LIST OF ATTEMPTED QUESTIONS AND ANSWERS True/False Question Firewall monitors and logs all connections. Correct Answer True Your Answer True Multiple Choice Single Answer Question Which of the following Operating System has no memory protection ? Correct Answer Windows 3.1 Your Answer Windows 3.1 Multiple Choice Single Answer Question The main difference between structure and class is Correct Answer Structure does not support OOPS Class Supports OOPS. Your Answer Structure does not support OOPS Class Supports OOPS.

The First version of UNIX was developed in 1969 by Ken Thompson of the Research Group at :Correct Answer Bell Laboratories Your Answer Bell Laboratories Multiple Choice Single Answer Question When computer is powered up or rebooted, it needs to have an initial program to run. This initial program is known as :Correct Answer Bootstrap program Your Answer Bootstrap program True/False Question Processes represents the executions of single programs whereas threads represent separate, concurrent execution contexts within a single process running a single program. Correct Answer True Your Answer True

Multiple Choice Single Answer Question DMA stands for :Correct Answer Direct Memory Access Your Answer Direct Memory Access

Multiple Choice Single Answer Question If Dog derives from Mammal, and Mammal derives from Animal, then Correct Answer Dog inherits Animal's functions and data Your Answer Dog inherits Animal's functions and data

Multiple Choice Single Answer Question A major problem with the Priority scheduling algorithm is :Correct Answer Starvation Your Answer Starvation

Multiple Choice Single Answer Question The wraping up of data and methods in a single unit (class) is known as : Correct Answer Encapsulation Your Answer Encapsulation

Multiple Choice Single Answer Question How big is a class object? Correct Answer Is as big as sum of the sizes of its member variables Your Answer Is as big as sum of the sizes of its member variables

True/False Question LRU algorithm can not be implemented without special hardware. Correct Answer True Your Answer False

Multiple Choice Single Answer Question

Select The Blank

Operating System | 1

Question The Solaris developers reimplemented the ________ using in-kernel thread to eliminate the context switch involved in moving each character between daemons and the kernel. Correct Answer Telnet daemon Your Answer Telnet daemon Multiple Choice Single Answer Question All user processes are descendents of one original process, Which is that process? Correct Answer Init process Your Answer Init process Select The Blank Question Terminals and line printers are ________ . Correct Answer Character devices Your Answer Character devices Multiple Choice Multiple Answer Question Many-to-may model is supported by following operating systems :Correct Answer Solaris , IRIX , Digital UNIX Your Answer Solaris , IRIX , Digital UNIX Multiple Choice Multiple Answer Question find out the services provided by kernel related to I/O : Correct Answer I/O Scheduling , Buffering , Spooling Your Answer I/O Scheduling , Buffering , Spooling Multiple Choice Single Answer Question The long-term scheduler controls the :Correct Answer Degree of multiprogramming Your Answer Degree of multiprogramming Select The Blank Question The concept of protection levels and call gates were

pioneered in MULTICS, where they were viewed as protection ________. Correct Answer Ring Your Answer Ring Multiple Choice Multiple Answer Question In Linux, the main objects defined by the virtual file system are :Correct Answer Inode-object , File-object , File-system object Your Answer Inode-object , File-object , File-system object Multiple Choice Single Answer Question Collection of similar datatypes is called as Correct Answer Array Your Answer Array Multiple Choice Multiple Answer Question We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes? Correct Answer User mode , Monitor mode Your Answer User mode , Monitor mode Match The Following Question Correct Answer Your Answer Class Shape Triangle, rectangle, circle, ellipse Triangle, rectangle, circle, ellipse Class Vehicle Scooter, car, truck, tractor Scooter, car, truck, tractor Class Animal Cat, dog, cow, tiger Cat, dog, cow, tiger Class Color Red, yellow, blue, green Red, yellow, blue, green Select The Blank Question The virtual memory portion of the NT executive is the ________.

Operating System | 2

Correct Answer Virtual memory manager Your Answer Virtual memory manager True/False Question An asynchronous call returns immediately, without waiting for the I/O to complete. Correct Answer True Your Answer True True/False Question Modem is a random-access device. Correct Answer False Your Answer False Multiple Choice Multiple Answer Question A mailbox can be owned by :Correct Answer Process , Operating system Your Answer Process , Operating system Multiple Choice Multiple Answer Question The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :Correct Answer Explicit , Implicit Your Answer Explicit , Implicit Select The Blank Question In windows NT, the ________ facility is used to pass requests and results between client and server processes within a single machine. Correct Answer Local-procedure-call Your Answer Remote-procedure-call True/False Question A major security problem for operating system is authentication. Correct Answer

True Your Answer True True/False Question In a blocking system call, the application is moved from the OS's run queue to a wait queue. Correct Answer True Your Answer True True/False Question Device speeds range from a few bytes per second to a few gigabytes per second. Correct Answer True Your Answer True Multiple Choice Multiple Answer Question Various storage systems available possesses which two characteristics? Correct Answer Volatile , Non-volatile Your Answer Volatile , Non-volatile Match The Following Question Correct Answer Your Answer We can define abstract operation on abstract data Data abstraction Data abstraction Process of sharing properties of the higher level object or class Inheritance Inheritance Ability to inherit attributes and methods from 2 or more objects or classes Multiple inheritance Multiple inheritance Ability to send a message to several objects and to allow receiving object to respond method specified on the object. Ploymorphism Ploymorphism Multiple Choice Single Answer Question As process enter the system, they are put into :Correct Answer

Operating System | 3

Job queue Your Answer Job queue

Sparse Your Answer Sparse

Multiple Choice Multiple Answer Question The role of the operating system in computer I/O is to :Correct Answer Manage I/O operation and devices , Control I/O operation and devices Your Answer Manage I/O operation and devices , Control I/O operation and devices

True/False Question Applications normally access block devices through a file system interface. Correct Answer True Your Answer True

Select The Blank Question The ________ is a layer of software that hides hardware differences from upper levels of the operating system. Correct Answer Hardware abstraction layer Your Answer Hardware abstraction layer Select The Blank Question A ________ is a computer or router that sits between the trusted and untrusted systems. Correct Answer Firewall Your Answer Firewall Multiple Choice Multiple Answer Question The Moriss Internet Worm was made up of which of the two programs? Correct Answer Grappling hook program , Main program Your Answer Grappling hook program , Main program Multiple Choice Multiple Answer Question In UNIX, a device is distinguished by two things, which are :Correct Answer Device-class , Device number Your Answer Device-class , Device number Multiple Choice Single Answer Question In general , the access matrix will be :Correct Answer

Multiple Choice Multiple Answer Question User thread libraries include :Correct Answer POSIX Pthreads , Mach C-threads , Solaris threads Your Answer POSIX Pthreads , Mach C-threads , Solaris threads Select The Blank Question The positioning time sometimes called the ________. Correct Answer Random-access time Your Answer Random-access time Multiple Choice Single Answer Question The concept of OOPS was first introduced in Correct Answer Simula Language Your Answer Simula Language Select The Blank Question ________ passwords prevent improper authentication due to password exposure. Correct Answer One-time Your Answer One-time Multiple Choice Single Answer Question The linking of procedure call to the code to be executed in response to that call is referred as Correct Answer Binding Your Answer Binding

Operating System | 4

LIST OF ATTEMPTED QUESTIONS AND ANSWERS Multiple Choice Multiple Answer Question locate the transmission devices :Correct Answer Network cards , Modems Your Answer Tapes , Network cards , Modems True/False Question The user process issues a network I/O system call to send the character to the remote machine. Correct Answer True Your Answer True Multiple Choice Single Answer Question The process by which objects of one class acquire properties of objects of other class is called Correct Answer Inheritance Your Answer Inheritance

Multiple Choice Single Answer Question The segment is :Correct Answer Logical entity Your Answer Logical entity Multiple Choice Single Answer Question In UNIX, decisions regarding which process to swap in or out are made by whom? Correct Answer Swapper Your Answer Memory handler Select The Blank Question A ________ is a client-server mechanism that enables an application on one machine to make a procedure call to code on another machine. Correct Answer Remote-procedure-call Your Answer Remote-procedure-call

True/False Question Windows NT uses a message passing implementation for I/O. Correct Answer True Your Answer True

Multiple Choice Single Answer Question When each process that wants to communicate must explicitly name the recipient or sender of the communication, then such communication is called as :Correct Answer Direct communication Your Answer Indirect communication

Multiple Choice Multiple Answer Question We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes? Correct Answer User mode , Monitor mode Your Answer User mode , Monitor mode

Select The Blank Question In Linux, the allocator uses a ________ algorithm to keep track of available physical pages. Correct Answer Buddy-heap Your Answer Binary-search

Match The Following Question Correct Answer Your Answer Round-robin Time quantum Time quantum First-come First-served First come job First come job Shortest job Shortest job Shortest job Priority Highest priority job Highest priority job

Multiple Choice Single Answer Question What does the rows of the access matrix represents? Correct Answer Domains Your Answer Domains Multiple Choice Single Answer Question Every change in policy requires a change in the underlying :Correct Answer Mechanism Your Answer System

Operating System | 5

Select The Blank Question A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote. Correct Answer Redirector Your Answer Domain Multiple Choice Multiple Answer Question In Solaris 2, user-level threads may be:Correct Answer Bound , Unbound Your Answer Bound , Unbound

against armed or surreptitious entry by intruders. Correct Answer True Your Answer True Select The Blank Question When you express user-system interaction, the scenario in the model is called ________ Correct Answer Case model Your Answer Case model

Multiple Choice Multiple Answer Question An audit log records which things about an object ? Correct Answer Time , User , Type of access Your Answer Time , User , Type of access

True/False Question Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention. Correct Answer False Your Answer True

Multiple Choice Multiple Answer Question One-to-one model is supported by following systems :Correct Answer Windows NT , OS/2 Your Answer OS/2 , Windows NT

True/False Question A file in NTFS is a simple byte stream as it is in MSDOS or UNIX . Correct Answer False Your Answer False

Multiple Choice Multiple Answer Question To protect the system, we must take security measures at two levels, such as :Correct Answer Physical level , Human level Your Answer Human level , Global level

Multiple Choice Single Answer Question Polymorphism means ability to take Correct Answer More than one form Your Answer More than one form

Multiple Choice Single Answer Question If the process is waiting for some event to occur then it is said to be in :Correct Answer Waiting state Your Answer Waiting state Multiple Choice Single Answer Question A common representation for a discussion of process scheduling is a :Correct Answer Queuing diagram Your Answer Process state diagram True/False Question At Physical level, the site or sites containing the computer systems must be physically secured

True/False Question Aging algorithm is based on LRU. Correct Answer True Your Answer True Select The Blank Question The virtual memory portion of the NT executive is the ________. Correct Answer Virtual memory manager Your Answer Virtual memory manager Multiple Choice Multiple Answer Question There are two types of Message passing, they are :Correct Answer Synchronous , Asynchronous Your Answer Operating System | 6

Synchronous , Asynchronous Select The Blank Question Web servers use the ________ protocol to communicate with web browsers. Correct Answer http Your Answer http Multiple Choice Multiple Answer Question The security of a system can be improved by two management techniques, such as :Correct Answer Threat monitoring , Audit Log Your Answer Audit Log , Threat finding Select The Blank Question The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________. Correct Answer Ring Your Answer Ring True/False Question We say that a system is secure if its resources are used and accessed as intended under all circumstances. Correct Answer True Your Answer True Select The Blank Question The ________ controller is the controller at the computer end of the bus. Correct Answer Host Your Answer Cpu Multiple Choice Multiple Answer Question In Linux, the paging system can be divided into sections, namely:Correct Answer Policy algorithm , Paging mechanism Your Answer Policy algorithm , Paging mechanism True/False Question Keyboard is a sharable device. Correct Answer True Your Answer False

