Operating Systems
LIST OF ATTEMPTED QUESTIONS AND ANSWERS
True/False
Question- Firewall monitors and logs all connections.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question- Which of the following Operating System has no memory protection ?
Correct Answer
Windows 3.1
Your Answer
Windows 3.1
Multiple Choice Single Answer
Question- The main difference between structure and class is
Correct Answer
Structure does not support OOPS Class Supports OOPS.
Your Answer
Structure does not support OOPS Class Supports OOPS.
Multiple Choice Single Answer
Question- DMA stands for :-
Correct Answer
Direct Memory Access
Your Answer
Direct Memory Access
Multiple Choice Single Answer
Question- A major problem with the Priority scheduling algorithm is :-
Correct Answer
Starvation
Your Answer
Starvation
Multiple Choice Single Answer
Question- How big is a class object?
Correct Answer
Is as big as sum of the sizes of its member variables
Your Answer
Is as big as sum of the sizes of its member variables
Multiple Choice Single Answer
Question-The First version of UNIX was developed in 1969 by Ken Thompson of the Research Group at :-
Correct Answer
Bell Laboratories
Your Answer
Bell Laboratories
Multiple Choice Single Answer
Question - When computer is powered up or rebooted, it needs to have an initial program to run. This initial program is known as :-
Correct Answer
Bootstrap program
Your Answer
Bootstrap program
True/False
Question- Processes represents the executions of single programs whereas threads represent separate, concurrent execution contexts within a single process running a single program.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question- If Dog derives from Mammal, and Mammal derives from Animal, then -
Correct Answer
Dog inherits Animal's functions and data
Your Answer
Dog inherits Animal's functions and data
Multiple Choice Single Answer
Question- The wraping up of data and methods in a single unit (class) is known as :
Correct Answer
Encapsulation
Your Answer
Encapsulation
True/False
Question - LRU algorithm can not be implemented without special hardware.
Correct Answer
True
Your Answer
False
Select The Blank
Question - The Solaris developers reimplemented the ________ using in-kernel thread to eliminate the context switch involved in moving each character between daemons and the kernel.
Correct Answer
Telnet daemon
Your Answer
Telnet daemon
Multiple Choice Single Answer
Question - All user processes are descendents of one original process, Which is that process?
Correct Answer
Init process
Your Answer
Init process
Select The Blank
Question - Terminals and line printers are ________ .
Correct Answer
Character devices
Your Answer
Character devices
Multiple Choice Multiple Answer
Question- Many-to-may model is supported by following operating systems :-
Correct Answer
Solaris , IRIX , Digital UNIX
Your Answer
Solaris , IRIX , Digital UNIX
Multiple Choice Multiple Answer
Question - find out the services provided by kernel related to I/O :
Correct Answer
I/O Scheduling , Buffering , Spooling
Your Answer
I/O Scheduling , Buffering , Spooling
Multiple Choice Single Answer
Question - The long-term scheduler controls the :-
Correct Answer
Degree of multiprogramming
Your Answer
Degree of multiprogramming
Select The Blank
Question - The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________.
Correct Answer
Ring
Your Answer
Ring
Multiple Choice Multiple Answer
Question - In Linux, the main objects defined by the virtual file system are :-
Correct Answer
Inode-object , File-object , File-system object
Your Answer
Inode-object , File-object , File-system object
Multiple Choice Single Answer
Question - Collection of similar datatypes is called as
Correct Answer
Array
Your Answer
Array
Multiple Choice Multiple Answer
Question - We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes?
Correct Answer
User mode , Monitor mode
Your Answer
User mode , Monitor mode
Match The Following
Question
Correct Answer
Your Answer
Class Shape
Triangle, rectangle, circle, ellipse
Triangle, rectangle, circle, ellipse
Class Vehicle
Scooter, car, truck, tractor
Scooter, car, truck, tractor
Class Animal
Cat, dog, cow, tiger
Cat, dog, cow, tiger
Class Color
Red, yellow, blue, green
Red, yellow, blue, green
Select The Blank
Question - The virtual memory portion of the NT executive is the ________.
Correct Answer
Virtual memory manager
Your Answer
Virtual memory manager
True/False
Question - An asynchronous call returns immediately, without waiting for the I/O to complete.
Correct Answer
True
Your Answer
True
True/False
Question
Modem is a random-access device.
Correct Answer
False
Your Answer
False
Multiple Choice Multiple Answer
Question
A mailbox can be owned by :-
Correct Answer
Process , Operating system
Your Answer
Process , Operating system
Multiple Choice Multiple Answer
Question
The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :-
Correct Answer
Explicit , Implicit
Your Answer
Explicit , Implicit
Select The Blank
Question
In windows NT, the ________ facility is used to pass requests and results between client and server processes within a single machine.
Correct Answer
Local-procedure-call
Your Answer
Remote-procedure-call
True/False
Question
A major security problem for operating system is authentication.
Correct Answer
True
Your Answer
True
True/False
Question
In a blocking system call, the application is moved from the OS's run queue to a wait queue.
Correct Answer
True
Your Answer
True
True/False
Question
Device speeds range from a few bytes per second to a few gigabytes per second.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
Various storage systems available possesses which two characteristics?
Correct Answer
Volatile , Non-volatile
Your Answer
Volatile , Non-volatile
Match The Following
Question
Correct Answer
Your Answer
We can define abstract operation on abstract data
Data abstraction
Data abstraction
Process of sharing properties of the higher level object or class
Inheritance
Inheritance
Ability to inherit attributes and methods from 2 or more objects or classes
Multiple inheritance
Multiple inheritance
Ability to send a message to several objects and to allow receiving object to respond method specified on the object.
