Date post: | 12-Nov-2014 |
Category: |
Documents |
Upload: | rajanindia |
View: | 747 times |
Download: | 4 times |
http://scdlpapers.blogspot.com/search/label/Database%20Management%20System
LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Firewall monitors and logs all connections.Correct Answer True
Question Which of the following Operating System has no memory protection ?Correct Answer Windows 3.1
Question The main difference between structure and class isCorrect Answer Structure does not support OOPS Class Supports OOPS.
Question DMA stands for :-Correct Answer Direct Memory Access
Question A major problem with the Priority scheduling algorithm is :-Correct Answer Starvation
Question How big is a class object?Correct Answer Is as big as sum of the sizes of its member variables
Question The First version of UNIX was developed in 1969 by Ken Thompson of the Research Group at :-Correct Answer Bell Laboratories
Multiple Choice Single AnswerQuestion When computer is powered up or rebooted, it needs to have an initial program to run. This initial program is known as :-Correct Answer Bootstrap program
Processes represents the executions of single programs whereas threads represent separate, concurrent execution contexts within a single process running a single program.Correct Answer True
Multiple Choice Single AnswerQuestion If Dog derives from Mammal, and Mammal derives from Animal, then -Correct Answer Dog inherits Animal's functions and data
Multiple Choice Single AnswerQuestion The wraping up of data and methods in a single unit (class) is known as :Correct Answer Encapsulation
True/FalseQuestion LRU algorithm can not be implemented without special hardware.Correct Answer True
Question The Solaris developers reimplemented the ________ using in-kernel thread to eliminate the context switch involved in moving each character between daemons and the kernel.Correct Answer Telnet daemon
Multiple Choice Single AnswerQuestion All user processes are descendents of one original process, Which is that process?Correct Answer Init process
Select The BlankQuestion Terminals and line printers are ________ .Correct Answer Character devices
Multiple Choice Multiple AnswerQuestion Many-to-may model is supported by following operating systems :-Correct Answer Solaris , IRIX , Digital UNIXYour Answer Solaris , IRIX , Digital UNIX
Multiple Choice Multiple AnswerQuestion find out the services provided by kernel related to I/O :Correct Answer I/O Scheduling , Buffering , SpoolingYour Answer I/O Scheduling , Buffering , Spooling
Multiple Choice Single AnswerQuestion The long-term scheduler controls the :-Correct Answer Degree of multiprogrammingYour Answer Degree of multiprogramming
Select The BlankQuestion The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________.Correct Answer RingYour Answer Ring
Multiple Choice Multiple AnswerQuestion In Linux, the main objects defined by the virtual file system are :-Correct Answer Inode-object , File-object , File-system objectYour Answer Inode-object , File-object , File-system object
Multiple Choice Single AnswerQuestion Collection of similar datatypes is called asCorrect Answer ArrayYour Answer Array
Multiple Choice Multiple AnswerQuestion We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes?Correct Answer User mode , Monitor modeYour Answer User mode , Monitor mode
Match The FollowingQuestionCorrect AnswerYour AnswerClass ShapeTriangle, rectangle, circle, ellipseTriangle, rectangle, circle, ellipseClass VehicleScooter, car, truck, tractorScooter, car, truck, tractorClass AnimalCat, dog, cow, tigerCat, dog, cow, tigerClass ColorRed, yellow, blue, greenRed, yellow, blue, green
Select The BlankQuestion The virtual memory portion of the NT executive is the ________.Correct Answer Virtual memory managerYour Answer Virtual memory manager
True/FalseQuestion
An asynchronous call returns immediately, without waiting for the I/O to complete.Correct Answer TrueYour Answer True
True/FalseQuestion Modem is a random-access device.Correct Answer FalseYour Answer False
Multiple Choice Multiple AnswerQuestion A mailbox can be owned by :-Correct Answer Process , Operating systemYour Answer Process , Operating system
Multiple Choice Multiple AnswerQuestion The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :-Correct Answer Explicit , ImplicitYour Answer Explicit , Implicit
Select The BlankQuestion In windows NT, the ________ facility is used to pass requests and results between client and server processes within a single machine.Correct Answer Local-procedure-callYour Answer Remote-procedure-call
True/FalseQuestion A major security problem for operating system is authentication.Correct Answer
TrueYour Answer True
True/FalseQuestion In a blocking system call, the application is moved from the OS's run queue to a wait queue.Correct Answer TrueYour Answer True
True/FalseQuestion Device speeds range from a few bytes per second to a few gigabytes per second.Correct Answer TrueYour Answer True
