LIST OF ATTEMPTED QUESTIONS AND ANSWERS
 Multiple Choice Single Answer
  Question 
SCSI stands for :-
  Correct Answer 
Small Computer-Systems Interface
  Your Answer 
Small Computer-Systems Interface
 Multiple Choice Multiple Answer
  Question 
The basic hardware elements involved in I/O are :-
  Correct Answer 
Buses , Device controllers , Device
  Your Answer 
Buses , Device controllers , Device
 True/False
  Question 
A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .
  Correct Answer 
False
  Your Answer 
False
 True/False
  Question 
C++ supports object oriented programming concepts of objects, classes, inheritance, polymorphism and parameterised datatypes.
  Correct Answer 
True
  Your Answer 
True
 True/False
  Question 
I/O system calls are costly in terms of CPU consumptions.
  Correct Answer 
True
  Your Answer 
True
 Multiple Choice Single Answer
  Question 
All user processes are descendents of one original process, Which is that process?
  Correct Answer 
Init process
  Your Answer 
Init process
 Match The Following
Question
Correct Answer
Your Answer
Provides adjustment while compiling classes
Interface classes
Derived function
Identify values & relevant operations
Abstract data types
Abstract data types
Complete implementation of class
Concrete data types
Interface classes
Provides framework for other classes
Node classes
Node classes
 Match The Following
Question
Correct Answer
Your Answer
Round-robin
Time quantum
Time quantum
First-come First-served
First come job
First come job
Shortest job
Shortest job
Shortest job
Priority
Highest priority job
Highest priority job
 Select The Blank
  Question 
________ describes segments local to each program, including its code, data, stack etc.
  Correct Answer 
LDT
  Your Answer 
LDT
 Multiple Choice Multiple Answer
  Question 
To protect the system, we must take security measures at two levels, such as :-
  Correct Answer 
Physical level , Human level
  Your Answer 
Physical level , Human level
 True/False
  Question 
The hardware allows privileged instructions to be executed in only user mode.
  Correct Answer 
False
  Your Answer 
False
 Multiple Choice Single Answer
  Question 
What does the rows of the access matrix represents?
  Correct Answer 
Domains
  Your Answer 
Domains
 Select The Blank
  Question 
A bit called the ________ , is added to the hardware of the computer to indicate the current mode.
  Correct Answer 
Mode bit
  Your Answer 
Mode bit
 True/False
  Question 
In Windows NT, each process has one or more threads, which are the units of execution dispatched by the kernel.
  Correct Answer 
True
  Your Answer 
True
 Select The Blank
  Question 
________allows us to define abstract operations on abstract data.
  Correct Answer 
Data abstraction
  Your Answer 
Data abstraction
 Select The Blank
  Question 
If the granularity field is ________ the limit field is the exact segment size, upto 1 MB.
  Correct Answer 
0
  Your Answer 
1
 True/False
  Question 
Encryption is one common method of protecting information that is transmitted over unreliable links.
  Correct Answer 
True
  Your Answer 
True
 Multiple Choice Single Answer
  Question 
Collection of similar datatypes is called as
  Correct Answer 
Array
  Your Answer 
Array
 Multiple Choice Single Answer
  Question 
A Process which produces process is known as :-
  Correct Answer 
Producer
  Your Answer 
Producer
 Multiple Choice Single Answer
  Question 
Interrupt mechanism accepts an address and this address is an offset in a table called the :-
  Correct Answer 
Interrupt vector
  Your Answer 
Interrupt vector
 Select The Blank
  Question 
The process could create a new ________ and wait for its termination.
  Correct Answer 
Sub process
  Your Answer 
Sub process
 Multiple Choice Single Answer
  Question 
Thread at user level is known as :-
  Correct Answer 
User thread
  Your Answer 
User thread
 Multiple Choice Single Answer
  Question 
If Dog derives from Mammal, and Mammal derives from Animal, then -
  Correct Answer 
Dog inherits Animal's functions and data
  Your Answer 
Mammal inherits Animal's functions and data
 Select The Blank
  Question 
During execution, ________ register holds the sector for the code segment.
