LIST OF ATTEMPTED QUESTIONS AND ANSWERS
 Multiple Choice Multiple Answer
  Question 
locate the transmission devices :-
  Correct Answer 
Network cards , Modems
  Your Answer 
Tapes , Network cards , Modems
 True/False
  Question 
The user process issues a network I/O system call to send the character to the remote machine.
  Correct Answer 
True
  Your Answer 
True
 Multiple Choice Single Answer
  Question 
The process by which objects of one class acquire properties of objects of other class is called
  Correct Answer 
Inheritance
  Your Answer 
Inheritance
 True/False
  Question 
Windows NT uses a message passing implementation for I/O.
  Correct Answer 
True
  Your Answer 
True
 Multiple Choice Multiple Answer
  Question 
We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes?
  Correct Answer 
User mode , Monitor mode
  Your Answer 
User mode , Monitor mode
 Match The Following
Question
Correct Answer
Your Answer
Round-robin
Time quantum
Time quantum
First-come First-served
First come job
First come job
Shortest job
Shortest job
Shortest job
Priority
Highest priority job
Highest priority job
 Multiple Choice Single Answer
  Question 
The segment is :-
  Correct Answer 
Logical entity
  Your Answer 
Logical entity
 Multiple Choice Single Answer
  Question 
In UNIX, decisions regarding which process to swap in or out are made by whom?
  Correct Answer 
Swapper
  Your Answer 
Memory handler
 Select The Blank
  Question 
A ________ is a client-server mechanism that enables an application on one machine to make a procedure call to code on another machine.
  Correct Answer 
Remote-procedure-call
  Your Answer 
Remote-procedure-call
 Multiple Choice Single Answer
  Question 
When each process that wants to communicate must explicitly name the recipient or sender of the communication, then such communication is called as :-
  Correct Answer 
Direct communication
  Your Answer 
Indirect communication
 Select The Blank
  Question 
In Linux, the allocator uses a ________ algorithm to keep track of available physical pages.
  Correct Answer 
Buddy-heap
  Your Answer 
Binary-search
 Multiple Choice Single Answer
  Question 
What does the rows of the access matrix represents?
  Correct Answer 
Domains
  Your Answer 
Domains
 Multiple Choice Single Answer
  Question 
Every change in policy requires a change in the underlying :-
  Correct Answer 
Mechanism
  Your Answer 
System
 Select The Blank
  Question 
A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote.
  Correct Answer 
Redirector
  Your Answer 
Domain
 Multiple Choice Multiple Answer
  Question 
In Solaris 2, user-level threads may be:-
  Correct Answer 
Bound , Unbound
  Your Answer 
Bound , Unbound
 Multiple Choice Multiple Answer
  Question 
An audit log records which things about an object ?
  Correct Answer 
Time , User , Type of access
  Your Answer 
Time , User , Type of access
 Multiple Choice Multiple Answer
  Question 
One-to-one model is supported by following systems :-
  Correct Answer 
Windows NT , OS/2
  Your Answer 
OS/2 , Windows NT
 Multiple Choice Multiple Answer
  Question 
To protect the system, we must take security measures at two levels, such as :-
  Correct Answer 
Physical level , Human level
  Your Answer 
Human level , Global level
 Multiple Choice Single Answer
  Question 
If the process is waiting for some event to occur then it is said to be in :-
  Correct Answer 
Waiting state
  Your Answer 
Waiting state
 Multiple Choice Single Answer
  Question 
A common representation for a discussion of process scheduling is a :-
  Correct Answer 
Queuing diagram
  Your Answer 
Process state diagram
 True/False
  Question 
At Physical level, the site or sites containing the computer systems must be physically secured against armed or surreptitious entry by intruders.
  Correct Answer 
True
  Your Answer 
True
 Select The Blank
  Question 
When you express user-system interaction, the scenario in the model is called ________
  Correct Answer 
Case model
  Your Answer 
Case model
 True/False
  Question 
Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention.
  Correct Answer 
False
  Your Answer 
True
 True/False
  Question 
A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .
