SCDL - Operating Systems
-
Upload
api-3733148 -
Category
Documents
-
view
128 -
download
1
Transcript of SCDL - Operating Systems
SCDL – 3rd Semester – Operating Systems
LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Multiple Choice Multiple Answer Question A mailbox can be owned by :-
Correct Answer
Operating system , Process
Your Answer User , Process
Multiple Choice Single Answer Question Software may trigger an interrupt by executing a special operation called :-
Correct Answer
System call
Your Answer Interrupt call
Match The FollowingQuestion Correct Answer Your Answer
User mode Mode bit 1 Monitor mode
Serial port Modem Modem
Parallel port Printer Printer
Privileged instructions Monitor mode UPS
Multiple Choice Multiple Answer Question The movement of information between levels of a storage hierarchy may be of two
types depending on the hardware design and the controlling operating system software such as :-
Correct Answer
Explicit , Implicit
Your Answer Implicit , Indirect
Multiple Choice Multiple Answer Question What are the ways in which a request for kernel-mode execution can occur in Linux?
Correct Answer
Explicitly , Implicitly
Your Answer Implicitly , Function call
Multiple Choice Multiple Answer Question Supervisor mode is also known as :-
Correct Answer
System mode , Privileged mode , Monitor mode
Your Answer Privileged mode , Special mode
Page 1 of 72
SCDL – 3rd Semester – Operating Systems
Multiple Choice Multiple Answer Question The role of the operating system in computer I/O is to :-
Correct Answer
Manage I/O operation and devices , Control I/O operation and devices
Your Answer Manage I/O operation and devices , I/O processing
True/False Question In UNIX, first two names in every directory are "." and ".."
Correct Answer
True
Your Answer False
Multiple Choice Multiple Answer Question Various storage systems available possesses which two characteristics?
Correct Answer
Volatile , Non-volatile
Your Answer Primary storage , Secondary storage
Multiple Choice Single Answer Question A program in execution is:-
Correct Answer
Process
Your Answer Operation
Select The Blank Question In some operating system, spooling is handled by an ________ .
Correct Answer
In-kernel thread
Your Answer In-kernel thread
Select The Blank Question The hardware to measure elapsed time to trigger operations is called a ________.
Correct Answer
Programmable interval timer
Your Answer Elapsed timer
True/False Question NFU algorithm requires a software counter associated with each page initially zero.
Correct True
Page 2 of 72
SCDL – 3rd Semester – Operating Systems
Answer Your Answer True
True/False Question Volatile storage loses its contents when the power to the device is removed.
Correct Answer
True
Your Answer False
Match The FollowingQuestion Correct Answer Your Answer
MFT Multi programming with fixed task
Multi programming with fixed task
RAM Volatile memory Volatile memory
ROM Read only memory Read only memory
BIOS Basic input output system Basic input output system
Select The Blank Question ________ includes disks and tapes.
Correct Answer
Block devices
Your Answer Socket interfaces
Select The Blank Question The process could create a new ________ and wait for its termination.
Correct Answer
Sub process
Your Answer Child
True/False Question The cipher text can be stored in a readable file or transmitted over unprotected
channels. Correct Answer
True
Your Answer True
Select The Blank Question The virtual memory portion of the NT executive is the ________.
Correct Answer
Virtual memory manager
Page 3 of 72
SCDL – 3rd Semester – Operating Systems
Your Answer Page-memory manager
Multiple Choice Single Answer Question The main difference between structure and class is
Correct Answer
Structure does not support OOPS Class Supports OOPS.
Your Answer Structure is used in OOPS. Classes are used in procedural programs.
Multiple Choice Multiple Answer Question Find out different types of I/O buses :-
Correct Answer
EIDE , SCSI
Your Answer EIDE , SCSI
Select The Blank Question ________ passwords prevent improper authentication due to password exposure.
Correct Answer
One-time
Your Answer Encrypted
Select The Blank Question Like worms, ________ are designed to spread into other programs and can wreak
havoc in a system. Correct Answer
Viruses
Your Answer Trojan horses
Select The Blank Question A ________ in NT is an object that provides a uniform interface for files, whether
they are local or remote. Correct Answer
Redirector
Your Answer Director
Select The Blank Question One interface that is available in many operating systems, including UNIX and
WindowsNT, is the network ________ interface. Correct Answer
Socket
Your Answer Device
True/False Question In Windows NT, kernel can be paged out of memory and its executions can be
Page 4 of 72
SCDL – 3rd Semester – Operating Systems
preempted. Correct Answer
False
Your Answer True
Multiple Choice Single Answer Question The insulation of data from direct access by the program is known as :
Correct Answer
Data hiding
Your Answer Abstraction
Multiple Choice Single Answer Question The concept of OOPS was first introduced in
Correct Answer
Simula Language
Your Answer Simula Language
Multiple Choice Multiple Answer Question locate the transmission devices :-
Correct Answer
Network cards , Modems
Your Answer Network cards , Modems
Multiple Choice Single Answer Question How big is a class object?
Correct Answer
Is as big as sum of the sizes of its member variables
Your Answer Is as big as sum of the sizes of its member variables
Multiple Choice Single Answer Question The system call checks the arguments given by the application, builds a data
structure to convey the arguments to the kernel and then executes a special instruction called as :-
Correct Answer
Software interrupt
Your Answer Special system call
Multiple Choice Multiple Answer Question Security violations of the system can be categorized as :-
Correct Answer
Malicious , Accidental
Page 5 of 72
SCDL – 3rd Semester – Operating Systems
Your Answer Unauthorized , Authorized
Select The Blank Question Most computers have ________ clocks and timers.
Correct Answer
Hardware
Your Answer In-built
Multiple Choice Single Answer Question A domain is a collection of :-
Correct Answer
Access rights
Your Answer Objects
True/False Question In paging the total address space can exceed the size of physical memory
Correct Answer
True
Your Answer True
Multiple Choice Single Answer Question Objects may communicate with each other through
Correct Answer
Methods
Your Answer Methods
Multiple Choice Single Answer Question A system consists of collection of :-
Correct Answer
Processes
Your Answer Processes
Multiple Choice Multiple Answer Question An audit log records which things about an object ?
Correct Answer
Time , User , Type of access
Your Answer Time , Type of access
Multiple Choice Single Answer Question It has been said that Pascal and C programs are collections of procedures and C++
Page 6 of 72
SCDL – 3rd Semester – Operating Systems
programs are collections of Correct Answer
Classes
Your Answer Classes
Select The Blank Question OOSAD begins with identification of actors, what activities they perform and building
________ model for the function. Correct Answer
Use-case
Your Answer Use-case
Multiple Choice Single Answer Question The smallest addressable portion of a disk is :-
Correct Answer
Sector
Your Answer Sector
True/False Question OOSAD approach is applicable only to stable systems.
Correct Answer
False
Your Answer True
True/False Question To perform a disk I/O operation, the computer places a command into the host
controller, typically using memory-mapped I/O ports. Correct Answer
True
Your Answer True
Multiple Choice Single Answer Question The number of processes that are completed per time unit is called as:-
Correct Answer
Throughput of system
Your Answer Efficiency of system
Multiple Choice Single Answer Question In MULTICS TLB address of 'n', the most recently referenced pages are kept, where
'n' can have a value :- Correct Answer
16
Your Answer 8
Page 7 of 72
SCDL – 3rd Semester – Operating Systems
True/False Question The job of I/O channel is to offload I/O work from the main CPU.
Correct Answer
True
Your Answer False
LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Multiple Choice Single Answer Question Each object is associated with the data of type class with which they are created. A
class is thus a collection of objects of Correct Answer
Similar type
Your Answer Similar type
Multiple Choice Single Answer Question C++ is also named as
Correct Answer
C with classes
Your Answer Visual C++
Select The Blank Question The ________ of a process is represented in the PCB of a process.
Correct Answer
Context
Your Answer Control
Multiple Choice Multiple Answer Question In windows NT, naming of objects is of two types :-
Correct Answer
Permanent name , Temporary name
Your Answer Permanent name , Object-primary name
Match The FollowingQuestion Correct Answer Your Answer
Class Shape Triangle, rectangle, circle, ellipse
Triangle, rectangle, circle, ellipse
Class Vehicle Scooter, car, truck, tractor Scooter, car, truck, tractor
Class Animal Cat, dog, cow, tiger Cat, dog, cow, tiger
Page 8 of 72
SCDL – 3rd Semester – Operating Systems
Class Color Red, yellow, blue, green Red, yellow, blue, green
Multiple Choice Multiple Answer Question Computer system consists of :-
Correct Answer
CPU , Multiple device controller
Your Answer CPU , Multiple device controller
Multiple Choice Single Answer Question In JAVA , the derived class is known as
Correct Answer
Subclass
Your Answer Subclass
Select The Blank Question To make as interval call, the CALL instruction must contain ________.
Correct Answer
Selector
Your Answer Address
True/False Question In Lock-key mechanism, users are allowed to examine or modify the list of keys or
locks directly. Correct Answer
False
Your Answer True
Multiple Choice Single Answer Question A major problem with the Priority scheduling algorithm is :-
Correct Answer
Starvation
Your Answer CPU time
Select The Blank Question ________ of an object remains unchanged even though its state and properties
change. Correct Answer
Identity
Your Answer Identity
Multiple Choice Single Answer Question The process by which objects of one class acquire properties of objects of other
Page 9 of 72
SCDL – 3rd Semester – Operating Systems
class is called Correct Answer
Inheritance
Your Answer Polymorphism
Select The Blank Question ________allows us to define abstract operations on abstract data.