True/False Question Transfer of data from disk to memory is usually controlled by the operating system. Correct Answer True Your Answer True True/False Question Prototyping not only helps to build a quality design but also enables the designer to build the system decremantally. Correct Answer False Your Answer True Select The Blank Question The UNIX system uses ________ to avoid the necessity of keeping its password list secret. Correct Answer Encryption Your Answer Encryption Match The Following Question Correct Answer Your Answer Read-write devices Disks Disks Dedicated devices Tape CD-ROM Read-only devices CD-ROM Tape Write-only devices Graphics controller Keyboard Multiple Choice Single Answer Question A procedure call, request to execute a method is termed as Correct Answer Message Your Answer Message Select The Blank Question Context switch times are highly dependent on ________ support. Correct Answer Hardware Your Answer Hardware Multiple Choice Multiple Answer

Operating System | 7

Question Two main jobs of a computer are :Correct Answer I/O , Processing Your Answer I/O , Processing Multiple Choice Single Answer Question The 4.3BSD operating system is the version of :Correct Answer UNIX Your Answer UNIX Multiple Choice Single Answer Question The number of processes that are completed per time unit is called as:Correct Answer Throughput of system Your Answer Throughput of system Multiple Choice Multiple Answer Question Once the I/O is started , which two courses of action are possible? Correct Answer Synchronous I/O , Asynchronous I/O , Simple I/O Your Answer Synchronous I/O , Asynchronous I/O Multiple Choice Multiple Answer Question Security violations of the system can be categorized as :Correct Answer Malicious , Accidental Your Answer Malicious , Accidental Select The Blank Question A process migrates between the various ________ throughout its lifetime. Correct Answer Scheduling queues Your Answer Scheduling queues

Operating System - 5 LIST OF ATTEMPTED QUESTIONS AND ANSWERS Select The Blank Question static binding allows to hold certain properties fixed and rigid, whereas ________ binding allows object to behave as per conditions emerge. Correct Answer Dynamic Your Answer Dynamic

Multiple Choice Single Answer Question DVMA stands for :Correct Answer Direct Virtual Memory Access Your Answer Direct Virtual Memory Access True/False Question Since caches have limited size, cache management is an important design problem. Correct Answer True Your Answer True Multiple Choice Single Answer Question C++ is basically a procedural language having extension of Correct Answer Object Oriented technology Your Answer Object Oriented technology Multiple Choice Single Answer Question The system call checks the arguments given by the application, builds a data structure to convey the arguments to the kernel and then executes a special instruction called as :Correct Answer Software interrupt Your Answer Software interrupt Multiple Choice Single Answer Question A system consists of collection of :Correct Answer Processes Your Answer Processes Select The Blank Question A________ is a memory area that stores data while they are transferred between two devices or between a device and an application. Correct Answer Buffer Your Answer Buffer Multiple Choice Multiple Answer Question Find out the human-interface devices :Correct Answer Screen , Keyboard , Mouse Your Answer Screen , Keyboard , Mouse Multiple Choice Single Answer

Operating System | 8

Question A procedure body implementing an operation is termed as Correct Answer Method Your Answer Method

Switching the cpu to another process requires saving the state of the old process and loading the saved state for the new process. Correct Answer True Your Answer True

Select The Blank Question The designer of a program or system might leave a hole, or ________ , in the software that only he is capable of using. Correct Answer Trap door Your Answer Trap door

Multiple Choice Single Answer Question The process by which objects of one class acquire properties of objects of other class is called Correct Answer Inheritance Your Answer Inheritance

True/False Question The principle of polymorphism helps to extend and modify the system scope through appropriate messaging mechanism. Correct Answer True Your Answer True Multiple Choice Multiple Answer Question The Linux system is composed of three main bodies of code, in line with most traditional UNIX implementations. Which are :Correct Answer Kernel , System libraries , System utilities Your Answer Kernel , System libraries , System utilities Select The Blank Question Web servers use the ________ protocol to communicate with web browsers. Correct Answer http Your Answer http Multiple Choice Single Answer Question The pure Object Oriented language is Correct Answer Java Your Answer Java Multiple Choice Multiple Answer Question User level threads are generally :Correct Answer Fast to create , Easy to manage Your Answer Fast to create , Easy to manage True/False Question

Multiple Choice Single Answer Question In Object Oriented technology following expression is appropriate Correct Answer object=data+menthods Your Answer object=data+menthods True/False Question A copy of inode is kept in main memory while a file is open. Correct Answer True Your Answer True Multiple Choice Multiple Answer Question The advantage of dynamic loading is Correct Answer Unused routine is never loaded , Useful when large amount of code are needed to handle infrequently occurring cases, such as error routines , It does not require special support from the operating system Your Answer It does not require special support from the operating system , Unused routine is never loaded , Useful when large amount of code are needed to handle infrequently occurring cases, such as error routines Select The Blank Question OOSAD begins with identification of actors, what activities they perform and building ________ model for the function. Correct Answer Use-case Your Answer Use-case Multiple Choice Single Answer Question If a class fruit has object mango, the relationship is expressed as : Correct Answer Operating System | 9

Fruit mango Your Answer Fruit mango Multiple Choice Single Answer Question The class bird should have object Correct Answer Egale Your Answer Egale Select The Blank Question The ________ controller is the controller at the computer end of the bus. Correct Answer Host Your Answer Host

If paging is enabled, the liner address is interpreted as virtual address and mapped to the physical address using ________ table. Correct Answer Page Your Answer Page Multiple Choice Multiple Answer Question What are the forms of malicious access? Correct Answer Unauthorized destruction of data , Unauthorized reading of data , Unauthorized modification of data Your Answer Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data

Multiple Choice Single Answer Question The insulation of data from direct access by the program is known as : Correct Answer Data hiding Your Answer Data hiding

Multiple Choice Multiple Answer Question What are the components to memory management under Linux? Correct Answer Physical memory manager , Virtual memory manager Your Answer Physical memory manager , Virtual memory manager

Multiple Choice Multiple Answer Question Liner address is divided into fields like :Correct Answer Dir , Page , Offset Your Answer Dir , Page , Offset

Multiple Choice Single Answer Question IPC is particularly useful in a :Correct Answer Distributed environment Your Answer Distributed environment

Multiple Choice Single Answer Question Every change in policy requires a change in the underlying :Correct Answer Mechanism Your Answer Mechanism

Select The Blank Question Context switch times are highly dependent on ________ support. Correct Answer Hardware Your Answer Hardware

Multiple Choice Single Answer Question UNIX operating system is written mostly in :Correct Answer C language Your Answer C language

Multiple Choice Multiple Answer Question kernel threads are supported by following operating systems :Correct Answer Windows NT , Solaris , Digital UNIX Your Answer Windows NT , Solaris , Digital UNIX

Multiple Choice Single Answer Question In UNIX, a file is represented by an :Correct Answer Inode Your Answer Inode Select The Blank Question

Select The Blank Question A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote. Correct Answer Redirector Your Answer Redirector

Operating System | 10

Multiple Choice Multiple Answer Question In a uniprocessor system, there is :Correct Answer Single processor , Single running process Your Answer Single processor , Single running process

Question When application issues a blocking I/O system call, the request is placed on the queue for that device. Correct Answer True Your Answer True

True/False Question The basic difference between SSAD life cycle models and OOSAD life cycle models is that one is evolutionary & iterative while the other is sequential in stages of analysis, design, coding, unit test, integrated test and system test. Correct Answer True Your Answer True

Select The Blank Question During execution, ________ register holds the sector for the data segment. Correct Answer DS Your Answer DS

Match The Following Question Correct Answer Your Answer Ready state Process waiting for cpu Process waiting for cpu New state Process created Process created Running state Executing process Executing process Waiting state Waiting process Waiting process Match The Following Question Correct Answer Your Answer Parent process Child process Child process Foreground processes Interactive processes Interactive processes Background processes Batch processes Batch processes Light-Weight processes Thread Thread Multiple Choice Single Answer Question In how many number of classes does the NRU algorithm divides pages, depending on the state of R and M? Correct Answer 4 Your Answer 4

True/False Question Banker's algorithm is a deadlock-avoidance algorithm. Correct Answer True Your Answer True Multiple Choice Single Answer Question Model of protection can be viewed abstractly as a matrix which is known as :Correct Answer Access matrix Your Answer Access matrix Multiple Choice Multiple Answer Question Kernel threads are generally :Correct Answer Slower to create , Difficult to manage Your Answer Slower to create , Difficult to manage Multiple Choice Multiple Answer Question One-to-one model is supported by following systems :Correct Answer Windows NT , OS/2 Your Answer Windows NT , OS/2

Operating System - 4 LIST OF ATTEMPTED QUESTIONS AND ANSWERS Multiple Choice Multiple Answer Question Kernel threads are generally :Correct Answer Slower to create , Difficult to manage Your Answer Slower to create , Difficult to manage

True/False

Operating System | 11

Select The Blank Question If the user-supplied password matches the password stored in the system, the system assumes that the user is ________. Correct Answer Legitimate Your Answer Legitimate Multiple Choice Single Answer Question In general , the access matrix will be :Correct Answer Sparse Your Answer Sparse True/False Question Encryption is one common method of protecting information that is transmitted over unreliable links. Correct Answer True Your Answer False Select The Blank Question A ________ is a full duplex connection between a device driver and a user-level process. Correct Answer Stream Your Answer Stream Multiple Choice Single Answer Question In how many number of classes does the NRU algorithm divides pages, depending on the state of R and M? Correct Answer 4 Your Answer 8 Select The Blank Question The Pentium page size is fixed at ________ KB. Correct Answer 4 Your Answer 4 True/False Question Volatile storage loses its contents when the power to the device is removed. Correct Answer True Your Answer True Multiple Choice Multiple Answer Question

The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :Correct Answer Explicit , Implicit Your Answer Explicit , Implicit Select The Blank Question In queuing diagram, the arrow indicates the flow of ________ in the system. Correct Answer Processes Your Answer Processes Multiple Choice Multiple Answer Question What are the forms of malicious access? Correct Answer Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data Your Answer Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data Select The Blank Question A bit called the ________ , is added to the hardware of the computer to indicate the current mode. Correct Answer Mode bit Your Answer Mode bit Multiple Choice Multiple Answer Question In Windows NT , kernel uses which two sets of objects? Correct Answer Dispatcher objects , Control objects Your Answer Dispatcher objects , Complex objects Multiple Choice Single Answer Question The smallest addressable portion of a disk is :Correct Answer Sector Your Answer Sector True/False Question In FIFO algorithm the page removed from memory is the one which most recently used. Correct Answer False Your Answer False

Operating System | 12

Select The Blank Question A process is ________, if it cannot affect or be affected by the other processes executing in the system. Correct Answer Independent Your Answer Independent Multiple Choice Multiple Answer Question Linux presents standard interfaces to whom? Correct Answer Programmer , User Your Answer Programmer , User , System administrator

Match The Following Question Correct Answer Your Answer User mode Mode bit 1 Mode bit 1 Serial port Modem Monitor mode Parallel port Printer Printer Privileged instructions Monitor mode Mode bit 0

Select The Blank Question The kernel module that controls a device is a ________ . Correct Answer Device driver Your Answer Device daemon

True/False Question In segmentation the total address space can exceed the size of physical memory. Correct Answer True Your Answer False

True/False Question Whenever a trap or interrupt occurs, the hardware switches from user mode to monitor mode. Correct Answer True Your Answer True

Multiple Choice Single Answer Question Because of the concept of independent objects responding to messages, object orientation is a natural way to implement Correct Answer Event driven programming Your Answer Message deiven programming