Multiple Choice Multiple AnswerQuestion Various storage systems available possesses which two characteristics?Correct Answer Volatile , Non-volatileYour Answer Volatile , Non-volatile
Match The FollowingQuestionCorrect AnswerYour AnswerWe can define abstract operation on abstract dataData abstractionData abstractionProcess of sharing properties of the higher level object or classInheritanceInheritanceAbility to inherit attributes and methods from 2 or more objects or classesMultiple inheritanceMultiple inheritanceAbility to send a message to several objects and to allow receiving object to respond method specified on the object.Ploymorphism
Ploymorphism
Multiple Choice Single AnswerQuestion As process enter the system, they are put into :-Correct Answer Job queueYour Answer Job queue
Multiple Choice Multiple AnswerQuestion The role of the operating system in computer I/O is to :-Correct Answer Manage I/O operation and devices , Control I/O operation and devicesYour Answer Manage I/O operation and devices , Control I/O operation and devices
Select The BlankQuestion The ________ is a layer of software that hides hardware differences from upper levels of the operating system.Correct Answer Hardware abstraction layerYour Answer Hardware abstraction layer
Select The BlankQuestion A ________ is a computer or router that sits between the trusted and untrusted systems.Correct Answer FirewallYour Answer Firewall
Multiple Choice Multiple AnswerQuestion The Moriss Internet Worm was made up of which of the two programs?Correct Answer Grappling hook program , Main programYour Answer Grappling hook program , Main program
Multiple Choice Multiple AnswerQuestion
In UNIX, a device is distinguished by two things, which are :-Correct Answer Device-class , Device numberYour Answer Device-class , Device number
Multiple Choice Single AnswerQuestion In general , the access matrix will be :-Correct Answer SparseYour Answer Sparse
True/FalseQuestion Applications normally access block devices through a file system interface.Correct Answer TrueYour Answer True
Multiple Choice Multiple AnswerQuestion User thread libraries include :-Correct Answer POSIX Pthreads , Mach C-threads , Solaris threadsYour Answer POSIX Pthreads , Mach C-threads , Solaris threads
Select The BlankQuestion The positioning time sometimes called the ________.Correct Answer Random-access timeYour Answer Random-access time
Multiple Choice Single AnswerQuestion The concept of OOPS was first introduced inCorrect Answer Simula LanguageYour Answer Simula Language
Select The BlankQuestion ________ passwords prevent improper authentication due to password exposure.Correct Answer One-timeYour Answer One-time
Multiple Choice Single AnswerQuestion The linking of procedure call to the code to be executed in response to that call is referred asCorrect Answer BindingYour Answer Binding
at 6:47 AM 0 comments Links to this post
Labels: Operating System
Operating System - 2
LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Multiple Choice Multiple AnswerQuestion locate the transmission devices :-Correct Answer Network cards , ModemsYour Answer Tapes , Network cards , Modems
True/FalseQuestion The user process issues a network I/O system call to send the character to the remote machine.Correct Answer TrueYour Answer True
Multiple Choice Single AnswerQuestion The process by which objects of one class acquire properties of objects of
other class is calledCorrect Answer InheritanceYour Answer Inheritance
True/FalseQuestion Windows NT uses a message passing implementation for I/O.Correct Answer TrueYour Answer True
Multiple Choice Multiple AnswerQuestion We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes?Correct Answer User mode , Monitor modeYour Answer User mode , Monitor mode
Match The FollowingQuestionCorrect AnswerYour AnswerRound-robinTime quantumTime quantumFirst-come First-servedFirst come jobFirst come jobShortest jobShortest jobShortest jobPriorityHighest priority jobHighest priority job
Multiple Choice Single AnswerQuestion The segment is :-Correct Answer Logical entity
Your Answer Logical entity
Multiple Choice Single AnswerQuestion In UNIX, decisions regarding which process to swap in or out are made by whom?Correct Answer SwapperYour Answer Memory handler
Select The BlankQuestion A ________ is a client-server mechanism that enables an application on one machine to make a procedure call to code on another machine.Correct Answer Remote-procedure-callYour Answer Remote-procedure-call
Multiple Choice Single AnswerQuestion When each process that wants to communicate must explicitly name the recipient or sender of the communication, then such communication is called as :-Correct Answer Direct communicationYour Answer Indirect communication
Select The BlankQuestion In Linux, the allocator uses a ________ algorithm to keep track of available physical pages.Correct Answer Buddy-heapYour Answer Binary-search