Correct Answer
Data abstraction
Your Answer Data abstraction
True/False Question An asynchronous call returns immediately, without waiting for the I/O to complete.
Correct Answer
True
Your Answer True
Multiple Choice Multiple Answer Question locate the storage devices from the following :-
Correct Answer
Disks , Tapes
Your Answer Disks , Tapes
Multiple Choice Single Answer Question Mango, apple and orange are members of class
Correct Answer
Fruit
Your Answer Fruit
Multiple Choice Single Answer Question The pure Object Oriented language is
Correct Answer
Java
Your Answer C++
Select The Blank Question Web servers use the ________ protocol to communicate with web browsers.
Correct Answer
http
Your Answer http
Page 10 of 72
SCDL – 3rd Semester – Operating Systems
Select The Blank Question ________ is the ability to handle error conditions, including the ability of the
operating system to protect itself and its users from defective or malicious software. Correct Answer
Reliability
Your Answer Security
Multiple Choice Multiple Answer Question One-to-one model is supported by following systems :-
Correct Answer
Windows NT , OS/2
Your Answer Solaris , Windows NT
Multiple Choice Single Answer Question Collection of similar datatypes is called as
Correct Answer
Array
Your Answer Array
Multiple Choice Single Answer Question C++ is basically a procedural language having extension of
Correct Answer
Object Oriented technology
Your Answer Graphic user interface
Multiple Choice Single Answer Question In Object Oriented technology following expression is appropriate
Correct Answer
object=data+menthods
Your Answer method= data + object
Multiple Choice Single Answer Question If a class fruit has object mango, the relationship is expressed as :
Correct Answer
Fruit mango
Your Answer Fruit mango
Multiple Choice Multiple Answer Question Find out the basic I/O hardware elements from the following :-
Correct Ports , Buses , Device controllers
Page 11 of 72
SCDL – 3rd Semester – Operating Systems
Answer Your Answer Ports , Buses , Device controllers
Multiple Choice Single Answer Question Model of protection can be viewed abstractly as a matrix which is known as :-
Correct Answer
Access matrix
Your Answer Access matrix
Multiple Choice Single Answer Question The 4.3BSD operating system is the version of :-
Correct Answer
UNIX
Your Answer UNIX
True/False Question When application issues a blocking I/O system call, the request is placed on the
queue for that device. Correct Answer
True
Your Answer False
Select The Blank Question ________ is defined as a cooperation between object codes produced by different
software vendors & written in different programming languages. Correct Answer
Interoperability
Your Answer Interoperability
True/False Question Linux is a multi-user, multitasking system with a full set of UNIX-compatible tools.
Correct Answer
True
Your Answer True
Multiple Choice Single Answer Question DMA stands for :-
Correct Answer
Direct Memory Access
Your Answer Direct Memory Access
Match The Following
Page 12 of 72
SCDL – 3rd Semester – Operating Systems
Question Correct Answer Your Answer
Light-Weight processes Thread Solaris process
Parent process Child process Unix process
Foreground processes Interactive processes Interactive processes
Background processes Batch processes Thread
Multiple Choice Multiple Answer Question Find out the human-interface devices :-
Correct Answer
Screen , Keyboard , Mouse
Your Answer Screen , Keyboard , Mouse
Select The Blank Question A process is ________ if it can affect or be affected by the other processes
executing in the system. Correct Answer
Cooperating
Your Answer Independent
Multiple Choice Multiple Answer Question Liner address is divided into fields like :-
Correct Answer
Dir , Page , Offset
Your Answer Dir , Page , File
True/False Question An I/O bound process spend more of its time doing I/O than it spends doing
computations. Correct Answer
True
Your Answer False
Multiple Choice Single Answer Question In some systems, if a process terminates, then all its children must also be
terminated. This phenomenon referred to as :- Correct Answer
Cascading termination
Your Answer Removing all
Multiple Choice Multiple Answer
Page 13 of 72
SCDL – 3rd Semester – Operating Systems
Question find out the services provided by kernel related to I/O :
Correct Answer
I/O Scheduling , Buffering , Spooling
Your Answer I/O Scheduling , Buffering , I/o subsystem
True/False Question The language Classic-Ada is not OOPL
Correct Answer
False
Your Answer True
Select The Blank Question In Linux, the allocator uses a ________ algorithm to keep track of available physical
pages. Correct Answer
Buddy-heap
Your Answer Sort-first
Select The Blank Question ________ describes segments local to each program, including its code, data, stack
etc. Correct Answer
LDT
Your Answer LDT
True/False Question A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .
Correct Answer
False
Your Answer False
True/False Question A copy of inode is kept in main memory while a file is open.
Correct Answer
True
Your Answer True
Multiple Choice Single Answer Question The separation of policy and mechanism is important for which purpose?
Correct Answer
Flexibility
Page 14 of 72
SCDL – 3rd Semester – Operating Systems
Your Answer Costing
Select The Blank Question A ________ is a group of NT server machines that share a common security policy
and user databases. Correct Answer
Domain
Your Answer Domain
Multiple Choice Single Answer Question If Dog derives from Mammal, and Mammal derives from Animal, then -
Correct Answer
Dog inherits Animal's functions and data
Your Answer Dog inherits Animal's functions and data
True/False Question Keyboard is a sharable device.
Correct Answer
True
Your Answer False
LIST OF ATTEMPTED QUESTIONS AND ANSWERS
True/False Question Prototyping is a tool to test the design of system
Correct Answer
True
Your Answer False
Multiple Choice Multiple Answer Question Kernel threads are generally :-
Correct Answer
Slower to create , Difficult to manage
Your Answer Difficult to manage , Faster than user thread , Faster to create
Multiple Choice Single Answer Question The concept of OOPS was first introduced in
Correct Answer
Simula Language
Page 15 of 72
SCDL – 3rd Semester – Operating Systems
Your Answer Simula Language
Multiple Choice Single Answer Question The insulation of data from direct access by the program is known as :
Correct Answer
Data hiding
Your Answer Abstraction
True/False
Question Many to Many model multiplexes many user level threads to a smaller or equal number of kernel threads.
Correct Answer
True
Your Answer True
Select The Blank Question Like worms, ________ are designed to spread into other programs and can wreak
havoc in a system. Correct Answer
Viruses
Your Answer Viruses
Multiple Choice Multiple Answer Question The two versions of NT are :
Correct Answer
WindowsNT workstations , WindowsNT server
Your Answer WindowsNT workstations , WindowsNT server
True/False Question A virus is a fragment of code embedded in a legitimate program
Correct Answer
True
Your Answer False
True/False Question An I/O bound process spend more of its time doing I/O than it spends doing
computations. Correct Answer
True
Your Answer True
Multiple Choice Single Answer Question It has been said that Pascal and C programs are collections of procedures and C++
Page 16 of 72
SCDL – 3rd Semester – Operating Systems
programs are collections of Correct Answer
Classes
Your Answer Classes
Multiple Choice Single Answer Question The process by which objects of one class acquire properties of objects of other
class is called Correct Answer
Inheritance
Your Answer Inheritance
Select The Blank Question A ________ is a buffer that holds output for a device such as printers.
Correct Answer
Spool
Your Answer Spool
Multiple Choice Single Answer Question C++ is basically a procedural language having extension of
Correct Answer
Object Oriented technology
Your Answer Object Oriented technology
True/False Question Object-oriented programming focuses on the integrated data and functionality as
discrete units that have both knowledge (data) and capabilities (functions). Procedural programs, on the other hand, focus on functions and how they act on data.
Correct Answer
True
Your Answer True
Multiple Choice Multiple Answer Question Most CPUs have two interrupt request lines. Which are they?
Correct Answer
Maskable , Non maskable
Your Answer Maskable , Non maskable
True/False Question The I/O scheduler rearranges the order of the queue to improve the overall system
efficiency and the average response time experienced by application Correct Answer
True
Page 17 of 72
SCDL – 3rd Semester – Operating Systems
Your Answer True
Multiple Choice Single Answer
Question How big is a class object?
Correct Answer
Is as big as sum of the sizes of its member variables
Your Answer Is as big as sum of the sizes of its member variables
Multiple Choice Single Answer Question In UNIX, files are organized in tree-structured :-
Correct Answer
Directories
Your Answer Directories
Multiple Choice Single Answer Question The number of processes that are completed per time unit is called as:-
Correct Answer
Throughput of system
Your Answer Throughput of system
Multiple Choice Multiple Answer Question There are two types of Message passing, they are :-
Correct Answer
Synchronous , Asynchronous
Your Answer Synchronous , Asynchronous
Multiple Choice Single Answer Question If Dog derives from Mammal, and Mammal derives from Animal, then -
Correct Answer
Dog inherits Animal's functions and data
Your Answer Dog inherits Animal's functions and data
Select The Blank Question The positioning time sometimes called the ________.
Correct Answer
Random-access time
Your Answer Seek time
Multiple Choice Single Answer
Page 18 of 72
SCDL – 3rd Semester – Operating Systems
Question Collection of similar datatypes is called as
Correct Answer
Array
Your Answer Array
Multiple Choice Single Answer Question The pure Object Oriented language is
Correct Answer
Java
Your Answer Java
Multiple Choice Multiple Answer Question To protect the system, we must take security measures at two levels, such as :-
Correct Answer
Physical level , Human level
Your Answer Local level , Global level
Select The Blank Question In some operating system, spooling is handled by an ________ .
