You are on page 1of 22

LIST OF ATTEMPTED QUESTIONS AND ANSWERS

True/False
Question
Firewall monitors and logs all connections.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer


Question
Which of the following Operating System has no memory protection ?
Correct Answer
Windows 3.1
Your Answer
Windows 3.1

Multiple Choice Single Answer


Question
The main difference between structure and class is
Correct Answer
Structure does not support OOPS Class Supports OOPS.
Your Answer
Structure does not support OOPS Class Supports OOPS.

Multiple Choice Single Answer


Question
DMA stands for :-
Correct Answer
Direct Memory Access
Your Answer
Direct Memory Access

Multiple Choice Single Answer


Question
A major problem with the Priority scheduling algorithm is :-
Correct Answer
Starvation
Your Answer
Starvation

Multiple Choice Single Answer


Question
How big is a class object?
Correct Answer
Is as big as sum of the sizes of its member variables
Your Answer
Is as big as sum of the sizes of its member variables

Multiple Choice Single Answer


Question
The First version of UNIX was developed in 1969 by Ken Thompson of the Research
Group at :-
Correct Answer
Bell Laboratories
Your Answer
Bell Laboratories
Multiple Choice Single Answer
Question
When computer is powered up or rebooted, it needs to have an initial program to
run. This initial program is known as :-
Correct Answer
Bootstrap program
Your Answer
Bootstrap program

True/False
Question
Processes represents the executions of single programs whereas threads represent
separate, concurrent execution contexts within a single process running a single
program.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer


Question
If Dog derives from Mammal, and Mammal derives from Animal, then -
Correct Answer
Dog inherits Animal's functions and data
Your Answer
Dog inherits Animal's functions and data

Multiple Choice Single Answer


Question
The wraping up of data and methods in a single unit (class) is known as :
Correct Answer
Encapsulation
Your Answer
Encapsulation

True/False
Question
LRU algorithm can not be implemented without special hardware.
Correct Answer
True
Your Answer
False

Select The Blank


Question
The Solaris developers reimplemented the ________ using in-kernel thread to
eliminate the context switch involved in moving each character between daemons and
the kernel.
Correct Answer
Telnet daemon
Your Answer
Telnet daemon

Multiple Choice Single Answer


Question
All user processes are descendents of one original process, Which is that process?
Correct Answer
Init process
Your Answer
Init process

Select The Blank


Question
Terminals and line printers are ________ .
Correct Answer
Character devices
Your Answer
Character devices

Multiple Choice Multiple Answer


Question
Many-to-may model is supported by following operating systems :-
Correct Answer
Solaris , IRIX , Digital UNIX
Your Answer
Solaris , IRIX , Digital UNIX

Multiple Choice Multiple Answer


Question
find out the services provided by kernel related to I/O :
Correct Answer
I/O Scheduling , Buffering , Spooling
Your Answer
I/O Scheduling , Buffering , Spooling

Multiple Choice Single Answer


Question
The long-term scheduler controls the :-
Correct Answer
Degree of multiprogramming
Your Answer
Degree of multiprogramming

Select The Blank


Question
The concept of protection levels and call gates were pioneered in MULTICS, where
they were viewed as protection ________.
Correct Answer
Ring
Your Answer
Ring

Multiple Choice Multiple Answer


Question
In Linux, the main objects defined by the virtual file system are :-
Correct Answer
Inode-object , File-object , File-system object
Your Answer
Inode-object , File-object , File-system object

Multiple Choice Single Answer


Question
Collection of similar datatypes is called as
Correct Answer
Array
Your Answer
Array

Multiple Choice Multiple Answer


Question
We need two separate modes of operation to protect the operating system and all
other programs and their data from malfunctioning program. Which are those modes?
Correct Answer
User mode , Monitor mode
Your Answer
User mode , Monitor mode

