Sei sulla pagina 1di 16

LIST OF ATTEMPTED QUESTIONS AND ANSWERS

True/False
Question Prototyping is a tool to test the design of system

Correct Answer True

Your Answer False

Multiple Choice Multiple Answer


Question Kernel threads are generally :-

Correct Answer Slower to create , Difficult to manage

Your Answer Difficult to manage , Faster than user thread , Faster to create

Multiple Choice Single Answer


Question The concept of OOPS was first introduced in

Correct Answer Simula Language

Your Answer Simula Language

Multiple Choice Single Answer


Question The insulation of data from direct access by the program is
known as :
Correct Answer Data hiding

Your Answer Abstraction

True/False
Question Many to Many model multiplexes many user level threads to a
smaller or equal number of kernel threads.
Correct Answer True

Your Answer True

Select The Blank


Question Like worms, ________ are designed to spread into other
programs and can wreak havoc in a system.
Correct Answer Viruses

Your Answer Viruses

Multiple Choice Multiple Answer


Question The two versions of NT are :

Correct Answer WindowsNT workstations , WindowsNT server

Your Answer WindowsNT workstations , WindowsNT server

True/False
Question A virus is a fragment of code embedded in a legitimate program

Correct Answer True

Your Answer False

True/False
Question An I/O bound process spend more of its time doing I/O than it
spends doing computations.
Correct Answer True

Your Answer True

Multiple Choice Single Answer


Question It has been said that Pascal and C programs are collections of
procedures and C++ programs are collections of
Correct Answer Classes

Your Answer Classes

Multiple Choice Single Answer


Question The process by which objects of one class acquire properties of
objects of other class is called
Correct Answer Inheritance

Your Answer Inheritance

Select The Blank


Question A ________ is a buffer that holds output for a device such as
printers.
Correct Answer Spool

Your Answer Spool

Multiple Choice Single Answer


Question C++ is basically a procedural language having extension of

Correct Answer Object Oriented technology

Your Answer Object Oriented technology


True/False
Question Object-oriented programming focuses on the integrated data and
functionality as discrete units that have both knowledge (data)
and capabilities (functions). Procedural programs, on the other
hand, focus on functions and how they act on data.
Correct Answer True

Your Answer True

Multiple Choice Multiple Answer


Question Most CPUs have two interrupt request lines. Which are they?

Correct Answer Maskable , Non maskable

Your Answer Maskable , Non maskable

True/False
Question The I/O scheduler rearranges the order of the queue to improve
the overall system efficiency and the average response time
experienced by application
Correct Answer True

Your Answer True

Multiple Choice Single Answer


Question How big is a class object?

Correct Answer Is as big as sum of the sizes of its member variables

Your Answer Is as big as sum of the sizes of its member variables

Multiple Choice Single Answer


Question In UNIX, files are organized in tree-structured :-

Correct Answer Directories

Your Answer Directories

Multiple Choice Single Answer


Question The number of processes that are completed per time unit is
called as:-
Correct Answer Throughput of system

Your Answer Throughput of system

Multiple Choice Multiple Answer


Question There are two types of Message passing, they are :-

Correct Answer Synchronous , Asynchronous

Your Answer Synchronous , Asynchronous

Multiple Choice Single Answer


Question If Dog derives from Mammal, and Mammal derives from Animal,
then -
Correct Answer Dog inherits Animal's functions and data

Your Answer Dog inherits Animal's functions and data

Select The Blank


Question The positioning time sometimes called the ________.

Correct Answer Random-access time

Your Answer Seek time

Multiple Choice Single Answer


Question Collection of similar datatypes is called as

Correct Answer Array

Your Answer Array

Multiple Choice Single Answer


Question The pure Object Oriented language is

Correct Answer Java

Your Answer Java

Multiple Choice Multiple Answer


Question To protect the system, we must take security measures at two
levels, such as :-
Correct Answer Physical level , Human level

Your Answer Local level , Global level

Select The Blank


Question In some operating system, spooling is handled by an ________ .

Correct Answer In-kernel thread

Your Answer User thread


Multiple Choice Multiple Answer
Question Supervisor mode is also known as :-

Correct Answer System mode , Privileged mode , Monitor mode

Your Answer Privileged mode , Monitor mode , Special mode

Match The Following


Question Correct Answer Your Answer

Thread Light-weight process Light-weight process

Process PCB Thread library

User thread Thread library PCB

Kernel thread Operating system Operating system

Select The Blank


Question The ________ of a process is represented in the PCB of a
process.
Correct Answer Context

Your Answer Control

Select The Blank


Question ________ is defined as a cooperation between object codes
produced by different software vendors & written in different
programming languages.
Correct Answer Interoperability