Correct Answer
In-kernel thread
Your Answer User thread
Multiple Choice Multiple Answer Question Supervisor mode is also known as :-
Correct Answer
System mode , Privileged mode , Monitor mode
Your Answer Privileged mode , Monitor mode , Special mode
Match The FollowingQuestion Correct Answer Your Answer
Thread Light-weight process Light-weight process
Process PCB Thread library
User thread Thread library PCB
Kernel thread Operating system Operating system
Select The Blank Question The ________ of a process is represented in the PCB of a process.
Page 19 of 72
SCDL – 3rd Semester – Operating Systems
Correct Answer
Context
Your Answer Control
Select The Blank Question ________ is defined as a cooperation between object codes produced by different
software vendors & written in different programming languages. Correct Answer
Interoperability
Your Answer Interoperability
Multiple Choice Multiple Answer
Question In a uniprocessor system, there is :-
Correct Answer
Single processor , Single running process
Your Answer Single processor , Single running process
Multiple Choice Single Answer Question In UNIX operating system, each process is identified by its :-
Correct Answer
Process identifier
Your Answer Process identifier
Multiple Choice Single Answer Question As process enter the system, they are put into :-
Correct Answer
Job queue
Your Answer Job queue
Match The FollowingQuestion Correct Answer Your Answer
Algorithm where in it takes largest available hole
Worst fit Worst fit
The algorithm in which memory manager scans along the list of segments until it finds a hole that is big enough
First fit First fit
Algorithm in which keeps the track of suitable hole
Next fit Optimal fit
Algorithm which searches entire list and takes smallest hole that is adequate
Best fit Best fit
Page 20 of 72
SCDL – 3rd Semester – Operating Systems
True/False Question Linux is a multi-user, multitasking system with a full set of UNIX-compatible tools.
Correct Answer
True
Your Answer True
Multiple Choice Single Answer Question The main difference between structure and class is
Correct Answer
Structure does not support OOPS Class Supports OOPS.
Your Answer Structure does not support OOPS Class Supports OOPS.
Multiple Choice Multiple Answer Question Find out the basic I/O hardware elements from the following :-
Correct Answer
Ports , Buses , Device controllers
Your Answer Ports , Buses , Device controllers
Multiple Choice Single Answer Question The interval from the time of submission of a process to the time of completion is :-
Correct Answer
Turnaround time
Your Answer Completion time
True/False Question In Public Key Encryption, each user has both a public and a private key.
Correct Answer
True
Your Answer False
Multiple Choice Single Answer Question If the process is waiting to be assigned to CPU then it is said to be in :-
Correct Answer
Ready state
Your Answer Waiting state
Select The Blank Question A ________ controller is built into each disk drive.
Correct Answer
Disk
Page 21 of 72
SCDL – 3rd Semester – Operating Systems
Your Answer Disk
Multiple Choice Multiple Answer Question Linux presents standard interfaces to whom?
Correct Answer
Programmer , User
Your Answer Programmer , User , System administrator
True/False Question As an object-oriented systems NT uses objects for all its services and entities.
Correct Answer
True
Your Answer True
Multiple Choice Single Answer Question A procedure body implementing an operation is termed as
Correct Answer
Method
Your Answer Method
True/False Question Main Memory is a volatile storage device that loses its contents when power is
turned off. Correct Answer
True
Your Answer True
Multiple Choice Multiple Answer Question Once the I/O is started , which two courses of action are possible?
Correct Answer
Synchronous I/O , Asynchronous I/O , Simple I/O
Your Answer Waiting I/O , Simple I/O
Select The Blank Question ________ passwords prevent improper authentication due to password exposure.
Correct Answer
One-time
Your Answer Encrypted
Page 22 of 72
SCDL – 3rd Semester – Operating Systems
LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Select The Blank Question Web servers use the ________ protocol to communicate with web browsers.
Correct Answer
http
Your Answer http
True/False Question Cache-coherency is usually a software problem and handled above the operating
system level. Correct Answer
False
Your Answer True
Multiple Choice Multiple Answer Question Two main jobs of a computer are :-
Correct Answer
I/O , Processing
Your Answer I/O , Processing
Multiple Choice Multiple Answer Question What are the ways in which a request for kernel-mode execution can occur in
Linux? Correct Answer
Explicitly , Implicitly
Your Answer Explicitly , Implicitly
Select The Blank Question If the user-supplied password matches the password stored in the system, the
system assumes that the user is ________. Correct Answer
Legitimate
Your Answer Legitimate
True/False Question Single-indirect block is an index block which contains data of the files to which it
points. Correct Answer
False
Page 23 of 72
SCDL – 3rd Semester – Operating Systems
Your Answer True
True/False Question Volatile storage loses its contents when the power to the device is removed.
Correct Answer
True
Your Answer True
Multiple Choice Single Answer
Question SCSI stands for :-
Correct Answer
Small Computer-Systems Interface
Your Answer System Call-System Interrupt
Multiple Choice Multiple Answer Question Which are the Division D security systems ?
Correct Answer
Windows 3.1 , MS-DOS
Your Answer Windows NT , UNIX
Select The Blank Question static binding allows to hold certain properties fixed and rigid, whereas ________
binding allows object to behave as per conditions emerge. Correct Answer
Dynamic
Your Answer Dynamic
Multiple Choice Multiple Answer
Question What are the components to memory management under Linux?
Correct Answer
Physical memory manager , Virtual memory manager
Your Answer Physical memory manager , Virtual memory manager
Multiple Choice Single Answer Question The First version of UNIX was developed in 1969 by Ken Thompson of the
Research Group at :- Correct Answer
Bell Laboratories
Your Answer Bell Laboratories
True/False
Question XML is a meta data language developed to specify data with a goal of improving interoperatability of different data sources.
Page 24 of 72
SCDL – 3rd Semester – Operating Systems
Correct Answer
True
Your Answer True
True/False Question One way to achieve portability is to write software in standard version of high level
language and to develop portable system and application software . Correct Answer
True
Your Answer True
Multiple Choice Single Answer
Question C++ is basically a procedural language having extension of
Correct Answer
Object Oriented technology
Your Answer Object Oriented technology
Select The Blank Question The ________ of a process is represented in the PCB of a process.
Correct Answer
Context
Your Answer Context
Select The Blank Question In windows NT, the ________ facility is used to pass requests and results between
client and server processes within a single machine. Correct Answer
Local-procedure-call
Your Answer Remote-procedure-call
Multiple Choice Single Answer Question In how many number of classes does the NRU algorithm divides pages, depending
on the state of R and M? Correct Answer
4
Your Answer 4
Multiple Choice Multiple Answer Question When memory reference occurs in MULTICS the things which takes place are :-
Correct Answer
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address
Your Answer Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is
Page 25 of 72
SCDL – 3rd Semester – Operating Systems
examined , Offset is added to the page origin to give main memory address
Multiple Choice Multiple Answer Question Supervisor mode is also known as :-
Correct Answer
System mode , Privileged mode , Monitor mode
Your Answer System mode , Privileged mode , Monitor mode
Multiple Choice Single Answer Question How big is a class object?
Correct Answer
Is as big as sum of the sizes of its member variables
Your Answer Is as big as sum of the sizes of its member variables
Multiple Choice Multiple Answer
Question The device number consists of which two parts in UNIX?
Correct Answer
Major device number , Minor device number
Your Answer Major device number , Minor device number
Select The Blank Question The context switch time is pure ________, because system does no useful work
while switching. Correct Answer
Overhead
Your Answer Wastage
Multiple Choice Multiple Answer Question In Solaris 2, user-level threads may be:-
Correct Answer
Bound , Unbound
Your Answer Bound , Unbound
Match The FollowingQuestion Correct Answer Your Answer
Random-access devices CD-ROM CD-ROM
Character devices. Terminal Keyboard
Block devices Disk Tape
Sequential devices Modem Terminal
Page 26 of 72
SCDL – 3rd Semester – Operating Systems
Multiple Choice Single Answer Question The main difference between structure and class is
Correct Answer
Structure does not support OOPS Class Supports OOPS.
Your Answer Structure does not support OOPS Class Supports OOPS.
True/False
Question Object-oriented programming focuses on the integrated data and functionality as discrete units that have both knowledge (data) and capabilities (functions). Procedural programs, on the other hand, focus on functions and how they act on data.
Correct Answer
True
Your Answer True
Select The Blank
Question A keyboard is an example of device that is accessed through a ________ interface.
Correct Answer
Character stream
Your Answer Character stream
Multiple Choice Multiple Answer Question Find out the CPU scheduling algorithms from these options :-
Correct Answer
FCFS , RR , SJF
Your Answer FCFS , RR , SJF
Multiple Choice Single Answer Question Main Memory of computer program is also called as :-
Correct Answer
RAM
Your Answer RAM
Multiple Choice Multiple Answer Question The security of a system can be improved by two management techniques, such
as :- Correct Answer
Threat monitoring , Audit Log
Your Answer Threat monitoring , Audit Log
Multiple Choice Single Answer
Page 27 of 72
SCDL – 3rd Semester – Operating Systems
Question The separation of policy and mechanism is important for which purpose?
