answer
Message deiven programming
Multiple Choice Single Answer
Question
In UNIX, everything below the system-call interface and above the physical hardware is the :-
Correct Answer
Kernel
Your Answer
I/O system
Multiple Choice Multiple Answer
Question
Different multithreading models available are :-
Correct Answer
Many-to-one model , One-to-one model , Many-to-many model
Your Answer
Many-to-one model , One-to-one model , Many-to-many model
Multiple Choice Multiple Answer
Question
An object type in windows NT is a system defined data type that has two things associated with it, which are they?
Correct Answer
Set of attributes , Set of methods
Your Answer
Object-type , Object-processing
Multiple Choice Multiple Answer
Question
When memory reference occurs in MULTICS the things which takes place are :-
Correct Answer
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address
Your Answer
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined
Multiple Choice Single Answer
Question
The interval from the time of submission of a process to the time of completion is :-
Correct Answer
Turnaround time
Your Answer
Turnaround time
True/False
Question
Context switch times are highly dependent on hardware support.
Correct Answer
True
Your Answer
True
True/False
Question
Procedure and data can be distinguished and separately protected in segmentation
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
Dispatcher functions involves the following :-
Correct Answer
Switching context , Switching to user mode
Your Answer
Switching context , Switching to user mode
Multiple Choice Single Answer
Question
The First version of UNIX was developed in 1969 by Ken Thompson of the Research Group at :-
Correct Answer
Bell Laboratories
Your Answer
Bell Laboratories
Multiple Choice Single Answer
Question
In Object Oriented technology following expression is appropriate
Correct Answer
object=data+menthods
Your Answer
object=data+menthods
Multiple Choice Single Answer
Question
A procedure body implementing an operation is termed as
Correct Answer
Method
Your Answer
Method
Select The Blank
Question
During execution, ________ register holds the sector for the code segment.
Correct Answer
CS
Your Answer
PS
True/False
Question
In some operating system, spooling is managed by a system daemon process.
Correct Answer
True
Your Answer
False
Select The Blank
Question
Each column in the access matrix can be implemented as an ________ for one object.
Correct Answer
Access list
Your Answer
Capability list
Multiple Choice Single Answer
Question
Policies for resource use may vary depending on the :-
Correct Answer
Application
Your Answer
System
Multiple Choice Multiple Answer
Question
A mailbox can be owned by :-
Correct Answer
Process , Operating system
Your Answer
User , Process , Program
Multiple Choice Single Answer
Question
The ready queue is generally stored as a :-
Correct Answer
Linked list
Your Answer
Queue
Select The Blank
Question
A ________ is region of fast memory that hold copies of data .
Correct Answer
Cache
Your Answer
Cache
Multiple Choice Multiple Answer
Question
What are the components to memory management under Linux?
Correct Answer
Physical memory manager , Virtual memory manager
Your Answer
Physical memory manager , Virtual memory manager
Match The Following
Question
Correct Answer
Your Answer
Bounded-buffer
Fixed size buffer
Fixed size buffer
Producer
Produces process
Produces process
Consumer
Consumes process
Consumes process
Unbounded-buffer
No limit on size of buffer
No limit on size of buffer
True/False
Question
The inode contains 15 pointers to the disk blocks containing the data contents of the file.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
When computer is powered up or rebooted, it needs to have an initial program to run. This initial program is known as :-
Correct Answer
Bootstrap program
Your Answer
Bootstrap program
Question
Kernel threads are generally :-
Correct Answer
Slower to create , Difficult to manage
Your Answer
Slower to create , Difficult to manage
Select The Blank
Question
If the user-supplied password matches the password stored in the system, the system assumes that the user is ________.
Correct Answer
Legitimate
Your Answer
Legitimate
Multiple Choice Single Answer
Question
In general , the access matrix will be :-
Correct Answer
Sparse
Your Answer
Sparse
True/False
Question
Encryption is one common method of protecting information that is transmitted over unreliable links.
Correct Answer
True
Your Answer
False
Select The Blank
Question
A ________ is a full duplex connection between a device driver and a user-level process.
Correct Answer
Stream
Your Answer
Stream
Multiple Choice Single Answer
Question
In how many number of classes does the NRU algorithm divides pages, depending on the state of R and M?
Correct Answer
4
Your Answer
8
Select The Blank
Question
The Pentium page size is fixed at ________ KB.
Correct Answer
4
Your Answer
4
True/False
Question
Volatile storage loses its contents when the power to the device is removed.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :-
Correct Answer
Explicit , Implicit
Your Answer
Explicit , Implicit
Select The Blank
Question
In queuing diagram, the arrow indicates the flow of ________ in the system.
Correct Answer
Processes
Your Answer
Processes
Multiple Choice Multiple Answer
Question
What are the forms of malicious access?
Correct Answer
Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data
Your Answer
Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data
Select The Blank
Question
A bit called the ________ , is added to the hardware of the computer to indicate the current mode.
Correct Answer
Mode bit
Your Answer
Mode bit
Multiple Choice Multiple Answer
Question
In Windows NT , kernel uses which two sets of objects?
Correct Answer
Dispatcher objects , Control objects
Your Answer
Dispatcher objects , Complex objects
Multiple Choice Single Answer
Question
The smallest addressable portion of a disk is :-
Correct Answer
Sector
Your Answer
Sector
True/False
Question
In FIFO algorithm the page removed from memory is the one which most recently used.
Correct Answer
False
Your Answer
False
Select The Blank
Question
A process is ________, if it cannot affect or be affected by the other processes executing in the system.
Correct Answer
Independent
Your Answer
Independent
Multiple Choice Multiple Answer
Question
Linux presents standard interfaces to whom?
Correct Answer
Programmer , User
Your Answer
Programmer , User , System administrator
Select The Blank
Question
The kernel module that controls a device is a ________ .
Correct Answer
Device driver
Your Answer
Device daemon
True/False
Question
Whenever a trap or interrupt occurs, the hardware switches from user mode to monitor mode.
Correct Answer
True
Your Answer
True
Select The Blank
Question
A ________ is a computer or router that sits between the trusted and untrusted systems.
Correct Answer
Firewall
Your Answer
Firewall
Multiple Choice Multiple Answer
Question
Find out the basic I/O hardware elements from the following :-
Correct Answer
Ports , Buses , Device controllers
Your Answer
Ports , Buses , Device controllers
True/False
Question
Object-oriented programming focuses on the integrated data and functionality as discrete units that have both knowledge (data) and capabilities (functions). Procedural programs, on the other hand, focus on functions and how they act on data.
Correct Answer
True
Your Answer
True
Match The Following
Question
Correct Answer
Your Answer
User mode
Mode bit 1
Mode bit 1
Serial port
Modem
Monitor mode
Parallel port
Printer
Printer
Privileged instructions
Monitor mode
Mode bit 0
True/False
Question
In segmentation the total address space can exceed the size of physical memory.
Correct Answer
True
Your Answer
False
Multiple Choice Single Answer
Question
Because of the concept of independent objects responding to messages, object orientation is a natural way to implement
Correct Answer
Event driven programming
Your Answer
Message deiven programming
Multiple Choice Single Answer
Question
In UNIX, everything below the system-call interface and above the physical hardware is the :-
Correct Answer
Kernel
Your Answer
I/O system
Multiple Choice Multiple Answer
Question
Different multithreading models available are :-
Correct Answer
Many-to-one model , One-to-one model , Many-to-many model
Your Answer
Many-to-one model , One-to-one model , Many-to-many model
Multiple Choice Multiple Answer
Question
An object type in windows NT is a system defined data type that has two things associated with it, which are they?
Correct Answer
Set of attributes , Set of methods
Your Answer
Object-type , Object-processing
Multiple Choice Multiple Answer
Question
When memory reference occurs in MULTICS the things which takes place are :-
Correct Answer
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address
Your Answer
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined
Multiple Choice Single Answer
Question
The interval from the time of submission of a process to the time of completion is :-
Correct Answer
Turnaround time
Your Answer
Turnaround time
True/False
Question
Context switch times are highly dependent on hardware support.
Correct Answer
True
Your Answer
True
True/False
Question
Procedure and data can be distinguished and separately protected in segmentation
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
Dispatcher functions involves the following :-
Correct Answer
Switching context , Switching to user mode
Your Answer
Switching context , Switching to user mode
Multiple Choice Single Answer
Question
The First version of UNIX was developed in 1969 by Ken Thompson of the Research Group at :-
Correct Answer
Bell Laboratories
Your Answer
Bell Laboratories
Multiple Choice Single Answer
Question
In Object Oriented technology following expression is appropriate
Correct Answer
object=data+menthods
Your Answer
object=data+menthods
Multiple Choice Single Answer
Question
A procedure body implementing an operation is termed as
Correct Answer
Method
Your Answer
Method
Select The Blank
Question
During execution, ________ register holds the sector for the code segment.
Correct Answer
CS
Your Answer
PS
True/False
Question
In some operating system, spooling is managed by a system daemon process.
Correct Answer
True
Your Answer
False
Select The Blank
Question
Each column in the access matrix can be implemented as an ________ for one object.
Correct Answer
Access list
Your Answer
Capability list
Multiple Choice Single Answer
Question
Policies for resource use may vary depending on the :-
Correct Answer
Application
Your Answer
System
Multiple Choice Multiple Answer
Question
A mailbox can be owned by :-
Correct Answer
Process , Operating system
Your Answer
User , Process , Program
Multiple Choice Single Answer
Question
The ready queue is generally stored as a :-
Correct Answer
Linked list
Your Answer
Queue
Select The Blank
Question
A ________ is region of fast memory that hold copies of data .
Correct Answer
Cache
Your Answer
Cache
Multiple Choice Multiple Answer
Question
What are the components to memory management under Linux?
Correct Answer
Physical memory manager , Virtual memory manager
Your Answer
Physical memory manager , Virtual memory manager
Match The Following
Question
Correct Answer
Your Answer
Bounded-buffer
Fixed size buffer
Fixed size buffer
Producer
Produces process
Produces process
Consumer
Consumes process
Consumes process
Unbounded-buffer
No limit on size of buffer
No limit on size of buffer
True/False
Question
The inode contains 15 pointers to the disk blocks containing the data contents of the file.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
When computer is powered up or rebooted, it needs to have an initial program to run. This initial program is known as :-
Correct Answer
Bootstrap program
Your Answer
Bootstrap program
True/False
Question
Prototyping is a tool to test the design of system
Correct Answer
True
Your Answer
False
Multiple Choice Multiple Answer
Question
Kernel threads are generally :-
Correct Answer
Slower to create , Difficult to manage
Your Answer
Difficult to manage , Faster than user thread , Faster to create
Multiple Choice Single Answer
Question
The concept of OOPS was first introduced in
Correct Answer
Simula Language
Your Answer
Simula Language
Multiple Choice Single Answer
Question
The insulation of data from direct access by the program is known as :
Correct Answer
Data hiding
Your Answer
Abstraction
True/False
Question
Many to Many model multiplexes many user level threads to a smaller or equal number of kernel threads.
Correct Answer
True
Your Answer
True
Select The Blank
Question
Like worms, ________ are designed to spread into other programs and can wreak havoc in a system.
Correct Answer
Viruses
Your Answer
Viruses
Multiple Choice Multiple Answer
Question
The two versions of NT are :
Correct Answer
WindowsNT workstations , WindowsNT server
Your Answer
WindowsNT workstations , WindowsNT server
True/False
Question
A virus is a fragment of code embedded in a legitimate program
Correct Answer
True
Your Answer
False
True/False
Question
An I/O bound process spend more of its time doing I/O than it spends doing computations.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
It has been said that Pascal and C programs are collections of procedures and C++ programs are collections of
Correct Answer
Classes
Your Answer
Classes
Multiple Choice Single Answer
Question
The process by which objects of one class acquire properties of objects of other class is called
Correct Answer
Inheritance
Your Answer
Inheritance
Select The Blank
Question
A ________ is a buffer that holds output for a device such as printers.
Correct Answer
Spool
Your Answer
Spool
Multiple Choice Single Answer
Question
C++ is basically a procedural language having extension of
Correct Answer
Object Oriented technology
Your Answer
Object Oriented technology
True/False
Question
Object-oriented programming focuses on the integrated data and functionality as discrete units that have both knowledge (data) and capabilities (functions). Procedural programs, on the other hand, focus on functions and how they act on data.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
Most CPUs have two interrupt request lines. Which are they?
Correct Answer
Maskable , Non maskable
Your Answer
Maskable , Non maskable
True/False
Question
The I/O scheduler rearranges the order of the queue to improve the overall system efficiency and the average response time experienced by application
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
How big is a class object?
Correct Answer
Is as big as sum of the sizes of its member variables
Your Answer
Is as big as sum of the sizes of its member variables
Multiple Choice Single Answer
Question
In UNIX, files are organized in tree-structured :-
Correct Answer
Directories
Your Answer
Directories
Multiple Choice Single Answer
Question
The number of processes that are completed per time unit is called as:-
Correct Answer
Throughput of system
Your Answer
Throughput of system
Multiple Choice Multiple Answer
Question
There are two types of Message passing, they are :-
Correct Answer
Synchronous , Asynchronous
Your Answer
Synchronous , Asynchronous
Multiple Choice Single Answer
Question
If Dog derives from Mammal, and Mammal derives from Animal, then -
Correct Answer
Dog inherits Animal's functions and data
Your Answer
Dog inherits Animal's functions and data
Select The Blank
Question
The positioning time sometimes called the ________.
Correct Answer
Random-access time
Your Answer
Seek time
Multiple Choice Single Answer
Question
Collection of similar datatypes is called as
Correct Answer
Array
Your Answer
Array
Multiple Choice Single Answer
Question
The pure Object Oriented language is
Correct Answer
Java
Your Answer
Java
Multiple Choice Multiple Answer
Question
To protect the system, we must take security measures at two levels, such as :-
Correct Answer
Physical level , Human level
Your Answer
Local level , Global level
Select The Blank
Question
In some operating system, spooling is handled by an ________ .
Correct Answer
In-kernel thread
Your Answer
User thread
Multiple Choice Multiple Answer
Question
Supervisor mode is also known as :-
Correct Answer
System mode , Privileged mode , Monitor mode
Your Answer
Privileged mode , Monitor mode , Special mode
Match The Following
Question
Correct Answer
Your Answer
Thread
Light-weight process
Light-weight process
Process
PCB
Thread library
User thread
Thread library
PCB
Kernel thread
Operating system
Operating system
Select The Blank
Question
The ________ of a process is represented in the PCB of a process.
Correct Answer
Context
Your Answer
Control
Select The Blank
Question
________ is defined as a cooperation between object codes produced by different software vendors & written in different programming languages.
Correct Answer
Interoperability
Your Answer
Interoperability
Multiple Choice Multiple Answer
Question
In a uniprocessor system, there is :-
Correct Answer
Single processor , Single running process
Your Answer
Single processor , Single running process
Multiple Choice Single Answer
Question
In UNIX operating system, each process is identified by its :-
Correct Answer
Process identifier
Your Answer
Process identifier
Multiple Choice Single Answer
Question
As process enter the system, they are put into :-
Correct Answer
Job queue
Your Answer
Job queue
Match The Following
Question
Correct Answer
Your Answer
Algorithm where in it takes largest available hole
Worst fit
Worst fit
The algorithm in which memory manager scans along the list of segments until it finds a hole that is big enough
First fit
First fit
Algorithm in which keeps the track of suitable hole
Next fit
Optimal fit
Algorithm which searches entire list and takes smallest hole that is adequate
Best fit
Best fit
True/False
Question
Linux is a multi-user, multitasking system with a full set of UNIX-compatible tools.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
The main difference between structure and class is
Correct Answer
Structure does not support OOPS Class Supports OOPS.
Your Answer
Structure does not support OOPS Class Supports OOPS.
Multiple Choice Multiple Answer
Question
Find out the basic I/O hardware elements from the following :-
Correct Answer
Ports , Buses , Device controllers
Your Answer
Ports , Buses , Device controllers
Multiple Choice Single Answer
Question
The interval from the time of submission of a process to the time of completion is :-
Correct Answer
Turnaround time
Your Answer
Completion time
True/False
Question
In Public Key Encryption, each user has both a public and a private key.
Correct Answer
True
Your Answer
False
Multiple Choice Single Answer
Question
If the process is waiting to be assigned to CPU then it is said to be in :-
Correct Answer
Ready state
Your Answer
Waiting state
Select The Blank
Question
A ________ controller is built into each disk drive.
Correct Answer
Disk
Your Answer
Disk
Multiple Choice Multiple Answer
Question
Linux presents standard interfaces to whom?
Correct Answer
Programmer , User
Your Answer
Programmer , User , System administrator
True/False
Question
As an object-oriented systems NT uses objects for all its services and entities.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
A procedure body implementing an operation is termed as
Correct Answer
Method
Your Answer
Method
True/False
Question
Main Memory is a volatile storage device that loses its contents when power is turned off.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
Once the I/O is started , which two courses of action are possible?
Correct Answer
Synchronous I/O , Asynchronous I/O , Simple I/O
Your Answer
Waiting I/O , Simple I/O
Select The Blank
Question
________ passwords prevent improper authentication due to password exposure.
Correct Answer
One-time
Your Answer
Encrypted
Question
Prototyping is a tool to test the design of system
Correct Answer
True
Your Answer
False
Multiple Choice Multiple Answer
Question
Kernel threads are generally :-
Correct Answer
Slower to create , Difficult to manage
Your Answer
Difficult to manage , Faster than user thread , Faster to create
Multiple Choice Single Answer
Question
The concept of OOPS was first introduced in
Correct Answer
Simula Language
Your Answer
Simula Language
Multiple Choice Single Answer
Question
The insulation of data from direct access by the program is known as :
Correct Answer
Data hiding
Your Answer
Abstraction
True/False
Question
Many to Many model multiplexes many user level threads to a smaller or equal number of kernel threads.
Correct Answer
True
Your Answer
True
Select The Blank
Question
Like worms, ________ are designed to spread into other programs and can wreak havoc in a system.
Correct Answer
Viruses
Your Answer
Viruses
Multiple Choice Multiple Answer
Question
The two versions of NT are :
Correct Answer
WindowsNT workstations , WindowsNT server
Your Answer
WindowsNT workstations , WindowsNT server
True/False
Question
A virus is a fragment of code embedded in a legitimate program
Correct Answer
True
Your Answer
False
True/False
Question
An I/O bound process spend more of its time doing I/O than it spends doing computations.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
It has been said that Pascal and C programs are collections of procedures and C++ programs are collections of
Correct Answer
Classes
Your Answer
Classes
Multiple Choice Single Answer
Question
The process by which objects of one class acquire properties of objects of other class is called
Correct Answer
Inheritance
Your Answer
Inheritance
Select The Blank
Question
A ________ is a buffer that holds output for a device such as printers.