Match The Following


Question
Correct Answer
Your Answer
Class Shape
Triangle, rectangle, circle, ellipse
Triangle, rectangle, circle, ellipse
Class Vehicle
Scooter, car, truck, tractor
Scooter, car, truck, tractor
Class Animal
Cat, dog, cow, tiger
Cat, dog, cow, tiger
Class Color
Red, yellow, blue, green
Red, yellow, blue, green

Select The Blank


Question
The virtual memory portion of the NT executive is the ________.
Correct Answer
Virtual memory manager
Your Answer
Virtual memory manager

True/False
Question
An asynchronous call returns immediately, without waiting for the I/O to complete.
Correct Answer
True
Your Answer
True

True/False
Question
Modem is a random-access device.
Correct Answer
False
Your Answer
False

Multiple Choice Multiple Answer


Question
A mailbox can be owned by :-
Correct Answer
Process , Operating system
Your Answer
Process , Operating system

Multiple Choice Multiple Answer


Question
The movement of information between levels of a storage hierarchy may be of two
types depending on the hardware design and the controlling operating system
software such as :-
Correct Answer
Explicit , Implicit
Your Answer
Explicit , Implicit

Select The Blank


Question
In windows NT, the ________ facility is used to pass requests and results between
client and server processes within a single machine.
Correct Answer
Local-procedure-call
Your Answer
Remote-procedure-call

True/False
Question
A major security problem for operating system is authentication.
Correct Answer
True
Your Answer
True

True/False
Question
In a blocking system call, the application is moved from the OS's run queue to a
wait queue.
Correct Answer
True
Your Answer
True

True/False
Question
Device speeds range from a few bytes per second to a few gigabytes per second.
Correct Answer
True
Your Answer
True

Multiple Choice Multiple Answer


Question
Various storage systems available possesses which two characteristics?
Correct Answer
Volatile , Non-volatile
Your Answer
Volatile , Non-volatile

Match The Following


Question
Correct Answer
Your Answer
We can define abstract operation on abstract data
Data abstraction
Data abstraction
Process of sharing properties of the higher level object or class
Inheritance
Inheritance
Ability to inherit attributes and methods from 2 or more objects or classes
Multiple inheritance
Multiple inheritance
Ability to send a message to several objects and to allow receiving object to
respond method specified on the object.
Ploymorphism
Ploymorphism

Multiple Choice Single Answer


Question
As process enter the system, they are put into :-
Correct Answer
Job queue
Your Answer
Job queue

Multiple Choice Multiple Answer


Question
The role of the operating system in computer I/O is to :-
Correct Answer
Manage I/O operation and devices , Control I/O operation and devices
Your Answer
Manage I/O operation and devices , Control I/O operation and devices

Select The Blank


Question
The ________ is a layer of software that hides hardware differences from upper
levels of the operating system.
Correct Answer
Hardware abstraction layer
Your Answer
Hardware abstraction layer

Select The Blank


Question
A ________ is a computer or router that sits between the trusted and untrusted
systems.
Correct Answer
Firewall
Your Answer
Firewall

Multiple Choice Multiple Answer


Question
The Moriss Internet Worm was made up of which of the two programs?
Correct Answer
Grappling hook program , Main program
Your Answer
Grappling hook program , Main program

Multiple Choice Multiple Answer


Question
In UNIX, a device is distinguished by two things, which are :-
Correct Answer
Device-class , Device number
Your Answer
Device-class , Device number

Multiple Choice Single Answer


Question
In general , the access matrix will be :-
Correct Answer
Sparse
Your Answer
Sparse

True/False
Question
Applications normally access block devices through a file system interface.
Correct Answer
True
Your Answer
True

Multiple Choice Multiple Answer


Question
User thread libraries include :-
Correct Answer
POSIX Pthreads , Mach C-threads , Solaris threads
Your Answer
POSIX Pthreads , Mach C-threads , Solaris threads

Select The Blank


Question
The positioning time sometimes called the ________.
Correct Answer
Random-access time
Your Answer
Random-access time

Multiple Choice Single Answer


Question
The concept of OOPS was first introduced in
Correct Answer
Simula Language
Your Answer
Simula Language

