Top Banner
LIST OF ATTEMPTED QUESTIONS AND ANSWERS Multiple Choice Single Answer Question In UNIX, a file is represented by an :- Correct Answer Inode Your Answer Inode Match The Following Question Correct Answer Your Answer Bounded-buffer Fixed size buffer Fixed size buffer Producer Produces process Produces process Consumer Consumes process Consumes process Unbounded-buffer No limit on size of buffer No limit on size of buffer Multiple Choice Multiple Answer Question Find out the human-interface devices :- Correct Answer Screen , Keyboard , Mouse Your Answer Keyboard , Mouse Match The Following Question Correct Answer Your Answer RAM Main Memory Main Memory Monitor mode Supervisor mode Supervisor mode System call Monitor call Monitor call Cache Faster storage Faster storage Multiple Choice Single Answer Question If the process is waiting to be assigned to CPU then it is said to be in :- Correct Answer Ready state Your Answer Waiting state True/False Question Whenever the operating system gains control of the computer, it is in monitor mode. Correct Answer True Your Answer True Multiple Choice Multiple Answer Question We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes?
63
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Operating System

LIST OF ATTEMPTED QUESTIONS AND ANSWERS

Multiple Choice Single Answer Question In UNIX, a file is represented by an :- Correct Answer Inode Your Answer Inode

Match The Following Question Correct Answer Your Answer

Bounded-buffer Fixed size buffer Fixed size buffer

Producer Produces process Produces process

Consumer Consumes process Consumes process

Unbounded-buffer No limit on size of buffer No limit on size of buffer

Multiple Choice Multiple Answer Question Find out the human-interface devices :- Correct Answer Screen , Keyboard , Mouse Your Answer Keyboard , Mouse

Match The Following Question Correct Answer Your Answer

RAM Main Memory Main Memory

Monitor mode Supervisor mode Supervisor mode

System call Monitor call Monitor call

Cache Faster storage Faster storage

Multiple Choice Single Answer Question If the process is waiting to be assigned to CPU then it is said to be in :- Correct Answer Ready state Your Answer Waiting state

True/False Question Whenever the operating system gains control of the computer, it is in monitor mode. Correct Answer True Your Answer True

Multiple Choice Multiple Answer Question We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes? Correct Answer User mode , Monitor mode Your Answer User mode , Monitor mode

Multiple Choice Multiple Answer Question The Linux system is composed of three main bodies of code, in line with most traditional UNIX implementations. Which are :- Correct Answer Kernel , System libraries , System utilities Your Answer Kernel , System libraries , System utilities

Multiple Choice Single Answer Question Changing a standard file in UNIX system is known as :- Correct Answer I/O redirection Your Answer I/O redirection

Page 2: Operating System

Multiple Choice Single Answer Question Each object has a unique :- Correct Answer Name Your Answer Name

Select The Blank Question A product is considered ________ if it is significantly less expensive to adopt on new hardware or platform. Correct Answer Portable Your Answer Portable

True/False Question A state is safe if the system can allocate resources to each process (upto its maximum) in some order and still avoid a deadlock. Correct Answer True Your Answer True

Select The Blank Question ________ is the ability to handle error conditions, including the ability of the operating system to protect itself and its users from defective or malicious software. Correct Answer Reliability Your Answer Reliability

Multiple Choice Multiple Answer Question There are two types of Message passing, they are :- Correct Answer Synchronous , Asynchronous Your Answer Synchronous , Asynchronous

Multiple Choice Single Answer Question The wraping up of data and methods in a single unit (class) is known as : Correct Answer Encapsulation Your Answer Encapsulation

Multiple Choice Single Answer Question Protection can improve :- Correct Answer Reliability Your Answer Reliability

Select The Blank Question In queuing diagram, the arrow indicates the flow of ________ in the system. Correct Answer Processes Your Answer Processes

Multiple Choice Multiple Answer Question In a uniprocessor system, there is :- Correct Answer Single processor , Single running process Your Answer Single processor , Single running process , Unique process

Multiple Choice Single Answer Question The concept of OOPS was first introduced in Correct Answer Simula Language Your Answer FORTRAN language

Select The Blank Question During execution, ________ register holds the sector for the data segment. Correct Answer DS Your Answer CS

Multiple Choice Single Answer Question In JAVA , the derived class is known as Correct Answer Subclass Your Answer Reference class

Page 3: Operating System

True/False Question At Physical level, the site or sites containing the computer systems must be physically secured against armed or surreptitious entry by intruders. Correct Answer True Your Answer True

True/False Question In UNIX, the user refers to a file by a path name, whereas the file system uses the inode as its definition of a file. Correct Answer True Your Answer True

Multiple Choice Single Answer Question In MULTICS TLB address of 'n', the most recently referenced pages are kept, where 'n' can have a value :- Correct Answer 16 Your Answer 16

True/False Question Object-oriented programming focuses on the integrated data and functionality as discrete units that have both knowledge (data) and capabilities (functions). Procedural programs, on the other hand, focus on functions and how they act on data. Correct Answer True Your Answer True

Select The Blank Question ________ describes segments local to each program, including its code, data, stack etc. Correct Answer LDT Your Answer MMU

Multiple Choice Multiple Answer Question Memory management system is divided into :- Correct Answer A low level MMU handler , A page fault handler that is part of the kernel , An external pager running in user space Your Answer A low level MMU handler , An external pager running in user space , Page tracker

Multiple Choice Single Answer Question Policies for resource use may vary depending on the :- Correct Answer Application Your Answer Application

Select The Blank Question A variation of the Trojan horse is a program that ________ a login program. Correct Answer Emulates Your Answer Emulates

True/False Question An unsafe state may lead to a deadlock. Correct Answer True Your Answer True

True/False Question LRU algorithm can not be implemented without special hardware. Correct Answer True Your Answer False

Multiple Choice Multiple Answer Question The device number consists of which two parts in UNIX? Correct Answer Major device number , Minor device number Your Answer Major device number , Minor device number

Multiple Choice Multiple Answer

Page 4: Operating System

Question Computer system consists of :- Correct Answer CPU , Multiple device controller Your Answer CPU , Multiple device controller , Multiple memory controller

Multiple Choice Single Answer Question The main difference between structure and class is Correct Answer Structure does not support OOPS Class Supports OOPS. Your Answer Structure does not support OOPS Class Supports OOPS.

Select The Blank Question Each entry in the access matrix consists of a set of ________ . Correct Answer Access right Your Answer Access right

Multiple Choice Multiple Answer Question Linux presents standard interfaces to whom? Correct Answer Programmer , User Your Answer Programmer , User

Multiple Choice Single Answer Question The separation of policy and mechanism is important for which purpose? Correct Answer Flexibility Your Answer Flexibility

Multiple Choice Single Answer Question When computer is powered up or rebooted, it needs to have an initial program to run. This initial program is known as :- Correct Answer Bootstrap program Your Answer Bootstrap program

True/False Question A major security problem for operating system is authentication. Correct Answer True Your Answer False

Multiple Choice Multiple Answer Question There are components to the module support under Linux, identify them :- Correct Answer Module management , Driver registration , Conflict-resolution mechanism Your Answer Module management , Driver registration , Conflict-resolution mechanism

Multiple Choice Multiple Answer Question Once the I/O is started , which two courses of action are possible? Correct Answer Synchronous I/O , Asynchronous I/O , Simple I/O Your Answer Synchronous I/O , Asynchronous I/O

True/False Question In evolutionary model, the management activities are emphasised with respect to inception, elaboration, construction & transition. Correct Answer True Your Answer True

Select The Blank Question If the granularity field is ________ the limit field is the exact segment size, upto 1 MB. Correct Answer 0 Your Answer 8

Multiple Choice Single Answer Question Policies for resource use may be subject to change over :- Correct Answer Time Your Answer Time

True/False

Page 5: Operating System

Question The principle of polymorphism helps to extend and modify the system scope through appropriate messaging mechanism. Correct Answer True Your Answer True

Select The Blank Question The processes in the system can execute concurrently, and they must be created and deleted ________ . Correct Answer Dynamically Your Answer Dynamically

Select The Blank Question In Linux, the allocator uses a ________ algorithm to keep track of available physical pages. Correct Answer Buddy-heap Your Answer Buddy-heap

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Multiple Choice Multiple AnswerQuestionVarious storage systems available possesses which two characteristics?Correct AnswerVolatile , Non-volatileYour AnswerVolatile , Non-volatileMultiple Choice Multiple AnswerQuestionMost CPUs have two interrupt request lines. Which are they?Correct AnswerMaskable , Non maskableYour AnswerMaskable , Non maskableSelect The BlankQuestionA ________ is a group of NT server machines that share a common security policy and user databases.Correct AnswerDomainYour AnswerDomainSelect The BlankQuestionAn ________ is a dedicated, special purpose CPU found in mainframes and in other high-end systems.Correct AnswerI/O channelYour AnswerI/O channelMultiple Choice Single AnswerQuestionThe CPU is allocated to the selected process by the :-Correct AnswerDispatcherYour AnswerDispatcherMultiple Choice Single AnswerQuestionIn JAVA , the derived class is known asCorrect AnswerSubclassYour AnswerSubclassSelect The BlankQuestionThe Pentium supports four protection levels with ________ as least privileged level.

