Search Assignments and Papers Here...


Custom Search

Wednesday, August 20, 2008

Operating System - 12

LIST OF ATTEMPTED QUESTIONS AND ANSWERS

Multiple Choice Multiple Answer
Question
Kernel threads are generally :-
Correct Answer
Slower to create , Difficult to manage
Your Answer
Slower to create , Difficult to manage

Select The Blank
Question
If the user-supplied password matches the password stored in the system, the system assumes that the user is ________.
Correct Answer
Legitimate
Your Answer
Legitimate

Multiple Choice Single Answer
Question
In general , the access matrix will be :-
Correct Answer
Sparse
Your Answer
Sparse

True/False
Question
Encryption is one common method of protecting information that is transmitted over unreliable links.
Correct Answer
True
Your Answer
False

Select The Blank
Question
A ________ is a full duplex connection between a device driver and a user-level process.
Correct Answer
Stream
Your Answer
Stream

Multiple Choice Single Answer
Question
In how many number of classes does the NRU algorithm divides pages, depending on the state of R and M?
Correct Answer
4
Your Answer
8

Select The Blank
Question
The Pentium page size is fixed at ________ KB.
Correct Answer
4
Your Answer
4

True/False
Question
Volatile storage loses its contents when the power to the device is removed.
Correct Answer
True
Your Answer
True

Multiple Choice Multiple Answer
Question
The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :-
Correct Answer
Explicit , Implicit
Your Answer
Explicit , Implicit

Select The Blank
Question
In queuing diagram, the arrow indicates the flow of ________ in the system.
Correct Answer
Processes
Your Answer
Processes

Multiple Choice Multiple Answer
Question
What are the forms of malicious access?
Correct Answer
Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data
Your Answer
Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data

Select The Blank
Question
A bit called the ________ , is added to the hardware of the computer to indicate the current mode.
Correct Answer
Mode bit
Your Answer
Mode bit

Multiple Choice Multiple Answer
Question
In Windows NT , kernel uses which two sets of objects?
Correct Answer
Dispatcher objects , Control objects
Your Answer
Dispatcher objects , Complex objects

Multiple Choice Single Answer
Question
The smallest addressable portion of a disk is :-
Correct Answer
Sector
Your Answer
Sector

True/False
Question
In FIFO algorithm the page removed from memory is the one which most recently used.
Correct Answer
False
Your Answer
False

Select The Blank
Question
A process is ________, if it cannot affect or be affected by the other processes executing in the system.
Correct Answer
Independent
Your Answer
Independent

Multiple Choice Multiple Answer
Question
Linux presents standard interfaces to whom?
Correct Answer
Programmer , User
Your Answer
Programmer , User , System administrator

Select The Blank
Question
The kernel module that controls a device is a ________ .
Correct Answer
Device driver
Your Answer
Device daemon

True/False
Question
Whenever a trap or interrupt occurs, the hardware switches from user mode to monitor mode.
Correct Answer
True
Your Answer
True

Select The Blank
Question
A ________ is a computer or router that sits between the trusted and untrusted systems.
Correct Answer
Firewall
Your Answer
Firewall

Multiple Choice Multiple Answer
Question
Find out the basic I/O hardware elements from the following :-
Correct Answer
Ports , Buses , Device controllers
Your Answer
Ports , Buses , Device controllers

True/False
Question
Object-oriented programming focuses on the integrated data and functionality as discrete units that have both knowledge (data) and capabilities (functions). Procedural programs, on the other hand, focus on functions and how they act on data.
Correct Answer
True
Your Answer
True

Match The Following
Question
Correct Answer
Your Answer
User mode
Mode bit 1
Mode bit 1
Serial port
Modem
Monitor mode
Parallel port
Printer
Printer
Privileged instructions
Monitor mode
Mode bit 0

True/False
Question
In segmentation the total address space can exceed the size of physical memory.
Correct Answer
True
Your Answer
False

Multiple Choice Single Answer
Question
Because of the concept of independent objects responding to messages, object orientation is a natural way to implement
Correct Answer
Event driven programming
Your Answer
Message deiven programming

