Vous êtes sur la page 1sur 49

LIST OF ATTEMPTED QUESTIONS AND ANSWERS The First version of UNIX was developed in 1969 by

Ken Thompson of the Research Group at :-


True/False Correct Answer
Question Bell Laboratories
Firewall monitors and logs all connections. Your Answer
Correct Answer Bell Laboratories
True
Your Answer Multiple Choice Single Answer
True Question
When computer is powered up or rebooted, it needs
Multiple Choice Single Answer to have an initial program to run. This initial
Question program is known as :-
Which of the following Operating System has no Correct Answer
memory protection ? Bootstrap program
Correct Answer Your Answer
Windows 3.1 Bootstrap program
Your Answer
Windows 3.1 True/False
Question
Multiple Choice Single Answer Processes represents the executions of single
Question programs whereas threads represent separate,
The main difference between structure and class is concurrent execution contexts within a single
Correct Answer process running a single program.
Structure does not support OOPS Class Supports Correct Answer
OOPS. True
Your Answer Your Answer
Structure does not support OOPS Class Supports True
OOPS.
Multiple Choice Single Answer
Multiple Choice Single Answer Question
Question If Dog derives from Mammal, and Mammal derives
DMA stands for :- from Animal, then -
Correct Answer Correct Answer
Direct Memory Access Dog inherits Animal's functions and data
Your Answer Your Answer
Direct Memory Access Dog inherits Animal's functions and data

Multiple Choice Single Answer Multiple Choice Single Answer


Question Question
A major problem with the Priority scheduling The wraping up of data and methods in a single unit
algorithm is :- (class) is known as :
Correct Answer Correct Answer
Starvation Encapsulation
Your Answer Your Answer
Starvation Encapsulation

Multiple Choice Single Answer True/False


Question Question
How big is a class object? LRU algorithm can not be implemented without
Correct Answer special hardware.
Is as big as sum of the sizes of its member variables Correct Answer
Your Answer True
Is as big as sum of the sizes of its member variables Your Answer
False
Multiple Choice Single Answer
Question Select The Blank

Operating System | 1
Question pioneered in MULTICS, where they were viewed as
The Solaris developers reimplemented the ________ protection ________.
using in-kernel thread to eliminate the context Correct Answer
switch involved in moving each character between Ring
daemons and the kernel. Your Answer
Correct Answer Ring
Telnet daemon
Your Answer Multiple Choice Multiple Answer
Telnet daemon Question
In Linux, the main objects defined by the virtual file
Multiple Choice Single Answer system are :-
Question Correct Answer
All user processes are descendents of one original Inode-object , File-object , File-system object
process, Which is that process? Your Answer
Correct Answer Inode-object , File-object , File-system object
Init process
Your Answer Multiple Choice Single Answer
Init process Question
Collection of similar datatypes is called as
Select The Blank Correct Answer
Question Array
Terminals and line printers are ________ . Your Answer
Correct Answer Array
Character devices
Your Answer Multiple Choice Multiple Answer
Character devices Question
We need two separate modes of operation to
Multiple Choice Multiple Answer protect the operating system and all other
Question programs and their data from malfunctioning
Many-to-may model is supported by following program. Which are those modes?
operating systems :- Correct Answer
Correct Answer User mode , Monitor mode
Solaris , IRIX , Digital UNIX Your Answer
Your Answer User mode , Monitor mode
Solaris , IRIX , Digital UNIX
Match The Following
Multiple Choice Multiple Answer Question
Question Correct Answer
find out the services provided by kernel related to Your Answer
I/O : Class Shape
Correct Answer Triangle, rectangle, circle, ellipse
I/O Scheduling , Buffering , Spooling Triangle, rectangle, circle, ellipse
Your Answer Class Vehicle
I/O Scheduling , Buffering , Spooling Scooter, car, truck, tractor
Scooter, car, truck, tractor
Multiple Choice Single Answer Class Animal
Question Cat, dog, cow, tiger
The long-term scheduler controls the :- Cat, dog, cow, tiger
Correct Answer Class Color
Degree of multiprogramming Red, yellow, blue, green
Your Answer Red, yellow, blue, green
Degree of multiprogramming
Select The Blank
Select The Blank Question
Question The virtual memory portion of the NT executive is
The concept of protection levels and call gates were the ________.

Operating System | 2
Correct Answer True
Virtual memory manager Your Answer
Your Answer True
Virtual memory manager
True/False
True/False Question
Question In a blocking system call, the application is moved
An asynchronous call returns immediately, without from the OS's run queue to a wait queue.
waiting for the I/O to complete. Correct Answer
Correct Answer True
True Your Answer
Your Answer True
True
True/False
True/False Question
Question Device speeds range from a few bytes per second
Modem is a random-access device. to a few gigabytes per second.
Correct Answer Correct Answer
False True
Your Answer Your Answer
False True

Multiple Choice Multiple Answer Multiple Choice Multiple Answer


Question Question
A mailbox can be owned by :- Various storage systems available possesses which
Correct Answer two characteristics?
Process , Operating system Correct Answer
Your Answer Volatile , Non-volatile
Process , Operating system Your Answer
Volatile , Non-volatile
Multiple Choice Multiple Answer
Question Match The Following
The movement of information between levels of a Question
storage hierarchy may be of two types depending Correct Answer
on the hardware design and the controlling Your Answer
operating system software such as :- We can define abstract operation on abstract data
Correct Answer Data abstraction
Explicit , Implicit Data abstraction
Your Answer Process of sharing properties of the higher level
Explicit , Implicit object or class
Inheritance
Select The Blank Inheritance
Question Ability to inherit attributes and methods from 2 or
In windows NT, the ________ facility is used to pass more objects or classes
requests and results between client and server Multiple inheritance
processes within a single machine. Multiple inheritance
Correct Answer Ability to send a message to several objects and to
Local-procedure-call allow receiving object to respond method specified
Your Answer on the object.
Remote-procedure-call Ploymorphism
Ploymorphism
True/False
Question Multiple Choice Single Answer
A major security problem for operating system is Question
authentication. As process enter the system, they are put into :-
Correct Answer Correct Answer

Operating System | 3
Job queue Sparse
Your Answer Your Answer
Job queue Sparse

Multiple Choice Multiple Answer True/False


Question Question
The role of the operating system in computer I/O is Applications normally access block devices through
to :- a file system interface.
Correct Answer Correct Answer
Manage I/O operation and devices , Control I/O True
operation and devices Your Answer
Your Answer True
Manage I/O operation and devices , Control I/O
operation and devices Multiple Choice Multiple Answer
Question
Select The Blank User thread libraries include :-
Question Correct Answer
The ________ is a layer of software that hides POSIX Pthreads , Mach C-threads , Solaris threads
hardware differences from upper levels of the Your Answer
operating system. POSIX Pthreads , Mach C-threads , Solaris threads
Correct Answer
Hardware abstraction layer Select The Blank
Your Answer Question
Hardware abstraction layer The positioning time sometimes called the ________.
Correct Answer
Select The Blank Random-access time
Question Your Answer
A ________ is a computer or router that sits between Random-access time
the trusted and untrusted systems.
Correct Answer Multiple Choice Single Answer
Firewall Question
Your Answer The concept of OOPS was first introduced in
Firewall Correct Answer
Simula Language
Multiple Choice Multiple Answer Your Answer
Question Simula Language
The Moriss Internet Worm was made up of which of
the two programs? Select The Blank
Correct Answer Question
Grappling hook program , Main program ________ passwords prevent improper authentication
Your Answer due to password exposure.
Grappling hook program , Main program Correct Answer
One-time
Multiple Choice Multiple Answer Your Answer
Question One-time
In UNIX, a device is distinguished by two things,
which are :- Multiple Choice Single Answer
Correct Answer Question
Device-class , Device number The linking of procedure call to the code to be
Your Answer executed in response to that call is referred as
Device-class , Device number Correct Answer
Binding
Multiple Choice Single Answer Your Answer
Question Binding
In general , the access matrix will be :-
Correct Answer

Operating System | 4
LIST OF ATTEMPTED QUESTIONS AND ANSWERS Multiple Choice Single Answer
Question
Multiple Choice Multiple Answer The segment is :-
Question Correct Answer
locate the transmission devices :- Logical entity
Correct Answer Your Answer
Network cards , Modems Logical entity
Your Answer
Tapes , Network cards , Modems Multiple Choice Single Answer
Question
True/False In UNIX, decisions regarding which process to swap
Question in or out are made by whom?
The user process issues a network I/O system call to Correct Answer
send the character to the remote machine. Swapper
Correct Answer Your Answer
True Memory handler
Your Answer
True Select The Blank
Question
Multiple Choice Single Answer A ________ is a client-server mechanism that enables
Question an application on one machine to make a procedure
The process by which objects of one class acquire call to code on another machine.
properties of objects of other class is called Correct Answer
Correct Answer Remote-procedure-call
Inheritance Your Answer
Your Answer Remote-procedure-call
Inheritance
Multiple Choice Single Answer
True/False Question
Question When each process that wants to communicate
Windows NT uses a message passing must explicitly name the recipient or sender of the
implementation for I/O. communication, then such communication is called
Correct Answer as :-
True Correct Answer
Your Answer Direct communication
True Your Answer
Indirect communication
Multiple Choice Multiple Answer
Question Select The Blank
We need two separate modes of operation to Question
protect the operating system and all other In Linux, the allocator uses a ________ algorithm to
programs and their data from malfunctioning keep track of available physical pages.
program. Which are those modes? Correct Answer
Correct Answer Buddy-heap
User mode , Monitor mode Your Answer
Your Answer Binary-search
User mode , Monitor mode
Multiple Choice Single Answer
Match The Following Question
Question What does the rows of the access matrix
Correct Answer represents?
Your Answer Correct Answer
Round-robin Domains
Time quantum Your Answer
Time quantum Domains
First-come First-served
First come job Multiple Choice Single Answer
First come job Question
Shortest job Every change in policy requires a change in the
Shortest job underlying :-
Shortest job Correct Answer
Priority Mechanism
Highest priority job Your Answer
Highest priority job System

Operating System | 5
Select The Blank against armed or surreptitious entry by intruders.
Question Correct Answer
A ________ in NT is an object that provides a uniform True
interface for files, whether they are local or remote. Your Answer
Correct Answer True
Redirector
Your Answer Select The Blank
Domain Question
When you express user-system interaction, the
Multiple Choice Multiple Answer scenario in the model is called ________
Question Correct Answer
In Solaris 2, user-level threads may be:- Case model
Correct Answer Your Answer
Bound , Unbound Case model
Your Answer
Bound , Unbound True/False
Question
Multiple Choice Multiple Answer Data transfer from cache to CPU and registers is
Question usually a software function, with little operating
An audit log records which things about an object ? system intervention.
Correct Answer Correct Answer
Time , User , Type of access False
Your Answer Your Answer
Time , User , Type of access True

Multiple Choice Multiple Answer True/False


Question Question
One-to-one model is supported by following systems A file in NTFS is a simple byte stream as it is in MS-
:- DOS or UNIX .
Correct Answer Correct Answer
Windows NT , OS/2 False
Your Answer Your Answer
OS/2 , Windows NT False

Multiple Choice Multiple Answer Multiple Choice Single Answer


Question Question
To protect the system, we must take security Polymorphism means ability to take
measures at two levels, such as :- Correct Answer
Correct Answer More than one form
Physical level , Human level Your Answer
Your Answer More than one form
Human level , Global level
True/False
Multiple Choice Single Answer Question
Question Aging algorithm is based on LRU.
If the process is waiting for some event to occur Correct Answer
then it is said to be in :- True
Correct Answer Your Answer
Waiting state True
Your Answer
Waiting state Select The Blank
Question
Multiple Choice Single Answer The virtual memory portion of the NT executive is
Question the ________.
A common representation for a discussion of Correct Answer
process scheduling is a :- Virtual memory manager
Correct Answer Your Answer
Queuing diagram Virtual memory manager
Your Answer
Process state diagram Multiple Choice Multiple Answer
Question
True/False There are two types of Message passing, they are :-
Question Correct Answer
At Physical level, the site or sites containing the Synchronous , Asynchronous
computer systems must be physically secured Your Answer
Operating System | 6
Synchronous , Asynchronous
True/False
Select The Blank Question
Question Transfer of data from disk to memory is usually
Web servers use the ________ protocol to controlled by the operating system.
communicate with web browsers. Correct Answer
Correct Answer True
http Your Answer
Your Answer True
http
True/False
Multiple Choice Multiple Answer Question
Question Prototyping not only helps to build a quality design
The security of a system can be improved by two but also enables the designer to build the system
management techniques, such as :- decremantally.
Correct Answer Correct Answer
Threat monitoring , Audit Log False
Your Answer Your Answer
Audit Log , Threat finding True

