Tuesday, May 27, 2008

Operating System - 3

LIST OF ATTEMPTED QUESTIONS AND ANSWERS

True/False
Question
Firewall monitors and logs all connections.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
Which of the following Operating System has no memory protection ?
Correct Answer
Windows 3.1
Your Answer
Windows 3.1

Multiple Choice Single Answer
Question
The main difference between structure and class is
Correct Answer
Structure does not support OOPS Class Supports OOPS.
Your Answer
Structure does not support OOPS Class Supports OOPS.

Multiple Choice Single Answer
Question
DMA stands for :-
Correct Answer
Direct Memory Access
Your Answer
Direct Memory Access

Multiple Choice Single Answer
Question
A major problem with the Priority scheduling algorithm is :-
Correct Answer
Starvation
Your Answer
Starvation

Multiple Choice Single Answer
Question
How big is a class object?
Correct Answer
Is as big as sum of the sizes of its member variables
Your Answer
Is as big as sum of the sizes of its member variables

Multiple Choice Single Answer
Question
The First version of UNIX was developed in 1969 by Ken Thompson of the Research Group at :-
Correct Answer
Bell Laboratories
Your Answer
Bell Laboratories

Multiple Choice Single Answer
Question
When computer is powered up or rebooted, it needs to have an initial program to run. This initial program is known as :-
Correct Answer
Bootstrap program
Your Answer
Bootstrap program

True/False
Question
Processes represents the executions of single programs whereas threads represent separate, concurrent execution contexts within a single process running a single program.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
If Dog derives from Mammal, and Mammal derives from Animal, then -
Correct Answer
Dog inherits Animal's functions and data
Your Answer
Dog inherits Animal's functions and data

Multiple Choice Single Answer
Question
The wraping up of data and methods in a single unit (class) is known as :
Correct Answer
Encapsulation
Your Answer
Encapsulation

True/False
Question
LRU algorithm can not be implemented without special hardware.
Correct Answer
True
Your Answer
False

Select The Blank
Question
The Solaris developers reimplemented the ________ using in-kernel thread to eliminate the context switch involved in moving each character between daemons and the kernel.
Correct Answer
Telnet daemon
Your Answer
Telnet daemon

Multiple Choice Single Answer
Question
All user processes are descendents of one original process, Which is that process?
Correct Answer
Init process
Your Answer
Init process

Select The Blank
Question
Terminals and line printers are ________ .
Correct Answer
Character devices
Your Answer
Character devices

Multiple Choice Multiple Answer
Question
Many-to-may model is supported by following operating systems :-
Correct Answer
Solaris , IRIX , Digital UNIX
Your Answer
Solaris , IRIX , Digital UNIX

Multiple Choice Multiple Answer
Question
find out the services provided by kernel related to I/O :
Correct Answer
I/O Scheduling , Buffering , Spooling
Your Answer
I/O Scheduling , Buffering , Spooling

Multiple Choice Single Answer
Question
The long-term scheduler controls the :-
Correct Answer
Degree of multiprogramming
Your Answer
Degree of multiprogramming

Select The Blank
Question
The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________.
Correct Answer
Ring
Your Answer
Ring

Multiple Choice Multiple Answer
Question
In Linux, the main objects defined by the virtual file system are :-
Correct Answer
Inode-object , File-object , File-system object
Your Answer
Inode-object , File-object , File-system object

Multiple Choice Single Answer
Question
Collection of similar datatypes is called as
Correct Answer
Array
Your Answer
Array

Multiple Choice Multiple Answer
Question
We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes?
Correct Answer
User mode , Monitor mode
Your Answer
User mode , Monitor mode

Match The Following
Question
Correct Answer
Your Answer
Class Shape
Triangle, rectangle, circle, ellipse
Triangle, rectangle, circle, ellipse
Class Vehicle
Scooter, car, truck, tractor
Scooter, car, truck, tractor
Class Animal
Cat, dog, cow, tiger
Cat, dog, cow, tiger
Class Color
Red, yellow, blue, green
Red, yellow, blue, green

Select The Blank
Question
The virtual memory portion of the NT executive is the ________.
Correct Answer
Virtual memory manager
Your Answer
Virtual memory manager