Ploymorphism
Ploymorphism
Multiple Choice Single Answer
Question
As process enter the system, they are put into :-
Correct Answer
Job queue
Your Answer
Job queue
Multiple Choice Multiple Answer
Question
The role of the operating system in computer I/O is to :-
Correct Answer
Manage I/O operation and devices , Control I/O operation and devices
Your Answer
Manage I/O operation and devices , Control I/O operation and devices
Select The Blank
Question
The ________ is a layer of software that hides hardware differences from upper levels of the operating system.
Correct Answer
Hardware abstraction layer
Your Answer
Hardware abstraction layer
Select The Blank
Question
A ________ is a computer or router that sits between the trusted and untrusted systems.
Correct Answer
Firewall
Your Answer
Firewall
Multiple Choice Multiple Answer
Question
The Moriss Internet Worm was made up of which of the two programs?
Correct Answer
Grappling hook program , Main program
Your Answer
Grappling hook program , Main program
Multiple Choice Multiple Answer
Question
In UNIX, a device is distinguished by two things, which are :-
Correct Answer
Device-class , Device number
Your Answer
Device-class , Device number
Multiple Choice Single Answer
Question
In general , the access matrix will be :-
Correct Answer
Sparse
Your Answer
Sparse
True/False
Question
Applications normally access block devices through a file system interface.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
User thread libraries include :-
Correct Answer
POSIX Pthreads , Mach C-threads , Solaris threads
Your Answer
POSIX Pthreads , Mach C-threads , Solaris threads
Select The Blank
Question
The positioning time sometimes called the ________.
Correct Answer
Random-access time
Your Answer
Random-access time
Multiple Choice Single Answer
Question
The concept of OOPS was first introduced in
Correct Answer
Simula Language
Your Answer
Simula Language
True/False
Question- Firewall monitors and logs all connections.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question- Which of the following Operating System has no memory protection ?
Correct Answer
Windows 3.1
Your Answer
Windows 3.1
Multiple Choice Single Answer
Question- The main difference between structure and class is
Correct Answer
Structure does not support OOPS Class Supports OOPS.
Your Answer
Structure does not support OOPS Class Supports OOPS.
Multiple Choice Single Answer
Question- DMA stands for :-
Correct Answer
Direct Memory Access
Your Answer
Direct Memory Access
Multiple Choice Single Answer
Question- A major problem with the Priority scheduling algorithm is :-
Correct Answer
Starvation
Your Answer
Starvation
Multiple Choice Single Answer
Question- How big is a class object?
Correct Answer
Is as big as sum of the sizes of its member variables
Your Answer
Is as big as sum of the sizes of its member variables
Multiple Choice Single Answer
Question-The First version of UNIX was developed in 1969 by Ken Thompson of the Research Group at :-
Correct Answer
Bell Laboratories
Your Answer
Bell Laboratories
Multiple Choice Single Answer
Question - When computer is powered up or rebooted, it needs to have an initial program to run. This initial program is known as :-
Correct Answer
Bootstrap program
Your Answer
Bootstrap program
True/False
Question- Processes represents the executions of single programs whereas threads represent separate, concurrent execution contexts within a single process running a single program.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question- If Dog derives from Mammal, and Mammal derives from Animal, then -
Correct Answer
Dog inherits Animal's functions and data
Your Answer
Dog inherits Animal's functions and data
Multiple Choice Single Answer
Question- The wraping up of data and methods in a single unit (class) is known as :
Correct Answer
Encapsulation
Your Answer
Encapsulation
True/False
Question - LRU algorithm can not be implemented without special hardware.
Correct Answer
True
Your Answer
False
Select The Blank
Question - The Solaris developers reimplemented the ________ using in-kernel thread to eliminate the context switch involved in moving each character between daemons and the kernel.
Correct Answer
Telnet daemon
Your Answer
Telnet daemon
Multiple Choice Single Answer
Question - All user processes are descendents of one original process, Which is that process?
Correct Answer
Init process
Your Answer
Init process
Select The Blank
Question - Terminals and line printers are ________ .
Correct Answer
Character devices
Your Answer
Character devices
Multiple Choice Multiple Answer
Question- Many-to-may model is supported by following operating systems :-
Correct Answer
Solaris , IRIX , Digital UNIX
Your Answer
Solaris , IRIX , Digital UNIX
Multiple Choice Multiple Answer
Question - find out the services provided by kernel related to I/O :
Correct Answer
I/O Scheduling , Buffering , Spooling
Your Answer
I/O Scheduling , Buffering , Spooling
Multiple Choice Single Answer
Question - The long-term scheduler controls the :-
Correct Answer
Degree of multiprogramming
Your Answer
Degree of multiprogramming
Select The Blank
Question - The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________.
Correct Answer
Ring
Your Answer
Ring
Multiple Choice Multiple Answer
Question - In Linux, the main objects defined by the virtual file system are :-
Correct Answer
Inode-object , File-object , File-system object
Your Answer
Inode-object , File-object , File-system object
Multiple Choice Single Answer
Question - Collection of similar datatypes is called as
Correct Answer
Array
Your Answer
Array
Multiple Choice Multiple Answer
Question - We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes?
