+ All Categories
Home > Documents > SCDL - Operating Systems

SCDL - Operating Systems

Date post: 13-Nov-2014
Category:
Upload: api-3733148
View: 125 times
Download: 1 times
Share this document with a friend
Popular Tags:
85
SCDL – 3 rd Semester – Operating Systems LIST OF ATTEMPTED QUESTIONS AND ANSWERS Multiple Choice Multiple Answer Question A mailbox can be owned by :- Correct Answer Operating system , Process Your Answer User , Process Multiple Choice Single Answer Question Software may trigger an interrupt by executing a special operation called :- Correct Answer System call Your Answer Interrupt call Match The Following Question Correct Answer Your Answer User mode Mode bit 1 Monitor mode Serial port Modem Modem Parallel port Printer Printer Privileged instructions Monitor mode UPS Multiple Choice Multiple Answer Question The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :- Correct Answer Explicit , Implicit Your Answer Implicit , Indirect Multiple Choice Multiple Answer Question What are the ways in which a request for kernel-mode execution can occur in Linux? Correct Answer Explicitly , Implicitly Your Answer Implicitly , Function call Page 1 of 85
Transcript
Page 1: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

LIST OF ATTEMPTED QUESTIONS AND ANSWERS  

 Multiple Choice Multiple Answer  Question   A mailbox can be owned by :-

  Correct Answer  

Operating system , Process

  Your Answer   User , Process

  Multiple Choice Single Answer  Question   Software may trigger an interrupt by executing a special operation called :-

  Correct Answer  

System call

  Your Answer   Interrupt call

  Match The FollowingQuestion Correct Answer Your Answer

User mode Mode bit 1 Monitor mode

Serial port Modem Modem

Parallel port Printer Printer

Privileged instructions Monitor mode UPS

 

 Multiple Choice Multiple Answer  Question   The movement of information between levels of a storage hierarchy may be of two

types depending on the hardware design and the controlling operating system software such as :-

  Correct Answer  

Explicit , Implicit

  Your Answer   Implicit , Indirect

 

 Multiple Choice Multiple Answer  Question   What are the ways in which a request for kernel-mode execution can occur in Linux?

  Correct Answer  

Explicitly , Implicitly

  Your Answer   Implicitly , Function call

 

 Multiple Choice Multiple Answer  Question   Supervisor mode is also known as :-

  Correct Answer  

System mode , Privileged mode , Monitor mode

  Your Answer   Privileged mode , Special mode

Page 1 of 72

Page 2: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

 

 Multiple Choice Multiple Answer  Question   The role of the operating system in computer I/O is to :-

  Correct Answer  

Manage I/O operation and devices , Control I/O operation and devices

  Your Answer   Manage I/O operation and devices , I/O processing

 

 True/False  Question   In UNIX, first two names in every directory are "." and ".."

  Correct Answer  

True

  Your Answer   False

 

 Multiple Choice Multiple Answer  Question   Various storage systems available possesses which two characteristics?

  Correct Answer  

Volatile , Non-volatile

  Your Answer   Primary storage , Secondary storage

 

 Multiple Choice Single Answer  Question   A program in execution is:-

  Correct Answer  

Process

  Your Answer   Operation

 

 Select The Blank  Question   In some operating system, spooling is handled by an ________ .

  Correct Answer  

In-kernel thread

  Your Answer   In-kernel thread

 

 Select The Blank  Question   The hardware to measure elapsed time to trigger operations is called a ________.

  Correct Answer  

Programmable interval timer

  Your Answer   Elapsed timer

 

 True/False  Question   NFU algorithm requires a software counter associated with each page initially zero.

  Correct True

Page 2 of 72

Page 3: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

Answer    Your Answer   True

 

 True/False  Question   Volatile storage loses its contents when the power to the device is removed.

  Correct Answer  

True

  Your Answer   False

 

 Match The FollowingQuestion Correct Answer Your Answer

MFT Multi programming with fixed task

Multi programming with fixed task

RAM Volatile memory Volatile memory

ROM Read only memory Read only memory

BIOS Basic input output system Basic input output system

 

 Select The Blank  Question   ________ includes disks and tapes.

  Correct Answer  

Block devices

  Your Answer   Socket interfaces

 

 Select The Blank  Question   The process could create a new ________ and wait for its termination.

  Correct Answer  

Sub process

  Your Answer   Child

 

 True/False  Question   The cipher text can be stored in a readable file or transmitted over unprotected

channels.  Correct Answer  

True

  Your Answer   True

 

 Select The Blank  Question   The virtual memory portion of the NT executive is the ________.

  Correct Answer  

Virtual memory manager

Page 3 of 72

Page 4: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

  Your Answer   Page-memory manager

 

 Multiple Choice Single Answer  Question   The main difference between structure and class is

  Correct Answer  

Structure does not support OOPS Class Supports OOPS.

  Your Answer   Structure is used in OOPS. Classes are used in procedural programs.

 

 Multiple Choice Multiple Answer  Question   Find out different types of I/O buses :-

  Correct Answer  

EIDE , SCSI

  Your Answer   EIDE , SCSI

 

 Select The Blank  Question   ________ passwords prevent improper authentication due to password exposure.

  Correct Answer  

One-time

  Your Answer   Encrypted

 

 Select The Blank  Question   Like worms, ________ are designed to spread into other programs and can wreak

havoc in a system.  Correct Answer  

Viruses

  Your Answer   Trojan horses

 

 Select The Blank  Question   A ________ in NT is an object that provides a uniform interface for files, whether

they are local or remote.  Correct Answer  

Redirector

  Your Answer   Director

 

 Select The Blank  Question   One interface that is available in many operating systems, including UNIX and

WindowsNT, is the network ________ interface.  Correct Answer  

Socket

  Your Answer   Device

 

 True/False  Question   In Windows NT, kernel can be paged out of memory and its executions can be

Page 4 of 72

Page 5: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

preempted.  Correct Answer  

False

  Your Answer   True

 

 Multiple Choice Single Answer  Question   The insulation of data from direct access by the program is known as :

  Correct Answer  

Data hiding

  Your Answer   Abstraction

 

 Multiple Choice Single Answer  Question   The concept of OOPS was first introduced in

  Correct Answer  

Simula Language

  Your Answer   Simula Language

 

 Multiple Choice Multiple Answer  Question   locate the transmission devices :-

  Correct Answer  

Network cards , Modems

  Your Answer   Network cards , Modems

 

 Multiple Choice Single Answer  Question   How big is a class object?

  Correct Answer  

Is as big as sum of the sizes of its member variables

  Your Answer   Is as big as sum of the sizes of its member variables

 

 Multiple Choice Single Answer  Question   The system call checks the arguments given by the application, builds a data

structure to convey the arguments to the kernel and then executes a special instruction called as :-

  Correct Answer  

Software interrupt

  Your Answer   Special system call

 

 Multiple Choice Multiple Answer  Question   Security violations of the system can be categorized as :-

  Correct Answer  

Malicious , Accidental

Page 5 of 72

Page 6: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

  Your Answer   Unauthorized , Authorized

 

 Select The Blank  Question   Most computers have ________ clocks and timers.

  Correct Answer  

Hardware

  Your Answer   In-built

 

 Multiple Choice Single Answer  Question   A domain is a collection of :-

  Correct Answer  

Access rights

  Your Answer   Objects

 

 True/False  Question   In paging the total address space can exceed the size of physical memory

  Correct Answer  

True

  Your Answer   True

 

 Multiple Choice Single Answer  Question   Objects may communicate with each other through

  Correct Answer  

Methods

  Your Answer   Methods

 

 Multiple Choice Single Answer  Question   A system consists of collection of :-

  Correct Answer  

Processes

  Your Answer   Processes

 

 Multiple Choice Multiple Answer  Question   An audit log records which things about an object ?

  Correct Answer  

Time , User , Type of access

  Your Answer   Time , Type of access

 

 Multiple Choice Single Answer  Question   It has been said that Pascal and C programs are collections of procedures and C++

Page 6 of 72

Page 7: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

programs are collections of  Correct Answer  

Classes

  Your Answer   Classes

 

 Select The Blank  Question   OOSAD begins with identification of actors, what activities they perform and building

________ model for the function.  Correct Answer  

Use-case

  Your Answer   Use-case

 

 Multiple Choice Single Answer  Question   The smallest addressable portion of a disk is :-

  Correct Answer  

Sector

  Your Answer   Sector

 

 True/False  Question   OOSAD approach is applicable only to stable systems.

  Correct Answer  

False

  Your Answer   True

 

 True/False  Question   To perform a disk I/O operation, the computer places a command into the host

controller, typically using memory-mapped I/O ports.  Correct Answer  

True

  Your Answer   True

 

 Multiple Choice Single Answer  Question   The number of processes that are completed per time unit is called as:-

  Correct Answer  

Throughput of system

  Your Answer   Efficiency of system

 

 Multiple Choice Single Answer  Question   In MULTICS TLB address of 'n', the most recently referenced pages are kept, where

'n' can have a value :-  Correct Answer  

16

  Your Answer   8

Page 7 of 72

Page 8: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

 

 True/False  Question   The job of I/O channel is to offload I/O work from the main CPU.

  Correct Answer  

True

  Your Answer   False

LIST OF ATTEMPTED QUESTIONS AND ANSWERS  

 Multiple Choice Single Answer  Question   Each object is associated with the data of type class with which they are created. A

class is thus a collection of objects of  Correct Answer  

Similar type

  Your Answer   Similar type

 

 Multiple Choice Single Answer  Question   C++ is also named as

  Correct Answer  

C with classes

  Your Answer   Visual C++

 

 Select The Blank  Question   The ________ of a process is represented in the PCB of a process.

  Correct Answer  

Context

  Your Answer   Control

 

 Multiple Choice Multiple Answer  Question   In windows NT, naming of objects is of two types :-

  Correct Answer  

Permanent name , Temporary name

  Your Answer   Permanent name , Object-primary name

 

 Match The FollowingQuestion Correct Answer Your Answer

Class Shape Triangle, rectangle, circle, ellipse

Triangle, rectangle, circle, ellipse

Class Vehicle Scooter, car, truck, tractor Scooter, car, truck, tractor

Class Animal Cat, dog, cow, tiger Cat, dog, cow, tiger

Page 8 of 72

Page 9: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

Class Color Red, yellow, blue, green Red, yellow, blue, green

 

 Multiple Choice Multiple Answer  Question   Computer system consists of :-

  Correct Answer  

CPU , Multiple device controller

  Your Answer   CPU , Multiple device controller

 

 Multiple Choice Single Answer  Question   In JAVA , the derived class is known as

  Correct Answer  

Subclass

  Your Answer   Subclass

 

 Select The Blank  Question   To make as interval call, the CALL instruction must contain ________.