Select The Blank Question A ________ is a computer or router that sits between the trusted and untrusted systems. Correct Answer Firewall Your Answer Firewall Multiple Choice Multiple Answer Question Find out the basic I/O hardware elements from the following :Correct Answer Ports , Buses , Device controllers Your Answer Ports , Buses , Device controllers True/False Question Object-oriented programming focuses on the integrated data and functionality as discrete units that have both knowledge (data) and capabilities (functions). Procedural programs, on the other hand, focus on functions and how they act on data. Correct Answer True Your Answer True

Multiple Choice Single Answer Question In UNIX, everything below the system-call interface and above the physical hardware is the :Correct Answer Kernel Your Answer I/O system Multiple Choice Multiple Answer Question Different multithreading models available are :Correct Answer Many-to-one model , One-to-one model , Many-tomany model Your Answer Many-to-one model , One-to-one model , Many-tomany model Multiple Choice Multiple Answer Question An object type in windows NT is a system defined data type that has two things associated with it, which are they? Correct Answer Set of attributes , Set of methods Your Answer Object-type , Object-processing Operating System | 13

Multiple Choice Multiple Answer Question When memory reference occurs in MULTICS the things which takes place are :Correct Answer Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address Your Answer Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined Multiple Choice Single Answer Question The interval from the time of submission of a process to the time of completion is :Correct Answer Turnaround time Your Answer Turnaround time True/False Question Context switch times are highly dependent on hardware support. Correct Answer True Your Answer True True/False Question Procedure and data can be distinguished and separately protected in segmentation Correct Answer True Your Answer True Multiple Choice Multiple Answer Question Dispatcher functions involves the following :Correct Answer Switching context , Switching to user mode Your Answer Switching context , Switching to user mode Multiple Choice Single Answer Question The First version of UNIX was developed in 1969 by Ken Thompson of the Research Group at :Correct Answer Bell Laboratories Your Answer Bell Laboratories Multiple Choice Single Answer Question In Object Oriented technology following expression is appropriate

Correct Answer object=data+menthods Your Answer object=data+menthods Multiple Choice Single Answer Question A procedure body implementing an operation is termed as Correct Answer Method Your Answer Method Select The Blank Question During execution, ________ register holds the sector for the code segment. Correct Answer CS Your Answer PS True/False Question In some operating system, spooling is managed by a system daemon process. Correct Answer True Your Answer False Select The Blank Question Each column in the access matrix can be implemented as an ________ for one object. Correct Answer Access list Your Answer Capability list Multiple Choice Single Answer Question Policies for resource use may vary depending on the :Correct Answer Application Your Answer System Multiple Choice Multiple Answer Question A mailbox can be owned by :Correct Answer Process , Operating system Your Answer User , Process , Program Multiple Choice Single Answer Question The ready queue is generally stored as a :Correct Answer Linked list Your Answer Queue

Operating System | 14

Select The Blank Question A ________ is region of fast memory that hold copies of data . Correct Answer Cache Your Answer Cache Multiple Choice Multiple Answer Question What are the components to memory management under Linux? Correct Answer Physical memory manager , Virtual memory manager Your Answer Physical memory manager , Virtual memory manager Match The Following Question Correct Answer Your Answer Bounded-buffer Fixed size buffer Fixed size buffer Producer Produces process Produces process Consumer Consumes process Consumes process Unbounded-buffer No limit on size of buffer No limit on size of buffer True/False Question The inode contains 15 pointers to the disk blocks containing the data contents of the file. Correct Answer True Your Answer True Multiple Choice Single Answer Question When computer is powered up or rebooted, it needs to have an initial program to run. This initial program is known as :Correct Answer Bootstrap program Your Answer Bootstrap program LIST OF ATTEMPTED QUESTIONS AND ANSWERS True/False Question Prototyping is a tool to test the design of system Correct Answer True

Your Answer False Multiple Choice Multiple Answer Question Kernel threads are generally :Correct Answer Slower to create , Difficult to manage Your Answer Difficult to manage , Faster than user thread , Faster to create Multiple Choice Single Answer Question The concept of OOPS was first introduced in Correct Answer Simula Language Your Answer Simula Language Multiple Choice Single Answer Question The insulation of data from direct access by the program is known as : Correct Answer Data hiding Your Answer Abstraction True/False Question Many to Many model multiplexes many user level threads to a smaller or equal number of kernel threads. Correct Answer True Your Answer True Select The Blank Question Like worms, ________ are designed to spread into other programs and can wreak havoc in a system. Correct Answer Viruses Your Answer Viruses Multiple Choice Multiple Answer Question The two versions of NT are : Correct Answer WindowsNT workstations , WindowsNT server Your Answer WindowsNT workstations , WindowsNT server True/False Question A virus is a fragment of code embedded in a legitimate program Correct Answer True Your Answer False

Operating System | 15

True/False Question An I/O bound process spend more of its time doing I/O than it spends doing computations. Correct Answer True Your Answer True Multiple Choice Single Answer Question It has been said that Pascal and C programs are collections of procedures and C++ programs are collections of Correct Answer Classes Your Answer Classes

Maskable , Non maskable True/False Question The I/O scheduler rearranges the order of the queue to improve the overall system efficiency and the average response time experienced by application Correct Answer True Your Answer True Multiple Choice Single Answer Question How big is a class object? Correct Answer Is as big as sum of the sizes of its member variables Your Answer Is as big as sum of the sizes of its member variables

Multiple Choice Single Answer Question The process by which objects of one class acquire properties of objects of other class is called Correct Answer Inheritance Your Answer Inheritance

Multiple Choice Single Answer Question In UNIX, files are organized in tree-structured :Correct Answer Directories Your Answer Directories

Select The Blank Question A ________ is a buffer that holds output for a device such as printers. Correct Answer Spool Your Answer Spool

Multiple Choice Single Answer Question The number of processes that are completed per time unit is called as:Correct Answer Throughput of system Your Answer Throughput of system

Multiple Choice Single Answer Question C++ is basically a procedural language having extension of Correct Answer Object Oriented technology Your Answer Object Oriented technology

Multiple Choice Multiple Answer Question There are two types of Message passing, they are :Correct Answer Synchronous , Asynchronous Your Answer Synchronous , Asynchronous

True/False Question Object-oriented programming focuses on the integrated data and functionality as discrete units that have both knowledge (data) and capabilities (functions). Procedural programs, on the other hand, focus on functions and how they act on data. Correct Answer True Your Answer True Multiple Choice Multiple Answer Question Most CPUs have two interrupt request lines. Which are they? Correct Answer Maskable , Non maskable Your Answer

Multiple Choice Single Answer Question If Dog derives from Mammal, and Mammal derives from Animal, then Correct Answer Dog inherits Animal's functions and data Your Answer Dog inherits Animal's functions and data Select The Blank Question The positioning time sometimes called the ________. Correct Answer Random-access time Your Answer Seek time Multiple Choice Single Answer Question Collection of similar datatypes is called as

Operating System | 16

Correct Answer Array Your Answer Array Multiple Choice Single Answer Question The pure Object Oriented language is Correct Answer Java Your Answer Java Multiple Choice Multiple Answer Question To protect the system, we must take security measures at two levels, such as :Correct Answer Physical level , Human level Your Answer Local level , Global level Select The Blank Question In some operating system, spooling is handled by an ________ . Correct Answer In-kernel thread Your Answer User thread Multiple Choice Multiple Answer Question Supervisor mode is also known as :Correct Answer System mode , Privileged mode , Monitor mode Your Answer Privileged mode , Monitor mode , Special mode Match The Following Question Correct Answer Your Answer Thread Light-weight process Light-weight process Process PCB Thread library User thread Thread library PCB Kernel thread Operating system Operating system Select The Blank Question The ________ of a process is represented in the PCB of a process. Correct Answer Context Your Answer Control

Select The Blank Question ________ is defined as a cooperation between object codes produced by different software vendors & written in different programming languages. Correct Answer Interoperability Your Answer Interoperability Multiple Choice Multiple Answer Question In a uniprocessor system, there is :Correct Answer Single processor , Single running process Your Answer Single processor , Single running process Multiple Choice Single Answer Question In UNIX operating system, each process is identified by its :Correct Answer Process identifier Your Answer Process identifier Multiple Choice Single Answer Question As process enter the system, they are put into :Correct Answer Job queue Your Answer Job queue Match The Following Question Correct Answer Your Answer Algorithm where in it takes largest available hole Worst fit Worst fit The algorithm in which memory manager scans along the list of segments until it finds a hole that is big enough First fit First fit Algorithm in which keeps the track of suitable hole Next fit Optimal fit Algorithm which searches entire list and takes smallest hole that is adequate Best fit Best fit True/False Question Linux is a multi-user, multitasking system with a full set of UNIX-compatible tools. Correct Answer True Your Answer True Multiple Choice Single Answer

Operating System | 17

Question The main difference between structure and class is Correct Answer Structure does not support OOPS Class Supports OOPS. Your Answer Structure does not support OOPS Class Supports OOPS. Multiple Choice Multiple Answer Question Find out the basic I/O hardware elements from the following :Correct Answer Ports , Buses , Device controllers Your Answer Ports , Buses , Device controllers Multiple Choice Single Answer Question The interval from the time of submission of a process to the time of completion is :Correct Answer Turnaround time Your Answer Completion time True/False Question In Public Key Encryption, each user has both a public and a private key. Correct Answer True Your Answer False Multiple Choice Single Answer Question If the process is waiting to be assigned to CPU then it is said to be in :Correct Answer Ready state Your Answer Waiting state Select The Blank Question A ________ controller is built into each disk drive. Correct Answer Disk Your Answer Disk Multiple Choice Multiple Answer Question Linux presents standard interfaces to whom? Correct Answer Programmer , User Your Answer Programmer , User , System administrator True/False Question As an object-oriented systems NT uses objects for all its services and entities.

Correct Answer True Your Answer True Multiple Choice Single Answer Question A procedure body implementing an operation is termed as Correct Answer Method Your Answer Method True/False Question Main Memory is a volatile storage device that loses its contents when power is turned off. Correct Answer True Your Answer True Multiple Choice Multiple Answer Question Once the I/O is started , which two courses of action are possible? Correct Answer Synchronous I/O , Asynchronous I/O , Simple I/O Your Answer Waiting I/O , Simple I/O Select The Blank Question ________ passwords prevent improper authentication due to password exposure. Correct Answer One-time Your Answer Encrypted

Operating System - 8 LIST OF ATTEMPTED QUESTIONS AND ANSWERS Multiple Choice Single Answer Question Each object is associated with the data of type class with which they are created. A class is thus a collection of objects of Correct Answer Similar type Your Answer Similar type Multiple Choice Single Answer Question C++ is also named as Correct Answer C with classes Your Answer Visual C++ Select The Blank

Operating System | 18

Question The ________ of a process is represented in the PCB of a process. Correct Answer Context Your Answer Control Multiple Choice Multiple Answer Question In windows NT, naming of objects is of two types :Correct Answer Permanent name , Temporary name Your Answer Permanent name , Object-primary name Match The Following Question Correct Answer Your Answer Class Shape Triangle, rectangle, circle, ellipse Triangle, rectangle, circle, ellipse Class Vehicle Scooter, car, truck, tractor Scooter, car, truck, tractor Class Animal Cat, dog, cow, tiger Cat, dog, cow, tiger Class Color Red, yellow, blue, green Red, yellow, blue, green Multiple Choice Multiple Answer Question Computer system consists of :Correct Answer CPU , Multiple device controller Your Answer CPU , Multiple device controller Multiple Choice Single Answer Question In JAVA , the derived class is known as Correct Answer Subclass Your Answer Subclass Select The Blank Question To make as interval call, the CALL instruction must contain ________. Correct Answer Selector Your Answer Address True/False Question In Lock-key mechanism, users are allowed to examine or modify the list of keys or locks directly. Correct Answer False Your Answer