Correct Answer
User mode , Monitor mode
Your Answer
User mode , Monitor mode
Match The Following
Question
Correct Answer
Your Answer
Class Shape
Triangle, rectangle, circle, ellipse
Triangle, rectangle, circle, ellipse
Class Vehicle
Scooter, car, truck, tractor
Scooter, car, truck, tractor
Class Animal
Cat, dog, cow, tiger
Cat, dog, cow, tiger
Class Color
Red, yellow, blue, green
Red, yellow, blue, green
Select The Blank
Question - The virtual memory portion of the NT executive is the ________.
Correct Answer
Virtual memory manager
Your Answer
Virtual memory manager
True/False
Question - An asynchronous call returns immediately, without waiting for the I/O to complete.
Correct Answer
True
Your Answer
True
True/False
Question
Modem is a random-access device.
Correct Answer
False
Your Answer
False
Multiple Choice Multiple Answer
Question
A mailbox can be owned by :-
Correct Answer
Process , Operating system
Your Answer
Process , Operating system
Multiple Choice Multiple Answer
Question
The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :-
Correct Answer
Explicit , Implicit
Your Answer
Explicit , Implicit
Select The Blank
Question
In windows NT, the ________ facility is used to pass requests and results between client and server processes within a single machine.
Correct Answer
Local-procedure-call
Your Answer
Remote-procedure-call
True/False
Question
A major security problem for operating system is authentication.
Correct Answer
True
Your Answer
True
True/False
Question
In a blocking system call, the application is moved from the OS's run queue to a wait queue.
Correct Answer
True
Your Answer
True
True/False
Question
Device speeds range from a few bytes per second to a few gigabytes per second.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
Various storage systems available possesses which two characteristics?
Correct Answer
Volatile , Non-volatile
Your Answer
Volatile , Non-volatile
Match The Following
Question
Correct Answer
Your Answer
We can define abstract operation on abstract data
Data abstraction
Data abstraction
Process of sharing properties of the higher level object or class
Inheritance
Inheritance
Ability to inherit attributes and methods from 2 or more objects or classes
Multiple inheritance
Multiple inheritance
Ability to send a message to several objects and to allow receiving object to respond method specified on the object.
Ploymorphism
Ploymorphism
Multiple Choice Single Answer
Question
As process enter the system, they are put into :-
Correct Answer
Job queue
Your Answer
Job queue
Multiple Choice Multiple Answer
Question
The role of the operating system in computer I/O is to :-
Correct Answer
Manage I/O operation and devices , Control I/O operation and devices
Your Answer
Manage I/O operation and devices , Control I/O operation and devices
Select The Blank
Question
The ________ is a layer of software that hides hardware differences from upper levels of the operating system.
Correct Answer
Hardware abstraction layer
Your Answer
Hardware abstraction layer
Select The Blank
Question
A ________ is a computer or router that sits between the trusted and untrusted systems.
Correct Answer
Firewall
Your Answer
Firewall
Multiple Choice Multiple Answer
Question
The Moriss Internet Worm was made up of which of the two programs?
Correct Answer
Grappling hook program , Main program
Your Answer
Grappling hook program , Main program
Multiple Choice Multiple Answer
Question
In UNIX, a device is distinguished by two things, which are :-
Correct Answer
Device-class , Device number
Your Answer
Device-class , Device number
Multiple Choice Single Answer
Question
In general , the access matrix will be :-
Correct Answer
Sparse
Your Answer
Sparse
True/False
Question
Applications normally access block devices through a file system interface.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
User thread libraries include :-
Correct Answer
POSIX Pthreads , Mach C-threads , Solaris threads
Your Answer
POSIX Pthreads , Mach C-threads , Solaris threads
Select The Blank
Question
The positioning time sometimes called the ________.
Correct Answer
Random-access time
Your Answer
Random-access time
Multiple Choice Single Answer
Question
The concept of OOPS was first introduced in
Correct Answer
Simula Language
Your Answer
Simula Language
Select The Blank
Question
________ passwords prevent improper authentication due to password exposure.
Correct Answer
One-time
Your Answer
One-time
Multiple Choice Single Answer
Question
The linking of procedure call to the code to be executed in response to that call is referred as
Correct Answer
Binding
Your Answer
Binding
Labels: Operating System
LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Multiple Choice Multiple Answer
Question
locate the transmission devices :-
Correct Answer
Network cards , Modems
Your Answer
Tapes , Network cards , Modems
True/False
Question
The user process issues a network I/O system call to send the character to the remote machine.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
The process by which objects of one class acquire properties of objects of other class is called
Correct Answer
Inheritance
Your Answer
Inheritance
True/False
Question
Windows NT uses a message passing implementation for I/O.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes?
Correct Answer
User mode , Monitor mode
Your Answer
User mode , Monitor mode
Match The Following
Question
Correct Answer
Your Answer
Round-robin
Time quantum
Time quantum
First-come First-served
First come job
First come job
Shortest job
Shortest job
Shortest job
Priority
Highest priority job
Highest priority job
Multiple Choice Single Answer
Question
The segment is :-
Correct Answer
Logical entity
Your Answer
Logical entity
Multiple Choice Single Answer
Question
In UNIX, decisions regarding which process to swap in or out are made by whom?
Correct Answer
Swapper
Your Answer
Memory handler
Select The Blank
Question
A ________ is a client-server mechanism that enables an application on one machine to make a procedure call to code on another machine.
Correct Answer
Remote-procedure-call
Your Answer
Remote-procedure-call
Multiple Choice Single Answer
Question
When each process that wants to communicate must explicitly name the recipient or sender of the communication, then such communication is called as :-
Correct Answer
Direct communication
Your Answer
Indirect communication
Select The Blank
Question
In Linux, the allocator uses a ________ algorithm to keep track of available physical pages.