Correct Answer
Spool
Your Answer
Spool
Multiple Choice Single Answer
Question
C++ is basically a procedural language having extension of
Correct Answer
Object Oriented technology
Your Answer
Object Oriented technology
True/False
Question
Object-oriented programming focuses on the integrated data and functionality as discrete units that have both knowledge (data) and capabilities (functions). Procedural programs, on the other hand, focus on functions and how they act on data.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
Most CPUs have two interrupt request lines. Which are they?
Correct Answer
Maskable , Non maskable
Your Answer
Maskable , Non maskable
True/False
Question
The I/O scheduler rearranges the order of the queue to improve the overall system efficiency and the average response time experienced by application
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
How big is a class object?
Correct Answer
Is as big as sum of the sizes of its member variables
Your Answer
Is as big as sum of the sizes of its member variables
Multiple Choice Single Answer
Question
In UNIX, files are organized in tree-structured :-
Correct Answer
Directories
Your Answer
Directories
Multiple Choice Single Answer
Question
The number of processes that are completed per time unit is called as:-
Correct Answer
Throughput of system
Your Answer
Throughput of system
Multiple Choice Multiple Answer
Question
There are two types of Message passing, they are :-
Correct Answer
Synchronous , Asynchronous
Your Answer
Synchronous , Asynchronous
Multiple Choice Single Answer
Question
If Dog derives from Mammal, and Mammal derives from Animal, then -
Correct Answer
Dog inherits Animal's functions and data
Your Answer
Dog inherits Animal's functions and data
Select The Blank
Question
The positioning time sometimes called the ________.
Correct Answer
Random-access time
Your Answer
Seek time
Multiple Choice Single Answer
Question
Collection of similar datatypes is called as
Correct Answer
Array
Your Answer
Array
Multiple Choice Single Answer
Question
The pure Object Oriented language is
Correct Answer
Java
Your Answer
Java
Multiple Choice Multiple Answer
Question
To protect the system, we must take security measures at two levels, such as :-
Correct Answer
Physical level , Human level
Your Answer
Local level , Global level
Select The Blank
Question
In some operating system, spooling is handled by an ________ .
Correct Answer
In-kernel thread
Your Answer
User thread
Multiple Choice Multiple Answer
Question
Supervisor mode is also known as :-
Correct Answer
System mode , Privileged mode , Monitor mode
Your Answer
Privileged mode , Monitor mode , Special mode
Match The Following
Question
Correct Answer
Your Answer
Thread
Light-weight process
Light-weight process
Process
PCB
Thread library
User thread
Thread library
PCB
Kernel thread
Operating system
Operating system
Select The Blank
Question
The ________ of a process is represented in the PCB of a process.
Correct Answer
Context
Your Answer
Control
Select The Blank
Question
________ is defined as a cooperation between object codes produced by different software vendors & written in different programming languages.
Correct Answer
Interoperability
Your Answer
Interoperability
Multiple Choice Multiple Answer
Question
In a uniprocessor system, there is :-
Correct Answer
Single processor , Single running process
Your Answer
Single processor , Single running process
Multiple Choice Single Answer
Question
In UNIX operating system, each process is identified by its :-
Correct Answer
Process identifier
Your Answer
Process identifier
Multiple Choice Single Answer
Question
As process enter the system, they are put into :-
Correct Answer
Job queue
Your Answer
Job queue
Match The Following
Question
Correct Answer
Your Answer
Algorithm where in it takes largest available hole
Worst fit
Worst fit
The algorithm in which memory manager scans along the list of segments until it finds a hole that is big enough
First fit
First fit
Algorithm in which keeps the track of suitable hole
Next fit
Optimal fit
Algorithm which searches entire list and takes smallest hole that is adequate
Best fit
Best fit
True/False
Question
Linux is a multi-user, multitasking system with a full set of UNIX-compatible tools.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
The main difference between structure and class is
Correct Answer
Structure does not support OOPS Class Supports OOPS.
Your Answer
Structure does not support OOPS Class Supports OOPS.
Multiple Choice Multiple Answer
Question
Find out the basic I/O hardware elements from the following :-
Correct Answer
Ports , Buses , Device controllers
Your Answer
Ports , Buses , Device controllers
Multiple Choice Single Answer
Question
The interval from the time of submission of a process to the time of completion is :-
Correct Answer
Turnaround time
Your Answer
Completion time
True/False
Question
In Public Key Encryption, each user has both a public and a private key.
Correct Answer
True
Your Answer
False
Multiple Choice Single Answer
Question
If the process is waiting to be assigned to CPU then it is said to be in :-
Correct Answer
Ready state
Your Answer
Waiting state
Select The Blank
Question
A ________ controller is built into each disk drive.
Correct Answer
Disk
Your Answer
Disk
Multiple Choice Multiple Answer
Question
Linux presents standard interfaces to whom?
Correct Answer
Programmer , User
Your Answer
Programmer , User , System administrator
True/False
Question
As an object-oriented systems NT uses objects for all its services and entities.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
A procedure body implementing an operation is termed as
Correct Answer
Method
Your Answer
Method
True/False
Question
Main Memory is a volatile storage device that loses its contents when power is turned off.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
Once the I/O is started , which two courses of action are possible?
Correct Answer
Synchronous I/O , Asynchronous I/O , Simple I/O
Your Answer
Waiting I/O , Simple I/O
Select The Blank
Question
________ passwords prevent improper authentication due to password exposure.
Correct Answer
One-time
Your Answer
Encrypted
Multiple Choice Single Answer
Question
Each object is associated with the data of type class with which they are created. A class is thus a collection of objects of
Correct Answer
Similar type
Your Answer
Similar type
Multiple Choice Single Answer
Question
C++ is also named as
Correct Answer
C with classes
Your Answer
Visual C++
Select The Blank
Question
The ________ of a process is represented in the PCB of a process.
Correct Answer
Context
Your Answer
Control
Multiple Choice Multiple Answer
Question
In windows NT, naming of objects is of two types :-
Correct Answer
Permanent name , Temporary name
Your Answer
Permanent name , Object-primary name
Match The Following
Question
Correct Answer
Your Answer
Class Shape
Triangle, rectangle, circle, ellipse
Triangle, rectangle, circle, ellipse
Class Vehicle
Scooter, car, truck, tractor
Scooter, car, truck, tractor
Class Animal
Cat, dog, cow, tiger
Cat, dog, cow, tiger
Class Color
Red, yellow, blue, green
Red, yellow, blue, green
Multiple Choice Multiple Answer
Question
Computer system consists of :-
Correct Answer
CPU , Multiple device controller
Your Answer
CPU , Multiple device controller
Multiple Choice Single Answer
Question
In JAVA , the derived class is known as
Correct Answer
Subclass
Your Answer
Subclass
Select The Blank
Question
To make as interval call, the CALL instruction must contain ________.
Correct Answer
Selector
Your Answer
Address
True/False
Question
In Lock-key mechanism, users are allowed to examine or modify the list of keys or locks directly.
Correct Answer
False
Your Answer
True
Multiple Choice Single Answer
Question
A major problem with the Priority scheduling algorithm is :-
Correct Answer
Starvation
Your Answer
CPU time
Select The Blank
Question
________ of an object remains unchanged even though its state and properties change.
Correct Answer
Identity
Your Answer
Identity
Multiple Choice Single Answer
Question
The process by which objects of one class acquire properties of objects of other class is called
Correct Answer
Inheritance
Your Answer
Polymorphism
Select The Blank
Question
________allows us to define abstract operations on abstract data.
Correct Answer
Data abstraction
Your Answer
Data abstraction
True/False
Question
An asynchronous call returns immediately, without waiting for the I/O to complete.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
locate the storage devices from the following :-
Correct Answer
Disks , Tapes
Your Answer
Disks , Tapes
Multiple Choice Single Answer
Question
Mango, apple and orange are members of class
Correct Answer
Fruit
Your Answer
Fruit
Multiple Choice Single Answer
Question
The pure Object Oriented language is
Correct Answer
Java
Your Answer
C++
Select The Blank
Question
Web servers use the ________ protocol to communicate with web browsers.
Correct Answer
http
Your Answer
http
Select The Blank
Question
________ is the ability to handle error conditions, including the ability of the operating system to protect itself and its users from defective or malicious software.
Correct Answer
Reliability
Your Answer
Security
Multiple Choice Multiple Answer
Question
One-to-one model is supported by following systems :-
Correct Answer
Windows NT , OS/2
Your Answer
Solaris , Windows NT
Multiple Choice Single Answer
Question
Collection of similar datatypes is called as
Correct Answer
Array
Your Answer
Array
Multiple Choice Single Answer
Question
C++ is basically a procedural language having extension of
Correct Answer
Object Oriented technology
Your Answer
Graphic user interface
Multiple Choice Single Answer
Question
In Object Oriented technology following expression is appropriate
Correct Answer
object=data+menthods
Your Answer
method= data + object
Multiple Choice Single Answer
Question
If a class fruit has object mango, the relationship is expressed as :
Correct Answer
Fruit mango
Your Answer
Fruit mango
Multiple Choice Multiple Answer
Question
Find out the basic I/O hardware elements from the following :-
Correct Answer
Ports , Buses , Device controllers
Your Answer
Ports , Buses , Device controllers
Multiple Choice Single Answer
Question
Model of protection can be viewed abstractly as a matrix which is known as :-
Correct Answer
Access matrix
Your Answer
Access matrix
Multiple Choice Single Answer
Question
The 4.3BSD operating system is the version of :-
Correct Answer
UNIX
Your Answer
UNIX
True/False
Question
When application issues a blocking I/O system call, the request is placed on the queue for that device.
Correct Answer
True
Your Answer
False
Select The Blank
Question
________ is defined as a cooperation between object codes produced by different software vendors & written in different programming languages.
Correct Answer
Interoperability
Your Answer
Interoperability
True/False
Question
Linux is a multi-user, multitasking system with a full set of UNIX-compatible tools.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
DMA stands for :-
Correct Answer
Direct Memory Access
Your Answer
Direct Memory Access
Match The Following
Question
Correct Answer
Your Answer
Light-Weight processes
Thread
Solaris process
Parent process
Child process
Unix process
Foreground processes
Interactive processes
Interactive processes
Background processes
Batch processes
Thread
Multiple Choice Multiple Answer
Question
Find out the human-interface devices :-
Correct Answer
Screen , Keyboard , Mouse
Your Answer
Screen , Keyboard , Mouse
Select The Blank
Question
A process is ________ if it can affect or be affected by the other processes executing in the system.
Correct Answer
Cooperating
Your Answer
Independent
Multiple Choice Multiple Answer
Question
Liner address is divided into fields like :-
Correct Answer
Dir , Page , Offset
Your Answer
Dir , Page , File
True/False
Question
An I/O bound process spend more of its time doing I/O than it spends doing computations.
Correct Answer
True
Your Answer
False
Multiple Choice Single Answer
Question
In some systems, if a process terminates, then all its children must also be terminated. This phenomenon referred to as :-
Correct Answer
Cascading termination
Your Answer
Removing all
Multiple Choice Multiple Answer
Question
find out the services provided by kernel related to I/O :
Correct Answer
I/O Scheduling , Buffering , Spooling
Your Answer
I/O Scheduling , Buffering , I/o subsystem
True/False
Question
The language Classic-Ada is not OOPL
Correct Answer
False
Your Answer
True
Select The Blank
Question
In Linux, the allocator uses a ________ algorithm to keep track of available physical pages.
Correct Answer
Buddy-heap
Your Answer
Sort-first
Select The Blank
Question
________ describes segments local to each program, including its code, data, stack etc.
Correct Answer
LDT
Your Answer
LDT
True/False
Question
A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .
Correct Answer
False
Your Answer
False
True/False
Question
A copy of inode is kept in main memory while a file is open.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
The separation of policy and mechanism is important for which purpose?
Correct Answer
Flexibility
Your Answer
Costing
Select The Blank
Question
A ________ is a group of NT server machines that share a common security policy and user databases.
Correct Answer
Domain
Your Answer
Domain
Multiple Choice Single Answer
Question
If Dog derives from Mammal, and Mammal derives from Animal, then -
Correct Answer
Dog inherits Animal's functions and data
Your Answer
Dog inherits Animal's functions and data
True/False
Question
Keyboard is a sharable device.
Correct Answer
True
Your Answer
False
Question
Each object is associated with the data of type class with which they are created. A class is thus a collection of objects of
Correct Answer
Similar type
Your Answer
Similar type
Multiple Choice Single Answer
Question
C++ is also named as
Correct Answer
C with classes
Your Answer
Visual C++
Select The Blank
Question
The ________ of a process is represented in the PCB of a process.
Correct Answer
Context
Your Answer
Control
Multiple Choice Multiple Answer
Question
In windows NT, naming of objects is of two types :-
Correct Answer
Permanent name , Temporary name
Your Answer
Permanent name , Object-primary name
Match The Following
Question
Correct Answer
Your Answer
Class Shape
Triangle, rectangle, circle, ellipse
Triangle, rectangle, circle, ellipse
Class Vehicle
Scooter, car, truck, tractor
Scooter, car, truck, tractor
Class Animal
Cat, dog, cow, tiger
Cat, dog, cow, tiger
Class Color
Red, yellow, blue, green
Red, yellow, blue, green
Multiple Choice Multiple Answer
Question
Computer system consists of :-
Correct Answer
CPU , Multiple device controller
Your Answer
CPU , Multiple device controller
Multiple Choice Single Answer
Question
In JAVA , the derived class is known as
Correct Answer
Subclass
Your Answer
Subclass
Select The Blank
Question
To make as interval call, the CALL instruction must contain ________.
Correct Answer
Selector
Your Answer
Address
True/False
Question
In Lock-key mechanism, users are allowed to examine or modify the list of keys or locks directly.
Correct Answer
False
Your Answer
True
Multiple Choice Single Answer
Question
A major problem with the Priority scheduling algorithm is :-
Correct Answer
Starvation
Your Answer
CPU time
Select The Blank
Question
________ of an object remains unchanged even though its state and properties change.
Correct Answer
Identity
Your Answer
Identity
Multiple Choice Single Answer
Question
The process by which objects of one class acquire properties of objects of other class is called
Correct Answer
Inheritance
Your Answer
Polymorphism
Select The Blank
Question
________allows us to define abstract operations on abstract data.
Correct Answer
Data abstraction
Your Answer
Data abstraction
True/False
Question
An asynchronous call returns immediately, without waiting for the I/O to complete.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
locate the storage devices from the following :-
Correct Answer
Disks , Tapes
Your Answer
Disks , Tapes
Multiple Choice Single Answer
Question
Mango, apple and orange are members of class
Correct Answer
Fruit
Your Answer
Fruit
Multiple Choice Single Answer
Question
The pure Object Oriented language is
Correct Answer
Java
Your Answer
C++
Select The Blank
Question
Web servers use the ________ protocol to communicate with web browsers.
Correct Answer
http
Your Answer
http
Select The Blank
Question
________ is the ability to handle error conditions, including the ability of the operating system to protect itself and its users from defective or malicious software.
Correct Answer
Reliability
Your Answer
Security
Multiple Choice Multiple Answer
Question
One-to-one model is supported by following systems :-
Correct Answer
Windows NT , OS/2
Your Answer
Solaris , Windows NT
Multiple Choice Single Answer
Question
Collection of similar datatypes is called as
Correct Answer
Array
Your Answer
Array
Multiple Choice Single Answer
Question
C++ is basically a procedural language having extension of
Correct Answer
Object Oriented technology
Your Answer
Graphic user interface
Multiple Choice Single Answer
Question
In Object Oriented technology following expression is appropriate
Correct Answer
object=data+menthods
Your Answer
method= data + object
Multiple Choice Single Answer
Question
If a class fruit has object mango, the relationship is expressed as :
Correct Answer
Fruit mango
Your Answer
Fruit mango
Multiple Choice Multiple Answer
Question
Find out the basic I/O hardware elements from the following :-
Correct Answer
Ports , Buses , Device controllers
Your Answer
Ports , Buses , Device controllers
Multiple Choice Single Answer
Question
Model of protection can be viewed abstractly as a matrix which is known as :-
Correct Answer
Access matrix
Your Answer
Access matrix
Multiple Choice Single Answer
Question
The 4.3BSD operating system is the version of :-
Correct Answer
UNIX
Your Answer
UNIX
True/False
Question
When application issues a blocking I/O system call, the request is placed on the queue for that device.
Correct Answer
True
Your Answer
False
Select The Blank
Question
________ is defined as a cooperation between object codes produced by different software vendors & written in different programming languages.
Correct Answer
Interoperability
Your Answer
Interoperability
True/False
Question
Linux is a multi-user, multitasking system with a full set of UNIX-compatible tools.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
DMA stands for :-
Correct Answer
Direct Memory Access
Your Answer
Direct Memory Access
Match The Following
Question
Correct Answer
Your Answer
Light-Weight processes
Thread
Solaris process
Parent process
Child process
Unix process
Foreground processes
Interactive processes
Interactive processes
Background processes
Batch processes
Thread
Multiple Choice Multiple Answer
Question
Find out the human-interface devices :-
Correct Answer
Screen , Keyboard , Mouse
Your Answer
Screen , Keyboard , Mouse
Select The Blank
Question
A process is ________ if it can affect or be affected by the other processes executing in the system.
Correct Answer
Cooperating
Your Answer
Independent
Multiple Choice Multiple Answer
Question
Liner address is divided into fields like :-
Correct Answer
Dir , Page , Offset
Your Answer
Dir , Page , File
True/False
Question
An I/O bound process spend more of its time doing I/O than it spends doing computations.
Correct Answer
True
Your Answer
False
Multiple Choice Single Answer
Question
In some systems, if a process terminates, then all its children must also be terminated. This phenomenon referred to as :-
Correct Answer
Cascading termination
Your Answer
Removing all
Multiple Choice Multiple Answer
Question
find out the services provided by kernel related to I/O :
Correct Answer
I/O Scheduling , Buffering , Spooling
Your Answer
I/O Scheduling , Buffering , I/o subsystem
True/False
Question
The language Classic-Ada is not OOPL
Correct Answer
False
Your Answer
True
Select The Blank
Question
In Linux, the allocator uses a ________ algorithm to keep track of available physical pages.