Select The Blank Select The Blank


Question Question
The concept of protection levels and call gates were The UNIX system uses ________ to avoid the
pioneered in MULTICS, where they were viewed as necessity of keeping its password list secret.
protection ________. Correct Answer
Correct Answer Encryption
Ring Your Answer
Your Answer Encryption
Ring
Match The Following
True/False Question
Question Correct Answer
We say that a system is secure if its resources are Your Answer
used and accessed as intended under all Read-write devices
circumstances. Disks
Correct Answer Disks
True Dedicated devices
Your Answer Tape
True CD-ROM
Read-only devices
Select The Blank CD-ROM
Question Tape
The ________ controller is the controller at the Write-only devices
computer end of the bus. Graphics controller
Correct Answer Keyboard
Host
Your Answer Multiple Choice Single Answer
Cpu Question
A procedure call, request to execute a method is
Multiple Choice Multiple Answer termed as
Question Correct Answer
In Linux, the paging system can be divided into Message
sections, namely:- Your Answer
Correct Answer Message
Policy algorithm , Paging mechanism
Your Answer Select The Blank
Policy algorithm , Paging mechanism Question
Context switch times are highly dependent on
True/False ________ support.
Question Correct Answer
Keyboard is a sharable device. Hardware
Correct Answer Your Answer
True Hardware
Your Answer
False Multiple Choice Multiple Answer
Operating System | 7
Question
Two main jobs of a computer are :- Multiple Choice Single Answer
Correct Answer Question
I/O , Processing DVMA stands for :-
Your Answer Correct Answer
I/O , Processing Direct Virtual Memory Access
Your Answer
Multiple Choice Single Answer Direct Virtual Memory Access
Question
The 4.3BSD operating system is the version of :- True/False
Correct Answer Question
UNIX Since caches have limited size, cache management
Your Answer is an important design problem.
UNIX Correct Answer
True
Multiple Choice Single Answer Your Answer
Question True
The number of processes that are completed per
time unit is called as:- Multiple Choice Single Answer
Correct Answer Question
Throughput of system C++ is basically a procedural language having
Your Answer extension of
Throughput of system Correct Answer
Object Oriented technology
Multiple Choice Multiple Answer Your Answer
Question Object Oriented technology
Once the I/O is started , which two courses of action
are possible? Multiple Choice Single Answer
Correct Answer Question
Synchronous I/O , Asynchronous I/O , Simple I/O The system call checks the arguments given by the
Your Answer application, builds a data structure to convey the
Synchronous I/O , Asynchronous I/O arguments to the kernel and then executes a
special instruction called as :-
Multiple Choice Multiple Answer Correct Answer
Question Software interrupt
Security violations of the system can be categorized Your Answer
as :- Software interrupt
Correct Answer
Malicious , Accidental Multiple Choice Single Answer
Your Answer Question
Malicious , Accidental A system consists of collection of :-
Correct Answer
Select The Blank Processes
Question Your Answer
A process migrates between the various ________ Processes
throughout its lifetime.
Correct Answer Select The Blank
Scheduling queues Question
Your Answer A________ is a memory area that stores data while
Scheduling queues they are transferred between two devices or
between a device and an application.
Operating System - 5 Correct Answer
Buffer
Your Answer
LIST OF ATTEMPTED QUESTIONS AND ANSWERS Buffer

Select The Blank Multiple Choice Multiple Answer


Question Question
static binding allows to hold certain properties fixed Find out the human-interface devices :-
and rigid, whereas ________ binding allows object to Correct Answer
behave as per conditions emerge. Screen , Keyboard , Mouse
Correct Answer Your Answer
Dynamic Screen , Keyboard , Mouse
Your Answer
Dynamic Multiple Choice Single Answer
Operating System | 8
Question Switching the cpu to another process requires
A procedure body implementing an operation is saving the state of the old process and loading the
termed as saved state for the new process.
Correct Answer Correct Answer
Method True
Your Answer Your Answer
Method True

Select The Blank Multiple Choice Single Answer


Question Question
The designer of a program or system might leave a The process by which objects of one class acquire
hole, or ________ , in the software that only he is properties of objects of other class is called
capable of using. Correct Answer
Correct Answer Inheritance
Trap door Your Answer
Your Answer Inheritance
Trap door
Multiple Choice Single Answer
True/False Question
Question In Object Oriented technology following expression
The principle of polymorphism helps to extend and is appropriate
modify the system scope through appropriate Correct Answer
messaging mechanism. object=data+menthods
Correct Answer Your Answer
True object=data+menthods
Your Answer
True True/False
Question
Multiple Choice Multiple Answer A copy of inode is kept in main memory while a file
Question is open.
The Linux system is composed of three main bodies Correct Answer
of code, in line with most traditional UNIX True
implementations. Which are :- Your Answer
Correct Answer True
Kernel , System libraries , System utilities
Your Answer Multiple Choice Multiple Answer
Kernel , System libraries , System utilities Question
The advantage of dynamic loading is
Select The Blank Correct Answer
Question Unused routine is never loaded , Useful when large
Web servers use the ________ protocol to amount of code are needed to handle infrequently
communicate with web browsers. occurring cases, such as error routines , It does not
Correct Answer require special support from the operating system
http Your Answer
Your Answer It does not require special support from the
http operating system , Unused routine is never loaded ,
Useful when large amount of code are needed to
Multiple Choice Single Answer handle infrequently occurring cases, such as error
Question routines
The pure Object Oriented language is
Correct Answer Select The Blank
Java Question
Your Answer OOSAD begins with identification of actors, what
Java activities they perform and building ________ model
for the function.
Multiple Choice Multiple Answer Correct Answer
Question Use-case
User level threads are generally :- Your Answer
Correct Answer Use-case
Fast to create , Easy to manage
Your Answer Multiple Choice Single Answer
Fast to create , Easy to manage Question
If a class fruit has object mango, the relationship is
True/False expressed as :
Question Correct Answer
Operating System | 9
Fruit mango If paging is enabled, the liner address is interpreted
Your Answer as virtual address and mapped to the physical
Fruit mango address using ________ table.
Correct Answer
Multiple Choice Single Answer Page
Question Your Answer
The class bird should have object Page
Correct Answer
Egale Multiple Choice Multiple Answer
Your Answer Question
Egale What are the forms of malicious access?
Correct Answer
Select The Blank Unauthorized destruction of data , Unauthorized
Question reading of data , Unauthorized modification of data
The ________ controller is the controller at the Your Answer
computer end of the bus. Unauthorized reading of data , Unauthorized
Correct Answer modification of data , Unauthorized destruction of
Host data
Your Answer
Host Multiple Choice Multiple Answer
Question
Multiple Choice Single Answer What are the components to memory management
Question under Linux?
The insulation of data from direct access by the Correct Answer
program is known as : Physical memory manager , Virtual memory
Correct Answer manager
Data hiding Your Answer
Your Answer Physical memory manager , Virtual memory
Data hiding manager

Multiple Choice Multiple Answer Multiple Choice Single Answer


Question Question
Liner address is divided into fields like :- IPC is particularly useful in a :-
Correct Answer Correct Answer
Dir , Page , Offset Distributed environment
Your Answer Your Answer
Dir , Page , Offset Distributed environment

Multiple Choice Single Answer Select The Blank


Question Question
Every change in policy requires a change in the Context switch times are highly dependent on
underlying :- ________ support.
Correct Answer Correct Answer
Mechanism Hardware
Your Answer Your Answer
Mechanism Hardware

Multiple Choice Single Answer Multiple Choice Multiple Answer


Question Question
UNIX operating system is written mostly in :- kernel threads are supported by following operating
Correct Answer systems :-
C language Correct Answer
Your Answer Windows NT , Solaris , Digital UNIX
C language Your Answer
Windows NT , Solaris , Digital UNIX
Multiple Choice Single Answer
Question Select The Blank
In UNIX, a file is represented by an :- Question
Correct Answer A ________ in NT is an object that provides a uniform
Inode interface for files, whether they are local or remote.
Your Answer Correct Answer
Inode Redirector
Your Answer
Select The Blank Redirector
Question
Operating System | 10
Multiple Choice Multiple Answer Question
Question When application issues a blocking I/O system call,
In a uniprocessor system, there is :- the request is placed on the queue for that device.
Correct Answer Correct Answer
Single processor , Single running process True
Your Answer Your Answer
Single processor , Single running process True

True/False Select The Blank


Question Question
The basic difference between SSAD life cycle During execution, ________ register holds the sector
models and OOSAD life cycle models is that one is for the data segment.
evolutionary & iterative while the other is sequential Correct Answer
in stages of analysis, design, coding, unit test, DS
integrated test and system test. Your Answer
Correct Answer DS
True
Your Answer True/False
True Question
Banker's algorithm is a deadlock-avoidance
Match The Following algorithm.
Question Correct Answer
Correct Answer True
Your Answer Your Answer
Ready state True
Process waiting for cpu
Process waiting for cpu Multiple Choice Single Answer
New state Question
Process created Model of protection can be viewed abstractly as a
Process created matrix which is known as :-
Running state Correct Answer
Executing process Access matrix
Executing process Your Answer
Waiting state Access matrix
Waiting process
Waiting process Multiple Choice Multiple Answer
Question
Match The Following Kernel threads are generally :-
Question Correct Answer
Correct Answer Slower to create , Difficult to manage
Your Answer Your Answer
Parent process Slower to create , Difficult to manage
Child process
Child process Multiple Choice Multiple Answer
Foreground processes Question
Interactive processes One-to-one model is supported by following systems
Interactive processes :-
Background processes Correct Answer
Batch processes Windows NT , OS/2
Batch processes Your Answer
Light-Weight processes Windows NT , OS/2
Thread
Thread Operating System - 4
Multiple Choice Single Answer
Question LIST OF ATTEMPTED QUESTIONS AND ANSWERS
In how many number of classes does the NRU
algorithm divides pages, depending on the state of Multiple Choice Multiple Answer
R and M? Question
Correct Answer Kernel threads are generally :-
4 Correct Answer
Your Answer Slower to create , Difficult to manage
4 Your Answer
Slower to create , Difficult to manage
True/False
Operating System | 11
Select The Blank The movement of information between levels of a
Question storage hierarchy may be of two types depending
If the user-supplied password matches the on the hardware design and the controlling
password stored in the system, the system assumes operating system software such as :-
that the user is ________. Correct Answer
Correct Answer Explicit , Implicit
Legitimate Your Answer
Your Answer Explicit , Implicit
Legitimate
Select The Blank
Multiple Choice Single Answer Question
Question In queuing diagram, the arrow indicates the flow of
In general , the access matrix will be :- ________ in the system.
Correct Answer Correct Answer
Sparse Processes
Your Answer Your Answer
Sparse Processes

True/False Multiple Choice Multiple Answer


Question Question
Encryption is one common method of protecting What are the forms of malicious access?
information that is transmitted over unreliable links. Correct Answer
Correct Answer Unauthorized reading of data , Unauthorized
True modification of data , Unauthorized destruction of
Your Answer data
False Your Answer
Unauthorized reading of data , Unauthorized
Select The Blank modification of data , Unauthorized destruction of
Question data
A ________ is a full duplex connection between a
device driver and a user-level process. Select The Blank
Correct Answer Question
Stream A bit called the ________ , is added to the hardware
Your Answer of the computer to indicate the current mode.
Stream Correct Answer
Mode bit
Multiple Choice Single Answer Your Answer
Question Mode bit
In how many number of classes does the NRU
algorithm divides pages, depending on the state of Multiple Choice Multiple Answer
R and M? Question
Correct Answer In Windows NT , kernel uses which two sets of
4 objects?
Your Answer Correct Answer
8 Dispatcher objects , Control objects
Your Answer
Select The Blank Dispatcher objects , Complex objects
Question
The Pentium page size is fixed at ________ KB. Multiple Choice Single Answer
Correct Answer Question
4 The smallest addressable portion of a disk is :-
Your Answer Correct Answer
4 Sector
Your Answer
True/False Sector
Question
Volatile storage loses its contents when the power True/False
to the device is removed. Question
Correct Answer In FIFO algorithm the page removed from memory
True is the one which most recently used.
Your Answer Correct Answer
True False
Your Answer
Multiple Choice Multiple Answer False
Question
Operating System | 12
Select The Blank
Question Match The Following
A process is ________, if it cannot affect or be Question
affected by the other processes executing in the Correct Answer
system. Your Answer
Correct Answer User mode
Independent Mode bit 1
Your Answer Mode bit 1
Independent Serial port
Modem
Multiple Choice Multiple Answer Monitor mode
Question Parallel port
Linux presents standard interfaces to whom? Printer
Correct Answer Printer
Programmer , User Privileged instructions
Your Answer Monitor mode
Programmer , User , System administrator Mode bit 0

Select The Blank True/False


Question Question
The kernel module that controls a device is a In segmentation the total address space can exceed
________ . the size of physical memory.
Correct Answer Correct Answer
Device driver True
Your Answer Your Answer
Device daemon False