Select The Blank


Question
________ passwords prevent improper authentication due to password exposure.
Correct Answer
One-time
Your Answer
One-time

Multiple Choice Single Answer


Question
The linking of procedure call to the code to be executed in response to that call
is referred as
Correct Answer
Binding
Your Answer
Binding
Posted by MindGrill at 6:47 AM 0 comments Links to this post
Labels: Operating System
Operating System - 2

LIST OF ATTEMPTED QUESTIONS AND ANSWERS

Multiple Choice Multiple Answer


Question
locate the transmission devices :-
Correct Answer
Network cards , Modems
Your Answer
Tapes , Network cards , Modems

True/False
Question
The user process issues a network I/O system call to send the character to the
remote machine.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer


Question
The process by which objects of one class acquire properties of objects of other
class is called
Correct Answer
Inheritance
Your Answer
Inheritance

True/False
Question
Windows NT uses a message passing implementation for I/O.
Correct Answer
True
Your Answer
True

Multiple Choice Multiple Answer


Question
We need two separate modes of operation to protect the operating system and all
other programs and their data from malfunctioning program. Which are those modes?
Correct Answer
User mode , Monitor mode
Your Answer
User mode , Monitor mode

Match The Following


Question
Correct Answer
Your Answer
Round-robin
Time quantum
Time quantum
First-come First-served
First come job
First come job
Shortest job
Shortest job
Shortest job
Priority
Highest priority job
Highest priority job

Multiple Choice Single Answer


Question
The segment is :-
Correct Answer
Logical entity
Your Answer
Logical entity

Multiple Choice Single Answer


Question
In UNIX, decisions regarding which process to swap in or out are made by whom?
Correct Answer
Swapper
Your Answer
Memory handler

Select The Blank


Question
A ________ is a client-server mechanism that enables an application on one machine
to make a procedure call to code on another machine.
Correct Answer
Remote-procedure-call
Your Answer
Remote-procedure-call

Multiple Choice Single Answer


Question
When each process that wants to communicate must explicitly name the recipient or
sender of the communication, then such communication is called as :-
Correct Answer
Direct communication
Your Answer
Indirect communication

Select The Blank


Question
In Linux, the allocator uses a ________ algorithm to keep track of available
physical pages.
Correct Answer
Buddy-heap
Your Answer
Binary-search

Multiple Choice Single Answer


Question
What does the rows of the access matrix represents?
Correct Answer
Domains
Your Answer
Domains

Multiple Choice Single Answer


Question
Every change in policy requires a change in the underlying :-
Correct Answer
Mechanism
Your Answer
System

Select The Blank


Question
A ________ in NT is an object that provides a uniform interface for files, whether
they are local or remote.
Correct Answer
Redirector
Your Answer
Domain

Multiple Choice Multiple Answer


Question
In Solaris 2, user-level threads may be:-
Correct Answer
Bound , Unbound
Your Answer
Bound , Unbound

Multiple Choice Multiple Answer


Question
An audit log records which things about an object ?
Correct Answer
Time , User , Type of access
Your Answer
Time , User , Type of access

Multiple Choice Multiple Answer


Question
One-to-one model is supported by following systems :-
Correct Answer
Windows NT , OS/2
Your Answer
OS/2 , Windows NT

Multiple Choice Multiple Answer


Question
To protect the system, we must take security measures at two levels, such as :-
Correct Answer
Physical level , Human level
Your Answer
Human level , Global level

Multiple Choice Single Answer


Question
If the process is waiting for some event to occur then it is said to be in :-
Correct Answer
Waiting state
Your Answer
Waiting state

Multiple Choice Single Answer


Question
A common representation for a discussion of process scheduling is a :-
Correct Answer
Queuing diagram
Your Answer
Process state diagram

True/False
Question
At Physical level, the site or sites containing the computer systems must be
physically secured against armed or surreptitious entry by intruders.
Correct Answer
True
Your Answer
True

Select The Blank


Question
When you express user-system interaction, the scenario in the model is called
________
Correct Answer
Case model
Your Answer
Case model