Page 6: Operating System

Correct Answer3Your Answer3Select The BlankQuestion________ of an object remains unchanged even though its state and properties change.Correct AnswerIdentityYour AnswerIdentityTrue/FalseQuestionOne way to achieve portability is to write software in standard version of high level language and to develop portable system and application software .Correct AnswerTrueYour AnswerTrueMultiple Choice Single AnswerQuestionSoftware may trigger an interrupt by executing a special operation called :-Correct AnswerSystem callYour AnswerSystem callMultiple Choice Single AnswerQuestionIn Object Oriented technology following expression is appropriateCorrect Answerobject=data+menthodsYour Answerobject=data+menthodsMultiple Choice Multiple AnswerQuestionThe two versions of NT are :Correct AnswerWindowsNT workstations , WindowsNT serverYour AnswerWindowsNT workstations , WindowsNT serverMatch The FollowingQuestionCorrect AnswerYour AnswerWe can define abstract operation on abstract dataData abstractionData abstractionProcess of sharing properties of the higher level object or classInheritanceInheritanceAbility to inherit attributes and methods from 2 or more objects or classesMultiple inheritanceMultiple inheritanceAbility to send a message to several objects and to allow receiving object to respond method specified on the object.PloymorphismPloymorphismSelect The BlankQuestionA________ is a memory area that stores data while they are transferred between two devices or between a device and an application.Correct AnswerBuffer

Page 7: Operating System

Your AnswerBufferTrue/FalseQuestionIn Public Key Encryption, each user has both a public and a private key.Correct AnswerTrueYour AnswerTrueTrue/FalseQuestionData transfer from cache to CPU and registers is usually a software function, with little operating system intervention.Correct AnswerFalseYour AnswerFalseMultiple Choice Multiple AnswerQuestionLiner address is divided into fields like :-Correct AnswerDir , Page , OffsetYour AnswerDir , Page , OffsetMultiple Choice Single AnswerQuestionIPC is particularly useful in a :-Correct AnswerDistributed environmentYour AnswerInternet environmentMultiple Choice Single AnswerQuestionIPC provides a mechanism to allow processes to communicate and to synchronize their actions without sharing the same :-Correct AnswerAddress spaceYour AnswerSemaphoreMultiple Choice Multiple AnswerQuestionSupervisor mode is also known as :-Correct AnswerPrivileged mode , Monitor mode , System modeYour AnswerSystem mode , Privileged mode , Monitor modeSelect The BlankQuestionAssuming that the segment is in memory and the offset is in range, the Pentium then adds the ________ bit base field in the descriptor to the offset to form linear address.Correct Answer32Your Answer32Multiple Choice Multiple AnswerQuestionIn Solaris 2, user-level threads may be:-Correct AnswerBound , UnboundYour AnswerBound , UnboundMultiple Choice Single AnswerQuestion

Page 8: Operating System

The concept of OOPS was first introduced inCorrect AnswerSimula LanguageYour AnswerSimula LanguageTrue/FalseQuestionAt system boot time, the hardware starts in monitor mode.Correct AnswerTrueYour AnswerTrueMultiple Choice Single AnswerQuestionThe main difference between structure and class isCorrect AnswerStructure does not support OOPS Class Supports OOPS.Your AnswerStructure does not support OOPS Class Supports OOPS.Select The BlankQuestionA ________ controller is built into each disk drive.Correct AnswerDiskYour AnswerDiskMultiple Choice Single AnswerQuestionIf a class fruit has object mango, the relationship is expressed as :Correct AnswerFruit mangoYour AnswerFruit mangoTrue/FalseQuestionThe hardware allows privileged instructions to be executed in only user mode.Correct AnswerFalseYour AnswerFalseMultiple Choice Multiple AnswerQuestionAn object type in windows NT is a system defined data type that has two things associated with it, which are they?Correct AnswerSet of attributes , Set of methodsYour AnswerSet of attributes , Set of methodsSelect The BlankQuestionThe kernel module that controls a device is a ________ .Correct AnswerDevice driverYour AnswerDevice driverMultiple Choice Single AnswerQuestionIf process P and Q want to communicate, they must send messages to and receive messages from each other: Thus link established between two process is known as :-Correct AnswerCommunication linkYour AnswerDirect link

Page 9: Operating System

Multiple Choice Multiple AnswerQuestionDispatcher functions involves the following :-Correct AnswerSwitching context , Switching to user modeYour AnswerSwitching context , Switching to user modeSelect The BlankQuestionIn windows NT, the ________ facility is used to pass requests and results between client and server processes within a single machine.Correct AnswerLocal-procedure-callYour AnswerLocal-procedure-callTrue/FalseQuestionIf some of the pages are shared with other process, the pages in memory and on the disk can only be released when the last process using them has terminated.Correct AnswerTrueYour AnswerTrueSelect The BlankQuestionThe Solaris developers reimplemented the ________ using in-kernel thread to eliminate the context switch involved in moving each character between daemons and the kernel.Correct AnswerTelnet daemonYour AnswerContext-switch daemonMultiple Choice Single AnswerQuestionModern operating systems are :-Correct AnswerInterrupt drivenYour AnswerInterrupt drivenMatch The FollowingQuestionCorrect AnswerYour AnswerBounded-bufferFixed size bufferFixed size bufferProducerProduces processProduces processConsumerConsumes processConsumes processUnbounded-bufferNo limit on size of bufferNo limit on size of bufferMultiple Choice Multiple AnswerQuestionIn Linux, the paging system can be divided into sections, namely:-Correct AnswerPolicy algorithm , Paging mechanismYour AnswerPolicy algorithm , Paging mechanism

Page 10: Operating System

Multiple Choice Single AnswerQuestionA process data section contains:-Correct AnswerGlobal variablesYour AnswerTemporary dataTrue/FalseQuestionOOSAD approach is applicable only to stable systems.Correct AnswerFalseYour AnswerFalseTrue/FalseQuestionSegment length may change during execution.Correct AnswerTrueYour AnswerTrueMultiple Choice Multiple AnswerQuestionThe movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :-Correct AnswerExplicit , ImplicitYour AnswerExplicit , ImplicitMultiple Choice Single AnswerQuestionCollection of similar datatypes is called asCorrect AnswerArrayYour AnswerArrayTrue/FalseQuestionAt Human level, user must be screened carefully so that the chance of authorizing a user who then gives access to an intruder is reduced.Correct AnswerTrueYour AnswerTrueTrue/FalseQuestionThe user process issues a network I/O system call to send the character to the remote machine.Correct AnswerTrueYour AnswerFalseMultiple Choice Multiple AnswerQuestionMost computers have hardware clocks and timers that provide three basic functions, such as :-Correct AnswerGive the current time , Give the elapsed time , Set a timer to trigger operation at certain timeYour AnswerGive the current time , Give the elapsed time , Set a timer to trigger operation at certain timeMultiple Choice Single AnswerQuestionC++ is basically a procedural language having extension ofCorrect Answer

Page 11: Operating System

Object Oriented technologyYour AnswerObject Oriented technology+++LIST OF ATTEMPTED QUESTIONS AND ANSWERSMultiple Choice Multiple AnswerQuestionlocate the transmission devices :-Correct AnswerNetwork cards , ModemsYour AnswerTapes , Network cards , ModemsTrue/FalseQuestionThe user process issues a network I/O system call to send the character to the remote machine.Correct AnswerTrueYour AnswerTrueMultiple Choice Single AnswerQuestionThe process by which objects of one class acquire properties of objects of other class is calledCorrect AnswerInheritanceYour AnswerInheritanceTrue/FalseQuestionWindows NT uses a message passing implementation for I/O.Correct AnswerTrueYour AnswerTrueMultiple Choice Multiple AnswerQuestionWe need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes?Correct AnswerUser mode , Monitor modeYour AnswerUser mode , Monitor modeMatch The FollowingQuestionCorrect AnswerYour AnswerRound-robinTime quantumTime quantumFirst-come First-servedFirst come jobFirst come jobShortest jobShortest jobShortest jobPriorityHighest priority jobHighest priority jobMultiple Choice Single AnswerQuestionThe segment is :-Correct AnswerLogical entity

