LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Select The Blank
Question
Like worms, ________ are designed to spread into other programs and can wreak havoc in a system.
Correct Answer
Viruses
Your Answer
Viruses
Multiple Choice Multiple Answer
Question
The advantage of dynamic loading is
Correct Answer
Unused routine is never loaded , Useful when large amount of code are needed to handle infrequently occurring cases, such as error routines , It does not require special support from the operating system
Your Answer
Useful when large amount of code are needed to handle infrequently occurring cases, such as error routines , It does not require special support from the operating system , Unused routine is never loaded
Select The Blank
Question
Terminals and line printers are ________ .
Correct Answer
Character devices
Your Answer
Socket interfaces
Multiple Choice Multiple Answer
Question
A mailbox can be owned by :-
Correct Answer
Process , Operating system
Your Answer
Process , Operating system
Select The Blank
Question
A process is ________, if it cannot affect or be affected by the other processes executing in the system.
Correct Answer
Independent
Your Answer
Cooperating
True/False
Question
NFU is crude attempt to approximate LRU.
Correct Answer
True
Your Answer
False
True/False
Question
A copy of inode is kept in main memory while a file is open.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
The class bird should have object
Correct Answer
Egale
Your Answer
Egale
Multiple Choice Multiple Answer
Question
User thread libraries include :-
Correct Answer
POSIX Pthreads , Mach C-threads , Solaris threads
Your Answer
Mach C-threads , Solaris threads
True/False
Question
We can include dynamic protection in the access-matrix model by considering the domains and the access matrix itself as objects.
Correct Answer
True
Your Answer
True
True/False
Question
The capability list is associated with a domain.
Correct Answer
True
Your Answer
True
Select The Blank
Question
A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote.
Correct Answer
Redirector
Your Answer
Redirector
Select The Blank
Question
The ________ is a compromise between access lists and capability lists.
Correct Answer
Lock-Key Schemes
Your Answer
Protected procedures
Match The Following
Question
Correct Answer
Your Answer
Bit showing the availability of page in memory for which that entry belongs to
Present / absent bit
Modified bit
In page table entry, the access permitted are stored in
Protection bit
Protection bit
Bit is set when the page is referenced
Referenced bit
Referenced bit
Bit which keeps track of page usage
Modified bit
Security bit
Multiple Choice Single Answer
Question
In UNIX, files are organized in tree-structured :-
Correct Answer
Directories
Your Answer
Directories
Match The Following
Question
Correct Answer
Your Answer
We can define abstract operation on abstract data
Data abstraction
Data abstraction
Process of sharing properties of the higher level object or class
Inheritance
Inheritance
Ability to inherit attributes and methods from 2 or more objects or classes
Multiple inheritance
Multiple inheritance
Ability to send a message to several objects and to allow receiving object to respond method specified on the object.
Ploymorphism
Ploymorphism
Select The Blank
Question
The Solaris developers reimplemented the ________ using in-kernel thread to eliminate the context switch involved in moving each character between daemons and the kernel.
Correct Answer
Telnet daemon
Your Answer
Context-switch daemon
Multiple Choice Single Answer
Question
If the process is waiting for some event to occur then it is said to be in :-
Correct Answer
Waiting state
Your Answer
Ready state
True/False
Question
Cache is a non-volatile storage system.
Correct Answer
False
Your Answer
False
Multiple Choice Single Answer
Question
The wraping up of data and methods in a single unit (class) is known as :
Correct Answer
Encapsulation
Your Answer
Encapsulation
True/False
Question
A process is a victim of starvation if it becomes stuck in a scheduling queue indefinitely.
Correct Answer
True
Your Answer
True
Select The Blank
Question
________ file access can be layered on top of block-device drivers.
Correct Answer
Memory-mapped
Your Answer
Memory-mapped
Multiple Choice Multiple Answer
Question
find out the services provided by kernel related to I/O :
Correct Answer
I/O Scheduling , Buffering , Spooling
Your Answer
I/O Scheduling , Buffering , Spooling
Multiple Choice Multiple Answer
Question
The role of the operating system in computer I/O is to :-
Correct Answer
Manage I/O operation and devices , Control I/O operation and devices
Your Answer
Manage I/O operation and devices , Control I/O operation and devices
True/False
Question
In Lock-key mechanism, a process executing in a domain can access an object if that domain has a key that matches one of the locks of the objects.
Correct Answer
True
Your Answer
False
Multiple Choice Multiple Answer
Question
There are components to the module support under Linux, identify them :-
Correct Answer
Module management , Driver registration , Conflict-resolution mechanism
Your Answer
Module management , Driver registration , Conflict-resolution mechanism
Multiple Choice Single Answer
Question
The 4.3BSD operating system is the version of :-
Correct Answer
UNIX
Your Answer
UNIX
Select The Blank
Question
Each entry in the access matrix consists of a set of ________ .