Multiple Choice Single AnswerQuestion What does the rows of the access matrix represents?Correct Answer DomainsYour Answer
Domains
Multiple Choice Single AnswerQuestion Every change in policy requires a change in the underlying :-Correct Answer MechanismYour Answer System
Select The BlankQuestion A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote.Correct Answer RedirectorYour Answer Domain
Multiple Choice Multiple AnswerQuestion In Solaris 2, user-level threads may be:-Correct Answer Bound , UnboundYour Answer Bound , Unbound
Multiple Choice Multiple AnswerQuestion An audit log records which things about an object ?Correct Answer Time , User , Type of accessYour Answer Time , User , Type of access
Multiple Choice Multiple AnswerQuestion One-to-one model is supported by following systems :-Correct Answer Windows NT , OS/2Your Answer OS/2 , Windows NT
Multiple Choice Multiple AnswerQuestion To protect the system, we must take security measures at two levels, such
as :-Correct Answer Physical level , Human levelYour Answer Human level , Global level
Multiple Choice Single AnswerQuestion If the process is waiting for some event to occur then it is said to be in :-Correct Answer Waiting stateYour Answer Waiting state
Multiple Choice Single AnswerQuestion A common representation for a discussion of process scheduling is a :-Correct Answer Queuing diagramYour Answer Process state diagram
True/FalseQuestion At Physical level, the site or sites containing the computer systems must be physically secured against armed or surreptitious entry by intruders.Correct Answer TrueYour Answer True
Select The BlankQuestion When you express user-system interaction, the scenario in the model is called ________Correct Answer Case modelYour Answer Case model
True/FalseQuestion Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention.Correct Answer False
Your Answer True
True/FalseQuestion A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .Correct Answer FalseYour Answer False
Multiple Choice Single AnswerQuestion Polymorphism means ability to takeCorrect Answer More than one formYour Answer More than one form
True/FalseQuestion Aging algorithm is based on LRU.Correct Answer TrueYour Answer True
Select The BlankQuestion The virtual memory portion of the NT executive is the ________.Correct Answer Virtual memory managerYour Answer Virtual memory manager
Multiple Choice Multiple AnswerQuestion There are two types of Message passing, they are :-Correct Answer Synchronous , AsynchronousYour Answer Synchronous , Asynchronous
Select The BlankQuestion Web servers use the ________ protocol to communicate with web browsers.
Correct Answer httpYour Answer http
Multiple Choice Multiple AnswerQuestion The security of a system can be improved by two management techniques, such as :-Correct Answer Threat monitoring , Audit LogYour Answer Audit Log , Threat finding
Select The BlankQuestion The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________.Correct Answer RingYour Answer Ring
True/FalseQuestion We say that a system is secure if its resources are used and accessed as intended under all circumstances.Correct Answer TrueYour Answer True
Select The BlankQuestion The ________ controller is the controller at the computer end of the bus.Correct Answer HostYour Answer Cpu
Multiple Choice Multiple AnswerQuestion In Linux, the paging system can be divided into sections, namely:-Correct Answer Policy algorithm , Paging mechanismYour Answer
Policy algorithm , Paging mechanism
True/FalseQuestion Keyboard is a sharable device.Correct Answer TrueYour Answer False
True/FalseQuestion Transfer of data from disk to memory is usually controlled by the operating system.Correct Answer TrueYour Answer True
True/FalseQuestion Prototyping not only helps to build a quality design but also enables the designer to build the system decremantally.Correct Answer FalseYour Answer True
Select The BlankQuestion The UNIX system uses ________ to avoid the necessity of keeping its password list secret.Correct Answer EncryptionYour Answer Encryption
Match The FollowingQuestionCorrect AnswerYour AnswerRead-write devicesDisksDisksDedicated devicesTape
CD-ROMRead-only devicesCD-ROMTapeWrite-only devicesGraphics controllerKeyboard
Multiple Choice Single AnswerQuestion A procedure call, request to execute a method is termed asCorrect Answer MessageYour Answer Message
Select The BlankQuestion Context switch times are highly dependent on ________ support.Correct Answer HardwareYour Answer Hardware
Multiple Choice Multiple AnswerQuestion Two main jobs of a computer are :-Correct Answer I/O , ProcessingYour Answer I/O , Processing
Multiple Choice Single AnswerQuestion The 4.3BSD operating system is the version of :-Correct Answer UNIXYour Answer UNIX
Multiple Choice Single AnswerQuestion The number of processes that are completed per time unit is called as:-Correct Answer Throughput of systemYour Answer
Throughput of system