Page 12: Operating System

Your AnswerLogical entityMultiple Choice Single AnswerQuestionIn UNIX, decisions regarding which process to swap in or out are made by whom?Correct AnswerSwapperYour AnswerMemory handlerSelect The BlankQuestionA ________ is a client-server mechanism that enables an application on one machine to make a procedure call to code on another machine.Correct AnswerRemote-procedure-callYour AnswerRemote-procedure-callMultiple Choice Single AnswerQuestionWhen each process that wants to communicate must explicitly name the recipient or sender of the communication, then such communication is called as :-Correct AnswerDirect communicationYour AnswerIndirect communicationSelect The BlankQuestionIn Linux, the allocator uses a ________ algorithm to keep track of available physical pages.Correct AnswerBuddy-heapYour AnswerBinary-searchMultiple Choice Single AnswerQuestionWhat does the rows of the access matrix represents?Correct AnswerDomainsYour AnswerDomainsMultiple Choice Single AnswerQuestionEvery change in policy requires a change in the underlying :-Correct AnswerMechanismYour AnswerSystemSelect The BlankQuestionA ________ in NT is an object that provides a uniform interface for files, whether they are local or remote.Correct AnswerRedirectorYour AnswerDomainMultiple Choice Multiple AnswerQuestionIn Solaris 2, user-level threads may be:-Correct AnswerBound , UnboundYour AnswerBound , UnboundMultiple Choice Multiple AnswerQuestion

Page 13: Operating System

An audit log records which things about an object ?Correct AnswerTime , User , Type of accessYour AnswerTime , User , Type of accessMultiple Choice Multiple AnswerQuestionOne-to-one model is supported by following systems :-Correct AnswerWindows NT , OS/2Your AnswerOS/2 , Windows NTMultiple Choice Multiple AnswerQuestionTo protect the system, we must take security measures at two levels, such as :-Correct AnswerPhysical level , Human levelYour AnswerHuman level , Global levelMultiple Choice Single AnswerQuestionIf the process is waiting for some event to occur then it is said to be in :-Correct AnswerWaiting stateYour AnswerWaiting stateMultiple Choice Single AnswerQuestionA common representation for a discussion of process scheduling is a :-Correct AnswerQueuing diagramYour AnswerProcess state diagramTrue/FalseQuestionAt Physical level, the site or sites containing the computer systems must be physically secured against armed or surreptitious entry by intruders.Correct AnswerTrueYour AnswerTrueSelect The BlankQuestionWhen you express user-system interaction, the scenario in the model is called ________Correct AnswerCase modelYour AnswerCase modelTrue/FalseQuestionData transfer from cache to CPU and registers is usually a software function, with little operating system intervention.Correct AnswerFalseYour AnswerTrueTrue/FalseQuestionA file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .Correct AnswerFalseYour AnswerFalse

Page 14: Operating System

Multiple Choice Single AnswerQuestionPolymorphism means ability to takeCorrect AnswerMore than one formYour AnswerMore than one formTrue/FalseQuestionAging algorithm is based on LRU.Correct AnswerTrueYour AnswerTrueSelect The BlankQuestionThe virtual memory portion of the NT executive is the ________.Correct AnswerVirtual memory managerYour AnswerVirtual memory managerMultiple Choice Multiple AnswerQuestionThere are two types of Message passing, they are :-Correct AnswerSynchronous , AsynchronousYour AnswerSynchronous , AsynchronousSelect The BlankQuestionWeb servers use the ________ protocol to communicate with web browsers.Correct AnswerhttpYour AnswerhttpMultiple Choice Multiple AnswerQuestionThe security of a system can be improved by two management techniques, such as :-Correct AnswerThreat monitoring , Audit LogYour AnswerAudit Log , Threat findingSelect The BlankQuestionThe concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________.Correct AnswerRingYour AnswerRingTrue/FalseQuestionWe say that a system is secure if its resources are used and accessed as intended under all circumstances.Correct AnswerTrueYour AnswerTrueSelect The BlankQuestionThe ________ controller is the controller at the computer end of the bus.Correct AnswerHost

Page 15: Operating System

Your AnswerCpuMultiple Choice Multiple AnswerQuestionIn Linux, the paging system can be divided into sections, namely:-Correct AnswerPolicy algorithm , Paging mechanismYour AnswerPolicy algorithm , Paging mechanismTrue/FalseQuestionKeyboard is a sharable device.Correct AnswerTrueYour AnswerFalseTrue/FalseQuestionTransfer of data from disk to memory is usually controlled by the operating system.Correct AnswerTrueYour AnswerTrueTrue/FalseQuestionPrototyping not only helps to build a quality design but also enables the designer to build the system decremantally.Correct AnswerFalseYour AnswerTrueSelect The BlankQuestionThe UNIX system uses ________ to avoid the necessity of keeping its password list secret.Correct AnswerEncryptionYour AnswerEncryptionMatch The FollowingQuestionCorrect AnswerYour AnswerRead-write devicesDisksDisksDedicated devicesTapeCD-ROMRead-only devicesCD-ROMTapeWrite-only devicesGraphics controllerKeyboardMultiple Choice Single AnswerQuestionA procedure call, request to execute a method is termed asCorrect AnswerMessageYour AnswerMessageSelect The BlankQuestion

Page 16: Operating System

Context switch times are highly dependent on ________ support.Correct AnswerHardwareYour AnswerHardwareMultiple Choice Multiple AnswerQuestionTwo main jobs of a computer are :-Correct AnswerI/O , ProcessingYour AnswerI/O , ProcessingMultiple Choice Single AnswerQuestionThe 4.3BSD operating system is the version of :-Correct AnswerUNIXYour AnswerUNIXMultiple Choice Single AnswerQuestionThe number of processes that are completed per time unit is called as:-Correct AnswerThroughput of systemYour AnswerThroughput of systemMultiple Choice Multiple AnswerQuestionOnce the I/O is started , which two courses of action are possible?Correct AnswerSynchronous I/O , Asynchronous I/O , Simple I/OYour AnswerSynchronous I/O , Asynchronous I/OMultiple Choice Multiple AnswerQuestionSecurity violations of the system can be categorized as :-Correct AnswerMalicious , AccidentalYour AnswerMalicious , AccidentalSelect The BlankQuestionA process migrates between the various ________ throughout its lifetime.Correct AnswerScheduling queuesYour AnswerScheduling queues+++LIST OF ATTEMPTED QUESTIONS AND ANSWERSTrue/FalseQuestionFirewall monitors and logs all connections.Correct AnswerTrueYour AnswerTrueMultiple Choice Single AnswerQuestionWhich of the following Operating System has no memory protection ?Correct AnswerWindows 3.1

Page 17: Operating System

Your AnswerWindows 3.1Multiple Choice Single AnswerQuestionThe main difference between structure and class isCorrect AnswerStructure does not support OOPS Class Supports OOPS.Your AnswerStructure does not support OOPS Class Supports OOPS.Multiple Choice Single AnswerQuestionDMA stands for :-Correct AnswerDirect Memory AccessYour AnswerDirect Memory AccessMultiple Choice Single AnswerQuestionA major problem with the Priority scheduling algorithm is :-Correct AnswerStarvationYour AnswerStarvationMultiple Choice Single AnswerQuestionHow big is a class object?Correct AnswerIs as big as sum of the sizes of its member variablesYour AnswerIs as big as sum of the sizes of its member variablesMultiple Choice Single AnswerQuestionThe First version of UNIX was developed in 1969 by Ken Thompson of the Research Group at :-Correct AnswerBell LaboratoriesYour AnswerBell LaboratoriesMultiple Choice Single AnswerQuestionWhen computer is powered up or rebooted, it needs to have an initial program to run. This initial program is known as :-Correct AnswerBootstrap programYour AnswerBootstrap programTrue/FalseQuestionProcesses represents the executions of single programs whereas threads represent separate, concurrent execution contexts within a single process running a single program.Correct AnswerTrueYour AnswerTrueMultiple Choice Single AnswerQuestionIf Dog derives from Mammal, and Mammal derives from Animal, then -Correct AnswerDog inherits Animal’s functions and dataYour AnswerDog inherits Animal’s functions and dataMultiple Choice Single AnswerQuestion

