Computer Science Objective

  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Computer Science Objective as PDF for free.

More details

  • Words: 3,787
  • Pages: 29
http://scdlpapers.blogspot.com/search/label/Database%20Management%20 System

LIST OF ATTEMPTED QUESTIONS AND ANSWERS Firewall monitors and logs all connections. Correct Answer True Question Which of the following Operating System has no memory protection ? Correct Answer Windows 3.1 Question The main difference between structure and class is Correct Answer Structure does not support OOPS Class Supports OOPS. Question DMA stands for :Correct Answer Direct Memory Access Question A major problem with the Priority scheduling algorithm is :Correct Answer Starvation Question How big is a class object? Correct Answer Is as big as sum of the sizes of its member variables Question The First version of UNIX was developed in 1969 by Ken Thompson of the Research Group at :Correct Answer Bell Laboratories

Multiple Choice Single Answer Question When computer is powered up or rebooted, it needs to have an initial program to run. This initial program is known as :Correct Answer Bootstrap program Processes represents the executions of single programs whereas threads represent separate, concurrent execution contexts within a single process running a single program. Correct Answer True Multiple Choice Single Answer Question If Dog derives from Mammal, and Mammal derives from Animal, then Correct Answer Dog inherits Animal's functions and data Multiple Choice Single Answer Question The wraping up of data and methods in a single unit (class) is known as : Correct Answer Encapsulation True/False Question LRU algorithm can not be implemented without special hardware. Correct Answer True Question The Solaris developers reimplemented the ________ using in-kernel thread to eliminate the context switch involved in moving each character between daemons and the kernel. Correct Answer Telnet daemon Multiple Choice Single Answer Question All user processes are descendents of one original process, Which is that process? Correct Answer

Init process Select The Blank Question Terminals and line printers are ________ . Correct Answer Character devices Multiple Choice Multiple Answer Question Many-to-may model is supported by following operating systems :Correct Answer Solaris , IRIX , Digital UNIX Your Answer Solaris , IRIX , Digital UNIX Multiple Choice Multiple Answer Question find out the services provided by kernel related to I/O : Correct Answer I/O Scheduling , Buffering , Spooling Your Answer I/O Scheduling , Buffering , Spooling Multiple Choice Single Answer Question The long-term scheduler controls the :Correct Answer Degree of multiprogramming Your Answer Degree of multiprogramming Select The Blank Question The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________. Correct Answer Ring Your Answer Ring Multiple Choice Multiple Answer Question In Linux, the main objects defined by the virtual file system are :-

Correct Answer Inode-object , File-object , File-system object Your Answer Inode-object , File-object , File-system object Multiple Choice Single Answer Question Collection of similar datatypes is called as Correct Answer Array Your Answer Array Multiple Choice Multiple Answer Question We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes? Correct Answer User mode , Monitor mode Your Answer User mode , Monitor mode Match The Following Question Correct Answer Your Answer Class Shape Triangle, rectangle, circle, ellipse Triangle, rectangle, circle, ellipse Class Vehicle Scooter, car, truck, tractor Scooter, car, truck, tractor Class Animal Cat, dog, cow, tiger Cat, dog, cow, tiger Class Color Red, yellow, blue, green Red, yellow, blue, green Select The Blank Question The virtual memory portion of the NT executive is the ________. Correct Answer

Virtual memory manager Your Answer Virtual memory manager True/False Question An asynchronous call returns immediately, without waiting for the I/O to complete. Correct Answer True Your Answer True True/False Question Modem is a random-access device. Correct Answer False Your Answer False Multiple Choice Multiple Answer Question A mailbox can be owned by :Correct Answer Process , Operating system Your Answer Process , Operating system Multiple Choice Multiple Answer Question The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :Correct Answer Explicit , Implicit Your Answer Explicit , Implicit Select The Blank Question In windows NT, the ________ facility is used to pass requests and results between client and server processes within a single machine. Correct Answer

Local-procedure-call Your Answer Remote-procedure-call True/False Question A major security problem for operating system is authentication. Correct Answer True Your Answer True True/False Question In a blocking system call, the application is moved from the OS's run queue to a wait queue. Correct Answer True Your Answer True True/False Question Device speeds range from a few bytes per second to a few gigabytes per second. Correct Answer True Your Answer True Multiple Choice Multiple Answer Question Various storage systems available possesses which two characteristics? Correct Answer Volatile , Non-volatile Your Answer Volatile , Non-volatile Match The Following Question Correct Answer Your Answer We can define abstract operation on abstract data Data abstraction