True/False Multiple Choice Single Answer


Question Question
Whenever a trap or interrupt occurs, the hardware Because of the concept of independent objects
switches from user mode to monitor mode. responding to messages, object orientation is a
Correct Answer natural way to implement
True Correct Answer
Your Answer Event driven programming
True Your Answer
Message deiven programming
Select The Blank
Question Multiple Choice Single Answer
A ________ is a computer or router that sits between Question
the trusted and untrusted systems. In UNIX, everything below the system-call interface
Correct Answer and above the physical hardware is the :-
Firewall Correct Answer
Your Answer Kernel
Firewall Your Answer
I/O system
Multiple Choice Multiple Answer
Question Multiple Choice Multiple Answer
Find out the basic I/O hardware elements from the Question
following :- Different multithreading models available are :-
Correct Answer Correct Answer
Ports , Buses , Device controllers Many-to-one model , One-to-one model , Many-to-
Your Answer many model
Ports , Buses , Device controllers Your Answer
Many-to-one model , One-to-one model , Many-to-
True/False many model
Question
Object-oriented programming focuses on the Multiple Choice Multiple Answer
integrated data and functionality as discrete units Question
that have both knowledge (data) and capabilities An object type in windows NT is a system defined
(functions). Procedural programs, on the other data type that has two things associated with it,
hand, focus on functions and how they act on data. which are they?
Correct Answer Correct Answer
True Set of attributes , Set of methods
Your Answer Your Answer
True Object-type , Object-processing
Operating System | 13
Correct Answer
Multiple Choice Multiple Answer object=data+menthods
Question Your Answer
When memory reference occurs in MULTICS the object=data+menthods
things which takes place are :-
Correct Answer Multiple Choice Single Answer
Segment number is used to find segment descriptor Question
, Check is made to see if segment's page table is in A procedure body implementing an operation is
memory , Page table entry for requested virtual termed as
page is examined , Offset is added to the page Correct Answer
origin to give main memory address Method
Your Answer Your Answer
Segment number is used to find segment descriptor Method
, Check is made to see if segment's page table is in
memory , Page table entry for requested virtual Select The Blank
page is examined Question
During execution, ________ register holds the sector
Multiple Choice Single Answer for the code segment.
Question Correct Answer
The interval from the time of submission of a CS
process to the time of completion is :- Your Answer
Correct Answer PS
Turnaround time
Your Answer True/False
Turnaround time Question
In some operating system, spooling is managed by
True/False a system daemon process.
Question Correct Answer
Context switch times are highly dependent on True
hardware support. Your Answer
Correct Answer False
True
Your Answer Select The Blank
True Question
Each column in the access matrix can be
True/False implemented as an ________ for one object.
Question Correct Answer
Procedure and data can be distinguished and Access list
separately protected in segmentation Your Answer
Correct Answer Capability list
True
Your Answer Multiple Choice Single Answer
True Question
Policies for resource use may vary depending on the
Multiple Choice Multiple Answer :-
Question Correct Answer
Dispatcher functions involves the following :- Application
Correct Answer Your Answer
Switching context , Switching to user mode System
Your Answer
Switching context , Switching to user mode Multiple Choice Multiple Answer
Question
Multiple Choice Single Answer A mailbox can be owned by :-
Question Correct Answer
The First version of UNIX was developed in 1969 by Process , Operating system
Ken Thompson of the Research Group at :- Your Answer
Correct Answer User , Process , Program
Bell Laboratories
Your Answer Multiple Choice Single Answer
Bell Laboratories Question
The ready queue is generally stored as a :-
Multiple Choice Single Answer Correct Answer
Question Linked list
In Object Oriented technology following expression Your Answer
is appropriate Queue
Operating System | 14
Your Answer
Select The Blank False
Question
A ________ is region of fast memory that hold copies Multiple Choice Multiple Answer
of data . Question
Correct Answer Kernel threads are generally :-
Cache Correct Answer
Your Answer Slower to create , Difficult to manage
Cache Your Answer
Difficult to manage , Faster than user thread ,
Multiple Choice Multiple Answer Faster to create
Question
What are the components to memory management Multiple Choice Single Answer
under Linux? Question
Correct Answer The concept of OOPS was first introduced in
Physical memory manager , Virtual memory Correct Answer
manager Simula Language
Your Answer Your Answer
Physical memory manager , Virtual memory Simula Language
manager
Multiple Choice Single Answer
Match The Following Question
Question The insulation of data from direct access by the
Correct Answer program is known as :
Your Answer Correct Answer
Bounded-buffer Data hiding
Fixed size buffer Your Answer
Fixed size buffer Abstraction
Producer
Produces process True/False
Produces process Question
Consumer Many to Many model multiplexes many user level
Consumes process threads to a smaller or equal number of kernel
Consumes process threads.
Unbounded-buffer Correct Answer
No limit on size of buffer True
No limit on size of buffer Your Answer
True
True/False
Question Select The Blank
The inode contains 15 pointers to the disk blocks Question
containing the data contents of the file. Like worms, ________ are designed to spread into
Correct Answer other programs and can wreak havoc in a system.
True Correct Answer
Your Answer Viruses
True Your Answer
Viruses
Multiple Choice Single Answer
Question Multiple Choice Multiple Answer
When computer is powered up or rebooted, it needs Question
to have an initial program to run. This initial The two versions of NT are :
program is known as :- Correct Answer
Correct Answer WindowsNT workstations , WindowsNT server
Bootstrap program Your Answer
Your Answer WindowsNT workstations , WindowsNT server
Bootstrap program
True/False
LIST OF ATTEMPTED QUESTIONS AND ANSWERS Question
A virus is a fragment of code embedded in a
True/False legitimate program
Question Correct Answer
Prototyping is a tool to test the design of system True
Correct Answer Your Answer
True False

Operating System | 15
True/False Maskable , Non maskable
Question
An I/O bound process spend more of its time doing True/False
I/O than it spends doing computations. Question
Correct Answer The I/O scheduler rearranges the order of the queue
True to improve the overall system efficiency and the
Your Answer average response time experienced by application
True Correct Answer
True
Multiple Choice Single Answer Your Answer
Question True
It has been said that Pascal and C programs are
collections of procedures and C++ programs are Multiple Choice Single Answer
collections of Question
Correct Answer How big is a class object?
Classes Correct Answer
Your Answer Is as big as sum of the sizes of its member variables
Classes Your Answer
Is as big as sum of the sizes of its member variables
Multiple Choice Single Answer
Question Multiple Choice Single Answer
The process by which objects of one class acquire Question
properties of objects of other class is called In UNIX, files are organized in tree-structured :-
Correct Answer Correct Answer
Inheritance Directories
Your Answer Your Answer
Inheritance Directories

Select The Blank Multiple Choice Single Answer


Question Question
A ________ is a buffer that holds output for a device The number of processes that are completed per
such as printers. time unit is called as:-
Correct Answer Correct Answer
Spool Throughput of system
Your Answer Your Answer
Spool Throughput of system