Page 18: Operating System

The wraping up of data and methods in a single unit (class) is known as :Correct AnswerEncapsulationYour AnswerEncapsulationTrue/FalseQuestionLRU algorithm can not be implemented without special hardware.Correct AnswerTrueYour AnswerFalseSelect The BlankQuestionThe Solaris developers reimplemented the ________ using in-kernel thread to eliminate the context switch involved in moving each character between daemons and the kernel.Correct AnswerTelnet daemonYour AnswerTelnet daemonMultiple Choice Single AnswerQuestionAll user processes are descendents of one original process, Which is that process?Correct AnswerInit processYour AnswerInit processSelect The BlankQuestionTerminals and line printers are ________ .Correct AnswerCharacter devicesYour AnswerCharacter devicesMultiple Choice Multiple AnswerQuestionMany-to-may model is supported by following operating systems :-Correct AnswerSolaris , IRIX , Digital UNIXYour AnswerSolaris , IRIX , Digital UNIXMultiple Choice Multiple AnswerQuestionfind out the services provided by kernel related to I/O :Correct AnswerI/O Scheduling , Buffering , SpoolingYour AnswerI/O Scheduling , Buffering , SpoolingMultiple Choice Single AnswerQuestionThe long-term scheduler controls the :-Correct AnswerDegree of multiprogrammingYour AnswerDegree of multiprogrammingSelect The BlankQuestionThe concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________.Correct AnswerRing

Page 19: Operating System

Your AnswerRingMultiple Choice Multiple AnswerQuestionIn Linux, the main objects defined by the virtual file system are :-Correct AnswerInode-object , File-object , File-system objectYour AnswerInode-object , File-object , File-system objectMultiple Choice Single AnswerQuestionCollection of similar datatypes is called asCorrect AnswerArrayYour AnswerArrayMultiple Choice Multiple AnswerQuestionWe need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes?Correct AnswerUser mode , Monitor modeYour AnswerUser mode , Monitor modeMatch The FollowingQuestionCorrect AnswerYour AnswerClass ShapeTriangle, rectangle, circle, ellipseTriangle, rectangle, circle, ellipseClass VehicleScooter, car, truck, tractorScooter, car, truck, tractorClass AnimalCat, dog, cow, tigerCat, dog, cow, tigerClass ColorRed, yellow, blue, greenRed, yellow, blue, greenSelect The BlankQuestionThe virtual memory portion of the NT executive is the ________.Correct AnswerVirtual memory managerYour AnswerVirtual memory managerTrue/FalseQuestionAn asynchronous call returns immediately, without waiting for the I/O to complete.Correct AnswerTrueYour AnswerTrueTrue/FalseQuestionModem is a random-access device.Correct AnswerFalseYour AnswerFalse

Page 20: Operating System

Multiple Choice Multiple AnswerQuestionA mailbox can be owned by :-Correct AnswerProcess , Operating systemYour AnswerProcess , Operating systemMultiple Choice Multiple AnswerQuestionThe movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :-Correct AnswerExplicit , ImplicitYour AnswerExplicit , ImplicitSelect The BlankQuestionIn windows NT, the ________ facility is used to pass requests and results between client and server processes within a single machine.Correct AnswerLocal-procedure-callYour AnswerRemote-procedure-callTrue/FalseQuestionA major security problem for operating system is authentication.Correct AnswerTrueYour AnswerTrueTrue/FalseQuestionIn a blocking system call, the application is moved from the OS’s run queue to a wait queue.Correct AnswerTrueYour AnswerTrueTrue/FalseQuestionDevice speeds range from a few bytes per second to a few gigabytes per second.Correct AnswerTrueYour AnswerTrueMultiple Choice Multiple AnswerQuestionVarious storage systems available possesses which two characteristics?Correct AnswerVolatile , Non-volatileYour AnswerVolatile , Non-volatileMatch The FollowingQuestionCorrect AnswerYour AnswerWe can define abstract operation on abstract dataData abstractionData abstractionProcess of sharing properties of the higher level object or classInheritanceInheritanceAbility to inherit attributes and methods from 2 or more objects or classes

Page 21: Operating System

Multiple inheritanceMultiple inheritanceAbility to send a message to several objects and to allow receiving object to respond method specified on the object.PloymorphismPloymorphismMultiple Choice Single AnswerQuestionAs process enter the system, they are put into :-Correct AnswerJob queueYour AnswerJob queueMultiple Choice Multiple AnswerQuestionThe role of the operating system in computer I/O is to :-Correct AnswerManage I/O operation and devices , Control I/O operation and devicesYour AnswerManage I/O operation and devices , Control I/O operation and devicesSelect The BlankQuestionThe ________ is a layer of software that hides hardware differences from upper levels of the operating system.Correct AnswerHardware abstraction layerYour AnswerHardware abstraction layerSelect The BlankQuestionA ________ is a computer or router that sits between the trusted and untrusted systems.Correct AnswerFirewallYour AnswerFirewallMultiple Choice Multiple AnswerQuestionThe Moriss Internet Worm was made up of which of the two programs?Correct AnswerGrappling hook program , Main programYour AnswerGrappling hook program , Main programMultiple Choice Multiple AnswerQuestionIn UNIX, a device is distinguished by two things, which are :-Correct AnswerDevice-class , Device numberYour AnswerDevice-class , Device numberMultiple Choice Single AnswerQuestionIn general , the access matrix will be :-Correct AnswerSparseYour AnswerSparseTrue/FalseQuestionApplications normally access block devices through a file system interface.Correct AnswerTrueYour AnswerTrue

Page 22: Operating System

Multiple Choice Multiple AnswerQuestionUser thread libraries include :-Correct AnswerPOSIX Pthreads , Mach C-threads , Solaris threadsYour AnswerPOSIX Pthreads , Mach C-threads , Solaris threadsSelect The BlankQuestionThe positioning time sometimes called the ________.Correct AnswerRandom-access timeYour AnswerRandom-access timeMultiple Choice Single AnswerQuestionThe concept of OOPS was first introduced inCorrect AnswerSimula LanguageYour AnswerSimula LanguageSelect The BlankQuestion________ passwords prevent improper authentication due to password exposure.Correct AnswerOne-timeYour AnswerOne-timeMultiple Choice Single AnswerQuestionThe linking of procedure call to the code to be executed in response to that call is referred asCorrect AnswerBindingYour AnswerBinding

++++LIST OF ATTEMPTED QUESTIONS AND ANSWERSMultiple Choice Multiple AnswerQuestionKernel threads are generally :-Correct AnswerSlower to create , Difficult to manageYour AnswerSlower to create , Difficult to manageSelect The BlankQuestionIf the user-supplied password matches the password stored in the system, the system assumes that the user is ________.Correct AnswerLegitimateYour AnswerLegitimateMultiple Choice Single AnswerQuestionIn general , the access matrix will be :-Correct AnswerSparseYour AnswerSparseTrue/FalseQuestionEncryption is one common method of protecting information that is transmitted over unreliable links.

Page 23: Operating System

Correct AnswerTrueYour AnswerFalseSelect The BlankQuestionA ________ is a full duplex connection between a device driver and a user-level process.Correct AnswerStreamYour AnswerStreamMultiple Choice Single AnswerQuestionIn how many number of classes does the NRU algorithm divides pages, depending on the state of R and M?Correct Answer4Your Answer8Select The BlankQuestionThe Pentium page size is fixed at ________ KB.Correct Answer4Your Answer4True/FalseQuestionVolatile storage loses its contents when the power to the device is removed.Correct AnswerTrueYour AnswerTrueMultiple Choice Multiple AnswerQuestionThe movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :-Correct AnswerExplicit , ImplicitYour AnswerExplicit , ImplicitSelect The BlankQuestionIn queuing diagram, the arrow indicates the flow of ________ in the system.Correct AnswerProcessesYour AnswerProcessesMultiple Choice Multiple AnswerQuestionWhat are the forms of malicious access?Correct AnswerUnauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of dataYour AnswerUnauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of dataSelect The BlankQuestionA bit called the ________ , is added to the hardware of the computer to indicate the current mode.Correct AnswerMode bitYour AnswerMode bit

Page 24: Operating System

Multiple Choice Multiple AnswerQuestionIn Windows NT , kernel uses which two sets of objects?Correct AnswerDispatcher objects , Control objectsYour AnswerDispatcher objects , Complex objectsMultiple Choice Single AnswerQuestionThe smallest addressable portion of a disk is :-Correct AnswerSectorYour AnswerSectorTrue/FalseQuestionIn FIFO algorithm the page removed from memory is the one which most recently used.Correct AnswerFalseYour AnswerFalseSelect The BlankQuestionA process is ________, if it cannot affect or be affected by the other processes executing in the system.Correct AnswerIndependentYour AnswerIndependentMultiple Choice Multiple AnswerQuestionLinux presents standard interfaces to whom?Correct AnswerProgrammer , UserYour AnswerProgrammer , User , System administratorSelect The BlankQuestionThe kernel module that controls a device is a ________ .Correct AnswerDevice driverYour AnswerDevice daemonTrue/FalseQuestionWhenever a trap or interrupt occurs, the hardware switches from user mode to monitor mode.Correct AnswerTrueYour AnswerTrueSelect The BlankQuestionA ________ is a computer or router that sits between the trusted and untrusted systems.Correct AnswerFirewallYour AnswerFirewallMultiple Choice Multiple AnswerQuestionFind out the basic I/O hardware elements from the following :-Correct AnswerPorts , Buses , Device controllers