True Multiple Choice Single Answer Question A major problem with the Priority scheduling algorithm is :Correct Answer Starvation Your Answer CPU time Select The Blank Question ________ of an object remains unchanged even though its state and properties change. Correct Answer Identity Your Answer Identity Multiple Choice Single Answer Question The process by which objects of one class acquire properties of objects of other class is called Correct Answer Inheritance Your Answer Polymorphism Select The Blank Question ________allows us to define abstract operations on abstract data. Correct Answer Data abstraction Your Answer Data abstraction True/False Question An asynchronous call returns immediately, without waiting for the I/O to complete. Correct Answer True Your Answer True Multiple Choice Multiple Answer Question locate the storage devices from the following :Correct Answer Disks , Tapes Your Answer Disks , Tapes Multiple Choice Single Answer Question Mango, apple and orange are members of class Correct Answer Fruit Your Answer Fruit Multiple Choice Single Answer Question

Operating System | 19

The pure Object Oriented language is Correct Answer Java Your Answer C++ Select The Blank Question Web servers use the ________ protocol to communicate with web browsers. Correct Answer http Your Answer http Select The Blank Question ________ is the ability to handle error conditions, including the ability of the operating system to protect itself and its users from defective or malicious software. Correct Answer Reliability Your Answer Security Multiple Choice Multiple Answer Question One-to-one model is supported by following systems :Correct Answer Windows NT , OS/2 Your Answer Solaris , Windows NT Multiple Choice Single Answer Question Collection of similar datatypes is called as Correct Answer Array Your Answer Array Multiple Choice Single Answer Question C++ is basically a procedural language having extension of Correct Answer Object Oriented technology Your Answer Graphic user interface Multiple Choice Single Answer Question In Object Oriented technology following expression is appropriate Correct Answer object=data+menthods Your Answer method= data + object Multiple Choice Single Answer Question If a class fruit has object mango, the relationship is expressed as :

Correct Answer Fruit mango Your Answer Fruit mango Multiple Choice Multiple Answer Question Find out the basic I/O hardware elements from the following :Correct Answer Ports , Buses , Device controllers Your Answer Ports , Buses , Device controllers Multiple Choice Single Answer Question Model of protection can be viewed abstractly as a matrix which is known as :Correct Answer Access matrix Your Answer Access matrix Multiple Choice Single Answer Question The 4.3BSD operating system is the version of :Correct Answer UNIX Your Answer UNIX True/False Question When application issues a blocking I/O system call, the request is placed on the queue for that device. Correct Answer True Your Answer False Select The Blank Question ________ is defined as a cooperation between object codes produced by different software vendors & written in different programming languages. Correct Answer Interoperability Your Answer Interoperability True/False Question Linux is a multi-user, multitasking system with a full set of UNIX-compatible tools. Correct Answer True Your Answer True Multiple Choice Single Answer Question DMA stands for :Correct Answer Direct Memory Access Your Answer

Operating System | 20

Direct Memory Access Match The Following Question Correct Answer Your Answer Light-Weight processes Thread Solaris process Parent process Child process Unix process Foreground processes Interactive processes Interactive processes Background processes Batch processes Thread Multiple Choice Multiple Answer Question Find out the human-interface devices :Correct Answer Screen , Keyboard , Mouse Your Answer Screen , Keyboard , Mouse Select The Blank Question A process is ________ if it can affect or be affected by the other processes executing in the system. Correct Answer Cooperating Your Answer Independent Multiple Choice Multiple Answer Question Liner address is divided into fields like :Correct Answer Dir , Page , Offset Your Answer Dir , Page , File True/False Question An I/O bound process spend more of its time doing I/O than it spends doing computations. Correct Answer True Your Answer False Multiple Choice Single Answer Question In some systems, if a process terminates, then all its children must also be terminated. This phenomenon referred to as :Correct Answer Cascading termination Your Answer Removing all Multiple Choice Multiple Answer Question

find out the services provided by kernel related to I/O : Correct Answer I/O Scheduling , Buffering , Spooling Your Answer I/O Scheduling , Buffering , I/o subsystem True/False Question The language Classic-Ada is not OOPL Correct Answer False Your Answer True Select The Blank Question In Linux, the allocator uses a ________ algorithm to keep track of available physical pages. Correct Answer Buddy-heap Your Answer Sort-first Select The Blank Question ________ describes segments local to each program, including its code, data, stack etc. Correct Answer LDT Your Answer LDT True/False Question A file in NTFS is a simple byte stream as it is in MSDOS or UNIX . Correct Answer False Your Answer False True/False Question A copy of inode is kept in main memory while a file is open. Correct Answer True Your Answer True Multiple Choice Single Answer Question The separation of policy and mechanism is important for which purpose? Correct Answer Flexibility Your Answer Costing Select The Blank Question A ________ is a group of NT server machines that share a common security policy and user databases. Operating System |

21

Correct Answer Domain Your Answer Domain Multiple Choice Single Answer Question If Dog derives from Mammal, and Mammal derives from Animal, then Correct Answer Dog inherits Animal's functions and data Your Answer Dog inherits Animal's functions and data True/False Question Keyboard is a sharable device. Correct Answer True Your Answer False

Operating System - 7 LIST OF ATTEMPTED QUESTIONS AND ANSWERS Multiple Choice Multiple Answer Question A mailbox can be owned by :Correct Answer Operating system , Process Your Answer User , Process Multiple Choice Single Answer Question Software may trigger an interrupt by executing a special operation called :Correct Answer System call Your Answer Interrupt call Match The Following Question Correct Answer Your Answer User mode Mode bit 1 Monitor mode Serial port Modem Modem Parallel port Printer Printer Privileged instructions Monitor mode UPS Multiple Choice Multiple Answer Question The movement of information between levels of a storage hierarchy may be of two types depending

on the hardware design and the controlling operating system software such as :Correct Answer Explicit , Implicit Your Answer Implicit , Indirect Multiple Choice Multiple Answer Question What are the ways in which a request for kernelmode execution can occur in Linux? Correct Answer Explicitly , Implicitly Your Answer Implicitly , Function call Multiple Choice Multiple Answer Question Supervisor mode is also known as :Correct Answer System mode , Privileged mode , Monitor mode Your Answer Privileged mode , Special mode Multiple Choice Multiple Answer Question The role of the operating system in computer I/O is to :Correct Answer Manage I/O operation and devices , Control I/O operation and devices Your Answer Manage I/O operation and devices , I/O processing True/False Question In UNIX, first two names in every directory are "." and ".." Correct Answer True Your Answer False Multiple Choice Multiple Answer Question Various storage systems available possesses which two characteristics? Correct Answer Volatile , Non-volatile Your Answer Primary storage , Secondary storage Multiple Choice Single Answer Question A program in execution is:Correct Answer Process Your Answer Operation Select The Blank Question In some operating system, spooling is handled by an ________ . Correct Answer Operating System | 22

In-kernel thread Your Answer In-kernel thread Select The Blank Question The hardware to measure elapsed time to trigger operations is called a ________. Correct Answer Programmable interval timer Your Answer Elapsed timer True/False Question NFU algorithm requires a software counter associated with each page initially zero. Correct Answer True Your Answer True True/False Question Volatile storage loses its contents when the power to the device is removed. Correct Answer True Your Answer False Match The Following Question Correct Answer Your Answer MFT Multi programming with fixed task Multi programming with fixed task RAM Volatile memory Volatile memory ROM Read only memory Read only memory BIOS Basic input output system Basic input output system Select The Blank Question ________ includes disks and tapes. Correct Answer Block devices Your Answer Socket interfaces Select The Blank Question The process could create a new ________ and wait for its termination. Correct Answer Sub process Your Answer Child

True/False Question The cipher text can be stored in a readable file or transmitted over unprotected channels. Correct Answer True Your Answer True Select The Blank Question The virtual memory portion of the NT executive is the ________. Correct Answer Virtual memory manager Your Answer Page-memory manager Multiple Choice Single Answer Question The main difference between structure and class is Correct Answer Structure does not support OOPS Class Supports OOPS. Your Answer Structure is used in OOPS. Classes are used in procedural programs. Multiple Choice Multiple Answer Question Find out different types of I/O buses :Correct Answer EIDE , SCSI Your Answer EIDE , SCSI Select The Blank Question ________ passwords prevent improper authentication due to password exposure. Correct Answer One-time Your Answer Encrypted Select The Blank Question Like worms, ________ are designed to spread into other programs and can wreak havoc in a system. Correct Answer Viruses Your Answer Trojan horses Select The Blank Question A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote. Correct Answer Redirector Your Answer Director Select The Blank Question

Operating System | 23

One interface that is available in many operating systems, including UNIX and WindowsNT, is the network ________ interface. Correct Answer Socket Your Answer Device True/False Question In Windows NT, kernel can be paged out of memory and its executions can be preempted. Correct Answer False Your Answer True Multiple Choice Single Answer Question The insulation of data from direct access by the program is known as : Correct Answer Data hiding Your Answer Abstraction Multiple Choice Single Answer Question The concept of OOPS was first introduced in Correct Answer Simula Language Your Answer Simula Language Multiple Choice Multiple Answer Question locate the transmission devices :Correct Answer Network cards , Modems Your Answer Network cards , Modems Multiple Choice Single Answer Question How big is a class object? Correct Answer Is as big as sum of the sizes of its member variables Your Answer Is as big as sum of the sizes of its member variables Multiple Choice Single Answer Question The system call checks the arguments given by the application, builds a data structure to convey the arguments to the kernel and then executes a special instruction called as :Correct Answer Software interrupt Your Answer Special system call Multiple Choice Multiple Answer Question Security violations of the system can be categorized as :-

Correct Answer Malicious , Accidental Your Answer Unauthorized , Authorized Select The Blank Question Most computers have ________ clocks and timers. Correct Answer Hardware Your Answer In-built Multiple Choice Single Answer Question A domain is a collection of :Correct Answer Access rights Your Answer Objects True/False Question In paging the total address space can exceed the size of physical memory Correct Answer True Your Answer True Multiple Choice Single Answer Question Objects may communicate with each other through Correct Answer Methods Your Answer Methods Multiple Choice Single Answer Question A system consists of collection of :Correct Answer Processes Your Answer Processes Multiple Choice Multiple Answer Question An audit log records which things about an object ? Correct Answer Time , User , Type of access Your Answer Time , Type of access Multiple Choice Single Answer Question It has been said that Pascal and C programs are collections of procedures and C++ programs are collections of Correct Answer Classes Your Answer Classes Select The Blank

Operating System | 24

Question OOSAD begins with identification of actors, what activities they perform and building ________ model for the function. Correct Answer Use-case Your Answer Use-case Multiple Choice Single Answer Question The smallest addressable portion of a disk is :Correct Answer Sector Your Answer Sector True/False Question OOSAD approach is applicable only to stable systems. Correct Answer False Your Answer True True/False Question To perform a disk I/O operation, the computer places a command into the host controller, typically using memory-mapped I/O ports. Correct Answer True Your Answer True Multiple Choice Single Answer Question The number of processes that are completed per time unit is called as:Correct Answer Throughput of system Your Answer Efficiency of system Multiple Choice Single Answer Question In MULTICS TLB address of 'n', the most recently referenced pages are kept, where 'n' can have a value :Correct Answer 16 Your Answer 8 True/False Question The job of I/O channel is to offload I/O work from the main CPU. Correct Answer True Your Answer False