Correct Answer
Flexibility
Your Answer Flexibility
Match The FollowingQuestion Correct Answer Your Answer
Trap in which program tries to use unmapped page
Page fault Page fault
Memory Management Unit MMU MMU
Smaller units in which virtual address space is divided
Pages Pages
Units in physical memory corresponding to pages in virtual memory
Page frame Page frame
True/False Question A non-blocking call does not halt the execution of the application for an extended
time. Correct Answer
True
Your Answer True
True/False Question Windows NT uses a message passing implementation for I/O.
Correct Answer
True
Your Answer True
Multiple Choice Multiple Answer Question Kernel threads are generally :-
Correct Answer
Slower to create , Difficult to manage
Your Answer Slower to create , Difficult to manage
Multiple Choice Single Answer Question The long-term scheduler controls the :-
Correct Answer
Degree of multiprogramming
Your Answer Degree of multiprogramming
Multiple Choice Single Answer
Page 28 of 72
SCDL – 3rd Semester – Operating Systems
Question Objects may communicate with each other through
Correct Answer
Methods
Your Answer Methods
Select The Blank Question In queuing diagram, the arrow indicates the flow of ________ in the system.
Correct Answer
Processes
Your Answer Queue
Multiple Choice Single Answer Question If Dog derives from Mammal, and Mammal derives from Animal, then -
Correct Answer
Dog inherits Animal's functions and data
Your Answer Dog inherits Animal's functions and data
Multiple Choice Single Answer Question Thread at user level is known as :-
Correct Answer
User thread
Your Answer User thread
Select The Blank Question ________ includes disks and tapes.
Correct Answer
Block devices
Your Answer Block devices
Multiple Choice Single Answer Question DMA stands for :-
Correct Answer
Direct Memory Access
Your Answer Direct Memory Access
True/False
Question When application issues a blocking I/O system call, the request is placed on the queue for that device.
Correct Answer
True
Your Answer True
Page 29 of 72
SCDL – 3rd Semester – Operating Systems
Multiple Choice Single Answer Question The concept of OOPS was first introduced in
Correct Answer
Simula Language
Your Answer Simula Language
True/False Question Encryption is one common method of protecting information that is transmitted over
unreliable links. Correct Answer
True
Your Answer True
Select The Blank Question ________ describes segments local to each program, including its code, data, stack
etc. Correct Answer
LDT
Your Answer LDT
LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Select The Blank Question Like worms, ________ are designed to spread into other programs and can wreak
havoc in a system. Correct Answer
Viruses
Your Answer Viruses
Multiple Choice Multiple Answer
Question The advantage of dynamic loading is
Correct Answer
Unused routine is never loaded , Useful when large amount of code are needed to handle infrequently occurring cases, such as error routines , It does not require special support from the operating system
Your Answer Useful when large amount of code are needed to handle infrequently occurring cases, such as error routines , It does not require special support from the operating system , Unused routine is never loaded
Select The Blank Question Terminals and line printers are ________ .
Correct Answer
Character devices
Your Answer Socket interfaces
Page 30 of 72
SCDL – 3rd Semester – Operating Systems
Multiple Choice Multiple Answer Question A mailbox can be owned by :-
Correct Answer
Process , Operating system
Your Answer Process , Operating system
Select The Blank Question A process is ________, if it cannot affect or be affected by the other processes
executing in the system. Correct Answer
Independent
Your Answer Cooperating
True/False Question NFU is crude attempt to approximate LRU.
Correct Answer
True
Your Answer False
True/False Question A copy of inode is kept in main memory while a file is open.
Correct Answer
True
Your Answer True
Multiple Choice Single Answer Question The class bird should have object
Correct Answer
Egale
Your Answer Egale
Multiple Choice Multiple Answer Question User thread libraries include :-
Correct Answer
POSIX Pthreads , Mach C-threads , Solaris threads
Your Answer Mach C-threads , Solaris threads
True/False Question We can include dynamic protection in the access-matrix model by considering the
domains and the access matrix itself as objects. Correct True
Page 31 of 72
SCDL – 3rd Semester – Operating Systems
Answer Your Answer True
True/False Question The capability list is associated with a domain.
Correct Answer
True
Your Answer True
Select The Blank Question A ________ in NT is an object that provides a uniform interface for files, whether
they are local or remote. Correct Answer
Redirector
Your Answer Redirector
Select The Blank Question The ________ is a compromise between access lists and capability lists.
Correct Answer
Lock-Key Schemes
Your Answer Protected procedures
Match The FollowingQuestion Correct Answer Your Answer
Bit showing the availability of page in memory for which that entry belongs to
Present / absent bit Modified bit
In page table entry, the access permitted are stored in
Protection bit Protection bit
Bit is set when the page is referenced
Referenced bit Referenced bit
Bit which keeps track of page usage
Modified bit Security bit
Multiple Choice Single Answer Question In UNIX, files are organized in tree-structured :-
Correct Answer
Directories
Your Answer Directories
Match The FollowingQuestion Correct Answer Your Answer
Page 32 of 72
SCDL – 3rd Semester – Operating Systems
We can define abstract operation on abstract data
Data abstraction Data abstraction
Process of sharing properties of the higher level object or class
Inheritance Inheritance
Ability to inherit attributes and methods from 2 or more objects or classes
Multiple inheritance Multiple inheritance
Ability to send a message to several objects and to allow receiving object to respond method specified on the object.
Ploymorphism Ploymorphism
Select The Blank Question The Solaris developers reimplemented the ________ using in-kernel thread to
eliminate the context switch involved in moving each character between daemons and the kernel.
Correct Answer
Telnet daemon
Your Answer Context-switch daemon
Multiple Choice Single Answer Question If the process is waiting for some event to occur then it is said to be in :-
Correct Answer
Waiting state
Your Answer Ready state
True/False Question Cache is a non-volatile storage system.
Correct Answer
False
Your Answer False
Multiple Choice Single Answer Question The wraping up of data and methods in a single unit (class) is known as :
Correct Answer
Encapsulation
Your Answer Encapsulation
True/False Question A process is a victim of starvation if it becomes stuck in a scheduling queue
indefinitely. Correct Answer
True
Your Answer True
Page 33 of 72
SCDL – 3rd Semester – Operating Systems
Select The Blank Question ________ file access can be layered on top of block-device drivers.
Correct Answer
Memory-mapped
Your Answer Memory-mapped
Multiple Choice Multiple Answer Question find out the services provided by kernel related to I/O :
Correct Answer
I/O Scheduling , Buffering , Spooling
Your Answer I/O Scheduling , Buffering , Spooling
Multiple Choice Multiple Answer Question The role of the operating system in computer I/O is to :-
Correct Answer
Manage I/O operation and devices , Control I/O operation and devices
Your Answer Manage I/O operation and devices , Control I/O operation and devices
True/False Question In Lock-key mechanism, a process executing in a domain can access an object if
that domain has a key that matches one of the locks of the objects. Correct Answer
True
Your Answer False
Multiple Choice Multiple Answer Question There are components to the module support under Linux, identify them :-
Correct Answer
Module management , Driver registration , Conflict-resolution mechanism
Your Answer Module management , Driver registration , Conflict-resolution mechanism
Multiple Choice Single Answer Question The 4.3BSD operating system is the version of :-
Correct Answer
UNIX
Your Answer UNIX
Select The Blank
Question Each entry in the access matrix consists of a set of ________ .
Correct Access right
Page 34 of 72
SCDL – 3rd Semester – Operating Systems
Answer Your Answer Access right
Multiple Choice Single Answer Question In UNIX, a file is represented by an :-
Correct Answer
Inode
Your Answer Block
Multiple Choice Single Answer Question The segment is :-
Correct Answer
Logical entity
Your Answer Logical entity
True/False
Question In Windows NT, each process has one or more threads, which are the units of execution dispatched by the kernel.
Correct Answer
True
Your Answer True
Multiple Choice Single Answer Question UNIX operating system is written mostly in :-
Correct Answer
C language
Your Answer C++ language
Multiple Choice Multiple Answer Question Security violations of the system can be categorized as :-
Correct Answer
Malicious , Accidental
Your Answer Malicious , Authorized
Multiple Choice Single Answer Question The smallest addressable portion of a disk is :-
Correct Answer
Sector
Your Answer Sector
Select The Blank
Page 35 of 72
SCDL – 3rd Semester – Operating Systems
Question Associations are generally ________.
Correct Answer
Bidirectional
Your Answer Bidirectional
Multiple Choice Multiple Answer Question Find out the human-interface devices :-
Correct Answer
Screen , Keyboard , Mouse
Your Answer Screen , Keyboard , Mouse
Select The Blank Question ________allows us to define abstract operations on abstract data.
Correct Answer
Data abstraction
Your Answer Data abstraction
Multiple Choice Multiple Answer Question Once the I/O is started , which two courses of action are possible?
Correct Answer
Synchronous I/O , Asynchronous I/O , Simple I/O
Your Answer Synchronous I/O , Asynchronous I/O , Simple I/O
Multiple Choice Multiple Answer
Question In windows NT, naming of objects is of two types :-
Correct Answer
Permanent name , Temporary name
Your Answer Permanent name , Temporary name
True/False Question Turnaround time is inversely proportional to throughput.
Correct Answer
True
Your Answer True
Select The Blank Question The hardware to measure elapsed time to trigger operations is called a ________.