Page 25: Operating System

Your AnswerPorts , Buses , Device controllersTrue/FalseQuestionObject-oriented programming focuses on the integrated data and functionality as discrete units that have both knowledge (data) and capabilities (functions). Procedural programs, on the other hand, focus on functions and how they act on data.Correct AnswerTrueYour AnswerTrueMatch The FollowingQuestionCorrect AnswerYour AnswerUser modeMode bit 1Mode bit 1Serial portModemMonitor modeParallel portPrinterPrinterPrivileged instructionsMonitor modeMode bit 0True/FalseQuestionIn segmentation the total address space can exceed the size of physical memory.Correct AnswerTrueYour AnswerFalseMultiple Choice Single AnswerQuestionBecause of the concept of independent objects responding to messages, object orientation is a natural way to implementCorrect AnswerEvent driven programmingYour AnswerMessage deiven programmingMultiple Choice Single AnswerQuestionIn UNIX, everything below the system-call interface and above the physical hardware is the :-Correct AnswerKernelYour AnswerI/O systemMultiple Choice Multiple AnswerQuestionDifferent multithreading models available are :-Correct AnswerMany-to-one model , One-to-one model , Many-to-many modelYour AnswerMany-to-one model , One-to-one model , Many-to-many modelMultiple Choice Multiple AnswerQuestionAn object type in windows NT is a system defined data type that has two things associated with it, which are they?Correct AnswerSet of attributes , Set of methodsYour AnswerObject-type , Object-processing

Page 26: Operating System

Multiple Choice Multiple AnswerQuestionWhen memory reference occurs in MULTICS the things which takes place are :-Correct AnswerSegment number is used to find segment descriptor , Check is made to see if segment’s page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory addressYour AnswerSegment number is used to find segment descriptor , Check is made to see if segment’s page table is in memory , Page table entry for requested virtual page is examinedMultiple Choice Single AnswerQuestionThe interval from the time of submission of a process to the time of completion is :-Correct AnswerTurnaround timeYour AnswerTurnaround timeTrue/FalseQuestionContext switch times are highly dependent on hardware support.Correct AnswerTrueYour AnswerTrueTrue/FalseQuestionProcedure and data can be distinguished and separately protected in segmentationCorrect AnswerTrueYour AnswerTrueMultiple Choice Multiple AnswerQuestionDispatcher functions involves the following :-Correct AnswerSwitching context , Switching to user modeYour AnswerSwitching context , Switching to user modeMultiple Choice Single AnswerQuestionThe First version of UNIX was developed in 1969 by Ken Thompson of the Research Group at :-Correct AnswerBell LaboratoriesYour AnswerBell LaboratoriesMultiple Choice Single AnswerQuestionIn Object Oriented technology following expression is appropriateCorrect Answerobject=data+menthodsYour Answerobject=data+menthodsMultiple Choice Single AnswerQuestionA procedure body implementing an operation is termed asCorrect AnswerMethodYour AnswerMethodSelect The BlankQuestionDuring execution, ________ register holds the sector for the code segment.Correct Answer

Page 27: Operating System

CSYour AnswerPSTrue/FalseQuestionIn some operating system, spooling is managed by a system daemon process.Correct AnswerTrueYour AnswerFalseSelect The BlankQuestionEach column in the access matrix can be implemented as an ________ for one object.Correct AnswerAccess listYour AnswerCapability listMultiple Choice Single AnswerQuestionPolicies for resource use may vary depending on the :-Correct AnswerApplicationYour AnswerSystemMultiple Choice Multiple AnswerQuestionA mailbox can be owned by :-Correct AnswerProcess , Operating systemYour AnswerUser , Process , ProgramMultiple Choice Single AnswerQuestionThe ready queue is generally stored as a :-Correct AnswerLinked listYour AnswerQueueSelect The BlankQuestionA ________ is region of fast memory that hold copies of data .Correct AnswerCacheYour AnswerCacheMultiple Choice Multiple AnswerQuestionWhat are the components to memory management under Linux?Correct AnswerPhysical memory manager , Virtual memory managerYour AnswerPhysical memory manager , Virtual memory managerMatch The FollowingQuestionCorrect AnswerYour AnswerBounded-bufferFixed size bufferFixed size bufferProducerProduces processProduces process

Page 28: Operating System

ConsumerConsumes processConsumes processUnbounded-bufferNo limit on size of bufferNo limit on size of bufferTrue/FalseQuestionThe inode contains 15 pointers to the disk blocks containing the data contents of the file.Correct AnswerTrueYour AnswerTrueMultiple Choice Single AnswerQuestionWhen computer is powered up or rebooted, it needs to have an initial program to run. This initial program is known as :-Correct AnswerBootstrap programYour AnswerBootstrap program+++LIST OF ATTEMPTED QUESTIONS AND ANSWERSSelect The BlankQuestionstatic binding allows to hold certain properties fixed and rigid, whereas ________ binding allows object to behave as per conditions emerge.Correct AnswerDynamicYour AnswerDynamicMultiple Choice Single AnswerQuestionDVMA stands for :-Correct AnswerDirect Virtual Memory AccessYour AnswerDirect Virtual Memory AccessTrue/FalseQuestionSince caches have limited size, cache management is an important design problem.Correct AnswerTrueYour AnswerTrueMultiple Choice Single AnswerQuestionC++ is basically a procedural language having extension ofCorrect AnswerObject Oriented technologyYour AnswerObject Oriented technologyMultiple Choice Single AnswerQuestionThe system call checks the arguments given by the application, builds a data structure to convey the arguments to the kernel and then executes a special instruction called as :-Correct AnswerSoftware interruptYour AnswerSoftware interruptMultiple Choice Single AnswerQuestion

Page 29: Operating System

A system consists of collection of :-Correct AnswerProcessesYour AnswerProcessesSelect The BlankQuestionA________ is a memory area that stores data while they are transferred between two devices or between a device and an application.Correct AnswerBufferYour AnswerBufferMultiple Choice Multiple AnswerQuestionFind out the human-interface devices :-Correct AnswerScreen , Keyboard , MouseYour AnswerScreen , Keyboard , MouseMultiple Choice Single AnswerQuestionA procedure body implementing an operation is termed asCorrect AnswerMethodYour AnswerMethodSelect The BlankQuestionThe designer of a program or system might leave a hole, or ________ , in the software that only he is capable of using.Correct AnswerTrap doorYour AnswerTrap doorTrue/FalseQuestionThe principle of polymorphism helps to extend and modify the system scope through appropriate messaging mechanism.Correct AnswerTrueYour AnswerTrueMultiple Choice Multiple AnswerQuestionThe Linux system is composed of three main bodies of code, in line with most traditional UNIX implementations. Which are :-Correct AnswerKernel , System libraries , System utilitiesYour AnswerKernel , System libraries , System utilitiesSelect The BlankQuestionWeb servers use the ________ protocol to communicate with web browsers.Correct AnswerhttpYour AnswerhttpMultiple Choice Single AnswerQuestionThe pure Object Oriented language isCorrect AnswerJava

Page 30: Operating System

Your AnswerJavaMultiple Choice Multiple AnswerQuestionUser level threads are generally :-Correct AnswerFast to create , Easy to manageYour AnswerFast to create , Easy to manageTrue/FalseQuestionSwitching the cpu to another process requires saving the state of the old process and loading the saved state for the new process.Correct AnswerTrueYour AnswerTrueMultiple Choice Single AnswerQuestionThe process by which objects of one class acquire properties of objects of other class is calledCorrect AnswerInheritanceYour AnswerInheritanceMultiple Choice Single AnswerQuestionIn Object Oriented technology following expression is appropriateCorrect Answerobject=data+menthodsYour Answerobject=data+menthodsTrue/FalseQuestionA copy of inode is kept in main memory while a file is open.Correct AnswerTrueYour AnswerTrueMultiple Choice Multiple AnswerQuestionThe advantage of dynamic loading isCorrect AnswerUnused routine is never loaded , Useful when large amount of code are needed to handle infrequently occurring cases, such as error routines , It does not require special support from the operating systemYour AnswerIt does not require special support from the operating system , Unused routine is never loaded , Useful when large amount of code are needed to handle infrequently occurring cases, such as error routinesSelect The BlankQuestionOOSAD begins with identification of actors, what activities they perform and building ________ model for the function.Correct AnswerUse-caseYour AnswerUse-caseMultiple Choice Single AnswerQuestionIf a class fruit has object mango, the relationship is expressed as :Correct AnswerFruit mangoYour AnswerFruit mango