Multiple Choice Multiple Answer Question Kernel threads are generally :Correct Answer Slower to create , Difficult to manage Your Answer Slower to create , Difficult to manage Select The Blank Question If the user-supplied password matches the password stored in the system, the system assumes that the user is ________. Correct Answer Legitimate Your Answer Legitimate Multiple Choice Single Answer Question In general , the access matrix will be :Correct Answer Sparse Your Answer Sparse True/False Question Encryption is one common method of protecting information that is transmitted over unreliable links. Correct Answer True Your Answer False Select The Blank Question A ________ is a full duplex connection between a device driver and a user-level process. Correct Answer Stream Your Answer Stream Multiple Choice Single Answer Question In how many number of classes does the NRU algorithm divides pages, depending on the state of R and M? Correct Answer 4 Your Answer 8 Select The Blank Question The Pentium page size is fixed at ________ KB. Correct Answer 4 Your Answer 4 True/False Question Volatile storage loses its contents when the power Operating System | 25

to the device is removed. Correct Answer True Your Answer True Multiple Choice Multiple Answer Question The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :Correct Answer Explicit , Implicit Your Answer Explicit , Implicit Select The Blank Question In queuing diagram, the arrow indicates the flow of ________ in the system. Correct Answer Processes Your Answer Processes Multiple Choice Multiple Answer Question What are the forms of malicious access? Correct Answer Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data Your Answer Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data Select The Blank Question A bit called the ________ , is added to the hardware of the computer to indicate the current mode. Correct Answer Mode bit Your Answer Mode bit Multiple Choice Multiple Answer Question In Windows NT , kernel uses which two sets of objects? Correct Answer Dispatcher objects , Control objects Your Answer Dispatcher objects , Complex objects Multiple Choice Single Answer Question The smallest addressable portion of a disk is :Correct Answer Sector Your Answer Sector True/False

Question In FIFO algorithm the page removed from memory is the one which most recently used. Correct Answer False Your Answer False Select The Blank Question A process is ________, if it cannot affect or be affected by the other processes executing in the system. Correct Answer Independent Your Answer Independent Multiple Choice Multiple Answer Question Linux presents standard interfaces to whom? Correct Answer Programmer , User Your Answer Programmer , User , System administrator Select The Blank Question The kernel module that controls a device is a ________ . Correct Answer Device driver Your Answer Device daemon True/False Question Whenever a trap or interrupt occurs, the hardware switches from user mode to monitor mode. Correct Answer True Your Answer True Select The Blank Question A ________ is a computer or router that sits between the trusted and untrusted systems. Correct Answer Firewall Your Answer Firewall Multiple Choice Multiple Answer Question Find out the basic I/O hardware elements from the following :Correct Answer Ports , Buses , Device controllers Your Answer Ports , Buses , Device controllers True/False Question Object-oriented programming focuses on the

Operating System | 26

integrated data and functionality as discrete units that have both knowledge (data) and capabilities (functions). Procedural programs, on the other hand, focus on functions and how they act on data. Correct Answer True Your Answer True

Question An object type in windows NT is a system defined data type that has two things associated with it, which are they? Correct Answer Set of attributes , Set of methods Your Answer Object-type , Object-processing

Match The Following Question Correct Answer Your Answer User mode Mode bit 1 Mode bit 1 Serial port Modem Monitor mode Parallel port Printer Printer Privileged instructions Monitor mode Mode bit 0

Multiple Choice Multiple Answer Question When memory reference occurs in MULTICS the things which takes place are :Correct Answer Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address Your Answer Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined

True/False Question In segmentation the total address space can exceed the size of physical memory. Correct Answer True Your Answer False Multiple Choice Single Answer Question Because of the concept of independent objects responding to messages, object orientation is a natural way to implement Correct Answer Event driven programming Your Answer Message deiven programming Multiple Choice Single Answer Question In UNIX, everything below the system-call interface and above the physical hardware is the :Correct Answer Kernel Your Answer I/O system Multiple Choice Multiple Answer Question Different multithreading models available are :Correct Answer Many-to-one model , One-to-one model , Many-tomany model Your Answer Many-to-one model , One-to-one model , Many-tomany model Multiple Choice Multiple Answer

Multiple Choice Single Answer Question The interval from the time of submission of a process to the time of completion is :Correct Answer Turnaround time Your Answer Turnaround time True/False Question Context switch times are highly dependent on hardware support. Correct Answer True Your Answer True True/False Question Procedure and data can be distinguished and separately protected in segmentation Correct Answer True Your Answer True Multiple Choice Multiple Answer Question Dispatcher functions involves the following :Correct Answer Switching context , Switching to user mode Your Answer Switching context , Switching to user mode Multiple Choice Single Answer Question The First version of UNIX was developed in 1969 by Ken Thompson of the Research Group at :Correct Answer Operating System | 27

Bell Laboratories Your Answer Bell Laboratories Multiple Choice Single Answer Question In Object Oriented technology following expression is appropriate Correct Answer object=data+menthods Your Answer object=data+menthods Multiple Choice Single Answer Question A procedure body implementing an operation is termed as Correct Answer Method Your Answer Method Select The Blank Question During execution, ________ register holds the sector for the code segment. Correct Answer CS Your Answer PS True/False Question In some operating system, spooling is managed by a system daemon process. Correct Answer True Your Answer False Select The Blank Question Each column in the access matrix can be implemented as an ________ for one object. Correct Answer Access list Your Answer Capability list Multiple Choice Single Answer Question Policies for resource use may vary depending on the :Correct Answer Application Your Answer System Multiple Choice Multiple Answer Question A mailbox can be owned by :Correct Answer Process , Operating system Your Answer User , Process , Program

Multiple Choice Single Answer Question The ready queue is generally stored as a :Correct Answer Linked list Your Answer Queue Select The Blank Question A ________ is region of fast memory that hold copies of data . Correct Answer Cache Your Answer Cache Multiple Choice Multiple Answer Question What are the components to memory management under Linux? Correct Answer Physical memory manager , Virtual memory manager Your Answer Physical memory manager , Virtual memory manager Match The Following Question Correct Answer Your Answer Bounded-buffer Fixed size buffer Fixed size buffer Producer Produces process Produces process Consumer Consumes process Consumes process Unbounded-buffer No limit on size of buffer No limit on size of buffer True/False Question The inode contains 15 pointers to the disk blocks containing the data contents of the file. Correct Answer True Your Answer True Multiple Choice Single Answer Question When computer is powered up or rebooted, it needs to have an initial program to run. This initial program is known as :Correct Answer Bootstrap program Your Answer Bootstrap program

Operating System | 28

Operating System - 11 LIST OF ATTEMPTED QUESTIONS AND ANSWERS Select The Blank Question Like worms, ________ are designed to spread into other programs and can wreak havoc in a system. Correct Answer Viruses Your Answer Viruses Multiple Choice Multiple Answer Question The advantage of dynamic loading is Correct Answer Unused routine is never loaded , Useful when large amount of code are needed to handle infrequently occurring cases, such as error routines , It does not require special support from the operating system Your Answer Useful when large amount of code are needed to handle infrequently occurring cases, such as error routines , It does not require special support from the operating system , Unused routine is never loaded Select The Blank Question Terminals and line printers are ________ . Correct Answer Character devices Your Answer Socket interfaces Multiple Choice Multiple Answer Question A mailbox can be owned by :Correct Answer Process , Operating system Your Answer Process , Operating system Select The Blank Question A process is ________, if it cannot affect or be affected by the other processes executing in the system. Correct Answer Independent Your Answer Cooperating True/False Question NFU is crude attempt to approximate LRU. Correct Answer True Your Answer False True/False Question

A copy of inode is kept in main memory while a file is open. Correct Answer True Your Answer True Multiple Choice Single Answer Question The class bird should have object Correct Answer Egale Your Answer Egale Multiple Choice Multiple Answer Question User thread libraries include :Correct Answer POSIX Pthreads , Mach C-threads , Solaris threads Your Answer Mach C-threads , Solaris threads True/False Question We can include dynamic protection in the accessmatrix model by considering the domains and the access matrix itself as objects. Correct Answer True Your Answer True True/False Question The capability list is associated with a domain. Correct Answer True Your Answer True Select The Blank Question A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote. Correct Answer Redirector Your Answer Redirector Select The Blank Question The ________ is a compromise between access lists and capability lists. Correct Answer Lock-Key Schemes Your Answer Protected procedures Match The Following Question Correct Answer Your Answer Bit showing the availability of page in memory for which that entry belongs to Operating System | 29

Present / absent bit Modified bit In page table entry, the access permitted are stored in Protection bit Protection bit Bit is set when the page is referenced Referenced bit Referenced bit Bit which keeps track of page usage Modified bit Security bit Multiple Choice Single Answer Question In UNIX, files are organized in tree-structured :Correct Answer Directories Your Answer Directories Match The Following Question Correct Answer Your Answer We can define abstract operation on abstract data Data abstraction Data abstraction Process of sharing properties of the higher level object or class Inheritance Inheritance Ability to inherit attributes and methods from 2 or more objects or classes Multiple inheritance Multiple inheritance Ability to send a message to several objects and to allow receiving object to respond method specified on the object. Ploymorphism Ploymorphism Select The Blank Question The Solaris developers reimplemented the ________ using in-kernel thread to eliminate the context switch involved in moving each character between daemons and the kernel. Correct Answer Telnet daemon Your Answer Context-switch daemon Multiple Choice Single Answer Question If the process is waiting for some event to occur then it is said to be in :Correct Answer Waiting state Your Answer Ready state True/False Question Cache is a non-volatile storage system.

Correct Answer False Your Answer False Multiple Choice Single Answer Question The wraping up of data and methods in a single unit (class) is known as : Correct Answer Encapsulation Your Answer Encapsulation True/False Question A process is a victim of starvation if it becomes stuck in a scheduling queue indefinitely. Correct Answer True Your Answer True Select The Blank Question ________ file access can be layered on top of blockdevice drivers. Correct Answer Memory-mapped Your Answer Memory-mapped Multiple Choice Multiple Answer Question find out the services provided by kernel related to I/O : Correct Answer I/O Scheduling , Buffering , Spooling Your Answer I/O Scheduling , Buffering , Spooling Multiple Choice Multiple Answer Question The role of the operating system in computer I/O is to :Correct Answer Manage I/O operation and devices , Control I/O operation and devices Your Answer Manage I/O operation and devices , Control I/O operation and devices True/False Question In Lock-key mechanism, a process executing in a domain can access an object if that domain has a key that matches one of the locks of the objects. Correct Answer True Your Answer False Multiple Choice Multiple Answer Question There are components to the module support under Operating System | 30

Linux, identify them :Correct Answer Module management , Driver registration , Conflictresolution mechanism Your Answer Module management , Driver registration , Conflictresolution mechanism Multiple Choice Single Answer Question The 4.3BSD operating system is the version of :Correct Answer UNIX Your Answer UNIX Select The Blank Question Each entry in the access matrix consists of a set of ________ . Correct Answer Access right Your Answer Access right Multiple Choice Single Answer Question In UNIX, a file is represented by an :Correct Answer Inode Your Answer Block Multiple Choice Single Answer Question The segment is :Correct Answer Logical entity Your Answer Logical entity True/False Question In Windows NT, each process has one or more threads, which are the units of execution dispatched by the kernel. Correct Answer True Your Answer True Multiple Choice Single Answer Question UNIX operating system is written mostly in :Correct Answer C language Your Answer C++ language Multiple Choice Multiple Answer Question Security violations of the system can be categorized as :Correct Answer Malicious , Accidental