  Correct Answer  

Selector

  Your Answer   Address

 

 True/False  Question   In Lock-key mechanism, users are allowed to examine or modify the list of keys or

locks directly.  Correct Answer  

False

  Your Answer   True

 

 Multiple Choice Single Answer  Question   A major problem with the Priority scheduling algorithm is :-

  Correct Answer  

Starvation

  Your Answer   CPU time

 

 Select The Blank  Question   ________ of an object remains unchanged even though its state and properties

change.  Correct Answer  

Identity

  Your Answer   Identity

 

 Multiple Choice Single Answer  Question   The process by which objects of one class acquire properties of objects of other

Page 9 of 72

Page 10: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

class is called  Correct Answer  

Inheritance

  Your Answer   Polymorphism

 

 Select The Blank  Question   ________allows us to define abstract operations on abstract data.

  Correct Answer  

Data abstraction

  Your Answer   Data abstraction

 

 True/False  Question   An asynchronous call returns immediately, without waiting for the I/O to complete.

  Correct Answer  

True

  Your Answer   True

 

 Multiple Choice Multiple Answer  Question   locate the storage devices from the following :-

  Correct Answer  

Disks , Tapes

  Your Answer   Disks , Tapes

 

 Multiple Choice Single Answer  Question   Mango, apple and orange are members of class

  Correct Answer  

Fruit

  Your Answer   Fruit

 

 Multiple Choice Single Answer  Question   The pure Object Oriented language is

  Correct Answer  

Java

  Your Answer   C++

 

 Select The Blank  Question   Web servers use the ________ protocol to communicate with web browsers.

  Correct Answer  

http

  Your Answer   http

Page 10 of 72

Page 11: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

 

 Select The Blank  Question   ________ is the ability to handle error conditions, including the ability of the

operating system to protect itself and its users from defective or malicious software.  Correct Answer  

Reliability

  Your Answer   Security

 

 Multiple Choice Multiple Answer  Question   One-to-one model is supported by following systems :-

  Correct Answer  

Windows NT , OS/2

  Your Answer   Solaris , Windows NT

 

 Multiple Choice Single Answer  Question   Collection of similar datatypes is called as

  Correct Answer  

Array

  Your Answer   Array

 

 Multiple Choice Single Answer  Question   C++ is basically a procedural language having extension of

  Correct Answer  

Object Oriented technology

  Your Answer   Graphic user interface

 

 Multiple Choice Single Answer  Question   In Object Oriented technology following expression is appropriate

  Correct Answer  

object=data+menthods

  Your Answer   method= data + object

 

 Multiple Choice Single Answer  Question   If a class fruit has object mango, the relationship is expressed as :

  Correct Answer  

Fruit mango

  Your Answer   Fruit mango

 

 Multiple Choice Multiple Answer  Question   Find out the basic I/O hardware elements from the following :-

  Correct Ports , Buses , Device controllers

Page 11 of 72

Page 12: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

Answer    Your Answer   Ports , Buses , Device controllers

 

 Multiple Choice Single Answer  Question   Model of protection can be viewed abstractly as a matrix which is known as :-

  Correct Answer  

Access matrix

  Your Answer   Access matrix

 

 Multiple Choice Single Answer  Question   The 4.3BSD operating system is the version of :-

  Correct Answer  

UNIX

  Your Answer   UNIX

 

 True/False  Question   When application issues a blocking I/O system call, the request is placed on the

queue for that device.  Correct Answer  

True

  Your Answer   False

 

 Select The Blank  Question   ________ is defined as a cooperation between object codes produced by different

software vendors & written in different programming languages.  Correct Answer  

Interoperability

  Your Answer   Interoperability

 

 True/False  Question   Linux is a multi-user, multitasking system with a full set of UNIX-compatible tools.

  Correct Answer  

True

  Your Answer   True

 

 Multiple Choice Single Answer  Question   DMA stands for :-

  Correct Answer  

Direct Memory Access

  Your Answer   Direct Memory Access

 

 Match The Following

Page 12 of 72

Page 13: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

Question Correct Answer Your Answer

Light-Weight processes Thread Solaris process

Parent process Child process Unix process

Foreground processes Interactive processes Interactive processes

Background processes Batch processes Thread

 

 Multiple Choice Multiple Answer  Question   Find out the human-interface devices :-

  Correct Answer  

Screen , Keyboard , Mouse

  Your Answer   Screen , Keyboard , Mouse

 

 Select The Blank  Question   A process is ________ if it can affect or be affected by the other processes

executing in the system.  Correct Answer  

Cooperating

  Your Answer   Independent

 

 Multiple Choice Multiple Answer  Question   Liner address is divided into fields like :-

  Correct Answer  

Dir , Page , Offset

  Your Answer   Dir , Page , File

 

 True/False  Question   An I/O bound process spend more of its time doing I/O than it spends doing

computations.  Correct Answer  

True

  Your Answer   False

 

 Multiple Choice Single Answer  Question   In some systems, if a process terminates, then all its children must also be

terminated. This phenomenon referred to as :-  Correct Answer  

Cascading termination

  Your Answer   Removing all

 

 Multiple Choice Multiple Answer

Page 13 of 72

Page 14: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

  Question   find out the services provided by kernel related to I/O :

  Correct Answer  

I/O Scheduling , Buffering , Spooling

  Your Answer   I/O Scheduling , Buffering , I/o subsystem

 

 True/False  Question   The language Classic-Ada is not OOPL

  Correct Answer  

False

  Your Answer   True

 

 Select The Blank  Question   In Linux, the allocator uses a ________ algorithm to keep track of available physical

pages.  Correct Answer  

Buddy-heap

  Your Answer   Sort-first

 

 Select The Blank  Question   ________ describes segments local to each program, including its code, data, stack

etc.  Correct Answer  

LDT

  Your Answer   LDT

 

 True/False  Question   A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .

  Correct Answer  

False

  Your Answer   False

 

 True/False  Question   A copy of inode is kept in main memory while a file is open.

  Correct Answer  

True

  Your Answer   True

 

 Multiple Choice Single Answer  Question   The separation of policy and mechanism is important for which purpose?

  Correct Answer  

Flexibility

Page 14 of 72

Page 15: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

  Your Answer   Costing

 

 Select The Blank  Question   A ________ is a group of NT server machines that share a common security policy

and user databases.  Correct Answer  

Domain

  Your Answer   Domain

 

 Multiple Choice Single Answer  Question   If Dog derives from Mammal, and Mammal derives from Animal, then -

  Correct Answer  

Dog inherits Animal's functions and data

  Your Answer   Dog inherits Animal's functions and data

 

 True/False  Question   Keyboard is a sharable device.

  Correct Answer  

True

  Your Answer   False

LIST OF ATTEMPTED QUESTIONS AND ANSWERS  

 True/False  Question   Prototyping is a tool to test the design of system

  Correct Answer  

True

  Your Answer   False

 

 Multiple Choice Multiple Answer  Question   Kernel threads are generally :-

  Correct Answer  

Slower to create , Difficult to manage

  Your Answer   Difficult to manage , Faster than user thread , Faster to create

 

 Multiple Choice Single Answer  Question   The concept of OOPS was first introduced in

  Correct Answer  

Simula Language

Page 15 of 72

Page 16: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

  Your Answer   Simula Language

 

 Multiple Choice Single Answer  Question   The insulation of data from direct access by the program is known as :

  Correct Answer  

Data hiding

  Your Answer   Abstraction

  True/False

  Question   Many to Many model multiplexes many user level threads to a smaller or equal number of kernel threads.

  Correct Answer  

True

  Your Answer   True

 

 Select The Blank  Question   Like worms, ________ are designed to spread into other programs and can wreak

havoc in a system.  Correct Answer  

Viruses

  Your Answer   Viruses

 

 Multiple Choice Multiple Answer  Question   The two versions of NT are :

  Correct Answer  

WindowsNT workstations , WindowsNT server

  Your Answer   WindowsNT workstations , WindowsNT server

 

 True/False  Question   A virus is a fragment of code embedded in a legitimate program

  Correct Answer  

True

  Your Answer   False

 

 True/False  Question   An I/O bound process spend more of its time doing I/O than it spends doing

computations.  Correct Answer  

True

  Your Answer   True

 

 Multiple Choice Single Answer  Question   It has been said that Pascal and C programs are collections of procedures and C++

Page 16 of 72

Page 17: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

programs are collections of  Correct Answer  

Classes

  Your Answer   Classes

 

 Multiple Choice Single Answer  Question   The process by which objects of one class acquire properties of objects of other

class is called  Correct Answer  

Inheritance

  Your Answer   Inheritance

 

 Select The Blank  Question   A ________ is a buffer that holds output for a device such as printers.

  Correct Answer  

Spool

  Your Answer   Spool

 

 Multiple Choice Single Answer  Question   C++ is basically a procedural language having extension of

  Correct Answer  

Object Oriented technology

  Your Answer   Object Oriented technology

 

 True/False  Question   Object-oriented programming focuses on the integrated data and functionality as

discrete units that have both knowledge (data) and capabilities (functions). Procedural programs, on the other hand, focus on functions and how they act on data.

  Correct Answer  

True

  Your Answer   True

 

 Multiple Choice Multiple Answer  Question   Most CPUs have two interrupt request lines. Which are they?

  Correct Answer  

Maskable , Non maskable

  Your Answer   Maskable , Non maskable

 

 True/False  Question   The I/O scheduler rearranges the order of the queue to improve the overall system

efficiency and the average response time experienced by application  Correct Answer  

True

Page 17 of 72

Page 18: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

  Your Answer   True

  Multiple Choice Single Answer

  Question   How big is a class object?