Multiple Choice Single Answer Multiple Choice Multiple Answer


Question Question
C++ is basically a procedural language having There are two types of Message passing, they are :-
extension of Correct Answer
Correct Answer Synchronous , Asynchronous
Object Oriented technology Your Answer
Your Answer Synchronous , Asynchronous
Object Oriented technology
Multiple Choice Single Answer
True/False Question
Question If Dog derives from Mammal, and Mammal derives
Object-oriented programming focuses on the from Animal, then -
integrated data and functionality as discrete units Correct Answer
that have both knowledge (data) and capabilities Dog inherits Animal's functions and data
(functions). Procedural programs, on the other Your Answer
hand, focus on functions and how they act on data. Dog inherits Animal's functions and data
Correct Answer
True Select The Blank
Your Answer Question
True The positioning time sometimes called the ________.
Correct Answer
Multiple Choice Multiple Answer Random-access time
Question Your Answer
Most CPUs have two interrupt request lines. Which Seek time
are they?
Correct Answer Multiple Choice Single Answer
Maskable , Non maskable Question
Your Answer Collection of similar datatypes is called as
Operating System | 16
Correct Answer Select The Blank
Array Question
Your Answer ________ is defined as a cooperation between object
Array codes produced by different software vendors &
written in different programming languages.
Multiple Choice Single Answer Correct Answer
Question Interoperability
The pure Object Oriented language is Your Answer
Correct Answer Interoperability
Java
Your Answer Multiple Choice Multiple Answer
Java Question
In a uniprocessor system, there is :-
Multiple Choice Multiple Answer Correct Answer
Question Single processor , Single running process
To protect the system, we must take security Your Answer
measures at two levels, such as :- Single processor , Single running process
Correct Answer
Physical level , Human level Multiple Choice Single Answer
Your Answer Question
Local level , Global level In UNIX operating system, each process is identified
by its :-
Select The Blank Correct Answer
Question Process identifier
In some operating system, spooling is handled by Your Answer
an ________ . Process identifier
Correct Answer
In-kernel thread Multiple Choice Single Answer
Your Answer Question
User thread As process enter the system, they are put into :-
Correct Answer
Multiple Choice Multiple Answer Job queue
Question Your Answer
Supervisor mode is also known as :- Job queue
Correct Answer
System mode , Privileged mode , Monitor mode Match The Following
Your Answer Question
Privileged mode , Monitor mode , Special mode Correct Answer
Your Answer
Match The Following Algorithm where in it takes largest available hole
Question Worst fit
Correct Answer Worst fit
Your Answer The algorithm in which memory manager scans
Thread along the list of segments until it finds a hole that is
Light-weight process big enough
Light-weight process First fit
Process First fit
PCB Algorithm in which keeps the track of suitable hole
Thread library Next fit
User thread Optimal fit
Thread library Algorithm which searches entire list and takes
PCB smallest hole that is adequate
Kernel thread Best fit
Operating system Best fit
Operating system
True/False
Select The Blank Question
Question Linux is a multi-user, multitasking system with a full
The ________ of a process is represented in the PCB set of UNIX-compatible tools.
of a process. Correct Answer
Correct Answer True
Context Your Answer
Your Answer True
Control
Multiple Choice Single Answer
Operating System | 17
Question Correct Answer
The main difference between structure and class is True
Correct Answer Your Answer
Structure does not support OOPS Class Supports True
OOPS.
Your Answer Multiple Choice Single Answer
Structure does not support OOPS Class Supports Question
OOPS. A procedure body implementing an operation is
termed as
Multiple Choice Multiple Answer Correct Answer
Question Method
Find out the basic I/O hardware elements from the Your Answer
following :- Method
Correct Answer
Ports , Buses , Device controllers True/False
Your Answer Question
Ports , Buses , Device controllers Main Memory is a volatile storage device that loses
its contents when power is turned off.
Multiple Choice Single Answer Correct Answer
Question True
The interval from the time of submission of a Your Answer
process to the time of completion is :- True
Correct Answer
Turnaround time Multiple Choice Multiple Answer
Your Answer Question
Completion time Once the I/O is started , which two courses of action
are possible?
True/False Correct Answer
Question Synchronous I/O , Asynchronous I/O , Simple I/O
In Public Key Encryption, each user has both a Your Answer
public and a private key. Waiting I/O , Simple I/O
Correct Answer
True Select The Blank
Your Answer Question
False ________ passwords prevent improper authentication
due to password exposure.
Multiple Choice Single Answer Correct Answer
Question One-time
If the process is waiting to be assigned to CPU then Your Answer
it is said to be in :- Encrypted
Correct Answer
Ready state Operating System - 8
Your Answer
Waiting state
LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Select The Blank
Question Multiple Choice Single Answer
A ________ controller is built into each disk drive. Question
Correct Answer Each object is associated with the data of type class
Disk with which they are created. A class is thus a
Your Answer collection of objects of
Disk Correct Answer
Similar type
Multiple Choice Multiple Answer Your Answer
Question Similar type
Linux presents standard interfaces to whom?
Correct Answer Multiple Choice Single Answer
Programmer , User Question
Your Answer C++ is also named as
Programmer , User , System administrator Correct Answer
C with classes
True/False Your Answer
Question Visual C++
As an object-oriented systems NT uses objects for
all its services and entities. Select The Blank
Operating System | 18
Question True
The ________ of a process is represented in the PCB
of a process. Multiple Choice Single Answer
Correct Answer Question
Context A major problem with the Priority scheduling
Your Answer algorithm is :-
Control Correct Answer
Starvation
Multiple Choice Multiple Answer Your Answer
Question CPU time
In windows NT, naming of objects is of two types :-
Correct Answer Select The Blank
Permanent name , Temporary name Question
Your Answer ________ of an object remains unchanged even
Permanent name , Object-primary name though its state and properties change.
Correct Answer
Match The Following Identity
Question Your Answer
Correct Answer Identity
Your Answer
Class Shape Multiple Choice Single Answer
Triangle, rectangle, circle, ellipse Question
Triangle, rectangle, circle, ellipse The process by which objects of one class acquire
Class Vehicle properties of objects of other class is called
Scooter, car, truck, tractor Correct Answer
Scooter, car, truck, tractor Inheritance
Class Animal Your Answer
Cat, dog, cow, tiger Polymorphism
Cat, dog, cow, tiger
Class Color Select The Blank
Red, yellow, blue, green Question
Red, yellow, blue, green ________allows us to define abstract operations on
abstract data.
Multiple Choice Multiple Answer Correct Answer
Question Data abstraction
Computer system consists of :- Your Answer
Correct Answer Data abstraction
CPU , Multiple device controller
Your Answer True/False
CPU , Multiple device controller Question
An asynchronous call returns immediately, without
Multiple Choice Single Answer waiting for the I/O to complete.
Question Correct Answer
In JAVA , the derived class is known as True
Correct Answer Your Answer
Subclass True
Your Answer
Subclass Multiple Choice Multiple Answer
Question
Select The Blank locate the storage devices from the following :-
Question Correct Answer
To make as interval call, the CALL instruction must Disks , Tapes
contain ________. Your Answer
Correct Answer Disks , Tapes
Selector
Your Answer Multiple Choice Single Answer
Address Question
Mango, apple and orange are members of class
True/False Correct Answer
Question Fruit
In Lock-key mechanism, users are allowed to Your Answer
examine or modify the list of keys or locks directly. Fruit
Correct Answer
False Multiple Choice Single Answer
Your Answer Question
Operating System | 19
The pure Object Oriented language is Correct Answer
Correct Answer Fruit mango
Java Your Answer
Your Answer Fruit mango
C++
Multiple Choice Multiple Answer
Select The Blank Question
Question Find out the basic I/O hardware elements from the
Web servers use the ________ protocol to following :-
communicate with web browsers. Correct Answer
Correct Answer Ports , Buses , Device controllers
http Your Answer
Your Answer Ports , Buses , Device controllers
http
Multiple Choice Single Answer
Select The Blank Question
Question Model of protection can be viewed abstractly as a
________ is the ability to handle error conditions, matrix which is known as :-
including the ability of the operating system to Correct Answer
protect itself and its users from defective or Access matrix
malicious software. Your Answer
Correct Answer Access matrix
Reliability
Your Answer Multiple Choice Single Answer
Security Question
The 4.3BSD operating system is the version of :-
Multiple Choice Multiple Answer Correct Answer
Question UNIX
One-to-one model is supported by following systems Your Answer
:- UNIX
Correct Answer
Windows NT , OS/2 True/False
Your Answer Question
Solaris , Windows NT When application issues a blocking I/O system call,
the request is placed on the queue for that device.
Multiple Choice Single Answer Correct Answer
Question True
Collection of similar datatypes is called as Your Answer
Correct Answer False
Array
Your Answer Select The Blank
Array Question
________ is defined as a cooperation between object
Multiple Choice Single Answer codes produced by different software vendors &
Question written in different programming languages.
C++ is basically a procedural language having Correct Answer
extension of Interoperability
Correct Answer Your Answer
Object Oriented technology Interoperability
Your Answer
Graphic user interface True/False
Question
Multiple Choice Single Answer Linux is a multi-user, multitasking system with a full
Question set of UNIX-compatible tools.
In Object Oriented technology following expression Correct Answer
is appropriate True
Correct Answer Your Answer
object=data+menthods True
Your Answer
method= data + object Multiple Choice Single Answer
Question
Multiple Choice Single Answer DMA stands for :-
Question Correct Answer
If a class fruit has object mango, the relationship is Direct Memory Access
expressed as : Your Answer
Operating System | 20
Direct Memory Access find out the services provided by kernel related to
I/O :
Match The Following Correct Answer
Question I/O Scheduling , Buffering , Spooling
Correct Answer Your Answer
Your Answer I/O Scheduling , Buffering , I/o subsystem
Light-Weight processes
Thread True/False
Solaris process Question
Parent process The language Classic-Ada is not OOPL
Child process Correct Answer
Unix process False
Foreground processes Your Answer
Interactive processes True
Interactive processes
Background processes Select The Blank
Batch processes Question
Thread In Linux, the allocator uses a ________ algorithm to
keep track of available physical pages.
Multiple Choice Multiple Answer Correct Answer
Question Buddy-heap
Find out the human-interface devices :- Your Answer
Correct Answer Sort-first
Screen , Keyboard , Mouse
Your Answer Select The Blank
Screen , Keyboard , Mouse Question
________ describes segments local to each program,
Select The Blank including its code, data, stack etc.
Question Correct Answer
A process is ________ if it can affect or be affected LDT
by the other processes executing in the system. Your Answer
Correct Answer LDT
Cooperating
Your Answer True/False
Independent Question
A file in NTFS is a simple byte stream as it is in MS-
Multiple Choice Multiple Answer DOS or UNIX .
Question Correct Answer
Liner address is divided into fields like :- False
Correct Answer Your Answer
Dir , Page , Offset False
Your Answer
Dir , Page , File True/False
Question
True/False A copy of inode is kept in main memory while a file
Question is open.
An I/O bound process spend more of its time doing Correct Answer
I/O than it spends doing computations. True
Correct Answer Your Answer
True True
Your Answer
False Multiple Choice Single Answer
Question
Multiple Choice Single Answer The separation of policy and mechanism is
Question important for which purpose?
In some systems, if a process terminates, then all Correct Answer
its children must also be terminated. This Flexibility
phenomenon referred to as :- Your Answer
Correct Answer Costing
Cascading termination
Your Answer Select The Blank
Removing all Question
A ________ is a group of NT server machines that
Multiple Choice Multiple Answer share a common security policy and user
Question databases.
Operating System | 21
Correct Answer on the hardware design and the controlling
Domain operating system software such as :-
Your Answer Correct Answer
Domain Explicit , Implicit
Your Answer
Multiple Choice Single Answer Implicit , Indirect
Question
If Dog derives from Mammal, and Mammal derives Multiple Choice Multiple Answer
from Animal, then - Question
Correct Answer What are the ways in which a request for kernel-
Dog inherits Animal's functions and data mode execution can occur in Linux?
Your Answer Correct Answer
Dog inherits Animal's functions and data Explicitly , Implicitly
Your Answer
True/False Implicitly , Function call
Question
Keyboard is a sharable device. Multiple Choice Multiple Answer
Correct Answer Question
True Supervisor mode is also known as :-
Your Answer Correct Answer
False System mode , Privileged mode , Monitor mode
Your Answer
Operating System - 7 Privileged mode , Special mode

Multiple Choice Multiple Answer


LIST OF ATTEMPTED QUESTIONS AND ANSWERS Question
The role of the operating system in computer I/O is
Multiple Choice Multiple Answer to :-
Question Correct Answer
A mailbox can be owned by :- Manage I/O operation and devices , Control I/O
Correct Answer operation and devices
Operating system , Process Your Answer
Your Answer Manage I/O operation and devices , I/O processing
User , Process
True/False
Multiple Choice Single Answer Question
Question In UNIX, first two names in every directory are "."
Software may trigger an interrupt by executing a and ".."
special operation called :- Correct Answer
Correct Answer True
System call Your Answer
Your Answer False
Interrupt call
Multiple Choice Multiple Answer
Match The Following Question
Question Various storage systems available possesses which
Correct Answer two characteristics?
Your Answer Correct Answer
User mode Volatile , Non-volatile
Mode bit 1 Your Answer
Monitor mode Primary storage , Secondary storage
Serial port
Modem Multiple Choice Single Answer
Modem Question
Parallel port A program in execution is:-
Printer Correct Answer
Printer Process
Privileged instructions Your Answer
Monitor mode Operation
UPS
Select The Blank
Multiple Choice Multiple Answer Question
Question In some operating system, spooling is handled by
The movement of information between levels of a an ________ .
storage hierarchy may be of two types depending Correct Answer
Operating System | 22
In-kernel thread True/False
Your Answer Question
In-kernel thread The cipher text can be stored in a readable file or
transmitted over unprotected channels.
Select The Blank Correct Answer
Question True
The hardware to measure elapsed time to trigger Your Answer
operations is called a ________. True
Correct Answer
Programmable interval timer Select The Blank
Your Answer Question
Elapsed timer The virtual memory portion of the NT executive is
the ________.
True/False Correct Answer
Question Virtual memory manager
NFU algorithm requires a software counter Your Answer
associated with each page initially zero. Page-memory manager
Correct Answer
True Multiple Choice Single Answer
Your Answer Question
True The main difference between structure and class is
Correct Answer
True/False Structure does not support OOPS Class Supports
Question OOPS.
Volatile storage loses its contents when the power Your Answer
to the device is removed. Structure is used in OOPS. Classes are used in
Correct Answer procedural programs.
True
Your Answer Multiple Choice Multiple Answer
False Question
Find out different types of I/O buses :-
Match The Following Correct Answer
Question EIDE , SCSI
Correct Answer Your Answer
Your Answer EIDE , SCSI
MFT
Multi programming with fixed task Select The Blank
Multi programming with fixed task Question
RAM ________ passwords prevent improper authentication
Volatile memory due to password exposure.
Volatile memory Correct Answer
ROM One-time
Read only memory Your Answer
Read only memory Encrypted
BIOS
Basic input output system Select The Blank
Basic input output system Question
Like worms, ________ are designed to spread into
Select The Blank other programs and can wreak havoc in a system.
Question Correct Answer
________ includes disks and tapes. Viruses
Correct Answer Your Answer
Block devices Trojan horses
Your Answer
Socket interfaces Select The Blank
Question
Select The Blank A ________ in NT is an object that provides a uniform
Question interface for files, whether they are local or remote.
The process could create a new ________ and wait Correct Answer
for its termination. Redirector
Correct Answer Your Answer
Sub process Director
Your Answer
Child Select The Blank
Question
Operating System | 23
One interface that is available in many operating Correct Answer
systems, including UNIX and WindowsNT, is the Malicious , Accidental
network ________ interface. Your Answer
Correct Answer Unauthorized , Authorized
Socket
Your Answer Select The Blank
Device Question
Most computers have ________ clocks and timers.
True/False Correct Answer
Question Hardware
In Windows NT, kernel can be paged out of memory Your Answer
and its executions can be preempted. In-built
Correct Answer
False Multiple Choice Single Answer
Your Answer Question
True A domain is a collection of :-
Correct Answer
Multiple Choice Single Answer Access rights
Question Your Answer
The insulation of data from direct access by the Objects
program is known as :
Correct Answer True/False
Data hiding Question
Your Answer In paging the total address space can exceed the
Abstraction size of physical memory
Correct Answer
Multiple Choice Single Answer True
Question Your Answer
The concept of OOPS was first introduced in True
Correct Answer
Simula Language Multiple Choice Single Answer
Your Answer Question
Simula Language Objects may communicate with each other through
Correct Answer
Multiple Choice Multiple Answer Methods
Question Your Answer
locate the transmission devices :- Methods
Correct Answer
Network cards , Modems Multiple Choice Single Answer
Your Answer Question
Network cards , Modems A system consists of collection of :-
Correct Answer
Multiple Choice Single Answer Processes
Question Your Answer
How big is a class object? Processes
Correct Answer
Is as big as sum of the sizes of its member variables Multiple Choice Multiple Answer
Your Answer Question
Is as big as sum of the sizes of its member variables An audit log records which things about an object ?
Correct Answer
Multiple Choice Single Answer Time , User , Type of access
Question Your Answer
The system call checks the arguments given by the Time , Type of access
application, builds a data structure to convey the
arguments to the kernel and then executes a Multiple Choice Single Answer
special instruction called as :- Question
Correct Answer It has been said that Pascal and C programs are
Software interrupt collections of procedures and C++ programs are
Your Answer collections of
Special system call Correct Answer
Classes
Multiple Choice Multiple Answer Your Answer
Question Classes
Security violations of the system can be categorized
as :- Select The Blank
Operating System | 24
Question Multiple Choice Multiple Answer
OOSAD begins with identification of actors, what Question
activities they perform and building ________ model Kernel threads are generally :-
for the function. Correct Answer
Correct Answer Slower to create , Difficult to manage
Use-case Your Answer
Your Answer Slower to create , Difficult to manage
Use-case
Select The Blank
Multiple Choice Single Answer Question
Question If the user-supplied password matches the
The smallest addressable portion of a disk is :- password stored in the system, the system assumes
Correct Answer that the user is ________.
Sector Correct Answer
Your Answer Legitimate
Sector Your Answer
Legitimate
True/False
Question Multiple Choice Single Answer
OOSAD approach is applicable only to stable Question
systems. In general , the access matrix will be :-
Correct Answer Correct Answer
False Sparse
Your Answer Your Answer
True Sparse

