Search Assignments and Papers Here...


Custom Search

Wednesday, August 20, 2008

Operating System - 10

LIST OF ATTEMPTED QUESTIONS AND ANSWERS

Select The Blank
Question
Web servers use the ________ protocol to communicate with web browsers.
Correct Answer
http
Your Answer
http

True/False
Question
Cache-coherency is usually a software problem and handled above the operating system level.
Correct Answer
False
Your Answer
True

Multiple Choice Multiple Answer
Question
Two main jobs of a computer are :-
Correct Answer
I/O , Processing
Your Answer
I/O , Processing

Multiple Choice Multiple Answer
Question
What are the ways in which a request for kernel-mode execution can occur in Linux?
Correct Answer
Explicitly , Implicitly
Your Answer
Explicitly , Implicitly

Select The Blank
Question
If the user-supplied password matches the password stored in the system, the system assumes that the user is ________.
Correct Answer
Legitimate
Your Answer
Legitimate

True/False
Question
Single-indirect block is an index block which contains data of the files to which it points.
Correct Answer
False
Your Answer
True

True/False
Question
Volatile storage loses its contents when the power to the device is removed.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
SCSI stands for :-
Correct Answer
Small Computer-Systems Interface
Your Answer
System Call-System Interrupt

Multiple Choice Multiple Answer
Question
Which are the Division D security systems ?
Correct Answer
Windows 3.1 , MS-DOS
Your Answer
Windows NT , UNIX

Select The Blank
Question
static binding allows to hold certain properties fixed and rigid, whereas ________ binding allows object to behave as per conditions emerge.
Correct Answer
Dynamic
Your Answer
Dynamic

Multiple Choice Multiple Answer
Question
What are the components to memory management under Linux?
Correct Answer
Physical memory manager , Virtual memory manager
Your Answer
Physical memory manager , Virtual memory manager

Multiple Choice Single Answer
Question
The First version of UNIX was developed in 1969 by Ken Thompson of the Research Group at :-
Correct Answer
Bell Laboratories
Your Answer
Bell Laboratories

True/False
Question
XML is a meta data language developed to specify data with a goal of improving interoperatability of different data sources.
Correct Answer
True
Your Answer
True

True/False
Question
One way to achieve portability is to write software in standard version of high level language and to develop portable system and application software .
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
C++ is basically a procedural language having extension of
Correct Answer
Object Oriented technology
Your Answer
Object Oriented technology

Select The Blank
Question
The ________ of a process is represented in the PCB of a process.
Correct Answer
Context
Your Answer
Context

Select The Blank
Question
In windows NT, the ________ facility is used to pass requests and results between client and server processes within a single machine.
Correct Answer
Local-procedure-call
Your Answer
Remote-procedure-call

Multiple Choice Single Answer
Question
In how many number of classes does the NRU algorithm divides pages, depending on the state of R and M?
Correct Answer
4
Your Answer
4

Multiple Choice Multiple Answer
Question
When memory reference occurs in MULTICS the things which takes place are :-
Correct Answer
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address
Your Answer
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address

Multiple Choice Multiple Answer
Question
Supervisor mode is also known as :-
Correct Answer
System mode , Privileged mode , Monitor mode
Your Answer
System mode , Privileged mode , Monitor mode

Multiple Choice Single Answer
Question
How big is a class object?
Correct Answer
Is as big as sum of the sizes of its member variables
Your Answer
Is as big as sum of the sizes of its member variables

Multiple Choice Multiple Answer
Question
The device number consists of which two parts in UNIX?
Correct Answer
Major device number , Minor device number
Your Answer
Major device number , Minor device number

Select The Blank
Question
The context switch time is pure ________, because system does no useful work while switching.
Correct Answer
Overhead
Your Answer
Wastage

Multiple Choice Multiple Answer
Question
In Solaris 2, user-level threads may be:-
Correct Answer
Bound , Unbound
Your Answer
Bound , Unbound

Match The Following
Question
Correct Answer
Your Answer
Random-access devices
CD-ROM
CD-ROM
Character devices.
Terminal
Keyboard
Block devices
Disk
Tape
Sequential devices
Modem
Terminal

Multiple Choice Single Answer
Question
The main difference between structure and class is
Correct Answer
Structure does not support OOPS Class Supports OOPS.
Your Answer
Structure does not support OOPS Class Supports OOPS.

