+ All Categories
Home > Documents > Computer Science Objective

Computer Science Objective

Date post: 12-Nov-2014
Category:
Upload: rajanindia
View: 747 times
Download: 4 times
Share this document with a friend
33
http://scdlpapers.blogspot.com/search/label/Database%20Management %20System LIST OF ATTEMPTED QUESTIONS AND ANSWERS Firewall monitors and logs all connections. Correct Answer True Question Which of the following Operating System has no memory protection ? Correct Answer Windows 3.1 Question The main difference between structure and class is Correct Answer Structure does not support OOPS Class Supports OOPS. Question DMA stands for :- Correct Answer Direct Memory Access Question A major problem with the Priority scheduling algorithm is :- Correct Answer Starvation Question How big is a class object? Correct Answer Is as big as sum of the sizes of its member variables
Transcript
Page 1: Computer Science Objective

http://scdlpapers.blogspot.com/search/label/Database%20Management%20System

LIST OF ATTEMPTED QUESTIONS AND ANSWERS

Firewall monitors and logs all connections.Correct Answer True

Question Which of the following Operating System has no memory protection ?Correct Answer Windows 3.1

Question The main difference between structure and class isCorrect Answer Structure does not support OOPS Class Supports OOPS.

Question DMA stands for :-Correct Answer Direct Memory Access

Question A major problem with the Priority scheduling algorithm is :-Correct Answer Starvation

Question How big is a class object?Correct Answer Is as big as sum of the sizes of its member variables

Question The First version of UNIX was developed in 1969 by Ken Thompson of the Research Group at :-Correct Answer Bell Laboratories

Page 2: Computer Science Objective

Multiple Choice Single AnswerQuestion When computer is powered up or rebooted, it needs to have an initial program to run. This initial program is known as :-Correct Answer Bootstrap program

Processes represents the executions of single programs whereas threads represent separate, concurrent execution contexts within a single process running a single program.Correct Answer True

Multiple Choice Single AnswerQuestion If Dog derives from Mammal, and Mammal derives from Animal, then -Correct Answer Dog inherits Animal's functions and data

Multiple Choice Single AnswerQuestion The wraping up of data and methods in a single unit (class) is known as :Correct Answer Encapsulation

True/FalseQuestion LRU algorithm can not be implemented without special hardware.Correct Answer True

Question The Solaris developers reimplemented the ________ using in-kernel thread to eliminate the context switch involved in moving each character between daemons and the kernel.Correct Answer Telnet daemon

Multiple Choice Single AnswerQuestion All user processes are descendents of one original process, Which is that process?Correct Answer Init process

Page 3: Computer Science Objective

Select The BlankQuestion Terminals and line printers are ________ .Correct Answer Character devices

Multiple Choice Multiple AnswerQuestion Many-to-may model is supported by following operating systems :-Correct Answer Solaris , IRIX , Digital UNIXYour Answer Solaris , IRIX , Digital UNIX

Multiple Choice Multiple AnswerQuestion find out the services provided by kernel related to I/O :Correct Answer I/O Scheduling , Buffering , SpoolingYour Answer I/O Scheduling , Buffering , Spooling

Multiple Choice Single AnswerQuestion The long-term scheduler controls the :-Correct Answer Degree of multiprogrammingYour Answer Degree of multiprogramming

Select The BlankQuestion The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________.Correct Answer RingYour Answer Ring

Multiple Choice Multiple AnswerQuestion In Linux, the main objects defined by the virtual file system are :-Correct Answer Inode-object , File-object , File-system objectYour Answer Inode-object , File-object , File-system object

Page 4: Computer Science Objective

Multiple Choice Single AnswerQuestion Collection of similar datatypes is called asCorrect Answer ArrayYour Answer Array

Multiple Choice Multiple AnswerQuestion We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes?Correct Answer User mode , Monitor modeYour Answer User mode , Monitor mode