Correct Answer
Buddy-heap
Your Answer
Binary-search
Multiple Choice Single Answer
Question
What does the rows of the access matrix represents?
Correct Answer
Domains
Your Answer
Domains
Multiple Choice Single Answer
Question
Every change in policy requires a change in the underlying :-
Correct Answer
Mechanism
Your Answer
System
Select The Blank
Question
A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote.
Correct Answer
Redirector
Your Answer
Domain
Multiple Choice Multiple Answer
Question
In Solaris 2, user-level threads may be:-
Correct Answer
Bound , Unbound
Your Answer
Bound , Unbound
Multiple Choice Multiple Answer
Question
An audit log records which things about an object ?
Correct Answer
Time , User , Type of access
Your Answer
Time , User , Type of access
Multiple Choice Multiple Answer
Question
One-to-one model is supported by following systems :-
Correct Answer
Windows NT , OS/2
Your Answer
OS/2 , Windows NT
Multiple Choice Multiple Answer
Question
To protect the system, we must take security measures at two levels, such as :-
Correct Answer
Physical level , Human level
Your Answer
Human level , Global level
Multiple Choice Single Answer
Question
If the process is waiting for some event to occur then it is said to be in :-
Correct Answer
Waiting state
Your Answer
Waiting state
Multiple Choice Single Answer
Question
A common representation for a discussion of process scheduling is a :-
Correct Answer
Queuing diagram
Your Answer
Process state diagram
True/False
Question
At Physical level, the site or sites containing the computer systems must be physically secured against armed or surreptitious entry by intruders.
Correct Answer
True
Your Answer
True
Select The Blank
Question
When you express user-system interaction, the scenario in the model is called ________
Correct Answer
Case model
Your Answer
Case model
True/False
Question
Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention.
Correct Answer
False
Your Answer
True
True/False
Question
A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .
Correct Answer
False
Your Answer
False
Multiple Choice Single Answer
Question
Polymorphism means ability to take
Correct Answer
More than one form
Your Answer
More than one form
True/False
Question
Aging algorithm is based on LRU.
Correct Answer
True
Your Answer
True
Select The Blank
Question
The virtual memory portion of the NT executive is the ________.
Correct Answer
Virtual memory manager
Your Answer
Virtual memory manager
Multiple Choice Multiple Answer
Question
There are two types of Message passing, they are :-
Correct Answer
Synchronous , Asynchronous
Your Answer
Synchronous , Asynchronous
Select The Blank
Question
Web servers use the ________ protocol to communicate with web browsers.
Correct Answer
http
Your Answer
http
Multiple Choice Multiple Answer
Question
The security of a system can be improved by two management techniques, such as :-
Correct Answer
Threat monitoring , Audit Log
Your Answer
Audit Log , Threat finding
Select The Blank
Question
The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________.
Correct Answer
Ring
Your Answer
Ring
True/False
Question
We say that a system is secure if its resources are used and accessed as intended under all circumstances.
Correct Answer
True
Your Answer
True
Select The Blank
Question
The ________ controller is the controller at the computer end of the bus.
Correct Answer
Host
Your Answer
Cpu
Multiple Choice Multiple Answer
Question
In Linux, the paging system can be divided into sections, namely:-
Correct Answer
Policy algorithm , Paging mechanism
Your Answer
Policy algorithm , Paging mechanism
True/False
Question
Keyboard is a sharable device.
Correct Answer
True
Your Answer
False
True/False
Question
Transfer of data from disk to memory is usually controlled by the operating system.
Correct Answer
True
Your Answer
True
True/False
Question
Prototyping not only helps to build a quality design but also enables the designer to build the system decremantally.
Correct Answer
False
Your Answer
True
Select The Blank
Question
The UNIX system uses ________ to avoid the necessity of keeping its password list secret.
Correct Answer
Encryption
Your Answer
Encryption
Match The Following
Question
Correct Answer
Your Answer
Read-write devices
Disks
Disks
Dedicated devices
Tape
CD-ROM
Read-only devices
CD-ROM
Tape
Write-only devices
Graphics controller
Keyboard
Multiple Choice Single Answer
Question
A procedure call, request to execute a method is termed as
Correct Answer
Message
Your Answer
Message
Select The Blank
Question
Context switch times are highly dependent on ________ support.
Correct Answer
Hardware
Your Answer
Hardware
Multiple Choice Multiple Answer
Question
Two main jobs of a computer are :-
Correct Answer
I/O , Processing
Your Answer
I/O , Processing
Multiple Choice Single Answer
Question
The 4.3BSD operating system is the version of :-
Correct Answer
UNIX
Your Answer
UNIX
Multiple Choice Single Answer
Question
The number of processes that are completed per time unit is called as:-
Correct Answer
Throughput of system
Your Answer
Throughput of system
Multiple Choice Multiple Answer
Question
Once the I/O is started , which two courses of action are possible?
Correct Answer
Synchronous I/O , Asynchronous I/O , Simple I/O
Your Answer
Synchronous I/O , Asynchronous I/O
Multiple Choice Multiple Answer
Question
Security violations of the system can be categorized as :-
Correct Answer
Malicious , Accidental
Your Answer
Malicious , Accidental
Select The Blank
Question
A process migrates between the various ________ throughout its lifetime.
