Professional Documents
Culture Documents
True/False
Question
Firewall monitors and logs all connections.
Correct Answer
True
Your Answer
True
True/False
Question
Processes represents the executions of single programs whereas threads represent
separate, concurrent execution contexts within a single process running a single
program.
Correct Answer
True
Your Answer
True
True/False
Question
LRU algorithm can not be implemented without special hardware.
Correct Answer
True
Your Answer
False
True/False
Question
An asynchronous call returns immediately, without waiting for the I/O to complete.
Correct Answer
True
Your Answer
True
True/False
Question
Modem is a random-access device.
Correct Answer
False
Your Answer
False
True/False
Question
A major security problem for operating system is authentication.
Correct Answer
True
Your Answer
True
True/False
Question
In a blocking system call, the application is moved from the OS's run queue to a
wait queue.
Correct Answer
True
Your Answer
True
True/False
Question
Device speeds range from a few bytes per second to a few gigabytes per second.
Correct Answer
True
Your Answer
True
True/False
Question
Applications normally access block devices through a file system interface.
Correct Answer
True
Your Answer
True
True/False
Question
The user process issues a network I/O system call to send the character to the
remote machine.
Correct Answer
True
Your Answer
True
True/False
Question
Windows NT uses a message passing implementation for I/O.
Correct Answer
True
Your Answer
True
True/False
Question
At Physical level, the site or sites containing the computer systems must be
physically secured against armed or surreptitious entry by intruders.
Correct Answer
True
Your Answer
True
True/False
Question
Data transfer from cache to CPU and registers is usually a software function, with
little operating system intervention.
Correct Answer
False
Your Answer
True
True/False
Question
A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .
Correct Answer
False
Your Answer
False
True/False
Question
Aging algorithm is based on LRU.
Correct Answer
True
Your Answer
True
True/False
Question
We say that a system is secure if its resources are used and accessed as intended
under all circumstances.
Correct Answer
True
Your Answer
True
True/False
Question
Keyboard is a sharable device.
Correct Answer
True
Your Answer
False
True/False
Question
Transfer of data from disk to memory is usually controlled by the operating
system.
Correct Answer
True
Your Answer
True
True/False
Question
Prototyping not only helps to build a quality design but also enables the designer
to build the system decremantally.
Correct Answer
False
Your Answer
True
True/False
Question
One way to achieve portability is to write software in standard version of high
level language and to develop portable system and application software .
Correct Answer
True
Your Answer
True
True/False
Question
In Public Key Encryption, each user has both a public and a private key.
Correct Answer
True
Your Answer
True
True/False
Question
Data transfer from cache to CPU and registers is usually a software function, with
little operating system intervention.
Correct Answer
False
Your Answer
False
True/False
Question
At system boot time, the hardware starts in monitor mode.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
The main difference between structure and class is
Correct Answer
Structure does not support OOPS Class Supports OOPS.
Your Answer
Structure does not support OOPS Class Supports OOPS.
True/False
Question
The hardware allows privileged instructions to be executed in only user mode.
Correct Answer
False
Your Answer
False
True/False
Question
If some of the pages are shared with other process, the pages in memory and on the
disk can only be released when the last process using them has terminated.
Correct Answer
True
Your Answer
True
True/False
Question
OOSAD approach is applicable only to stable systems.
Correct Answer
False
Your Answer
False
True/False
Question
Segment length may change during execution.
Correct Answer
True
Your Answer
True
True/False
Question
At Human level, user must be screened carefully so that the chance of authorizing
a user who then gives access to an intruder is reduced.
Correct Answer
True
Your Answer
True
True/False
Question
The user process issues a network I/O system call to send the character to the
remote machine.
Correct Answer
True
Your Answer
False