LIST OF ATTEMPTED QUESTIONS AND ANSWERS
 Select The Blank
  Question 
Like worms, ________ are designed to spread into other programs and can wreak havoc in a system.
  Correct Answer 
Viruses
  Your Answer 
Viruses
 Multiple Choice Multiple Answer
  Question 
The advantage of dynamic loading is
  Correct Answer 
Unused routine is never loaded , Useful when large amount of code are needed to handle infrequently occurring cases, such as error routines , It does not require special support from the operating system
  Your Answer 
Useful when large amount of code are needed to handle infrequently occurring cases, such as error routines , It does not require special support from the operating system , Unused routine is never loaded
 Select The Blank
  Question 
Terminals and line printers are ________ .
  Correct Answer 
Character devices
  Your Answer 
Socket interfaces
 Multiple Choice Multiple Answer
  Question 
A mailbox can be owned by :-
  Correct Answer 
Process , Operating system
  Your Answer 
Process , Operating system
 Select The Blank
  Question 
A process is ________, if it cannot affect or be affected by the other processes executing in the system.
  Correct Answer 
Independent
  Your Answer 
Cooperating
 True/False
  Question 
NFU is crude attempt to approximate LRU.
  Correct Answer 
True
  Your Answer 
False
 True/False
  Question 
A copy of inode is kept in main memory while a file is open.
  Correct Answer 
True
  Your Answer 
True
 Multiple Choice Single Answer
  Question 
The class bird should have object
  Correct Answer 
Egale
  Your Answer 
Egale
 Multiple Choice Multiple Answer
  Question 
User thread libraries include :-
  Correct Answer 
POSIX Pthreads , Mach C-threads , Solaris threads
  Your Answer 
Mach C-threads , Solaris threads
 True/False
  Question 
We can include dynamic protection in the access-matrix model by considering the domains and the access matrix itself as objects.
  Correct Answer 
True
  Your Answer 
True
 True/False
  Question 
The capability list is associated with a domain.
  Correct Answer 
True
  Your Answer 
True
 Select The Blank
  Question 
A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote.
  Correct Answer 
Redirector
  Your Answer 
Redirector
 Select The Blank
  Question 
The ________ is a compromise between access lists and capability lists.
  Correct Answer 
Lock-Key Schemes
  Your Answer 
Protected procedures
 Match The Following
Question
Correct Answer
Your Answer
Bit showing the availability of page in memory for which that entry belongs to
Present / absent bit
Modified bit
In page table entry, the access permitted are stored in
Protection bit
Protection bit
Bit is set when the page is referenced
Referenced bit
Referenced bit
Bit which keeps track of page usage
Modified bit
Security bit
 Multiple Choice Single Answer
  Question 
In UNIX, files are organized in tree-structured :-
  Correct Answer 
Directories
  Your Answer 
Directories
 Match The Following
Question
Correct Answer
Your Answer
We can define abstract operation on abstract data
Data abstraction
Data abstraction
Process of sharing properties of the higher level object or class
Inheritance
Inheritance
Ability to inherit attributes and methods from 2 or more objects or classes
Multiple inheritance
Multiple inheritance
Ability to send a message to several objects and to allow receiving object to respond method specified on the object.
Ploymorphism
Ploymorphism
 Select The Blank
  Question 
The Solaris developers reimplemented the ________ using in-kernel thread to eliminate the context switch involved in moving each character between daemons and the kernel.
  Correct Answer 
Telnet daemon
  Your Answer 
Context-switch daemon
 Multiple Choice Single Answer
  Question 
If the process is waiting for some event to occur then it is said to be in :-
  Correct Answer 
Waiting state
  Your Answer 
Ready state
 True/False
  Question 
Cache is a non-volatile storage system.
  Correct Answer 
False
  Your Answer 
False
 Multiple Choice Single Answer
  Question 
The wraping up of data and methods in a single unit (class) is known as :
  Correct Answer 
Encapsulation
  Your Answer 
Encapsulation
 True/False
  Question 
A process is a victim of starvation if it becomes stuck in a scheduling queue indefinitely.