Correct Answer
Programmable interval timer
Your Answer Programmable elapsed timer
Page 36 of 72
SCDL – 3rd Semester – Operating Systems
Multiple Choice Multiple Answer Question User level threads are generally :-
Correct Answer
Fast to create , Easy to manage
Your Answer Fast to create , Easy to manage
Multiple Choice Single Answer Question In MULTICS TLB address of 'n', the most recently referenced pages are kept, where
'n' can have a value :- Correct Answer
16
Your Answer 16
Multiple Choice Single Answer Question C++ is also named as
Correct Answer
C with classes
Your Answer C with classes
Multiple Choice Multiple Answer Question Liner address is divided into fields like :-
Correct Answer
Dir , Page , Offset
Your Answer Dir , Page , Offset
Multiple Choice Single Answer Question DVMA stands for :-
Correct Answer
Direct Virtual Memory Access
Your Answer Direct Virtual Memory Access
True/False Question An asynchronous call returns immediately, without waiting for the I/O to complete.
Correct Answer
True
Your Answer True
LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Page 37 of 72
SCDL – 3rd Semester – Operating Systems
Multiple Choice Multiple Answer Question Kernel threads are generally :-
Correct Answer
Slower to create , Difficult to manage
Your Answer Slower to create , Difficult to manage
Select The Blank Question If the user-supplied password matches the password stored in the system, the
system assumes that the user is ________. Correct Answer
Legitimate
Your Answer Legitimate
Multiple Choice Single Answer
Question In general , the access matrix will be :-
Correct Answer
Sparse
Your Answer Sparse
True/False Question Encryption is one common method of protecting information that is transmitted over
unreliable links. Correct Answer
True
Your Answer False
Select The Blank Question A ________ is a full duplex connection between a device driver and a user-level
process. Correct Answer
Stream
Your Answer Stream
Multiple Choice Single Answer Question In how many number of classes does the NRU algorithm divides pages, depending
on the state of R and M? Correct Answer
4
Your Answer 8
Select The Blank
Question The Pentium page size is fixed at ________ KB.
Correct Answer
4
Page 38 of 72
SCDL – 3rd Semester – Operating Systems
Your Answer 4
True/False
Question Volatile storage loses its contents when the power to the device is removed.
Correct Answer
True
Your Answer True
Multiple Choice Multiple Answer Question The movement of information between levels of a storage hierarchy may be of two
types depending on the hardware design and the controlling operating system software such as :-
Correct Answer
Explicit , Implicit
Your Answer Explicit , Implicit
Select The Blank
Question In queuing diagram, the arrow indicates the flow of ________ in the system.
Correct Answer
Processes
Your Answer Processes
Multiple Choice Multiple Answer Question What are the forms of malicious access?
Correct Answer
Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data
Your Answer Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data
Select The Blank Question A bit called the ________ , is added to the hardware of the computer to indicate the
current mode. Correct Answer
Mode bit
Your Answer Mode bit
Multiple Choice Multiple Answer Question In Windows NT , kernel uses which two sets of objects?
Correct Answer
Dispatcher objects , Control objects
Your Answer Dispatcher objects , Complex objects
Multiple Choice Single Answer
Page 39 of 72
SCDL – 3rd Semester – Operating Systems
Question The smallest addressable portion of a disk is :-
Correct Answer
Sector
Your Answer Sector
True/False Question In FIFO algorithm the page removed from memory is the one which most recently
used. Correct Answer
False
Your Answer False
Select The Blank Question A process is ________, if it cannot affect or be affected by the other processes
executing in the system. Correct Answer
Independent
Your Answer Independent
Multiple Choice Multiple Answer Question Linux presents standard interfaces to whom?
Correct Answer
Programmer , User
Your Answer Programmer , User , System administrator
Select The Blank
Question The kernel module that controls a device is a ________ .
Correct Answer
Device driver
Your Answer Device daemon
True/False
Question Whenever a trap or interrupt occurs, the hardware switches from user mode to monitor mode.
Correct Answer
True
Your Answer True
Select The Blank Question A ________ is a computer or router that sits between the trusted and untrusted
systems. Correct Answer
Firewall
Page 40 of 72
SCDL – 3rd Semester – Operating Systems
Your Answer Firewall
Multiple Choice Multiple Answer Question Find out the basic I/O hardware elements from the following :-
Correct Answer
Ports , Buses , Device controllers
Your Answer Ports , Buses , Device controllers
True/False
Question Object-oriented programming focuses on the integrated data and functionality as discrete units that have both knowledge (data) and capabilities (functions). Procedural programs, on the other hand, focus on functions and how they act on data.
Correct Answer
True
Your Answer True
Match The FollowingQuestion Correct Answer Your Answer
User mode Mode bit 1 Mode bit 1
Serial port Modem Monitor mode
Parallel port Printer Printer
Privileged instructions Monitor mode Mode bit 0
True/False Question In segmentation the total address space can exceed the size of physical memory.
Correct Answer
True
Your Answer False
Multiple Choice Single Answer Question Because of the concept of independent objects responding to messages, object
orientation is a natural way to implement Correct Answer
Event driven programming
Your Answer Message deiven programming
Multiple Choice Single Answer Question In UNIX, everything below the system-call interface and above the physical
hardware is the :- Correct Answer
Kernel
Page 41 of 72
SCDL – 3rd Semester – Operating Systems
Your Answer I/O system
Multiple Choice Multiple Answer Question Different multithreading models available are :-
Correct Answer
Many-to-one model , One-to-one model , Many-to-many model
Your Answer Many-to-one model , One-to-one model , Many-to-many model
Multiple Choice Multiple Answer
Question An object type in windows NT is a system defined data type that has two things associated with it, which are they?
Correct Answer
Set of attributes , Set of methods
Your Answer Object-type , Object-processing
Multiple Choice Multiple Answer
Question When memory reference occurs in MULTICS the things which takes place are :-
Correct Answer
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address
Your Answer Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined
Multiple Choice Single Answer Question The interval from the time of submission of a process to the time of completion is :-
Correct Answer
Turnaround time
Your Answer Turnaround time
True/False Question Context switch times are highly dependent on hardware support.
Correct Answer
True
Your Answer True
True/False
Question Procedure and data can be distinguished and separately protected in segmentation
Correct Answer
True
Your Answer True
Multiple Choice Multiple Answer
Page 42 of 72
SCDL – 3rd Semester – Operating Systems
Question Dispatcher functions involves the following :-
Correct Answer
Switching context , Switching to user mode
Your Answer Switching context , Switching to user mode
Multiple Choice Single Answer Question The First version of UNIX was developed in 1969 by Ken Thompson of the
Research Group at :- Correct Answer
Bell Laboratories
Your Answer Bell Laboratories
Multiple Choice Single Answer Question In Object Oriented technology following expression is appropriate
Correct Answer
object=data+menthods
Your Answer object=data+menthods
Multiple Choice Single Answer Question A procedure body implementing an operation is termed as
Correct Answer
Method
Your Answer Method
Select The Blank Question During execution, ________ register holds the sector for the code segment.
Correct Answer
CS
Your Answer PS
True/False Question In some operating system, spooling is managed by a system daemon process.
Correct Answer
True
Your Answer False
Select The Blank Question Each column in the access matrix can be implemented as an ________ for one
object. Correct Answer
Access list
Page 43 of 72
SCDL – 3rd Semester – Operating Systems
Your Answer Capability list
Multiple Choice Single Answer Question Policies for resource use may vary depending on the :-
Correct Answer
Application
Your Answer System
Multiple Choice Multiple Answer
Question A mailbox can be owned by :-
Correct Answer
Process , Operating system
Your Answer User , Process , Program
Multiple Choice Single Answer
Question The ready queue is generally stored as a :-
Correct Answer
Linked list
Your Answer Queue
Select The Blank Question A ________ is region of fast memory that hold copies of data .
Correct Answer
Cache
Your Answer Cache
Multiple Choice Multiple Answer Question What are the components to memory management under Linux?
Correct Answer
Physical memory manager , Virtual memory manager
Your Answer Physical memory manager , Virtual memory manager
Match The FollowingQuestion Correct Answer Your Answer
Bounded-buffer Fixed size buffer Fixed size buffer
Producer Produces process Produces process
Consumer Consumes process Consumes process
Unbounded-buffer No limit on size of buffer No limit on size of buffer
Page 44 of 72
SCDL – 3rd Semester – Operating Systems
True/False Question The inode contains 15 pointers to the disk blocks containing the data contents of the
file. Correct Answer
True
Your Answer True
Multiple Choice Single Answer Question When computer is powered up or rebooted, it needs to have an initial program to
run. This initial program is known as :- Correct Answer
Bootstrap program
Your Answer Bootstrap program
LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Multiple Choice Multiple Answer Question locate the transmission devices :-
Correct Answer
Network cards , Modems
Your Answer Tapes , Network cards , Modems
True/False Question The user process issues a network I/O system call to send the character to the
remote machine. Correct Answer
True
Your Answer True
Multiple Choice Single Answer Question The process by which objects of one class acquire properties of objects of other
class is called Correct Answer
Inheritance
Your Answer Inheritance
True/False Question Windows NT uses a message passing implementation for I/O.
Correct Answer
True
Your Answer True
Multiple Choice Multiple Answer
Page 45 of 72
SCDL – 3rd Semester – Operating Systems
Question We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes?
Correct Answer
User mode , Monitor mode
Your Answer User mode , Monitor mode
Match The FollowingQuestion Correct Answer Your Answer
Round-robin Time quantum Time quantum
First-come First-served First come job First come job
Shortest job Shortest job Shortest job
Priority Highest priority job Highest priority job
Multiple Choice Single Answer Question The segment is :-
Correct Answer
Logical entity
Your Answer Logical entity
Multiple Choice Single Answer Question In UNIX, decisions regarding which process to swap in or out are made by whom?