Correct Answer
Buddy-heap
Your Answer
Sort-first
Select The Blank
Question
________ describes segments local to each program, including its code, data, stack etc.
Correct Answer
LDT
Your Answer
LDT
True/False
Question
A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .
Correct Answer
False
Your Answer
False
True/False
Question
A copy of inode is kept in main memory while a file is open.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
The separation of policy and mechanism is important for which purpose?
Correct Answer
Flexibility
Your Answer
Costing
Select The Blank
Question
A ________ is a group of NT server machines that share a common security policy and user databases.
Correct Answer
Domain
Your Answer
Domain
Multiple Choice Single Answer
Question
If Dog derives from Mammal, and Mammal derives from Animal, then -
Correct Answer
Dog inherits Animal's functions and data
Your Answer
Dog inherits Animal's functions and data
True/False
Question
Keyboard is a sharable device.
Correct Answer
True
Your Answer
False
Multiple Choice Multiple Answer
Question
A mailbox can be owned by :-
Correct Answer
Operating system , Process
Your Answer
User , Process
Multiple Choice Single Answer
Question
Software may trigger an interrupt by executing a special operation called :-
Correct Answer
System call
Your Answer
Interrupt call
Match The Following
Question
Correct Answer
Your Answer
User mode
Mode bit 1
Monitor mode
Serial port
Modem
Modem
Parallel port
Printer
Printer
Privileged instructions
Monitor mode
UPS
Multiple Choice Multiple Answer
Question
The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :-
Correct Answer
Explicit , Implicit
Your Answer
Implicit , Indirect
Multiple Choice Multiple Answer
Question
What are the ways in which a request for kernel-mode execution can occur in Linux?
Correct Answer
Explicitly , Implicitly
Your Answer
Implicitly , Function call
Multiple Choice Multiple Answer
Question
Supervisor mode is also known as :-
Correct Answer
System mode , Privileged mode , Monitor mode
Your Answer
Privileged mode , Special mode
Multiple Choice Multiple Answer
Question
The role of the operating system in computer I/O is to :-
Correct Answer
Manage I/O operation and devices , Control I/O operation and devices
Your Answer
Manage I/O operation and devices , I/O processing
True/False
Question
In UNIX, first two names in every directory are "." and ".."
Correct Answer
True
Your Answer
False
Multiple Choice Multiple Answer
Question
Various storage systems available possesses which two characteristics?
Correct Answer
Volatile , Non-volatile
Your Answer
Primary storage , Secondary storage
Multiple Choice Single Answer
Question
A program in execution is:-
Correct Answer
Process
Your Answer
Operation
Select The Blank
Question
In some operating system, spooling is handled by an ________ .
Correct Answer
In-kernel thread
Your Answer
In-kernel thread
Select The Blank
Question
The hardware to measure elapsed time to trigger operations is called a ________.
Correct Answer
Programmable interval timer
Your Answer
Elapsed timer
True/False
Question
NFU algorithm requires a software counter associated with each page initially zero.
Correct Answer
True
Your Answer
True
True/False
Question
Volatile storage loses its contents when the power to the device is removed.
Correct Answer
True
Your Answer
False
Match The Following
Question
Correct Answer
Your Answer
MFT
Multi programming with fixed task
Multi programming with fixed task
RAM
Volatile memory
Volatile memory
ROM
Read only memory
Read only memory
BIOS
Basic input output system
Basic input output system
Select The Blank
Question
________ includes disks and tapes.
Correct Answer
Block devices
Your Answer
Socket interfaces
Select The Blank
Question
The process could create a new ________ and wait for its termination.
Correct Answer
Sub process
Your Answer
Child
True/False
Question
The cipher text can be stored in a readable file or transmitted over unprotected channels.
Correct Answer
True
Your Answer
True
Select The Blank
Question
The virtual memory portion of the NT executive is the ________.
Correct Answer
Virtual memory manager
Your Answer
Page-memory manager
Multiple Choice Single Answer
Question
The main difference between structure and class is
Correct Answer
Structure does not support OOPS Class Supports OOPS.
Your Answer
Structure is used in OOPS. Classes are used in procedural programs.
Multiple Choice Multiple Answer
Question
Find out different types of I/O buses :-
Correct Answer
EIDE , SCSI
Your Answer
EIDE , SCSI
Select The Blank
Question
________ passwords prevent improper authentication due to password exposure.
Correct Answer
One-time
Your Answer
Encrypted
Select The Blank
Question
Like worms, ________ are designed to spread into other programs and can wreak havoc in a system.
Correct Answer
Viruses
Your Answer
Trojan horses
Select The Blank
Question
A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote.
Correct Answer
Redirector
Your Answer
Director
Select The Blank
Question
One interface that is available in many operating systems, including UNIX and WindowsNT, is the network ________ interface.
Correct Answer
Socket
Your Answer
Device
True/False
Question
In Windows NT, kernel can be paged out of memory and its executions can be preempted.
Correct Answer
False
Your Answer
True
Multiple Choice Single Answer
Question
The insulation of data from direct access by the program is known as :
Correct Answer
Data hiding
Your Answer
Abstraction
Multiple Choice Single Answer
Question
The concept of OOPS was first introduced in
Correct Answer
Simula Language
Your Answer
Simula Language
Multiple Choice Multiple Answer
Question
locate the transmission devices :-
Correct Answer
Network cards , Modems
Your Answer
Network cards , Modems
Multiple Choice Single Answer
Question
How big is a class object?
Correct Answer
Is as big as sum of the sizes of its member variables
Your Answer
Is as big as sum of the sizes of its member variables
Multiple Choice Single Answer
Question
The system call checks the arguments given by the application, builds a data structure to convey the arguments to the kernel and then executes a special instruction called as :-
Correct Answer
Software interrupt
Your Answer
Special system call
Multiple Choice Multiple Answer
Question
Security violations of the system can be categorized as :-
Correct Answer
Malicious , Accidental
Your Answer
Unauthorized , Authorized
Select The Blank
Question
Most computers have ________ clocks and timers.
Correct Answer
Hardware
Your Answer
In-built
Multiple Choice Single Answer
Question
A domain is a collection of :-
Correct Answer
Access rights
Your Answer
Objects
True/False
Question
In paging the total address space can exceed the size of physical memory
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
Objects may communicate with each other through
Correct Answer
Methods
Your Answer
Methods
Multiple Choice Single Answer
Question
A system consists of collection of :-
Correct Answer
Processes
Your Answer
Processes
Multiple Choice Multiple Answer
Question
An audit log records which things about an object ?
Correct Answer
Time , User , Type of access
Your Answer
Time , Type of access
Multiple Choice Single Answer
Question
It has been said that Pascal and C programs are collections of procedures and C++ programs are collections of
Correct Answer
Classes
Your Answer
Classes
Select The Blank
Question
OOSAD begins with identification of actors, what activities they perform and building ________ model for the function.
Correct Answer
Use-case
Your Answer
Use-case
Multiple Choice Single Answer
Question
The smallest addressable portion of a disk is :-
Correct Answer
Sector
Your Answer
Sector
True/False
Question
OOSAD approach is applicable only to stable systems.
Correct Answer
False
Your Answer
True
True/False
Question
To perform a disk I/O operation, the computer places a command into the host controller, typically using memory-mapped I/O ports.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
The number of processes that are completed per time unit is called as:-
Correct Answer
Throughput of system
Your Answer
Efficiency of system
Multiple Choice Single Answer
Question
In MULTICS TLB address of 'n', the most recently referenced pages are kept, where 'n' can have a value :-
Correct Answer
16
Your Answer
8
True/False
Question
The job of I/O channel is to offload I/O work from the main CPU.
Correct Answer
True
Your Answer
False
Question
A mailbox can be owned by :-
Correct Answer
Operating system , Process
Your Answer
User , Process
Multiple Choice Single Answer
Question
Software may trigger an interrupt by executing a special operation called :-
Correct Answer
System call
Your Answer
Interrupt call
Match The Following
Question
Correct Answer
Your Answer
User mode
Mode bit 1
Monitor mode
Serial port
Modem
Modem
Parallel port
Printer
Printer
Privileged instructions
Monitor mode
UPS
Multiple Choice Multiple Answer
Question
The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :-
Correct Answer
Explicit , Implicit
Your Answer
Implicit , Indirect
Multiple Choice Multiple Answer
Question
What are the ways in which a request for kernel-mode execution can occur in Linux?
Correct Answer
Explicitly , Implicitly
Your Answer
Implicitly , Function call
Multiple Choice Multiple Answer
Question
Supervisor mode is also known as :-
Correct Answer
System mode , Privileged mode , Monitor mode
Your Answer
Privileged mode , Special mode
Multiple Choice Multiple Answer
Question
The role of the operating system in computer I/O is to :-
Correct Answer
Manage I/O operation and devices , Control I/O operation and devices
Your Answer
Manage I/O operation and devices , I/O processing
True/False
Question
In UNIX, first two names in every directory are "." and ".."
Correct Answer
True
Your Answer
False
Multiple Choice Multiple Answer
Question
Various storage systems available possesses which two characteristics?
Correct Answer
Volatile , Non-volatile
Your Answer
Primary storage , Secondary storage
Multiple Choice Single Answer
Question
A program in execution is:-
Correct Answer
Process
Your Answer
Operation
Select The Blank
Question
In some operating system, spooling is handled by an ________ .
Correct Answer
In-kernel thread
Your Answer
In-kernel thread
Select The Blank
Question
The hardware to measure elapsed time to trigger operations is called a ________.
Correct Answer
Programmable interval timer
Your Answer
Elapsed timer
True/False
Question
NFU algorithm requires a software counter associated with each page initially zero.
Correct Answer
True
Your Answer
True
True/False
Question
Volatile storage loses its contents when the power to the device is removed.
Correct Answer
True
Your Answer
False
Match The Following
Question
Correct Answer
Your Answer
MFT
Multi programming with fixed task
Multi programming with fixed task
RAM
Volatile memory
Volatile memory
ROM
Read only memory
Read only memory
BIOS
Basic input output system
Basic input output system
Select The Blank
Question
________ includes disks and tapes.
Correct Answer
Block devices
Your Answer
Socket interfaces
Select The Blank
Question
The process could create a new ________ and wait for its termination.
Correct Answer
Sub process
Your Answer
Child
True/False
Question
The cipher text can be stored in a readable file or transmitted over unprotected channels.
Correct Answer
True
Your Answer
True
Select The Blank
Question
The virtual memory portion of the NT executive is the ________.
Correct Answer
Virtual memory manager
Your Answer
Page-memory manager
Multiple Choice Single Answer
Question
The main difference between structure and class is
Correct Answer
Structure does not support OOPS Class Supports OOPS.
Your Answer
Structure is used in OOPS. Classes are used in procedural programs.
Multiple Choice Multiple Answer
Question
Find out different types of I/O buses :-
Correct Answer
EIDE , SCSI
Your Answer
EIDE , SCSI
Select The Blank
Question
________ passwords prevent improper authentication due to password exposure.
Correct Answer
One-time
Your Answer
Encrypted
Select The Blank
Question
Like worms, ________ are designed to spread into other programs and can wreak havoc in a system.
Correct Answer
Viruses
Your Answer
Trojan horses
Select The Blank
Question
A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote.
Correct Answer
Redirector
Your Answer
Director
Select The Blank
Question
One interface that is available in many operating systems, including UNIX and WindowsNT, is the network ________ interface.
Correct Answer
Socket
Your Answer
Device
True/False
Question
In Windows NT, kernel can be paged out of memory and its executions can be preempted.
Correct Answer
False
Your Answer
True
Multiple Choice Single Answer
Question
The insulation of data from direct access by the program is known as :
Correct Answer
Data hiding
Your Answer
Abstraction
Multiple Choice Single Answer
Question
The concept of OOPS was first introduced in
Correct Answer
Simula Language
Your Answer
Simula Language
Multiple Choice Multiple Answer
Question
locate the transmission devices :-
Correct Answer
Network cards , Modems
Your Answer
Network cards , Modems
Multiple Choice Single Answer
Question
How big is a class object?
Correct Answer
Is as big as sum of the sizes of its member variables
Your Answer
Is as big as sum of the sizes of its member variables
Multiple Choice Single Answer
Question
The system call checks the arguments given by the application, builds a data structure to convey the arguments to the kernel and then executes a special instruction called as :-
Correct Answer
Software interrupt
Your Answer
Special system call
Multiple Choice Multiple Answer
Question
Security violations of the system can be categorized as :-
Correct Answer
Malicious , Accidental
Your Answer
Unauthorized , Authorized
Select The Blank
Question
Most computers have ________ clocks and timers.
Correct Answer
Hardware
Your Answer
In-built
Multiple Choice Single Answer
Question
A domain is a collection of :-
Correct Answer
Access rights
Your Answer
Objects
True/False
Question
In paging the total address space can exceed the size of physical memory
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
Objects may communicate with each other through
Correct Answer
Methods
Your Answer
Methods
Multiple Choice Single Answer
Question
A system consists of collection of :-
Correct Answer
Processes
Your Answer
Processes
Multiple Choice Multiple Answer
Question
An audit log records which things about an object ?
Correct Answer
Time , User , Type of access
Your Answer
Time , Type of access
Multiple Choice Single Answer
Question
It has been said that Pascal and C programs are collections of procedures and C++ programs are collections of
Correct Answer
Classes
Your Answer
Classes
Select The Blank
Question
OOSAD begins with identification of actors, what activities they perform and building ________ model for the function.
Correct Answer
Use-case
Your Answer
Use-case
Multiple Choice Single Answer
Question
The smallest addressable portion of a disk is :-
Correct Answer
Sector
Your Answer
Sector
True/False
Question
OOSAD approach is applicable only to stable systems.
Correct Answer
False
Your Answer
True
True/False
Question
To perform a disk I/O operation, the computer places a command into the host controller, typically using memory-mapped I/O ports.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
The number of processes that are completed per time unit is called as:-
Correct Answer
Throughput of system
Your Answer
Efficiency of system
Multiple Choice Single Answer
Question
In MULTICS TLB address of 'n', the most recently referenced pages are kept, where 'n' can have a value :-
Correct Answer
16
Your Answer
8
True/False
Question
The job of I/O channel is to offload I/O work from the main CPU.
Correct Answer
True
Your Answer
False
Multiple Choice Multiple Answer
Question
Kernel threads are generally :-
Correct Answer
Slower to create , Difficult to manage
Your Answer
Slower to create , Difficult to manage
Select The Blank
Question
If the user-supplied password matches the password stored in the system, the system assumes that the user is ________.
Correct Answer
Legitimate
Your Answer
Legitimate
Multiple Choice Single Answer
Question
In general , the access matrix will be :-
Correct Answer
Sparse
Your Answer
Sparse
True/False
Question
Encryption is one common method of protecting information that is transmitted over unreliable links.
Correct Answer
True
Your Answer
False
Select The Blank
Question
A ________ is a full duplex connection between a device driver and a user-level process.
Correct Answer
Stream
Your Answer
Stream
Multiple Choice Single Answer
Question
In how many number of classes does the NRU algorithm divides pages, depending on the state of R and M?
Correct Answer
4
Your Answer
8
Select The Blank
Question
The Pentium page size is fixed at ________ KB.
Correct Answer
4
Your Answer
4
True/False
Question
Volatile storage loses its contents when the power to the device is removed.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :-
Correct Answer
Explicit , Implicit
Your Answer
Explicit , Implicit
Select The Blank
Question
In queuing diagram, the arrow indicates the flow of ________ in the system.
Correct Answer
Processes
Your Answer
Processes
Multiple Choice Multiple Answer
Question
What are the forms of malicious access?
Correct Answer
Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data
Your Answer
Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data
Select The Blank
Question
A bit called the ________ , is added to the hardware of the computer to indicate the current mode.
Correct Answer
Mode bit
Your Answer
Mode bit
Multiple Choice Multiple Answer
Question
In Windows NT , kernel uses which two sets of objects?
Correct Answer
Dispatcher objects , Control objects
Your Answer
Dispatcher objects , Complex objects
Multiple Choice Single Answer
Question
The smallest addressable portion of a disk is :-
Correct Answer
Sector
Your Answer
Sector
True/False
Question
In FIFO algorithm the page removed from memory is the one which most recently used.
Correct Answer
False
Your Answer
False
Select The Blank
Question
A process is ________, if it cannot affect or be affected by the other processes executing in the system.
Correct Answer
Independent
Your Answer
Independent
Multiple Choice Multiple Answer
Question
Linux presents standard interfaces to whom?
Correct Answer
Programmer , User
Your Answer
Programmer , User , System administrator
Select The Blank
Question
The kernel module that controls a device is a ________ .
Correct Answer
Device driver
Your Answer
Device daemon
True/False
Question
Whenever a trap or interrupt occurs, the hardware switches from user mode to monitor mode.
Correct Answer
True
Your Answer
True
Select The Blank
Question
A ________ is a computer or router that sits between the trusted and untrusted systems.
Correct Answer
Firewall
Your Answer
Firewall
Multiple Choice Multiple Answer
Question
Find out the basic I/O hardware elements from the following :-
Correct Answer
Ports , Buses , Device controllers
Your Answer
Ports , Buses , Device controllers
True/False
Question
Object-oriented programming focuses on the integrated data and functionality as discrete units that have both knowledge (data) and capabilities (functions). Procedural programs, on the other hand, focus on functions and how they act on data.
Correct Answer
True
Your Answer
True
Match The Following
Question
Correct Answer
Your Answer
User mode
Mode bit 1
Mode bit 1
Serial port
Modem
Monitor mode
Parallel port
Printer
Printer
Privileged instructions
Monitor mode
Mode bit 0
True/False
Question
In segmentation the total address space can exceed the size of physical memory.
Correct Answer
True
Your Answer
False
Multiple Choice Single Answer
Question
Because of the concept of independent objects responding to messages, object orientation is a natural way to implement
Correct Answer
Event driven programming
Your Answer
Message deiven programming
Multiple Choice Single Answer
Question
In UNIX, everything below the system-call interface and above the physical hardware is the :-
Correct Answer
Kernel
Your Answer
I/O system
Multiple Choice Multiple Answer
Question
Different multithreading models available are :-
Correct Answer
Many-to-one model , One-to-one model , Many-to-many model
Your Answer
Many-to-one model , One-to-one model , Many-to-many model
Multiple Choice Multiple Answer
Question
An object type in windows NT is a system defined data type that has two things associated with it, which are they?