  Correct Answer 
CS
  Your Answer 
DS
 Multiple Choice Single Answer
  Question 
The list of processes waiting for a particular I/O device is called a :-
  Correct Answer 
Device queue
  Your Answer 
Device queue
 True/False
  Question 
Cache is a faster storage system which stores data temporarily.
  Correct Answer 
True
  Your Answer 
True
 True/False
  Question 
The file system does not provide a degree of protection.
  Correct Answer 
False
  Your Answer 
True
 Multiple Choice Multiple Answer
  Question 
Liner address is divided into fields like :-
  Correct Answer 
Dir , Page , Offset
  Your Answer 
Dir , Page , Offset
 True/False
  Question 
Volatile storage loses its contents when the power to the device is removed.
  Correct Answer 
True
  Your Answer 
True
 Multiple Choice Single Answer
  Question 
Which of the following Operating System has no memory protection ?
  Correct Answer 
Windows 3.1
  Your Answer 
Windows 3.1
 Multiple Choice Multiple Answer
  Question 
In windows NT, naming of objects is of two types :-
  Correct Answer 
Permanent name , Temporary name
  Your Answer 
Permanent name , Temporary name
 Multiple Choice Single Answer
  Question 
Protection can no longer be considered solely as a matter of concern to the designer of :-
  Correct Answer 
Operating system
  Your Answer 
Operating system
 Select The Blank
  Question 
Web servers use the ________ protocol to communicate with web browsers.
  Correct Answer 
http
  Your Answer 
http
 Multiple Choice Multiple Answer
  Question 
locate the transmission devices :-
  Correct Answer 
Network cards , Modems
  Your Answer 
Network cards , Modems
 Multiple Choice Single Answer
  Question 
In UNIX, the simplest form of communication between processes is by :-
  Correct Answer 
Pipes
  Your Answer 
Pipes
 Select The Blank
  Question 
A ________ is a group of NT server machines that share a common security policy and user databases.
  Correct Answer 
Domain
  Your Answer 
Domain
 Multiple Choice Multiple Answer
  Question 
Message passing may be :-
  Correct Answer 
Blocking , Non-blocking
  Your Answer 
Blocking , Non-blocking
 Multiple Choice Multiple Answer
  Question 
An object type in windows NT is a system defined data type that has two things associated with it, which are they?
  Correct Answer 
Set of attributes , Set of methods
  Your Answer 
Set of attributes , Set of methods
 Select The Blank
  Question 
The ________ of a process is represented in the PCB of a process.
  Correct Answer 
Context
  Your Answer 
Context
 Select The Blank
  Question 
The Linux ________ file system, known as the proc file system, is an example of a file system whose contents are not actually stored anywhere, but are rather computed on demand according to user file I/o requests.
  Correct Answer 
Process
  Your Answer 
Process
 True/False
  Question 
Objects can be both, tangible or intangible.
  Correct Answer 
True
  Your Answer 
True
 Multiple Choice Multiple Answer
  Question 
In UNIX, a device is distinguished by two things, which are :-
  Correct Answer 
Device-class , Device number
  Your Answer 
Device-class , Device number
 Multiple Choice Multiple Answer
  Question 
Find out the basic I/O hardware elements from the following :-
  Correct Answer 
Ports , Buses , Device controllers
  Your Answer 
Ports , Buses , Device controllers
 Multiple Choice Multiple Answer
  Question 
Which are the Division D security systems ?
  Correct Answer 
Windows 3.1 , MS-DOS
  Your Answer 
Windows 3.1 , MS-DOS
 Multiple Choice Single Answer
  Question 
Protection can improve :-
  Correct Answer 
Reliability
  Your Answer 
Reliability
 Select The Blank
  Question 
The creating process is called a ________ process.
  Correct Answer 
Parent
  Your Answer 
Parent
 Multiple Choice Multiple Answer
  Question 
When memory reference occurs in MULTICS the things which takes place are :-
  Correct Answer 
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address
  Your Answer 
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address
No comments:
Post a Comment