Академический Документы
Профессиональный Документы
Культура Документы
com/search/label/Database%20Management%20
System
Question
Which of the following Operating System has no memory protection ?
Correct Answer
Windows 3.1
Question
The main difference between structure and class is
Correct Answer
Structure does not support OOPS Class Supports OOPS.
Question
DMA stands for :-
Correct Answer
Direct Memory Access
Question
A major problem with the Priority scheduling algorithm is :-
Correct Answer
Starvation
Question
How big is a class object?
Correct Answer
Is as big as sum of the sizes of its member variables
Question
The First version of UNIX was developed in 1969 by Ken Thompson of the
Research Group at :-
Correct Answer
Bell Laboratories
Multiple Choice Single Answer
Question
When computer is powered up or rebooted, it needs to have an initial
program to run. This initial program is known as :-
Correct Answer
Bootstrap program
True/False
Question
LRU algorithm can not be implemented without special hardware.
Correct Answer
True
Question
The Solaris developers reimplemented the ________ using in-kernel thread
to eliminate the context switch involved in moving each character between
daemons and the kernel.
Correct Answer
Telnet daemon
True/False
Question
An asynchronous call returns immediately, without waiting for the I/O to
complete.
Correct Answer
True
Your Answer
True
True/False
Question
Modem is a random-access device.
Correct Answer
False
Your Answer
False
True/False
Question
A major security problem for operating system is authentication.
Correct Answer
True
Your Answer
True
True/False
Question
In a blocking system call, the application is moved from the OS's run queue
to a wait queue.
Correct Answer
True
Your Answer
True
True/False
Question
Device speeds range from a few bytes per second to a few gigabytes per
second.
Correct Answer
True
Your Answer
True
True/False
Question
Applications normally access block devices through a file system interface.
Correct Answer
True
Your Answer
True
True/False
Question
The user process issues a network I/O system call to send the character to
the remote machine.
Correct Answer
True
Your Answer
True
True/False
Question
Windows NT uses a message passing implementation for I/O.
Correct Answer
True
Your Answer
True
True/False
Question
At Physical level, the site or sites containing the computer systems must be
physically secured against armed or surreptitious entry by intruders.
Correct Answer
True
Your Answer
True
True/False
Question
Data transfer from cache to CPU and registers is usually a software function,
with little operating system intervention.
Correct Answer
False
Your Answer
True
True/False
Question
A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX .
Correct Answer
False
Your Answer
False
True/False
Question
Aging algorithm is based on LRU.
Correct Answer
True
Your Answer
True
True/False
Question
We say that a system is secure if its resources are used and accessed as
intended under all circumstances.
Correct Answer
True
Your Answer
True
True/False
Question
Keyboard is a sharable device.
Correct Answer
True
Your Answer
False
True/False
Question
Transfer of data from disk to memory is usually controlled by the operating
system.
Correct Answer
True
Your Answer
True
True/False
Question
Prototyping not only helps to build a quality design but also enables the
designer to build the system decremantally.
Correct Answer
False
Your Answer
True
True/False
Question
One way to achieve portability is to write software in standard version of
high level language and to develop portable system and application software
.
Correct Answer
True
Your Answer
True
True/False
Question
In Public Key Encryption, each user has both a public and a private key.
Correct Answer
True
Your Answer
True
True/False
Question
Data transfer from cache to CPU and registers is usually a software function,
with little operating system intervention.
Correct Answer
False
Your Answer
False
True/False
Question
At system boot time, the hardware starts in monitor mode.
Correct Answer
True
Your Answer
True
True/False
Question
The hardware allows privileged instructions to be executed in only user
mode.
Correct Answer
False
Your Answer
False
Multiple Choice Multiple Answer
Question
An object type in windows NT is a system defined data type that has two
things associated with it, which are they?
Correct Answer
Set of attributes , Set of methods
Your Answer
Set of attributes , Set of methods
True/False
Question
OOSAD approach is applicable only to stable systems.
Correct Answer
False
Your Answer
False
True/False
Question
Segment length may change during execution.
Correct Answer
True
Your Answer
True
True/False
Question
At Human level, user must be screened carefully so that the chance of
authorizing a user who then gives access to an intruder is reduced.
Correct Answer
True
Your Answer
True
True/False
Question
The user process issues a network I/O system call to send the character to
the remote machine.
Correct Answer
True
Your Answer
False