Correct Answer
Scheduling queues
Your Answer
Scheduling queues
Multiple Choice Multiple Answer
Question
locate the transmission devices :-
Correct Answer
Network cards , Modems
Your Answer
Tapes , Network cards , Modems
True/False
Question
The user process issues a network I/O system call to send the character to the remote machine.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
The process by which objects of one class acquire properties of objects of other class is called
Correct Answer
Inheritance
Your Answer
Inheritance
True/False
Question
Windows NT uses a message passing implementation for I/O.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes?
Correct Answer
User mode , Monitor mode
Your Answer
User mode , Monitor mode
Match The Following
Question
Correct Answer
Your Answer
Round-robin
Time quantum
Time quantum
First-come First-served
First come job
First come job
Shortest job
Shortest job
Shortest job
Priority
Highest priority job
Highest priority job
Multiple Choice Single Answer
Question
The segment is :-
Correct Answer
Logical entity
Your Answer
Logical entity
Multiple Choice Single Answer
Question
In UNIX, decisions regarding which process to swap in or out are made by whom?
Correct Answer
Swapper
Your Answer
Memory handler
Select The Blank
Question
A ________ is a client-server mechanism that enables an application on one machine to make a procedure call to code on another machine.
Correct Answer
Remote-procedure-call
Your Answer
Remote-procedure-call
Multiple Choice Single Answer
Question
When each process that wants to communicate must explicitly name the recipient or sender of the communication, then such communication is called as :-
Correct Answer
Direct communication
Your Answer
Indirect communication
Select The Blank
Question
In Linux, the allocator uses a ________ algorithm to keep track of available physical pages.
Correct Answer
Buddy-heap
Your Answer
Binary-search
Multiple Choice Single Answer
Question
What does the rows of the access matrix represents?
Correct Answer
Domains
Your Answer
Domains
Multiple Choice Single Answer
Question
Every change in policy requires a change in the underlying :-
Correct Answer
Mechanism
Your Answer
System
Select The Blank
Question
A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote.
Correct Answer
Redirector
Your Answer
Domain
Multiple Choice Multiple Answer
Question
In Solaris 2, user-level threads may be:-
Correct Answer
Bound , Unbound
Your Answer
Bound , Unbound
Multiple Choice Multiple Answer
Question
An audit log records which things about an object ?
Correct Answer
Time , User , Type of access
Your Answer
Time , User , Type of access
Multiple Choice Multiple Answer
Question
One-to-one model is supported by following systems :-
Correct Answer
Windows NT , OS/2
Your Answer
OS/2 , Windows NT
Multiple Choice Multiple Answer
Question
To protect the system, we must take security measures at two levels, such as :-
Correct Answer
Physical level , Human level
Your Answer
Human level , Global level
Multiple Choice Single Answer
Question
If the process is waiting for some event to occur then it is said to be in :-
Correct Answer
Waiting state
Your Answer
Waiting state
Multiple Choice Single Answer
Question
A common representation for a discussion of process scheduling is a :-
Correct Answer
Queuing diagram
Your Answer
Process state diagram
True/False
Question
At Physical level, the site or sites containing the computer systems must be physically secured against armed or surreptitious entry by intruders.
Correct Answer
True
Your Answer
True
Select The Blank
Question
When you express user-system interaction, the scenario in the model is called ________
Correct Answer
Case model
Your Answer
Case model
True/False
Question
Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention.
Correct Answer
False
Your Answer
True
True/False
Question
A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .
Correct Answer
False
Your Answer
False
Multiple Choice Single Answer
Question
Polymorphism means ability to take
Correct Answer
More than one form
Your Answer
More than one form
True/False
Question
Aging algorithm is based on LRU.
Correct Answer
True
Your Answer
True
Select The Blank
Question
The virtual memory portion of the NT executive is the ________.
Correct Answer
Virtual memory manager
Your Answer
Virtual memory manager
Multiple Choice Multiple Answer
Question
There are two types of Message passing, they are :-
Correct Answer
Synchronous , Asynchronous
Your Answer
Synchronous , Asynchronous
Select The Blank
Question
Web servers use the ________ protocol to communicate with web browsers.
Correct Answer
http
Your Answer
http
Multiple Choice Multiple Answer
Question
The security of a system can be improved by two management techniques, such as :-
Correct Answer
Threat monitoring , Audit Log
Your Answer
Audit Log , Threat finding
Select The Blank
Question
The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________.
Correct Answer
Ring
Your Answer
Ring
True/False
Question
We say that a system is secure if its resources are used and accessed as intended under all circumstances.
Correct Answer
True
Your Answer
True
Select The Blank
Question
The ________ controller is the controller at the computer end of the bus.
Correct Answer
Host
Your Answer
Cpu
Multiple Choice Multiple Answer
Question
In Linux, the paging system can be divided into sections, namely:-
Correct Answer
Policy algorithm , Paging mechanism
Your Answer
Policy algorithm , Paging mechanism
True/False
Question
Keyboard is a sharable device.
Correct Answer
True
Your Answer
False
True/False
Question
Transfer of data from disk to memory is usually controlled by the operating system.
Correct Answer
True
Your Answer
True
True/False
Question
Prototyping not only helps to build a quality design but also enables the designer to build the system decremantally.
Correct Answer
False
Your Answer
True
Select The Blank
Question
The UNIX system uses ________ to avoid the necessity of keeping its password list secret.
Correct Answer
Encryption
Your Answer
Encryption
Match The Following
Question
Correct Answer
Your Answer
Read-write devices
Disks
Disks
Dedicated devices
Tape
CD-ROM
Read-only devices
CD-ROM
Tape
Write-only devices
Graphics controller
Keyboard
Multiple Choice Single Answer
Question
A procedure call, request to execute a method is termed as
Correct Answer
Message
Your Answer
Message
Select The Blank
Question
Context switch times are highly dependent on ________ support.