  Correct Answer  

Is as big as sum of the sizes of its member variables

  Your Answer   Is as big as sum of the sizes of its member variables

 

 Multiple Choice Single Answer  Question   In UNIX, files are organized in tree-structured :-

  Correct Answer  

Directories

  Your Answer   Directories

 

 Multiple Choice Single Answer  Question   The number of processes that are completed per time unit is called as:-

  Correct Answer  

Throughput of system

  Your Answer   Throughput of system

 

 Multiple Choice Multiple Answer  Question   There are two types of Message passing, they are :-

  Correct Answer  

Synchronous , Asynchronous

  Your Answer   Synchronous , Asynchronous

 

 Multiple Choice Single Answer  Question   If Dog derives from Mammal, and Mammal derives from Animal, then -

  Correct Answer  

Dog inherits Animal's functions and data

  Your Answer   Dog inherits Animal's functions and data

 

 Select The Blank  Question   The positioning time sometimes called the ________.

  Correct Answer  

Random-access time

  Your Answer   Seek time

 

 Multiple Choice Single Answer

Page 18 of 72

Page 19: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

  Question   Collection of similar datatypes is called as

  Correct Answer  

Array

  Your Answer   Array

 

 Multiple Choice Single Answer  Question   The pure Object Oriented language is

  Correct Answer  

Java

  Your Answer   Java

 

 Multiple Choice Multiple Answer  Question   To protect the system, we must take security measures at two levels, such as :-

  Correct Answer  

Physical level , Human level

  Your Answer   Local level , Global level

 

 Select The Blank  Question   In some operating system, spooling is handled by an ________ .

  Correct Answer  

In-kernel thread

  Your Answer   User thread

 

 Multiple Choice Multiple Answer  Question   Supervisor mode is also known as :-

  Correct Answer  

System mode , Privileged mode , Monitor mode

  Your Answer   Privileged mode , Monitor mode , Special mode

 

 Match The FollowingQuestion Correct Answer Your Answer

Thread Light-weight process Light-weight process

Process PCB Thread library

User thread Thread library PCB

Kernel thread Operating system Operating system

 

 Select The Blank  Question   The ________ of a process is represented in the PCB of a process.

Page 19 of 72

Page 20: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

  Correct Answer  

Context

  Your Answer   Control

 

 Select The Blank  Question   ________ is defined as a cooperation between object codes produced by different

software vendors & written in different programming languages.  Correct Answer  

Interoperability

  Your Answer   Interoperability

  Multiple Choice Multiple Answer

  Question   In a uniprocessor system, there is :-

  Correct Answer  

Single processor , Single running process

  Your Answer   Single processor , Single running process

 

 Multiple Choice Single Answer  Question   In UNIX operating system, each process is identified by its :-

  Correct Answer  

Process identifier

  Your Answer   Process identifier

 

 Multiple Choice Single Answer  Question   As process enter the system, they are put into :-

  Correct Answer  

Job queue

  Your Answer   Job queue

 

 Match The FollowingQuestion Correct Answer Your Answer

Algorithm where in it takes largest available hole

Worst fit Worst fit

The algorithm in which memory manager scans along the list of segments until it finds a hole that is big enough

First fit First fit

Algorithm in which keeps the track of suitable hole

Next fit Optimal fit

Algorithm which searches entire list and takes smallest hole that is adequate

Best fit Best fit

 

Page 20 of 72

Page 21: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

 True/False  Question   Linux is a multi-user, multitasking system with a full set of UNIX-compatible tools.

  Correct Answer  

True

  Your Answer   True

 

 Multiple Choice Single Answer  Question   The main difference between structure and class is

  Correct Answer  

Structure does not support OOPS Class Supports OOPS.

  Your Answer   Structure does not support OOPS Class Supports OOPS.

 

 Multiple Choice Multiple Answer  Question   Find out the basic I/O hardware elements from the following :-

  Correct Answer  

Ports , Buses , Device controllers

  Your Answer   Ports , Buses , Device controllers

 

 Multiple Choice Single Answer  Question   The interval from the time of submission of a process to the time of completion is :-

  Correct Answer  

Turnaround time

  Your Answer   Completion time

 

 True/False  Question   In Public Key Encryption, each user has both a public and a private key.

  Correct Answer  

True

  Your Answer   False

 

 Multiple Choice Single Answer  Question   If the process is waiting to be assigned to CPU then it is said to be in :-

  Correct Answer  

Ready state

  Your Answer   Waiting state

 

 Select The Blank  Question   A ________ controller is built into each disk drive.

  Correct Answer  

Disk

Page 21 of 72

Page 22: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

  Your Answer   Disk

 

 Multiple Choice Multiple Answer  Question   Linux presents standard interfaces to whom?

  Correct Answer  

Programmer , User

  Your Answer   Programmer , User , System administrator

 

 True/False  Question   As an object-oriented systems NT uses objects for all its services and entities.

  Correct Answer  

True

  Your Answer   True

 

 Multiple Choice Single Answer  Question   A procedure body implementing an operation is termed as

  Correct Answer  

Method

  Your Answer   Method

 

 True/False  Question   Main Memory is a volatile storage device that loses its contents when power is

turned off.  Correct Answer  

True

  Your Answer   True

 

 Multiple Choice Multiple Answer  Question   Once the I/O is started , which two courses of action are possible?

  Correct Answer  

Synchronous I/O , Asynchronous I/O , Simple I/O

  Your Answer   Waiting I/O , Simple I/O

 

 Select The Blank  Question   ________ passwords prevent improper authentication due to password exposure.

  Correct Answer  

One-time

  Your Answer   Encrypted

Page 22 of 72

Page 23: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

LIST OF ATTEMPTED QUESTIONS AND ANSWERS  

 Select The Blank  Question   Web servers use the ________ protocol to communicate with web browsers.

  Correct Answer  

http

  Your Answer   http

 

 True/False  Question   Cache-coherency is usually a software problem and handled above the operating

system level.  Correct Answer  

False

  Your Answer   True

 

 Multiple Choice Multiple Answer  Question   Two main jobs of a computer are :-

  Correct Answer  

I/O , Processing

  Your Answer   I/O , Processing

 

 Multiple Choice Multiple Answer  Question   What are the ways in which a request for kernel-mode execution can occur in

Linux?  Correct Answer  

Explicitly , Implicitly

  Your Answer   Explicitly , Implicitly

 

 Select The Blank  Question   If the user-supplied password matches the password stored in the system, the

system assumes that the user is ________.  Correct Answer  

Legitimate

  Your Answer   Legitimate

 

 True/False  Question   Single-indirect block is an index block which contains data of the files to which it

points.  Correct Answer  

False

Page 23 of 72

Page 24: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

  Your Answer   True

 

 True/False  Question   Volatile storage loses its contents when the power to the device is removed.

  Correct Answer  

True

  Your Answer   True

  Multiple Choice Single Answer

  Question   SCSI stands for :-

  Correct Answer  

Small Computer-Systems Interface

  Your Answer   System Call-System Interrupt

 

 Multiple Choice Multiple Answer  Question   Which are the Division D security systems ?

  Correct Answer  

Windows 3.1 , MS-DOS

  Your Answer   Windows NT , UNIX

 

 Select The Blank  Question   static binding allows to hold certain properties fixed and rigid, whereas ________

binding allows object to behave as per conditions emerge.  Correct Answer  

Dynamic

  Your Answer   Dynamic

  Multiple Choice Multiple Answer

  Question   What are the components to memory management under Linux?

  Correct Answer  

Physical memory manager , Virtual memory manager

  Your Answer   Physical memory manager , Virtual memory manager

 

 Multiple Choice Single Answer  Question   The First version of UNIX was developed in 1969 by Ken Thompson of the

Research Group at :-  Correct Answer  

Bell Laboratories

  Your Answer   Bell Laboratories

  True/False

  Question   XML is a meta data language developed to specify data with a goal of improving interoperatability of different data sources.

Page 24 of 72

Page 25: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

  Correct Answer  

True

  Your Answer   True

 

 True/False  Question   One way to achieve portability is to write software in standard version of high level

language and to develop portable system and application software .  Correct Answer  

True

  Your Answer   True

  Multiple Choice Single Answer

  Question   C++ is basically a procedural language having extension of

  Correct Answer  

Object Oriented technology

  Your Answer   Object Oriented technology

 

 Select The Blank  Question   The ________ of a process is represented in the PCB of a process.

  Correct Answer  

Context

  Your Answer   Context

 

 Select The Blank  Question   In windows NT, the ________ facility is used to pass requests and results between

client and server processes within a single machine.  Correct Answer  

Local-procedure-call

  Your Answer   Remote-procedure-call

 

 Multiple Choice Single Answer  Question   In how many number of classes does the NRU algorithm divides pages, depending

on the state of R and M?  Correct Answer  

4

  Your Answer   4

 

 Multiple Choice Multiple Answer  Question   When memory reference occurs in MULTICS the things which takes place are :-

  Correct Answer  

Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address

  Your Answer   Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is

Page 25 of 72

Page 26: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

examined , Offset is added to the page origin to give main memory address  

 Multiple Choice Multiple Answer  Question   Supervisor mode is also known as :-

  Correct Answer  

System mode , Privileged mode , Monitor mode

  Your Answer   System mode , Privileged mode , Monitor mode

 

 Multiple Choice Single Answer  Question   How big is a class object?

  Correct Answer  

Is as big as sum of the sizes of its member variables

  Your Answer   Is as big as sum of the sizes of its member variables

  Multiple Choice Multiple Answer

  Question   The device number consists of which two parts in UNIX?

  Correct Answer  

Major device number , Minor device number

  Your Answer   Major device number , Minor device number

 

 Select The Blank  Question   The context switch time is pure ________, because system does no useful work

while switching.  Correct Answer  

Overhead

  Your Answer   Wastage

 

 Multiple Choice Multiple Answer  Question   In Solaris 2, user-level threads may be:-

  Correct Answer  

Bound , Unbound

  Your Answer   Bound , Unbound

 

 Match The FollowingQuestion Correct Answer Your Answer

Random-access devices CD-ROM CD-ROM

Character devices. Terminal Keyboard

Block devices Disk Tape

Sequential devices Modem Terminal

Page 26 of 72

Page 27: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

 

 Multiple Choice Single Answer  Question   The main difference between structure and class is

  Correct Answer  

Structure does not support OOPS Class Supports OOPS.

  Your Answer   Structure does not support OOPS Class Supports OOPS.

  True/False

  Question   Object-oriented programming focuses on the integrated data and functionality as discrete units that have both knowledge (data) and capabilities (functions). Procedural programs, on the other hand, focus on functions and how they act on data.

  Correct Answer  

True

  Your Answer   True

  Select The Blank

  Question   A keyboard is an example of device that is accessed through a ________ interface.

