Professional Documents
Culture Documents
Operating System | 1
Question pioneered in MULTICS, where they were viewed as
The Solaris developers reimplemented the ________ protection ________.
using in-kernel thread to eliminate the context Correct Answer
switch involved in moving each character between Ring
daemons and the kernel. Your Answer
Correct Answer Ring
Telnet daemon
Your Answer Multiple Choice Multiple Answer
Telnet daemon Question
In Linux, the main objects defined by the virtual file
Multiple Choice Single Answer system are :-
Question Correct Answer
All user processes are descendents of one original Inode-object , File-object , File-system object
process, Which is that process? Your Answer
Correct Answer Inode-object , File-object , File-system object
Init process
Your Answer Multiple Choice Single Answer
Init process Question
Collection of similar datatypes is called as
Select The Blank Correct Answer
Question Array
Terminals and line printers are ________ . Your Answer
Correct Answer Array
Character devices
Your Answer Multiple Choice Multiple Answer
Character devices Question
We need two separate modes of operation to
Multiple Choice Multiple Answer protect the operating system and all other
Question programs and their data from malfunctioning
Many-to-may model is supported by following program. Which are those modes?
operating systems :- Correct Answer
Correct Answer User mode , Monitor mode
Solaris , IRIX , Digital UNIX Your Answer
Your Answer User mode , Monitor mode
Solaris , IRIX , Digital UNIX
Match The Following
Multiple Choice Multiple Answer Question
Question Correct Answer
find out the services provided by kernel related to Your Answer
I/O : Class Shape
Correct Answer Triangle, rectangle, circle, ellipse
I/O Scheduling , Buffering , Spooling Triangle, rectangle, circle, ellipse
Your Answer Class Vehicle
I/O Scheduling , Buffering , Spooling Scooter, car, truck, tractor
Scooter, car, truck, tractor
Multiple Choice Single Answer Class Animal
Question Cat, dog, cow, tiger
The long-term scheduler controls the :- Cat, dog, cow, tiger
Correct Answer Class Color
Degree of multiprogramming Red, yellow, blue, green
Your Answer Red, yellow, blue, green
Degree of multiprogramming
Select The Blank
Select The Blank Question
Question The virtual memory portion of the NT executive is
The concept of protection levels and call gates were the ________.
Operating System | 2
Correct Answer True
Virtual memory manager Your Answer
Your Answer True
Virtual memory manager
True/False
True/False Question
Question In a blocking system call, the application is moved
An asynchronous call returns immediately, without from the OS's run queue to a wait queue.
waiting for the I/O to complete. Correct Answer
Correct Answer True
True Your Answer
Your Answer True
True
True/False
True/False Question
Question Device speeds range from a few bytes per second
Modem is a random-access device. to a few gigabytes per second.
Correct Answer Correct Answer
False True
Your Answer Your Answer
False True
Operating System | 3
Job queue Sparse
Your Answer Your Answer
Job queue Sparse
Operating System | 4
LIST OF ATTEMPTED QUESTIONS AND ANSWERS Multiple Choice Single Answer
Question
Multiple Choice Multiple Answer The segment is :-
Question Correct Answer
locate the transmission devices :- Logical entity
Correct Answer Your Answer
Network cards , Modems Logical entity
Your Answer
Tapes , Network cards , Modems Multiple Choice Single Answer
Question
True/False In UNIX, decisions regarding which process to swap
Question in or out are made by whom?
The user process issues a network I/O system call to Correct Answer
send the character to the remote machine. Swapper
Correct Answer Your Answer
True Memory handler
Your Answer
True Select The Blank
Question
Multiple Choice Single Answer A ________ is a client-server mechanism that enables
Question an application on one machine to make a procedure
The process by which objects of one class acquire call to code on another machine.
properties of objects of other class is called Correct Answer
Correct Answer Remote-procedure-call
Inheritance Your Answer
Your Answer Remote-procedure-call
Inheritance
Multiple Choice Single Answer
True/False Question
Question When each process that wants to communicate
Windows NT uses a message passing must explicitly name the recipient or sender of the
implementation for I/O. communication, then such communication is called
Correct Answer as :-
True Correct Answer
Your Answer Direct communication
True Your Answer
Indirect communication
Multiple Choice Multiple Answer
Question Select The Blank
We need two separate modes of operation to Question
protect the operating system and all other In Linux, the allocator uses a ________ algorithm to
programs and their data from malfunctioning keep track of available physical pages.
program. Which are those modes? Correct Answer
Correct Answer Buddy-heap
User mode , Monitor mode Your Answer
Your Answer Binary-search
User mode , Monitor mode
Multiple Choice Single Answer
Match The Following Question
Question What does the rows of the access matrix
Correct Answer represents?