Your Answer Malicious , Authorized Multiple Choice Single Answer Question The smallest addressable portion of a disk is :Correct Answer Sector Your Answer Sector Select The Blank Question Associations are generally ________. Correct Answer Bidirectional Your Answer Bidirectional Multiple Choice Multiple Answer Question Find out the human-interface devices :Correct Answer Screen , Keyboard , Mouse Your Answer Screen , Keyboard , Mouse Select The Blank Question ________allows us to define abstract operations on abstract data. Correct Answer Data abstraction Your Answer Data abstraction Multiple Choice Multiple Answer Question Once the I/O is started , which two courses of action are possible? Correct Answer Synchronous I/O , Asynchronous I/O , Simple I/O Your Answer Synchronous I/O , Asynchronous I/O , Simple I/O Multiple Choice Multiple Answer Question In windows NT, naming of objects is of two types :Correct Answer Permanent name , Temporary name Your Answer Permanent name , Temporary name True/False Question Turnaround time is inversely proportional to throughput. Correct Answer True Your Answer True Select The Blank Question The hardware to measure elapsed time to trigger Operating System | 31

operations is called a ________. Correct Answer Programmable interval timer Your Answer Programmable elapsed timer

communicate with web browsers. Correct Answer http Your Answer http

Multiple Choice Multiple Answer Question User level threads are generally :Correct Answer Fast to create , Easy to manage Your Answer Fast to create , Easy to manage

True/False Question Cache-coherency is usually a software problem and handled above the operating system level. Correct Answer False Your Answer True

Multiple Choice Single Answer Question In MULTICS TLB address of 'n', the most recently referenced pages are kept, where 'n' can have a value :Correct Answer 16 Your Answer 16 Multiple Choice Single Answer Question C++ is also named as Correct Answer C with classes Your Answer C with classes Multiple Choice Multiple Answer Question Liner address is divided into fields like :Correct Answer Dir , Page , Offset Your Answer Dir , Page , Offset Multiple Choice Single Answer Question DVMA stands for :Correct Answer Direct Virtual Memory Access Your Answer Direct Virtual Memory Access True/False Question An asynchronous call returns immediately, without waiting for the I/O to complete. Correct Answer True Your Answer True

Operating System - 10 LIST OF ATTEMPTED QUESTIONS AND ANSWERS Select The Blank Question Web servers use the ________ protocol to

Multiple Choice Multiple Answer Question Two main jobs of a computer are :Correct Answer I/O , Processing Your Answer I/O , Processing Multiple Choice Multiple Answer Question What are the ways in which a request for kernelmode execution can occur in Linux? Correct Answer Explicitly , Implicitly Your Answer Explicitly , Implicitly Select The Blank Question If the user-supplied password matches the password stored in the system, the system assumes that the user is ________. Correct Answer Legitimate Your Answer Legitimate True/False Question Single-indirect block is an index block which contains data of the files to which it points. Correct Answer False Your Answer True True/False Question Volatile storage loses its contents when the power to the device is removed. Correct Answer True Your Answer True Multiple Choice Single Answer Question SCSI stands for :Correct Answer Small Computer-Systems Interface

Operating System | 32

Your Answer System Call-System Interrupt Multiple Choice Multiple Answer Question Which are the Division D security systems ? Correct Answer Windows 3.1 , MS-DOS Your Answer Windows NT , UNIX Select The Blank Question static binding allows to hold certain properties fixed and rigid, whereas ________ binding allows object to behave as per conditions emerge. Correct Answer Dynamic Your Answer Dynamic Multiple Choice Multiple Answer Question What are the components to memory management under Linux? Correct Answer Physical memory manager , Virtual memory manager Your Answer Physical memory manager , Virtual memory manager Multiple Choice Single Answer Question The First version of UNIX was developed in 1969 by Ken Thompson of the Research Group at :Correct Answer Bell Laboratories Your Answer Bell Laboratories True/False Question XML is a meta data language developed to specify data with a goal of improving interoperatability of different data sources. Correct Answer True Your Answer True True/False Question One way to achieve portability is to write software in standard version of high level language and to develop portable system and application software . Correct Answer True Your Answer True Multiple Choice Single Answer Question C++ is basically a procedural language having extension of

Correct Answer Object Oriented technology Your Answer Object Oriented technology Select The Blank Question The ________ of a process is represented in the PCB of a process. Correct Answer Context Your Answer Context Select The Blank Question In windows NT, the ________ facility is used to pass requests and results between client and server processes within a single machine. Correct Answer Local-procedure-call Your Answer Remote-procedure-call Multiple Choice Single Answer Question In how many number of classes does the NRU algorithm divides pages, depending on the state of R and M? Correct Answer 4 Your Answer 4 Multiple Choice Multiple Answer Question When memory reference occurs in MULTICS the things which takes place are :Correct Answer Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address Your Answer Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address Multiple Choice Multiple Answer Question Supervisor mode is also known as :Correct Answer System mode , Privileged mode , Monitor mode Your Answer System mode , Privileged mode , Monitor mode Multiple Choice Single Answer Question How big is a class object? Correct Answer Is as big as sum of the sizes of its member variables Your Answer Operating System | 33

Is as big as sum of the sizes of its member variables

True

Multiple Choice Multiple Answer Question The device number consists of which two parts in UNIX? Correct Answer Major device number , Minor device number Your Answer Major device number , Minor device number

Select The Blank Question A keyboard is an example of device that is accessed through a ________ interface. Correct Answer Character stream Your Answer Character stream

Select The Blank Question The context switch time is pure ________, because system does no useful work while switching. Correct Answer Overhead Your Answer Wastage

Multiple Choice Multiple Answer Question Find out the CPU scheduling algorithms from these options :Correct Answer FCFS , RR , SJF Your Answer FCFS , RR , SJF

Multiple Choice Multiple Answer Question In Solaris 2, user-level threads may be:Correct Answer Bound , Unbound Your Answer Bound , Unbound

Multiple Choice Single Answer Question Main Memory of computer program is also called as :Correct Answer RAM Your Answer RAM

Match The Following Question Correct Answer Your Answer Random-access devices CD-ROM CD-ROM Character devices. Terminal Keyboard Block devices Disk Tape Sequential devices Modem Terminal Multiple Choice Single Answer Question The main difference between structure and class is Correct Answer Structure does not support OOPS Class Supports OOPS. Your Answer Structure does not support OOPS Class Supports OOPS. True/False Question Object-oriented programming focuses on the integrated data and functionality as discrete units that have both knowledge (data) and capabilities (functions). Procedural programs, on the other hand, focus on functions and how they act on data. Correct Answer True Your Answer

Multiple Choice Multiple Answer Question The security of a system can be improved by two management techniques, such as :Correct Answer Threat monitoring , Audit Log Your Answer Threat monitoring , Audit Log Multiple Choice Single Answer Question The separation of policy and mechanism is important for which purpose? Correct Answer Flexibility Your Answer Flexibility Match The Following Question Correct Answer Your Answer Trap in which program tries to use unmapped page Page fault Page fault Memory Management Unit MMU MMU Smaller units in which virtual address space is divided Pages Pages Units in physical memory corresponding to pages in virtual memory Page frame Page frame Operating System | 34

True/False Question A non-blocking call does not halt the execution of the application for an extended time. Correct Answer True Your Answer True True/False Question Windows NT uses a message passing implementation for I/O. Correct Answer True Your Answer True Multiple Choice Multiple Answer Question Kernel threads are generally :Correct Answer Slower to create , Difficult to manage Your Answer Slower to create , Difficult to manage Multiple Choice Single Answer Question The long-term scheduler controls the :Correct Answer Degree of multiprogramming Your Answer Degree of multiprogramming Multiple Choice Single Answer Question Objects may communicate with each other through Correct Answer Methods Your Answer Methods Select The Blank Question In queuing diagram, the arrow indicates the flow of ________ in the system. Correct Answer Processes Your Answer Queue Multiple Choice Single Answer Question If Dog derives from Mammal, and Mammal derives from Animal, then Correct Answer Dog inherits Animal's functions and data Your Answer Dog inherits Animal's functions and data Multiple Choice Single Answer Question Thread at user level is known as :Correct Answer

User thread Your Answer User thread Select The Blank Question ________ includes disks and tapes. Correct Answer Block devices Your Answer Block devices Multiple Choice Single Answer Question DMA stands for :Correct Answer Direct Memory Access Your Answer Direct Memory Access True/False Question When application issues a blocking I/O system call, the request is placed on the queue for that device. Correct Answer True Your Answer True Multiple Choice Single Answer Question The concept of OOPS was first introduced in Correct Answer Simula Language Your Answer Simula Language True/False Question Encryption is one common method of protecting information that is transmitted over unreliable links. Correct Answer True Your Answer True Select The Blank Question ________ describes segments local to each program, including its code, data, stack etc. Correct Answer LDT Your Answer LDT LIST OF ATTEMPTED QUESTIONS AND ANSWERS Multiple Choice Single Answer Question SCSI stands for :Correct Answer Small Computer-Systems Interface Your Answer Small Computer-Systems Interface

Operating System | 35

Multiple Choice Multiple Answer Question The basic hardware elements involved in I/O are :Correct Answer Buses , Device controllers , Device Your Answer Buses , Device controllers , Device True/False Question A file in NTFS is a simple byte stream as it is in MSDOS or UNIX . Correct Answer False Your Answer False True/False Question C++ supports object oriented programming concepts of objects, classes, inheritance, polymorphism and parameterised datatypes. Correct Answer True Your Answer True True/False Question I/O system calls are costly in terms of CPU consumptions. Correct Answer True Your Answer True Multiple Choice Single Answer Question All user processes are descendents of one original process, Which is that process? Correct Answer Init process Your Answer Init process Match The Following Question Correct Answer Your Answer Provides adjustment while compiling classes Interface classes Derived function Identify values & relevant operations Abstract data types Abstract data types Complete implementation of class Concrete data types Interface classes Provides framework for other classes Node classes Node classes Match The Following Question

Correct Answer Your Answer Round-robin Time quantum Time quantum First-come First-served First come job First come job Shortest job Shortest job Shortest job Priority Highest priority job Highest priority job Select The Blank Question ________ describes segments local to each program, including its code, data, stack etc. Correct Answer LDT Your Answer LDT Multiple Choice Multiple Answer Question To protect the system, we must take security measures at two levels, such as :Correct Answer Physical level , Human level Your Answer Physical level , Human level True/False Question The hardware allows privileged instructions to be executed in only user mode. Correct Answer False Your Answer False Multiple Choice Single Answer Question What does the rows of the access matrix represents? Correct Answer Domains Your Answer Domains Select The Blank Question A bit called the ________ , is added to the hardware of the computer to indicate the current mode. Correct Answer Mode bit Your Answer Mode bit True/False Question In Windows NT, each process has one or more threads, which are the units of execution dispatched by the kernel.