Multiple Choice Multiple AnswerQuestion Once the I/O is started , which two courses of action are possible?Correct Answer Synchronous I/O , Asynchronous I/O , Simple I/OYour Answer Synchronous I/O , Asynchronous I/O
Multiple Choice Multiple AnswerQuestion Security violations of the system can be categorized as :-Correct Answer Malicious , AccidentalYour Answer Malicious , Accidental
Select The BlankQuestion A process migrates between the various ________ throughout its lifetime.Correct Answer Scheduling queuesYour Answer Scheduling queues
at 6:46 AM 0 comments Links to this post
Labels: Operating System
Operating System - 1
LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Multiple Choice Multiple AnswerQuestion Various storage systems available possesses which two characteristics?Correct Answer Volatile , Non-volatileYour Answer Volatile , Non-volatile
Multiple Choice Multiple AnswerQuestion Most CPUs have two interrupt request lines. Which are they?
Correct Answer Maskable , Non maskableYour Answer Maskable , Non maskable
Select The BlankQuestion A ________ is a group of NT server machines that share a common security policy and user databases.Correct Answer DomainYour Answer Domain
Select The BlankQuestion An ________ is a dedicated, special purpose CPU found in mainframes and in other high-end systems.Correct Answer I/O channelYour Answer I/O channel
Multiple Choice Single AnswerQuestion The CPU is allocated to the selected process by the :-Correct Answer DispatcherYour Answer Dispatcher
Multiple Choice Single AnswerQuestion In JAVA , the derived class is known asCorrect Answer SubclassYour Answer Subclass
Select The BlankQuestion The Pentium supports four protection levels with ________ as least privileged level.Correct Answer 3Your Answer
3
Select The BlankQuestion ________ of an object remains unchanged even though its state and properties change.Correct Answer IdentityYour Answer Identity
True/FalseQuestion One way to achieve portability is to write software in standard version of high level language and to develop portable system and application software .Correct Answer TrueYour Answer True
Multiple Choice Single AnswerQuestion Software may trigger an interrupt by executing a special operation called :-Correct Answer System callYour Answer System call
Multiple Choice Single AnswerQuestion In Object Oriented technology following expression is appropriateCorrect Answer object=data+menthodsYour Answer object=data+menthods
Multiple Choice Multiple AnswerQuestion The two versions of NT are :Correct Answer WindowsNT workstations , WindowsNT serverYour Answer WindowsNT workstations , WindowsNT server
Match The Following
QuestionCorrect AnswerYour AnswerWe can define abstract operation on abstract dataData abstractionData abstractionProcess of sharing properties of the higher level object or classInheritanceInheritanceAbility to inherit attributes and methods from 2 or more objects or classesMultiple inheritanceMultiple inheritanceAbility to send a message to several objects and to allow receiving object to respond method specified on the object.PloymorphismPloymorphism
Select The BlankQuestion A________ is a memory area that stores data while they are transferred between two devices or between a device and an application.Correct Answer BufferYour Answer Buffer
True/FalseQuestion In Public Key Encryption, each user has both a public and a private key.Correct Answer TrueYour Answer True
True/FalseQuestion Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention.Correct Answer FalseYour Answer False
Multiple Choice Multiple AnswerQuestion Liner address is divided into fields like :-
Correct Answer Dir , Page , OffsetYour Answer Dir , Page , Offset
Multiple Choice Single AnswerQuestion IPC is particularly useful in a :-Correct Answer Distributed environmentYour Answer Internet environment
Multiple Choice Single AnswerQuestion IPC provides a mechanism to allow processes to communicate and to synchronize their actions without sharing the same :-Correct Answer Address spaceYour Answer Semaphore
Multiple Choice Multiple AnswerQuestion Supervisor mode is also known as :-Correct Answer Privileged mode , Monitor mode , System modeYour Answer System mode , Privileged mode , Monitor mode
Select The BlankQuestion Assuming that the segment is in memory and the offset is in range, the Pentium then adds the ________ bit base field in the descriptor to the offset to form linear address.Correct Answer 32Your Answer 32
Multiple Choice Multiple AnswerQuestion In Solaris 2, user-level threads may be:-Correct Answer Bound , UnboundYour Answer
Bound , Unbound
Multiple Choice Single AnswerQuestion The concept of OOPS was first introduced inCorrect Answer Simula LanguageYour Answer Simula Language
True/FalseQuestion At system boot time, the hardware starts in monitor mode.Correct Answer TrueYour Answer True
Multiple Choice Single AnswerQuestion The main difference between structure and class isCorrect Answer Structure does not support OOPS Class Supports OOPS.Your Answer Structure does not support OOPS Class Supports OOPS.
