LIST OF ATTEMPTED QUESTIONS AND ANSWERS
 Select The Blank
  Question 
Web servers use the ________ protocol to communicate with web browsers.
  Correct Answer 
http
  Your Answer 
http
 True/False
  Question 
Cache-coherency is usually a software problem and handled above the operating system level.
  Correct Answer 
False
  Your Answer 
True
 Multiple Choice Multiple Answer
  Question 
Two main jobs of a computer are :-
  Correct Answer 
I/O , Processing
  Your Answer 
I/O , Processing
 Multiple Choice Multiple Answer
  Question 
What are the ways in which a request for kernel-mode execution can occur in Linux?
  Correct Answer 
Explicitly , Implicitly
  Your Answer 
Explicitly , Implicitly
 Select The Blank
  Question 
If the user-supplied password matches the password stored in the system, the system assumes that the user is ________.
  Correct Answer 
Legitimate
  Your Answer 
Legitimate
 True/False
  Question 
Single-indirect block is an index block which contains data of the files to which it points.
  Correct Answer 
False
  Your Answer 
True
 True/False
  Question 
Volatile storage loses its contents when the power to the device is removed.
  Correct Answer 
True
  Your Answer 
True
 Multiple Choice Single Answer
  Question 
SCSI stands for :-
  Correct Answer 
Small Computer-Systems Interface
  Your Answer 
System Call-System Interrupt
 Multiple Choice Multiple Answer
  Question 
Which are the Division D security systems ?
  Correct Answer 
Windows 3.1 , MS-DOS
  Your Answer 
Windows NT , UNIX
 Select The Blank
  Question 
static binding allows to hold certain properties fixed and rigid, whereas ________ binding allows object to behave as per conditions emerge.
  Correct Answer 
Dynamic
  Your Answer 
Dynamic
 Multiple Choice Multiple Answer
  Question 
What are the components to memory management under Linux?
  Correct Answer 
Physical memory manager , Virtual memory manager
  Your Answer 
Physical memory manager , Virtual memory manager
 Multiple Choice Single Answer
  Question 
The First version of UNIX was developed in 1969 by Ken Thompson of the Research Group at :-
  Correct Answer 
Bell Laboratories
  Your Answer 
Bell Laboratories
 True/False
  Question 
XML is a meta data language developed to specify data with a goal of improving interoperatability of different data sources.
  Correct Answer 
True
  Your Answer 
True
 True/False
  Question 
One way to achieve portability is to write software in standard version of high level language and to develop portable system and application software .
  Correct Answer 
True
  Your Answer 
True
 Multiple Choice Single Answer
  Question 
C++ is basically a procedural language having extension of
  Correct Answer 
Object Oriented technology
  Your Answer 
Object Oriented technology
 Select The Blank
  Question 
The ________ of a process is represented in the PCB of a process.
  Correct Answer 
Context
  Your Answer 
Context
 Select The Blank
  Question 
In windows NT, the ________ facility is used to pass requests and results between client and server processes within a single machine.
  Correct Answer 
Local-procedure-call
  Your Answer 
Remote-procedure-call
 Multiple Choice Single Answer
  Question 
In how many number of classes does the NRU algorithm divides pages, depending on the state of R and M?
  Correct Answer 
4
  Your Answer 
4
 Multiple Choice Multiple Answer
  Question 
When memory reference occurs in MULTICS the things which takes place are :-
  Correct Answer 
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address
  Your Answer 
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address
 Multiple Choice Multiple Answer
  Question 
Supervisor mode is also known as :-
  Correct Answer 
System mode , Privileged mode , Monitor mode
  Your Answer 
System mode , Privileged mode , Monitor mode
 Multiple Choice Single Answer
  Question 
How big is a class object?
  Correct Answer 
Is as big as sum of the sizes of its member variables
  Your Answer 
Is as big as sum of the sizes of its member variables
 Multiple Choice Multiple Answer
  Question 
The device number consists of which two parts in UNIX?
  Correct Answer 
Major device number , Minor device number
  Your Answer 
Major device number , Minor device number
 Select The Blank
  Question 
The context switch time is pure ________, because system does no useful work while switching.