  Correct Answer 
True
  Your Answer 
True
 Select The Blank
  Question 
________ file access can be layered on top of block-device drivers.
  Correct Answer 
Memory-mapped
  Your Answer 
Memory-mapped
 Multiple Choice Multiple Answer
  Question 
find out the services provided by kernel related to I/O :
  Correct Answer 
I/O Scheduling , Buffering , Spooling
  Your Answer 
I/O Scheduling , Buffering , Spooling
 Multiple Choice Multiple Answer
  Question 
The role of the operating system in computer I/O is to :-
  Correct Answer 
Manage I/O operation and devices , Control I/O operation and devices
  Your Answer 
Manage I/O operation and devices , Control I/O operation and devices
 True/False
  Question 
In Lock-key mechanism, a process executing in a domain can access an object if that domain has a key that matches one of the locks of the objects.
  Correct Answer 
True
  Your Answer 
False
 Multiple Choice Multiple Answer
  Question 
There are components to the module support under Linux, identify them :-
  Correct Answer 
Module management , Driver registration , Conflict-resolution mechanism
  Your Answer 
Module management , Driver registration , Conflict-resolution mechanism
 Multiple Choice Single Answer
  Question 
The 4.3BSD operating system is the version of :-
  Correct Answer 
UNIX
  Your Answer 
UNIX
 Select The Blank
  Question 
Each entry in the access matrix consists of a set of ________ .
  Correct Answer 
Access right
  Your Answer 
Access right
 Multiple Choice Single Answer
  Question 
In UNIX, a file is represented by an :-
  Correct Answer 
Inode
  Your Answer 
Block
 Multiple Choice Single Answer
  Question 
The segment is :-
  Correct Answer 
Logical entity
  Your Answer 
Logical entity
 True/False
  Question 
In Windows NT, each process has one or more threads, which are the units of execution dispatched by the kernel.
  Correct Answer 
True
  Your Answer 
True
 Multiple Choice Single Answer
  Question 
UNIX operating system is written mostly in :-
  Correct Answer 
C language
  Your Answer 
C++ language
 Multiple Choice Multiple Answer
  Question 
Security violations of the system can be categorized as :-
  Correct Answer 
Malicious , Accidental
  Your Answer 
Malicious , Authorized
 Multiple Choice Single Answer
  Question 
The smallest addressable portion of a disk is :-
  Correct Answer 
Sector
  Your Answer 
Sector
 Select The Blank
  Question 
Associations are generally ________.
  Correct Answer 
Bidirectional
  Your Answer 
Bidirectional
 Multiple Choice Multiple Answer
  Question 
Find out the human-interface devices :-
  Correct Answer 
Screen , Keyboard , Mouse
  Your Answer 
Screen , Keyboard , Mouse
 Select The Blank
  Question 
________allows us to define abstract operations on abstract data.
  Correct Answer 
Data abstraction
  Your Answer 
Data abstraction
 Multiple Choice Multiple Answer
  Question 
Once the I/O is started , which two courses of action are possible?
  Correct Answer 
Synchronous I/O , Asynchronous I/O , Simple I/O
  Your Answer 
Synchronous I/O , Asynchronous I/O , Simple I/O
 Multiple Choice Multiple Answer
  Question 
In windows NT, naming of objects is of two types :-
  Correct Answer 
Permanent name , Temporary name
  Your Answer 
Permanent name , Temporary name
 True/False
  Question 
Turnaround time is inversely proportional to throughput.
  Correct Answer 
True
  Your Answer 
True
 Select The Blank
  Question 
The hardware to measure elapsed time to trigger operations is called a ________.
  Correct Answer 
Programmable interval timer
  Your Answer 
Programmable elapsed timer
 Multiple Choice Multiple Answer
  Question 
User level threads are generally :-
  Correct Answer 
Fast to create , Easy to manage
  Your Answer 
Fast to create , Easy to manage
 Multiple Choice Single Answer
  Question 
In MULTICS TLB address of 'n', the most recently referenced pages are kept, where 'n' can have a value :-
  Correct Answer 
16
  Your Answer 
16
 Multiple Choice Single Answer
  Question 
C++ is also named as
  Correct Answer 
C with classes
  Your Answer 
C with classes
 Multiple Choice Multiple Answer
  Question 
Liner address is divided into fields like :-
  Correct Answer 
Dir , Page , Offset
  Your Answer 
Dir , Page , Offset
 Multiple Choice Single Answer
  Question 
DVMA stands for :-
  Correct Answer 
Direct Virtual Memory Access
  Your Answer 
Direct Virtual Memory Access
 True/False
  Question 
An asynchronous call returns immediately, without waiting for the I/O to complete.
  Correct Answer 
True
  Your Answer 
True
No comments:
Post a Comment