True/False
Question
Data transfer from cache to CPU and registers is usually a software function, with
little operating system intervention.
Correct Answer
False
Your Answer
True

True/False
Question
A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .
Correct Answer
False
Your Answer
False

Multiple Choice Single Answer


Question
Polymorphism means ability to take
Correct Answer
More than one form
Your Answer
More than one form

True/False
Question
Aging algorithm is based on LRU.
Correct Answer
True
Your Answer
True

Select The Blank


Question
The virtual memory portion of the NT executive is the ________.
Correct Answer
Virtual memory manager
Your Answer
Virtual memory manager

Multiple Choice Multiple Answer


Question
There are two types of Message passing, they are :-
Correct Answer
Synchronous , Asynchronous
Your Answer
Synchronous , Asynchronous

Select The Blank


Question
Web servers use the ________ protocol to communicate with web browsers.
Correct Answer
http
Your Answer
http

Multiple Choice Multiple Answer


Question
The security of a system can be improved by two management techniques, such as :-
Correct Answer
Threat monitoring , Audit Log
Your Answer
Audit Log , Threat finding

Select The Blank


Question
The concept of protection levels and call gates were pioneered in MULTICS, where
they were viewed as protection ________.
Correct Answer
Ring
Your Answer
Ring

True/False
Question
We say that a system is secure if its resources are used and accessed as intended
under all circumstances.
Correct Answer
True
Your Answer
True

Select The Blank


Question
The ________ controller is the controller at the computer end of the bus.
Correct Answer
Host
Your Answer
Cpu

Multiple Choice Multiple Answer


Question
In Linux, the paging system can be divided into sections, namely:-
Correct Answer
Policy algorithm , Paging mechanism
Your Answer
Policy algorithm , Paging mechanism

True/False
Question
Keyboard is a sharable device.
Correct Answer
True
Your Answer
False

True/False
Question
Transfer of data from disk to memory is usually controlled by the operating
system.
Correct Answer
True
Your Answer
True

True/False
Question
Prototyping not only helps to build a quality design but also enables the designer
to build the system decremantally.
Correct Answer
False
Your Answer
True

Select The Blank


Question
The UNIX system uses ________ to avoid the necessity of keeping its password list
secret.
Correct Answer
Encryption
Your Answer
Encryption

Match The Following


Question
Correct Answer
Your Answer
Read-write devices
Disks
Disks
Dedicated devices
Tape
CD-ROM
Read-only devices
CD-ROM
Tape
Write-only devices
Graphics controller
Keyboard

Multiple Choice Single Answer


Question
A procedure call, request to execute a method is termed as
Correct Answer
Message
Your Answer
Message

Select The Blank


Question
Context switch times are highly dependent on ________ support.
Correct Answer
Hardware
Your Answer
Hardware

Multiple Choice Multiple Answer


Question
Two main jobs of a computer are :-
Correct Answer
I/O , Processing
Your Answer
I/O , Processing

Multiple Choice Single Answer


Question
The 4.3BSD operating system is the version of :-
Correct Answer
UNIX
Your Answer
UNIX

Multiple Choice Single Answer


Question
The number of processes that are completed per time unit is called as:-
Correct Answer
Throughput of system
Your Answer
Throughput of system

Multiple Choice Multiple Answer


Question
Once the I/O is started , which two courses of action are possible?
Correct Answer
Synchronous I/O , Asynchronous I/O , Simple I/O
Your Answer
Synchronous I/O , Asynchronous I/O

Multiple Choice Multiple Answer


Question
Security violations of the system can be categorized as :-
Correct Answer
Malicious , Accidental
Your Answer
Malicious , Accidental

Select The Blank


Question
A process migrates between the various ________ throughout its lifetime.
Correct Answer
Scheduling queues
Your Answer
Scheduling queues
Posted by MindGrill at 6:46 AM 0 comments Links to this post
Labels: Operating System
Operating System - 1