Select The BlankQuestion A ________ controller is built into each disk drive.Correct Answer DiskYour Answer Disk
Multiple Choice Single AnswerQuestion If a class fruit has object mango, the relationship is expressed as :Correct Answer Fruit mangoYour Answer Fruit mango
True/FalseQuestion The hardware allows privileged instructions to be executed in only user mode.
Correct Answer FalseYour Answer False
Multiple Choice Multiple AnswerQuestion An object type in windows NT is a system defined data type that has two things associated with it, which are they?Correct Answer Set of attributes , Set of methodsYour Answer Set of attributes , Set of methods
Select The BlankQuestion The kernel module that controls a device is a ________ .Correct Answer Device driverYour Answer Device driver
Multiple Choice Single AnswerQuestion If process P and Q want to communicate, they must send messages to and receive messages from each other: Thus link established between two process is known as :-Correct Answer Communication linkYour Answer Direct link
Multiple Choice Multiple AnswerQuestion Dispatcher functions involves the following :-Correct Answer Switching context , Switching to user modeYour Answer Switching context , Switching to user mode
Select The BlankQuestion In windows NT, the ________ facility is used to pass requests and results between client and server processes within a single machine.Correct Answer Local-procedure-call
Your Answer Local-procedure-call
True/FalseQuestion If some of the pages are shared with other process, the pages in memory and on the disk can only be released when the last process using them has terminated.Correct Answer TrueYour Answer True
Select The BlankQuestion The Solaris developers reimplemented the ________ using in-kernel thread to eliminate the context switch involved in moving each character between daemons and the kernel.Correct Answer Telnet daemonYour Answer Context-switch daemon
Multiple Choice Single AnswerQuestion Modern operating systems are :-Correct Answer Interrupt drivenYour Answer Interrupt driven
Match The FollowingQuestionCorrect AnswerYour AnswerBounded-bufferFixed size bufferFixed size bufferProducerProduces processProduces processConsumerConsumes processConsumes processUnbounded-bufferNo limit on size of buffer
No limit on size of buffer
Multiple Choice Multiple AnswerQuestion In Linux, the paging system can be divided into sections, namely:-Correct Answer Policy algorithm , Paging mechanismYour Answer Policy algorithm , Paging mechanism
Multiple Choice Single AnswerQuestion A process data section contains:-Correct Answer Global variablesYour Answer Temporary data
True/FalseQuestion OOSAD approach is applicable only to stable systems.Correct Answer FalseYour Answer False
True/FalseQuestion Segment length may change during execution.Correct Answer TrueYour Answer True
Multiple Choice Multiple AnswerQuestion The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :-Correct Answer Explicit , ImplicitYour Answer Explicit , Implicit
Multiple Choice Single AnswerQuestion
Collection of similar datatypes is called asCorrect Answer ArrayYour Answer Array
True/FalseQuestion At Human level, user must be screened carefully so that the chance of authorizing a user who then gives access to an intruder is reduced.Correct Answer TrueYour Answer True
True/FalseQuestion The user process issues a network I/O system call to send the character to the remote machine.Correct Answer TrueYour Answer False
Multiple Choice Multiple AnswerQuestion Most computers have hardware clocks and timers that provide three basic functions, such as :-Correct Answer Give the current time , Give the elapsed time , Set a timer to trigger operation at certain timeYour Answer Give the current time , Give the elapsed time , Set a timer to trigger operation at certain time
Multiple Choice Single AnswerQuestion C++ is basically a procedural language having extension ofCorrect Answer Object Oriented technologyYour Answer Object Oriented technology