Data abstraction Process of sharing properties of the higher level object or class Inheritance Inheritance Ability to inherit attributes and methods from 2 or more objects or classes Multiple inheritance Multiple inheritance Ability to send a message to several objects and to allow receiving object to respond method specified on the object. Ploymorphism Ploymorphism Multiple Choice Single Answer Question As process enter the system, they are put into :Correct Answer Job queue Your Answer Job queue Multiple Choice Multiple Answer Question The role of the operating system in computer I/O is to :Correct Answer Manage I/O operation and devices , Control I/O operation and devices Your Answer Manage I/O operation and devices , Control I/O operation and devices Select The Blank Question The ________ is a layer of software that hides hardware differences from upper levels of the operating system. Correct Answer Hardware abstraction layer Your Answer Hardware abstraction layer Select The Blank Question A ________ is a computer or router that sits between the trusted and untrusted systems. Correct Answer Firewall Your Answer

Firewall Multiple Choice Multiple Answer Question The Moriss Internet Worm was made up of which of the two programs? Correct Answer Grappling hook program , Main program Your Answer Grappling hook program , Main program Multiple Choice Multiple Answer Question In UNIX, a device is distinguished by two things, which are :Correct Answer Device-class , Device number Your Answer Device-class , Device number Multiple Choice Single Answer Question In general , the access matrix will be :Correct Answer Sparse Your Answer Sparse True/False Question Applications normally access block devices through a file system interface. Correct Answer True Your Answer True Multiple Choice Multiple Answer Question User thread libraries include :Correct Answer POSIX Pthreads , Mach C-threads , Solaris threads Your Answer POSIX Pthreads , Mach C-threads , Solaris threads Select The Blank Question

The positioning time sometimes called the ________. Correct Answer Random-access time Your Answer Random-access time Multiple Choice Single Answer Question The concept of OOPS was first introduced in Correct Answer Simula Language Your Answer Simula Language Select The Blank Question ________ passwords prevent improper authentication due to password exposure. Correct Answer One-time Your Answer One-time Multiple Choice Single Answer Question The linking of procedure call to the code to be executed in response to that call is referred as Correct Answer Binding Your Answer Binding at 6:47 AM 0 comments Links to this post Labels: Operating System

Operating System - 2 LIST OF ATTEMPTED QUESTIONS AND ANSWERS Multiple Choice Multiple Answer Question locate the transmission devices :Correct Answer Network cards , Modems Your Answer

Tapes , Network cards , Modems True/False Question The user process issues a network I/O system call to send the character to the remote machine. Correct Answer True Your Answer True Multiple Choice Single Answer Question The process by which objects of one class acquire properties of objects of other class is called Correct Answer Inheritance Your Answer Inheritance True/False Question Windows NT uses a message passing implementation for I/O. Correct Answer True Your Answer True Multiple Choice Multiple Answer Question We need two separate modes of operation to protect the operating system and all other programs and their data from malfunctioning program. Which are those modes? Correct Answer User mode , Monitor mode Your Answer User mode , Monitor mode Match The Following Question Correct Answer Your Answer Round-robin Time quantum

Time quantum First-come First-served First come job First come job Shortest job Shortest job Shortest job Priority Highest priority job Highest priority job Multiple Choice Single Answer Question The segment is :Correct Answer Logical entity Your Answer Logical entity Multiple Choice Single Answer Question In UNIX, decisions regarding which process to swap in or out are made by whom? Correct Answer Swapper Your Answer Memory handler Select The Blank Question A ________ is a client-server mechanism that enables an application on one machine to make a procedure call to code on another machine. Correct Answer Remote-procedure-call Your Answer Remote-procedure-call Multiple Choice Single Answer Question When each process that wants to communicate must explicitly name the recipient or sender of the communication, then such communication is called as :Correct Answer Direct communication

Your Answer Indirect communication Select The Blank Question In Linux, the allocator uses a ________ algorithm to keep track of available physical pages. Correct Answer Buddy-heap Your Answer Binary-search Multiple Choice Single Answer Question What does the rows of the access matrix represents? Correct Answer Domains Your Answer Domains Multiple Choice Single Answer Question Every change in policy requires a change in the underlying :Correct Answer Mechanism Your Answer System Select The Blank Question A ________ in NT is an object that provides a uniform interface for files, whether they are local or remote. Correct Answer Redirector Your Answer Domain Multiple Choice Multiple Answer Question In Solaris 2, user-level threads may be:Correct Answer Bound , Unbound Your Answer Bound , Unbound