Operating System | 36

Correct Answer True Your Answer True Select The Blank Question ________allows us to define abstract operations on abstract data. Correct Answer Data abstraction Your Answer Data abstraction Select The Blank Question If the granularity field is ________ the limit field is the exact segment size, upto 1 MB. Correct Answer 0 Your Answer 1 True/False Question Encryption is one common method of protecting information that is transmitted over unreliable links. Correct Answer True Your Answer True Multiple Choice Single Answer Question Collection of similar datatypes is called as Correct Answer Array Your Answer Array Multiple Choice Single Answer Question A Process which produces process is known as :Correct Answer Producer Your Answer Producer Multiple Choice Single Answer Question Interrupt mechanism accepts an address and this address is an offset in a table called the :Correct Answer Interrupt vector Your Answer Interrupt vector Select The Blank Question The process could create a new ________ and wait for its termination. Correct Answer Sub process Your Answer Sub process

Multiple Choice Single Answer Question Thread at user level is known as :Correct Answer User thread Your Answer User thread Multiple Choice Single Answer Question If Dog derives from Mammal, and Mammal derives from Animal, then Correct Answer Dog inherits Animal's functions and data Your Answer Mammal inherits Animal's functions and data Select The Blank Question During execution, ________ register holds the sector for the code segment. Correct Answer CS Your Answer DS Multiple Choice Single Answer Question The list of processes waiting for a particular I/O device is called a :Correct Answer Device queue Your Answer Device queue True/False Question Cache is a faster storage system which stores data temporarily. Correct Answer True Your Answer True True/False Question The file system does not provide a degree of protection. Correct Answer False Your Answer True Multiple Choice Multiple Answer Question Liner address is divided into fields like :Correct Answer Dir , Page , Offset Your Answer Dir , Page , Offset True/False Question Volatile storage loses its contents when the power Operating System | 37

to the device is removed. Correct Answer True Your Answer True Multiple Choice Single Answer Question Which of the following Operating System has no memory protection ? Correct Answer Windows 3.1 Your Answer Windows 3.1 Multiple Choice Multiple Answer Question In windows NT, naming of objects is of two types :Correct Answer Permanent name , Temporary name Your Answer Permanent name , Temporary name Multiple Choice Single Answer Question Protection can no longer be considered solely as a matter of concern to the designer of :Correct Answer Operating system Your Answer Operating system Select The Blank Question Web servers use the ________ protocol to communicate with web browsers. Correct Answer http Your Answer http Multiple Choice Multiple Answer Question locate the transmission devices :Correct Answer Network cards , Modems Your Answer Network cards , Modems Multiple Choice Single Answer Question In UNIX, the simplest form of communication between processes is by :Correct Answer Pipes Your Answer Pipes Select The Blank Question A ________ is a group of NT server machines that share a common security policy and user databases. Correct Answer Domain

Your Answer Domain Multiple Choice Multiple Answer Question Message passing may be :Correct Answer Blocking , Non-blocking Your Answer Blocking , Non-blocking Multiple Choice Multiple Answer Question An object type in windows NT is a system defined data type that has two things associated with it, which are they? Correct Answer Set of attributes , Set of methods Your Answer Set of attributes , Set of methods Select The Blank Question The ________ of a process is represented in the PCB of a process. Correct Answer Context Your Answer Context Select The Blank Question The Linux ________ file system, known as the proc file system, is an example of a file system whose contents are not actually stored anywhere, but are rather computed on demand according to user file I/o requests. Correct Answer Process Your Answer Process True/False Question Objects can be both, tangible or intangible. Correct Answer True Your Answer True Multiple Choice Multiple Answer Question In UNIX, a device is distinguished by two things, which are :Correct Answer Device-class , Device number Your Answer Device-class , Device number Multiple Choice Multiple Answer Question Find out the basic I/O hardware elements from the following :Correct Answer Ports , Buses , Device controllers Operating System | 38

Your Answer Ports , Buses , Device controllers Multiple Choice Multiple Answer Question Which are the Division D security systems ? Correct Answer Windows 3.1 , MS-DOS Your Answer Windows 3.1 , MS-DOS

Egale Multiple Choice Single Answer Question Objects are essentially :Correct Answer Abstract data type Your Answer Abstract data type

Multiple Choice Single Answer Question Protection can improve :Correct Answer Reliability Your Answer Reliability

True/False Question Banker's algorithm is a deadlock-avoidance algorithm. Correct Answer True Your Answer True

Select The Blank Question The creating process is called a ________ process. Correct Answer Parent Your Answer Parent

True/False Question Aging algorithm is based on LRU. Correct Answer True Your Answer False

Multiple Choice Multiple Answer Question When memory reference occurs in MULTICS the things which takes place are :Correct Answer Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address Your Answer Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address

Select The Blank Question MULTICS uses a ________ in addition to file access for protection. Correct Answer Ring structure Your Answer Ring structure

Operating System - 14 LIST OF ATTEMPTED QUESTIONS AND ANSWERS Multiple Choice Multiple Answer Question The Linux system is composed of three main bodies of code, in line with most traditional UNIX implementations. Which are :Correct Answer Kernel , System libraries , System utilities Your Answer System libraries , Programs , Kernel Multiple Choice Single Answer Question The class bird should have object Correct Answer Egale Your Answer

True/False Question A virus is a fragment of code embedded in a legitimate program Correct Answer True Your Answer True Multiple Choice Multiple Answer Question The basic hardware elements involved in I/O are :Correct Answer Buses , Device controllers , Device Your Answer Keyboard , Buses , Device controllers True/False Question Main Memory is a volatile storage device that loses its contents when power is turned off. Correct Answer True Your Answer True Select The Blank Question In queuing diagram , each rectangular box

Operating System | 39

represents a ________. Correct Answer Queue Your Answer Queue True/False Question Whenever a trap or interrupt occurs, the hardware switches from user mode to monitor mode. Correct Answer True Your Answer True Multiple Choice Single Answer Question As process enter the system, they are put into :Correct Answer Job queue Your Answer Job queue Select The Blank Question During execution, ________ register holds the sector for the data segment. Correct Answer DS Your Answer CS Multiple Choice Multiple Answer Question The role of the operating system in computer I/O is to :Correct Answer Manage I/O operation and devices , Control I/O operation and devices Your Answer Manage I/O operation and devices , Control I/O operation and devices Multiple Choice Multiple Answer Question What are the forms of malicious access? Correct Answer Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data Your Answer Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data Select The Blank Question A ________ is a computer or router that sits between the trusted and untrusted systems. Correct Answer Firewall Your Answer Firewall Multiple Choice Multiple Answer

Question Dispatcher functions involves the following :Correct Answer Switching context , Switching to user mode Your Answer Switching context , Switching to user mode Multiple Choice Multiple Answer Question Many-to-may model is supported by following operating systems :Correct Answer Solaris , IRIX , Digital UNIX Your Answer IRIX , Solaris Select The Blank Question A ________ controller is built into each disk drive. Correct Answer Disk Your Answer Disk Match The Following Question Correct Answer Your Answer Parent process Child process Child process Foreground processes Interactive processes Interactive processes Background processes Batch processes Batch processes Light-Weight processes Thread Thread Select The Blank Question A class may be thought of as 'data-type' and object as ________ of that data-type. Correct Answer Variable Your Answer Variable True/False Question In Windows NT, interrupt object binds an interrupt service routine to an interrupt source. Correct Answer True Your Answer True True/False Question In Windows NT, each process has one or more threads, which are the units of execution dispatched by the kernel. Correct Answer

Operating System | 40

True Your Answer True Multiple Choice Single Answer Question If Dog derives from Mammal, and Mammal derives from Animal, then Correct Answer Dog inherits Animal's functions and data Your Answer Mammal inherits Animal's functions and data Multiple Choice Single Answer Question If the process is waiting to be assigned to CPU then it is said to be in :Correct Answer Ready state Your Answer Ready state Multiple Choice Multiple Answer Question What are the components to memory management under Linux? Correct Answer Physical memory manager , Virtual memory manager Your Answer Physical memory manager , Virtual memory manager Multiple Choice Multiple Answer Question The Moriss Internet Worm was made up of which of the two programs? Correct Answer Grappling hook program , Main program Your Answer Target worm program , Grappling hook program Select The Blank Question The ________ controller is the controller at the computer end of the bus. Correct Answer Host Your Answer Disk True/False Question In Windows NT, kernel is object-oriented. Correct Answer True Your Answer True Multiple Choice Single Answer Question C++ is basically a procedural language having extension of Correct Answer Object Oriented technology

Your Answer Graphic user interface Select The Blank Question In queuing diagram, the arrow indicates the flow of ________ in the system. Correct Answer Processes Your Answer Operation True/False Question Whenever the operating system gains control of the computer, it is in monitor mode. Correct Answer True Your Answer True Multiple Choice Single Answer Question C++ is also named as Correct Answer C with classes Your Answer Visual C++ Multiple Choice Single Answer Question The number of processes that are completed per time unit is called as:Correct Answer Throughput of system Your Answer Efficiency of system Select The Blank Question A process is ________ if it can affect or be affected by the other processes executing in the system. Correct Answer Cooperating Your Answer Competing Multiple Choice Single Answer Question Collection of similar datatypes is called as Correct Answer Array Your Answer Array Match The Following Question Correct Answer Your Answer Random-access devices CD-ROM CD-ROM Character devices. Terminal Terminal

Operating System | 41

Block devices Disk Disk Sequential devices Modem Modem Multiple Choice Multiple Answer Question The device number consists of which two parts in UNIX? Correct Answer Major device number , Minor device number Your Answer Device-id , Device-name Multiple Choice Single Answer Question The pure Object Oriented language is Correct Answer Java Your Answer C Multiple Choice Single Answer Question The concept of OOPS was first introduced in Correct Answer Simula Language Your Answer C language Multiple Choice Multiple Answer Question Most CPUs have two interrupt request lines. Which are they? Correct Answer Maskable , Non maskable Your Answer Maskable , Non maskable Multiple Choice Multiple Answer Question Different multithreading models available are :Correct Answer Many-to-one model , One-to-one model , Many-tomany model Your Answer Many-to-one model , One-to-one model , Many-tomany model Select The Blank Question The ________ of a process is represented in the PCB of a process. Correct Answer Context Your Answer Block

Operating System - 13 LIST OF ATTEMPTED QUESTIONS AND ANSWERS

Multiple Choice Multiple Answer Question locate the transmission devices :Correct Answer Network cards , Modems Your Answer Tapes , Network cards , Modems True/False Question The user process issues a network I/O system call to send the character to the remote machine. Correct Answer True Your Answer True Multiple Choice Single Answer Question The process by which objects of one class acquire properties of objects of other class is called Correct Answer Inheritance Your Answer Inheritance True/False Question Windows NT uses a message passing implementation for I/O. Correct Answer True Your Answer True Multiple Choice Multiple Answer Question We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes? Correct Answer User mode , Monitor mode Your Answer User mode , Monitor mode Match The Following Question Correct Answer Your Answer Round-robin Time quantum Time quantum First-come First-served First come job First come job Shortest job Shortest job Shortest job Priority Highest priority job Highest priority job Multiple Choice Single Answer Question

Operating System | 42

The segment is :Correct Answer Logical entity Your Answer Logical entity Multiple Choice Single Answer Question In UNIX, decisions regarding which process to swap in or out are made by whom? Correct Answer Swapper Your Answer Memory handler Select The Blank Question A ________ is a client-server mechanism that enables an application on one machine to make a procedure call to code on another machine. Correct Answer Remote-procedure-call Your Answer Remote-procedure-call Multiple Choice Single Answer Question When each process that wants to communicate must explicitly name the recipient or sender of the communication, then such communication is called as :Correct Answer Direct communication Your Answer Indirect communication Select The Blank Question In Linux, the allocator uses a ________ algorithm to keep track of available physical pages. Correct Answer Buddy-heap Your Answer Binary-search Multiple Choice Single Answer Question What does the rows of the access matrix represents? Correct Answer Domains Your Answer Domains Multiple Choice Single Answer Question Every change in policy requires a change in the underlying :Correct Answer Mechanism Your Answer System Select The Blank Question

A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote. Correct Answer Redirector Your Answer Domain Multiple Choice Multiple Answer Question In Solaris 2, user-level threads may be:Correct Answer Bound , Unbound Your Answer Bound , Unbound Multiple Choice Multiple Answer Question An audit log records which things about an object ? Correct Answer Time , User , Type of access Your Answer Time , User , Type of access Multiple Choice Multiple Answer Question One-to-one model is supported by following systems :Correct Answer Windows NT , OS/2 Your Answer OS/2 , Windows NT Multiple Choice Multiple Answer Question To protect the system, we must take security measures at two levels, such as :Correct Answer Physical level , Human level Your Answer Human level , Global level Multiple Choice Single Answer Question If the process is waiting for some event to occur then it is said to be in :Correct Answer Waiting state Your Answer Waiting state Multiple Choice Single Answer Question A common representation for a discussion of process scheduling is a :Correct Answer Queuing diagram Your Answer Process state diagram True/False Question At Physical level, the site or sites containing the computer systems must be physically secured against armed or surreptitious entry by intruders.