Correct Answer
Set of attributes , Set of methods
Your Answer
Object-type , Object-processing
Multiple Choice Multiple Answer
Question
When memory reference occurs in MULTICS the things which takes place are :-
Correct Answer
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address
Your Answer
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined
Multiple Choice Single Answer
Question
The interval from the time of submission of a process to the time of completion is :-
Correct Answer
Turnaround time
Your Answer
Turnaround time
True/False
Question
Context switch times are highly dependent on hardware support.
Correct Answer
True
Your Answer
True
True/False
Question
Procedure and data can be distinguished and separately protected in segmentation
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
Dispatcher functions involves the following :-
Correct Answer
Switching context , Switching to user mode
Your Answer
Switching context , Switching to user mode
Multiple Choice Single Answer
Question
The First version of UNIX was developed in 1969 by Ken Thompson of the Research Group at :-
Correct Answer
Bell Laboratories
Your Answer
Bell Laboratories
Multiple Choice Single Answer
Question
In Object Oriented technology following expression is appropriate
Correct Answer
object=data+menthods
Your Answer
object=data+menthods
Multiple Choice Single Answer
Question
A procedure body implementing an operation is termed as
Correct Answer
Method
Your Answer
Method
Select The Blank
Question
During execution, ________ register holds the sector for the code segment.
Correct Answer
CS
Your Answer
PS
True/False
Question
In some operating system, spooling is managed by a system daemon process.
Correct Answer
True
Your Answer
False
Select The Blank
Question
Each column in the access matrix can be implemented as an ________ for one object.
Correct Answer
Access list
Your Answer
Capability list
Multiple Choice Single Answer
Question
Policies for resource use may vary depending on the :-
Correct Answer
Application
Your Answer
System
Multiple Choice Multiple Answer
Question
A mailbox can be owned by :-
Correct Answer
Process , Operating system
Your Answer
User , Process , Program
Multiple Choice Single Answer
Question
The ready queue is generally stored as a :-
Correct Answer
Linked list
Your Answer
Queue
Select The Blank
Question
A ________ is region of fast memory that hold copies of data .
Correct Answer
Cache
Your Answer
Cache
Multiple Choice Multiple Answer
Question
What are the components to memory management under Linux?
Correct Answer
Physical memory manager , Virtual memory manager
Your Answer
Physical memory manager , Virtual memory manager
Match The Following
Question
Correct Answer
Your Answer
Bounded-buffer
Fixed size buffer
Fixed size buffer
Producer
Produces process
Produces process
Consumer
Consumes process
Consumes process
Unbounded-buffer
No limit on size of buffer
No limit on size of buffer
True/False
Question
The inode contains 15 pointers to the disk blocks containing the data contents of the file.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
When computer is powered up or rebooted, it needs to have an initial program to run. This initial program is known as :-
Correct Answer
Bootstrap program
Your Answer
Bootstrap program
Question
Kernel threads are generally :-
Correct Answer
Slower to create , Difficult to manage
Your Answer
Slower to create , Difficult to manage
Select The Blank
Question
If the user-supplied password matches the password stored in the system, the system assumes that the user is ________.
Correct Answer
Legitimate
Your Answer
Legitimate
Multiple Choice Single Answer
Question
In general , the access matrix will be :-
Correct Answer
Sparse
Your Answer
Sparse
True/False
Question
Encryption is one common method of protecting information that is transmitted over unreliable links.
Correct Answer
True
Your Answer
False
Select The Blank
Question
A ________ is a full duplex connection between a device driver and a user-level process.
Correct Answer
Stream
Your Answer
Stream
Multiple Choice Single Answer
Question
In how many number of classes does the NRU algorithm divides pages, depending on the state of R and M?
Correct Answer
4
Your Answer
8
Select The Blank
Question
The Pentium page size is fixed at ________ KB.
Correct Answer
4
Your Answer
4
True/False
Question
Volatile storage loses its contents when the power to the device is removed.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :-
Correct Answer
Explicit , Implicit
Your Answer
Explicit , Implicit
Select The Blank
Question
In queuing diagram, the arrow indicates the flow of ________ in the system.
Correct Answer
Processes
Your Answer
Processes
Multiple Choice Multiple Answer
Question
What are the forms of malicious access?
Correct Answer
Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data
Your Answer
Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data
Select The Blank
Question
A bit called the ________ , is added to the hardware of the computer to indicate the current mode.
Correct Answer
Mode bit
Your Answer
Mode bit
Multiple Choice Multiple Answer
Question
In Windows NT , kernel uses which two sets of objects?
Correct Answer
Dispatcher objects , Control objects
Your Answer
Dispatcher objects , Complex objects
Multiple Choice Single Answer
Question
The smallest addressable portion of a disk is :-
Correct Answer
Sector
Your Answer
Sector
True/False
Question
In FIFO algorithm the page removed from memory is the one which most recently used.
Correct Answer
False
Your Answer
False
Select The Blank
Question
A process is ________, if it cannot affect or be affected by the other processes executing in the system.
Correct Answer
Independent
Your Answer
Independent
Multiple Choice Multiple Answer
Question
Linux presents standard interfaces to whom?
Correct Answer
Programmer , User
Your Answer
Programmer , User , System administrator
Select The Blank
Question
The kernel module that controls a device is a ________ .
Correct Answer
Device driver
Your Answer
Device daemon
True/False
Question
Whenever a trap or interrupt occurs, the hardware switches from user mode to monitor mode.
Correct Answer
True
Your Answer
True
Select The Blank
Question
A ________ is a computer or router that sits between the trusted and untrusted systems.
Correct Answer
Firewall
Your Answer
Firewall
Multiple Choice Multiple Answer
Question
Find out the basic I/O hardware elements from the following :-
Correct Answer
Ports , Buses , Device controllers
Your Answer
Ports , Buses , Device controllers
True/False
Question
Object-oriented programming focuses on the integrated data and functionality as discrete units that have both knowledge (data) and capabilities (functions). Procedural programs, on the other hand, focus on functions and how they act on data.
Correct Answer
True
Your Answer
True
Match The Following
Question
Correct Answer
Your Answer
User mode
Mode bit 1
Mode bit 1
Serial port
Modem
Monitor mode
Parallel port
Printer
Printer
Privileged instructions
Monitor mode
Mode bit 0
True/False
Question
In segmentation the total address space can exceed the size of physical memory.
Correct Answer
True
Your Answer
False
Multiple Choice Single Answer
Question
Because of the concept of independent objects responding to messages, object orientation is a natural way to implement
Correct Answer
Event driven programming
Your Answer
Message deiven programming
Multiple Choice Single Answer
Question
In UNIX, everything below the system-call interface and above the physical hardware is the :-
Correct Answer
Kernel
Your Answer
I/O system
Multiple Choice Multiple Answer
Question
Different multithreading models available are :-
Correct Answer
Many-to-one model , One-to-one model , Many-to-many model
Your Answer
Many-to-one model , One-to-one model , Many-to-many model
Multiple Choice Multiple Answer
Question
An object type in windows NT is a system defined data type that has two things associated with it, which are they?
Correct Answer
Set of attributes , Set of methods
Your Answer
Object-type , Object-processing
Multiple Choice Multiple Answer
Question
When memory reference occurs in MULTICS the things which takes place are :-
Correct Answer
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address
Your Answer
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined
Multiple Choice Single Answer
Question
The interval from the time of submission of a process to the time of completion is :-
Correct Answer
Turnaround time
Your Answer
Turnaround time
True/False
Question
Context switch times are highly dependent on hardware support.
Correct Answer
True
Your Answer
True
True/False
Question
Procedure and data can be distinguished and separately protected in segmentation
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
Dispatcher functions involves the following :-
Correct Answer
Switching context , Switching to user mode
Your Answer
Switching context , Switching to user mode
Multiple Choice Single Answer
Question
The First version of UNIX was developed in 1969 by Ken Thompson of the Research Group at :-
Correct Answer
Bell Laboratories
Your Answer
Bell Laboratories
Multiple Choice Single Answer
Question
In Object Oriented technology following expression is appropriate
Correct Answer
object=data+menthods
Your Answer
object=data+menthods
Multiple Choice Single Answer
Question
A procedure body implementing an operation is termed as
Correct Answer
Method
Your Answer
Method
Select The Blank
Question
During execution, ________ register holds the sector for the code segment.
Correct Answer
CS
Your Answer
PS
True/False
Question
In some operating system, spooling is managed by a system daemon process.
Correct Answer
True
Your Answer
False
Select The Blank
Question
Each column in the access matrix can be implemented as an ________ for one object.
Correct Answer
Access list
Your Answer
Capability list
Multiple Choice Single Answer
Question
Policies for resource use may vary depending on the :-
Correct Answer
Application
Your Answer
System
Multiple Choice Multiple Answer
Question
A mailbox can be owned by :-
Correct Answer
Process , Operating system
Your Answer
User , Process , Program
Multiple Choice Single Answer
Question
The ready queue is generally stored as a :-
Correct Answer
Linked list
Your Answer
Queue
Select The Blank
Question
A ________ is region of fast memory that hold copies of data .
Correct Answer
Cache
Your Answer
Cache
Multiple Choice Multiple Answer
Question
What are the components to memory management under Linux?
Correct Answer
Physical memory manager , Virtual memory manager
Your Answer
Physical memory manager , Virtual memory manager
Match The Following
Question
Correct Answer
Your Answer
Bounded-buffer
Fixed size buffer
Fixed size buffer
Producer
Produces process
Produces process
Consumer
Consumes process
Consumes process
Unbounded-buffer
No limit on size of buffer
No limit on size of buffer
True/False
Question
The inode contains 15 pointers to the disk blocks containing the data contents of the file.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
When computer is powered up or rebooted, it needs to have an initial program to run. This initial program is known as :-
Correct Answer
Bootstrap program
Your Answer
Bootstrap program
Select The Blank
Question
Like worms, ________ are designed to spread into other programs and can wreak havoc in a system.
Correct Answer
Viruses
Your Answer
Viruses
Multiple Choice Multiple Answer
Question
The advantage of dynamic loading is
Correct Answer
Unused routine is never loaded , Useful when large amount of code are needed to handle infrequently occurring cases, such as error routines , It does not require special support from the operating system
Your Answer
Useful when large amount of code are needed to handle infrequently occurring cases, such as error routines , It does not require special support from the operating system , Unused routine is never loaded
Select The Blank
Question
Terminals and line printers are ________ .
Correct Answer
Character devices
Your Answer
Socket interfaces
Multiple Choice Multiple Answer
Question
A mailbox can be owned by :-
Correct Answer
Process , Operating system
Your Answer
Process , Operating system
Select The Blank
Question
A process is ________, if it cannot affect or be affected by the other processes executing in the system.
Correct Answer
Independent
Your Answer
Cooperating
True/False
Question
NFU is crude attempt to approximate LRU.
Correct Answer
True
Your Answer
False
True/False
Question
A copy of inode is kept in main memory while a file is open.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
The class bird should have object
Correct Answer
Egale
Your Answer
Egale
Multiple Choice Multiple Answer
Question
User thread libraries include :-
Correct Answer
POSIX Pthreads , Mach C-threads , Solaris threads
Your Answer
Mach C-threads , Solaris threads
True/False
Question
We can include dynamic protection in the access-matrix model by considering the domains and the access matrix itself as objects.
Correct Answer
True
Your Answer
True
True/False
Question
The capability list is associated with a domain.
Correct Answer
True
Your Answer
True
Select The Blank
Question
A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote.
Correct Answer
Redirector
Your Answer
Redirector
Select The Blank
Question
The ________ is a compromise between access lists and capability lists.
Correct Answer
Lock-Key Schemes
Your Answer
Protected procedures
Match The Following
Question
Correct Answer
Your Answer
Bit showing the availability of page in memory for which that entry belongs to
Present / absent bit
Modified bit
In page table entry, the access permitted are stored in
Protection bit
Protection bit
Bit is set when the page is referenced
Referenced bit
Referenced bit
Bit which keeps track of page usage
Modified bit
Security bit
Multiple Choice Single Answer
Question
In UNIX, files are organized in tree-structured :-
Correct Answer
Directories
Your Answer
Directories
Match The Following
Question
Correct Answer
Your Answer
We can define abstract operation on abstract data
Data abstraction
Data abstraction
Process of sharing properties of the higher level object or class
Inheritance
Inheritance
Ability to inherit attributes and methods from 2 or more objects or classes
Multiple inheritance
Multiple inheritance
Ability to send a message to several objects and to allow receiving object to respond method specified on the object.
Ploymorphism
Ploymorphism
Select The Blank
Question
The Solaris developers reimplemented the ________ using in-kernel thread to eliminate the context switch involved in moving each character between daemons and the kernel.
Correct Answer
Telnet daemon
Your Answer
Context-switch daemon
Multiple Choice Single Answer
Question
If the process is waiting for some event to occur then it is said to be in :-
Correct Answer
Waiting state
Your Answer
Ready state
True/False
Question
Cache is a non-volatile storage system.
Correct Answer
False
Your Answer
False
Multiple Choice Single Answer
Question
The wraping up of data and methods in a single unit (class) is known as :
Correct Answer
Encapsulation
Your Answer
Encapsulation
True/False
Question
A process is a victim of starvation if it becomes stuck in a scheduling queue indefinitely.
Correct Answer
True
Your Answer
True
Select The Blank
Question
________ file access can be layered on top of block-device drivers.
Correct Answer
Memory-mapped
Your Answer
Memory-mapped
Multiple Choice Multiple Answer
Question
find out the services provided by kernel related to I/O :
Correct Answer
I/O Scheduling , Buffering , Spooling
Your Answer
I/O Scheduling , Buffering , Spooling
Multiple Choice Multiple Answer
Question
The role of the operating system in computer I/O is to :-
Correct Answer
Manage I/O operation and devices , Control I/O operation and devices
Your Answer
Manage I/O operation and devices , Control I/O operation and devices
True/False
Question
In Lock-key mechanism, a process executing in a domain can access an object if that domain has a key that matches one of the locks of the objects.
Correct Answer
True
Your Answer
False
Multiple Choice Multiple Answer
Question
There are components to the module support under Linux, identify them :-
Correct Answer
Module management , Driver registration , Conflict-resolution mechanism
Your Answer
Module management , Driver registration , Conflict-resolution mechanism
Multiple Choice Single Answer
Question
The 4.3BSD operating system is the version of :-
Correct Answer
UNIX
Your Answer
UNIX
Select The Blank
Question
Each entry in the access matrix consists of a set of ________ .
Correct Answer
Access right
Your Answer
Access right
Multiple Choice Single Answer
Question
In UNIX, a file is represented by an :-
Correct Answer
Inode
Your Answer
Block
Multiple Choice Single Answer
Question
The segment is :-
Correct Answer
Logical entity
Your Answer
Logical entity
True/False
Question
In Windows NT, each process has one or more threads, which are the units of execution dispatched by the kernel.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
UNIX operating system is written mostly in :-
Correct Answer
C language
Your Answer
C++ language
Multiple Choice Multiple Answer
Question
Security violations of the system can be categorized as :-
Correct Answer
Malicious , Accidental
Your Answer
Malicious , Authorized
Multiple Choice Single Answer
Question
The smallest addressable portion of a disk is :-
Correct Answer
Sector
Your Answer
Sector
Select The Blank
Question
Associations are generally ________.
Correct Answer
Bidirectional
Your Answer
Bidirectional
Multiple Choice Multiple Answer
Question
Find out the human-interface devices :-
Correct Answer
Screen , Keyboard , Mouse
Your Answer
Screen , Keyboard , Mouse
Select The Blank
Question
________allows us to define abstract operations on abstract data.
Correct Answer
Data abstraction
Your Answer
Data abstraction
Multiple Choice Multiple Answer
Question
Once the I/O is started , which two courses of action are possible?
Correct Answer
Synchronous I/O , Asynchronous I/O , Simple I/O
Your Answer
Synchronous I/O , Asynchronous I/O , Simple I/O
Multiple Choice Multiple Answer
Question
In windows NT, naming of objects is of two types :-
Correct Answer
Permanent name , Temporary name
Your Answer
Permanent name , Temporary name
True/False
Question
Turnaround time is inversely proportional to throughput.
Correct Answer
True
Your Answer
True
Select The Blank
Question
The hardware to measure elapsed time to trigger operations is called a ________.
Correct Answer
Programmable interval timer
Your Answer
Programmable elapsed timer
Multiple Choice Multiple Answer
Question
User level threads are generally :-
Correct Answer
Fast to create , Easy to manage
Your Answer
Fast to create , Easy to manage
Multiple Choice Single Answer
Question
In MULTICS TLB address of 'n', the most recently referenced pages are kept, where 'n' can have a value :-
Correct Answer
16
Your Answer
16
Multiple Choice Single Answer
Question
C++ is also named as
Correct Answer
C with classes
Your Answer
C with classes
Multiple Choice Multiple Answer
Question
Liner address is divided into fields like :-
Correct Answer
Dir , Page , Offset
Your Answer
Dir , Page , Offset
Multiple Choice Single Answer
Question
DVMA stands for :-
Correct Answer
Direct Virtual Memory Access
Your Answer
Direct Virtual Memory Access
True/False
Question
An asynchronous call returns immediately, without waiting for the I/O to complete.
Correct Answer
True
Your Answer
True
Question
Like worms, ________ are designed to spread into other programs and can wreak havoc in a system.
Correct Answer
Viruses
Your Answer
Viruses
Multiple Choice Multiple Answer
Question
The advantage of dynamic loading is
Correct Answer
Unused routine is never loaded , Useful when large amount of code are needed to handle infrequently occurring cases, such as error routines , It does not require special support from the operating system
Your Answer
Useful when large amount of code are needed to handle infrequently occurring cases, such as error routines , It does not require special support from the operating system , Unused routine is never loaded
Select The Blank
Question
Terminals and line printers are ________ .
Correct Answer
Character devices
Your Answer
Socket interfaces
Multiple Choice Multiple Answer
Question
A mailbox can be owned by :-
Correct Answer
Process , Operating system
Your Answer
Process , Operating system
Select The Blank
Question
A process is ________, if it cannot affect or be affected by the other processes executing in the system.
Correct Answer
Independent
Your Answer
Cooperating
True/False
Question
NFU is crude attempt to approximate LRU.