Match The FollowingQuestionCorrect AnswerYour AnswerClass ShapeTriangle, rectangle, circle, ellipseTriangle, rectangle, circle, ellipseClass VehicleScooter, car, truck, tractorScooter, car, truck, tractorClass AnimalCat, dog, cow, tigerCat, dog, cow, tigerClass ColorRed, yellow, blue, greenRed, yellow, blue, green

Select The BlankQuestion The virtual memory portion of the NT executive is the ________.Correct Answer Virtual memory managerYour Answer Virtual memory manager

True/FalseQuestion

Page 5: Computer Science Objective

An asynchronous call returns immediately, without waiting for the I/O to complete.Correct Answer TrueYour Answer True

True/FalseQuestion Modem is a random-access device.Correct Answer FalseYour Answer False

Multiple Choice Multiple AnswerQuestion A mailbox can be owned by :-Correct Answer Process , Operating systemYour Answer Process , Operating system

Multiple Choice Multiple AnswerQuestion The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :-Correct Answer Explicit , ImplicitYour Answer Explicit , Implicit

Select The BlankQuestion In windows NT, the ________ facility is used to pass requests and results between client and server processes within a single machine.Correct Answer Local-procedure-callYour Answer Remote-procedure-call

True/FalseQuestion A major security problem for operating system is authentication.Correct Answer

Page 6: Computer Science Objective

TrueYour Answer True

True/FalseQuestion In a blocking system call, the application is moved from the OS's run queue to a wait queue.Correct Answer TrueYour Answer True

True/FalseQuestion Device speeds range from a few bytes per second to a few gigabytes per second.Correct Answer TrueYour Answer True

Multiple Choice Multiple AnswerQuestion Various storage systems available possesses which two characteristics?Correct Answer Volatile , Non-volatileYour Answer Volatile , Non-volatile

Match The FollowingQuestionCorrect AnswerYour AnswerWe can define abstract operation on abstract dataData abstractionData abstractionProcess of sharing properties of the higher level object or classInheritanceInheritanceAbility to inherit attributes and methods from 2 or more objects or classesMultiple inheritanceMultiple inheritanceAbility to send a message to several objects and to allow receiving object to respond method specified on the object.Ploymorphism

Page 7: Computer Science Objective

Ploymorphism

Multiple Choice Single AnswerQuestion As process enter the system, they are put into :-Correct Answer Job queueYour Answer Job queue

Multiple Choice Multiple AnswerQuestion The role of the operating system in computer I/O is to :-Correct Answer Manage I/O operation and devices , Control I/O operation and devicesYour Answer Manage I/O operation and devices , Control I/O operation and devices

Select The BlankQuestion The ________ is a layer of software that hides hardware differences from upper levels of the operating system.Correct Answer Hardware abstraction layerYour Answer Hardware abstraction layer

Select The BlankQuestion A ________ is a computer or router that sits between the trusted and untrusted systems.Correct Answer FirewallYour Answer Firewall

Multiple Choice Multiple AnswerQuestion The Moriss Internet Worm was made up of which of the two programs?Correct Answer Grappling hook program , Main programYour Answer Grappling hook program , Main program

Multiple Choice Multiple AnswerQuestion

Page 8: Computer Science Objective

In UNIX, a device is distinguished by two things, which are :-Correct Answer Device-class , Device numberYour Answer Device-class , Device number

Multiple Choice Single AnswerQuestion In general , the access matrix will be :-Correct Answer SparseYour Answer Sparse

True/FalseQuestion Applications normally access block devices through a file system interface.Correct Answer TrueYour Answer True

Multiple Choice Multiple AnswerQuestion User thread libraries include :-Correct Answer POSIX Pthreads , Mach C-threads , Solaris threadsYour Answer POSIX Pthreads , Mach C-threads , Solaris threads

Select The BlankQuestion The positioning time sometimes called the ________.Correct Answer Random-access timeYour Answer Random-access time

Multiple Choice Single AnswerQuestion The concept of OOPS was first introduced inCorrect Answer Simula LanguageYour Answer Simula Language