Page 31: Operating System

Multiple Choice Single AnswerQuestionThe class bird should have objectCorrect AnswerEgaleYour AnswerEgaleSelect The BlankQuestionThe ________ controller is the controller at the computer end of the bus.Correct AnswerHostYour AnswerHostMultiple Choice Single AnswerQuestionThe insulation of data from direct access by the program is known as :Correct AnswerData hidingYour AnswerData hidingMultiple Choice Multiple AnswerQuestionLiner address is divided into fields like :-Correct AnswerDir , Page , OffsetYour AnswerDir , Page , OffsetMultiple Choice Single AnswerQuestionEvery change in policy requires a change in the underlying :-Correct AnswerMechanismYour AnswerMechanismMultiple Choice Single AnswerQuestionUNIX operating system is written mostly in :-Correct AnswerC languageYour AnswerC languageMultiple Choice Single AnswerQuestionIn UNIX, a file is represented by an :-Correct AnswerInodeYour AnswerInodeSelect The BlankQuestionIf paging is enabled, the liner address is interpreted as virtual address and mapped to the physical address using ________ table.Correct AnswerPageYour AnswerPageMultiple Choice Multiple AnswerQuestionWhat are the forms of malicious access?Correct AnswerUnauthorized destruction of data , Unauthorized reading of data , Unauthorized modification of data

Page 32: Operating System

Your AnswerUnauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of dataMultiple Choice Multiple AnswerQuestionWhat are the components to memory management under Linux?Correct AnswerPhysical memory manager , Virtual memory managerYour AnswerPhysical memory manager , Virtual memory managerMultiple Choice Single AnswerQuestionIPC is particularly useful in a :-Correct AnswerDistributed environmentYour AnswerDistributed environmentSelect The BlankQuestionContext switch times are highly dependent on ________ support.Correct AnswerHardwareYour AnswerHardwareMultiple Choice Multiple AnswerQuestionkernel threads are supported by following operating systems :-Correct AnswerWindows NT , Solaris , Digital UNIXYour AnswerWindows NT , Solaris , Digital UNIXSelect The BlankQuestionA ________ in NT is an object that provides a uniform interface for files, whether they are local or remote.Correct AnswerRedirectorYour AnswerRedirectorMultiple Choice Multiple AnswerQuestionIn a uniprocessor system, there is :-Correct AnswerSingle processor , Single running processYour AnswerSingle processor , Single running processTrue/FalseQuestionThe basic difference between SSAD life cycle models and OOSAD life cycle models is that one is evolutionary & iterative while the other is sequential in stages of analysis, design, coding, unit test, integrated test and system test.Correct AnswerTrueYour AnswerTrueMatch The FollowingQuestionCorrect AnswerYour AnswerReady stateProcess waiting for cpuProcess waiting for cpuNew stateProcess createdProcess created

Page 33: Operating System

Running stateExecuting processExecuting processWaiting stateWaiting processWaiting processMatch The FollowingQuestionCorrect AnswerYour AnswerParent processChild processChild processForeground processesInteractive processesInteractive processesBackground processesBatch processesBatch processesLight-Weight processesThreadThreadMultiple Choice Single AnswerQuestionIn how many number of classes does the NRU algorithm divides pages, depending on the state of R and M?Correct Answer4Your Answer4True/FalseQuestionWhen application issues a blocking I/O system call, the request is placed on the queue for that device.Correct AnswerTrueYour AnswerTrueSelect The BlankQuestionDuring execution, ________ register holds the sector for the data segment.Correct AnswerDSYour AnswerDSTrue/FalseQuestionBanker’s algorithm is a deadlock-avoidance algorithm.Correct AnswerTrueYour AnswerTrueMultiple Choice Single AnswerQuestionModel of protection can be viewed abstractly as a matrix which is known as :-Correct AnswerAccess matrixYour AnswerAccess matrixMultiple Choice Multiple AnswerQuestionKernel threads are generally :-Correct AnswerSlower to create , Difficult to manage

Page 34: Operating System

Your AnswerSlower to create , Difficult to manageMultiple Choice Multiple AnswerQuestionOne-to-one model is supported by following systems :-Correct AnswerWindows NT , OS/2Your AnswerWindows NT , OS/2++++LIST OF ATTEMPTED QUESTIONS AND ANSWERSMultiple Choice Multiple AnswerQuestionlocate the transmission devices :-Correct AnswerNetwork cards , ModemsYour AnswerTapes , Network cards , ModemsTrue/FalseQuestionThe user process issues a network I/O system call to send the character to the remote machine.Correct AnswerTrueYour AnswerTrueMultiple Choice Single AnswerQuestionThe process by which objects of one class acquire properties of objects of other class is calledCorrect AnswerInheritanceYour AnswerInheritanceTrue/FalseQuestionWindows NT uses a message passing implementation for I/O.Correct AnswerTrueYour AnswerTrueMultiple Choice Multiple AnswerQuestionWe need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes?Correct AnswerUser mode , Monitor modeYour AnswerUser mode , Monitor modeMatch The FollowingQuestionCorrect AnswerYour AnswerRound-robinTime quantumTime quantumFirst-come First-servedFirst come jobFirst come jobShortest jobShortest jobShortest jobPriority

Page 35: Operating System

Highest priority jobHighest priority jobMultiple Choice Single AnswerQuestionThe segment is :-Correct AnswerLogical entityYour AnswerLogical entityMultiple Choice Single AnswerQuestionIn UNIX, decisions regarding which process to swap in or out are made by whom?Correct AnswerSwapperYour AnswerMemory handlerSelect The BlankQuestionA ________ is a client-server mechanism that enables an application on one machine to make a procedure call to code on another machine.Correct AnswerRemote-procedure-callYour AnswerRemote-procedure-callMultiple Choice Single AnswerQuestionWhen each process that wants to communicate must explicitly name the recipient or sender of the communication, then such communication is called as :-Correct AnswerDirect communicationYour AnswerIndirect communicationSelect The BlankQuestionIn Linux, the allocator uses a ________ algorithm to keep track of available physical pages.Correct AnswerBuddy-heapYour AnswerBinary-searchMultiple Choice Single AnswerQuestionWhat does the rows of the access matrix represents?Correct AnswerDomainsYour AnswerDomainsMultiple Choice Single AnswerQuestionEvery change in policy requires a change in the underlying :-Correct AnswerMechanismYour AnswerSystemSelect The BlankQuestionA ________ in NT is an object that provides a uniform interface for files, whether they are local or remote.Correct AnswerRedirectorYour AnswerDomainMultiple Choice Multiple AnswerQuestion

Page 36: Operating System

In Solaris 2, user-level threads may be:-Correct AnswerBound , UnboundYour AnswerBound , UnboundMultiple Choice Multiple AnswerQuestionAn audit log records which things about an object ?Correct AnswerTime , User , Type of accessYour AnswerTime , User , Type of accessMultiple Choice Multiple AnswerQuestionOne-to-one model is supported by following systems :-Correct AnswerWindows NT , OS/2Your AnswerOS/2 , Windows NTMultiple Choice Multiple AnswerQuestionTo protect the system, we must take security measures at two levels, such as :-Correct AnswerPhysical level , Human levelYour AnswerHuman level , Global levelMultiple Choice Single AnswerQuestionIf the process is waiting for some event to occur then it is said to be in :-Correct AnswerWaiting stateYour AnswerWaiting stateMultiple Choice Single AnswerQuestionA common representation for a discussion of process scheduling is a :-Correct AnswerQueuing diagramYour AnswerProcess state diagramTrue/FalseQuestionAt Physical level, the site or sites containing the computer systems must be physically secured against armed or surreptitious entry by intruders.Correct AnswerTrueYour AnswerTrueSelect The BlankQuestionWhen you express user-system interaction, the scenario in the model is called ________Correct AnswerCase modelYour AnswerCase modelTrue/FalseQuestionData transfer from cache to CPU and registers is usually a software function, with little operating system intervention.Correct AnswerFalseYour AnswerTrue

Page 37: Operating System

True/FalseQuestionA file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .Correct AnswerFalseYour AnswerFalseMultiple Choice Single AnswerQuestionPolymorphism means ability to takeCorrect AnswerMore than one formYour AnswerMore than one formTrue/FalseQuestionAging algorithm is based on LRU.Correct AnswerTrueYour AnswerTrueSelect The BlankQuestionThe virtual memory portion of the NT executive is the ________.Correct AnswerVirtual memory managerYour AnswerVirtual memory managerMultiple Choice Multiple AnswerQuestionThere are two types of Message passing, they are :-Correct AnswerSynchronous , AsynchronousYour AnswerSynchronous , AsynchronousSelect The BlankQuestionWeb servers use the ________ protocol to communicate with web browsers.Correct AnswerhttpYour AnswerhttpMultiple Choice Multiple AnswerQuestionThe security of a system can be improved by two management techniques, such as :-Correct AnswerThreat monitoring , Audit LogYour AnswerAudit Log , Threat findingSelect The BlankQuestionThe concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________.Correct AnswerRingYour AnswerRingTrue/FalseQuestionWe say that a system is secure if its resources are used and accessed as intended under all circumstances.Correct AnswerTrue