  Correct Answer  

Character stream

  Your Answer   Character stream

 

 Multiple Choice Multiple Answer  Question   Find out the CPU scheduling algorithms from these options :-

  Correct Answer  

FCFS , RR , SJF

  Your Answer   FCFS , RR , SJF

 

 Multiple Choice Single Answer  Question   Main Memory of computer program is also called as :-

  Correct Answer  

RAM

  Your Answer   RAM

 

 Multiple Choice Multiple Answer  Question   The security of a system can be improved by two management techniques, such

as :-  Correct Answer  

Threat monitoring , Audit Log

  Your Answer   Threat monitoring , Audit Log

 

 Multiple Choice Single Answer

Page 27 of 72

Page 28: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

  Question   The separation of policy and mechanism is important for which purpose?

  Correct Answer  

Flexibility

  Your Answer   Flexibility

 

 Match The FollowingQuestion Correct Answer Your Answer

Trap in which program tries to use unmapped page

Page fault Page fault

Memory Management Unit MMU MMU

Smaller units in which virtual address space is divided

Pages Pages

Units in physical memory corresponding to pages in virtual memory

Page frame Page frame

 

 True/False  Question   A non-blocking call does not halt the execution of the application for an extended

time.  Correct Answer  

True

  Your Answer   True

 

 True/False  Question   Windows NT uses a message passing implementation for I/O.

  Correct Answer  

True

  Your Answer   True

 

 Multiple Choice Multiple Answer  Question   Kernel threads are generally :-

  Correct Answer  

Slower to create , Difficult to manage

  Your Answer   Slower to create , Difficult to manage

 

 Multiple Choice Single Answer  Question   The long-term scheduler controls the :-

  Correct Answer  

Degree of multiprogramming

  Your Answer   Degree of multiprogramming

 

 Multiple Choice Single Answer

Page 28 of 72

Page 29: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

  Question   Objects may communicate with each other through

  Correct Answer  

Methods

  Your Answer   Methods

 

 Select The Blank  Question   In queuing diagram, the arrow indicates the flow of ________ in the system.

  Correct Answer  

Processes

  Your Answer   Queue

 

 Multiple Choice Single Answer  Question   If Dog derives from Mammal, and Mammal derives from Animal, then -

  Correct Answer  

Dog inherits Animal's functions and data

  Your Answer   Dog inherits Animal's functions and data

 

 Multiple Choice Single Answer  Question   Thread at user level is known as :-

  Correct Answer  

User thread

  Your Answer   User thread

 

 Select The Blank  Question   ________ includes disks and tapes.

  Correct Answer  

Block devices

  Your Answer   Block devices

 

 Multiple Choice Single Answer  Question   DMA stands for :-

  Correct Answer  

Direct Memory Access

  Your Answer   Direct Memory Access

  True/False

  Question   When application issues a blocking I/O system call, the request is placed on the queue for that device.

  Correct Answer  

True

  Your Answer   True

Page 29 of 72

Page 30: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

 

 Multiple Choice Single Answer  Question   The concept of OOPS was first introduced in

  Correct Answer  

Simula Language

  Your Answer   Simula Language

 

 True/False  Question   Encryption is one common method of protecting information that is transmitted over

unreliable links.  Correct Answer  

True

  Your Answer   True

 

 Select The Blank  Question   ________ describes segments local to each program, including its code, data, stack

etc.  Correct Answer  

LDT

  Your Answer   LDT

LIST OF ATTEMPTED QUESTIONS AND ANSWERS  

 Select The Blank  Question   Like worms, ________ are designed to spread into other programs and can wreak

havoc in a system.  Correct Answer  

Viruses

  Your Answer   Viruses

  Multiple Choice Multiple Answer

  Question   The advantage of dynamic loading is

  Correct Answer  

Unused routine is never loaded , Useful when large amount of code are needed to handle infrequently occurring cases, such as error routines , It does not require special support from the operating system

  Your Answer   Useful when large amount of code are needed to handle infrequently occurring cases, such as error routines , It does not require special support from the operating system , Unused routine is never loaded  

 Select The Blank  Question   Terminals and line printers are ________ .

  Correct Answer  

Character devices

  Your Answer   Socket interfaces

Page 30 of 72

Page 31: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

 

 Multiple Choice Multiple Answer  Question   A mailbox can be owned by :-

  Correct Answer  

Process , Operating system

  Your Answer   Process , Operating system

 

 Select The Blank  Question   A process is ________, if it cannot affect or be affected by the other processes

executing in the system.  Correct Answer  

Independent

  Your Answer   Cooperating

 

 True/False  Question   NFU is crude attempt to approximate LRU.

  Correct Answer  

True

  Your Answer   False

 

 True/False  Question   A copy of inode is kept in main memory while a file is open.

  Correct Answer  

True

  Your Answer   True

 

 Multiple Choice Single Answer  Question   The class bird should have object

  Correct Answer  

Egale

  Your Answer   Egale

 

 Multiple Choice Multiple Answer  Question   User thread libraries include :-

  Correct Answer  

POSIX Pthreads , Mach C-threads , Solaris threads

  Your Answer   Mach C-threads , Solaris threads

 

 True/False  Question   We can include dynamic protection in the access-matrix model by considering the

domains and the access matrix itself as objects.  Correct True

Page 31 of 72

Page 32: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

Answer    Your Answer   True

 

 True/False  Question   The capability list is associated with a domain.

  Correct Answer  

True

  Your Answer   True

 

 Select The Blank  Question   A ________ in NT is an object that provides a uniform interface for files, whether

they are local or remote.  Correct Answer  

Redirector

  Your Answer   Redirector

 

 Select The Blank  Question   The ________ is a compromise between access lists and capability lists.

  Correct Answer  

Lock-Key Schemes

  Your Answer   Protected procedures

 

 Match The FollowingQuestion Correct Answer Your Answer

Bit showing the availability of page in memory for which that entry belongs to

Present / absent bit Modified bit

In page table entry, the access permitted are stored in

Protection bit Protection bit

Bit is set when the page is referenced

Referenced bit Referenced bit

Bit which keeps track of page usage

Modified bit Security bit

 

 Multiple Choice Single Answer  Question   In UNIX, files are organized in tree-structured :-

  Correct Answer  

Directories

  Your Answer   Directories

 

 Match The FollowingQuestion Correct Answer Your Answer

Page 32 of 72

Page 33: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

We can define abstract operation on abstract data

Data abstraction Data abstraction

Process of sharing properties of the higher level object or class

Inheritance Inheritance

Ability to inherit attributes and methods from 2 or more objects or classes

Multiple inheritance Multiple inheritance

Ability to send a message to several objects and to allow receiving object to respond method specified on the object.

Ploymorphism Ploymorphism

 

 Select The Blank  Question   The Solaris developers reimplemented the ________ using in-kernel thread to

eliminate the context switch involved in moving each character between daemons and the kernel.

  Correct Answer  

Telnet daemon

  Your Answer   Context-switch daemon

 

 Multiple Choice Single Answer  Question   If the process is waiting for some event to occur then it is said to be in :-

  Correct Answer  

Waiting state

  Your Answer   Ready state

 

 True/False  Question   Cache is a non-volatile storage system.

  Correct Answer  

False

  Your Answer   False

 

 Multiple Choice Single Answer  Question   The wraping up of data and methods in a single unit (class) is known as :

  Correct Answer  

Encapsulation

  Your Answer   Encapsulation

 

 True/False  Question   A process is a victim of starvation if it becomes stuck in a scheduling queue

indefinitely.  Correct Answer  

True

  Your Answer   True

Page 33 of 72

Page 34: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

 

 Select The Blank  Question   ________ file access can be layered on top of block-device drivers.

  Correct Answer  

Memory-mapped

  Your Answer   Memory-mapped

 

 Multiple Choice Multiple Answer  Question   find out the services provided by kernel related to I/O :

  Correct Answer  

I/O Scheduling , Buffering , Spooling

  Your Answer   I/O Scheduling , Buffering , Spooling

 

 Multiple Choice Multiple Answer  Question   The role of the operating system in computer I/O is to :-

  Correct Answer  

Manage I/O operation and devices , Control I/O operation and devices

  Your Answer   Manage I/O operation and devices , Control I/O operation and devices

 

 True/False  Question   In Lock-key mechanism, a process executing in a domain can access an object if

that domain has a key that matches one of the locks of the objects.  Correct Answer  

True

  Your Answer   False

 

 Multiple Choice Multiple Answer  Question   There are components to the module support under Linux, identify them :-

  Correct Answer  

Module management , Driver registration , Conflict-resolution mechanism

  Your Answer   Module management , Driver registration , Conflict-resolution mechanism

 

 Multiple Choice Single Answer  Question   The 4.3BSD operating system is the version of :-

  Correct Answer  

UNIX

  Your Answer   UNIX

  Select The Blank

  Question   Each entry in the access matrix consists of a set of ________ .

  Correct Access right

Page 34 of 72

Page 35: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

Answer    Your Answer   Access right

 

 Multiple Choice Single Answer  Question   In UNIX, a file is represented by an :-

  Correct Answer  

Inode

  Your Answer   Block

 

 Multiple Choice Single Answer  Question   The segment is :-

  Correct Answer  

Logical entity

  Your Answer   Logical entity

  True/False

  Question   In Windows NT, each process has one or more threads, which are the units of execution dispatched by the kernel.

  Correct Answer  

True

  Your Answer   True

 

 Multiple Choice Single Answer  Question   UNIX operating system is written mostly in :-

  Correct Answer  

C language

  Your Answer   C++ language

 

 Multiple Choice Multiple Answer  Question   Security violations of the system can be categorized as :-

  Correct Answer  

Malicious , Accidental

  Your Answer   Malicious , Authorized

 

 Multiple Choice Single Answer  Question   The smallest addressable portion of a disk is :-

  Correct Answer  

Sector

  Your Answer   Sector

 

 Select The Blank

Page 35 of 72

Page 36: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

  Question   Associations are generally ________.

  Correct Answer  

Bidirectional

  Your Answer   Bidirectional

 

 Multiple Choice Multiple Answer  Question   Find out the human-interface devices :-

  Correct Answer  

Screen , Keyboard , Mouse

  Your Answer   Screen , Keyboard , Mouse

 

 Select The Blank  Question   ________allows us to define abstract operations on abstract data.

  Correct Answer  

Data abstraction

  Your Answer   Data abstraction

 

 Multiple Choice Multiple Answer  Question   Once the I/O is started , which two courses of action are possible?