True/False
Question
Object-oriented programming focuses on the integrated data and functionality as discrete units that have both knowledge (data) and capabilities (functions). Procedural programs, on the other hand, focus on functions and how they act on data.
Correct Answer
True
Your Answer
True

Select The Blank
Question
A keyboard is an example of device that is accessed through a ________ interface.
Correct Answer
Character stream
Your Answer
Character stream

Multiple Choice Multiple Answer
Question
Find out the CPU scheduling algorithms from these options :-
Correct Answer
FCFS , RR , SJF
Your Answer
FCFS , RR , SJF

Multiple Choice Single Answer
Question
Main Memory of computer program is also called as :-
Correct Answer
RAM
Your Answer
RAM

Multiple Choice Multiple Answer
Question
The security of a system can be improved by two management techniques, such as :-
Correct Answer
Threat monitoring , Audit Log
Your Answer
Threat monitoring , Audit Log

Multiple Choice Single Answer
Question
The separation of policy and mechanism is important for which purpose?
Correct Answer
Flexibility
Your Answer
Flexibility

Match The Following
Question
Correct Answer
Your Answer
Trap in which program tries to use unmapped page
Page fault
Page fault
Memory Management Unit
MMU
MMU
Smaller units in which virtual address space is divided
Pages
Pages
Units in physical memory corresponding to pages in virtual memory
Page frame
Page frame

True/False
Question
A non-blocking call does not halt the execution of the application for an extended time.
Correct Answer
True
Your Answer
True

True/False
Question
Windows NT uses a message passing implementation for I/O.
Correct Answer
True
Your Answer
True

Multiple Choice Multiple Answer
Question
Kernel threads are generally :-
Correct Answer
Slower to create , Difficult to manage
Your Answer
Slower to create , Difficult to manage

Multiple Choice Single Answer
Question
The long-term scheduler controls the :-
Correct Answer
Degree of multiprogramming
Your Answer
Degree of multiprogramming

Multiple Choice Single Answer
Question
Objects may communicate with each other through
Correct Answer
Methods
Your Answer
Methods

Select The Blank
Question
In queuing diagram, the arrow indicates the flow of ________ in the system.
Correct Answer
Processes
Your Answer
Queue

Multiple Choice Single Answer
Question
If Dog derives from Mammal, and Mammal derives from Animal, then -
Correct Answer
Dog inherits Animal's functions and data
Your Answer
Dog inherits Animal's functions and data

Multiple Choice Single Answer
Question
Thread at user level is known as :-
Correct Answer
User thread
Your Answer
User thread

Select The Blank
Question
________ includes disks and tapes.
Correct Answer
Block devices
Your Answer
Block devices

Multiple Choice Single Answer
Question
DMA stands for :-
Correct Answer
Direct Memory Access
Your Answer
Direct Memory Access

True/False
Question
When application issues a blocking I/O system call, the request is placed on the queue for that device.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
The concept of OOPS was first introduced in
Correct Answer
Simula Language
Your Answer
Simula Language

True/False
Question
Encryption is one common method of protecting information that is transmitted over unreliable links.
Correct Answer
True
Your Answer
True

Select The Blank
Question
________ describes segments local to each program, including its code, data, stack etc.
Correct Answer
LDT
Your Answer
LDT

0 Comments:

An Appeal to SCDL students

Dear SCDL Student,

We at http://scdlpapers.blogspot.com tries to collect and spread the knowledge in terms of the solved papers and assignments which we are getting through SCDL Alumni.
Now we request you to help other students through mutual sharing. Please send your assignment questions/papers to "mindgrill@gmail.com" . We will publish them on this blog along with your name.
Your help can be boon for many students to clear their exams.

Best of Luck and waiting for your contributions.

Team @ MindGrill
 

Interview Preparation | Placement Papers