Correct Answer
True
Your Answer
False
True/False
Question
A copy of inode is kept in main memory while a file is open.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
The class bird should have object
Correct Answer
Egale
Your Answer
Egale
Multiple Choice Multiple Answer
Question
User thread libraries include :-
Correct Answer
POSIX Pthreads , Mach C-threads , Solaris threads
Your Answer
Mach C-threads , Solaris threads
True/False
Question
We can include dynamic protection in the access-matrix model by considering the domains and the access matrix itself as objects.
Correct Answer
True
Your Answer
True
True/False
Question
The capability list is associated with a domain.
Correct Answer
True
Your Answer
True
Select The Blank
Question
A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote.
Correct Answer
Redirector
Your Answer
Redirector
Select The Blank
Question
The ________ is a compromise between access lists and capability lists.
Correct Answer
Lock-Key Schemes
Your Answer
Protected procedures
Match The Following
Question
Correct Answer
Your Answer
Bit showing the availability of page in memory for which that entry belongs to
Present / absent bit
Modified bit
In page table entry, the access permitted are stored in
Protection bit
Protection bit
Bit is set when the page is referenced
Referenced bit
Referenced bit
Bit which keeps track of page usage
Modified bit
Security bit
Multiple Choice Single Answer
Question
In UNIX, files are organized in tree-structured :-
Correct Answer
Directories
Your Answer
Directories
Match The Following
Question
Correct Answer
Your Answer
We can define abstract operation on abstract data
Data abstraction
Data abstraction
Process of sharing properties of the higher level object or class
Inheritance
Inheritance
Ability to inherit attributes and methods from 2 or more objects or classes
Multiple inheritance
Multiple inheritance
Ability to send a message to several objects and to allow receiving object to respond method specified on the object.
Ploymorphism
Ploymorphism
Select The Blank
Question
The Solaris developers reimplemented the ________ using in-kernel thread to eliminate the context switch involved in moving each character between daemons and the kernel.
Correct Answer
Telnet daemon
Your Answer
Context-switch daemon
Multiple Choice Single Answer
Question
If the process is waiting for some event to occur then it is said to be in :-
Correct Answer
Waiting state
Your Answer
Ready state
True/False
Question
Cache is a non-volatile storage system.
Correct Answer
False
Your Answer
False
Multiple Choice Single Answer
Question
The wraping up of data and methods in a single unit (class) is known as :
Correct Answer
Encapsulation
Your Answer
Encapsulation
True/False
Question
A process is a victim of starvation if it becomes stuck in a scheduling queue indefinitely.
Correct Answer
True
Your Answer
True
Select The Blank
Question
________ file access can be layered on top of block-device drivers.
Correct Answer
Memory-mapped
Your Answer
Memory-mapped
Multiple Choice Multiple Answer
Question
find out the services provided by kernel related to I/O :
Correct Answer
I/O Scheduling , Buffering , Spooling
Your Answer
I/O Scheduling , Buffering , Spooling
Multiple Choice Multiple Answer
Question
The role of the operating system in computer I/O is to :-
Correct Answer
Manage I/O operation and devices , Control I/O operation and devices
Your Answer
Manage I/O operation and devices , Control I/O operation and devices
True/False
Question
In Lock-key mechanism, a process executing in a domain can access an object if that domain has a key that matches one of the locks of the objects.
Correct Answer
True
Your Answer
False
Multiple Choice Multiple Answer
Question
There are components to the module support under Linux, identify them :-
Correct Answer
Module management , Driver registration , Conflict-resolution mechanism
Your Answer
Module management , Driver registration , Conflict-resolution mechanism
Multiple Choice Single Answer
Question
The 4.3BSD operating system is the version of :-
Correct Answer
UNIX
Your Answer
UNIX
Select The Blank
Question
Each entry in the access matrix consists of a set of ________ .
Correct Answer
Access right
Your Answer
Access right
Multiple Choice Single Answer
Question
In UNIX, a file is represented by an :-
Correct Answer
Inode
Your Answer
Block
Multiple Choice Single Answer
Question
The segment is :-
Correct Answer
Logical entity
Your Answer
Logical entity
True/False
Question
In Windows NT, each process has one or more threads, which are the units of execution dispatched by the kernel.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
UNIX operating system is written mostly in :-
Correct Answer
C language
Your Answer
C++ language
Multiple Choice Multiple Answer
Question
Security violations of the system can be categorized as :-
Correct Answer
Malicious , Accidental
Your Answer
Malicious , Authorized
Multiple Choice Single Answer
Question
The smallest addressable portion of a disk is :-
Correct Answer
Sector
Your Answer
Sector
Select The Blank
Question
Associations are generally ________.
Correct Answer
Bidirectional
Your Answer
Bidirectional
Multiple Choice Multiple Answer
Question
Find out the human-interface devices :-
Correct Answer
Screen , Keyboard , Mouse
Your Answer
Screen , Keyboard , Mouse
Select The Blank
Question
________allows us to define abstract operations on abstract data.
Correct Answer
Data abstraction
Your Answer
Data abstraction
Multiple Choice Multiple Answer
Question
Once the I/O is started , which two courses of action are possible?
Correct Answer
Synchronous I/O , Asynchronous I/O , Simple I/O
Your Answer
Synchronous I/O , Asynchronous I/O , Simple I/O
Multiple Choice Multiple Answer
Question
In windows NT, naming of objects is of two types :-
Correct Answer
Permanent name , Temporary name
Your Answer
Permanent name , Temporary name
True/False
Question
Turnaround time is inversely proportional to throughput.
Correct Answer
True
Your Answer
True
Select The Blank
Question
The hardware to measure elapsed time to trigger operations is called a ________.
Correct Answer
Programmable interval timer
Your Answer
Programmable elapsed timer
Multiple Choice Multiple Answer
Question
User level threads are generally :-
Correct Answer
Fast to create , Easy to manage
Your Answer
Fast to create , Easy to manage
Multiple Choice Single Answer
Question
In MULTICS TLB address of 'n', the most recently referenced pages are kept, where 'n' can have a value :-
Correct Answer
16
Your Answer
16
Multiple Choice Single Answer
Question
C++ is also named as
Correct Answer
C with classes
Your Answer
C with classes
Multiple Choice Multiple Answer
Question
Liner address is divided into fields like :-
Correct Answer
Dir , Page , Offset
Your Answer
Dir , Page , Offset
Multiple Choice Single Answer
Question
DVMA stands for :-
Correct Answer
Direct Virtual Memory Access
Your Answer
Direct Virtual Memory Access
True/False
Question
An asynchronous call returns immediately, without waiting for the I/O to complete.
Correct Answer
True
Your Answer
True
Select The Blank
Question
Web servers use the ________ protocol to communicate with web browsers.
Correct Answer
http
Your Answer
http
True/False
Question
Cache-coherency is usually a software problem and handled above the operating system level.
Correct Answer
False
Your Answer
True
Multiple Choice Multiple Answer
Question
Two main jobs of a computer are :-
Correct Answer
I/O , Processing
Your Answer
I/O , Processing
Multiple Choice Multiple Answer
Question
What are the ways in which a request for kernel-mode execution can occur in Linux?
Correct Answer
Explicitly , Implicitly
Your Answer
Explicitly , Implicitly
Select The Blank
Question
If the user-supplied password matches the password stored in the system, the system assumes that the user is ________.
Correct Answer
Legitimate
Your Answer
Legitimate
True/False
Question
Single-indirect block is an index block which contains data of the files to which it points.
Correct Answer
False
Your Answer
True
True/False
Question
Volatile storage loses its contents when the power to the device is removed.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
SCSI stands for :-
Correct Answer
Small Computer-Systems Interface
Your Answer
System Call-System Interrupt
Multiple Choice Multiple Answer
Question
Which are the Division D security systems ?
Correct Answer
Windows 3.1 , MS-DOS
Your Answer
Windows NT , UNIX
Select The Blank
Question
static binding allows to hold certain properties fixed and rigid, whereas ________ binding allows object to behave as per conditions emerge.
Correct Answer
Dynamic
Your Answer
Dynamic
Multiple Choice Multiple Answer
Question
What are the components to memory management under Linux?
Correct Answer
Physical memory manager , Virtual memory manager
Your Answer
Physical memory manager , Virtual memory manager
Multiple Choice Single Answer
Question
The First version of UNIX was developed in 1969 by Ken Thompson of the Research Group at :-
Correct Answer
Bell Laboratories
Your Answer
Bell Laboratories
True/False
Question
XML is a meta data language developed to specify data with a goal of improving interoperatability of different data sources.
Correct Answer
True
Your Answer
True
True/False
Question
One way to achieve portability is to write software in standard version of high level language and to develop portable system and application software .
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
C++ is basically a procedural language having extension of
Correct Answer
Object Oriented technology
Your Answer
Object Oriented technology
Select The Blank
Question
The ________ of a process is represented in the PCB of a process.
Correct Answer
Context
Your Answer
Context
Select The Blank
Question
In windows NT, the ________ facility is used to pass requests and results between client and server processes within a single machine.
Correct Answer
Local-procedure-call
Your Answer
Remote-procedure-call
Multiple Choice Single Answer
Question
In how many number of classes does the NRU algorithm divides pages, depending on the state of R and M?
Correct Answer
4
Your Answer
4
Multiple Choice Multiple Answer
Question
When memory reference occurs in MULTICS the things which takes place are :-
Correct Answer
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address
Your Answer
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address
Multiple Choice Multiple Answer
Question
Supervisor mode is also known as :-
Correct Answer
System mode , Privileged mode , Monitor mode
Your Answer
System mode , Privileged mode , Monitor mode
Multiple Choice Single Answer
Question
How big is a class object?
Correct Answer
Is as big as sum of the sizes of its member variables
Your Answer
Is as big as sum of the sizes of its member variables
Multiple Choice Multiple Answer
Question
The device number consists of which two parts in UNIX?
Correct Answer
Major device number , Minor device number
Your Answer
Major device number , Minor device number
Select The Blank
Question
The context switch time is pure ________, because system does no useful work while switching.
Correct Answer
Overhead
Your Answer
Wastage
Multiple Choice Multiple Answer
Question
In Solaris 2, user-level threads may be:-
Correct Answer
Bound , Unbound
Your Answer
Bound , Unbound
Match The Following
Question
Correct Answer
Your Answer
Random-access devices
CD-ROM
CD-ROM
Character devices.
Terminal
Keyboard
Block devices
Disk
Tape
Sequential devices
Modem
Terminal
Multiple Choice Single Answer
Question
The main difference between structure and class is
Correct Answer
Structure does not support OOPS Class Supports OOPS.
Your Answer
Structure does not support OOPS Class Supports OOPS.
True/False
Question
Object-oriented programming focuses on the integrated data and functionality as discrete units that have both knowledge (data) and capabilities (functions). Procedural programs, on the other hand, focus on functions and how they act on data.
Correct Answer
True
Your Answer
True
Select The Blank
Question
A keyboard is an example of device that is accessed through a ________ interface.
Correct Answer
Character stream
Your Answer
Character stream
Multiple Choice Multiple Answer
Question
Find out the CPU scheduling algorithms from these options :-
Correct Answer
FCFS , RR , SJF
Your Answer
FCFS , RR , SJF
Multiple Choice Single Answer
Question
Main Memory of computer program is also called as :-
Correct Answer
RAM
Your Answer
RAM
Multiple Choice Multiple Answer
Question
The security of a system can be improved by two management techniques, such as :-
Correct Answer
Threat monitoring , Audit Log
Your Answer
Threat monitoring , Audit Log
Multiple Choice Single Answer
Question
The separation of policy and mechanism is important for which purpose?
Correct Answer
Flexibility
Your Answer
Flexibility
Match The Following
Question
Correct Answer
Your Answer
Trap in which program tries to use unmapped page
Page fault
Page fault
Memory Management Unit
MMU
MMU
Smaller units in which virtual address space is divided
Pages
Pages
Units in physical memory corresponding to pages in virtual memory
Page frame
Page frame
True/False
Question
A non-blocking call does not halt the execution of the application for an extended time.
Correct Answer
True
Your Answer
True
True/False
Question
Windows NT uses a message passing implementation for I/O.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
Kernel threads are generally :-
Correct Answer
Slower to create , Difficult to manage
Your Answer
Slower to create , Difficult to manage
Multiple Choice Single Answer
Question
The long-term scheduler controls the :-
Correct Answer
Degree of multiprogramming
Your Answer
Degree of multiprogramming
Multiple Choice Single Answer
Question
Objects may communicate with each other through
Correct Answer
Methods
Your Answer
Methods
Select The Blank
Question
In queuing diagram, the arrow indicates the flow of ________ in the system.
Correct Answer
Processes
Your Answer
Queue
Multiple Choice Single Answer
Question
If Dog derives from Mammal, and Mammal derives from Animal, then -
Correct Answer
Dog inherits Animal's functions and data
Your Answer
Dog inherits Animal's functions and data
Multiple Choice Single Answer
Question
Thread at user level is known as :-
Correct Answer
User thread
Your Answer
User thread
Select The Blank
Question
________ includes disks and tapes.
Correct Answer
Block devices
Your Answer
Block devices
Multiple Choice Single Answer
Question
DMA stands for :-
Correct Answer
Direct Memory Access
Your Answer
Direct Memory Access
True/False
Question
When application issues a blocking I/O system call, the request is placed on the queue for that device.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
The concept of OOPS was first introduced in
Correct Answer
Simula Language
Your Answer
Simula Language
True/False
Question
Encryption is one common method of protecting information that is transmitted over unreliable links.
Correct Answer
True
Your Answer
True
Select The Blank
Question
________ describes segments local to each program, including its code, data, stack etc.
Correct Answer
LDT
Your Answer
LDT
Question
Web servers use the ________ protocol to communicate with web browsers.
Correct Answer
http
Your Answer
http
True/False
Question
Cache-coherency is usually a software problem and handled above the operating system level.
Correct Answer
False
Your Answer
True
Multiple Choice Multiple Answer
Question
Two main jobs of a computer are :-
Correct Answer
I/O , Processing
Your Answer
I/O , Processing
Multiple Choice Multiple Answer
Question
What are the ways in which a request for kernel-mode execution can occur in Linux?
Correct Answer
Explicitly , Implicitly
Your Answer
Explicitly , Implicitly
Select The Blank
Question
If the user-supplied password matches the password stored in the system, the system assumes that the user is ________.
Correct Answer
Legitimate
Your Answer
Legitimate
True/False
Question
Single-indirect block is an index block which contains data of the files to which it points.
Correct Answer
False
Your Answer
True
True/False
Question
Volatile storage loses its contents when the power to the device is removed.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
SCSI stands for :-
Correct Answer
Small Computer-Systems Interface
Your Answer
System Call-System Interrupt
Multiple Choice Multiple Answer
Question
Which are the Division D security systems ?
Correct Answer
Windows 3.1 , MS-DOS
Your Answer
Windows NT , UNIX
Select The Blank
Question
static binding allows to hold certain properties fixed and rigid, whereas ________ binding allows object to behave as per conditions emerge.
Correct Answer
Dynamic
Your Answer
Dynamic
Multiple Choice Multiple Answer
Question
What are the components to memory management under Linux?
Correct Answer
Physical memory manager , Virtual memory manager
Your Answer
Physical memory manager , Virtual memory manager
Multiple Choice Single Answer
Question
The First version of UNIX was developed in 1969 by Ken Thompson of the Research Group at :-
Correct Answer
Bell Laboratories
Your Answer
Bell Laboratories
True/False
Question
XML is a meta data language developed to specify data with a goal of improving interoperatability of different data sources.
Correct Answer
True
Your Answer
True
True/False
Question
One way to achieve portability is to write software in standard version of high level language and to develop portable system and application software .
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
C++ is basically a procedural language having extension of
Correct Answer
Object Oriented technology
Your Answer
Object Oriented technology
Select The Blank
Question
The ________ of a process is represented in the PCB of a process.
Correct Answer
Context
Your Answer
Context
Select The Blank
Question
In windows NT, the ________ facility is used to pass requests and results between client and server processes within a single machine.
Correct Answer
Local-procedure-call
Your Answer
Remote-procedure-call
Multiple Choice Single Answer
Question
In how many number of classes does the NRU algorithm divides pages, depending on the state of R and M?
Correct Answer
4
Your Answer
4
Multiple Choice Multiple Answer
Question
When memory reference occurs in MULTICS the things which takes place are :-
Correct Answer
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address
Your Answer
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address
Multiple Choice Multiple Answer
Question
Supervisor mode is also known as :-
Correct Answer
System mode , Privileged mode , Monitor mode
Your Answer
System mode , Privileged mode , Monitor mode
Multiple Choice Single Answer
Question
How big is a class object?
Correct Answer
Is as big as sum of the sizes of its member variables
Your Answer
Is as big as sum of the sizes of its member variables
Multiple Choice Multiple Answer
Question
The device number consists of which two parts in UNIX?
Correct Answer
Major device number , Minor device number
Your Answer
Major device number , Minor device number
Select The Blank
Question
The context switch time is pure ________, because system does no useful work while switching.
Correct Answer
Overhead
Your Answer
Wastage
Multiple Choice Multiple Answer
Question
In Solaris 2, user-level threads may be:-
Correct Answer
Bound , Unbound
Your Answer
Bound , Unbound
Match The Following
Question
Correct Answer
Your Answer
Random-access devices
CD-ROM
CD-ROM
Character devices.
Terminal
Keyboard
Block devices
Disk
Tape
Sequential devices
Modem
Terminal
Multiple Choice Single Answer
Question
The main difference between structure and class is
Correct Answer
Structure does not support OOPS Class Supports OOPS.
Your Answer
Structure does not support OOPS Class Supports OOPS.
True/False
Question
Object-oriented programming focuses on the integrated data and functionality as discrete units that have both knowledge (data) and capabilities (functions). Procedural programs, on the other hand, focus on functions and how they act on data.
Correct Answer
True
Your Answer
True
Select The Blank
Question
A keyboard is an example of device that is accessed through a ________ interface.
Correct Answer
Character stream
Your Answer
Character stream
Multiple Choice Multiple Answer
Question
Find out the CPU scheduling algorithms from these options :-
Correct Answer
FCFS , RR , SJF
Your Answer
FCFS , RR , SJF
Multiple Choice Single Answer
Question
Main Memory of computer program is also called as :-
Correct Answer
RAM
Your Answer
RAM
Multiple Choice Multiple Answer
Question
The security of a system can be improved by two management techniques, such as :-
Correct Answer
Threat monitoring , Audit Log
Your Answer
Threat monitoring , Audit Log
Multiple Choice Single Answer
Question
The separation of policy and mechanism is important for which purpose?