Your Answer Correct Answer
Round-robin Domains
Time quantum Your Answer
Time quantum Domains
First-come First-served
First come job Multiple Choice Single Answer
First come job Question
Shortest job Every change in policy requires a change in the
Shortest job underlying :-
Shortest job Correct Answer
Priority Mechanism
Highest priority job Your Answer
Highest priority job System
Operating System | 5
Select The Blank against armed or surreptitious entry by intruders.
Question Correct Answer
A ________ in NT is an object that provides a uniform True
interface for files, whether they are local or remote. Your Answer
Correct Answer True
Redirector
Your Answer Select The Blank
Domain Question
When you express user-system interaction, the
Multiple Choice Multiple Answer scenario in the model is called ________
Question Correct Answer
In Solaris 2, user-level threads may be:- Case model
Correct Answer Your Answer
Bound , Unbound Case model
Your Answer
Bound , Unbound True/False
Question
Multiple Choice Multiple Answer Data transfer from cache to CPU and registers is
Question usually a software function, with little operating
An audit log records which things about an object ? system intervention.
Correct Answer Correct Answer
Time , User , Type of access False
Your Answer Your Answer
Time , User , Type of access True
Operating System | 15
True/False Maskable , Non maskable
Question
An I/O bound process spend more of its time doing True/False
I/O than it spends doing computations. Question
Correct Answer The I/O scheduler rearranges the order of the queue
True to improve the overall system efficiency and the
Your Answer average response time experienced by application
True Correct Answer
True
Multiple Choice Single Answer Your Answer
Question True
It has been said that Pascal and C programs are
collections of procedures and C++ programs are Multiple Choice Single Answer
collections of Question
Correct Answer How big is a class object?
Classes Correct Answer
Your Answer Is as big as sum of the sizes of its member variables
Classes Your Answer
Is as big as sum of the sizes of its member variables
Multiple Choice Single Answer
Question Multiple Choice Single Answer
The process by which objects of one class acquire Question
properties of objects of other class is called In UNIX, files are organized in tree-structured :-
Correct Answer Correct Answer
Inheritance Directories
Your Answer Your Answer
Inheritance Directories
True/False True/False
Question Question
To perform a disk I/O operation, the computer Encryption is one common method of protecting
places a command into the host controller, typically information that is transmitted over unreliable links.
using memory-mapped I/O ports. Correct Answer
Correct Answer True
True Your Answer
Your Answer False
True
Select The Blank
Multiple Choice Single Answer Question
Question A ________ is a full duplex connection between a
The number of processes that are completed per device driver and a user-level process.
time unit is called as:- Correct Answer
Correct Answer Stream
Throughput of system Your Answer
Your Answer Stream
Efficiency of system
Multiple Choice Single Answer
Multiple Choice Single Answer Question
Question In how many number of classes does the NRU
In MULTICS TLB address of 'n', the most recently algorithm divides pages, depending on the state of
referenced pages are kept, where 'n' can have a R and M?
value :- Correct Answer
Correct Answer 4
16 Your Answer
Your Answer 8
8
Select The Blank
True/False Question
Question The Pentium page size is fixed at ________ KB.
The job of I/O channel is to offload I/O work from the Correct Answer
main CPU. 4
Correct Answer Your Answer
True 4
Your Answer
False True/False
Question
Volatile storage loses its contents when the power
Operating System | 25
to the device is removed. Question
Correct Answer In FIFO algorithm the page removed from memory
True is the one which most recently used.
Your Answer Correct Answer
True False
Your Answer
Multiple Choice Multiple Answer False
Question
The movement of information between levels of a Select The Blank
storage hierarchy may be of two types depending Question
on the hardware design and the controlling A process is ________, if it cannot affect or be
operating system software such as :- affected by the other processes executing in the
Correct Answer system.
Explicit , Implicit Correct Answer
Your Answer Independent
Explicit , Implicit Your Answer
Independent
Select The Blank
Question Multiple Choice Multiple Answer
In queuing diagram, the arrow indicates the flow of Question
________ in the system. Linux presents standard interfaces to whom?
Correct Answer Correct Answer
Processes Programmer , User
Your Answer Your Answer
Processes Programmer , User , System administrator
True/False True/False
Question A computer system without Question Errors in documentation give rise
system software can not function to fatal results.
Correct Answer True Correct Answer True
Your Answer True Your Answer False
Operating System | 49