Sei sulla pagina 1di 4

1. A table used to keep track of information about machine independent pages.

a. address map b. memory object c. pmap d.resident page table

2. This is the name given to the MDM service provided by OS X Server.


a. Profile Manager b. NetInstall c. WebDAV d. Caching service

3. _________ was the first commercial computer with Graphical User Interface (GUI) and
mouse
a. UNIX OS b. LINUX OS c. MACOS d. WINDOWS

4. It is often used as a platform for installing or re-imaging Mac computers en masse.


a. NetInstall b. Subnets c. WebDAV d. Caching service

5. Refers to a priority variable of 0.


a. “Mzero” b. “Pzero” c. “Ozero” d. “Ezero“

6. Four basic memory management data structures are used in Mach except one.
a. memory object b. address map c. resident page table d. kmap

7. Allows execution of privileged instructions and access to privileged registers.


a. Supervisor Mode b. User Mode c. Threads d. IP address

8. It is often used to define the Bonjour local host name, which again is resolvable only on
the server’s local subnet.
a. Subnets b. Computer name c. Port d. Thread

9. A machine dependent memory mapping data structure (i.e., a hardware defined physical
address map).
a. imap b. emap c. gmap d. pmap

10. ________are scheduled to run preemptively or, with symmetric multiprocessing,


concurrently.
a. command prompt b. threads c. network ports d. IP address
11. It is greatly reduces Internet bandwidth used for the installation of Apple-sourced
software and media.
a. NetInstall b. Profile Manager c. Caching service d. WebDAV

12. The following are the basic Mach abstractions except one.
a. task b. port c. message d. mode

13. The processor mode that forbids execution of privileged instructions and access to
privileged registers.
a. user mode b. supervisor mode c. process mode d. access mode

14. It switches processes from main memory to secondary storage.


a. Swapper (PID = 0) b. Init (PID = 1) c. PageDaemon (PID = 2)

15. It is spawns processes for remote terminals.

a. Swapper (PID = 0) b. Init (PID = 1) c. PageDaemon (PID = 2)

16. It converts addresses to support the virtual memory subsystem.

a. Swapper (PID = 0) b. Init (PID = 1) c. PageDaemon (PID = 2)

17. When was the Mac OS X 10.4 released?

a. August 24, 2002 b. April 29, 2005 c. July 20,2011 d. July 25, 2012

18. This version of Mac OS X has the codename of “Snow Leopard”. What is it?

a. Mac OS X 10.0 b. Mac OS X 10.3 c. Mac OS X 10.6 d. Mac OS X 10.10

19. _________________ is the fourth major release of Mac OS X, Apple’s desktop and
server operating system.

a. Mac OS X Phanter b. Mac OS X Leopard c. OS X Yosemite d. Mac OS X Tiger


20. Mac OS X version 10.0 codenamed Cheetah was released on_________________.

a. March 24, 2001 b. March 04,2001 c. March 14,2001 d. May 24, 2001

21. It is the upcoming eleventh major release of OS X, Apple Inc.’s desktop and server
operating system for Macintosh computers.

a. Mac OS X 10.1 b. Mac OS X 10.5 c. Mac OS X 10.8 d. OS X Yosemite

22. It was successor of the Mac OS 9’s, as well as all previous Apple operating systems.

a. Mac OS X v 10.3 b. Mac OS X v 10.0 c. Mac OS X v 10.9 d. Mac OS X v 10.5

23. These version of Mac OS X 10.1 has the codename of _______________.

a. Jaguar b. Mountain Lion c. Mavericks d. Puma

24. It is the fifth major release of Mac OS X, Apple’s desktop and server operating system for
Macintosh computers.

a. Mac OS X Cheetah b. Mac OS X Lion c. Mac OS X Tiger d. Mac OS X Puma

25. These versions of Mac OS were launched in October 22, 2013.

a. Mac OS X 10.7 b. Mac OS X 10.8 c. Mac OS X 10.9 d. Mac OS X 10.10

26. Fragments of computer code that can piggyback on the normal programs.

a. Virus b. Trojan c. Worm d. Spam

27. A computer program that has the ability to copy itself from machine to machine by
taking advantage of the security hole in the system.

a. Virus b. Trojan c. Worm d. Spam

28. Is simply a computer program. The program claims to do one thing (it may claim to be a
game) but instead does damage when you run it may erase your hard disk.
a. Virus b. Trojan horse c. Worm d. Spam

29. Bugs in the OS.

a. Virus b. Trojan horse c. Security Holes d. Spam

30. This is the most serious threat now

a. Worm b. Virus c. Spam d. Trojan

Potrebbero piacerti anche