Page 38: Operating System

Your AnswerTrueSelect The BlankQuestionThe ________ controller is the controller at the computer end of the bus.Correct AnswerHostYour AnswerCpuMultiple Choice Multiple AnswerQuestionIn Linux, the paging system can be divided into sections, namely:-Correct AnswerPolicy algorithm , Paging mechanismYour AnswerPolicy algorithm , Paging mechanismTrue/FalseQuestionKeyboard is a sharable device.Correct AnswerTrueYour AnswerFalseTrue/FalseQuestionTransfer of data from disk to memory is usually controlled by the operating system.Correct AnswerTrueYour AnswerTrueTrue/FalseQuestionPrototyping not only helps to build a quality design but also enables the designer to build the system decremantally.Correct AnswerFalseYour AnswerTrueSelect The BlankQuestionThe UNIX system uses ________ to avoid the necessity of keeping its password list secret.Correct AnswerEncryptionYour AnswerEncryptionMatch The FollowingQuestionCorrect AnswerYour AnswerRead-write devicesDisksDisksDedicated devicesTapeCD-ROMRead-only devicesCD-ROMTapeWrite-only devicesGraphics controllerKeyboardMultiple Choice Single AnswerQuestion

Page 39: Operating System

A procedure call, request to execute a method is termed asCorrect AnswerMessageYour AnswerMessageSelect The BlankQuestionContext switch times are highly dependent on ________ support.Correct AnswerHardwareYour AnswerHardwareMultiple Choice Multiple AnswerQuestionTwo main jobs of a computer are :-Correct AnswerI/O , ProcessingYour AnswerI/O , ProcessingMultiple Choice Single AnswerQuestionThe 4.3BSD operating system is the version of :-Correct AnswerUNIXYour AnswerUNIXMultiple Choice Single AnswerQuestionThe number of processes that are completed per time unit is called as:-Correct AnswerThroughput of systemYour AnswerThroughput of systemMultiple Choice Multiple AnswerQuestionOnce the I/O is started , which two courses of action are possible?Correct AnswerSynchronous I/O , Asynchronous I/O , Simple I/OYour AnswerSynchronous I/O , Asynchronous I/OMultiple Choice Multiple AnswerQuestionSecurity violations of the system can be categorized as :-Correct AnswerMalicious , AccidentalYour AnswerMalicious , AccidentalSelect The BlankQuestionA process migrates between the various ________ throughout its lifetime.Correct AnswerScheduling queuesYour AnswerScheduling queues+++LIST OF ATTEMPTED QUESTIONS AND ANSWERSMultiple Choice Multiple AnswerQuestionA mailbox can be owned by :-Correct AnswerOperating system , Process

Page 40: Operating System

Your AnswerUser , ProcessMultiple Choice Single AnswerQuestionSoftware may trigger an interrupt by executing a special operation called :-Correct AnswerSystem callYour AnswerInterrupt callMatch The FollowingQuestionCorrect AnswerYour AnswerUser modeMode bit 1Monitor modeSerial portModemModemParallel portPrinterPrinterPrivileged instructionsMonitor modeUPSMultiple Choice Multiple AnswerQuestionThe movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :-Correct AnswerExplicit , ImplicitYour AnswerImplicit , IndirectMultiple Choice Multiple AnswerQuestionWhat are the ways in which a request for kernel-mode execution can occur in Linux?Correct AnswerExplicitly , ImplicitlyYour AnswerImplicitly , Function callMultiple Choice Multiple AnswerQuestionSupervisor mode is also known as :-Correct AnswerSystem mode , Privileged mode , Monitor modeYour AnswerPrivileged mode , Special modeMultiple Choice Multiple AnswerQuestionThe role of the operating system in computer I/O is to :-Correct AnswerManage I/O operation and devices , Control I/O operation and devicesYour AnswerManage I/O operation and devices , I/O processingTrue/FalseQuestionIn UNIX, first two names in every directory are “.” and “..”Correct AnswerTrueYour AnswerFalse

Page 41: Operating System

Multiple Choice Multiple AnswerQuestionVarious storage systems available possesses which two characteristics?Correct AnswerVolatile , Non-volatileYour AnswerPrimary storage , Secondary storageMultiple Choice Single AnswerQuestionA program in execution is:-Correct AnswerProcessYour AnswerOperationSelect The BlankQuestionIn some operating system, spooling is handled by an ________ .Correct AnswerIn-kernel threadYour AnswerIn-kernel threadSelect The BlankQuestionThe hardware to measure elapsed time to trigger operations is called a ________.Correct AnswerProgrammable interval timerYour AnswerElapsed timerTrue/FalseQuestionNFU algorithm requires a software counter associated with each page initially zero.Correct AnswerTrueYour AnswerTrueTrue/FalseQuestionVolatile storage loses its contents when the power to the device is removed.Correct AnswerTrueYour AnswerFalseMatch The FollowingQuestionCorrect AnswerYour AnswerMFTMulti programming with fixed taskMulti programming with fixed taskRAMVolatile memoryVolatile memoryROMRead only memoryRead only memoryBIOSBasic input output systemBasic input output systemSelect The BlankQuestion________ includes disks and tapes.Correct Answer

Page 42: Operating System

Block devicesYour AnswerSocket interfacesSelect The BlankQuestionThe process could create a new ________ and wait for its termination.Correct AnswerSub processYour AnswerChildTrue/FalseQuestionThe cipher text can be stored in a readable file or transmitted over unprotected channels.Correct AnswerTrueYour AnswerTrueSelect The BlankQuestionThe virtual memory portion of the NT executive is the ________.Correct AnswerVirtual memory managerYour AnswerPage-memory managerMultiple Choice Single AnswerQuestionThe main difference between structure and class isCorrect AnswerStructure does not support OOPS Class Supports OOPS.Your AnswerStructure is used in OOPS. Classes are used in procedural programs.Multiple Choice Multiple AnswerQuestionFind out different types of I/O buses :-Correct AnswerEIDE , SCSIYour AnswerEIDE , SCSISelect The BlankQuestion________ passwords prevent improper authentication due to password exposure.Correct AnswerOne-timeYour AnswerEncryptedSelect The BlankQuestionLike worms, ________ are designed to spread into other programs and can wreak havoc in a system.Correct AnswerVirusesYour AnswerTrojan horsesSelect The BlankQuestionA ________ in NT is an object that provides a uniform interface for files, whether they are local or remote.Correct AnswerRedirectorYour AnswerDirectorSelect The BlankQuestionOne interface that is available in many operating systems, including UNIX and WindowsNT, is the network ________

Page 43: Operating System

interface.Correct AnswerSocketYour AnswerDeviceTrue/FalseQuestionIn Windows NT, kernel can be paged out of memory and its executions can be preempted.Correct AnswerFalseYour AnswerTrueMultiple Choice Single AnswerQuestionThe insulation of data from direct access by the program is known as :Correct AnswerData hidingYour AnswerAbstractionMultiple Choice Single AnswerQuestionThe concept of OOPS was first introduced inCorrect AnswerSimula LanguageYour AnswerSimula LanguageMultiple Choice Multiple AnswerQuestionlocate the transmission devices :-Correct AnswerNetwork cards , ModemsYour AnswerNetwork cards , ModemsMultiple Choice Single AnswerQuestionHow big is a class object?Correct AnswerIs as big as sum of the sizes of its member variablesYour AnswerIs as big as sum of the sizes of its member variablesMultiple Choice Single AnswerQuestionThe system call checks the arguments given by the application, builds a data structure to convey the arguments to the kernel and then executes a special instruction called as :-Correct AnswerSoftware interruptYour AnswerSpecial system callMultiple Choice Multiple AnswerQuestionSecurity violations of the system can be categorized as :-Correct AnswerMalicious , AccidentalYour AnswerUnauthorized , AuthorizedSelect The BlankQuestionMost computers have ________ clocks and timers.Correct AnswerHardwareYour AnswerIn-built

Page 44: Operating System

Multiple Choice Single AnswerQuestionA domain is a collection of :-Correct AnswerAccess rightsYour AnswerObjectsTrue/FalseQuestionIn paging the total address space can exceed the size of physical memoryCorrect AnswerTrueYour AnswerTrueMultiple Choice Single AnswerQuestionObjects may communicate with each other throughCorrect AnswerMethodsYour AnswerMethodsMultiple Choice Single AnswerQuestionA system consists of collection of :-Correct AnswerProcessesYour AnswerProcessesMultiple Choice Multiple AnswerQuestionAn audit log records which things about an object ?Correct AnswerTime , User , Type of accessYour AnswerTime , Type of accessMultiple Choice Single AnswerQuestionIt has been said that Pascal and C programs are collections of procedures and C++ programs are collections ofCorrect AnswerClassesYour AnswerClassesSelect The BlankQuestionOOSAD begins with identification of actors, what activities they perform and building ________ model for the function.Correct AnswerUse-caseYour AnswerUse-caseMultiple Choice Single AnswerQuestionThe smallest addressable portion of a disk is :-Correct AnswerSectorYour AnswerSectorTrue/FalseQuestionOOSAD approach is applicable only to stable systems.Correct AnswerFalse