Page 9: Computer Science Objective

Select The BlankQuestion ________ passwords prevent improper authentication due to password exposure.Correct Answer One-timeYour Answer One-time

Multiple Choice Single AnswerQuestion The linking of procedure call to the code to be executed in response to that call is referred asCorrect Answer BindingYour Answer Binding

at 6:47 AM 0 comments Links to this post  

Labels: Operating System

Operating System - 2

LIST OF ATTEMPTED QUESTIONS AND ANSWERS

Multiple Choice Multiple AnswerQuestion locate the transmission devices :-Correct Answer Network cards , ModemsYour Answer Tapes , Network cards , Modems

True/FalseQuestion The user process issues a network I/O system call to send the character to the remote machine.Correct Answer TrueYour Answer True

Multiple Choice Single AnswerQuestion The process by which objects of one class acquire properties of objects of

Page 10: Computer Science Objective

other class is calledCorrect Answer InheritanceYour Answer Inheritance

True/FalseQuestion Windows NT uses a message passing implementation for I/O.Correct Answer TrueYour Answer True

Multiple Choice Multiple AnswerQuestion We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes?Correct Answer User mode , Monitor modeYour Answer User mode , Monitor mode

Match The FollowingQuestionCorrect AnswerYour AnswerRound-robinTime quantumTime quantumFirst-come First-servedFirst come jobFirst come jobShortest jobShortest jobShortest jobPriorityHighest priority jobHighest priority job

Multiple Choice Single AnswerQuestion The segment is :-Correct Answer Logical entity

Page 11: Computer Science Objective

Your Answer Logical entity

Multiple Choice Single AnswerQuestion In UNIX, decisions regarding which process to swap in or out are made by whom?Correct Answer SwapperYour Answer Memory handler

Select The BlankQuestion A ________ is a client-server mechanism that enables an application on one machine to make a procedure call to code on another machine.Correct Answer Remote-procedure-callYour Answer Remote-procedure-call

Multiple Choice Single AnswerQuestion When each process that wants to communicate must explicitly name the recipient or sender of the communication, then such communication is called as :-Correct Answer Direct communicationYour Answer Indirect communication

Select The BlankQuestion In Linux, the allocator uses a ________ algorithm to keep track of available physical pages.Correct Answer Buddy-heapYour Answer Binary-search

Multiple Choice Single AnswerQuestion What does the rows of the access matrix represents?Correct Answer DomainsYour Answer

Page 12: Computer Science Objective

Domains

Multiple Choice Single AnswerQuestion Every change in policy requires a change in the underlying :-Correct Answer MechanismYour Answer System

Select The BlankQuestion A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote.Correct Answer RedirectorYour Answer Domain

Multiple Choice Multiple AnswerQuestion In Solaris 2, user-level threads may be:-Correct Answer Bound , UnboundYour Answer Bound , Unbound

Multiple Choice Multiple AnswerQuestion An audit log records which things about an object ?Correct Answer Time , User , Type of accessYour Answer Time , User , Type of access

Multiple Choice Multiple AnswerQuestion One-to-one model is supported by following systems :-Correct Answer Windows NT , OS/2Your Answer OS/2 , Windows NT

Multiple Choice Multiple AnswerQuestion To protect the system, we must take security measures at two levels, such

Page 13: Computer Science Objective

as :-Correct Answer Physical level , Human levelYour Answer Human level , Global level

Multiple Choice Single AnswerQuestion If the process is waiting for some event to occur then it is said to be in :-Correct Answer Waiting stateYour Answer Waiting state

Multiple Choice Single AnswerQuestion A common representation for a discussion of process scheduling is a :-Correct Answer Queuing diagramYour Answer Process state diagram

True/FalseQuestion At Physical level, the site or sites containing the computer systems must be physically secured against armed or surreptitious entry by intruders.Correct Answer TrueYour Answer True