  Correct Answer  

Synchronous I/O , Asynchronous I/O , Simple I/O

  Your Answer   Synchronous I/O , Asynchronous I/O , Simple I/O

  Multiple Choice Multiple Answer

  Question   In windows NT, naming of objects is of two types :-

  Correct Answer  

Permanent name , Temporary name

  Your Answer   Permanent name , Temporary name

 

 True/False  Question   Turnaround time is inversely proportional to throughput.

  Correct Answer  

True

  Your Answer   True

 

 Select The Blank  Question   The hardware to measure elapsed time to trigger operations is called a ________.

  Correct Answer  

Programmable interval timer

  Your Answer   Programmable elapsed timer

Page 36 of 72

Page 37: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

 

 Multiple Choice Multiple Answer  Question   User level threads are generally :-

  Correct Answer  

Fast to create , Easy to manage

  Your Answer   Fast to create , Easy to manage

 

 Multiple Choice Single Answer  Question   In MULTICS TLB address of 'n', the most recently referenced pages are kept, where

'n' can have a value :-  Correct Answer  

16

  Your Answer   16

 

 Multiple Choice Single Answer  Question   C++ is also named as

  Correct Answer  

C with classes

  Your Answer   C with classes

 

 Multiple Choice Multiple Answer  Question   Liner address is divided into fields like :-

  Correct Answer  

Dir , Page , Offset

  Your Answer   Dir , Page , Offset

 

 Multiple Choice Single Answer  Question   DVMA stands for :-

  Correct Answer  

Direct Virtual Memory Access

  Your Answer   Direct Virtual Memory Access

 

 True/False  Question   An asynchronous call returns immediately, without waiting for the I/O to complete.

  Correct Answer  

True

  Your Answer   True

LIST OF ATTEMPTED QUESTIONS AND ANSWERS  

Page 37 of 72

Page 38: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

 Multiple Choice Multiple Answer  Question   Kernel threads are generally :-

  Correct Answer  

Slower to create , Difficult to manage

  Your Answer   Slower to create , Difficult to manage

 

 Select The Blank  Question   If the user-supplied password matches the password stored in the system, the

system assumes that the user is ________.  Correct Answer  

Legitimate

  Your Answer   Legitimate

  Multiple Choice Single Answer

  Question   In general , the access matrix will be :-

  Correct Answer  

Sparse

  Your Answer   Sparse

 

 True/False  Question   Encryption is one common method of protecting information that is transmitted over

unreliable links.  Correct Answer  

True

  Your Answer   False

 

 Select The Blank  Question   A ________ is a full duplex connection between a device driver and a user-level

process.  Correct Answer  

Stream

  Your Answer   Stream

 

 Multiple Choice Single Answer  Question   In how many number of classes does the NRU algorithm divides pages, depending

on the state of R and M?  Correct Answer  

4

  Your Answer   8

  Select The Blank

  Question   The Pentium page size is fixed at ________ KB.

  Correct Answer  

4

Page 38 of 72

Page 39: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

  Your Answer   4

  True/False

  Question   Volatile storage loses its contents when the power to the device is removed.

  Correct Answer  

True

  Your Answer   True

 

 Multiple Choice Multiple Answer  Question   The movement of information between levels of a storage hierarchy may be of two

types depending on the hardware design and the controlling operating system software such as :-

  Correct Answer  

Explicit , Implicit

  Your Answer   Explicit , Implicit

  Select The Blank

  Question   In queuing diagram, the arrow indicates the flow of ________ in the system.

  Correct Answer  

Processes

  Your Answer   Processes

 

 Multiple Choice Multiple Answer  Question   What are the forms of malicious access?

  Correct Answer  

Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data

  Your Answer   Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data  

 Select The Blank  Question   A bit called the ________ , is added to the hardware of the computer to indicate the

current mode.  Correct Answer  

Mode bit

  Your Answer   Mode bit

 

 Multiple Choice Multiple Answer  Question   In Windows NT , kernel uses which two sets of objects?

  Correct Answer  

Dispatcher objects , Control objects

  Your Answer   Dispatcher objects , Complex objects

  Multiple Choice Single Answer

Page 39 of 72

Page 40: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

  Question   The smallest addressable portion of a disk is :-

  Correct Answer  

Sector

  Your Answer   Sector

 

 True/False  Question   In FIFO algorithm the page removed from memory is the one which most recently

used.  Correct Answer  

False

  Your Answer   False

 

 Select The Blank  Question   A process is ________, if it cannot affect or be affected by the other processes

executing in the system.  Correct Answer  

Independent

  Your Answer   Independent

 

 Multiple Choice Multiple Answer  Question   Linux presents standard interfaces to whom?

  Correct Answer  

Programmer , User

  Your Answer   Programmer , User , System administrator

  Select The Blank

  Question   The kernel module that controls a device is a ________ .

  Correct Answer  

Device driver

  Your Answer   Device daemon

  True/False

  Question   Whenever a trap or interrupt occurs, the hardware switches from user mode to monitor mode.

  Correct Answer  

True

  Your Answer   True

 

 Select The Blank  Question   A ________ is a computer or router that sits between the trusted and untrusted

systems.  Correct Answer  

Firewall

Page 40 of 72

Page 41: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

  Your Answer   Firewall

 

 Multiple Choice Multiple Answer  Question   Find out the basic I/O hardware elements from the following :-

  Correct Answer  

Ports , Buses , Device controllers

  Your Answer   Ports , Buses , Device controllers

  True/False

  Question   Object-oriented programming focuses on the integrated data and functionality as discrete units that have both knowledge (data) and capabilities (functions). Procedural programs, on the other hand, focus on functions and how they act on data.

  Correct Answer  

True

  Your Answer   True

  Match The FollowingQuestion Correct Answer Your Answer

User mode Mode bit 1 Mode bit 1

Serial port Modem Monitor mode

Parallel port Printer Printer

Privileged instructions Monitor mode Mode bit 0

 

 True/False  Question   In segmentation the total address space can exceed the size of physical memory.

  Correct Answer  

True

  Your Answer   False

 

 Multiple Choice Single Answer  Question   Because of the concept of independent objects responding to messages, object

orientation is a natural way to implement  Correct Answer  

Event driven programming

  Your Answer   Message deiven programming

 

 Multiple Choice Single Answer  Question   In UNIX, everything below the system-call interface and above the physical

hardware is the :-  Correct Answer  

Kernel

Page 41 of 72

Page 42: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

  Your Answer   I/O system

 

 Multiple Choice Multiple Answer  Question   Different multithreading models available are :-

  Correct Answer  

Many-to-one model , One-to-one model , Many-to-many model

  Your Answer   Many-to-one model , One-to-one model , Many-to-many model

  Multiple Choice Multiple Answer

  Question   An object type in windows NT is a system defined data type that has two things associated with it, which are they?

  Correct Answer  

Set of attributes , Set of methods

  Your Answer   Object-type , Object-processing

  Multiple Choice Multiple Answer

  Question   When memory reference occurs in MULTICS the things which takes place are :-

  Correct Answer  

Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address

  Your Answer   Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined  

 Multiple Choice Single Answer  Question   The interval from the time of submission of a process to the time of completion is :-

  Correct Answer  

Turnaround time

  Your Answer   Turnaround time

 

 True/False  Question   Context switch times are highly dependent on hardware support.

  Correct Answer  

True

  Your Answer   True

  True/False

  Question   Procedure and data can be distinguished and separately protected in segmentation

  Correct Answer  

True

  Your Answer   True

 

 Multiple Choice Multiple Answer

Page 42 of 72

Page 43: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

  Question   Dispatcher functions involves the following :-

  Correct Answer  

Switching context , Switching to user mode

  Your Answer   Switching context , Switching to user mode

 

 Multiple Choice Single Answer  Question   The First version of UNIX was developed in 1969 by Ken Thompson of the

Research Group at :-  Correct Answer  

Bell Laboratories

  Your Answer   Bell Laboratories

 

 Multiple Choice Single Answer  Question   In Object Oriented technology following expression is appropriate

  Correct Answer  

object=data+menthods

  Your Answer   object=data+menthods

 

 Multiple Choice Single Answer  Question   A procedure body implementing an operation is termed as

  Correct Answer  

Method

  Your Answer   Method

 

 Select The Blank  Question   During execution, ________ register holds the sector for the code segment.

  Correct Answer  

CS

  Your Answer   PS

 

 True/False  Question   In some operating system, spooling is managed by a system daemon process.

  Correct Answer  

True

  Your Answer   False

 

 Select The Blank  Question   Each column in the access matrix can be implemented as an ________ for one

object.  Correct Answer  

Access list

Page 43 of 72

Page 44: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

  Your Answer   Capability list

 

 Multiple Choice Single Answer  Question   Policies for resource use may vary depending on the :-

  Correct Answer  

Application

  Your Answer   System

  Multiple Choice Multiple Answer

  Question   A mailbox can be owned by :-

  Correct Answer  

Process , Operating system

  Your Answer   User , Process , Program

  Multiple Choice Single Answer

  Question   The ready queue is generally stored as a :-

  Correct Answer  

Linked list

  Your Answer   Queue

 

 Select The Blank  Question   A ________ is region of fast memory that hold copies of data .

  Correct Answer  

Cache

  Your Answer   Cache

 

 Multiple Choice Multiple Answer  Question   What are the components to memory management under Linux?

  Correct Answer  

Physical memory manager , Virtual memory manager

  Your Answer   Physical memory manager , Virtual memory manager

 

 Match The FollowingQuestion Correct Answer Your Answer

Bounded-buffer Fixed size buffer Fixed size buffer

Producer Produces process Produces process

Consumer Consumes process Consumes process

Unbounded-buffer No limit on size of buffer No limit on size of buffer

Page 44 of 72

Page 45: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

 

 True/False  Question   The inode contains 15 pointers to the disk blocks containing the data contents of the

file.  Correct Answer  

True

  Your Answer   True

 

 Multiple Choice Single Answer  Question   When computer is powered up or rebooted, it needs to have an initial program to

run. This initial program is known as :-  Correct Answer  

Bootstrap program

  Your Answer   Bootstrap program

LIST OF ATTEMPTED QUESTIONS AND ANSWERS  

 Multiple Choice Multiple Answer  Question   locate the transmission devices :-

  Correct Answer  

Network cards , Modems

  Your Answer   Tapes , Network cards , Modems

 

 True/False  Question   The user process issues a network I/O system call to send the character to the

remote machine.  Correct Answer  

True

  Your Answer   True

 

 Multiple Choice Single Answer  Question   The process by which objects of one class acquire properties of objects of other

class is called  Correct Answer  

Inheritance

  Your Answer   Inheritance

 

 True/False  Question   Windows NT uses a message passing implementation for I/O.