Correct Answer
Flexibility
Your Answer
Flexibility
Match The Following
Question
Correct Answer
Your Answer
Trap in which program tries to use unmapped page
Page fault
Page fault
Memory Management Unit
MMU
MMU
Smaller units in which virtual address space is divided
Pages
Pages
Units in physical memory corresponding to pages in virtual memory
Page frame
Page frame
True/False
Question
A non-blocking call does not halt the execution of the application for an extended time.
Correct Answer
True
Your Answer
True
True/False
Question
Windows NT uses a message passing implementation for I/O.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
Kernel threads are generally :-
Correct Answer
Slower to create , Difficult to manage
Your Answer
Slower to create , Difficult to manage
Multiple Choice Single Answer
Question
The long-term scheduler controls the :-
Correct Answer
Degree of multiprogramming
Your Answer
Degree of multiprogramming
Multiple Choice Single Answer
Question
Objects may communicate with each other through
Correct Answer
Methods
Your Answer
Methods
Select The Blank
Question
In queuing diagram, the arrow indicates the flow of ________ in the system.
Correct Answer
Processes
Your Answer
Queue
Multiple Choice Single Answer
Question
If Dog derives from Mammal, and Mammal derives from Animal, then -
Correct Answer
Dog inherits Animal's functions and data
Your Answer
Dog inherits Animal's functions and data
Multiple Choice Single Answer
Question
Thread at user level is known as :-
Correct Answer
User thread
Your Answer
User thread
Select The Blank
Question
________ includes disks and tapes.
Correct Answer
Block devices
Your Answer
Block devices
Multiple Choice Single Answer
Question
DMA stands for :-
Correct Answer
Direct Memory Access
Your Answer
Direct Memory Access
True/False
Question
When application issues a blocking I/O system call, the request is placed on the queue for that device.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
The concept of OOPS was first introduced in
Correct Answer
Simula Language
Your Answer
Simula Language
True/False
Question
Encryption is one common method of protecting information that is transmitted over unreliable links.
Correct Answer
True
Your Answer
True
Select The Blank
Question
________ describes segments local to each program, including its code, data, stack etc.
Correct Answer
LDT
Your Answer
LDT
Multiple Choice Single Answer
Question
SCSI stands for :-
Correct Answer
Small Computer-Systems Interface
Your Answer
Small Computer-Systems Interface
Multiple Choice Multiple Answer
Question
The basic hardware elements involved in I/O are :-
Correct Answer
Buses , Device controllers , Device
Your Answer
Buses , Device controllers , Device
True/False
Question
A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .
Correct Answer
False
Your Answer
False
True/False
Question
C++ supports object oriented programming concepts of objects, classes, inheritance, polymorphism and parameterised datatypes.
Correct Answer
True
Your Answer
True
True/False
Question
I/O system calls are costly in terms of CPU consumptions.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
All user processes are descendents of one original process, Which is that process?
Correct Answer
Init process
Your Answer
Init process
Match The Following
Question
Correct Answer
Your Answer
Provides adjustment while compiling classes
Interface classes
Derived function
Identify values & relevant operations
Abstract data types
Abstract data types
Complete implementation of class
Concrete data types
Interface classes
Provides framework for other classes
Node classes
Node classes
Match The Following
Question
Correct Answer
Your Answer
Round-robin
Time quantum
Time quantum
First-come First-served
First come job
First come job
Shortest job
Shortest job
Shortest job
Priority
Highest priority job
Highest priority job
Select The Blank
Question
________ describes segments local to each program, including its code, data, stack etc.
Correct Answer
LDT
Your Answer
LDT
Multiple Choice Multiple Answer
Question
To protect the system, we must take security measures at two levels, such as :-
Correct Answer
Physical level , Human level
Your Answer
Physical level , Human level
True/False
Question
The hardware allows privileged instructions to be executed in only user mode.
Correct Answer
False
Your Answer
False
Multiple Choice Single Answer
Question
What does the rows of the access matrix represents?
Correct Answer
Domains
Your Answer
Domains
Select The Blank
Question
A bit called the ________ , is added to the hardware of the computer to indicate the current mode.
Correct Answer
Mode bit
Your Answer
Mode bit
True/False
Question
In Windows NT, each process has one or more threads, which are the units of execution dispatched by the kernel.
Correct Answer
True
Your Answer
True
Select The Blank
Question
________allows us to define abstract operations on abstract data.
Correct Answer
Data abstraction
Your Answer
Data abstraction
Select The Blank
Question
If the granularity field is ________ the limit field is the exact segment size, upto 1 MB.
Correct Answer
0
Your Answer
1
True/False
Question
Encryption is one common method of protecting information that is transmitted over unreliable links.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
Collection of similar datatypes is called as
Correct Answer
Array
Your Answer
Array
Multiple Choice Single Answer
Question
A Process which produces process is known as :-
Correct Answer
Producer
Your Answer
Producer
Multiple Choice Single Answer
Question
Interrupt mechanism accepts an address and this address is an offset in a table called the :-
Correct Answer
Interrupt vector
Your Answer
Interrupt vector
Select The Blank
Question
The process could create a new ________ and wait for its termination.
Correct Answer
Sub process
Your Answer
Sub process
Multiple Choice Single Answer
Question
Thread at user level is known as :-
Correct Answer
User thread
Your Answer
User thread
Multiple Choice Single Answer
Question
If Dog derives from Mammal, and Mammal derives from Animal, then -
Correct Answer
Dog inherits Animal's functions and data
Your Answer
Mammal inherits Animal's functions and data
Select The Blank
Question
During execution, ________ register holds the sector for the code segment.
Correct Answer
CS
Your Answer
DS
Multiple Choice Single Answer
Question
The list of processes waiting for a particular I/O device is called a :-
Correct Answer
Device queue
Your Answer
Device queue
True/False
Question
Cache is a faster storage system which stores data temporarily.
Correct Answer
True
Your Answer
True
True/False
Question
The file system does not provide a degree of protection.
Correct Answer
False
Your Answer
True
Multiple Choice Multiple Answer
Question
Liner address is divided into fields like :-
Correct Answer
Dir , Page , Offset
Your Answer
Dir , Page , Offset
True/False
Question
Volatile storage loses its contents when the power to the device is removed.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
Which of the following Operating System has no memory protection ?
Correct Answer
Windows 3.1
Your Answer
Windows 3.1
Multiple Choice Multiple Answer
Question
In windows NT, naming of objects is of two types :-
Correct Answer
Permanent name , Temporary name
Your Answer
Permanent name , Temporary name
Multiple Choice Single Answer
Question
Protection can no longer be considered solely as a matter of concern to the designer of :-
Correct Answer
Operating system
Your Answer
Operating system
Select The Blank
Question
Web servers use the ________ protocol to communicate with web browsers.
Correct Answer
http
Your Answer
http
Multiple Choice Multiple Answer
Question
locate the transmission devices :-
Correct Answer
Network cards , Modems
Your Answer
Network cards , Modems
Multiple Choice Single Answer
Question
In UNIX, the simplest form of communication between processes is by :-
Correct Answer
Pipes
Your Answer
Pipes
Select The Blank
Question
A ________ is a group of NT server machines that share a common security policy and user databases.
Correct Answer
Domain
Your Answer
Domain
Multiple Choice Multiple Answer
Question
Message passing may be :-
Correct Answer
Blocking , Non-blocking
Your Answer
Blocking , Non-blocking
Multiple Choice Multiple Answer
Question
An object type in windows NT is a system defined data type that has two things associated with it, which are they?
Correct Answer
Set of attributes , Set of methods
Your Answer
Set of attributes , Set of methods
Select The Blank
Question
The ________ of a process is represented in the PCB of a process.
Correct Answer
Context
Your Answer
Context
Select The Blank
Question
The Linux ________ file system, known as the proc file system, is an example of a file system whose contents are not actually stored anywhere, but are rather computed on demand according to user file I/o requests.
Correct Answer
Process
Your Answer
Process
True/False
Question
Objects can be both, tangible or intangible.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
In UNIX, a device is distinguished by two things, which are :-
Correct Answer
Device-class , Device number
Your Answer
Device-class , Device number
Multiple Choice Multiple Answer
Question
Find out the basic I/O hardware elements from the following :-
Correct Answer
Ports , Buses , Device controllers
Your Answer
Ports , Buses , Device controllers
Multiple Choice Multiple Answer
Question
Which are the Division D security systems ?
Correct Answer
Windows 3.1 , MS-DOS
Your Answer
Windows 3.1 , MS-DOS
Multiple Choice Single Answer
Question
Protection can improve :-
Correct Answer
Reliability
Your Answer
Reliability
Select The Blank
Question
The creating process is called a ________ process.
Correct Answer
Parent
Your Answer
Parent
Multiple Choice Multiple Answer
Question
When memory reference occurs in MULTICS the things which takes place are :-
Correct Answer
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address
Your Answer
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address
Question
SCSI stands for :-
Correct Answer
Small Computer-Systems Interface
Your Answer
Small Computer-Systems Interface
Multiple Choice Multiple Answer
Question
The basic hardware elements involved in I/O are :-
Correct Answer
Buses , Device controllers , Device
Your Answer
Buses , Device controllers , Device
True/False
Question
A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .
Correct Answer
False
Your Answer
False
True/False
Question
C++ supports object oriented programming concepts of objects, classes, inheritance, polymorphism and parameterised datatypes.
Correct Answer
True
Your Answer
True
True/False
Question
I/O system calls are costly in terms of CPU consumptions.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
All user processes are descendents of one original process, Which is that process?
Correct Answer
Init process
Your Answer
Init process
Match The Following
Question
Correct Answer
Your Answer
Provides adjustment while compiling classes
Interface classes
Derived function
Identify values & relevant operations
Abstract data types
Abstract data types
Complete implementation of class
Concrete data types
Interface classes
Provides framework for other classes
Node classes
Node classes
Match The Following
Question
Correct Answer
Your Answer
Round-robin
Time quantum
Time quantum
First-come First-served
First come job
First come job
Shortest job
Shortest job
Shortest job
Priority
Highest priority job
Highest priority job
Select The Blank
Question
________ describes segments local to each program, including its code, data, stack etc.
Correct Answer
LDT
Your Answer
LDT
Multiple Choice Multiple Answer
Question
To protect the system, we must take security measures at two levels, such as :-
Correct Answer
Physical level , Human level
Your Answer
Physical level , Human level
True/False
Question
The hardware allows privileged instructions to be executed in only user mode.
Correct Answer
False
Your Answer
False
Multiple Choice Single Answer
Question
What does the rows of the access matrix represents?
Correct Answer
Domains
Your Answer
Domains
Select The Blank
Question
A bit called the ________ , is added to the hardware of the computer to indicate the current mode.
Correct Answer
Mode bit
Your Answer
Mode bit
True/False
Question
In Windows NT, each process has one or more threads, which are the units of execution dispatched by the kernel.
Correct Answer
True
Your Answer
True
Select The Blank
Question
________allows us to define abstract operations on abstract data.
Correct Answer
Data abstraction
Your Answer
Data abstraction
Select The Blank
Question
If the granularity field is ________ the limit field is the exact segment size, upto 1 MB.
Correct Answer
0
Your Answer
1
True/False
Question
Encryption is one common method of protecting information that is transmitted over unreliable links.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
Collection of similar datatypes is called as
Correct Answer
Array
Your Answer
Array
Multiple Choice Single Answer
Question
A Process which produces process is known as :-
Correct Answer
Producer
Your Answer
Producer
Multiple Choice Single Answer
Question
Interrupt mechanism accepts an address and this address is an offset in a table called the :-
Correct Answer
Interrupt vector
Your Answer
Interrupt vector
Select The Blank
Question
The process could create a new ________ and wait for its termination.
Correct Answer
Sub process
Your Answer
Sub process
Multiple Choice Single Answer
Question
Thread at user level is known as :-
Correct Answer
User thread
Your Answer
User thread
Multiple Choice Single Answer
Question
If Dog derives from Mammal, and Mammal derives from Animal, then -
Correct Answer
Dog inherits Animal's functions and data
Your Answer
Mammal inherits Animal's functions and data
Select The Blank
Question
During execution, ________ register holds the sector for the code segment.
Correct Answer
CS
Your Answer
DS
Multiple Choice Single Answer
Question
The list of processes waiting for a particular I/O device is called a :-
Correct Answer
Device queue
Your Answer
Device queue
True/False
Question
Cache is a faster storage system which stores data temporarily.
Correct Answer
True
Your Answer
True
True/False
Question
The file system does not provide a degree of protection.
Correct Answer
False
Your Answer
True
Multiple Choice Multiple Answer
Question
Liner address is divided into fields like :-
Correct Answer
Dir , Page , Offset
Your Answer
Dir , Page , Offset
True/False
Question
Volatile storage loses its contents when the power to the device is removed.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
Which of the following Operating System has no memory protection ?
Correct Answer
Windows 3.1
Your Answer
Windows 3.1
Multiple Choice Multiple Answer
Question
In windows NT, naming of objects is of two types :-
Correct Answer
Permanent name , Temporary name
Your Answer
Permanent name , Temporary name
Multiple Choice Single Answer
Question
Protection can no longer be considered solely as a matter of concern to the designer of :-
Correct Answer
Operating system
Your Answer
Operating system
Select The Blank
Question
Web servers use the ________ protocol to communicate with web browsers.
Correct Answer
http
Your Answer
http
Multiple Choice Multiple Answer
Question
locate the transmission devices :-
Correct Answer
Network cards , Modems
Your Answer
Network cards , Modems
Multiple Choice Single Answer
Question
In UNIX, the simplest form of communication between processes is by :-
Correct Answer
Pipes
Your Answer
Pipes
Select The Blank
Question
A ________ is a group of NT server machines that share a common security policy and user databases.
Correct Answer
Domain
Your Answer
Domain
Multiple Choice Multiple Answer
Question
Message passing may be :-
Correct Answer
Blocking , Non-blocking
Your Answer
Blocking , Non-blocking
Multiple Choice Multiple Answer
Question
An object type in windows NT is a system defined data type that has two things associated with it, which are they?
Correct Answer
Set of attributes , Set of methods
Your Answer
Set of attributes , Set of methods
Select The Blank
Question
The ________ of a process is represented in the PCB of a process.
Correct Answer
Context
Your Answer
Context
Select The Blank
Question
The Linux ________ file system, known as the proc file system, is an example of a file system whose contents are not actually stored anywhere, but are rather computed on demand according to user file I/o requests.
Correct Answer
Process
Your Answer
Process
True/False
Question
Objects can be both, tangible or intangible.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
In UNIX, a device is distinguished by two things, which are :-
Correct Answer
Device-class , Device number
Your Answer
Device-class , Device number
Multiple Choice Multiple Answer
Question
Find out the basic I/O hardware elements from the following :-
Correct Answer
Ports , Buses , Device controllers
Your Answer
Ports , Buses , Device controllers
Multiple Choice Multiple Answer
Question
Which are the Division D security systems ?
Correct Answer
Windows 3.1 , MS-DOS
Your Answer
Windows 3.1 , MS-DOS
Multiple Choice Single Answer
Question
Protection can improve :-
Correct Answer
Reliability
Your Answer
Reliability
Select The Blank
Question
The creating process is called a ________ process.
Correct Answer
Parent
Your Answer
Parent
Multiple Choice Multiple Answer
Question
When memory reference occurs in MULTICS the things which takes place are :-
Correct Answer
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address
Your Answer
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address
Multiple Choice Multiple Answer
Question
The Linux system is composed of three main bodies of code, in line with most traditional UNIX implementations. Which are :-
Correct Answer
Kernel , System libraries , System utilities
Your Answer
System libraries , Programs , Kernel
Multiple Choice Single Answer
Question
The class bird should have object
Correct Answer
Egale
Your Answer
Egale
Multiple Choice Single Answer
Question
Objects are essentially :-
Correct Answer
Abstract data type
Your Answer
Abstract data type
True/False
Question
Banker's algorithm is a deadlock-avoidance algorithm.
Correct Answer
True
Your Answer
True
True/False
Question
Aging algorithm is based on LRU.
Correct Answer
True
Your Answer
False
Select The Blank
Question
MULTICS uses a ________ in addition to file access for protection.
Correct Answer
Ring structure
Your Answer
Ring structure
True/False
Question
A virus is a fragment of code embedded in a legitimate program
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
The basic hardware elements involved in I/O are :-
Correct Answer
Buses , Device controllers , Device
Your Answer
Keyboard , Buses , Device controllers
True/False
Question
Main Memory is a volatile storage device that loses its contents when power is turned off.
Correct Answer
True
Your Answer
True
Select The Blank
Question
In queuing diagram , each rectangular box represents a ________.
Correct Answer
Queue
Your Answer
Queue
True/False
Question
Whenever a trap or interrupt occurs, the hardware switches from user mode to monitor mode.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
As process enter the system, they are put into :-
Correct Answer
Job queue
Your Answer
Job queue
Select The Blank
Question
During execution, ________ register holds the sector for the data segment.
Correct Answer
DS
Your Answer
CS
Multiple Choice Multiple Answer
Question
The role of the operating system in computer I/O is to :-
Correct Answer
Manage I/O operation and devices , Control I/O operation and devices
Your Answer
Manage I/O operation and devices , Control I/O operation and devices
Multiple Choice Multiple Answer
Question
What are the forms of malicious access?
Correct Answer
Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data
Your Answer
Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data
Select The Blank
Question
A ________ is a computer or router that sits between the trusted and untrusted systems.
Correct Answer
Firewall
Your Answer
Firewall
Multiple Choice Multiple Answer
Question
Dispatcher functions involves the following :-
Correct Answer
Switching context , Switching to user mode
Your Answer
Switching context , Switching to user mode
Multiple Choice Multiple Answer
Question
Many-to-may model is supported by following operating systems :-
Correct Answer
Solaris , IRIX , Digital UNIX
Your Answer
IRIX , Solaris
Select The Blank
Question
A ________ controller is built into each disk drive.
Correct Answer
Disk
Your Answer
Disk
Match The Following
Question
Correct Answer
Your Answer
Parent process
Child process
Child process
Foreground processes
Interactive processes
Interactive processes
Background processes
Batch processes
Batch processes
Light-Weight processes
Thread
Thread
Select The Blank
Question
A class may be thought of as 'data-type' and object as ________ of that data-type.
Correct Answer
Variable
Your Answer
Variable
True/False
Question
In Windows NT, interrupt object binds an interrupt service routine to an interrupt source.