Select The BlankQuestion When you express user-system interaction, the scenario in the model is called ________Correct Answer Case modelYour Answer Case model

True/FalseQuestion Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention.Correct Answer False

Page 14: Computer Science Objective

Your Answer True

True/FalseQuestion A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .Correct Answer FalseYour Answer False

Multiple Choice Single AnswerQuestion Polymorphism means ability to takeCorrect Answer More than one formYour Answer More than one form

True/FalseQuestion Aging algorithm is based on LRU.Correct Answer TrueYour Answer True

Select The BlankQuestion The virtual memory portion of the NT executive is the ________.Correct Answer Virtual memory managerYour Answer Virtual memory manager

Multiple Choice Multiple AnswerQuestion There are two types of Message passing, they are :-Correct Answer Synchronous , AsynchronousYour Answer Synchronous , Asynchronous

Select The BlankQuestion Web servers use the ________ protocol to communicate with web browsers.

Page 15: Computer Science Objective

Correct Answer httpYour Answer http

Multiple Choice Multiple AnswerQuestion The security of a system can be improved by two management techniques, such as :-Correct Answer Threat monitoring , Audit LogYour Answer Audit Log , Threat finding

Select The BlankQuestion The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________.Correct Answer RingYour Answer Ring

True/FalseQuestion We say that a system is secure if its resources are used and accessed as intended under all circumstances.Correct Answer TrueYour Answer True

Select The BlankQuestion The ________ controller is the controller at the computer end of the bus.Correct Answer HostYour Answer Cpu

Multiple Choice Multiple AnswerQuestion In Linux, the paging system can be divided into sections, namely:-Correct Answer Policy algorithm , Paging mechanismYour Answer

Page 16: Computer Science Objective

Policy algorithm , Paging mechanism

True/FalseQuestion Keyboard is a sharable device.Correct Answer TrueYour Answer False

True/FalseQuestion Transfer of data from disk to memory is usually controlled by the operating system.Correct Answer TrueYour Answer True

True/FalseQuestion Prototyping not only helps to build a quality design but also enables the designer to build the system decremantally.Correct Answer FalseYour Answer True

Select The BlankQuestion The UNIX system uses ________ to avoid the necessity of keeping its password list secret.Correct Answer EncryptionYour Answer Encryption

Match The FollowingQuestionCorrect AnswerYour AnswerRead-write devicesDisksDisksDedicated devicesTape

Page 17: Computer Science Objective

CD-ROMRead-only devicesCD-ROMTapeWrite-only devicesGraphics controllerKeyboard

Multiple Choice Single AnswerQuestion A procedure call, request to execute a method is termed asCorrect Answer MessageYour Answer Message

Select The BlankQuestion Context switch times are highly dependent on ________ support.Correct Answer HardwareYour Answer Hardware

Multiple Choice Multiple AnswerQuestion Two main jobs of a computer are :-Correct Answer I/O , ProcessingYour Answer I/O , Processing

Multiple Choice Single AnswerQuestion The 4.3BSD operating system is the version of :-Correct Answer UNIXYour Answer UNIX

Multiple Choice Single AnswerQuestion The number of processes that are completed per time unit is called as:-Correct Answer Throughput of systemYour Answer

Page 18: Computer Science Objective

Throughput of system

Multiple Choice Multiple AnswerQuestion Once the I/O is started , which two courses of action are possible?Correct Answer Synchronous I/O , Asynchronous I/O , Simple I/OYour Answer Synchronous I/O , Asynchronous I/O

Multiple Choice Multiple AnswerQuestion Security violations of the system can be categorized as :-Correct Answer Malicious , AccidentalYour Answer Malicious , Accidental

Select The BlankQuestion A process migrates between the various ________ throughout its lifetime.Correct Answer Scheduling queuesYour Answer Scheduling queues

at 6:46 AM 0 comments Links to this post  

Labels: Operating System

Operating System - 1

LIST OF ATTEMPTED QUESTIONS AND ANSWERS

Multiple Choice Multiple AnswerQuestion Various storage systems available possesses which two characteristics?Correct Answer Volatile , Non-volatileYour Answer Volatile , Non-volatile

Multiple Choice Multiple AnswerQuestion Most CPUs have two interrupt request lines. Which are they?