Your Answer Interoperability

Multiple Choice Multiple Answer


Question In a uniprocessor system, there is :-

Correct Answer Single processor , Single running process

Your Answer Single processor , Single running process

Multiple Choice Single Answer


Question In UNIX operating system, each process is identified by its :-

Correct Answer Process identifier


Your Answer Process identifier

Multiple Choice Single Answer


Question As process enter the system, they are put into :-

Correct Answer Job queue

Your Answer Job queue

Match The Following


Question Correct Answer Your Answer

Algorithm where in it takes Worst fit Worst fit


largest available hole
The algorithm in which First fit First fit
memory manager scans
along the list of segments
until it finds a hole that is
big enough
Algorithm in which keeps Next fit Optimal fit
the track of suitable hole
Algorithm which searches Best fit Best fit
entire list and takes
smallest hole that is
adequate

True/False
Question Linux is a multi-user, multitasking system with a full set of UNIX-
compatible tools.
Correct Answer True

Your Answer True

Multiple Choice Single Answer


Question The main difference between structure and class is

Correct Answer Structure does not support OOPS Class Supports OOPS.

Your Answer Structure does not support OOPS Class Supports OOPS.

Multiple Choice Multiple Answer


Question Find out the basic I/O hardware elements from the following :-

Correct Answer Ports , Buses , Device controllers

Your Answer Ports , Buses , Device controllers


Multiple Choice Single Answer
Question The interval from the time of submission of a process to the time
of completion is :-
Correct Answer Turnaround time

Your Answer Completion time

True/False
Question In Public Key Encryption, each user has both a public and a
private key.
Correct Answer True

Your Answer False

Multiple Choice Single Answer


Question If the process is waiting to be assigned to CPU then it is said to
be in :-
Correct Answer Ready state

Your Answer Waiting state

Select The Blank


Question A ________ controller is built into each disk drive.

Correct Answer Disk

Your Answer Disk

Multiple Choice Multiple Answer


Question Linux presents standard interfaces to whom?

Correct Answer Programmer , User

Your Answer Programmer , User , System administrator

True/False
Question As an object-oriented systems NT uses objects for all its
services and entities.
Correct Answer True

Your Answer True

Multiple Choice Single Answer


Question A procedure body implementing an operation is termed as
Correct Answer Method

Your Answer Method

True/False
Question Main Memory is a volatile storage device that loses its contents
when power is turned off.
Correct Answer True

Your Answer True

Multiple Choice Multiple Answer


Question Once the I/O is started , which two courses of action are
possible?
Correct Answer Synchronous I/O , Asynchronous I/O , Simple I/O

Your Answer Waiting I/O , Simple I/O

Select The Blank


Question ________ passwords prevent improper authentication due to
password exposure.
Correct Answer One-time

Your Answer Encrypted


LIST OF ATTEMPTED QUESTIONS AND ANSWERS

True/False
Question An asynchronous call returns immediately, without waiting for the
I/O to complete.
Correct Answer True

Your Answer True

True/False
Question Data transfer from cache to CPU and registers is usually a
software function, with little operating system intervention.
Correct Answer False

Your Answer False

Select The Blank


Question The concept of protection levels and call gates were pioneered
in MULTICS, where they were viewed as protection ________.
Correct Answer Ring

Your Answer Ring

Multiple Choice Single Answer


Question A domain is a collection of :-

Correct Answer Access rights

Your Answer Protection policies

Match The Following


Question Correct Answer Your Answer

Volatile Memory Primary memory RAM

CPU registers Volatile storage Primary memory

Magnetic disks Non volatile storage Non volatile storage

Floppy disk Secondary storage Secondary storage

Multiple Choice Single Answer


Question Each object has a unique :-

Correct Answer Name


Your Answer Name

True/False
Question Once class is defined we can create limited number of objects
belonging to that class.
Correct Answer False

Your Answer False

Multiple Choice Multiple Answer


Question A mailbox can be owned by :-

Correct Answer Process , Operating system

Your Answer User , Process

Multiple Choice Single Answer


Question C++ is basically a procedural language having extension of

Correct Answer Object Oriented technology

Your Answer Object Oriented technology

True/False
Question In Lock-key mechanism, users are allowed to examine or modify
the list of keys or locks directly.
Correct Answer False

Your Answer False

Multiple Choice Multiple Answer


Question Most CPUs have two interrupt request lines. Which are they?

Correct Answer Maskable , Non maskable

Your Answer Maskable , Non maskable

Match The Following


Question Correct Answer Your Answer

We can define abstract Data abstraction Data abstraction


operation on abstract data
Process of sharing Inheritance Inheritance
properties of the higher
level object or class
Ability to inherit attributes Multiple inheritance Multiple inheritance
and methods from 2 or
more objects or classes
Ability to send a message Ploymorphism Ploymorphism
to several objects and to
allow receiving object to
respond method specified
on the object.

Select The Blank


Question The ________ is a layer of software that hides hardware
differences from upper levels of the operating system.
Correct Answer Hardware abstraction layer

Your Answer Hardware abstraction layer

Multiple Choice Single Answer


Question The ready queue is generally stored as a :-

Correct Answer Linked list

Your Answer Queue

Multiple Choice Single Answer


Question How big is a class object?