Correct Answer
Swapper
Your Answer Memory handler
Select The Blank Question A ________ is a client-server mechanism that enables an application on one
machine to make a procedure call to code on another machine. Correct Answer
Remote-procedure-call
Your Answer Remote-procedure-call
Multiple Choice Single Answer Question When each process that wants to communicate must explicitly name the recipient or
sender of the communication, then such communication is called as :- Correct Answer
Direct communication
Your Answer Indirect communication
Select The Blank
Page 46 of 72
SCDL – 3rd Semester – Operating Systems
Question In Linux, the allocator uses a ________ algorithm to keep track of available physical pages.
Correct Answer
Buddy-heap
Your Answer Binary-search
Multiple Choice Single Answer Question What does the rows of the access matrix represents?
Correct Answer
Domains
Your Answer Domains
Multiple Choice Single Answer Question Every change in policy requires a change in the underlying :-
Correct Answer
Mechanism
Your Answer System
Select The Blank Question A ________ in NT is an object that provides a uniform interface for files, whether
they are local or remote. Correct Answer
Redirector
Your Answer Domain
Multiple Choice Multiple Answer Question In Solaris 2, user-level threads may be:-
Correct Answer
Bound , Unbound
Your Answer Bound , Unbound
Multiple Choice Multiple Answer Question An audit log records which things about an object ?
Correct Answer
Time , User , Type of access
Your Answer Time , User , Type of access
Multiple Choice Multiple Answer Question One-to-one model is supported by following systems :-
Correct Answer
Windows NT , OS/2
Page 47 of 72
SCDL – 3rd Semester – Operating Systems
Your Answer OS/2 , Windows NT
Multiple Choice Multiple Answer Question To protect the system, we must take security measures at two levels, such as :-
Correct Answer
Physical level , Human level
Your Answer Human level , Global level
Multiple Choice Single Answer Question If the process is waiting for some event to occur then it is said to be in :-
Correct Answer
Waiting state
Your Answer Waiting state
Multiple Choice Single Answer Question A common representation for a discussion of process scheduling is a :-
Correct Answer
Queuing diagram
Your Answer Process state diagram
True/False Question At Physical level, the site or sites containing the computer systems must be
physically secured against armed or surreptitious entry by intruders. Correct Answer
True
Your Answer True
Select The Blank Question When you express user-system interaction, the scenario in the model is called
________ Correct Answer
Case model
Your Answer Case model
True/False
Question Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention.
Correct Answer
False
Your Answer True
True/False
Page 48 of 72
SCDL – 3rd Semester – Operating Systems
Question A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .
Correct Answer
False
Your Answer False
Multiple Choice Single Answer
Question Polymorphism means ability to take
Correct Answer
More than one form
Your Answer More than one form
True/False
Question Aging algorithm is based on LRU.
Correct Answer
True
Your Answer True
Select The Blank Question The virtual memory portion of the NT executive is the ________.
Correct Answer
Virtual memory manager
Your Answer Virtual memory manager
Multiple Choice Multiple Answer
Question There are two types of Message passing, they are :-
Correct Answer
Synchronous , Asynchronous
Your Answer Synchronous , Asynchronous
Select The Blank Question Web servers use the ________ protocol to communicate with web browsers.
Correct Answer
http
Your Answer http
Multiple Choice Multiple Answer Question The security of a system can be improved by two management techniques, such
as :- Correct Answer
Threat monitoring , Audit Log
Your Answer Audit Log , Threat finding
Page 49 of 72
SCDL – 3rd Semester – Operating Systems
Select The Blank Question The concept of protection levels and call gates were pioneered in MULTICS, where
they were viewed as protection ________. Correct Answer
Ring
Your Answer Ring
True/False Question We say that a system is secure if its resources are used and accessed as intended
under all circumstances. Correct Answer
True
Your Answer True
Select The Blank Question The ________ controller is the controller at the computer end of the bus.
Correct Answer
Host
Your Answer Cpu
Multiple Choice Multiple Answer Question In Linux, the paging system can be divided into sections, namely:-
Correct Answer
Policy algorithm , Paging mechanism
Your Answer Policy algorithm , Paging mechanism
True/False Question Keyboard is a sharable device.
Correct Answer
True
Your Answer False
True/False Question Transfer of data from disk to memory is usually controlled by the operating system.
Correct Answer
True
Your Answer True
True/False Question Prototyping not only helps to build a quality design but also enables the designer to
build the system decremantally. Correct False
Page 50 of 72
SCDL – 3rd Semester – Operating Systems
Answer Your Answer True
Select The Blank Question The UNIX system uses ________ to avoid the necessity of keeping its password list
secret. Correct Answer
Encryption
Your Answer Encryption
Match The FollowingQuestion Correct Answer Your Answer
Read-write devices Disks Disks
Dedicated devices Tape CD-ROM
Read-only devices CD-ROM Tape
Write-only devices Graphics controller Keyboard
Multiple Choice Single Answer Question A procedure call, request to execute a method is termed as
Correct Answer
Message
Your Answer Message
Select The Blank Question Context switch times are highly dependent on ________ support.
Correct Answer
Hardware
Your Answer Hardware
Multiple Choice Multiple Answer Question Two main jobs of a computer are :-
Correct Answer
I/O , Processing
Your Answer I/O , Processing
Multiple Choice Single Answer Question The 4.3BSD operating system is the version of :-
Correct Answer
UNIX
Page 51 of 72
SCDL – 3rd Semester – Operating Systems
Your Answer UNIX
Multiple Choice Single Answer Question The number of processes that are completed per time unit is called as:-
Correct Answer
Throughput of system
Your Answer Throughput of system
Multiple Choice Multiple Answer Question Once the I/O is started , which two courses of action are possible?
Correct Answer
Synchronous I/O , Asynchronous I/O , Simple I/O
Your Answer Synchronous I/O , Asynchronous I/O
Multiple Choice Multiple Answer Question Security violations of the system can be categorized as :-
Correct Answer
Malicious , Accidental
Your Answer Malicious , Accidental
Select The Blank Question A process migrates between the various ________ throughout its lifetime.
Correct Answer
Scheduling queues
Your Answer Scheduling queues
LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Multiple Choice Multiple Answer Question The Linux system is composed of three main bodies of code, in line with most
traditional UNIX implementations. Which are :- Correct Answer
Kernel , System libraries , System utilities
Your Answer System libraries , Programs , Kernel
Multiple Choice Single Answer Question The class bird should have object
Correct Egale
Page 52 of 72
SCDL – 3rd Semester – Operating Systems
Answer Your Answer Egale
Multiple Choice Single Answer Question Objects are essentially :-
Correct Answer
Abstract data type
Your Answer Abstract data type
True/False Question Banker's algorithm is a deadlock-avoidance algorithm.
Correct Answer
True
Your Answer True
True/False Question Aging algorithm is based on LRU.
Correct Answer
True
Your Answer False
Select The Blank Question MULTICS uses a ________ in addition to file access for protection.
Correct Answer
Ring structure
Your Answer Ring structure
True/False Question A virus is a fragment of code embedded in a legitimate program
Correct Answer
True
Your Answer True
Multiple Choice Multiple Answer Question The basic hardware elements involved in I/O are :-
Correct Answer
Buses , Device controllers , Device
Your Answer Keyboard , Buses , Device controllers
True/False
Page 53 of 72
SCDL – 3rd Semester – Operating Systems
Question Main Memory is a volatile storage device that loses its contents when power is turned off.
Correct Answer
True
Your Answer True
Select The Blank Question In queuing diagram , each rectangular box represents a ________.
Correct Answer
Queue
Your Answer Queue
True/False Question Whenever a trap or interrupt occurs, the hardware switches from user mode to
monitor mode. Correct Answer
True
Your Answer True
Multiple Choice Single Answer Question As process enter the system, they are put into :-
Correct Answer
Job queue
Your Answer Job queue
Select The Blank Question During execution, ________ register holds the sector for the data segment.
Correct Answer
DS
Your Answer CS
Multiple Choice Multiple Answer Question The role of the operating system in computer I/O is to :-
Correct Answer
Manage I/O operation and devices , Control I/O operation and devices
Your Answer Manage I/O operation and devices , Control I/O operation and devices
Multiple Choice Multiple Answer Question What are the forms of malicious access?
Correct Answer
Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data
Your Answer Unauthorized reading of data , Unauthorized modification of data , Unauthorized
Page 54 of 72
SCDL – 3rd Semester – Operating Systems
destruction of data
Select The Blank Question A ________ is a computer or router that sits between the trusted and untrusted
systems. Correct Answer
Firewall
Your Answer Firewall
Multiple Choice Multiple Answer Question Dispatcher functions involves the following :-
Correct Answer
Switching context , Switching to user mode
Your Answer Switching context , Switching to user mode
Multiple Choice Multiple Answer Question Many-to-may model is supported by following operating systems :-
Correct Answer
Solaris , IRIX , Digital UNIX
Your Answer IRIX , Solaris
Select The Blank Question A ________ controller is built into each disk drive.
Correct Answer
Disk
Your Answer Disk
Match The FollowingQuestion Correct Answer Your Answer
Parent process Child process Child process
Foreground processes Interactive processes Interactive processes
Background processes Batch processes Batch processes
Light-Weight processes Thread Thread
Select The Blank Question A class may be thought of as 'data-type' and object as ________ of that data-type.