LIST OF ATTEMPTED QUESTIONS AND ANSWERS

Multiple Choice Multiple Answer


Question
Various storage systems available possesses which two characteristics?
Correct Answer
Volatile , Non-volatile
Your Answer
Volatile , Non-volatile

Multiple Choice Multiple Answer


Question
Most CPUs have two interrupt request lines. Which are they?
Correct Answer
Maskable , Non maskable
Your Answer
Maskable , Non maskable

Select The Blank


Question
A ________ is a group of NT server machines that share a common security policy
and user databases.
Correct Answer
Domain
Your Answer
Domain

Select The Blank


Question
An ________ is a dedicated, special purpose CPU found in mainframes and in other
high-end systems.
Correct Answer
I/O channel
Your Answer
I/O channel

Multiple Choice Single Answer


Question
The CPU is allocated to the selected process by the :-
Correct Answer
Dispatcher
Your Answer
Dispatcher

Multiple Choice Single Answer


Question
In JAVA , the derived class is known as
Correct Answer
Subclass
Your Answer
Subclass

Select The Blank


Question
The Pentium supports four protection levels with ________ as least privileged
level.
Correct Answer
3
Your Answer
3

Select The Blank


Question
________ of an object remains unchanged even though its state and properties
change.
Correct Answer
Identity
Your Answer
Identity

True/False
Question
One way to achieve portability is to write software in standard version of high
level language and to develop portable system and application software .
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer


Question
Software may trigger an interrupt by executing a special operation called :-
Correct Answer
System call
Your Answer
System call

Multiple Choice Single Answer


Question
In Object Oriented technology following expression is appropriate
Correct Answer
object=data+menthods
Your Answer
object=data+menthods

Multiple Choice Multiple Answer


Question
The two versions of NT are :
Correct Answer
WindowsNT workstations , WindowsNT server
Your Answer
WindowsNT workstations , WindowsNT server

Match The Following


Question
Correct Answer
Your Answer
We can define abstract operation on abstract data
Data abstraction
Data abstraction
Process of sharing properties of the higher level object or class
Inheritance
Inheritance
Ability to inherit attributes and methods from 2 or more objects or classes
Multiple inheritance
Multiple inheritance
Ability to send a message to several objects and to allow receiving object to
respond method specified on the object.
Ploymorphism
Ploymorphism

Select The Blank


Question
A________ is a memory area that stores data while they are transferred between two
devices or between a device and an application.
Correct Answer
Buffer
Your Answer
Buffer

True/False
Question
In Public Key Encryption, each user has both a public and a private key.
Correct Answer
True
Your Answer
True

True/False
Question
Data transfer from cache to CPU and registers is usually a software function, with
little operating system intervention.
Correct Answer
False
Your Answer
False

Multiple Choice Multiple Answer


Question
Liner address is divided into fields like :-
Correct Answer
Dir , Page , Offset
Your Answer
Dir , Page , Offset

Multiple Choice Single Answer


Question
IPC is particularly useful in a :-
Correct Answer
Distributed environment
Your Answer
Internet environment

Multiple Choice Single Answer


Question
IPC provides a mechanism to allow processes to communicate and to synchronize
their actions without sharing the same :-
Correct Answer
Address space
Your Answer
Semaphore

Multiple Choice Multiple Answer


Question
Supervisor mode is also known as :-
Correct Answer
Privileged mode , Monitor mode , System mode
Your Answer
System mode , Privileged mode , Monitor mode

Select The Blank


Question
Assuming that the segment is in memory and the offset is in range, the Pentium
then adds the ________ bit base field in the descriptor to the offset to form
linear address.
Correct Answer
32
Your Answer
32

Multiple Choice Multiple Answer


Question
In Solaris 2, user-level threads may be:-
Correct Answer
Bound , Unbound
Your Answer
Bound , Unbound

Multiple Choice Single Answer


Question
The concept of OOPS was first introduced in
Correct Answer
Simula Language
Your Answer
Simula Language

True/False
Question
At system boot time, the hardware starts in monitor mode.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
The main difference between structure and class is
Correct Answer
Structure does not support OOPS Class Supports OOPS.
Your Answer
Structure does not support OOPS Class Supports OOPS.