Correct Answer Is as big as sum of the sizes of its member variables

Your Answer Is as big as sum of the sizes of its member variables

True/False
Question In FIFO algorithm the page removed from memory is the one
which most recently used.
Correct Answer False

Your Answer False

True/False
Question I/O system calls are costly in terms of CPU consumptions.

Correct Answer True

Your Answer True

Multiple Choice Single Answer


Question Policies for resource use may be subject to change over :-

Correct Answer Time


Your Answer Time

True/False
Question A functionality prototype can be designed that does not have the
final user interface, but allows users to try out various features,
such as forwarding messages or attaching files without worrying
about the final interface.
Correct Answer True

Your Answer True

Multiple Choice Single Answer


Question The main difference between structure and class is

Correct Answer Structure does not support OOPS Class Supports OOPS.

Your Answer Structure does not support OOPS Class Supports OOPS.

Multiple Choice Single Answer


Question The First version of UNIX was developed in 1969 by Ken
Thompson of the Research Group at :-
Correct Answer Bell Laboratories

Your Answer Bell Laboratories

Multiple Choice Single Answer


Question Collection of similar datatypes is called as

Correct Answer Array

Your Answer Array

Multiple Choice Single Answer


Question The pure Object Oriented language is

Correct Answer Java

Your Answer Java

Multiple Choice Single Answer


Question The concept of OOPS was first introduced in

Correct Answer Simula Language

Your Answer Simula Language


Multiple Choice Single Answer
Question The class bird should have object

Correct Answer Egale

Your Answer Egale

Select The Blank


Question ________ of an object remains unchanged even though its state
and properties change.
Correct Answer Identity

Your Answer Location

Multiple Choice Multiple Answer


Question The Linux system is composed of three main bodies of code, in
line with most traditional UNIX implementations. Which are :-
Correct Answer Kernel , System libraries , System utilities

Your Answer Kernel , System libraries , System utilities

Multiple Choice Multiple Answer


Question An audit log records which things about an object ?

Correct Answer Time , User , Type of access

Your Answer User , Type of access , Operation

Select The Blank


Question The virtual memory portion of the NT executive is the ________.

Correct Answer Virtual memory manager

Your Answer Page-memory manager

Multiple Choice Single Answer


Question A system consists of collection of :-

Correct Answer Processes

Your Answer Procedures

Multiple Choice Multiple Answer


Question Linux presents standard interfaces to whom?

Correct Answer Programmer , User


Your Answer Programmer , User

Multiple Choice Multiple Answer


Question Most computers have hardware clocks and timers that provide
three basic functions, such as :-
Correct Answer Give the current time , Give the elapsed time , Set a timer to
trigger operation at certain time
Your Answer Give the current time , Give the elapsed time , Set a timer to
trigger operation at certain time

Select The Blank


Question The UNIX system uses ________ to avoid the necessity of
keeping its password list secret.
Correct Answer Encryption

Your Answer Encryption

Multiple Choice Single Answer


Question A solution to the problem of indefinite blockage of low-priority
processes in Priority scheduling is :-
Correct Answer Aging

Your Answer Starvation

Multiple Choice Multiple Answer


Question In a uniprocessor system, there is :-

Correct Answer Single processor , Single running process

Your Answer Single processor , Single running process

Multiple Choice Single Answer


Question The process by which objects of one class acquire properties of
objects of other class is called
Correct Answer Inheritance

Your Answer Inheritance

Select The Blank


Question A segment shorter than ________ M will have a page directory
with single entry, a pointer to its one and only page table.
Correct Answer 4

Your Answer 8

Multiple Choice Single Answer


Question If Dog derives from Mammal, and Mammal derives from Animal,
then -
Correct Answer Dog inherits Animal's functions and data

Your Answer Dog inherits Animal's functions and data

Multiple Choice Multiple Answer


Question Passwords can be generated by :-

Correct Answer System , User

Your Answer System , User , Password software

Multiple Choice Multiple Answer


Question kernel threads are supported by following operating systems :-

Correct Answer Windows NT , Solaris , Digital UNIX

Your Answer Windows NT , Solaris , Digital UNIX

Select The Blank


Question The hardware to measure elapsed time to trigger operations is
called a ________.
Correct Answer Programmable interval timer

Your Answer Hardware timer

Multiple Choice Multiple Answer


Question In Windows NT , kernel uses which two sets of objects?

Correct Answer Dispatcher objects , Control objects

Your Answer Dispatcher objects , Control objects

True/False
Question Firewall monitors and logs all connections.

Correct Answer True

Your Answer True

Select The Blank


Question During execution, ________ register holds the sector for the
code segment.
Correct Answer CS

Your Answer CS
Select The Blank
Question The creating process is called a ________ process.

Correct Answer Parent

Your Answer Parent

True/False
Question Objects can not interact unless they know the details of each
others data or code.
Correct Answer False

Your Answer False

Select The Blank


Question Web servers use the ________ protocol to communicate with
web browsers.
Correct Answer http

Your Answer http

Potrebbero piacerti anche