Correct Answer
Variable
Your Answer Variable
Page 55 of 72
SCDL – 3rd Semester – Operating Systems
True/False Question In Windows NT, interrupt object binds an interrupt service routine to an interrupt
source. Correct Answer
True
Your Answer True
True/False Question In Windows NT, each process has one or more threads, which are the units of
execution dispatched by the kernel. Correct Answer
True
Your Answer True
Multiple Choice Single Answer Question If Dog derives from Mammal, and Mammal derives from Animal, then -
Correct Answer
Dog inherits Animal's functions and data
Your Answer Mammal inherits Animal's functions and data
Multiple Choice Single Answer Question If the process is waiting to be assigned to CPU then it is said to be in :-
Correct Answer
Ready state
Your Answer Ready state
Multiple Choice Multiple Answer Question What are the components to memory management under Linux?
Correct Answer
Physical memory manager , Virtual memory manager
Your Answer Physical memory manager , Virtual memory manager
Multiple Choice Multiple Answer Question The Moriss Internet Worm was made up of which of the two programs?
Correct Answer
Grappling hook program , Main program
Your Answer Target worm program , Grappling hook program
Select The Blank Question The ________ controller is the controller at the computer end of the bus.
Correct Host
Page 56 of 72
SCDL – 3rd Semester – Operating Systems
Answer Your Answer Disk
True/False Question In Windows NT, kernel is object-oriented.
Correct Answer
True
Your Answer True
Multiple Choice Single Answer Question C++ is basically a procedural language having extension of
Correct Answer
Object Oriented technology
Your Answer Graphic user interface
Select The Blank Question In queuing diagram, the arrow indicates the flow of ________ in the system.
Correct Answer
Processes
Your Answer Operation
True/False Question Whenever the operating system gains control of the computer, it is in monitor mode.
Correct Answer
True
Your Answer True
Multiple Choice Single Answer Question C++ is also named as
Correct Answer
C with classes
Your Answer Visual C++
Multiple Choice Single Answer Question The number of processes that are completed per time unit is called as:-
Correct Answer
Throughput of system
Your Answer Efficiency of system
Select The Blank
Page 57 of 72
SCDL – 3rd Semester – Operating Systems
Question A process is ________ if it can affect or be affected by the other processes executing in the system.
Correct Answer
Cooperating
Your Answer Competing
Multiple Choice Single Answer Question Collection of similar datatypes is called as
Correct Answer
Array
Your Answer Array
Match The FollowingQuestion Correct Answer Your Answer
Random-access devices CD-ROM CD-ROM
Character devices. Terminal Terminal
Block devices Disk Disk
Sequential devices Modem Modem
Multiple Choice Multiple Answer Question The device number consists of which two parts in UNIX?
Correct Answer
Major device number , Minor device number
Your Answer Device-id , Device-name
Multiple Choice Single Answer Question The pure Object Oriented language is
Correct Answer
Java
Your Answer C
Multiple Choice Single Answer Question The concept of OOPS was first introduced in
Correct Answer
Simula Language
Your Answer C language
Multiple Choice Multiple Answer Question Most CPUs have two interrupt request lines. Which are they?
Page 58 of 72
SCDL – 3rd Semester – Operating Systems
Correct Answer
Maskable , Non maskable
Your Answer Maskable , Non maskable
Multiple Choice Multiple Answer Question Different multithreading models available are :-
Correct Answer
Many-to-one model , One-to-one model , Many-to-many model
Your Answer Many-to-one model , One-to-one model , Many-to-many model
Select The Blank Question The ________ of a process is represented in the PCB of a process.
Correct Answer
Context
Your Answer Block
LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Multiple Choice Single Answer Question SCSI stands for :-
Correct Answer
Small Computer-Systems Interface
Your Answer Small Computer-Systems Interface
Multiple Choice Multiple Answer
Question The basic hardware elements involved in I/O are :-
Correct Answer
Buses , Device controllers , Device
Your Answer Buses , Device controllers , Device
True/False Question A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .
Correct Answer
False
Your Answer False
True/False
Question C++ supports object oriented programming concepts of objects, classes, inheritance, polymorphism and parameterised datatypes.
Correct Answer
True
Page 59 of 72
SCDL – 3rd Semester – Operating Systems
Your Answer True
True/False Question I/O system calls are costly in terms of CPU consumptions.
Correct Answer
True
Your Answer True
Multiple Choice Single Answer Question All user processes are descendents of one original process, Which is that process?
Correct Answer
Init process
Your Answer Init process
Match The FollowingQuestion Correct Answer Your Answer
Provides adjustment while compiling classes
Interface classes Derived function
Identify values & relevant operations
Abstract data types Abstract data types
Complete implementation of class
Concrete data types Interface classes
Provides framework for other classes
Node classes Node classes
Match The FollowingQuestion Correct Answer Your Answer
Round-robin Time quantum Time quantum
First-come First-served First come job First come job
Shortest job Shortest job Shortest job
Priority Highest priority job Highest priority job
Select The Blank
Question ________ describes segments local to each program, including its code, data, stack etc.
Correct Answer
LDT
Your Answer LDT
Multiple Choice Multiple Answer Question To protect the system, we must take security measures at two levels, such as :-
Correct Physical level , Human level
Page 60 of 72
SCDL – 3rd Semester – Operating Systems
Answer Your Answer Physical level , Human level
True/False Question The hardware allows privileged instructions to be executed in only user mode.
Correct Answer
False
Your Answer False
Multiple Choice Single Answer Question What does the rows of the access matrix represents?
Correct Answer
Domains
Your Answer Domains
Select The Blank Question A bit called the ________ , is added to the hardware of the computer to indicate the
current mode. Correct Answer
Mode bit
Your Answer Mode bit
True/False
Question In Windows NT, each process has one or more threads, which are the units of execution dispatched by the kernel.
Correct Answer
True
Your Answer True
Select The Blank
Question ________allows us to define abstract operations on abstract data.
Correct Answer
Data abstraction
Your Answer Data abstraction
Select The Blank Question If the granularity field is ________ the limit field is the exact segment size, upto 1 MB.
Correct Answer
0
Your Answer 1
True/False
Question Encryption is one common method of protecting information that is transmitted over unreliable links.
Page 61 of 72
SCDL – 3rd Semester – Operating Systems
Correct Answer
True
Your Answer True
Multiple Choice Single Answer Question Collection of similar datatypes is called as
Correct Answer
Array
Your Answer Array
Multiple Choice Single Answer Question A Process which produces process is known as :-
Correct Answer
Producer
Your Answer Producer
Multiple Choice Single Answer Question Interrupt mechanism accepts an address and this address is an offset in a table
called the :- Correct Answer
Interrupt vector
Your Answer Interrupt vector
Select The Blank Question The process could create a new ________ and wait for its termination.
Correct Answer
Sub process
Your Answer Sub process
Multiple Choice Single Answer Question Thread at user level is known as :-
Correct Answer
User thread
Your Answer User thread
Multiple Choice Single Answer
Question If Dog derives from Mammal, and Mammal derives from Animal, then -
Correct Answer
Dog inherits Animal's functions and data
Your Answer Mammal inherits Animal's functions and data
Select The Blank
Page 62 of 72
SCDL – 3rd Semester – Operating Systems
Question During execution, ________ register holds the sector for the code segment.
Correct Answer
CS
Your Answer DS
Multiple Choice Single Answer Question The list of processes waiting for a particular I/O device is called a :-
Correct Answer
Device queue
Your Answer Device queue
True/False
Question Cache is a faster storage system which stores data temporarily.
Correct Answer
True
Your Answer True
True/False Question The file system does not provide a degree of protection.
Correct Answer
False
Your Answer True
Multiple Choice Multiple Answer Question Liner address is divided into fields like :-
Correct Answer
Dir , Page , Offset
Your Answer Dir , Page , Offset
True/False Question Volatile storage loses its contents when the power to the device is removed.
Correct Answer
True
Your Answer True
Multiple Choice Single Answer Question Which of the following Operating System has no memory protection ?
Correct Answer
Windows 3.1
Your Answer Windows 3.1
Page 63 of 72
SCDL – 3rd Semester – Operating Systems
Multiple Choice Multiple Answer Question In windows NT, naming of objects is of two types :-
Correct Answer
Permanent name , Temporary name
Your Answer Permanent name , Temporary name
Multiple Choice Single Answer
Question Protection can no longer be considered solely as a matter of concern to the designer of :-
Correct Answer
Operating system
Your Answer Operating system
Select The Blank Question Web servers use the ________ protocol to communicate with web browsers.
Correct Answer
http
Your Answer http
Multiple Choice Multiple Answer Question locate the transmission devices :-
Correct Answer
Network cards , Modems
Your Answer Network cards , Modems
Multiple Choice Single Answer Question In UNIX, the simplest form of communication between processes is by :-
Correct Answer
Pipes
Your Answer Pipes
Select The Blank Question A ________ is a group of NT server machines that share a common security policy
and user databases. Correct Answer
Domain
Your Answer Domain
Multiple Choice Multiple Answer Question Message passing may be :-
Correct Answer
Blocking , Non-blocking
Your Answer Blocking , Non-blocking
Page 64 of 72
SCDL – 3rd Semester – Operating Systems
Multiple Choice Multiple Answer Question An object type in windows NT is a system defined data type that has two things
associated with it, which are they? Correct Answer
Set of attributes , Set of methods
Your Answer Set of attributes , Set of methods
Select The Blank
Question The ________ of a process is represented in the PCB of a process.