Operating System | 43

Correct Answer True Your Answer True Select The Blank Question When you express user-system interaction, the scenario in the model is called ________ Correct Answer Case model Your Answer Case model True/False Question Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention. Correct Answer False Your Answer True True/False Question A file in NTFS is a simple byte stream as it is in MSDOS or UNIX . Correct Answer False Your Answer False Multiple Choice Single Answer Question Polymorphism means ability to take Correct Answer More than one form Your Answer More than one form True/False Question Aging algorithm is based on LRU. Correct Answer True Your Answer True Select The Blank Question The virtual memory portion of the NT executive is the ________. Correct Answer Virtual memory manager Your Answer Virtual memory manager Multiple Choice Multiple Answer Question There are two types of Message passing, they are :Correct Answer Synchronous , Asynchronous Your Answer Synchronous , Asynchronous

Select The Blank Question Web servers use the ________ protocol to communicate with web browsers. Correct Answer http Your Answer http Multiple Choice Multiple Answer Question The security of a system can be improved by two management techniques, such as :Correct Answer Threat monitoring , Audit Log Your Answer Audit Log , Threat finding Select The Blank Question The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________. Correct Answer Ring Your Answer Ring True/False Question We say that a system is secure if its resources are used and accessed as intended under all circumstances. Correct Answer True Your Answer True Select The Blank Question The ________ controller is the controller at the computer end of the bus. Correct Answer Host Your Answer Cpu Multiple Choice Multiple Answer Question In Linux, the paging system can be divided into sections, namely:Correct Answer Policy algorithm , Paging mechanism Your Answer Policy algorithm , Paging mechanism True/False Question Keyboard is a sharable device. Correct Answer True Your Answer False

Operating System | 44

True/False Question Transfer of data from disk to memory is usually controlled by the operating system. Correct Answer True Your Answer True True/False Question Prototyping not only helps to build a quality design but also enables the designer to build the system decremantally. Correct Answer False Your Answer True Select The Blank Question The UNIX system uses ________ to avoid the necessity of keeping its password list secret. Correct Answer Encryption Your Answer Encryption Match The Following Question Correct Answer Your Answer Read-write devices Disks Disks Dedicated devices Tape CD-ROM Read-only devices CD-ROM Tape Write-only devices Graphics controller Keyboard Multiple Choice Single Answer Question A procedure call, request to execute a method is termed as Correct Answer Message Your Answer Message Select The Blank Question Context switch times are highly dependent on ________ support. Correct Answer Hardware Your Answer Hardware Multiple Choice Multiple Answer

Question Two main jobs of a computer are :Correct Answer I/O , Processing Your Answer I/O , Processing Multiple Choice Single Answer Question The 4.3BSD operating system is the version of :Correct Answer UNIX Your Answer UNIX Multiple Choice Single Answer Question The number of processes that are completed per time unit is called as:Correct Answer Throughput of system Your Answer Throughput of system Multiple Choice Multiple Answer Question Once the I/O is started , which two courses of action are possible? Correct Answer Synchronous I/O , Asynchronous I/O , Simple I/O Your Answer Synchronous I/O , Asynchronous I/O Multiple Choice Multiple Answer Question Security violations of the system can be categorized as :Correct Answer Malicious , Accidental Your Answer Malicious , Accidental Select The Blank Question A process migrates between the various ________ throughout its lifetime. Correct Answer Scheduling queues Your Answer Scheduling queues

Select The Blank Question In the ________ model data elements are organized in tree structure in parent-child format. Correct Answer Hierarchical Your Answer Hierarchical Multiple Choice Single Answer Question A process in which a project is broken down into smaller manageable units is called as :Operating System | 45

Correct Answer Project Compartmentalization Your Answer Project Management Multiple Choice Single Answer Question A type of testing carried out during the software product development process is:Correct Answer Execution Based testing Your Answer Execution Based testing

Your Answer Defect Multiple Choice Single Answer Question A model in which software development cycle is sequential process is :Correct Answer Waterfall Model Your Answer Waterfall Model

True/False Question System testing Starts when Software Integration is about to be completed. Correct Answer False Your Answer True

Select The Blank Question The company should establish a ________ and maintain a documented quality system as a means of ensuring that it conforms to the specified requirements of ISO. Correct Answer Quality System Procedure Your Answer Quality Control System

True/False Question A computer system without system software can not function Correct Answer True Your Answer True

True/False Question Errors in documentation give rise to fatal results. Correct Answer True Your Answer False

Select The Blank Question A ________ is largely depends upon the meeting of functional requirements and performance measures with ease in operations. Correct Answer Customer Satisfaction Your Answer Customer Requirements Management

Multiple Choice Multiple Answer Question The outcome of the Risk Resolution Process is :Correct Answer Acceptable Risk , Reduced Reworks , Corrective actions Your Answer Acceptable Risk , Reduced Reworks , Corrective actions

Match The Following Question Correct Answer Your Answer BSM Boehm Spiral Model Boehm Spiral Model LSM Linear Sequential Model Linear Sequential Model PRM Prototype Model Prototype Model INM Incremental Model Incremental Model Select The Blank Question An Operational deviation made by the user leading to improper result is said to be ________. Correct Answer Fault or Mistake of the System

Multiple Choice Single Answer Question A type of testing which confirms the creation of behavioral properties for the software product i.e. reliability , performance etc is:Correct Answer Execution Based testing Your Answer Execution Based testing Multiple Choice Multiple Answer Question Test cases are designed to tests:Correct Answer Internal Logic , Software Requirements Your Answer Software Performance , A Quality aspect of a Program Multiple Choice Single Answer Question A System is one that is self contained and self reliant:Correct Answer Closed System Your Answer Deterministic Operating System | 46

Multiple Choice Multiple Answer Question The Contents which are recorded by the Data Dictionary for an typical item is:Correct Answer Definition , Identification , Validation Text & Relationship Your Answer Table Name , Definition Multiple Choice Single Answer Question The Application of a systematic, disciplined, quantifiable approach to the development, operation and maintenance of the software is termed as Correct Answer Software Engineering Your Answer Software Engineering True/False Question E-R Diagrams are used to identify the Weak and Strong Relations. Correct Answer True Your Answer False Multiple Choice Multiple Answer Question White Box Testing Checks :Correct Answer All Logical decision are executed with true or false , All Loops are executed , All Paths in the process are correctly operational Your Answer All Paths in the process are correctly operational , All Logical decision are executed with true or false , All Loops are executed Select The Blank Question To become a registered, one of the quality assurance system models contained in ISO 9000 a company's quality system is scrutinized by ________. Correct Answer Third Party Auditor Your Answer Second Party Auditor Select The Blank Question Inventory Control System which is designed based on demand and supply variations could be an example of ________ system Correct Answer Probabilistic Your Answer Open True/False Question A software review is a filter for the software development process.

Correct Answer True Your Answer False Multiple Choice Multiple Answer Question SQA efforts most primarily assures:Correct Answer Software Quality , Software Reliability , Software Availability Your Answer Software Quality , Software Reliability , Software Maintenance Multiple Choice Multiple Answer Question Risk Management is a Process Made up of following :Correct Answer Risk Identification , Risk Analysis , Risk Assessment Your Answer Risk Identification , Risk Analysis , Risk Handling True/False Question Documentation testing tests and verifies whether the troubleshooting is easily achieved or not. Correct Answer True Your Answer True Multiple Choice Multiple Answer Question The types of Software are Correct Answer Business Software , Embedded Software , System Software Your Answer Business Software , Embedded Software , System Software Select The Blank Question A ________ Measures the Quality of the output produced by the System Correct Answer Effectiveness Your Answer Effectiveness & Efficiency Multiple Choice Single Answer Question The Paradigm Structured System Analysis and Design was developed by:Correct Answer Yourdon & De Macro Your Answer Yourdon & Boehm True/False Question The major resources in the project is people and funds. Correct Answer False Your Answer True Multiple Choice Multiple Answer Question RMMM Plan deals with :Operating System | 47

Correct Answer Mitigation , Monitoring , Management Your Answer Mitigation , Monitoring , Management Multiple Choice Multiple Answer Question The Scope of the Software Project is defined by Statement of Work which is agreed by ? Correct Answer Users , Stakeholders , Customers Your Answer Stakeholders , Programmers , Customers Multiple Choice Multiple Answer Question The Customer Requirements could be analysed by :Correct Answer Interviewing , Questionnaire , Meeting with Key Users Your Answer Interviewing , Questionnaire , Case Study True/False Question Stress Testing is a part of Integration testing. Correct Answer False Your Answer True Multiple Choice Single Answer Question When the System requirements are easy to establish and are stable, the development is customer specific, and changes are not foreseen then the model used is? Correct Answer Water Fall Model Your Answer Water Fall Model Select The Blank Question SE Methodology rides on two components, System Engineering and ________. Correct Answer Development Engineering Your Answer Requirement analysis Multiple Choice Single Answer Question A System which operates in a unpredictable manner is :Correct Answer Probabilistic Your Answer Open System Select The Blank Question Requirements Management Begins with ________.

Correct Answer Identification Your Answer Identification Multiple Choice Single Answer Question A degree to which the design aspect of the Quality is met is termed as :Correct Answer Quality Conformance Your Answer Quality Assurance True/False Question A Software solution is evolved in parts as in an incremental fashion in incremental model Correct Answer True Your Answer True True/False Question The results of the test case is recorded in the test specification document. Correct Answer True Your Answer True Match The Following Question Correct Answer Your Answer Spiral Model Boehm Spiral model Boehm Spiral model Legacy software Poor Quality Poor Quality Objects Attribute, Methods Attribute, Methods SSAD yourdan & DeMarco Structured Methodology Select The Blank Question The objective of a ________ is to test for what we want to achieve and not what is actually achieved. Correct Answer Test Plan Your Answer Test Document Multiple Choice Multiple Answer Question A good test is one that has:Correct Answer High Probability of detecting an error , Not Redundant , Simple to execute & Independent Your Answer High Probability of detecting an error , Not Redundant , Simple to Operating System | 48

execute & Independent Multiple Choice Single Answer Question A set of Computer Programs which performs set of preset functions is called as ? Correct Answer Software Your Answer Software Multiple Choice Single Answer Question An outcome of Requirements Management Stage is :Correct Answer Software Requirement Specifications Your Answer Software Requirement Specifications Select The Blank Question ________ type of an error is class I error and needs corrective measures to be implemented immediately. Correct Answer Fatal Your Answer Cosmetic Multiple Choice Multiple Answer Question The stages of the Iterative Models are Correct Answer Requirement Analysis , System Design , Development Coding & Unit Testing Your Answer Requirement Analysis , System Design , Development Coding & Unit Testing

A bit is associated with each memory block. This bit is 0 if the word belongs to OS, and 1 if it belongs to user process. Page 55 A logical address consists of two parts – segment number S and offset into that segment d Page 69

Operating System | 49

Operating-System.pdf

Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Operating-System.pdf. Operating-System.pdf. Open. Extract.

166KB Sizes 2 Downloads 186 Views

Recommend Documents

No documents