True/False True/False
Question Question
To perform a disk I/O operation, the computer Encryption is one common method of protecting
places a command into the host controller, typically information that is transmitted over unreliable links.
using memory-mapped I/O ports. Correct Answer
Correct Answer True
True Your Answer
Your Answer False
True
Select The Blank
Multiple Choice Single Answer Question
Question A ________ is a full duplex connection between a
The number of processes that are completed per device driver and a user-level process.
time unit is called as:- Correct Answer
Correct Answer Stream
Throughput of system Your Answer
Your Answer Stream
Efficiency of system
Multiple Choice Single Answer
Multiple Choice Single Answer Question
Question In how many number of classes does the NRU
In MULTICS TLB address of 'n', the most recently algorithm divides pages, depending on the state of
referenced pages are kept, where 'n' can have a R and M?
value :- Correct Answer
Correct Answer 4
16 Your Answer
Your Answer 8
8
Select The Blank
True/False Question
Question The Pentium page size is fixed at ________ KB.
The job of I/O channel is to offload I/O work from the Correct Answer
main CPU. 4
Correct Answer Your Answer
True 4
Your Answer
False True/False
Question
Volatile storage loses its contents when the power
Operating System | 25
to the device is removed. Question
Correct Answer In FIFO algorithm the page removed from memory
True is the one which most recently used.
Your Answer Correct Answer
True False
Your Answer
Multiple Choice Multiple Answer False
Question
The movement of information between levels of a Select The Blank
storage hierarchy may be of two types depending Question
on the hardware design and the controlling A process is ________, if it cannot affect or be
operating system software such as :- affected by the other processes executing in the
Correct Answer system.
Explicit , Implicit Correct Answer
Your Answer Independent
Explicit , Implicit Your Answer
Independent
Select The Blank
Question Multiple Choice Multiple Answer
In queuing diagram, the arrow indicates the flow of Question
________ in the system. Linux presents standard interfaces to whom?
Correct Answer Correct Answer
Processes Programmer , User
Your Answer Your Answer
Processes Programmer , User , System administrator

Multiple Choice Multiple Answer Select The Blank


Question Question
What are the forms of malicious access? The kernel module that controls a device is a
Correct Answer ________ .
Unauthorized reading of data , Unauthorized Correct Answer
modification of data , Unauthorized destruction of Device driver
data Your Answer
Your Answer Device daemon
Unauthorized reading of data , Unauthorized
modification of data , Unauthorized destruction of True/False
data Question
Whenever a trap or interrupt occurs, the hardware
Select The Blank switches from user mode to monitor mode.
Question Correct Answer
A bit called the ________ , is added to the hardware True
of the computer to indicate the current mode. Your Answer
Correct Answer True
Mode bit
Your Answer Select The Blank
Mode bit Question
A ________ is a computer or router that sits between
Multiple Choice Multiple Answer the trusted and untrusted systems.
Question Correct Answer
In Windows NT , kernel uses which two sets of Firewall
objects? Your Answer
Correct Answer Firewall
Dispatcher objects , Control objects
Your Answer Multiple Choice Multiple Answer
Dispatcher objects , Complex objects Question
Find out the basic I/O hardware elements from the
Multiple Choice Single Answer following :-
Question Correct Answer
The smallest addressable portion of a disk is :- Ports , Buses , Device controllers
Correct Answer Your Answer
Sector Ports , Buses , Device controllers
Your Answer
Sector True/False
Question
True/False Object-oriented programming focuses on the
Operating System | 26
integrated data and functionality as discrete units Question
that have both knowledge (data) and capabilities An object type in windows NT is a system defined
(functions). Procedural programs, on the other data type that has two things associated with it,
hand, focus on functions and how they act on data. which are they?
Correct Answer Correct Answer
True Set of attributes , Set of methods
Your Answer Your Answer
True Object-type , Object-processing

Match The Following Multiple Choice Multiple Answer


Question Question
Correct Answer When memory reference occurs in MULTICS the
Your Answer things which takes place are :-
User mode Correct Answer
Mode bit 1 Segment number is used to find segment descriptor
Mode bit 1 , Check is made to see if segment's page table is in
Serial port memory , Page table entry for requested virtual
Modem page is examined , Offset is added to the page
Monitor mode origin to give main memory address
Parallel port Your Answer
Printer Segment number is used to find segment descriptor
Printer , Check is made to see if segment's page table is in
Privileged instructions memory , Page table entry for requested virtual
Monitor mode page is examined
Mode bit 0
Multiple Choice Single Answer
True/False Question
Question The interval from the time of submission of a
In segmentation the total address space can exceed process to the time of completion is :-
the size of physical memory. Correct Answer
Correct Answer Turnaround time
True Your Answer
Your Answer Turnaround time
False
True/False
Multiple Choice Single Answer Question
Question Context switch times are highly dependent on
Because of the concept of independent objects hardware support.
responding to messages, object orientation is a Correct Answer
natural way to implement True
Correct Answer Your Answer
Event driven programming True
Your Answer
Message deiven programming True/False
Question
Multiple Choice Single Answer Procedure and data can be distinguished and
Question separately protected in segmentation
In UNIX, everything below the system-call interface Correct Answer
and above the physical hardware is the :- True
Correct Answer Your Answer
Kernel True
Your Answer
I/O system Multiple Choice Multiple Answer
Question
Multiple Choice Multiple Answer Dispatcher functions involves the following :-
Question Correct Answer
Different multithreading models available are :- Switching context , Switching to user mode
Correct Answer Your Answer
Many-to-one model , One-to-one model , Many-to- Switching context , Switching to user mode
many model
Your Answer Multiple Choice Single Answer
Many-to-one model , One-to-one model , Many-to- Question
many model The First version of UNIX was developed in 1969 by
Ken Thompson of the Research Group at :-
Multiple Choice Multiple Answer Correct Answer
Operating System | 27
Bell Laboratories
Your Answer Multiple Choice Single Answer
Bell Laboratories Question
The ready queue is generally stored as a :-
Multiple Choice Single Answer Correct Answer
Question Linked list
In Object Oriented technology following expression Your Answer
is appropriate Queue
Correct Answer
object=data+menthods Select The Blank
Your Answer Question
object=data+menthods A ________ is region of fast memory that hold copies
of data .
Multiple Choice Single Answer Correct Answer
Question Cache
A procedure body implementing an operation is Your Answer
termed as Cache
Correct Answer
Method Multiple Choice Multiple Answer
Your Answer Question
Method What are the components to memory management
under Linux?
Select The Blank Correct Answer
Question Physical memory manager , Virtual memory
During execution, ________ register holds the sector manager
for the code segment. Your Answer
Correct Answer Physical memory manager , Virtual memory
CS manager
Your Answer
PS Match The Following
Question
True/False Correct Answer
Question Your Answer
In some operating system, spooling is managed by Bounded-buffer
a system daemon process. Fixed size buffer
Correct Answer Fixed size buffer
True Producer
Your Answer Produces process
False Produces process
Consumer
Select The Blank Consumes process
Question Consumes process
Each column in the access matrix can be Unbounded-buffer
implemented as an ________ for one object. No limit on size of buffer
Correct Answer No limit on size of buffer
Access list
Your Answer True/False
Capability list Question
The inode contains 15 pointers to the disk blocks
Multiple Choice Single Answer containing the data contents of the file.
Question Correct Answer
Policies for resource use may vary depending on the True
:- Your Answer
Correct Answer True
Application
Your Answer Multiple Choice Single Answer
System Question
When computer is powered up or rebooted, it needs
Multiple Choice Multiple Answer to have an initial program to run. This initial
Question program is known as :-
A mailbox can be owned by :- Correct Answer
Correct Answer Bootstrap program
Process , Operating system Your Answer
Your Answer Bootstrap program
User , Process , Program
Operating System | 28
Operating System - 11 A copy of inode is kept in main memory while a file
is open.
LIST OF ATTEMPTED QUESTIONS AND ANSWERS Correct Answer
True
Select The Blank Your Answer
Question True
Like worms, ________ are designed to spread into
other programs and can wreak havoc in a system. Multiple Choice Single Answer
Correct Answer Question
Viruses The class bird should have object
Your Answer Correct Answer
Viruses Egale
Your Answer
Multiple Choice Multiple Answer Egale
Question
The advantage of dynamic loading is Multiple Choice Multiple Answer
Correct Answer Question
Unused routine is never loaded , Useful when large User thread libraries include :-
amount of code are needed to handle infrequently Correct Answer
occurring cases, such as error routines , It does not POSIX Pthreads , Mach C-threads , Solaris threads
require special support from the operating system Your Answer
Your Answer Mach C-threads , Solaris threads
Useful when large amount of code are needed to
handle infrequently occurring cases, such as error True/False
routines , It does not require special support from Question
the operating system , Unused routine is never We can include dynamic protection in the access-
loaded matrix model by considering the domains and the
access matrix itself as objects.
Select The Blank Correct Answer
Question True
Terminals and line printers are ________ . Your Answer
Correct Answer True
Character devices
Your Answer True/False
Socket interfaces Question
The capability list is associated with a domain.
Multiple Choice Multiple Answer Correct Answer
Question True
A mailbox can be owned by :- Your Answer
Correct Answer True
Process , Operating system
Your Answer Select The Blank
Process , Operating system Question
A ________ in NT is an object that provides a uniform
Select The Blank interface for files, whether they are local or remote.
Question Correct Answer
A process is ________, if it cannot affect or be Redirector
affected by the other processes executing in the Your Answer
system. Redirector
Correct Answer
Independent Select The Blank
Your Answer Question
Cooperating The ________ is a compromise between access lists
and capability lists.
True/False Correct Answer
Question Lock-Key Schemes
NFU is crude attempt to approximate LRU. Your Answer
Correct Answer Protected procedures
True
Your Answer Match The Following
False Question
Correct Answer
True/False Your Answer
Question Bit showing the availability of page in memory for
which that entry belongs to
Operating System | 29
Present / absent bit Correct Answer
Modified bit False
In page table entry, the access permitted are stored Your Answer
in False
Protection bit
Protection bit Multiple Choice Single Answer
Bit is set when the page is referenced Question
Referenced bit The wraping up of data and methods in a single unit
Referenced bit (class) is known as :
Bit which keeps track of page usage Correct Answer
Modified bit Encapsulation
Security bit Your Answer
Encapsulation
Multiple Choice Single Answer
Question True/False
In UNIX, files are organized in tree-structured :- Question
Correct Answer A process is a victim of starvation if it becomes
Directories stuck in a scheduling queue indefinitely.
Your Answer Correct Answer
Directories True
Your Answer
Match The Following True
Question
Correct Answer Select The Blank
Your Answer Question
We can define abstract operation on abstract data ________ file access can be layered on top of block-
Data abstraction device drivers.
Data abstraction Correct Answer
Process of sharing properties of the higher level Memory-mapped
object or class Your Answer
Inheritance Memory-mapped
Inheritance
Ability to inherit attributes and methods from 2 or Multiple Choice Multiple Answer
more objects or classes Question
Multiple inheritance find out the services provided by kernel related to
Multiple inheritance I/O :
Ability to send a message to several objects and to Correct Answer
allow receiving object to respond method specified I/O Scheduling , Buffering , Spooling
on the object. Your Answer
Ploymorphism I/O Scheduling , Buffering , Spooling
Ploymorphism
Multiple Choice Multiple Answer
Select The Blank Question
Question The role of the operating system in computer I/O is
The Solaris developers reimplemented the ________ to :-
using in-kernel thread to eliminate the context Correct Answer
switch involved in moving each character between Manage I/O operation and devices , Control I/O
daemons and the kernel. operation and devices
Correct Answer Your Answer
Telnet daemon Manage I/O operation and devices , Control I/O
Your Answer operation and devices
Context-switch daemon
True/False
Multiple Choice Single Answer Question
Question In Lock-key mechanism, a process executing in a
If the process is waiting for some event to occur domain can access an object if that domain has a
then it is said to be in :- key that matches one of the locks of the objects.
Correct Answer Correct Answer
Waiting state True
Your Answer Your Answer
Ready state False