Page 19: Computer Science Objective

Correct Answer Maskable , Non maskableYour Answer Maskable , Non maskable

Select The BlankQuestion A ________ is a group of NT server machines that share a common security policy and user databases.Correct Answer DomainYour Answer Domain

Select The BlankQuestion An ________ is a dedicated, special purpose CPU found in mainframes and in other high-end systems.Correct Answer I/O channelYour Answer I/O channel

Multiple Choice Single AnswerQuestion The CPU is allocated to the selected process by the :-Correct Answer DispatcherYour Answer Dispatcher

Multiple Choice Single AnswerQuestion In JAVA , the derived class is known asCorrect Answer SubclassYour Answer Subclass

Select The BlankQuestion The Pentium supports four protection levels with ________ as least privileged level.Correct Answer 3Your Answer

Page 20: Computer Science Objective

3

Select The BlankQuestion ________ of an object remains unchanged even though its state and properties change.Correct Answer IdentityYour Answer Identity

True/FalseQuestion One way to achieve portability is to write software in standard version of high level language and to develop portable system and application software .Correct Answer TrueYour Answer True

Multiple Choice Single AnswerQuestion Software may trigger an interrupt by executing a special operation called :-Correct Answer System callYour Answer System call

Multiple Choice Single AnswerQuestion In Object Oriented technology following expression is appropriateCorrect Answer object=data+menthodsYour Answer object=data+menthods

Multiple Choice Multiple AnswerQuestion The two versions of NT are :Correct Answer WindowsNT workstations , WindowsNT serverYour Answer WindowsNT workstations , WindowsNT server

Match The Following

Page 21: Computer Science Objective

QuestionCorrect AnswerYour AnswerWe can define abstract operation on abstract dataData abstractionData abstractionProcess of sharing properties of the higher level object or classInheritanceInheritanceAbility to inherit attributes and methods from 2 or more objects or classesMultiple inheritanceMultiple inheritanceAbility to send a message to several objects and to allow receiving object to respond method specified on the object.PloymorphismPloymorphism

Select The BlankQuestion A________ is a memory area that stores data while they are transferred between two devices or between a device and an application.Correct Answer BufferYour Answer Buffer

True/FalseQuestion In Public Key Encryption, each user has both a public and a private key.Correct Answer TrueYour Answer True

True/FalseQuestion Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention.Correct Answer FalseYour Answer False

Multiple Choice Multiple AnswerQuestion Liner address is divided into fields like :-

Page 22: Computer Science Objective

Correct Answer Dir , Page , OffsetYour Answer Dir , Page , Offset

Multiple Choice Single AnswerQuestion IPC is particularly useful in a :-Correct Answer Distributed environmentYour Answer Internet environment

Multiple Choice Single AnswerQuestion IPC provides a mechanism to allow processes to communicate and to synchronize their actions without sharing the same :-Correct Answer Address spaceYour Answer Semaphore

Multiple Choice Multiple AnswerQuestion Supervisor mode is also known as :-Correct Answer Privileged mode , Monitor mode , System modeYour Answer System mode , Privileged mode , Monitor mode

Select The BlankQuestion Assuming that the segment is in memory and the offset is in range, the Pentium then adds the ________ bit base field in the descriptor to the offset to form linear address.Correct Answer 32Your Answer 32

Multiple Choice Multiple AnswerQuestion In Solaris 2, user-level threads may be:-Correct Answer Bound , UnboundYour Answer

Page 23: Computer Science Objective

Bound , Unbound

Multiple Choice Single AnswerQuestion The concept of OOPS was first introduced inCorrect Answer Simula LanguageYour Answer Simula Language

True/FalseQuestion At system boot time, the hardware starts in monitor mode.Correct Answer TrueYour Answer True

Multiple Choice Single AnswerQuestion The main difference between structure and class isCorrect Answer Structure does not support OOPS Class Supports OOPS.Your Answer Structure does not support OOPS Class Supports OOPS.