Correct Answer
Hardware
Your Answer
Hardware
Multiple Choice Multiple Answer
Question
Two main jobs of a computer are :-
Correct Answer
I/O , Processing
Your Answer
I/O , Processing
Multiple Choice Single Answer
Question
The 4.3BSD operating system is the version of :-
Correct Answer
UNIX
Your Answer
UNIX
Multiple Choice Single Answer
Question
The number of processes that are completed per time unit is called as:-
Correct Answer
Throughput of system
Your Answer
Throughput of system
Multiple Choice Multiple Answer
Question
Once the I/O is started , which two courses of action are possible?
Correct Answer
Synchronous I/O , Asynchronous I/O , Simple I/O
Your Answer
Synchronous I/O , Asynchronous I/O
Multiple Choice Multiple Answer
Question
Security violations of the system can be categorized as :-
Correct Answer
Malicious , Accidental
Your Answer
Malicious , Accidental
Select The Blank
Question
A process migrates between the various ________ throughout its lifetime.
Correct Answer
Scheduling queues
Your Answer
Scheduling queues
Labels: Operating System
LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Multiple Choice Multiple Answer
Question
Various storage systems available possesses which two characteristics?
Correct Answer
Volatile , Non-volatile
Your Answer
Volatile , Non-volatile
Multiple Choice Multiple Answer
Question
Most CPUs have two interrupt request lines. Which are they?
Correct Answer
Maskable , Non maskable
Your Answer
Maskable , Non maskable
Select The Blank
Question
A ________ is a group of NT server machines that share a common security policy and user databases.
Correct Answer
Domain
Your Answer
Domain
Select The Blank
Question
An ________ is a dedicated, special purpose CPU found in mainframes and in other high-end systems.
Correct Answer
I/O channel
Your Answer
I/O channel
Multiple Choice Single Answer
Question
The CPU is allocated to the selected process by the :-
Correct Answer
Dispatcher
Your Answer
Dispatcher
Multiple Choice Single Answer
Question
In JAVA , the derived class is known as
Correct Answer
Subclass
Your Answer
Subclass
Select The Blank
Question
The Pentium supports four protection levels with ________ as least privileged level.
Correct Answer
3
Your Answer
3
Select The Blank
Question
________ of an object remains unchanged even though its state and properties change.
Correct Answer
Identity
Your Answer
Identity
True/False
Question
One way to achieve portability is to write software in standard version of high level language and to develop portable system and application software .
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
Software may trigger an interrupt by executing a special operation called :-
Correct Answer
System call
Your Answer
System call
Multiple Choice Single Answer
Question
In Object Oriented technology following expression is appropriate
Correct Answer
object=data+menthods
Your Answer
object=data+menthods
Multiple Choice Multiple Answer
Question
The two versions of NT are :
Correct Answer
WindowsNT workstations , WindowsNT server
Your Answer
WindowsNT workstations , WindowsNT server
Match The Following
Question
Correct Answer
Your Answer
We can define abstract operation on abstract data
Data abstraction
Data abstraction
Process of sharing properties of the higher level object or class
Inheritance
Inheritance
Ability to inherit attributes and methods from 2 or more objects or classes
Multiple inheritance
Multiple inheritance
Ability to send a message to several objects and to allow receiving object to respond method specified on the object.
Ploymorphism
Ploymorphism
Select The Blank
Question
A________ is a memory area that stores data while they are transferred between two devices or between a device and an application.
Correct Answer
Buffer
Your Answer
Buffer
True/False
Question
In Public Key Encryption, each user has both a public and a private key.
Correct Answer
True
Your Answer
True
True/False
Question
Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention.
Correct Answer
False
Your Answer
False
Multiple Choice Multiple Answer
Question
Liner address is divided into fields like :-
Correct Answer
Dir , Page , Offset
Your Answer
Dir , Page , Offset
Multiple Choice Single Answer
Question
IPC is particularly useful in a :-
Correct Answer
Distributed environment
Your Answer
Internet environment
Multiple Choice Single Answer
Question
IPC provides a mechanism to allow processes to communicate and to synchronize their actions without sharing the same :-
Correct Answer
Address space
Your Answer
Semaphore
Multiple Choice Multiple Answer
Question
Supervisor mode is also known as :-
Correct Answer
Privileged mode , Monitor mode , System mode
Your Answer
System mode , Privileged mode , Monitor mode
Select The Blank
Question
Assuming that the segment is in memory and the offset is in range, the Pentium then adds the ________ bit base field in the descriptor to the offset to form linear address.
Correct Answer
32
Your Answer
32
Multiple Choice Multiple Answer
Question
In Solaris 2, user-level threads may be:-
Correct Answer
Bound , Unbound
Your Answer
Bound , Unbound
Multiple Choice Single Answer
Question
The concept of OOPS was first introduced in
Correct Answer
Simula Language
Your Answer
Simula Language
True/False
Question
At system boot time, the hardware starts in monitor mode.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
The main difference between structure and class is
Correct Answer
Structure does not support OOPS Class Supports OOPS.
Your Answer
Structure does not support OOPS Class Supports OOPS.
Select The Blank
Question
A ________ controller is built into each disk drive.