True/False Multiple Choice Multiple Answer


Question Question
Cache is a non-volatile storage system. There are components to the module support under
Operating System | 30
Linux, identify them :- Your Answer
Correct Answer Malicious , Authorized
Module management , Driver registration , Conflict-
resolution mechanism Multiple Choice Single Answer
Your Answer Question
Module management , Driver registration , Conflict- The smallest addressable portion of a disk is :-
resolution mechanism Correct Answer
Sector
Multiple Choice Single Answer Your Answer
Question Sector
The 4.3BSD operating system is the version of :-
Correct Answer Select The Blank
UNIX Question
Your Answer Associations are generally ________.
UNIX Correct Answer
Bidirectional
Select The Blank Your Answer
Question Bidirectional
Each entry in the access matrix consists of a set of
________ . Multiple Choice Multiple Answer
Correct Answer Question
Access right Find out the human-interface devices :-
Your Answer Correct Answer
Access right Screen , Keyboard , Mouse
Your Answer
Multiple Choice Single Answer Screen , Keyboard , Mouse
Question
In UNIX, a file is represented by an :- Select The Blank
Correct Answer Question
Inode ________allows us to define abstract operations on
Your Answer abstract data.
Block Correct Answer
Data abstraction
Multiple Choice Single Answer Your Answer
Question Data abstraction
The segment is :-
Correct Answer Multiple Choice Multiple Answer
Logical entity Question
Your Answer Once the I/O is started , which two courses of action
Logical entity are possible?
Correct Answer
True/False Synchronous I/O , Asynchronous I/O , Simple I/O
Question Your Answer
In Windows NT, each process has one or more Synchronous I/O , Asynchronous I/O , Simple I/O
threads, which are the units of execution
dispatched by the kernel. Multiple Choice Multiple Answer
Correct Answer Question
True In windows NT, naming of objects is of two types :-
Your Answer Correct Answer
True Permanent name , Temporary name
Your Answer
Multiple Choice Single Answer Permanent name , Temporary name
Question
UNIX operating system is written mostly in :- True/False
Correct Answer Question
C language Turnaround time is inversely proportional to
Your Answer throughput.
C++ language Correct Answer
True
Multiple Choice Multiple Answer Your Answer
Question True
Security violations of the system can be categorized
as :- Select The Blank
Correct Answer Question
Malicious , Accidental The hardware to measure elapsed time to trigger
Operating System | 31
operations is called a ________. communicate with web browsers.
Correct Answer Correct Answer
Programmable interval timer http
Your Answer Your Answer
Programmable elapsed timer http

Multiple Choice Multiple Answer True/False


Question Question
User level threads are generally :- Cache-coherency is usually a software problem and
Correct Answer handled above the operating system level.
Fast to create , Easy to manage Correct Answer
Your Answer False
Fast to create , Easy to manage Your Answer
True
Multiple Choice Single Answer
Question Multiple Choice Multiple Answer
In MULTICS TLB address of 'n', the most recently Question
referenced pages are kept, where 'n' can have a Two main jobs of a computer are :-
value :- Correct Answer
Correct Answer I/O , Processing
16 Your Answer
Your Answer I/O , Processing
16
Multiple Choice Multiple Answer
Multiple Choice Single Answer Question
Question What are the ways in which a request for kernel-
C++ is also named as mode execution can occur in Linux?
Correct Answer Correct Answer
C with classes Explicitly , Implicitly
Your Answer Your Answer
C with classes Explicitly , Implicitly

Multiple Choice Multiple Answer Select The Blank


Question Question
Liner address is divided into fields like :- If the user-supplied password matches the
Correct Answer password stored in the system, the system assumes
Dir , Page , Offset that the user is ________.
Your Answer Correct Answer
Dir , Page , Offset Legitimate
Your Answer
Multiple Choice Single Answer Legitimate
Question
DVMA stands for :- True/False
Correct Answer Question
Direct Virtual Memory Access Single-indirect block is an index block which
Your Answer contains data of the files to which it points.
Direct Virtual Memory Access Correct Answer
False
True/False Your Answer
Question True
An asynchronous call returns immediately, without
waiting for the I/O to complete. True/False
Correct Answer Question
True Volatile storage loses its contents when the power
Your Answer to the device is removed.
True Correct Answer
True
Operating System - 10 Your Answer
True

LIST OF ATTEMPTED QUESTIONS AND ANSWERS Multiple Choice Single Answer


Question
Select The Blank SCSI stands for :-
Question Correct Answer
Web servers use the ________ protocol to Small Computer-Systems Interface
Operating System | 32
Your Answer Correct Answer
System Call-System Interrupt Object Oriented technology
Your Answer
Multiple Choice Multiple Answer Object Oriented technology
Question
Which are the Division D security systems ? Select The Blank
Correct Answer Question
Windows 3.1 , MS-DOS The ________ of a process is represented in the PCB
Your Answer of a process.
Windows NT , UNIX Correct Answer
Context
Select The Blank Your Answer
Question Context
static binding allows to hold certain properties fixed
and rigid, whereas ________ binding allows object to Select The Blank
behave as per conditions emerge. Question
Correct Answer In windows NT, the ________ facility is used to pass
Dynamic requests and results between client and server
Your Answer processes within a single machine.
Dynamic Correct Answer
Local-procedure-call
Multiple Choice Multiple Answer Your Answer
Question Remote-procedure-call
What are the components to memory management
under Linux? Multiple Choice Single Answer
Correct Answer Question
Physical memory manager , Virtual memory In how many number of classes does the NRU
manager algorithm divides pages, depending on the state of
Your Answer R and M?
Physical memory manager , Virtual memory Correct Answer
manager 4
Your Answer
Multiple Choice Single Answer 4
Question
The First version of UNIX was developed in 1969 by Multiple Choice Multiple Answer
Ken Thompson of the Research Group at :- Question
Correct Answer When memory reference occurs in MULTICS the
Bell Laboratories things which takes place are :-
Your Answer Correct Answer
Bell Laboratories Segment number is used to find segment descriptor
, Check is made to see if segment's page table is in
True/False memory , Page table entry for requested virtual
Question page is examined , Offset is added to the page
XML is a meta data language developed to specify origin to give main memory address
data with a goal of improving interoperatability of Your Answer
different data sources. Segment number is used to find segment descriptor
Correct Answer , Check is made to see if segment's page table is in
True memory , Page table entry for requested virtual
Your Answer page is examined , Offset is added to the page
True origin to give main memory address

True/False Multiple Choice Multiple Answer


Question Question
One way to achieve portability is to write software Supervisor mode is also known as :-
in standard version of high level language and to Correct Answer
develop portable system and application software . System mode , Privileged mode , Monitor mode
Correct Answer Your Answer
True System mode , Privileged mode , Monitor mode
Your Answer
True Multiple Choice Single Answer
Question
Multiple Choice Single Answer How big is a class object?
Question Correct Answer
C++ is basically a procedural language having Is as big as sum of the sizes of its member variables
extension of Your Answer
Operating System | 33
Is as big as sum of the sizes of its member variables True

Multiple Choice Multiple Answer Select The Blank


Question Question
The device number consists of which two parts in A keyboard is an example of device that is accessed
UNIX? through a ________ interface.
Correct Answer Correct Answer
Major device number , Minor device number Character stream
Your Answer Your Answer
Major device number , Minor device number Character stream

Select The Blank Multiple Choice Multiple Answer


Question Question
The context switch time is pure ________, because Find out the CPU scheduling algorithms from these
system does no useful work while switching. options :-
Correct Answer Correct Answer
Overhead FCFS , RR , SJF
Your Answer Your Answer
Wastage FCFS , RR , SJF

Multiple Choice Multiple Answer Multiple Choice Single Answer


Question Question
In Solaris 2, user-level threads may be:- Main Memory of computer program is also called
Correct Answer as :-
Bound , Unbound Correct Answer
Your Answer RAM
Bound , Unbound Your Answer
RAM
Match The Following
Question Multiple Choice Multiple Answer
Correct Answer Question
Your Answer The security of a system can be improved by two
Random-access devices management techniques, such as :-
CD-ROM Correct Answer
CD-ROM Threat monitoring , Audit Log
Character devices. Your Answer
Terminal Threat monitoring , Audit Log
Keyboard
Block devices Multiple Choice Single Answer
Disk Question
Tape The separation of policy and mechanism is
Sequential devices important for which purpose?
Modem Correct Answer
Terminal Flexibility
Your Answer
Multiple Choice Single Answer Flexibility
Question
The main difference between structure and class is Match The Following
Correct Answer Question
Structure does not support OOPS Class Supports Correct Answer
OOPS. Your Answer
Your Answer Trap in which program tries to use unmapped page
Structure does not support OOPS Class Supports Page fault
OOPS. Page fault
Memory Management Unit
True/False MMU
Question MMU
Object-oriented programming focuses on the Smaller units in which virtual address space is
integrated data and functionality as discrete units divided
that have both knowledge (data) and capabilities Pages
(functions). Procedural programs, on the other Pages
hand, focus on functions and how they act on data. Units in physical memory corresponding to pages in
Correct Answer virtual memory
True Page frame
Your Answer Page frame
Operating System | 34
User thread
True/False Your Answer
Question User thread
A non-blocking call does not halt the execution of
the application for an extended time. Select The Blank
Correct Answer Question
True ________ includes disks and tapes.
Your Answer Correct Answer
True Block devices
Your Answer
True/False Block devices
Question
Windows NT uses a message passing Multiple Choice Single Answer
implementation for I/O. Question
Correct Answer DMA stands for :-
True Correct Answer
Your Answer Direct Memory Access
True Your Answer
Direct Memory Access
Multiple Choice Multiple Answer
Question True/False
Kernel threads are generally :- Question
Correct Answer When application issues a blocking I/O system call,
Slower to create , Difficult to manage the request is placed on the queue for that device.
Your Answer Correct Answer
Slower to create , Difficult to manage True
Your Answer
Multiple Choice Single Answer True
Question
The long-term scheduler controls the :- Multiple Choice Single Answer
Correct Answer Question
Degree of multiprogramming The concept of OOPS was first introduced in
Your Answer Correct Answer
Degree of multiprogramming Simula Language
Your Answer
Multiple Choice Single Answer Simula Language
Question
Objects may communicate with each other through True/False
Correct Answer Question
Methods Encryption is one common method of protecting
Your Answer information that is transmitted over unreliable links.
Methods Correct Answer
True
Select The Blank Your Answer
Question True
In queuing diagram, the arrow indicates the flow of
________ in the system. Select The Blank
Correct Answer Question
Processes ________ describes segments local to each program,
Your Answer including its code, data, stack etc.
Queue Correct Answer
LDT
Multiple Choice Single Answer Your Answer
Question LDT
If Dog derives from Mammal, and Mammal derives
from Animal, then - LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Correct Answer
Dog inherits Animal's functions and data Multiple Choice Single Answer
Your Answer Question
Dog inherits Animal's functions and data SCSI stands for :-
Correct Answer
Multiple Choice Single Answer Small Computer-Systems Interface
Question Your Answer
Thread at user level is known as :- Small Computer-Systems Interface
Correct Answer
Operating System | 35
Correct Answer
Multiple Choice Multiple Answer Your Answer
Question Round-robin
The basic hardware elements involved in I/O are :- Time quantum
Correct Answer Time quantum
Buses , Device controllers , Device First-come First-served
Your Answer First come job
Buses , Device controllers , Device First come job
Shortest job
True/False Shortest job
Question Shortest job
A file in NTFS is a simple byte stream as it is in MS- Priority
DOS or UNIX . Highest priority job
Correct Answer Highest priority job
False
Your Answer Select The Blank
False Question
________ describes segments local to each program,
True/False including its code, data, stack etc.
Question Correct Answer
C++ supports object oriented programming LDT
concepts of objects, classes, inheritance, Your Answer
polymorphism and parameterised datatypes. LDT
Correct Answer
True Multiple Choice Multiple Answer
Your Answer Question
True To protect the system, we must take security
measures at two levels, such as :-
True/False Correct Answer
Question Physical level , Human level
I/O system calls are costly in terms of CPU Your Answer
consumptions. Physical level , Human level
Correct Answer
True True/False
Your Answer Question
True The hardware allows privileged instructions to be
executed in only user mode.
Multiple Choice Single Answer Correct Answer
Question False
All user processes are descendents of one original Your Answer
process, Which is that process? False
Correct Answer
Init process Multiple Choice Single Answer
Your Answer Question
Init process What does the rows of the access matrix
represents?
Match The Following Correct Answer
Question Domains
Correct Answer Your Answer
Your Answer Domains
Provides adjustment while compiling classes
Interface classes Select The Blank
Derived function Question
Identify values & relevant operations A bit called the ________ , is added to the hardware
Abstract data types of the computer to indicate the current mode.
Abstract data types Correct Answer
Complete implementation of class Mode bit
Concrete data types Your Answer
Interface classes Mode bit
Provides framework for other classes
Node classes True/False
Node classes Question
In Windows NT, each process has one or more
Match The Following threads, which are the units of execution
Question dispatched by the kernel.
Operating System | 36
Correct Answer
True Multiple Choice Single Answer
Your Answer Question
True Thread at user level is known as :-
Correct Answer
Select The Blank User thread
Question Your Answer
________allows us to define abstract operations on User thread
abstract data.
Correct Answer Multiple Choice Single Answer
Data abstraction Question
Your Answer If Dog derives from Mammal, and Mammal derives
Data abstraction from Animal, then -
Correct Answer
Select The Blank Dog inherits Animal's functions and data
Question Your Answer
If the granularity field is ________ the limit field is the Mammal inherits Animal's functions and data
exact segment size, upto 1 MB.
Correct Answer Select The Blank
0 Question
Your Answer During execution, ________ register holds the sector
1 for the code segment.
Correct Answer
True/False CS
Question Your Answer
Encryption is one common method of protecting DS
information that is transmitted over unreliable links.
Correct Answer Multiple Choice Single Answer
True Question
Your Answer The list of processes waiting for a particular I/O
True device is called a :-
Correct Answer
Multiple Choice Single Answer Device queue
Question Your Answer
Collection of similar datatypes is called as Device queue
Correct Answer
Array True/False
Your Answer Question
Array Cache is a faster storage system which stores data
temporarily.
Multiple Choice Single Answer Correct Answer
Question True
A Process which produces process is known as :- Your Answer
Correct Answer True
Producer
Your Answer True/False
Producer Question
The file system does not provide a degree of
Multiple Choice Single Answer protection.
Question Correct Answer
Interrupt mechanism accepts an address and this False
address is an offset in a table called the :- Your Answer
Correct Answer True
Interrupt vector
Your Answer Multiple Choice Multiple Answer
Interrupt vector Question
Liner address is divided into fields like :-
Select The Blank Correct Answer
Question Dir , Page , Offset
The process could create a new ________ and wait Your Answer
for its termination. Dir , Page , Offset
Correct Answer
Sub process True/False
Your Answer Question
Sub process Volatile storage loses its contents when the power
Operating System | 37
to the device is removed. Your Answer
Correct Answer Domain
True
Your Answer Multiple Choice Multiple Answer
True Question
Message passing may be :-
Multiple Choice Single Answer Correct Answer
Question Blocking , Non-blocking
Which of the following Operating System has no Your Answer
memory protection ? Blocking , Non-blocking
Correct Answer
Windows 3.1 Multiple Choice Multiple Answer
Your Answer Question
Windows 3.1 An object type in windows NT is a system defined
data type that has two things associated with it,
Multiple Choice Multiple Answer which are they?
Question Correct Answer
In windows NT, naming of objects is of two types :- Set of attributes , Set of methods
Correct Answer Your Answer
Permanent name , Temporary name Set of attributes , Set of methods
Your Answer
Permanent name , Temporary name Select The Blank
Question
Multiple Choice Single Answer The ________ of a process is represented in the PCB
Question of a process.
Protection can no longer be considered solely as a Correct Answer
matter of concern to the designer of :- Context
Correct Answer Your Answer
Operating system Context
Your Answer
Operating system Select The Blank
Question
Select The Blank The Linux ________ file system, known as the proc
Question file system, is an example of a file system whose
Web servers use the ________ protocol to contents are not actually stored anywhere, but are
communicate with web browsers. rather computed on demand according to user file
Correct Answer I/o requests.
http Correct Answer
Your Answer Process
http Your Answer
Process
Multiple Choice Multiple Answer
Question True/False
locate the transmission devices :- Question
Correct Answer Objects can be both, tangible or intangible.
Network cards , Modems Correct Answer
Your Answer True
Network cards , Modems Your Answer
True
Multiple Choice Single Answer
Question Multiple Choice Multiple Answer
In UNIX, the simplest form of communication Question
between processes is by :- In UNIX, a device is distinguished by two things,
Correct Answer which are :-
Pipes Correct Answer
Your Answer Device-class , Device number
Pipes Your Answer
Device-class , Device number
Select The Blank
Question Multiple Choice Multiple Answer
A ________ is a group of NT server machines that Question
share a common security policy and user Find out the basic I/O hardware elements from the
databases. following :-
Correct Answer Correct Answer
Domain Ports , Buses , Device controllers
Operating System | 38
Your Answer Egale
Ports , Buses , Device controllers
Multiple Choice Single Answer
Multiple Choice Multiple Answer Question
Question Objects are essentially :-
Which are the Division D security systems ? Correct Answer
Correct Answer Abstract data type
Windows 3.1 , MS-DOS Your Answer
Your Answer Abstract data type
Windows 3.1 , MS-DOS
True/False
Multiple Choice Single Answer Question
Question Banker's algorithm is a deadlock-avoidance
Protection can improve :- algorithm.
Correct Answer Correct Answer
Reliability True
Your Answer Your Answer
Reliability True