  Correct Answer 
False
  Your Answer 
False
 Multiple Choice Single Answer
  Question 
Polymorphism means ability to take
  Correct Answer 
More than one form
  Your Answer 
More than one form
 True/False
  Question 
Aging algorithm is based on LRU.
  Correct Answer 
True
  Your Answer 
True
 Select The Blank
  Question 
The virtual memory portion of the NT executive is the ________.
  Correct Answer 
Virtual memory manager
  Your Answer 
Virtual memory manager
 Multiple Choice Multiple Answer
  Question 
There are two types of Message passing, they are :-
  Correct Answer 
Synchronous , Asynchronous
  Your Answer 
Synchronous , Asynchronous
 Select The Blank
  Question 
Web servers use the ________ protocol to communicate with web browsers.
  Correct Answer 
http
  Your Answer 
http
 Multiple Choice Multiple Answer
  Question 
The security of a system can be improved by two management techniques, such as :-
  Correct Answer 
Threat monitoring , Audit Log
  Your Answer 
Audit Log , Threat finding
 Select The Blank
  Question 
The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________.
  Correct Answer 
Ring
  Your Answer 
Ring
 True/False
  Question 
We say that a system is secure if its resources are used and accessed as intended under all circumstances.
  Correct Answer 
True
  Your Answer 
True
 Select The Blank
  Question 
The ________ controller is the controller at the computer end of the bus.
  Correct Answer 
Host
  Your Answer 
Cpu
 Multiple Choice Multiple Answer
  Question 
In Linux, the paging system can be divided into sections, namely:-
  Correct Answer 
Policy algorithm , Paging mechanism
  Your Answer 
Policy algorithm , Paging mechanism
 True/False
  Question 
Keyboard is a sharable device.
  Correct Answer 
True
  Your Answer 
False
 True/False
  Question 
Transfer of data from disk to memory is usually controlled by the operating system.
  Correct Answer 
True
  Your Answer 
True
 True/False
  Question 
Prototyping not only helps to build a quality design but also enables the designer to build the system decremantally.
  Correct Answer 
False
  Your Answer 
True
 Select The Blank
  Question 
The UNIX system uses ________ to avoid the necessity of keeping its password list secret.
  Correct Answer 
Encryption
  Your Answer 
Encryption
 Match The Following
Question
Correct Answer
Your Answer
Read-write devices
Disks
Disks
Dedicated devices
Tape
CD-ROM
Read-only devices
CD-ROM
Tape
Write-only devices
Graphics controller
Keyboard
 Multiple Choice Single Answer
  Question 
A procedure call, request to execute a method is termed as
  Correct Answer 
Message
  Your Answer 
Message
 Select The Blank
  Question 
Context switch times are highly dependent on ________ support.
  Correct Answer 
Hardware
  Your Answer 
Hardware
 Multiple Choice Multiple Answer
  Question 
Two main jobs of a computer are :-
  Correct Answer 
I/O , Processing
  Your Answer 
I/O , Processing
 Multiple Choice Single Answer
  Question 
The 4.3BSD operating system is the version of :-
  Correct Answer 
UNIX
  Your Answer 
UNIX
 Multiple Choice Single Answer
  Question 
The number of processes that are completed per time unit is called as:-
  Correct Answer 
Throughput of system
  Your Answer 
Throughput of system
 Multiple Choice Multiple Answer
  Question 
Once the I/O is started , which two courses of action are possible?
  Correct Answer 
Synchronous I/O , Asynchronous I/O , Simple I/O
  Your Answer 
Synchronous I/O , Asynchronous I/O
 Multiple Choice Multiple Answer
  Question 
Security violations of the system can be categorized as :-
  Correct Answer 
Malicious , Accidental
  Your Answer 
Malicious , Accidental
 Select The Blank
  Question 
A process migrates between the various ________ throughout its lifetime.
  Correct Answer 
Scheduling queues
  Your Answer 
Scheduling queues
No comments:
Post a Comment