Select The BlankQuestion A ________ controller is built into each disk drive.Correct Answer DiskYour Answer Disk

Multiple Choice Single AnswerQuestion If a class fruit has object mango, the relationship is expressed as :Correct Answer Fruit mangoYour Answer Fruit mango

True/FalseQuestion The hardware allows privileged instructions to be executed in only user mode.

Page 24: Computer Science Objective

Correct Answer FalseYour Answer False

Multiple Choice Multiple AnswerQuestion An object type in windows NT is a system defined data type that has two things associated with it, which are they?Correct Answer Set of attributes , Set of methodsYour Answer Set of attributes , Set of methods

Select The BlankQuestion The kernel module that controls a device is a ________ .Correct Answer Device driverYour Answer Device driver

Multiple Choice Single AnswerQuestion If process P and Q want to communicate, they must send messages to and receive messages from each other: Thus link established between two process is known as :-Correct Answer Communication linkYour Answer Direct link

Multiple Choice Multiple AnswerQuestion Dispatcher functions involves the following :-Correct Answer Switching context , Switching to user modeYour Answer Switching context , Switching to user mode

Select The BlankQuestion In windows NT, the ________ facility is used to pass requests and results between client and server processes within a single machine.Correct Answer Local-procedure-call

Page 25: Computer Science Objective

Your Answer Local-procedure-call

True/FalseQuestion If some of the pages are shared with other process, the pages in memory and on the disk can only be released when the last process using them has terminated.Correct Answer TrueYour Answer True

Select The BlankQuestion The Solaris developers reimplemented the ________ using in-kernel thread to eliminate the context switch involved in moving each character between daemons and the kernel.Correct Answer Telnet daemonYour Answer Context-switch daemon

Multiple Choice Single AnswerQuestion Modern operating systems are :-Correct Answer Interrupt drivenYour Answer Interrupt driven

Match The FollowingQuestionCorrect AnswerYour AnswerBounded-bufferFixed size bufferFixed size bufferProducerProduces processProduces processConsumerConsumes processConsumes processUnbounded-bufferNo limit on size of buffer

Page 26: Computer Science Objective

No limit on size of buffer

Multiple Choice Multiple AnswerQuestion In Linux, the paging system can be divided into sections, namely:-Correct Answer Policy algorithm , Paging mechanismYour Answer Policy algorithm , Paging mechanism

Multiple Choice Single AnswerQuestion A process data section contains:-Correct Answer Global variablesYour Answer Temporary data

True/FalseQuestion OOSAD approach is applicable only to stable systems.Correct Answer FalseYour Answer False

True/FalseQuestion Segment length may change during execution.Correct Answer TrueYour Answer True

Multiple Choice Multiple AnswerQuestion The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :-Correct Answer Explicit , ImplicitYour Answer Explicit , Implicit

Multiple Choice Single AnswerQuestion

Page 27: Computer Science Objective

Collection of similar datatypes is called asCorrect Answer ArrayYour Answer Array

True/FalseQuestion At Human level, user must be screened carefully so that the chance of authorizing a user who then gives access to an intruder is reduced.Correct Answer TrueYour Answer True

True/FalseQuestion The user process issues a network I/O system call to send the character to the remote machine.Correct Answer TrueYour Answer False

Multiple Choice Multiple AnswerQuestion Most computers have hardware clocks and timers that provide three basic functions, such as :-Correct Answer Give the current time , Give the elapsed time , Set a timer to trigger operation at certain timeYour Answer Give the current time , Give the elapsed time , Set a timer to trigger operation at certain time

Multiple Choice Single AnswerQuestion C++ is basically a procedural language having extension ofCorrect Answer Object Oriented technologyYour Answer Object Oriented technology


Recommended