  Correct Answer  

True

  Your Answer   True

 

 Multiple Choice Multiple Answer

Page 45 of 72

Page 46: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

  Question   We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes?

  Correct Answer  

User mode , Monitor mode

  Your Answer   User mode , Monitor mode

  Match The FollowingQuestion Correct Answer Your Answer

Round-robin Time quantum Time quantum

First-come First-served First come job First come job

Shortest job Shortest job Shortest job

Priority Highest priority job Highest priority job

 

 Multiple Choice Single Answer  Question   The segment is :-

  Correct Answer  

Logical entity

  Your Answer   Logical entity

 

 Multiple Choice Single Answer  Question   In UNIX, decisions regarding which process to swap in or out are made by whom?

  Correct Answer  

Swapper

  Your Answer   Memory handler

 

 Select The Blank  Question   A ________ is a client-server mechanism that enables an application on one

machine to make a procedure call to code on another machine.  Correct Answer  

Remote-procedure-call

  Your Answer   Remote-procedure-call

 

 Multiple Choice Single Answer  Question   When each process that wants to communicate must explicitly name the recipient or

sender of the communication, then such communication is called as :-  Correct Answer  

Direct communication

  Your Answer   Indirect communication

 

 Select The Blank

Page 46 of 72

Page 47: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

  Question   In Linux, the allocator uses a ________ algorithm to keep track of available physical pages.

  Correct Answer  

Buddy-heap

  Your Answer   Binary-search

 

 Multiple Choice Single Answer  Question   What does the rows of the access matrix represents?

  Correct Answer  

Domains

  Your Answer   Domains

 

 Multiple Choice Single Answer  Question   Every change in policy requires a change in the underlying :-

  Correct Answer  

Mechanism

  Your Answer   System

 

 Select The Blank  Question   A ________ in NT is an object that provides a uniform interface for files, whether

they are local or remote.  Correct Answer  

Redirector

  Your Answer   Domain

 

 Multiple Choice Multiple Answer  Question   In Solaris 2, user-level threads may be:-

  Correct Answer  

Bound , Unbound

  Your Answer   Bound , Unbound

 

 Multiple Choice Multiple Answer  Question   An audit log records which things about an object ?

  Correct Answer  

Time , User , Type of access

  Your Answer   Time , User , Type of access

 

 Multiple Choice Multiple Answer  Question   One-to-one model is supported by following systems :-

  Correct Answer  

Windows NT , OS/2

Page 47 of 72

Page 48: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

  Your Answer   OS/2 , Windows NT

 

 Multiple Choice Multiple Answer  Question   To protect the system, we must take security measures at two levels, such as :-

  Correct Answer  

Physical level , Human level

  Your Answer   Human level , Global level

 

 Multiple Choice Single Answer  Question   If the process is waiting for some event to occur then it is said to be in :-

  Correct Answer  

Waiting state

  Your Answer   Waiting state

 

 Multiple Choice Single Answer  Question   A common representation for a discussion of process scheduling is a :-

  Correct Answer  

Queuing diagram

  Your Answer   Process state diagram

 

 True/False  Question   At Physical level, the site or sites containing the computer systems must be

physically secured against armed or surreptitious entry by intruders.  Correct Answer  

True

  Your Answer   True

 

 Select The Blank  Question   When you express user-system interaction, the scenario in the model is called

________  Correct Answer  

Case model

  Your Answer   Case model

  True/False

  Question   Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention.

  Correct Answer  

False

  Your Answer   True

 

 True/False

Page 48 of 72

Page 49: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

  Question   A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .

  Correct Answer  

False

  Your Answer   False

  Multiple Choice Single Answer

  Question   Polymorphism means ability to take

  Correct Answer  

More than one form

  Your Answer   More than one form

  True/False

  Question   Aging algorithm is based on LRU.

  Correct Answer  

True

  Your Answer   True

 

 Select The Blank  Question   The virtual memory portion of the NT executive is the ________.

  Correct Answer  

Virtual memory manager

  Your Answer   Virtual memory manager

  Multiple Choice Multiple Answer

  Question   There are two types of Message passing, they are :-

  Correct Answer  

Synchronous , Asynchronous

  Your Answer   Synchronous , Asynchronous

 

 Select The Blank  Question   Web servers use the ________ protocol to communicate with web browsers.

  Correct Answer  

http

  Your Answer   http

 

 Multiple Choice Multiple Answer  Question   The security of a system can be improved by two management techniques, such

as :-  Correct Answer  

Threat monitoring , Audit Log

  Your Answer   Audit Log , Threat finding

Page 49 of 72

Page 50: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

 

 Select The Blank  Question   The concept of protection levels and call gates were pioneered in MULTICS, where

they were viewed as protection ________.  Correct Answer  

Ring

  Your Answer   Ring

 

 True/False  Question   We say that a system is secure if its resources are used and accessed as intended

under all circumstances.  Correct Answer  

True

  Your Answer   True

 

 Select The Blank  Question   The ________ controller is the controller at the computer end of the bus.

  Correct Answer  

Host

  Your Answer   Cpu

 

 Multiple Choice Multiple Answer  Question   In Linux, the paging system can be divided into sections, namely:-

  Correct Answer  

Policy algorithm , Paging mechanism

  Your Answer   Policy algorithm , Paging mechanism

 

 True/False  Question   Keyboard is a sharable device.

  Correct Answer  

True

  Your Answer   False

 

 True/False  Question   Transfer of data from disk to memory is usually controlled by the operating system.

  Correct Answer  

True

  Your Answer   True

 

 True/False  Question   Prototyping not only helps to build a quality design but also enables the designer to

build the system decremantally.  Correct False

Page 50 of 72

Page 51: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

Answer    Your Answer   True

 

 Select The Blank  Question   The UNIX system uses ________ to avoid the necessity of keeping its password list

secret.  Correct Answer  

Encryption

  Your Answer   Encryption

 

 Match The FollowingQuestion Correct Answer Your Answer

Read-write devices Disks Disks

Dedicated devices Tape CD-ROM

Read-only devices CD-ROM Tape

Write-only devices Graphics controller Keyboard

 

 Multiple Choice Single Answer  Question   A procedure call, request to execute a method is termed as

  Correct Answer  

Message

  Your Answer   Message

 

 Select The Blank  Question   Context switch times are highly dependent on ________ support.

  Correct Answer  

Hardware

  Your Answer   Hardware

 

 Multiple Choice Multiple Answer  Question   Two main jobs of a computer are :-

  Correct Answer  

I/O , Processing

  Your Answer   I/O , Processing

 

 Multiple Choice Single Answer  Question   The 4.3BSD operating system is the version of :-

  Correct Answer  

UNIX

Page 51 of 72

Page 52: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

  Your Answer   UNIX

 

 Multiple Choice Single Answer  Question   The number of processes that are completed per time unit is called as:-

  Correct Answer  

Throughput of system

  Your Answer   Throughput of system

 

 Multiple Choice Multiple Answer  Question   Once the I/O is started , which two courses of action are possible?

  Correct Answer  

Synchronous I/O , Asynchronous I/O , Simple I/O

  Your Answer   Synchronous I/O , Asynchronous I/O

 

 Multiple Choice Multiple Answer  Question   Security violations of the system can be categorized as :-

  Correct Answer  

Malicious , Accidental

  Your Answer   Malicious , Accidental

 

 Select The Blank  Question   A process migrates between the various ________ throughout its lifetime.

  Correct Answer  

Scheduling queues

  Your Answer   Scheduling queues

LIST OF ATTEMPTED QUESTIONS AND ANSWERS  

 Multiple Choice Multiple Answer  Question   The Linux system is composed of three main bodies of code, in line with most

traditional UNIX implementations. Which are :-  Correct Answer  

Kernel , System libraries , System utilities

  Your Answer   System libraries , Programs , Kernel

 

 Multiple Choice Single Answer  Question   The class bird should have object

  Correct Egale

Page 52 of 72

Page 53: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

Answer    Your Answer   Egale

 

 Multiple Choice Single Answer  Question   Objects are essentially :-

  Correct Answer  

Abstract data type

  Your Answer   Abstract data type

 

 True/False  Question   Banker's algorithm is a deadlock-avoidance algorithm.

  Correct Answer  

True

  Your Answer   True

 

 True/False  Question   Aging algorithm is based on LRU.

  Correct Answer  

True

  Your Answer   False

 

 Select The Blank  Question   MULTICS uses a ________ in addition to file access for protection.

  Correct Answer  

Ring structure

  Your Answer   Ring structure

 

 True/False  Question   A virus is a fragment of code embedded in a legitimate program

  Correct Answer  

True

  Your Answer   True

 

 Multiple Choice Multiple Answer  Question   The basic hardware elements involved in I/O are :-

  Correct Answer  

Buses , Device controllers , Device

  Your Answer   Keyboard , Buses , Device controllers

 

 True/False

Page 53 of 72

Page 54: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

  Question   Main Memory is a volatile storage device that loses its contents when power is turned off.

  Correct Answer  

True

  Your Answer   True

 

 Select The Blank  Question   In queuing diagram , each rectangular box represents a ________.

  Correct Answer  

Queue

  Your Answer   Queue

 

 True/False  Question   Whenever a trap or interrupt occurs, the hardware switches from user mode to

monitor mode.  Correct Answer  

True

  Your Answer   True

 

 Multiple Choice Single Answer  Question   As process enter the system, they are put into :-

  Correct Answer  

Job queue

  Your Answer   Job queue

 

 Select The Blank  Question   During execution, ________ register holds the sector for the data segment.

  Correct Answer  

DS

  Your Answer   CS

 

 Multiple Choice Multiple Answer  Question   The role of the operating system in computer I/O is to :-

  Correct Answer  

Manage I/O operation and devices , Control I/O operation and devices

  Your Answer   Manage I/O operation and devices , Control I/O operation and devices

 

 Multiple Choice Multiple Answer  Question   What are the forms of malicious access?