Page 45: Operating System

Your AnswerTrueTrue/FalseQuestionTo perform a disk I/O operation, the computer places a command into the host controller, typically using memory-mapped I/O ports.Correct AnswerTrueYour AnswerTrueMultiple Choice Single AnswerQuestionThe number of processes that are completed per time unit is called as:-Correct AnswerThroughput of systemYour AnswerEfficiency of systemMultiple Choice Single AnswerQuestionIn MULTICS TLB address of ‘n’, the most recently referenced pages are kept, where ‘n’ can have a value :-Correct Answer16Your Answer8True/FalseQuestionThe job of I/O channel is to offload I/O work from the main CPU.Correct AnswerTrueYour AnswerFalse+++LIST OF ATTEMPTED QUESTIONS AND ANSWERSMultiple Choice Single AnswerQuestionEach object is associated with the data of type class with which they are created. A class is thus a collection of objects ofCorrect AnswerSimilar typeYour AnswerSimilar typeMultiple Choice Single AnswerQuestionC++ is also named asCorrect AnswerC with classesYour AnswerVisual C++Select The BlankQuestionThe ________ of a process is represented in the PCB of a process.Correct AnswerContextYour AnswerControlMultiple Choice Multiple AnswerQuestionIn windows NT, naming of objects is of two types :-Correct AnswerPermanent name , Temporary nameYour AnswerPermanent name , Object-primary name

Page 46: Operating System

Match The FollowingQuestionCorrect AnswerYour AnswerClass ShapeTriangle, rectangle, circle, ellipseTriangle, rectangle, circle, ellipseClass VehicleScooter, car, truck, tractorScooter, car, truck, tractorClass AnimalCat, dog, cow, tigerCat, dog, cow, tigerClass ColorRed, yellow, blue, greenRed, yellow, blue, greenMultiple Choice Multiple AnswerQuestionComputer system consists of :-Correct AnswerCPU , Multiple device controllerYour AnswerCPU , Multiple device controllerMultiple Choice Single AnswerQuestionIn JAVA , the derived class is known asCorrect AnswerSubclassYour AnswerSubclassSelect The BlankQuestionTo make as interval call, the CALL instruction must contain ________.Correct AnswerSelectorYour AnswerAddressTrue/FalseQuestionIn Lock-key mechanism, users are allowed to examine or modify the list of keys or locks directly.Correct AnswerFalseYour AnswerTrueMultiple Choice Single AnswerQuestionA major problem with the Priority scheduling algorithm is :-Correct AnswerStarvationYour AnswerCPU timeSelect The BlankQuestion________ of an object remains unchanged even though its state and properties change.Correct AnswerIdentityYour AnswerIdentityMultiple Choice Single AnswerQuestionThe process by which objects of one class acquire properties of objects of other class is calledCorrect Answer

Page 47: Operating System

InheritanceYour AnswerPolymorphismSelect The BlankQuestion________allows us to define abstract operations on abstract data.Correct AnswerData abstractionYour AnswerData abstractionTrue/FalseQuestionAn asynchronous call returns immediately, without waiting for the I/O to complete.Correct AnswerTrueYour AnswerTrueMultiple Choice Multiple AnswerQuestionlocate the storage devices from the following :-Correct AnswerDisks , TapesYour AnswerDisks , TapesMultiple Choice Single AnswerQuestionMango, apple and orange are members of classCorrect AnswerFruitYour AnswerFruitMultiple Choice Single AnswerQuestionThe pure Object Oriented language isCorrect AnswerJavaYour AnswerC++Select The BlankQuestionWeb servers use the ________ protocol to communicate with web browsers.Correct AnswerhttpYour AnswerhttpSelect The BlankQuestion________ is the ability to handle error conditions, including the ability of the operating system to protect itself and its users from defective or malicious software.Correct AnswerReliabilityYour AnswerSecurityMultiple Choice Multiple AnswerQuestionOne-to-one model is supported by following systems :-Correct AnswerWindows NT , OS/2Your AnswerSolaris , Windows NTMultiple Choice Single AnswerQuestion

Page 48: Operating System

Collection of similar datatypes is called asCorrect AnswerArrayYour AnswerArrayMultiple Choice Single AnswerQuestionC++ is basically a procedural language having extension ofCorrect AnswerObject Oriented technologyYour AnswerGraphic user interfaceMultiple Choice Single AnswerQuestionIn Object Oriented technology following expression is appropriateCorrect Answerobject=data+menthodsYour Answermethod= data + objectMultiple Choice Single AnswerQuestionIf a class fruit has object mango, the relationship is expressed as :Correct AnswerFruit mangoYour AnswerFruit mangoMultiple Choice Multiple AnswerQuestionFind out the basic I/O hardware elements from the following :-Correct AnswerPorts , Buses , Device controllersYour AnswerPorts , Buses , Device controllersMultiple Choice Single AnswerQuestionModel of protection can be viewed abstractly as a matrix which is known as :-Correct AnswerAccess matrixYour AnswerAccess matrixMultiple Choice Single AnswerQuestionThe 4.3BSD operating system is the version of :-Correct AnswerUNIXYour AnswerUNIXTrue/FalseQuestionWhen application issues a blocking I/O system call, the request is placed on the queue for that device.Correct AnswerTrueYour AnswerFalseSelect The BlankQuestion________ is defined as a cooperation between object codes produced by different software vendors & written in different programming languages.Correct AnswerInteroperabilityYour AnswerInteroperability

Page 49: Operating System

True/FalseQuestionLinux is a multi-user, multitasking system with a full set of UNIX-compatible tools.Correct AnswerTrueYour AnswerTrueMultiple Choice Single AnswerQuestionDMA stands for :-Correct AnswerDirect Memory AccessYour AnswerDirect Memory AccessMatch The FollowingQuestionCorrect AnswerYour AnswerLight-Weight processesThreadSolaris processParent processChild processUnix processForeground processesInteractive processesInteractive processesBackground processesBatch processesThreadMultiple Choice Multiple AnswerQuestionFind out the human-interface devices :-Correct AnswerScreen , Keyboard , MouseYour AnswerScreen , Keyboard , MouseSelect The BlankQuestionA process is ________ if it can affect or be affected by the other processes executing in the system.Correct AnswerCooperatingYour AnswerIndependentMultiple Choice Multiple AnswerQuestionLiner address is divided into fields like :-Correct AnswerDir , Page , OffsetYour AnswerDir , Page , FileTrue/FalseQuestionAn I/O bound process spend more of its time doing I/O than it spends doing computations.Correct AnswerTrueYour AnswerFalseMultiple Choice Single AnswerQuestionIn some systems, if a process terminates, then all its children must also be terminated. This phenomenon referred to as :-

Page 50: Operating System

Correct AnswerCascading terminationYour AnswerRemoving allMultiple Choice Multiple AnswerQuestionfind out the services provided by kernel related to I/O :Correct AnswerI/O Scheduling , Buffering , SpoolingYour AnswerI/O Scheduling , Buffering , I/o subsystemTrue/FalseQuestionThe language Classic-Ada is not OOPLCorrect AnswerFalseYour AnswerTrueSelect The BlankQuestionIn Linux, the allocator uses a ________ algorithm to keep track of available physical pages.Correct AnswerBuddy-heapYour AnswerSort-firstSelect The BlankQuestion________ describes segments local to each program, including its code, data, stack etc.Correct AnswerLDTYour AnswerLDTTrue/FalseQuestionA file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .Correct AnswerFalseYour AnswerFalseTrue/FalseQuestionA copy of inode is kept in main memory while a file is open.Correct AnswerTrueYour AnswerTrueMultiple Choice Single AnswerQuestionThe separation of policy and mechanism is important for which purpose?Correct AnswerFlexibilityYour AnswerCostingSelect The BlankQuestionA ________ is a group of NT server machines that share a common security policy and user databases.Correct AnswerDomainYour AnswerDomainMultiple Choice Single AnswerQuestion

Page 51: Operating System

If Dog derives from Mammal, and Mammal derives from Animal, then -Correct AnswerDog inherits Animal’s functions and dataYour AnswerDog inherits Animal’s functions and dataTrue/FalseQuestionKeyboard is a sharable device.Correct AnswerTrueYour AnswerFalse