  Correct Answer 
Overhead
  Your Answer 
Wastage
 Multiple Choice Multiple Answer
  Question 
In Solaris 2, user-level threads may be:-
  Correct Answer 
Bound , Unbound
  Your Answer 
Bound , Unbound
 Match The Following
Question
Correct Answer
Your Answer
Random-access devices
CD-ROM
CD-ROM
Character devices.
Terminal
Keyboard
Block devices
Disk
Tape
Sequential devices
Modem
Terminal
 Multiple Choice Single Answer
  Question 
The main difference between structure and class is
  Correct Answer 
Structure does not support OOPS Class Supports OOPS.
  Your Answer 
Structure does not support OOPS Class Supports OOPS.
 True/False
  Question 
Object-oriented programming focuses on the integrated data and functionality as discrete units that have both knowledge (data) and capabilities (functions). Procedural programs, on the other hand, focus on functions and how they act on data.
  Correct Answer 
True
  Your Answer 
True
 Select The Blank
  Question 
A keyboard is an example of device that is accessed through a ________ interface.
  Correct Answer 
Character stream
  Your Answer 
Character stream
 Multiple Choice Multiple Answer
  Question 
Find out the CPU scheduling algorithms from these options :-
  Correct Answer 
FCFS , RR , SJF
  Your Answer 
FCFS , RR , SJF
 Multiple Choice Single Answer
  Question 
Main Memory of computer program is also called as :-
  Correct Answer 
RAM
  Your Answer 
RAM
 Multiple Choice Multiple Answer
  Question 
The security of a system can be improved by two management techniques, such as :-
  Correct Answer 
Threat monitoring , Audit Log
  Your Answer 
Threat monitoring , Audit Log
 Multiple Choice Single Answer
  Question 
The separation of policy and mechanism is important for which purpose?
  Correct Answer 
Flexibility
  Your Answer 
Flexibility
 Match The Following
Question
Correct Answer
Your Answer
Trap in which program tries to use unmapped page
Page fault
Page fault
Memory Management Unit
MMU
MMU
Smaller units in which virtual address space is divided
Pages
Pages
Units in physical memory corresponding to pages in virtual memory
Page frame
Page frame
 True/False
  Question 
A non-blocking call does not halt the execution of the application for an extended time.
  Correct Answer 
True
  Your Answer 
True
 True/False
  Question 
Windows NT uses a message passing implementation for I/O.
  Correct Answer 
True
  Your Answer 
True
 Multiple Choice Multiple Answer
  Question 
Kernel threads are generally :-
  Correct Answer 
Slower to create , Difficult to manage
  Your Answer 
Slower to create , Difficult to manage
 Multiple Choice Single Answer
  Question 
The long-term scheduler controls the :-
  Correct Answer 
Degree of multiprogramming
  Your Answer 
Degree of multiprogramming
 Multiple Choice Single Answer
  Question 
Objects may communicate with each other through
  Correct Answer 
Methods
  Your Answer 
Methods
 Select The Blank
  Question 
In queuing diagram, the arrow indicates the flow of ________ in the system.
  Correct Answer 
Processes
  Your Answer 
Queue
 Multiple Choice Single Answer
  Question 
If Dog derives from Mammal, and Mammal derives from Animal, then -
  Correct Answer 
Dog inherits Animal's functions and data
  Your Answer 
Dog inherits Animal's functions and data
 Multiple Choice Single Answer
  Question 
Thread at user level is known as :-
  Correct Answer 
User thread
  Your Answer 
User thread
 Select The Blank
  Question 
________ includes disks and tapes.
  Correct Answer 
Block devices
  Your Answer 
Block devices
 Multiple Choice Single Answer
  Question 
DMA stands for :-
  Correct Answer 
Direct Memory Access
  Your Answer 
Direct Memory Access
 True/False
  Question 
When application issues a blocking I/O system call, the request is placed on the queue for that device.
  Correct Answer 
True
  Your Answer 
True
 Multiple Choice Single Answer
  Question 
The concept of OOPS was first introduced in
  Correct Answer 
Simula Language
  Your Answer 
Simula Language
 True/False
  Question 
Encryption is one common method of protecting information that is transmitted over unreliable links.
  Correct Answer 
True
  Your Answer 
True
 Select The Blank
  Question 
________ describes segments local to each program, including its code, data, stack etc.
  Correct Answer 
LDT
  Your Answer 
LDT
No comments:
Post a Comment