Multiple Choice Multiple Answer Question An audit log records which things about an object ? Correct Answer Time , User , Type of access Your Answer Time , User , Type of access Multiple Choice Multiple Answer Question One-to-one model is supported by following systems :Correct Answer Windows NT , OS/2 Your Answer OS/2 , Windows NT Multiple Choice Multiple Answer Question To protect the system, we must take security measures at two levels, such as :Correct Answer Physical level , Human level Your Answer Human level , Global level Multiple Choice Single Answer Question If the process is waiting for some event to occur then it is said to be in :Correct Answer Waiting state Your Answer Waiting state Multiple Choice Single Answer Question A common representation for a discussion of process scheduling is a :Correct Answer Queuing diagram Your Answer Process state diagram True/False Question

At Physical level, the site or sites containing the computer systems must be physically secured against armed or surreptitious entry by intruders. Correct Answer True Your Answer True Select The Blank Question When you express user-system interaction, the scenario in the model is called ________ Correct Answer Case model Your Answer Case model True/False Question Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention. Correct Answer False Your Answer True True/False Question A file in NTFS is a simple byte stream as it is in MS-DOS or UNIX . Correct Answer False Your Answer False Multiple Choice Single Answer Question Polymorphism means ability to take Correct Answer More than one form Your Answer More than one form True/False Question Aging algorithm is based on LRU.

Correct Answer True Your Answer True Select The Blank Question The virtual memory portion of the NT executive is the ________. Correct Answer Virtual memory manager Your Answer Virtual memory manager Multiple Choice Multiple Answer Question There are two types of Message passing, they are :Correct Answer Synchronous , Asynchronous Your Answer Synchronous , Asynchronous Select The Blank Question Web servers use the ________ protocol to communicate with web browsers. Correct Answer http Your Answer http Multiple Choice Multiple Answer Question The security of a system can be improved by two management techniques, such as :Correct Answer Threat monitoring , Audit Log Your Answer Audit Log , Threat finding Select The Blank Question The concept of protection levels and call gates were pioneered in MULTICS, where they were viewed as protection ________. Correct Answer Ring

Your Answer Ring True/False Question We say that a system is secure if its resources are used and accessed as intended under all circumstances. Correct Answer True Your Answer True Select The Blank Question The ________ controller is the controller at the computer end of the bus. Correct Answer Host Your Answer Cpu Multiple Choice Multiple Answer Question In Linux, the paging system can be divided into sections, namely:Correct Answer Policy algorithm , Paging mechanism Your Answer Policy algorithm , Paging mechanism True/False Question Keyboard is a sharable device. Correct Answer True Your Answer False True/False Question Transfer of data from disk to memory is usually controlled by the operating system. Correct Answer True Your Answer True

True/False Question Prototyping not only helps to build a quality design but also enables the designer to build the system decremantally. Correct Answer False Your Answer True Select The Blank Question The UNIX system uses ________ to avoid the necessity of keeping its password list secret. Correct Answer Encryption Your Answer Encryption Match The Following Question Correct Answer Your Answer Read-write devices Disks Disks Dedicated devices Tape CD-ROM Read-only devices CD-ROM Tape Write-only devices Graphics controller Keyboard Multiple Choice Single Answer Question A procedure call, request to execute a method is termed as Correct Answer Message Your Answer Message

Select The Blank Question Context switch times are highly dependent on ________ support. Correct Answer Hardware Your Answer Hardware Multiple Choice Multiple Answer Question Two main jobs of a computer are :Correct Answer I/O , Processing Your Answer I/O , Processing Multiple Choice Single Answer Question The 4.3BSD operating system is the version of :Correct Answer UNIX Your Answer UNIX Multiple Choice Single Answer Question The number of processes that are completed per time unit is called as:Correct Answer Throughput of system Your Answer Throughput of system Multiple Choice Multiple Answer Question Once the I/O is started , which two courses of action are possible? Correct Answer Synchronous I/O , Asynchronous I/O , Simple I/O Your Answer Synchronous I/O , Asynchronous I/O Multiple Choice Multiple Answer Question Security violations of the system can be categorized as :Correct Answer

Malicious , Accidental Your Answer Malicious , Accidental Select The Blank Question A process migrates between the various ________ throughout its lifetime. Correct Answer Scheduling queues Your Answer Scheduling queues at 6:46 AM 0 comments Links to this post Labels: Operating System

Operating System - 1 LIST OF ATTEMPTED QUESTIONS AND ANSWERS Multiple Choice Multiple Answer Question Various storage systems available possesses which two characteristics? Correct Answer Volatile , Non-volatile Your Answer Volatile , Non-volatile Multiple Choice Multiple Answer Question Most CPUs have two interrupt request lines. Which are they? Correct Answer Maskable , Non maskable Your Answer Maskable , Non maskable Select The Blank Question A ________ is a group of NT server machines that share a common security policy and user databases. Correct Answer Domain Your Answer Domain

