Tuesday, May 27, 2008

Operating System - 2

LIST OF ATTEMPTED QUESTIONS AND ANSWERS

Multiple Choice Multiple Answer
Question
locate the transmission devices :-
Correct Answer
Network cards , Modems
Your Answer
Tapes , Network cards , Modems

True/False
Question
The user process issues a network I/O system call to send the character to the remote machine.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
The process by which objects of one class acquire properties of objects of other class is called
Correct Answer
Inheritance
Your Answer
Inheritance

True/False
Question
Windows NT uses a message passing implementation for I/O.
Correct Answer
True
Your Answer
True

Multiple Choice Multiple Answer
Question
We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes?
Correct Answer
User mode , Monitor mode
Your Answer
User mode , Monitor mode

Match The Following
Question
Correct Answer
Your Answer
Round-robin
Time quantum
Time quantum
First-come First-served
First come job
First come job
Shortest job
Shortest job
Shortest job
Priority
Highest priority job
Highest priority job

Multiple Choice Single Answer
Question
The segment is :-
Correct Answer
Logical entity
Your Answer
Logical entity

Multiple Choice Single Answer
Question
In UNIX, decisions regarding which process to swap in or out are made by whom?
Correct Answer
Swapper
Your Answer
Memory handler

Select The Blank
Question
A ________ is a client-server mechanism that enables an application on one machine to make a procedure call to code on another machine.
Correct Answer
Remote-procedure-call
Your Answer
Remote-procedure-call

Multiple Choice Single Answer
Question
When each process that wants to communicate must explicitly name the recipient or sender of the communication, then such communication is called as :-
Correct Answer
Direct communication
Your Answer
Indirect communication

Select The Blank
Question
In Linux, the allocator uses a ________ algorithm to keep track of available physical pages.
Correct Answer
Buddy-heap
Your Answer
Binary-search

Multiple Choice Single Answer
Question
What does the rows of the access matrix represents?
Correct Answer
Domains
Your Answer
Domains

Multiple Choice Single Answer
Question
Every change in policy requires a change in the underlying :-
Correct Answer
Mechanism
Your Answer
System

Select The Blank
Question
A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote.
Correct Answer
Redirector
Your Answer
Domain

Multiple Choice Multiple Answer
Question
In Solaris 2, user-level threads may be:-
Correct Answer
Bound , Unbound
Your Answer
Bound , Unbound

Multiple Choice Multiple Answer
Question
An audit log records which things about an object ?
Correct Answer
Time , User , Type of access
Your Answer
Time , User , Type of access

Multiple Choice Multiple Answer
Question
One-to-one model is supported by following systems :-
Correct Answer
Windows NT , OS/2
Your Answer
OS/2 , Windows NT

Multiple Choice Multiple Answer
Question
To protect the system, we must take security measures at two levels, such as :-
Correct Answer
Physical level , Human level
Your Answer
Human level , Global level

Multiple Choice Single Answer
Question
If the process is waiting for some event to occur then it is said to be in :-
Correct Answer
Waiting state
Your Answer
Waiting state

Multiple Choice Single Answer
Question
A common representation for a discussion of process scheduling is a :-
Correct Answer
Queuing diagram
Your Answer
Process state diagram

True/False
Question
At Physical level, the site or sites containing the computer systems must be physically secured against armed or surreptitious entry by intruders.
Correct Answer
True
Your Answer
True

Select The Blank
Question
When you express user-system interaction, the scenario in the model is called ________
Correct Answer
Case model
Your Answer
Case model

True/False
Question
Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention.
Correct Answer
False
Your Answer
True

True/False
Question
A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .
Correct Answer
False
Your Answer
False

Multiple Choice Single Answer
Question
Polymorphism means ability to take
Correct Answer
More than one form
Your Answer
More than one form

True/False
Question
Aging algorithm is based on LRU.
Correct Answer
True
Your Answer
True

Select The Blank
Question
The virtual memory portion of the NT executive is the ________.
Correct Answer
Virtual memory manager
Your Answer
Virtual memory manager

Multiple Choice Multiple Answer
Question
There are two types of Message passing, they are :-
Correct Answer
Synchronous , Asynchronous
Your Answer
Synchronous , Asynchronous

Select The Blank
Question
Web servers use the ________ protocol to communicate with web browsers.
Correct Answer
http
Your Answer
http

Multiple Choice Multiple Answer
Question
The security of a system can be improved by two management techniques, such as :-
Correct Answer
Threat monitoring , Audit Log
Your Answer
Audit Log , Threat finding

Select The Blank
Question
The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________.
Correct Answer
Ring
Your Answer
Ring

True/False
Question
We say that a system is secure if its resources are used and accessed as intended under all circumstances.
Correct Answer
True
Your Answer
True

Select The Blank
Question
The ________ controller is the controller at the computer end of the bus.
Correct Answer
Host
Your Answer
Cpu

Multiple Choice Multiple Answer
Question
In Linux, the paging system can be divided into sections, namely:-
Correct Answer
Policy algorithm , Paging mechanism
Your Answer
Policy algorithm , Paging mechanism

True/False
Question
Keyboard is a sharable device.
Correct Answer
True
Your Answer
False

True/False
Question
Transfer of data from disk to memory is usually controlled by the operating system.
Correct Answer
True
Your Answer
True

True/False
Question
Prototyping not only helps to build a quality design but also enables the designer to build the system decremantally.
Correct Answer
False
Your Answer
True

Select The Blank
Question
The UNIX system uses ________ to avoid the necessity of keeping its password list secret.
Correct Answer
Encryption
Your Answer
Encryption

Match The Following
Question
Correct Answer
Your Answer
Read-write devices
Disks
Disks
Dedicated devices
Tape
CD-ROM
Read-only devices
CD-ROM
Tape
Write-only devices
Graphics controller
Keyboard

Multiple Choice Single Answer
Question
A procedure call, request to execute a method is termed as
Correct Answer
Message
Your Answer
Message

Select The Blank
Question
Context switch times are highly dependent on ________ support.
Correct Answer
Hardware
Your Answer
Hardware

Multiple Choice Multiple Answer
Question
Two main jobs of a computer are :-
Correct Answer
I/O , Processing
Your Answer
I/O , Processing

Multiple Choice Single Answer
Question
The 4.3BSD operating system is the version of :-
Correct Answer
UNIX
Your Answer
UNIX

Multiple Choice Single Answer
Question
The number of processes that are completed per time unit is called as:-
Correct Answer
Throughput of system
Your Answer
Throughput of system

Multiple Choice Multiple Answer
Question
Once the I/O is started , which two courses of action are possible?
Correct Answer
Synchronous I/O , Asynchronous I/O , Simple I/O
Your Answer
Synchronous I/O , Asynchronous I/O

Multiple Choice Multiple Answer
Question
Security violations of the system can be categorized as :-
Correct Answer
Malicious , Accidental
Your Answer
Malicious , Accidental

Select The Blank
Question
A process migrates between the various ________ throughout its lifetime.
Correct Answer
Scheduling queues
Your Answer
Scheduling queues

No comments:

Search Assignments and Papers Here...


Custom Search

An Appeal to SCDL students

Dear SCDL Student,

We at http://scdlpapers.blogspot.com tries to collect and spread the knowledge in terms of the solved papers and assignments which we are getting through SCDL Alumni.
Now we request you to help other students through mutual sharing. Please send your assignment questions/papers to "mindgrill@gmail.com" . We will publish them on this blog along with your name.
Your help can be boon for many students to clear their exams.

Best of Luck and waiting for your contributions.

Team @ MindGrill