Select The Blank True/False


Question Question
The creating process is called a ________ process. Aging algorithm is based on LRU.
Correct Answer Correct Answer
Parent True
Your Answer Your Answer
Parent False

Multiple Choice Multiple Answer Select The Blank


Question Question
When memory reference occurs in MULTICS the MULTICS uses a ________ in addition to file access
things which takes place are :- for protection.
Correct Answer Correct Answer
Segment number is used to find segment descriptor Ring structure
, Check is made to see if segment's page table is in Your Answer
memory , Page table entry for requested virtual Ring structure
page is examined , Offset is added to the page
origin to give main memory address True/False
Your Answer Question
Segment number is used to find segment descriptor A virus is a fragment of code embedded in a
, Check is made to see if segment's page table is in legitimate program
memory , Page table entry for requested virtual Correct Answer
page is examined , Offset is added to the page True
origin to give main memory address Your Answer
True
Operating System - 14
Multiple Choice Multiple Answer
Question
LIST OF ATTEMPTED QUESTIONS AND ANSWERS The basic hardware elements involved in I/O are :-
Correct Answer
Multiple Choice Multiple Answer Buses , Device controllers , Device
Question Your Answer
The Linux system is composed of three main bodies Keyboard , Buses , Device controllers
of code, in line with most traditional UNIX
implementations. Which are :- True/False
Correct Answer Question
Kernel , System libraries , System utilities Main Memory is a volatile storage device that loses
Your Answer its contents when power is turned off.
System libraries , Programs , Kernel Correct Answer
True
Multiple Choice Single Answer Your Answer
Question True
The class bird should have object
Correct Answer Select The Blank
Egale Question
Your Answer In queuing diagram , each rectangular box
Operating System | 39
represents a ________. Question
Correct Answer Dispatcher functions involves the following :-
Queue Correct Answer
Your Answer Switching context , Switching to user mode
Queue Your Answer
Switching context , Switching to user mode
True/False
Question Multiple Choice Multiple Answer
Whenever a trap or interrupt occurs, the hardware Question
switches from user mode to monitor mode. Many-to-may model is supported by following
Correct Answer operating systems :-
True Correct Answer
Your Answer Solaris , IRIX , Digital UNIX
True Your Answer
IRIX , Solaris
Multiple Choice Single Answer
Question Select The Blank
As process enter the system, they are put into :- Question
Correct Answer A ________ controller is built into each disk drive.
Job queue Correct Answer
Your Answer Disk
Job queue Your Answer
Disk
Select The Blank
Question Match The Following
During execution, ________ register holds the sector Question
for the data segment. Correct Answer
Correct Answer Your Answer
DS Parent process
Your Answer Child process
CS Child process
Foreground processes
Multiple Choice Multiple Answer Interactive processes
Question Interactive processes
The role of the operating system in computer I/O is Background processes
to :- Batch processes
Correct Answer Batch processes
Manage I/O operation and devices , Control I/O Light-Weight processes
operation and devices Thread
Your Answer Thread
Manage I/O operation and devices , Control I/O
operation and devices Select The Blank
Question
Multiple Choice Multiple Answer A class may be thought of as 'data-type' and object
Question as ________ of that data-type.
What are the forms of malicious access? Correct Answer
Correct Answer Variable
Unauthorized reading of data , Unauthorized Your Answer
modification of data , Unauthorized destruction of Variable
data
Your Answer True/False
Unauthorized reading of data , Unauthorized Question
modification of data , Unauthorized destruction of In Windows NT, interrupt object binds an interrupt
data service routine to an interrupt source.
Correct Answer
Select The Blank True
Question Your Answer
A ________ is a computer or router that sits between True
the trusted and untrusted systems.
Correct Answer True/False
Firewall Question
Your Answer In Windows NT, each process has one or more
Firewall threads, which are the units of execution
dispatched by the kernel.
Multiple Choice Multiple Answer Correct Answer
Operating System | 40
True Your Answer
Your Answer Graphic user interface
True
Select The Blank
Multiple Choice Single Answer Question
Question In queuing diagram, the arrow indicates the flow of
If Dog derives from Mammal, and Mammal derives ________ in the system.
from Animal, then - Correct Answer
Correct Answer Processes
Dog inherits Animal's functions and data Your Answer
Your Answer Operation
Mammal inherits Animal's functions and data
True/False
Multiple Choice Single Answer Question
Question Whenever the operating system gains control of the
If the process is waiting to be assigned to CPU then computer, it is in monitor mode.
it is said to be in :- Correct Answer
Correct Answer True
Ready state Your Answer
Your Answer True
Ready state
Multiple Choice Single Answer
Multiple Choice Multiple Answer Question
Question C++ is also named as
What are the components to memory management Correct Answer
under Linux? C with classes
Correct Answer Your Answer
Physical memory manager , Virtual memory Visual C++
manager
Your Answer Multiple Choice Single Answer
Physical memory manager , Virtual memory Question
manager The number of processes that are completed per
time unit is called as:-
Multiple Choice Multiple Answer Correct Answer
Question Throughput of system
The Moriss Internet Worm was made up of which of Your Answer
the two programs? Efficiency of system
Correct Answer
Grappling hook program , Main program Select The Blank
Your Answer Question
Target worm program , Grappling hook program A process is ________ if it can affect or be affected
by the other processes executing in the system.
Select The Blank Correct Answer
Question Cooperating
The ________ controller is the controller at the Your Answer
computer end of the bus. Competing
Correct Answer
Host Multiple Choice Single Answer
Your Answer Question
Disk Collection of similar datatypes is called as
Correct Answer
True/False Array
Question Your Answer
In Windows NT, kernel is object-oriented. Array
Correct Answer
True Match The Following
Your Answer Question
True Correct Answer
Your Answer
Multiple Choice Single Answer Random-access devices
Question CD-ROM
C++ is basically a procedural language having CD-ROM
extension of Character devices.
Correct Answer Terminal
Object Oriented technology Terminal
Operating System | 41
Block devices Multiple Choice Multiple Answer
Disk Question
Disk locate the transmission devices :-
Sequential devices Correct Answer
Modem Network cards , Modems
Modem Your Answer
Tapes , Network cards , Modems
Multiple Choice Multiple Answer
Question True/False
The device number consists of which two parts in Question
UNIX? The user process issues a network I/O system call to
Correct Answer send the character to the remote machine.
Major device number , Minor device number Correct Answer
Your Answer True
Device-id , Device-name Your Answer
True
Multiple Choice Single Answer
Question Multiple Choice Single Answer
The pure Object Oriented language is Question
Correct Answer The process by which objects of one class acquire
Java properties of objects of other class is called
Your Answer Correct Answer
C Inheritance
Your Answer
Multiple Choice Single Answer Inheritance
Question
The concept of OOPS was first introduced in True/False
Correct Answer Question
Simula Language Windows NT uses a message passing
Your Answer implementation for I/O.
C language Correct Answer
True
Multiple Choice Multiple Answer Your Answer
Question True
Most CPUs have two interrupt request lines. Which
are they? Multiple Choice Multiple Answer
Correct Answer Question
Maskable , Non maskable We need two separate modes of operation to
Your Answer protect the operating system and all other
Maskable , Non maskable programs and their data from malfunctioning
program. Which are those modes?
Multiple Choice Multiple Answer Correct Answer
Question User mode , Monitor mode
Different multithreading models available are :- Your Answer
Correct Answer User mode , Monitor mode
Many-to-one model , One-to-one model , Many-to-
many model Match The Following
Your Answer Question
Many-to-one model , One-to-one model , Many-to- Correct Answer
many model Your Answer
Round-robin
Select The Blank Time quantum
Question Time quantum
The ________ of a process is represented in the PCB First-come First-served
of a process. First come job
Correct Answer First come job
Context Shortest job
Your Answer Shortest job
Block Shortest job
Priority
Operating System - 13 Highest priority job
Highest priority job

LIST OF ATTEMPTED QUESTIONS AND ANSWERS Multiple Choice Single Answer


Question
Operating System | 42
The segment is :- A ________ in NT is an object that provides a uniform
Correct Answer interface for files, whether they are local or remote.
Logical entity Correct Answer
Your Answer Redirector
Logical entity Your Answer
Domain
Multiple Choice Single Answer
Question Multiple Choice Multiple Answer
In UNIX, decisions regarding which process to swap Question
in or out are made by whom? In Solaris 2, user-level threads may be:-
Correct Answer Correct Answer
Swapper Bound , Unbound
Your Answer Your Answer
Memory handler Bound , Unbound