  Correct Answer  

Unauthorized reading of data , Unauthorized modification of data , Unauthorized destruction of data

  Your Answer   Unauthorized reading of data , Unauthorized modification of data , Unauthorized

Page 54 of 72

Page 55: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

destruction of data  

 Select The Blank  Question   A ________ is a computer or router that sits between the trusted and untrusted

systems.  Correct Answer  

Firewall

  Your Answer   Firewall

 

 Multiple Choice Multiple Answer  Question   Dispatcher functions involves the following :-

  Correct Answer  

Switching context , Switching to user mode

  Your Answer   Switching context , Switching to user mode

 

 Multiple Choice Multiple Answer  Question   Many-to-may model is supported by following operating systems :-

  Correct Answer  

Solaris , IRIX , Digital UNIX

  Your Answer   IRIX , Solaris

 

 Select The Blank  Question   A ________ controller is built into each disk drive.

  Correct Answer  

Disk

  Your Answer   Disk

 

 Match The FollowingQuestion Correct Answer Your Answer

Parent process Child process Child process

Foreground processes Interactive processes Interactive processes

Background processes Batch processes Batch processes

Light-Weight processes Thread Thread

 

 Select The Blank  Question   A class may be thought of as 'data-type' and object as ________ of that data-type.

  Correct Answer  

Variable

  Your Answer   Variable

Page 55 of 72

Page 56: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

 

 True/False  Question   In Windows NT, interrupt object binds an interrupt service routine to an interrupt

source.  Correct Answer  

True

  Your Answer   True

 

 True/False  Question   In Windows NT, each process has one or more threads, which are the units of

execution dispatched by the kernel.  Correct Answer  

True

  Your Answer   True

 

 Multiple Choice Single Answer  Question   If Dog derives from Mammal, and Mammal derives from Animal, then -

  Correct Answer  

Dog inherits Animal's functions and data

  Your Answer   Mammal inherits Animal's functions and data

 

 Multiple Choice Single Answer  Question   If the process is waiting to be assigned to CPU then it is said to be in :-

  Correct Answer  

Ready state

  Your Answer   Ready state

 

 Multiple Choice Multiple Answer  Question   What are the components to memory management under Linux?

  Correct Answer  

Physical memory manager , Virtual memory manager

  Your Answer   Physical memory manager , Virtual memory manager

 

 Multiple Choice Multiple Answer  Question   The Moriss Internet Worm was made up of which of the two programs?

  Correct Answer  

Grappling hook program , Main program

  Your Answer   Target worm program , Grappling hook program

 

 Select The Blank  Question   The ________ controller is the controller at the computer end of the bus.

  Correct Host

Page 56 of 72

Page 57: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

Answer    Your Answer   Disk

 

 True/False  Question   In Windows NT, kernel is object-oriented.

  Correct Answer  

True

  Your Answer   True

 

 Multiple Choice Single Answer  Question   C++ is basically a procedural language having extension of

  Correct Answer  

Object Oriented technology

  Your Answer   Graphic user interface

 

 Select The Blank  Question   In queuing diagram, the arrow indicates the flow of ________ in the system.

  Correct Answer  

Processes

  Your Answer   Operation

 

 True/False  Question   Whenever the operating system gains control of the computer, it is in monitor mode.

  Correct Answer  

True

  Your Answer   True

 

 Multiple Choice Single Answer  Question   C++ is also named as

  Correct Answer  

C with classes

  Your Answer   Visual C++

 

 Multiple Choice Single Answer  Question   The number of processes that are completed per time unit is called as:-

  Correct Answer  

Throughput of system

  Your Answer   Efficiency of system

 

 Select The Blank

Page 57 of 72

Page 58: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

  Question   A process is ________ if it can affect or be affected by the other processes executing in the system.

  Correct Answer  

Cooperating

  Your Answer   Competing

 

 Multiple Choice Single Answer  Question   Collection of similar datatypes is called as

  Correct Answer  

Array

  Your Answer   Array

 

 Match The FollowingQuestion Correct Answer Your Answer

Random-access devices CD-ROM CD-ROM

Character devices. Terminal Terminal

Block devices Disk Disk

Sequential devices Modem Modem

 

 Multiple Choice Multiple Answer  Question   The device number consists of which two parts in UNIX?

  Correct Answer  

Major device number , Minor device number

  Your Answer   Device-id , Device-name

 

 Multiple Choice Single Answer  Question   The pure Object Oriented language is

  Correct Answer  

Java

  Your Answer   C

 

 Multiple Choice Single Answer  Question   The concept of OOPS was first introduced in

  Correct Answer  

Simula Language

  Your Answer   C language

 

 Multiple Choice Multiple Answer  Question   Most CPUs have two interrupt request lines. Which are they?

Page 58 of 72

Page 59: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

  Correct Answer  

Maskable , Non maskable

  Your Answer   Maskable , Non maskable

 

 Multiple Choice Multiple Answer  Question   Different multithreading models available are :-

  Correct Answer  

Many-to-one model , One-to-one model , Many-to-many model

  Your Answer   Many-to-one model , One-to-one model , Many-to-many model

 

 Select The Blank  Question   The ________ of a process is represented in the PCB of a process.

  Correct Answer  

Context

  Your Answer   Block

LIST OF ATTEMPTED QUESTIONS AND ANSWERS  

 Multiple Choice Single Answer  Question   SCSI stands for :-

  Correct Answer  

Small Computer-Systems Interface

  Your Answer   Small Computer-Systems Interface

  Multiple Choice Multiple Answer

  Question   The basic hardware elements involved in I/O are :-

  Correct Answer  

Buses , Device controllers , Device

  Your Answer   Buses , Device controllers , Device

 

 True/False  Question   A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .

  Correct Answer  

False

  Your Answer   False

  True/False

  Question   C++ supports object oriented programming concepts of objects, classes, inheritance, polymorphism and parameterised datatypes.

  Correct Answer  

True

Page 59 of 72

Page 60: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

  Your Answer   True

 

 True/False  Question   I/O system calls are costly in terms of CPU consumptions.

  Correct Answer  

True

  Your Answer   True

 

 Multiple Choice Single Answer  Question   All user processes are descendents of one original process, Which is that process?

  Correct Answer  

Init process

  Your Answer   Init process

  Match The FollowingQuestion Correct Answer Your Answer

Provides adjustment while compiling classes

Interface classes Derived function

Identify values & relevant operations

Abstract data types Abstract data types

Complete implementation of class

Concrete data types Interface classes

Provides framework for other classes

Node classes Node classes

 

 Match The FollowingQuestion Correct Answer Your Answer

Round-robin Time quantum Time quantum

First-come First-served First come job First come job

Shortest job Shortest job Shortest job

Priority Highest priority job Highest priority job

  Select The Blank

  Question   ________ describes segments local to each program, including its code, data, stack etc.

  Correct Answer  

LDT

  Your Answer   LDT

 

 Multiple Choice Multiple Answer  Question   To protect the system, we must take security measures at two levels, such as :-

  Correct Physical level , Human level

Page 60 of 72

Page 61: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

Answer    Your Answer   Physical level , Human level

 

 True/False  Question   The hardware allows privileged instructions to be executed in only user mode.

  Correct Answer  

False

  Your Answer   False

 

 Multiple Choice Single Answer  Question   What does the rows of the access matrix represents?

  Correct Answer  

Domains

  Your Answer   Domains

 

 Select The Blank  Question   A bit called the ________ , is added to the hardware of the computer to indicate the

current mode.  Correct Answer  

Mode bit

  Your Answer   Mode bit

  True/False

  Question   In Windows NT, each process has one or more threads, which are the units of execution dispatched by the kernel.

  Correct Answer  

True

  Your Answer   True

  Select The Blank

  Question   ________allows us to define abstract operations on abstract data.

  Correct Answer  

Data abstraction

  Your Answer   Data abstraction

 

 Select The Blank  Question   If the granularity field is ________ the limit field is the exact segment size, upto 1 MB.

  Correct Answer  

0

  Your Answer   1

  True/False

  Question   Encryption is one common method of protecting information that is transmitted over unreliable links.

Page 61 of 72

Page 62: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

  Correct Answer  

True

  Your Answer   True

 

 Multiple Choice Single Answer  Question   Collection of similar datatypes is called as

  Correct Answer  

Array

  Your Answer   Array

 

 Multiple Choice Single Answer  Question   A Process which produces process is known as :-

  Correct Answer  

Producer

  Your Answer   Producer

 

 Multiple Choice Single Answer  Question   Interrupt mechanism accepts an address and this address is an offset in a table

called the :-  Correct Answer  

Interrupt vector

  Your Answer   Interrupt vector

 

 Select The Blank  Question   The process could create a new ________ and wait for its termination.

  Correct Answer  

Sub process

  Your Answer   Sub process

 

 Multiple Choice Single Answer  Question   Thread at user level is known as :-

  Correct Answer  

User thread

  Your Answer   User thread

  Multiple Choice Single Answer

  Question   If Dog derives from Mammal, and Mammal derives from Animal, then -

  Correct Answer  

Dog inherits Animal's functions and data

  Your Answer   Mammal inherits Animal's functions and data

 

 Select The Blank

Page 62 of 72

Page 63: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

  Question   During execution, ________ register holds the sector for the code segment.

  Correct Answer  

CS

  Your Answer   DS

 

 Multiple Choice Single Answer  Question   The list of processes waiting for a particular I/O device is called a :-

  Correct Answer  

Device queue

  Your Answer   Device queue

  True/False

  Question   Cache is a faster storage system which stores data temporarily.

  Correct Answer  

True

  Your Answer   True

 

 True/False  Question   The file system does not provide a degree of protection.

  Correct Answer  

False

  Your Answer   True

 

 Multiple Choice Multiple Answer  Question   Liner address is divided into fields like :-

  Correct Answer  

Dir , Page , Offset

  Your Answer   Dir , Page , Offset

 

 True/False  Question   Volatile storage loses its contents when the power to the device is removed.

  Correct Answer  

True

  Your Answer   True

 

 Multiple Choice Single Answer  Question   Which of the following Operating System has no memory protection ?

  Correct Answer  

Windows 3.1

  Your Answer   Windows 3.1

 

Page 63 of 72

Page 64: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

 Multiple Choice Multiple Answer  Question   In windows NT, naming of objects is of two types :-

  Correct Answer  

Permanent name , Temporary name

  Your Answer   Permanent name , Temporary name

  Multiple Choice Single Answer

  Question   Protection can no longer be considered solely as a matter of concern to the designer of :-

  Correct Answer  

Operating system

  Your Answer   Operating system

 

 Select The Blank  Question   Web servers use the ________ protocol to communicate with web browsers.