Multiple Choice Single Answer
Question
In UNIX, everything below the system-call interface and above the physical hardware is the :-
Correct Answer
Kernel
Your Answer
I/O system

Multiple Choice Multiple Answer
Question
Different multithreading models available are :-
Correct Answer
Many-to-one model , One-to-one model , Many-to-many model
Your Answer
Many-to-one model , One-to-one model , Many-to-many model

Multiple Choice Multiple Answer
Question
An object type in windows NT is a system defined data type that has two things associated with it, which are they?
Correct Answer
Set of attributes , Set of methods
Your Answer
Object-type , Object-processing

Multiple Choice Multiple Answer
Question
When memory reference occurs in MULTICS the things which takes place are :-
Correct Answer
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address
Your Answer
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined

Multiple Choice Single Answer
Question
The interval from the time of submission of a process to the time of completion is :-
Correct Answer
Turnaround time
Your Answer
Turnaround time

True/False
Question
Context switch times are highly dependent on hardware support.
Correct Answer
True
Your Answer
True

True/False
Question
Procedure and data can be distinguished and separately protected in segmentation
Correct Answer
True
Your Answer
True

Multiple Choice Multiple Answer
Question
Dispatcher functions involves the following :-
Correct Answer
Switching context , Switching to user mode
Your Answer
Switching context , Switching to user mode

Multiple Choice Single Answer
Question
The First version of UNIX was developed in 1969 by Ken Thompson of the Research Group at :-
Correct Answer
Bell Laboratories
Your Answer
Bell Laboratories

Multiple Choice Single Answer
Question
In Object Oriented technology following expression is appropriate
Correct Answer
object=data+menthods
Your Answer
object=data+menthods

Multiple Choice Single Answer
Question
A procedure body implementing an operation is termed as
Correct Answer
Method
Your Answer
Method

Select The Blank
Question
During execution, ________ register holds the sector for the code segment.
Correct Answer
CS
Your Answer
PS

True/False
Question
In some operating system, spooling is managed by a system daemon process.
Correct Answer
True
Your Answer
False

Select The Blank
Question
Each column in the access matrix can be implemented as an ________ for one object.
Correct Answer
Access list
Your Answer
Capability list

Multiple Choice Single Answer
Question
Policies for resource use may vary depending on the :-
Correct Answer
Application
Your Answer
System

Multiple Choice Multiple Answer
Question
A mailbox can be owned by :-
Correct Answer
Process , Operating system
Your Answer
User , Process , Program

Multiple Choice Single Answer
Question
The ready queue is generally stored as a :-
Correct Answer
Linked list
Your Answer
Queue

Select The Blank
Question
A ________ is region of fast memory that hold copies of data .
Correct Answer
Cache
Your Answer
Cache

Multiple Choice Multiple Answer
Question
What are the components to memory management under Linux?
Correct Answer
Physical memory manager , Virtual memory manager
Your Answer
Physical memory manager , Virtual memory manager

Match The Following
Question
Correct Answer
Your Answer
Bounded-buffer
Fixed size buffer
Fixed size buffer
Producer
Produces process
Produces process
Consumer
Consumes process
Consumes process
Unbounded-buffer
No limit on size of buffer
No limit on size of buffer

True/False
Question
The inode contains 15 pointers to the disk blocks containing the data contents of the file.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
When computer is powered up or rebooted, it needs to have an initial program to run. This initial program is known as :-
Correct Answer
Bootstrap program
Your Answer
Bootstrap program

0 Comments:

An Appeal to SCDL students

Dear SCDL Student,

We at http://scdlpapers.blogspot.com tries to collect and spread the knowledge in terms of the solved papers and assignments which we are getting through SCDL Alumni.
Now we request you to help other students through mutual sharing. Please send your assignment questions/papers to "mindgrill@gmail.com" . We will publish them on this blog along with your name.
Your help can be boon for many students to clear their exams.

Best of Luck and waiting for your contributions.

Team @ MindGrill
 

Interview Preparation | Placement Papers