Select The Blank Multiple Choice Multiple Answer


Question Question
A ________ is a client-server mechanism that enables An audit log records which things about an object ?
an application on one machine to make a procedure Correct Answer
call to code on another machine. Time , User , Type of access
Correct Answer Your Answer
Remote-procedure-call Time , User , Type of access
Your Answer
Remote-procedure-call Multiple Choice Multiple Answer
Question
Multiple Choice Single Answer One-to-one model is supported by following systems
Question :-
When each process that wants to communicate Correct Answer
must explicitly name the recipient or sender of the Windows NT , OS/2
communication, then such communication is called Your Answer
as :- OS/2 , Windows NT
Correct Answer
Direct communication Multiple Choice Multiple Answer
Your Answer Question
Indirect communication To protect the system, we must take security
measures at two levels, such as :-
Select The Blank Correct Answer
Question Physical level , Human level
In Linux, the allocator uses a ________ algorithm to Your Answer
keep track of available physical pages. Human level , Global level
Correct Answer
Buddy-heap Multiple Choice Single Answer
Your Answer Question
Binary-search If the process is waiting for some event to occur
then it is said to be in :-
Multiple Choice Single Answer Correct Answer
Question Waiting state
What does the rows of the access matrix Your Answer
represents? Waiting state
Correct Answer
Domains Multiple Choice Single Answer
Your Answer Question
Domains A common representation for a discussion of
process scheduling is a :-
Multiple Choice Single Answer Correct Answer
Question Queuing diagram
Every change in policy requires a change in the Your Answer
underlying :- Process state diagram
Correct Answer
Mechanism True/False
Your Answer Question
System At Physical level, the site or sites containing the
computer systems must be physically secured
Select The Blank against armed or surreptitious entry by intruders.
Question
Operating System | 43
Correct Answer
True Select The Blank
Your Answer Question
True Web servers use the ________ protocol to
communicate with web browsers.
Select The Blank Correct Answer
Question http
When you express user-system interaction, the Your Answer
scenario in the model is called ________ http
Correct Answer
Case model Multiple Choice Multiple Answer
Your Answer Question
Case model The security of a system can be improved by two
management techniques, such as :-
True/False Correct Answer
Question Threat monitoring , Audit Log
Data transfer from cache to CPU and registers is Your Answer
usually a software function, with little operating Audit Log , Threat finding
system intervention.
Correct Answer Select The Blank
False Question
Your Answer The concept of protection levels and call gates were
True pioneered in MULTICS, where they were viewed as
protection ________.
True/False Correct Answer
Question Ring
A file in NTFS is a simple byte stream as it is in MS- Your Answer
DOS or UNIX . Ring
Correct Answer
False True/False
Your Answer Question
False We say that a system is secure if its resources are
used and accessed as intended under all
Multiple Choice Single Answer circumstances.
Question Correct Answer
Polymorphism means ability to take True
Correct Answer Your Answer
More than one form True
Your Answer
More than one form Select The Blank
Question
True/False The ________ controller is the controller at the
Question computer end of the bus.
Aging algorithm is based on LRU. Correct Answer
Correct Answer Host
True Your Answer
Your Answer Cpu
True
Multiple Choice Multiple Answer
Select The Blank Question
Question In Linux, the paging system can be divided into
The virtual memory portion of the NT executive is sections, namely:-
the ________. Correct Answer
Correct Answer Policy algorithm , Paging mechanism
Virtual memory manager Your Answer
Your Answer Policy algorithm , Paging mechanism
Virtual memory manager
True/False
Multiple Choice Multiple Answer Question
Question Keyboard is a sharable device.
There are two types of Message passing, they are :- Correct Answer
Correct Answer True
Synchronous , Asynchronous Your Answer
Your Answer False
Synchronous , Asynchronous
Operating System | 44
True/False Question
Question Two main jobs of a computer are :-
Transfer of data from disk to memory is usually Correct Answer
controlled by the operating system. I/O , Processing
Correct Answer Your Answer
True I/O , Processing
Your Answer
True Multiple Choice Single Answer
Question
True/False The 4.3BSD operating system is the version of :-
Question Correct Answer
Prototyping not only helps to build a quality design UNIX
but also enables the designer to build the system Your Answer
decremantally. UNIX
Correct Answer
False Multiple Choice Single Answer
Your Answer Question
True The number of processes that are completed per
time unit is called as:-
Select The Blank Correct Answer
Question Throughput of system
The UNIX system uses ________ to avoid the Your Answer
necessity of keeping its password list secret. Throughput of system
Correct Answer
Encryption Multiple Choice Multiple Answer
Your Answer Question
Encryption Once the I/O is started , which two courses of action
are possible?
Match The Following Correct Answer
Question Synchronous I/O , Asynchronous I/O , Simple I/O
Correct Answer Your Answer
Your Answer Synchronous I/O , Asynchronous I/O
Read-write devices
Disks Multiple Choice Multiple Answer
Disks Question
Dedicated devices Security violations of the system can be categorized
Tape as :-
CD-ROM Correct Answer
Read-only devices Malicious , Accidental
CD-ROM Your Answer
Tape Malicious , Accidental
Write-only devices
Graphics controller Select The Blank
Keyboard Question
A process migrates between the various ________
Multiple Choice Single Answer throughout its lifetime.
Question Correct Answer
A procedure call, request to execute a method is Scheduling queues
termed as Your Answer
Correct Answer Scheduling queues
Message
Your Answer
Message Select The Blank
Question In the ________ model data
Select The Blank elements are organized in tree structure in
Question parent-child format.
Context switch times are highly dependent on
________ support.
Correct Answer Hierarchical
Correct Answer Your Answer Hierarchical
Hardware
Your Answer Multiple Choice Single Answer
Hardware Question A process in which a project is
Multiple Choice Multiple Answer broken down into smaller manageable
units is called as :-
Operating System | 45
Correct Answer Project Your Answer Defect
Compartmentalization
Your Answer Project Management Multiple Choice Single Answer
Question A model in which software
Multiple Choice Single Answer development cycle is sequential process is
Question A type of testing carried out :-
during the software product development Correct Answer Waterfall Model
process is:- Your Answer Waterfall Model
Correct Answer Execution Based testing
Your Answer Execution Based testing Select The Blank
Question The company should establish a
True/False ________ and maintain a documented
Question System testing Starts when quality system as a means of ensuring
Software Integration is about to be that it conforms to the specified
completed. requirements of ISO.
Correct Answer False Correct Answer Quality System Procedure
Your Answer True Your Answer Quality Control System

True/False True/False
Question A computer system without Question Errors in documentation give rise
system software can not function to fatal results.
Correct Answer True Correct Answer True
Your Answer True Your Answer False

Select The Blank Multiple Choice Multiple Answer


Question A ________ is largely depends Question The outcome of the Risk
upon the meeting of functional Resolution Process is :-
requirements and performance measures Correct Answer Acceptable Risk , Reduced
with ease in operations. Reworks , Corrective actions
Correct Answer Customer Satisfaction Your Answer Acceptable Risk , Reduced
Your Answer Customer Requirements Reworks , Corrective actions
Management
Multiple Choice Single Answer
Match The Following Question A type of testing which confirms
Question Correct Answer Your Answer the creation of behavioral properties for
the software product i.e. reliability ,
BSM Boehm Spiral Model Boehm Spiral performance etc is:-
Model Correct Answer Execution Based testing
Your Answer Execution Based testing
LSM Linear Sequential Model Linear
Sequential Model Multiple Choice Multiple Answer
Question Test cases are designed to
PRM Prototype Model Prototype Model tests:-
Correct Answer Internal Logic , Software
INM Incremental Model Incremental Model Requirements
Your Answer Software Performance , A
Quality aspect of a Program
Select The Blank
Question An Operational deviation made Multiple Choice Single Answer
by the user leading to improper result is Question A System is one that is self
said to be ________. contained and self reliant:-
Correct Answer Fault or Mistake of the Correct Answer Closed System
System Your Answer Deterministic
Operating System | 46
Correct Answer True
Multiple Choice Multiple Answer Your Answer False
Question The Contents which are recorded
by the Data Dictionary for an typical item Multiple Choice Multiple Answer
is:- Question SQA efforts most primarily
Correct Answer Definition , Identification , assures:-
Validation Text & Relationship Correct Answer Software Quality ,
Your Answer Table Name , Definition Software Reliability , Software Availability
Your Answer Software Quality , Software
Multiple Choice Single Answer Reliability , Software Maintenance
Question The Application of a systematic,
disciplined, quantifiable approach to the Multiple Choice Multiple Answer
development, operation and maintenance Question Risk Management is a Process
of the software is termed as Made up of following :-
Correct Answer Software Engineering Correct Answer Risk Identification , Risk
Your Answer Software Engineering Analysis , Risk Assessment
Your Answer Risk Identification , Risk
True/False Analysis , Risk Handling
Question E-R Diagrams are used to
identify the Weak and Strong Relations. True/False
Correct Answer True Question Documentation testing tests and
Your Answer False verifies whether the troubleshooting is
easily achieved or not.
Multiple Choice Multiple Answer Correct Answer True
Question White Box Testing Checks :- Your Answer True
Correct Answer All Logical decision are
executed with true or false , All Loops are Multiple Choice Multiple Answer
executed , All Paths in the process are Question The types of Software are
correctly operational Correct Answer Business Software ,
Your Answer All Paths in the process are Embedded Software , System Software
correctly operational , All Logical decision Your Answer Business Software ,
are executed with true or false , All Loops Embedded Software , System Software
are executed
Select The Blank
Select The Blank Question A ________ Measures the Quality
Question To become a registered, one of of the output produced by the System
the quality assurance system models Correct Answer Effectiveness
contained in ISO 9000 a company's quality Your Answer Effectiveness & Efficiency
system is scrutinized by ________.
Correct Answer Third Party Auditor Multiple Choice Single Answer
Your Answer Second Party Auditor Question The Paradigm Structured System
Analysis and Design was developed by:-
Select The Blank Correct Answer Yourdon & De Macro
Question Inventory Control System which Your Answer Yourdon & Boehm
is designed based on demand and supply
variations could be an example of ________ True/False
system Question The major resources in the
Correct Answer Probabilistic project is people and funds.
Your Answer Open Correct Answer False
Your Answer True
True/False
Question A software review is a filter for Multiple Choice Multiple Answer
the software development process. Question RMMM Plan deals with :-
Operating System | 47
Correct Answer Mitigation , Monitoring , Correct Answer Identification
Management Your Answer Identification
Your Answer Mitigation , Monitoring ,
Management Multiple Choice Single Answer
Question A degree to which the design
Multiple Choice Multiple Answer aspect of the Quality is met is termed as :-
Question The Scope of the Software
Project is defined by Statement of Work Correct Answer Quality Conformance
which is agreed by ? Your Answer Quality Assurance
Correct Answer Users , Stakeholders ,
Customers True/False
Your Answer Stakeholders , Programmers , Question A Software solution is evolved in
Customers parts as in an incremental fashion in
incremental model
Multiple Choice Multiple Answer Correct Answer True
Question The Customer Requirements Your Answer True
could be analysed by :-
Correct Answer Interviewing , True/False
Questionnaire , Meeting with Key Users Question The results of the test case is
Your Answer Interviewing , Questionnaire , recorded in the test specification
Case Study document.
Correct Answer True
True/False Your Answer True
Question Stress Testing is a part of
Integration testing. Match The Following
Correct Answer False Question Correct Answer Your Answer
Your Answer True
Spiral Model Boehm Spiral model Boehm
Multiple Choice Single Answer Spiral model
Question When the System requirements
are easy to establish and are stable, the Legacy software Poor Quality Poor Quality
development is customer specific, and
changes are not foreseen then the model Objects Attribute, Methods Attribute,
used is? Methods
Correct Answer Water Fall Model
Your Answer Water Fall Model SSAD yourdan & DeMarco Structured
Methodology
Select The Blank
Question SE Methodology rides on two
components, System Engineering and Select The Blank
________. Question The objective of a ________ is to
Correct Answer Development Engineering test for what we want to achieve and not
Your Answer Requirement analysis what is actually achieved.
Correct Answer Test Plan
Multiple Choice Single Answer Your Answer Test Document
Question A System which operates in a
unpredictable manner is :- Multiple Choice Multiple Answer
Correct Answer Probabilistic Question A good test is one that has:-
Your Answer Open System Correct Answer High Probability of
detecting an error , Not Redundant ,
Select The Blank Simple to execute & Independent
Question Requirements Management Your Answer High Probability of detecting
Begins with ________. an error , Not Redundant , Simple to
Operating System | 48
execute & Independent

Multiple Choice Single Answer


Question A set of Computer Programs
which performs set of preset functions is
called as ?
Correct Answer Software
Your Answer Software

Multiple Choice Single Answer


Question An outcome of Requirements
Management Stage is :-
Correct Answer Software Requirement
Specifications
Your Answer Software Requirement
Specifications

Select The Blank


Question ________ type of an error is class I
error and needs corrective measures to be
implemented immediately.
Correct Answer Fatal
Your Answer Cosmetic

Multiple Choice Multiple Answer


Question The stages of the Iterative
Models are
Correct Answer Requirement Analysis ,
System Design , Development Coding &
Unit Testing
Your Answer Requirement Analysis ,
System Design , Development Coding &
Unit Testing

A bit is associated with each memory block. This bit


is 0 if the word belongs to OS, and 1 if it belongs to
user process. Page 55

A logical address consists of two parts – segment


number S and offset into that segment d Page 69

Operating System | 49

Vous aimerez peut-être aussi