True/False
Question
An asynchronous call returns immediately, without waiting for the I/O to complete.
Correct Answer
True
Your Answer
True

True/False
Question
Modem is a random-access device.
Correct Answer
False
Your Answer
False

Multiple Choice Multiple Answer
Question
A mailbox can be owned by :-
Correct Answer
Process , Operating system
Your Answer
Process , Operating system

Multiple Choice Multiple Answer
Question
The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :-
Correct Answer
Explicit , Implicit
Your Answer
Explicit , Implicit

Select The Blank
Question
In windows NT, the ________ facility is used to pass requests and results between client and server processes within a single machine.
Correct Answer
Local-procedure-call
Your Answer
Remote-procedure-call

True/False
Question
A major security problem for operating system is authentication.
Correct Answer
True
Your Answer
True

True/False
Question
In a blocking system call, the application is moved from the OS's run queue to a wait queue.
Correct Answer
True
Your Answer
True

True/False
Question
Device speeds range from a few bytes per second to a few gigabytes per second.
Correct Answer
True
Your Answer
True

Multiple Choice Multiple Answer
Question
Various storage systems available possesses which two characteristics?
Correct Answer
Volatile , Non-volatile
Your Answer
Volatile , Non-volatile

Match The Following
Question
Correct Answer
Your Answer
We can define abstract operation on abstract data
Data abstraction
Data abstraction
Process of sharing properties of the higher level object or class
Inheritance
Inheritance
Ability to inherit attributes and methods from 2 or more objects or classes
Multiple inheritance
Multiple inheritance
Ability to send a message to several objects and to allow receiving object to respond method specified on the object.
Ploymorphism
Ploymorphism

Multiple Choice Single Answer
Question
As process enter the system, they are put into :-
Correct Answer
Job queue
Your Answer
Job queue

Multiple Choice Multiple Answer
Question
The role of the operating system in computer I/O is to :-
Correct Answer
Manage I/O operation and devices , Control I/O operation and devices
Your Answer
Manage I/O operation and devices , Control I/O operation and devices

Select The Blank
Question
The ________ is a layer of software that hides hardware differences from upper levels of the operating system.
Correct Answer
Hardware abstraction layer
Your Answer
Hardware abstraction layer

Select The Blank
Question
A ________ is a computer or router that sits between the trusted and untrusted systems.
Correct Answer
Firewall
Your Answer
Firewall

Multiple Choice Multiple Answer
Question
The Moriss Internet Worm was made up of which of the two programs?
Correct Answer
Grappling hook program , Main program
Your Answer
Grappling hook program , Main program

Multiple Choice Multiple Answer
Question
In UNIX, a device is distinguished by two things, which are :-
Correct Answer
Device-class , Device number
Your Answer
Device-class , Device number

Multiple Choice Single Answer
Question
In general , the access matrix will be :-
Correct Answer
Sparse
Your Answer
Sparse

True/False
Question
Applications normally access block devices through a file system interface.
Correct Answer
True
Your Answer
True

Multiple Choice Multiple Answer
Question
User thread libraries include :-
Correct Answer
POSIX Pthreads , Mach C-threads , Solaris threads
Your Answer
POSIX Pthreads , Mach C-threads , Solaris threads

Select The Blank
Question
The positioning time sometimes called the ________.
Correct Answer
Random-access time
Your Answer
Random-access time

Multiple Choice Single Answer
Question
The concept of OOPS was first introduced in
Correct Answer
Simula Language
Your Answer
Simula Language

Select The Blank
Question
________ passwords prevent improper authentication due to password exposure.
Correct Answer
One-time
Your Answer
One-time

Multiple Choice Single Answer
Question
The linking of procedure call to the code to be executed in response to that call is referred as
Correct Answer
Binding
Your Answer
Binding

Search Assignments and Papers Here...


Custom Search

An Appeal to SCDL students

Dear SCDL Student,

We at http://scdlpapers.blogspot.com tries to collect and spread the knowledge in terms of the solved papers and assignments which we are getting through SCDL Alumni.
Now we request you to help other students through mutual sharing. Please send your assignment questions/papers to "mindgrill@gmail.com" . We will publish them on this blog along with your name.
Your help can be boon for many students to clear their exams.

Best of Luck and waiting for your contributions.

Team @ MindGrill