Correct Answer
Disk
Your Answer
Disk
Multiple Choice Single Answer
Question
If a class fruit has object mango, the relationship is expressed as :
Correct Answer
Fruit mango
Your Answer
Fruit mango
True/False
Question
The hardware allows privileged instructions to be executed in only user mode.
Correct Answer
False
Your Answer
False
Multiple Choice Multiple Answer
Question
An object type in windows NT is a system defined data type that has two things associated with it, which are they?
Correct Answer
Set of attributes , Set of methods
Your Answer
Set of attributes , Set of methods
Select The Blank
Question
The kernel module that controls a device is a ________ .
Correct Answer
Device driver
Your Answer
Device driver
Multiple Choice Single Answer
Question
If process P and Q want to communicate, they must send messages to and receive messages from each other: Thus link established between two process is known as :-
Correct Answer
Communication link
Your Answer
Direct link
Multiple Choice Multiple Answer
Question
Dispatcher functions involves the following :-
Correct Answer
Switching context , Switching to user mode
Your Answer
Switching context , Switching to user mode
Select The Blank
Question
In windows NT, the ________ facility is used to pass requests and results between client and server processes within a single machine.
Correct Answer
Local-procedure-call
Your Answer
Local-procedure-call
True/False
Question
If some of the pages are shared with other process, the pages in memory and on the disk can only be released when the last process using them has terminated.
Correct Answer
True
Your Answer
True
Select The Blank
Question
The Solaris developers reimplemented the ________ using in-kernel thread to eliminate the context switch involved in moving each character between daemons and the kernel.
Correct Answer
Telnet daemon
Your Answer
Context-switch daemon
Multiple Choice Single Answer
Question
Modern operating systems are :-
Correct Answer
Interrupt driven
Your Answer
Interrupt driven
Match The Following
Question
Correct Answer
Your Answer
Bounded-buffer
Fixed size buffer
Fixed size buffer
Producer
Produces process
Produces process
Consumer
Consumes process
Consumes process
Unbounded-buffer
No limit on size of buffer
No limit on size of buffer
Multiple Choice Multiple Answer
Question
In Linux, the paging system can be divided into sections, namely:-
Correct Answer
Policy algorithm , Paging mechanism
Your Answer
Policy algorithm , Paging mechanism
Multiple Choice Single Answer
Question
A process data section contains:-
Correct Answer
Global variables
Your Answer
Temporary data
True/False
Question
OOSAD approach is applicable only to stable systems.
Correct Answer
False
Your Answer
False
True/False
Question
Segment length may change during execution.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :-
Correct Answer
Explicit , Implicit
Your Answer
Explicit , Implicit
Multiple Choice Single Answer
Question
Collection of similar datatypes is called as
Correct Answer
Array
Your Answer
Array
True/False
Question
At Human level, user must be screened carefully so that the chance of authorizing a user who then gives access to an intruder is reduced.
Correct Answer
True
Your Answer
True
True/False
Question
The user process issues a network I/O system call to send the character to the remote machine.
Correct Answer
True
Your Answer
False
Multiple Choice Multiple Answer
Question
Most computers have hardware clocks and timers that provide three basic functions, such as :-
Correct Answer
Give the current time , Give the elapsed time , Set a timer to trigger operation at certain time
Your Answer
Give the current time , Give the elapsed time , Set a timer to trigger operation at certain time
Multiple Choice Single Answer
Question
C++ is basically a procedural language having extension of
Correct Answer
Object Oriented technology
Your Answer
Object Oriented technology
Multiple Choice Multiple Answer
Question
Various storage systems available possesses which two characteristics?
Correct Answer
Volatile , Non-volatile
Your Answer
Volatile , Non-volatile
Multiple Choice Multiple Answer
Question
Most CPUs have two interrupt request lines. Which are they?
Correct Answer
Maskable , Non maskable
Your Answer
Maskable , Non maskable
Select The Blank
Question
A ________ is a group of NT server machines that share a common security policy and user databases.
Correct Answer
Domain
Your Answer
Domain
Select The Blank
Question
An ________ is a dedicated, special purpose CPU found in mainframes and in other high-end systems.
Correct Answer
I/O channel
Your Answer
I/O channel
Multiple Choice Single Answer
Question
The CPU is allocated to the selected process by the :-
Correct Answer
Dispatcher
Your Answer
Dispatcher
Multiple Choice Single Answer
Question
In JAVA , the derived class is known as
Correct Answer
Subclass
Your Answer
Subclass
Select The Blank
Question
The Pentium supports four protection levels with ________ as least privileged level.
Correct Answer
3
Your Answer
3
Select The Blank
Question
________ of an object remains unchanged even though its state and properties change.
Correct Answer
Identity
Your Answer
Identity
True/False
Question
One way to achieve portability is to write software in standard version of high level language and to develop portable system and application software .
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
Software may trigger an interrupt by executing a special operation called :-
Correct Answer
System call
Your Answer
System call
Multiple Choice Single Answer
Question
In Object Oriented technology following expression is appropriate
Correct Answer
object=data+menthods
Your Answer
object=data+menthods
Multiple Choice Multiple Answer
Question
The two versions of NT are :
Correct Answer
WindowsNT workstations , WindowsNT server
Your Answer
WindowsNT workstations , WindowsNT server
Match The Following
Question
Correct Answer
Your Answer
We can define abstract operation on abstract data
Data abstraction
Data abstraction
Process of sharing properties of the higher level object or class
Inheritance
Inheritance
Ability to inherit attributes and methods from 2 or more objects or classes
Multiple inheritance
Multiple inheritance
Ability to send a message to several objects and to allow receiving object to respond method specified on the object.