Select The Blank


Question
A ________ controller is built into each disk drive.
Correct Answer
Disk
Your Answer
Disk

Multiple Choice Single Answer


Question
If a class fruit has object mango, the relationship is expressed as :
Correct Answer
Fruit mango
Your Answer
Fruit mango

True/False
Question
The hardware allows privileged instructions to be executed in only user mode.
Correct Answer
False
Your Answer
False

Multiple Choice Multiple Answer


Question
An object type in windows NT is a system defined data type that has two things
associated with it, which are they?
Correct Answer
Set of attributes , Set of methods
Your Answer
Set of attributes , Set of methods

Select The Blank


Question
The kernel module that controls a device is a ________ .
Correct Answer
Device driver
Your Answer
Device driver

Multiple Choice Single Answer


Question
If process P and Q want to communicate, they must send messages to and receive
messages from each other: Thus link established between two process is known as :-
Correct Answer
Communication link
Your Answer
Direct link
Multiple Choice Multiple Answer
Question
Dispatcher functions involves the following :-
Correct Answer
Switching context , Switching to user mode
Your Answer
Switching context , Switching to user mode

Select The Blank


Question
In windows NT, the ________ facility is used to pass requests and results between
client and server processes within a single machine.
Correct Answer
Local-procedure-call
Your Answer
Local-procedure-call

True/False
Question
If some of the pages are shared with other process, the pages in memory and on the
disk can only be released when the last process using them has terminated.
Correct Answer
True
Your Answer
True

Select The Blank


Question
The Solaris developers reimplemented the ________ using in-kernel thread to
eliminate the context switch involved in moving each character between daemons and
the kernel.
Correct Answer
Telnet daemon
Your Answer
Context-switch daemon

Multiple Choice Single Answer


Question
Modern operating systems are :-
Correct Answer
Interrupt driven
Your Answer
Interrupt driven

Match The Following


Question
Correct Answer
Your Answer
Bounded-buffer
Fixed size buffer
Fixed size buffer
Producer
Produces process
Produces process
Consumer
Consumes process
Consumes process
Unbounded-buffer
No limit on size of buffer
No limit on size of buffer

Multiple Choice Multiple Answer


Question
In Linux, the paging system can be divided into sections, namely:-
Correct Answer
Policy algorithm , Paging mechanism
Your Answer
Policy algorithm , Paging mechanism

Multiple Choice Single Answer


Question
A process data section contains:-
Correct Answer
Global variables
Your Answer
Temporary data

True/False
Question
OOSAD approach is applicable only to stable systems.
Correct Answer
False
Your Answer
False

True/False
Question
Segment length may change during execution.
Correct Answer
True
Your Answer
True

Multiple Choice Multiple Answer


Question
The movement of information between levels of a storage hierarchy may be of two
types depending on the hardware design and the controlling operating system
software such as :-
Correct Answer
Explicit , Implicit
Your Answer
Explicit , Implicit

Multiple Choice Single Answer


Question
Collection of similar datatypes is called as
Correct Answer
Array
Your Answer
Array

True/False
Question
At Human level, user must be screened carefully so that the chance of authorizing
a user who then gives access to an intruder is reduced.
Correct Answer
True
Your Answer
True

True/False
Question
The user process issues a network I/O system call to send the character to the
remote machine.
Correct Answer
True
Your Answer
False

Multiple Choice Multiple Answer


Question
Most computers have hardware clocks and timers that provide three basic functions,
such as :-
Correct Answer
Give the current time , Give the elapsed time , Set a timer to trigger operation
at certain time
Your Answer
Give the current time , Give the elapsed time , Set a timer to trigger operation
at certain time

Multiple Choice Single Answer


Question
C++ is basically a procedural language having extension of
Correct Answer
Object Oriented technology
Your Answer
Object Oriented technology
Posted by MindGrill at 6:45 AM 0 comments Links to this post
Labels: Operating System

You might also like