  Correct Answer  

http

  Your Answer   http

 

 Multiple Choice Multiple Answer  Question   locate the transmission devices :-

  Correct Answer  

Network cards , Modems

  Your Answer   Network cards , Modems

 

 Multiple Choice Single Answer  Question   In UNIX, the simplest form of communication between processes is by :-

  Correct Answer  

Pipes

  Your Answer   Pipes

 

 Select The Blank  Question   A ________ is a group of NT server machines that share a common security policy

and user databases.  Correct Answer  

Domain

  Your Answer   Domain

 

 Multiple Choice Multiple Answer  Question   Message passing may be :-

  Correct Answer  

Blocking , Non-blocking

  Your Answer   Blocking , Non-blocking

Page 64 of 72

Page 65: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

 

 Multiple Choice Multiple Answer  Question   An object type in windows NT is a system defined data type that has two things

associated with it, which are they?  Correct Answer  

Set of attributes , Set of methods

  Your Answer   Set of attributes , Set of methods

  Select The Blank

  Question   The ________ of a process is represented in the PCB of a process.

  Correct Answer  

Context

  Your Answer   Context

 

 Select The Blank  Question   The Linux ________ file system, known as the proc file system, is an example of a

file system whose contents are not actually stored anywhere, but are rather computed on demand according to user file I/o requests.

  Correct Answer  

Process

  Your Answer   Process

 

 True/False  Question   Objects can be both, tangible or intangible.

  Correct Answer  

True

  Your Answer   True

 

 Multiple Choice Multiple Answer  Question   In UNIX, a device is distinguished by two things, which are :-

  Correct Answer  

Device-class , Device number

  Your Answer   Device-class , Device number

 

 Multiple Choice Multiple Answer  Question   Find out the basic I/O hardware elements from the following :-

  Correct Answer  

Ports , Buses , Device controllers

  Your Answer   Ports , Buses , Device controllers

 

 Multiple Choice Multiple Answer  Question   Which are the Division D security systems ?

  Correct Windows 3.1 , MS-DOS

Page 65 of 72

Page 66: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

Answer    Your Answer   Windows 3.1 , MS-DOS

 

 Multiple Choice Single Answer  Question   Protection can improve :-

  Correct Answer  

Reliability

  Your Answer   Reliability

  Select The Blank

  Question   The creating process is called a ________ process.

  Correct Answer  

Parent

  Your Answer   Parent

 

 Multiple Choice Multiple Answer  Question   When memory reference occurs in MULTICS the things which takes place are :-

  Correct Answer  

Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address

  Your Answer   Segment number is used to find segment descriptor , Check is made to see if segment's page table is in memory , Page table entry for requested virtual page is examined , Offset is added to the page origin to give main memory address

LIST OF ATTEMPTED QUESTIONS AND ANSWERS True/FalseQuestion: An asynchronous call returns immediately, without waiting for the I/O to complete.Correct Answer: TrueYour Answer: True True/FalseQuestion: Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention.Correct Answer: FalseYour Answer: False Select The BlankQuestion: The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________.Correct Answer: RingYour Answer: Ring

Page 66 of 72

Page 67: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

Multiple Choice Single AnswerQuestion: A domain is a collection of :-Correct Answer: Access rightsYour Answer: Protection policies Match The FollowingQuestion: Correct Answer Your AnswerVolatile Memory Primary memory RAMCPU registers Volatile storage Primary memoryMagnetic disks Non volatile storage Non volatile storageFloppy disk Secondary storage Secondary storage

Multiple Choice Single AnswerQuestion: Each object has a unique :-Correct Answer: NameYour Answer: Name True/FalseQuestion: Once class is defined we can create limited number of objects belonging to that class.Correct Answer: FalseYour Answer: False Multiple Choice Multiple AnswerQuestion: A mailbox can be owned by :-Correct Answer: Process , Operating system Your Answer: User , Process Multiple Choice Single AnswerQuestion: C++ is basically a procedural language having extension ofCorrect Answer: Object Oriented technologyYour Answer: Object Oriented technology True/FalseQuestion: In Lock-key mechanism, users are allowed to examine or modify the list of keys or locks directly.Correct Answer: FalseYour Answer: False Multiple Choice Multiple AnswerQuestion: Most CPUs have two interrupt request lines. Which are they?Correct Answer: Maskable , Non maskable Your Answer: Maskable , Non maskable Match The Following

Page 67 of 72

Page 68: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

Question: Correct Answer: Your Answer:We can define abstract Data abstraction Data abstractionoperation on abstract dataProcess of sharing properties of the Inheritance Inheritancehigher level object or classAbility to inherit attributes and Multiple inheritance Multiple inheritancemethods from 2 or more objects or classesAbility to send a message to several Ploymorphism Ploymorphismobjects and to allow receiving objectto respond method specified on the object. Select The BlankQuestion: The ________ is a layer of software that hides hardware differences from upper levels of the operating system.Correct Answer: Hardware abstraction layerYour Answer: Hardware abstraction layer Multiple Choice Single AnswerQuestion: The ready queue is generally stored as a :-Correct Answer: Linked listYour Answer: Queue

Multiple Choice Single AnswerQuestion: How big is a class object?Correct Answer: Is as big as sum of the sizes of its member variablesYour Answer: Is as big as sum of the sizes of its member variables True/FalseQuestion: In FIFO algorithm the page removed from memory is the one which most recently used.Correct Answer: FalseYour Answer: False True/FalseQuestion: I/O system calls are costly in terms of CPU consumptions.Correct Answer: TrueYour Answer: True Multiple Choice Single AnswerQuestion: Policies for resource use may be subject to change over :-Correct Answer: TimeYour Answer: Time True/False

Page 68 of 72

Page 69: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

Question: A functionality prototype can be designed that does not have the final user interface, but allows users to try out various features, such as forwarding messages or attaching files without worrying about the final interface.Correct Answer: TrueYour Answer: True

Multiple Choice Single AnswerQuestion: The main difference between structure and class isCorrect Answer: Structure does not support OOPS Class Supports OOPS.Your Answer: Structure does not support OOPS Class Supports OOPS. Multiple Choice Single AnswerQuestion: The First version of UNIX was developed in 1969 by Ken Thompson of the Research Group at :-Correct Answer: Bell LaboratoriesYour Answer: Bell Laboratories

Multiple Choice Single AnswerQuestion: Collection of similar datatypes is called asCorrect Answer: ArrayYour Answer: Array Multiple Choice Single AnswerQuestion: The pure Object Oriented language isCorrect Answer: JavaYour Answer: Java Multiple Choice Single AnswerQuestion: The concept of OOPS was first introduced inCorrect Answer: Simula LanguageYour Answer: Simula Language Multiple Choice Single AnswerQuestion: The class bird should have objectCorrect Answer: EgaleYour Answer: Egale Select The BlankQuestion: ________ of an object remains unchanged even though its state and properties change.Correct Answer: IdentityYour Answer: Location Multiple Choice Multiple Answer

Page 69 of 72

Page 70: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

Question: The Linux system is composed of three main bodies of code, in line with most traditional UNIX implementations. Which are :-Correct Answer: Kernel , System libraries , System utilities Your Answer: Kernel , System libraries , System utilities Multiple Choice Multiple AnswerQuestion: An audit log records which things about an object ?Correct Answer: Time , User , Type of access Your Answer: User , Type of access , Operation Select The BlankQuestion: The virtual memory portion of the NT executive is the ________.Correct Answer: Virtual memory managerYour Answer: Page-memory manager Multiple Choice Single AnswerQuestion: A system consists of collection of :-Correct Answer: ProcessesYour Answer: Procedures Multiple Choice Multiple AnswerQuestion: Linux presents standard interfaces to whom?Correct Answer: Programmer , User Your Answer: Programmer , User Multiple Choice Multiple AnswerQuestion: Most computers have hardware clocks and timers that provide three basic functions, such as :-Correct Answer: Give the current time , Give the elapsed time , Set a timer to trigger operation at certain time Your Answer: Give the current time , Give the elapsed time , Set a timer to trigger operation at certain time Select The BlankQuestion: The UNIX system uses ________ to avoid the necessity of keeping its password list secret.Correct Answer: EncryptionYour Answer: Encryption Multiple Choice Single AnswerQuestion: A solution to the problem of indefinite blockage of low-priority processes in Priority scheduling is :-Correct Answer: AgingYour Answer: Starvation Multiple Choice Multiple Answer

Page 70 of 72

Page 71: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

Question: In a uniprocessor system, there is :-Correct Answer: Single processor , Single running process Your Answer: Single processor , Single running process Multiple Choice Single AnswerQuestion: The process by which objects of one class acquire properties of objects of other class is calledCorrect Answer: InheritanceYour Answer: Inheritance Select The BlankQuestion: A segment shorter than ________ M will have a page directory with single entry, a pointer to its one and only page table.Correct Answer: 4Your Answer: 8 Multiple Choice Single AnswerQuestion: If Dog derives from Mammal, and Mammal derives from Animal, then -Correct Answer: Dog inherits Animal's functions and dataYour Answer: Dog inherits Animal's functions and data

Multiple Choice Multiple AnswerQuestion: Passwords can be generated by :-Correct Answer: System , User Your Answer: System , User , Password software Multiple Choice Multiple AnswerQuestion: kernel threads are supported by following operating systems :-Correct Answer: Windows NT , Solaris , Digital UNIX Your Answer: Windows NT , Solaris , Digital UNIX Select The BlankQuestion: The hardware to measure elapsed time to trigger operations is called a ________.Correct Answer: Programmable interval timerYour Answer: Hardware timer Multiple Choice Multiple AnswerQuestion: In Windows NT , kernel uses which two sets of objects?Correct Answer: Dispatcher objects , Control objects Your Answer: Dispatcher objects , Control objects True/FalseQuestion: Firewall monitors and logs all connections.Correct Answer: TrueYour Answer: True

Page 71 of 72

Page 72: SCDL - Operating Systems

SCDL – 3rd Semester – Operating Systems

Select The BlankQuestion: During execution, ________ register holds the sector for the code segment.Correct Answer: CSYour Answer: CS Select The BlankQuestion: The creating process is called a ________ process.Correct Answer: ParentYour Answer: Parent True/FalseQuestion: Objects can not interact unless they know the details of each others data or code.Correct Answer: FalseYour Answer: False Select The BlankQuestion: Web servers use the ________ protocol to communicate with web browsers.Correct Answer: httpYour Answer: http

Page 72 of 72


Recommended