Ploymorphism
Ploymorphism
Select The Blank
Question
A________ is a memory area that stores data while they are transferred between two devices or between a device and an application.
Correct Answer
Buffer
Your Answer
Buffer
True/False
Question
In Public Key Encryption, each user has both a public and a private key.
Correct Answer
True
Your Answer
True
True/False
Question
Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention.
Correct Answer
False
Your Answer
False
Multiple Choice Multiple Answer
Question
Liner address is divided into fields like :-
Correct Answer
Dir , Page , Offset
Your Answer
Dir , Page , Offset
Multiple Choice Single Answer
Question
IPC is particularly useful in a :-
Correct Answer
Distributed environment
Your Answer
Internet environment
Multiple Choice Single Answer
Question
IPC provides a mechanism to allow processes to communicate and to synchronize their actions without sharing the same :-
Correct Answer
Address space
Your Answer
Semaphore
Multiple Choice Multiple Answer
Question
Supervisor mode is also known as :-
Correct Answer
Privileged mode , Monitor mode , System mode
Your Answer
System mode , Privileged mode , Monitor mode
Select The Blank
Question
Assuming that the segment is in memory and the offset is in range, the Pentium then adds the ________ bit base field in the descriptor to the offset to form linear address.
Correct Answer
32
Your Answer
32
Multiple Choice Multiple Answer
Question
In Solaris 2, user-level threads may be:-
Correct Answer
Bound , Unbound
Your Answer
Bound , Unbound
Multiple Choice Single Answer
Question
The concept of OOPS was first introduced in
Correct Answer
Simula Language
Your Answer
Simula Language
True/False
Question
At system boot time, the hardware starts in monitor mode.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
The main difference between structure and class is
Correct Answer
Structure does not support OOPS Class Supports OOPS.
Your Answer
Structure does not support OOPS Class Supports OOPS.
Select The Blank
Question
A ________ controller is built into each disk drive.
Correct Answer
Disk
Your Answer
Disk
Multiple Choice Single Answer
Question
If a class fruit has object mango, the relationship is expressed as :
Correct Answer
Fruit mango
Your Answer
Fruit mango
True/False
Question
The hardware allows privileged instructions to be executed in only user mode.
Correct Answer
False
Your Answer
False
Multiple Choice Multiple Answer
Question
An object type in windows NT is a system defined data type that has two things associated with it, which are they?
Correct Answer
Set of attributes , Set of methods
Your Answer
Set of attributes , Set of methods
Select The Blank
Question
The kernel module that controls a device is a ________ .
Correct Answer
Device driver
Your Answer
Device driver
Multiple Choice Single Answer
Question
If process P and Q want to communicate, they must send messages to and receive messages from each other: Thus link established between two process is known as :-
Correct Answer
Communication link
Your Answer
Direct link
Multiple Choice Multiple Answer
Question
Dispatcher functions involves the following :-
Correct Answer
Switching context , Switching to user mode
Your Answer
Switching context , Switching to user mode
Select The Blank
Question
In windows NT, the ________ facility is used to pass requests and results between client and server processes within a single machine.
Correct Answer
Local-procedure-call
Your Answer
Local-procedure-call
True/False
Question
If some of the pages are shared with other process, the pages in memory and on the disk can only be released when the last process using them has terminated.
Correct Answer
True
Your Answer
True
Select The Blank
Question
The Solaris developers reimplemented the ________ using in-kernel thread to eliminate the context switch involved in moving each character between daemons and the kernel.
Correct Answer
Telnet daemon
Your Answer
Context-switch daemon
Multiple Choice Single Answer
Question
Modern operating systems are :-
Correct Answer
Interrupt driven
Your Answer
Interrupt driven
Match The Following
Question
Correct Answer
Your Answer
Bounded-buffer
Fixed size buffer
Fixed size buffer
Producer
Produces process
Produces process
Consumer
Consumes process
Consumes process
Unbounded-buffer
No limit on size of buffer
No limit on size of buffer
Multiple Choice Multiple Answer
Question
In Linux, the paging system can be divided into sections, namely:-
Correct Answer
Policy algorithm , Paging mechanism
Your Answer
Policy algorithm , Paging mechanism
Multiple Choice Single Answer
Question
A process data section contains:-
Correct Answer
Global variables
Your Answer
Temporary data
True/False
Question
OOSAD approach is applicable only to stable systems.
Correct Answer
False
Your Answer
False
True/False
Question
Segment length may change during execution.
Correct Answer
True
Your Answer
True
Multiple Choice Multiple Answer
Question
The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :-
Correct Answer
Explicit , Implicit
Your Answer
Explicit , Implicit
Multiple Choice Single Answer
Question
Collection of similar datatypes is called as
Correct Answer
Array
Your Answer
Array
True/False
Question
At Human level, user must be screened carefully so that the chance of authorizing a user who then gives access to an intruder is reduced.
Correct Answer
True
Your Answer
True
True/False
Question
The user process issues a network I/O system call to send the character to the remote machine.
Correct Answer
True
Your Answer
False
Multiple Choice Multiple Answer
Question
Most computers have hardware clocks and timers that provide three basic functions, such as :-
Correct Answer
Give the current time , Give the elapsed time , Set a timer to trigger operation at certain time
Your Answer
Give the current time , Give the elapsed time , Set a timer to trigger operation at certain time
Multiple Choice Single Answer
Question
C++ is basically a procedural language having extension of
Correct Answer
Object Oriented technology
Your Answer
Object Oriented technology
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.