Correct Answer
True
Your Answer
True
True/False
Question
In Windows NT, each process has one or more threads, which are the units of execution dispatched by the kernel.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
If Dog derives from Mammal, and Mammal derives from Animal, then -
Correct Answer
Dog inherits Animal's functions and data
Your Answer
Mammal inherits Animal's functions and data
Multiple Choice Single Answer
Question
If the process is waiting to be assigned to CPU then it is said to be in :-
Correct Answer
Ready state
Your Answer
Ready state
Multiple Choice Multiple Answer
Question
What are the components to memory management under Linux?
Correct Answer
Physical memory manager , Virtual memory manager
Your Answer
Physical memory manager , Virtual memory manager
Multiple Choice Multiple Answer
Question
The Moriss Internet Worm was made up of which of the two programs?
Correct Answer
Grappling hook program , Main program
Your Answer
Target worm program , Grappling hook program
Select The Blank
Question
The ________ controller is the controller at the computer end of the bus.
Correct Answer
Host
Your Answer
Disk
True/False
Question
In Windows NT, kernel is object-oriented.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
C++ is basically a procedural language having extension of
Correct Answer
Object Oriented technology
Your Answer
Graphic user interface
Select The Blank
Question
In queuing diagram, the arrow indicates the flow of ________ in the system.
Correct Answer
Processes
Your Answer
Operation
True/False
Question
Whenever the operating system gains control of the computer, it is in monitor mode.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
C++ is also named as
Correct Answer
C with classes
Your Answer
Visual C++
Multiple Choice Single Answer
Question
The number of processes that are completed per time unit is called as:-
Correct Answer
Throughput of system
Your Answer
Efficiency of system
Select The Blank
Question
A process is ________ if it can affect or be affected by the other processes executing in the system.
Correct Answer
Cooperating
Your Answer
Competing
Multiple Choice Single Answer
Question
Collection of similar datatypes is called as
Correct Answer
Array
Your Answer
Array
Match The Following
Question
Correct Answer
Your Answer
Random-access devices
CD-ROM
CD-ROM
Character devices.
Terminal
Terminal
Block devices
Disk
Disk
Sequential devices
Modem
Modem
Multiple Choice Multiple Answer
Question
The device number consists of which two parts in UNIX?
Correct Answer
Major device number , Minor device number
Your Answer
Device-id , Device-name
Multiple Choice Single Answer
Question
The pure Object Oriented language is
Correct Answer
Java
Your Answer
C
Multiple Choice Single Answer
Question
The concept of OOPS was first introduced in
Correct Answer
Simula Language
Your Answer
C language
Multiple Choice Multiple Answer
Question
Most CPUs have two interrupt request lines. Which are they?
Correct Answer
Maskable , Non maskable
Your Answer
Maskable , Non maskable
Multiple Choice Multiple Answer
Question
Different multithreading models available are :-
Correct Answer
Many-to-one model , One-to-one model , Many-to-many model
Your Answer
Many-to-one model , One-to-one model , Many-to-many model
Select The Blank
Question
The ________ of a process is represented in the PCB of a process.
Correct Answer
Context
Your Answer
Block
Question
The Linux system is composed of three main bodies of code, in line with most traditional UNIX implementations. Which are :-
Correct Answer
Kernel , System libraries , System utilities
Your Answer
System libraries , Programs , Kernel
Multiple Choice Single Answer
Question
The class bird should have object
Correct Answer
Egale
Your Answer
Egale
Multiple Choice Single Answer
Question
Objects are essentially :-
Correct Answer
Abstract data type
Your Answer
Abstract data type
True/False
Question
Banker's algorithm is a deadlock-avoidance algorithm.
Correct Answer
True
Your Answer
True
True/False
Question
Aging algorithm is based on LRU.
Correct Answer
True
Your Answer
False
Select The Blank
Question
MULTICS uses a ________ in addition to file access for protection.
Correct Answer
Ring structure
Your Answer
Ring structure
True/False
Question
A virus is a fragment of code embedded in a legitimate program
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
The basic hardware elements involved in I/O are :-
Correct Answer
Buses , Device controllers , Device
Your Answer
Keyboard , Buses , Device controllers
True/False
Question
Main Memory is a volatile storage device that loses its contents when power is turned off.
Correct Answer
True
Your Answer
True
Select The Blank
Question
In queuing diagram , each rectangular box represents a ________.
Correct Answer
Queue
Your Answer
Queue
True/False
Question
Whenever a trap or interrupt occurs, the hardware switches from user mode to monitor mode.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
As process enter the system, they are put into :-
Correct Answer
Job queue
Your Answer
Job queue
Select The Blank
Question
During execution, ________ register holds the sector for the data segment.
Correct Answer
DS
Your Answer
CS
Multiple Choice Multiple Answer
Question
The role of the operating system in computer I/O is to :-
Correct Answer
Manage I/O operation and devices , Control I/O operation and devices
Your Answer
Manage I/O operation and devices , Control I/O operation and devices
Multiple Choice Multiple Answer
Question
What are the forms of malicious access?
Correct Answer
Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data
Your Answer
Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data
Select The Blank
Question
A ________ is a computer or router that sits between the trusted and untrusted systems.
Correct Answer
Firewall
Your Answer
Firewall
Multiple Choice Multiple Answer
Question
Dispatcher functions involves the following :-
Correct Answer
Switching context , Switching to user mode
Your Answer
Switching context , Switching to user mode
Multiple Choice Multiple Answer
Question
Many-to-may model is supported by following operating systems :-
Correct Answer
Solaris , IRIX , Digital UNIX
Your Answer
IRIX , Solaris
Select The Blank
Question
A ________ controller is built into each disk drive.
Correct Answer
Disk
Your Answer
Disk
Match The Following
Question
Correct Answer
Your Answer
Parent process
Child process
Child process
Foreground processes
Interactive processes
Interactive processes
Background processes
Batch processes
Batch processes
Light-Weight processes
Thread
Thread
Select The Blank
Question
A class may be thought of as 'data-type' and object as ________ of that data-type.
Correct Answer
Variable
Your Answer
Variable
True/False
Question
In Windows NT, interrupt object binds an interrupt service routine to an interrupt source.
Correct Answer
True
Your Answer
True
True/False
Question
In Windows NT, each process has one or more threads, which are the units of execution dispatched by the kernel.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
If Dog derives from Mammal, and Mammal derives from Animal, then -
Correct Answer
Dog inherits Animal's functions and data
Your Answer
Mammal inherits Animal's functions and data
Multiple Choice Single Answer
Question
If the process is waiting to be assigned to CPU then it is said to be in :-
Correct Answer
Ready state
Your Answer
Ready state
Multiple Choice Multiple Answer
Question
What are the components to memory management under Linux?
Correct Answer
Physical memory manager , Virtual memory manager
Your Answer
Physical memory manager , Virtual memory manager
Multiple Choice Multiple Answer
Question
The Moriss Internet Worm was made up of which of the two programs?
Correct Answer
Grappling hook program , Main program
Your Answer
Target worm program , Grappling hook program
Select The Blank
Question
The ________ controller is the controller at the computer end of the bus.
Correct Answer
Host
Your Answer
Disk
True/False
Question
In Windows NT, kernel is object-oriented.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
C++ is basically a procedural language having extension of
Correct Answer
Object Oriented technology
Your Answer
Graphic user interface
Select The Blank
Question
In queuing diagram, the arrow indicates the flow of ________ in the system.
Correct Answer
Processes
Your Answer
Operation
True/False
Question
Whenever the operating system gains control of the computer, it is in monitor mode.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
C++ is also named as
Correct Answer
C with classes
Your Answer
Visual C++
Multiple Choice Single Answer
Question
The number of processes that are completed per time unit is called as:-
Correct Answer
Throughput of system
Your Answer
Efficiency of system
Select The Blank
Question
A process is ________ if it can affect or be affected by the other processes executing in the system.
Correct Answer
Cooperating
Your Answer
Competing
Multiple Choice Single Answer
Question
Collection of similar datatypes is called as
Correct Answer
Array
Your Answer
Array
Match The Following
Question
Correct Answer
Your Answer
Random-access devices
CD-ROM
CD-ROM
Character devices.
Terminal
Terminal
Block devices
Disk
Disk
Sequential devices
Modem
Modem
Multiple Choice Multiple Answer
Question
The device number consists of which two parts in UNIX?
Correct Answer
Major device number , Minor device number
Your Answer
Device-id , Device-name
Multiple Choice Single Answer
Question
The pure Object Oriented language is
Correct Answer
Java
Your Answer
C
Multiple Choice Single Answer
Question
The concept of OOPS was first introduced in
Correct Answer
Simula Language
Your Answer
C language
Multiple Choice Multiple Answer
Question
Most CPUs have two interrupt request lines. Which are they?
Correct Answer
Maskable , Non maskable
Your Answer
Maskable , Non maskable
Multiple Choice Multiple Answer
Question
Different multithreading models available are :-
Correct Answer
Many-to-one model , One-to-one model , Many-to-many model
Your Answer
Many-to-one model , One-to-one model , Many-to-many model
Select The Blank
Question
The ________ of a process is represented in the PCB of a process.
Correct Answer
Context
Your Answer
Block
Multiple Choice Multiple Answer
Question
locate the transmission devices :-
Correct Answer
Network cards , Modems
Your Answer
Tapes , Network cards , Modems
True/False
Question
The user process issues a network I/O system call to send the character to the remote machine.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
The process by which objects of one class acquire properties of objects of other class is called
Correct Answer
Inheritance
Your Answer
Inheritance
True/False
Question
Windows NT uses a message passing implementation for I/O.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes?
Correct Answer
User mode , Monitor mode
Your Answer
User mode , Monitor mode
Match The Following
Question
Correct Answer
Your Answer
Round-robin
Time quantum
Time quantum
First-come First-served
First come job
First come job
Shortest job
Shortest job
Shortest job
Priority
Highest priority job
Highest priority job
Multiple Choice Single Answer
Question
The segment is :-
Correct Answer
Logical entity
Your Answer
Logical entity
Multiple Choice Single Answer
Question
In UNIX, decisions regarding which process to swap in or out are made by whom?
Correct Answer
Swapper
Your Answer
Memory handler
Select The Blank
Question
A ________ is a client-server mechanism that enables an application on one machine to make a procedure call to code on another machine.
Correct Answer
Remote-procedure-call
Your Answer
Remote-procedure-call
Multiple Choice Single Answer
Question
When each process that wants to communicate must explicitly name the recipient or sender of the communication, then such communication is called as :-
Correct Answer
Direct communication
Your Answer
Indirect communication
Select The Blank
Question
In Linux, the allocator uses a ________ algorithm to keep track of available physical pages.
Correct Answer
Buddy-heap
Your Answer
Binary-search
Multiple Choice Single Answer
Question
What does the rows of the access matrix represents?
Correct Answer
Domains
Your Answer
Domains
Multiple Choice Single Answer
Question
Every change in policy requires a change in the underlying :-
Correct Answer
Mechanism
Your Answer
System
Select The Blank
Question
A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote.
Correct Answer
Redirector
Your Answer
Domain
Multiple Choice Multiple Answer
Question
In Solaris 2, user-level threads may be:-
Correct Answer
Bound , Unbound
Your Answer
Bound , Unbound
Multiple Choice Multiple Answer
Question
An audit log records which things about an object ?
Correct Answer
Time , User , Type of access
Your Answer
Time , User , Type of access
Multiple Choice Multiple Answer
Question
One-to-one model is supported by following systems :-
Correct Answer
Windows NT , OS/2
Your Answer
OS/2 , Windows NT
Multiple Choice Multiple Answer
Question
To protect the system, we must take security measures at two levels, such as :-
Correct Answer
Physical level , Human level
Your Answer
Human level , Global level
Multiple Choice Single Answer
Question
If the process is waiting for some event to occur then it is said to be in :-
Correct Answer
Waiting state
Your Answer
Waiting state
Multiple Choice Single Answer
Question
A common representation for a discussion of process scheduling is a :-
Correct Answer
Queuing diagram
Your Answer
Process state diagram
True/False
Question
At Physical level, the site or sites containing the computer systems must be physically secured against armed or surreptitious entry by intruders.
Correct Answer
True
Your Answer
True
Select The Blank
Question
When you express user-system interaction, the scenario in the model is called ________
Correct Answer
Case model
Your Answer
Case model
True/False
Question
Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention.
Correct Answer
False
Your Answer
True
True/False
Question
A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .
Correct Answer
False
Your Answer
False
Multiple Choice Single Answer
Question
Polymorphism means ability to take
Correct Answer
More than one form
Your Answer
More than one form
True/False
Question
Aging algorithm is based on LRU.
Correct Answer
True
Your Answer
True
Select The Blank
Question
The virtual memory portion of the NT executive is the ________.
Correct Answer
Virtual memory manager
Your Answer
Virtual memory manager
Multiple Choice Multiple Answer
Question
There are two types of Message passing, they are :-
Correct Answer
Synchronous , Asynchronous
Your Answer
Synchronous , Asynchronous
Select The Blank
Question
Web servers use the ________ protocol to communicate with web browsers.
Correct Answer
http
Your Answer
http
Multiple Choice Multiple Answer
Question
The security of a system can be improved by two management techniques, such as :-
Correct Answer
Threat monitoring , Audit Log
Your Answer
Audit Log , Threat finding
Select The Blank
Question
The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________.
Correct Answer
Ring
Your Answer
Ring
True/False
Question
We say that a system is secure if its resources are used and accessed as intended under all circumstances.
Correct Answer
True
Your Answer
True
Select The Blank
Question
The ________ controller is the controller at the computer end of the bus.
Correct Answer
Host
Your Answer
Cpu
Multiple Choice Multiple Answer
Question
In Linux, the paging system can be divided into sections, namely:-
Correct Answer
Policy algorithm , Paging mechanism
Your Answer
Policy algorithm , Paging mechanism
True/False
Question
Keyboard is a sharable device.
Correct Answer
True
Your Answer
False
True/False
Question
Transfer of data from disk to memory is usually controlled by the operating system.
Correct Answer
True
Your Answer
True
True/False
Question
Prototyping not only helps to build a quality design but also enables the designer to build the system decremantally.
Correct Answer
False
Your Answer
True
Select The Blank
Question
The UNIX system uses ________ to avoid the necessity of keeping its password list secret.
Correct Answer
Encryption
Your Answer
Encryption
Match The Following
Question
Correct Answer
Your Answer
Read-write devices
Disks
Disks
Dedicated devices
Tape
CD-ROM
Read-only devices
CD-ROM
Tape
Write-only devices
Graphics controller
Keyboard
Multiple Choice Single Answer
Question
A procedure call, request to execute a method is termed as
Correct Answer
Message
Your Answer
Message
Select The Blank
Question
Context switch times are highly dependent on ________ support.
Correct Answer
Hardware
Your Answer
Hardware
Multiple Choice Multiple Answer
Question
Two main jobs of a computer are :-
Correct Answer
I/O , Processing
Your Answer
I/O , Processing
Multiple Choice Single Answer
Question
The 4.3BSD operating system is the version of :-
Correct Answer
UNIX
Your Answer
UNIX
Multiple Choice Single Answer
Question
The number of processes that are completed per time unit is called as:-
Correct Answer
Throughput of system
Your Answer
Throughput of system
Multiple Choice Multiple Answer
Question
Once the I/O is started , which two courses of action are possible?
Correct Answer
Synchronous I/O , Asynchronous I/O , Simple I/O
Your Answer
Synchronous I/O , Asynchronous I/O
Multiple Choice Multiple Answer
Question
Security violations of the system can be categorized as :-
Correct Answer
Malicious , Accidental
Your Answer
Malicious , Accidental
Select The Blank
Question
A process migrates between the various ________ throughout its lifetime.
Correct Answer
Scheduling queues
Your Answer
Scheduling queues
Question
locate the transmission devices :-
Correct Answer
Network cards , Modems
Your Answer
Tapes , Network cards , Modems
True/False
Question
The user process issues a network I/O system call to send the character to the remote machine.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
The process by which objects of one class acquire properties of objects of other class is called
Correct Answer
Inheritance
Your Answer
Inheritance
True/False
Question
Windows NT uses a message passing implementation for I/O.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes?
Correct Answer
User mode , Monitor mode
Your Answer
User mode , Monitor mode
Match The Following
Question
Correct Answer
Your Answer
Round-robin
Time quantum
Time quantum
First-come First-served
First come job
First come job
Shortest job
Shortest job
Shortest job
Priority
Highest priority job
Highest priority job
Multiple Choice Single Answer
Question
The segment is :-
Correct Answer
Logical entity
Your Answer
Logical entity
Multiple Choice Single Answer
Question
In UNIX, decisions regarding which process to swap in or out are made by whom?
Correct Answer
Swapper
Your Answer
Memory handler
Select The Blank
Question
A ________ is a client-server mechanism that enables an application on one machine to make a procedure call to code on another machine.
Correct Answer
Remote-procedure-call
Your Answer
Remote-procedure-call
Multiple Choice Single Answer
Question
When each process that wants to communicate must explicitly name the recipient or sender of the communication, then such communication is called as :-
Correct Answer
Direct communication
Your Answer
Indirect communication
Select The Blank
Question
In Linux, the allocator uses a ________ algorithm to keep track of available physical pages.
Correct Answer
Buddy-heap
Your Answer
Binary-search
Multiple Choice Single Answer
Question
What does the rows of the access matrix represents?
Correct Answer
Domains
Your Answer
Domains
Multiple Choice Single Answer
Question
Every change in policy requires a change in the underlying :-
Correct Answer
Mechanism
Your Answer
System
Select The Blank
Question
A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote.
Correct Answer
Redirector
Your Answer
Domain
Multiple Choice Multiple Answer
Question
In Solaris 2, user-level threads may be:-
Correct Answer
Bound , Unbound
Your Answer
Bound , Unbound
Multiple Choice Multiple Answer
Question
An audit log records which things about an object ?
Correct Answer
Time , User , Type of access
Your Answer
Time , User , Type of access
Multiple Choice Multiple Answer
Question
One-to-one model is supported by following systems :-
Correct Answer
Windows NT , OS/2
Your Answer
OS/2 , Windows NT
Multiple Choice Multiple Answer
Question
To protect the system, we must take security measures at two levels, such as :-
Correct Answer
Physical level , Human level
Your Answer
Human level , Global level
Multiple Choice Single Answer
Question
If the process is waiting for some event to occur then it is said to be in :-
Correct Answer
Waiting state
Your Answer
Waiting state
Multiple Choice Single Answer
Question
A common representation for a discussion of process scheduling is a :-
Correct Answer
Queuing diagram
Your Answer
Process state diagram
True/False
Question
At Physical level, the site or sites containing the computer systems must be physically secured against armed or surreptitious entry by intruders.