Correct Answer
Context
Your Answer Context
Select The Blank Question The Linux ________ file system, known as the proc file system, is an example of a
file system whose contents are not actually stored anywhere, but are rather computed on demand according to user file I/o requests.
Correct Answer
Process
Your Answer Process
True/False Question Objects can be both, tangible or intangible.
Correct Answer
True
Your Answer True
Multiple Choice Multiple Answer Question In UNIX, a device is distinguished by two things, which are :-
Correct Answer
Device-class , Device number
Your Answer Device-class , Device number
Multiple Choice Multiple Answer Question Find out the basic I/O hardware elements from the following :-
Correct Answer
Ports , Buses , Device controllers
Your Answer Ports , Buses , Device controllers
Multiple Choice Multiple Answer Question Which are the Division D security systems ?
Correct Windows 3.1 , MS-DOS
Page 65 of 72
SCDL – 3rd Semester – Operating Systems
Answer Your Answer Windows 3.1 , MS-DOS
Multiple Choice Single Answer Question Protection can improve :-
Correct Answer
Reliability
Your Answer Reliability
Select The Blank
Question The creating process is called a ________ process.
Correct Answer
Parent
Your Answer Parent
Multiple Choice Multiple Answer Question When memory reference occurs in MULTICS the things which takes place are :-
Correct Answer
Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address
Your Answer Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address
LIST OF ATTEMPTED QUESTIONS AND ANSWERS True/FalseQuestion: An asynchronous call returns immediately, without waiting for the I/O to complete.Correct Answer: TrueYour Answer: True True/FalseQuestion: Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention.Correct Answer: FalseYour Answer: False Select The BlankQuestion: The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________.Correct Answer: RingYour Answer: Ring
Page 66 of 72
SCDL – 3rd Semester – Operating Systems
Multiple Choice Single AnswerQuestion: A domain is a collection of :-Correct Answer: Access rightsYour Answer: Protection policies Match The FollowingQuestion: Correct Answer Your AnswerVolatile Memory Primary memory RAMCPU registers Volatile storage Primary memoryMagnetic disks Non volatile storage Non volatile storageFloppy disk Secondary storage Secondary storage
Multiple Choice Single AnswerQuestion: Each object has a unique :-Correct Answer: NameYour Answer: Name True/FalseQuestion: Once class is defined we can create limited number of objects belonging to that class.Correct Answer: FalseYour Answer: False Multiple Choice Multiple AnswerQuestion: A mailbox can be owned by :-Correct Answer: Process , Operating system Your Answer: User , Process Multiple Choice Single AnswerQuestion: C++ is basically a procedural language having extension ofCorrect Answer: Object Oriented technologyYour Answer: Object Oriented technology True/FalseQuestion: In Lock-key mechanism, users are allowed to examine or modify the list of keys or locks directly.Correct Answer: FalseYour Answer: False Multiple Choice Multiple AnswerQuestion: Most CPUs have two interrupt request lines. Which are they?Correct Answer: Maskable , Non maskable Your Answer: Maskable , Non maskable Match The Following
Page 67 of 72
SCDL – 3rd Semester – Operating Systems
Question: Correct Answer: Your Answer:We can define abstract Data abstraction Data abstractionoperation on abstract dataProcess of sharing properties of the Inheritance Inheritancehigher level object or classAbility to inherit attributes and Multiple inheritance Multiple inheritancemethods from 2 or more objects or classesAbility to send a message to several Ploymorphism Ploymorphismobjects and to allow receiving objectto respond method specified on the object. Select The BlankQuestion: The ________ is a layer of software that hides hardware differences from upper levels of the operating system.Correct Answer: Hardware abstraction layerYour Answer: Hardware abstraction layer Multiple Choice Single AnswerQuestion: The ready queue is generally stored as a :-Correct Answer: Linked listYour Answer: Queue
Multiple Choice Single AnswerQuestion: How big is a class object?Correct Answer: Is as big as sum of the sizes of its member variablesYour Answer: Is as big as sum of the sizes of its member variables True/FalseQuestion: In FIFO algorithm the page removed from memory is the one which most recently used.Correct Answer: FalseYour Answer: False True/FalseQuestion: I/O system calls are costly in terms of CPU consumptions.Correct Answer: TrueYour Answer: True Multiple Choice Single AnswerQuestion: Policies for resource use may be subject to change over :-Correct Answer: TimeYour Answer: Time True/False
Page 68 of 72
SCDL – 3rd Semester – Operating Systems
Question: A functionality prototype can be designed that does not have the final user interface, but allows users to try out various features, such as forwarding messages or attaching files without worrying about the final interface.Correct Answer: TrueYour Answer: True
Multiple Choice Single AnswerQuestion: The main difference between structure and class isCorrect Answer: Structure does not support OOPS Class Supports OOPS.Your Answer: Structure does not support OOPS Class Supports OOPS. Multiple Choice Single AnswerQuestion: The First version of UNIX was developed in 1969 by Ken Thompson of the Research Group at :-Correct Answer: Bell LaboratoriesYour Answer: Bell Laboratories
Multiple Choice Single AnswerQuestion: Collection of similar datatypes is called asCorrect Answer: ArrayYour Answer: Array Multiple Choice Single AnswerQuestion: The pure Object Oriented language isCorrect Answer: JavaYour Answer: Java Multiple Choice Single AnswerQuestion: The concept of OOPS was first introduced inCorrect Answer: Simula LanguageYour Answer: Simula Language Multiple Choice Single AnswerQuestion: The class bird should have objectCorrect Answer: EgaleYour Answer: Egale Select The BlankQuestion: ________ of an object remains unchanged even though its state and properties change.Correct Answer: IdentityYour Answer: Location Multiple Choice Multiple Answer
Page 69 of 72
SCDL – 3rd Semester – Operating Systems
Question: The Linux system is composed of three main bodies of code, in line with most traditional UNIX implementations. Which are :-Correct Answer: Kernel , System libraries , System utilities Your Answer: Kernel , System libraries , System utilities Multiple Choice Multiple AnswerQuestion: An audit log records which things about an object ?Correct Answer: Time , User , Type of access Your Answer: User , Type of access , Operation Select The BlankQuestion: The virtual memory portion of the NT executive is the ________.Correct Answer: Virtual memory managerYour Answer: Page-memory manager Multiple Choice Single AnswerQuestion: A system consists of collection of :-Correct Answer: ProcessesYour Answer: Procedures Multiple Choice Multiple AnswerQuestion: Linux presents standard interfaces to whom?Correct Answer: Programmer , User Your Answer: Programmer , User Multiple Choice Multiple AnswerQuestion: Most computers have hardware clocks and timers that provide three basic functions, such as :-Correct Answer: Give the current time , Give the elapsed time , Set a timer to trigger operation at certain time Your Answer: Give the current time , Give the elapsed time , Set a timer to trigger operation at certain time Select The BlankQuestion: The UNIX system uses ________ to avoid the necessity of keeping its password list secret.Correct Answer: EncryptionYour Answer: Encryption Multiple Choice Single AnswerQuestion: A solution to the problem of indefinite blockage of low-priority processes in Priority scheduling is :-Correct Answer: AgingYour Answer: Starvation Multiple Choice Multiple Answer
Page 70 of 72
SCDL – 3rd Semester – Operating Systems
Question: In a uniprocessor system, there is :-Correct Answer: Single processor , Single running process Your Answer: Single processor , Single running process Multiple Choice Single AnswerQuestion: The process by which objects of one class acquire properties of objects of other class is calledCorrect Answer: InheritanceYour Answer: Inheritance Select The BlankQuestion: A segment shorter than ________ M will have a page directory with single entry, a pointer to its one and only page table.Correct Answer: 4Your Answer: 8 Multiple Choice Single AnswerQuestion: If Dog derives from Mammal, and Mammal derives from Animal, then -Correct Answer: Dog inherits Animal's functions and dataYour Answer: Dog inherits Animal's functions and data
Multiple Choice Multiple AnswerQuestion: Passwords can be generated by :-Correct Answer: System , User Your Answer: System , User , Password software Multiple Choice Multiple AnswerQuestion: kernel threads are supported by following operating systems :-Correct Answer: Windows NT , Solaris , Digital UNIX Your Answer: Windows NT , Solaris , Digital UNIX Select The BlankQuestion: The hardware to measure elapsed time to trigger operations is called a ________.Correct Answer: Programmable interval timerYour Answer: Hardware timer Multiple Choice Multiple AnswerQuestion: In Windows NT , kernel uses which two sets of objects?Correct Answer: Dispatcher objects , Control objects Your Answer: Dispatcher objects , Control objects True/FalseQuestion: Firewall monitors and logs all connections.Correct Answer: TrueYour Answer: True
Page 71 of 72
SCDL – 3rd Semester – Operating Systems
Select The BlankQuestion: During execution, ________ register holds the sector for the code segment.Correct Answer: CSYour Answer: CS Select The BlankQuestion: The creating process is called a ________ process.Correct Answer: ParentYour Answer: Parent True/FalseQuestion: Objects can not interact unless they know the details of each others data or code.Correct Answer: FalseYour Answer: False Select The BlankQuestion: Web servers use the ________ protocol to communicate with web browsers.Correct Answer: httpYour Answer: http
Page 72 of 72