Correct Answer
Access right
Your Answer
Access right
Multiple Choice Single Answer
Question
In UNIX, a file is represented by an :-
Correct Answer
Inode
Your Answer
Block
Multiple Choice Single Answer
Question
The segment is :-
Correct Answer
Logical entity
Your Answer
Logical entity
True/False
Question
In Windows NT, each process has one or more threads, which are the units of execution dispatched by the kernel.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
UNIX operating system is written mostly in :-
Correct Answer
C language
Your Answer
C++ language
Multiple Choice Multiple Answer
Question
Security violations of the system can be categorized as :-
Correct Answer
Malicious , Accidental
Your Answer
Malicious , Authorized
Multiple Choice Single Answer
Question
The smallest addressable portion of a disk is :-
Correct Answer
Sector
Your Answer
Sector
Select The Blank
Question
Associations are generally ________.
Correct Answer
Bidirectional
Your Answer
Bidirectional
Multiple Choice Multiple Answer
Question
Find out the human-interface devices :-
Correct Answer
Screen , Keyboard , Mouse
Your Answer
Screen , Keyboard , Mouse
Select The Blank
Question
________allows us to define abstract operations on abstract data.
Correct Answer
Data abstraction
Your Answer
Data abstraction
Multiple Choice Multiple Answer
Question
Once the I/O is started , which two courses of action are possible?
Correct Answer
Synchronous I/O , Asynchronous I/O , Simple I/O
Your Answer
Synchronous I/O , Asynchronous I/O , Simple I/O
Multiple Choice Multiple Answer
Question
In windows NT, naming of objects is of two types :-
Correct Answer
Permanent name , Temporary name
Your Answer
Permanent name , Temporary name
True/False
Question
Turnaround time is inversely proportional to throughput.
Correct Answer
True
Your Answer
True
Select The Blank
Question
The hardware to measure elapsed time to trigger operations is called a ________.
Correct Answer
Programmable interval timer
Your Answer
Programmable elapsed timer
Multiple Choice Multiple Answer
Question
User level threads are generally :-
Correct Answer
Fast to create , Easy to manage
Your Answer
Fast to create , Easy to manage
Multiple Choice Single Answer
Question
In MULTICS TLB address of 'n', the most recently referenced pages are kept, where 'n' can have a value :-
Correct Answer
16
Your Answer
16
Multiple Choice Single Answer
Question
C++ is also named as
Correct Answer
C with classes
Your Answer
C with classes
Multiple Choice Multiple Answer
Question
Liner address is divided into fields like :-
Correct Answer
Dir , Page , Offset
Your Answer
Dir , Page , Offset
Multiple Choice Single Answer
Question
DVMA stands for :-
Correct Answer
Direct Virtual Memory Access
Your Answer
Direct Virtual Memory Access
True/False
Question
An asynchronous call returns immediately, without waiting for the I/O to complete.
Correct Answer
True
Your Answer
True
Welcome to the Symbiosis Center for Distance Learning(SCDL) blog. This blog is for the students of SCDL who are doing post graduate diplomas in management from Symbiosis Center for Distance Learning SCDL Pune. Here they can get solved assignments and exam related information. It contains assignments for PGDBA PGDBFS PGDHRM PGDP&HRM PGDIB PGDEXIM, PGDBCL PGDCRMPGDSCM PGDRM, PGDDS PGDIT PGDPM PGDEM PGDTWBM PGDIBM PGDEA PGDID PGDSC PGDPTT PGPAM PGDJMC PGDPC PGCBA PGPF PGCHM PGCDT PGCFMA etc
Wednesday, August 20, 2008
Subscribe to:
Post Comments (Atom)
Search Assignments and Papers Here...
Custom Search
An Appeal to SCDL students
Dear SCDL Student,
We at http://scdlpapers.blogspot.com tries to collect and spread the knowledge in terms of the solved papers and assignments which we are getting through SCDL Alumni.
Now we request you to help other students through mutual sharing. Please send your assignment questions/papers to "mindgrill@gmail.com" . We will publish them on this blog along with your name.
Your help can be boon for many students to clear their exams.
Best of Luck and waiting for your contributions.
Team @ MindGrill
We at http://scdlpapers.blogspot.com tries to collect and spread the knowledge in terms of the solved papers and assignments which we are getting through SCDL Alumni.
Now we request you to help other students through mutual sharing. Please send your assignment questions/papers to "mindgrill@gmail.com" . We will publish them on this blog along with your name.
Your help can be boon for many students to clear their exams.
Best of Luck and waiting for your contributions.
Team @ MindGrill
No comments:
Post a Comment