Correct Answer
True
Your Answer
True
Select The Blank
Question
When you express user-system interaction, the scenario in the model is called ________
Correct Answer
Case model
Your Answer
Case model
True/False
Question
Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention.
Correct Answer
False
Your Answer
True
True/False
Question
A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .
Correct Answer
False
Your Answer
False
Multiple Choice Single Answer
Question
Polymorphism means ability to take
Correct Answer
More than one form
Your Answer
More than one form
True/False
Question
Aging algorithm is based on LRU.
Correct Answer
True
Your Answer
True
Select The Blank
Question
The virtual memory portion of the NT executive is the ________.
Correct Answer
Virtual memory manager
Your Answer
Virtual memory manager
Multiple Choice Multiple Answer
Question
There are two types of Message passing, they are :-
Correct Answer
Synchronous , Asynchronous
Your Answer
Synchronous , Asynchronous
Select The Blank
Question
Web servers use the ________ protocol to communicate with web browsers.
Correct Answer
http
Your Answer
http
Multiple Choice Multiple Answer
Question
The security of a system can be improved by two management techniques, such as :-
Correct Answer
Threat monitoring , Audit Log
Your Answer
Audit Log , Threat finding
Select The Blank
Question
The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________.
Correct Answer
Ring
Your Answer
Ring
True/False
Question
We say that a system is secure if its resources are used and accessed as intended under all circumstances.
Correct Answer
True
Your Answer
True
Select The Blank
Question
The ________ controller is the controller at the computer end of the bus.
Correct Answer
Host
Your Answer
Cpu
Multiple Choice Multiple Answer
Question
In Linux, the paging system can be divided into sections, namely:-
Correct Answer
Policy algorithm , Paging mechanism
Your Answer
Policy algorithm , Paging mechanism
True/False
Question
Keyboard is a sharable device.
Correct Answer
True
Your Answer
False
True/False
Question
Transfer of data from disk to memory is usually controlled by the operating system.
Correct Answer
True
Your Answer
True
True/False
Question
Prototyping not only helps to build a quality design but also enables the designer to build the system decremantally.
Correct Answer
False
Your Answer
True
Select The Blank
Question
The UNIX system uses ________ to avoid the necessity of keeping its password list secret.
Correct Answer
Encryption
Your Answer
Encryption
Match The Following
Question
Correct Answer
Your Answer
Read-write devices
Disks
Disks
Dedicated devices
Tape
CD-ROM
Read-only devices
CD-ROM
Tape
Write-only devices
Graphics controller
Keyboard
Multiple Choice Single Answer
Question
A procedure call, request to execute a method is termed as
Correct Answer
Message
Your Answer
Message
Select The Blank
Question
Context switch times are highly dependent on ________ support.
Correct Answer
Hardware
Your Answer
Hardware
Multiple Choice Multiple Answer
Question
Two main jobs of a computer are :-
Correct Answer
I/O , Processing
Your Answer
I/O , Processing
Multiple Choice Single Answer
Question
The 4.3BSD operating system is the version of :-
Correct Answer
UNIX
Your Answer
UNIX
Multiple Choice Single Answer
Question
The number of processes that are completed per time unit is called as:-
Correct Answer
Throughput of system
Your Answer
Throughput of system
Multiple Choice Multiple Answer
Question
Once the I/O is started , which two courses of action are possible?
Correct Answer
Synchronous I/O , Asynchronous I/O , Simple I/O
Your Answer
Synchronous I/O , Asynchronous I/O
Multiple Choice Multiple Answer
Question
Security violations of the system can be categorized as :-
Correct Answer
Malicious , Accidental
Your Answer
Malicious , Accidental
Select The Blank
Question
A process migrates between the various ________ throughout its lifetime.
Correct Answer
Scheduling queues
Your Answer
Scheduling queues
True/False
Question: An asynchronous call returns immediately, without waiting for the I/O to complete.
Correct Answer: True
Your Answer: True
True/False
Question: Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention.
Correct Answer: False
Your Answer: False
Select The Blank
Question: The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________.
Correct Answer: Ring
Your Answer: Ring
Multiple Choice Single Answer
Question: A domain is a collection of :-
Correct Answer: Access rights
Your Answer: Protection policies
Match The Following
Question: Correct Answer Your Answer
Volatile Memory Primary memory RAM
CPU registers Volatile storage Primary memory
Magnetic disks Non volatile storage Non volatile storage
Floppy disk Secondary storage Secondary storage
Multiple Choice Single Answer
Question: Each object has a unique :-
Correct Answer: Name
Your Answer: Name
True/False
Question: Once class is defined we can create limited number of objects belonging to that class.
Correct Answer: False
Your Answer: False
Multiple Choice Multiple Answer
Question: A mailbox can be owned by :-
Correct Answer: Process , Operating system
Your Answer: User , Process
Multiple Choice Single Answer
Question: C++ is basically a procedural language having extension of
Correct Answer: Object Oriented technology
Your Answer: Object Oriented technology
True/False
Question: In Lock-key mechanism, users are allowed to examine or modify the list of keys or locks directly.
Correct Answer: False
Your Answer: False
Multiple Choice Multiple Answer
Question: Most CPUs have two interrupt request lines. Which are they?
Correct Answer: Maskable , Non maskable
Your Answer: Maskable , Non maskable
Match The Following
Question: Correct Answer: Your Answer:
We can define abstract Data abstraction Data abstraction
operation on abstract data
Process of sharing properties of the Inheritance Inheritance
higher level object or class
Ability to inherit attributes and Multiple inheritance Multiple inheritance
methods from 2 or more objects
or classes
Ability to send a message to several Ploymorphism Ploymorphism
objects and to allow receiving object
to respond method specified on the object.
Select The Blank
Question: The ________ is a layer of software that hides hardware differences from upper levels of the operating system.
Correct Answer: Hardware abstraction layer
Your Answer: Hardware abstraction layer
Multiple Choice Single Answer
Question: The ready queue is generally stored as a :-
Correct Answer: Linked list
Your Answer: Queue
Multiple Choice Single Answer
Question: How big is a class object?
Correct Answer: Is as big as sum of the sizes of its member variables
Your Answer: Is as big as sum of the sizes of its member variables
True/False
Question: In FIFO algorithm the page removed from memory is the one which most recently used.
Correct Answer: False
Your Answer: False
True/False
Question: I/O system calls are costly in terms of CPU consumptions.
Correct Answer: True
Your Answer: True
Multiple Choice Single Answer
Question: Policies for resource use may be subject to change over :-
Correct Answer: Time
Your Answer: Time
True/False
Question: A functionality prototype can be designed that does not have the final user interface, but allows users to try out various features, such as forwarding messages or attaching files without worrying about the final interface.
Correct Answer: True
Your Answer: True
Multiple Choice Single Answer
Question: The main difference between structure and class is
Correct Answer: Structure does not support OOPS Class Supports OOPS.
Your Answer: Structure does not support OOPS Class Supports OOPS.
Multiple Choice Single Answer
Question: The First version of UNIX was developed in 1969 by Ken Thompson of the Research Group at :-
Correct Answer: Bell Laboratories
Your Answer: Bell Laboratories
Multiple Choice Single Answer
Question: Collection of similar datatypes is called as
Correct Answer: Array
Your Answer: Array
Multiple Choice Single Answer
Question: The pure Object Oriented language is
Correct Answer: Java
Your Answer: Java
Multiple Choice Single Answer
Question: The concept of OOPS was first introduced in
Correct Answer: Simula Language
Your Answer: Simula Language
Multiple Choice Single Answer
Question: The class bird should have object
Correct Answer: Egale
Your Answer: Egale
Select The Blank
Question: ________ of an object remains unchanged even though its state and properties change.
Correct Answer: Identity
Your Answer: Location
Multiple Choice Multiple Answer
Question: The Linux system is composed of three main bodies of code, in line with most traditional UNIX implementations. Which are :-
Correct Answer: Kernel , System libraries , System utilities
Your Answer: Kernel , System libraries , System utilities
Multiple Choice Multiple Answer
Question: An audit log records which things about an object ?
Correct Answer: Time , User , Type of access
Your Answer: User , Type of access , Operation
Select The Blank
Question: The virtual memory portion of the NT executive is the ________.
Correct Answer: Virtual memory manager
Your Answer: Page-memory manager
Multiple Choice Single Answer
Question: A system consists of collection of :-
Correct Answer: Processes
Your Answer: Procedures
Multiple Choice Multiple Answer
Question: Linux presents standard interfaces to whom?
Correct Answer: Programmer , User
Your Answer: Programmer , User
Multiple Choice Multiple Answer
Question: Most computers have hardware clocks and timers that provide three basic functions, such as :-
Correct Answer: Give the current time , Give the elapsed time , Set a timer to trigger operation at certain time
Your Answer: Give the current time , Give the elapsed time , Set a timer to trigger operation at certain time
Select The Blank
Question: The UNIX system uses ________ to avoid the necessity of keeping its password list secret.
Correct Answer: Encryption
Your Answer: Encryption
Multiple Choice Single Answer
Question: A solution to the problem of indefinite blockage of low-priority processes in Priority scheduling is :-
Correct Answer: Aging
Your Answer: Starvation
Multiple Choice Multiple Answer
Question: In a uniprocessor system, there is :-
Correct Answer: Single processor , Single running process
Your Answer: Single processor , Single running process
Multiple Choice Single Answer
Question: The process by which objects of one class acquire properties of objects of other class is called
Correct Answer: Inheritance
Your Answer: Inheritance
Select The Blank
Question: A segment shorter than ________ M will have a page directory with single entry, a pointer to its one and only page table.
Correct Answer: 4
Your Answer: 8
Multiple Choice Single Answer
Question: If Dog derives from Mammal, and Mammal derives from Animal, then -
Correct Answer: Dog inherits Animal's functions and data
Your Answer: Dog inherits Animal's functions and data
Multiple Choice Multiple Answer
Question: Passwords can be generated by :-
Correct Answer: System , User
Your Answer: System , User , Password software
Multiple Choice Multiple Answer
Question: kernel threads are supported by following operating systems :-
Correct Answer: Windows NT , Solaris , Digital UNIX
Your Answer: Windows NT , Solaris , Digital UNIX
Select The Blank
Question: The hardware to measure elapsed time to trigger operations is called a ________.
Correct Answer: Programmable interval timer
Your Answer: Hardware timer
Multiple Choice Multiple Answer
Question: In Windows NT , kernel uses which two sets of objects?
Correct Answer: Dispatcher objects , Control objects
Your Answer: Dispatcher objects , Control objects
True/False
Question: Firewall monitors and logs all connections.
Correct Answer: True
Your Answer: True
Select The Blank
Question: During execution, ________ register holds the sector for the code segment.
Correct Answer: CS
Your Answer: CS
Select The Blank
Question: The creating process is called a ________ process.
Correct Answer: Parent
Your Answer: Parent
True/False
Question: Objects can not interact unless they know the details of each others data or code.
Correct Answer: False
Your Answer: False
Select The Blank
Question: Web servers use the ________ protocol to communicate with web browsers.
Correct Answer: http
Your Answer: http
Question: An asynchronous call returns immediately, without waiting for the I/O to complete.
Correct Answer: True
Your Answer: True
True/False
Question: Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention.
Correct Answer: False
Your Answer: False
Select The Blank
Question: The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________.
Correct Answer: Ring
Your Answer: Ring
Multiple Choice Single Answer
Question: A domain is a collection of :-
Correct Answer: Access rights
Your Answer: Protection policies
Match The Following
Question: Correct Answer Your Answer
Volatile Memory Primary memory RAM
CPU registers Volatile storage Primary memory
Magnetic disks Non volatile storage Non volatile storage
Floppy disk Secondary storage Secondary storage
Multiple Choice Single Answer
Question: Each object has a unique :-
Correct Answer: Name
Your Answer: Name
True/False
Question: Once class is defined we can create limited number of objects belonging to that class.
Correct Answer: False
Your Answer: False
Multiple Choice Multiple Answer
Question: A mailbox can be owned by :-
Correct Answer: Process , Operating system
Your Answer: User , Process
Multiple Choice Single Answer
Question: C++ is basically a procedural language having extension of
Correct Answer: Object Oriented technology
Your Answer: Object Oriented technology
True/False
Question: In Lock-key mechanism, users are allowed to examine or modify the list of keys or locks directly.
Correct Answer: False
Your Answer: False
Multiple Choice Multiple Answer
Question: Most CPUs have two interrupt request lines. Which are they?
Correct Answer: Maskable , Non maskable
Your Answer: Maskable , Non maskable
Match The Following
Question: Correct Answer: Your Answer:
We can define abstract Data abstraction Data abstraction
operation on abstract data
Process of sharing properties of the Inheritance Inheritance
higher level object or class
Ability to inherit attributes and Multiple inheritance Multiple inheritance
methods from 2 or more objects
or classes
Ability to send a message to several Ploymorphism Ploymorphism
objects and to allow receiving object
to respond method specified on the object.
Select The Blank
Question: The ________ is a layer of software that hides hardware differences from upper levels of the operating system.
Correct Answer: Hardware abstraction layer
Your Answer: Hardware abstraction layer
Multiple Choice Single Answer
Question: The ready queue is generally stored as a :-
Correct Answer: Linked list
Your Answer: Queue
Multiple Choice Single Answer
Question: How big is a class object?
Correct Answer: Is as big as sum of the sizes of its member variables
Your Answer: Is as big as sum of the sizes of its member variables
True/False
Question: In FIFO algorithm the page removed from memory is the one which most recently used.
Correct Answer: False
Your Answer: False
True/False
Question: I/O system calls are costly in terms of CPU consumptions.
Correct Answer: True
Your Answer: True
Multiple Choice Single Answer
Question: Policies for resource use may be subject to change over :-
Correct Answer: Time
Your Answer: Time
True/False
Question: A functionality prototype can be designed that does not have the final user interface, but allows users to try out various features, such as forwarding messages or attaching files without worrying about the final interface.
Correct Answer: True
Your Answer: True
Multiple Choice Single Answer
Question: The main difference between structure and class is
Correct Answer: Structure does not support OOPS Class Supports OOPS.
Your Answer: Structure does not support OOPS Class Supports OOPS.
Multiple Choice Single Answer
Question: The First version of UNIX was developed in 1969 by Ken Thompson of the Research Group at :-
Correct Answer: Bell Laboratories
Your Answer: Bell Laboratories
Multiple Choice Single Answer
Question: Collection of similar datatypes is called as
Correct Answer: Array
Your Answer: Array
Multiple Choice Single Answer
Question: The pure Object Oriented language is
Correct Answer: Java
Your Answer: Java
Multiple Choice Single Answer
Question: The concept of OOPS was first introduced in
Correct Answer: Simula Language
Your Answer: Simula Language
Multiple Choice Single Answer
Question: The class bird should have object
Correct Answer: Egale
Your Answer: Egale
Select The Blank
Question: ________ of an object remains unchanged even though its state and properties change.
Correct Answer: Identity
Your Answer: Location
Multiple Choice Multiple Answer
Question: The Linux system is composed of three main bodies of code, in line with most traditional UNIX implementations. Which are :-
Correct Answer: Kernel , System libraries , System utilities
Your Answer: Kernel , System libraries , System utilities
Multiple Choice Multiple Answer
Question: An audit log records which things about an object ?
Correct Answer: Time , User , Type of access
Your Answer: User , Type of access , Operation
Select The Blank
Question: The virtual memory portion of the NT executive is the ________.
Correct Answer: Virtual memory manager
Your Answer: Page-memory manager
Multiple Choice Single Answer
Question: A system consists of collection of :-
Correct Answer: Processes
Your Answer: Procedures
Multiple Choice Multiple Answer
Question: Linux presents standard interfaces to whom?
Correct Answer: Programmer , User
Your Answer: Programmer , User
Multiple Choice Multiple Answer
Question: Most computers have hardware clocks and timers that provide three basic functions, such as :-
Correct Answer: Give the current time , Give the elapsed time , Set a timer to trigger operation at certain time
Your Answer: Give the current time , Give the elapsed time , Set a timer to trigger operation at certain time
Select The Blank
Question: The UNIX system uses ________ to avoid the necessity of keeping its password list secret.
Correct Answer: Encryption
Your Answer: Encryption
Multiple Choice Single Answer
Question: A solution to the problem of indefinite blockage of low-priority processes in Priority scheduling is :-
Correct Answer: Aging
Your Answer: Starvation
Multiple Choice Multiple Answer
Question: In a uniprocessor system, there is :-
Correct Answer: Single processor , Single running process
Your Answer: Single processor , Single running process
Multiple Choice Single Answer
Question: The process by which objects of one class acquire properties of objects of other class is called
Correct Answer: Inheritance
Your Answer: Inheritance
Select The Blank
Question: A segment shorter than ________ M will have a page directory with single entry, a pointer to its one and only page table.
Correct Answer: 4
Your Answer: 8
Multiple Choice Single Answer
Question: If Dog derives from Mammal, and Mammal derives from Animal, then -
Correct Answer: Dog inherits Animal's functions and data
Your Answer: Dog inherits Animal's functions and data
Multiple Choice Multiple Answer
Question: Passwords can be generated by :-
Correct Answer: System , User
Your Answer: System , User , Password software
Multiple Choice Multiple Answer
Question: kernel threads are supported by following operating systems :-
Correct Answer: Windows NT , Solaris , Digital UNIX
Your Answer: Windows NT , Solaris , Digital UNIX
Select The Blank
Question: The hardware to measure elapsed time to trigger operations is called a ________.
Correct Answer: Programmable interval timer
Your Answer: Hardware timer
Multiple Choice Multiple Answer
Question: In Windows NT , kernel uses which two sets of objects?
Correct Answer: Dispatcher objects , Control objects
Your Answer: Dispatcher objects , Control objects
True/False
Question: Firewall monitors and logs all connections.
Correct Answer: True
Your Answer: True
Select The Blank
Question: During execution, ________ register holds the sector for the code segment.
Correct Answer: CS
Your Answer: CS
Select The Blank
Question: The creating process is called a ________ process.
Correct Answer: Parent
Your Answer: Parent
True/False
Question: Objects can not interact unless they know the details of each others data or code.
Correct Answer: False
Your Answer: False
Select The Blank
Question: Web servers use the ________ protocol to communicate with web browsers.
Correct Answer: http
Your Answer: http
"To view papers click to above link or "+""