Select The Blank Question An ________ is a dedicated, special purpose CPU found in mainframes and in other high-end systems. Correct Answer I/O channel Your Answer I/O channel Multiple Choice Single Answer Question The CPU is allocated to the selected process by the :Correct Answer Dispatcher Your Answer Dispatcher Multiple Choice Single Answer Question In JAVA , the derived class is known as Correct Answer Subclass Your Answer Subclass Select The Blank Question The Pentium supports four protection levels with ________ as least privileged level. Correct Answer 3 Your Answer 3 Select The Blank Question ________ of an object remains unchanged even though its state and properties change. Correct Answer Identity Your Answer Identity True/False

Question One way to achieve portability is to write software in standard version of high level language and to develop portable system and application software . Correct Answer True Your Answer True Multiple Choice Single Answer Question Software may trigger an interrupt by executing a special operation called :Correct Answer System call Your Answer System call Multiple Choice Single Answer Question In Object Oriented technology following expression is appropriate Correct Answer object=data+menthods Your Answer object=data+menthods Multiple Choice Multiple Answer Question The two versions of NT are : Correct Answer WindowsNT workstations , WindowsNT server Your Answer WindowsNT workstations , WindowsNT server Match The Following Question Correct Answer Your Answer We can define abstract operation on abstract data Data abstraction Data abstraction Process of sharing properties of the higher level object or class Inheritance Inheritance Ability to inherit attributes and methods from 2 or more objects or classes

Multiple inheritance Multiple inheritance Ability to send a message to several objects and to allow receiving object to respond method specified on the object. Ploymorphism Ploymorphism Select The Blank Question A________ is a memory area that stores data while they are transferred between two devices or between a device and an application. Correct Answer Buffer Your Answer Buffer True/False Question In Public Key Encryption, each user has both a public and a private key. Correct Answer True Your Answer True True/False Question Data transfer from cache to CPU and registers is usually a software function, with little operating system intervention. Correct Answer False Your Answer False Multiple Choice Multiple Answer Question Liner address is divided into fields like :Correct Answer Dir , Page , Offset Your Answer Dir , Page , Offset Multiple Choice Single Answer Question IPC is particularly useful in a :-

Correct Answer Distributed environment Your Answer Internet environment Multiple Choice Single Answer Question IPC provides a mechanism to allow processes to communicate and to synchronize their actions without sharing the same :Correct Answer Address space Your Answer Semaphore Multiple Choice Multiple Answer Question Supervisor mode is also known as :Correct Answer Privileged mode , Monitor mode , System mode Your Answer System mode , Privileged mode , Monitor mode Select The Blank Question Assuming that the segment is in memory and the offset is in range, the Pentium then adds the ________ bit base field in the descriptor to the offset to form linear address. Correct Answer 32 Your Answer 32 Multiple Choice Multiple Answer Question In Solaris 2, user-level threads may be:Correct Answer Bound , Unbound Your Answer Bound , Unbound Multiple Choice Single Answer Question The concept of OOPS was first introduced in Correct Answer

Simula Language Your Answer Simula Language True/False Question At system boot time, the hardware starts in monitor mode. Correct Answer True Your Answer True Multiple Choice Single Answer Question The main difference between structure and class is Correct Answer Structure does not support OOPS Class Supports OOPS. Your Answer Structure does not support OOPS Class Supports OOPS. Select The Blank Question A ________ controller is built into each disk drive. Correct Answer Disk Your Answer Disk Multiple Choice Single Answer Question If a class fruit has object mango, the relationship is expressed as : Correct Answer Fruit mango Your Answer Fruit mango True/False Question The hardware allows privileged instructions to be executed in only user mode. Correct Answer False Your Answer False

Multiple Choice Multiple Answer Question An object type in windows NT is a system defined data type that has two things associated with it, which are they? Correct Answer Set of attributes , Set of methods Your Answer Set of attributes , Set of methods Select The Blank Question The kernel module that controls a device is a ________ . Correct Answer Device driver Your Answer Device driver Multiple Choice Single Answer Question If process P and Q want to communicate, they must send messages to and receive messages from each other: Thus link established between two process is known as :Correct Answer Communication link Your Answer Direct link Multiple Choice Multiple Answer Question Dispatcher functions involves the following :Correct Answer Switching context , Switching to user mode Your Answer Switching context , Switching to user mode Select The Blank Question In windows NT, the ________ facility is used to pass requests and results between client and server processes within a single machine. Correct Answer Local-procedure-call Your Answer Local-procedure-call

True/False Question If some of the pages are shared with other process, the pages in memory and on the disk can only be released when the last process using them has terminated. Correct Answer True Your Answer True Select The Blank Question The Solaris developers reimplemented the ________ using in-kernel thread to eliminate the context switch involved in moving each character between daemons and the kernel. Correct Answer Telnet daemon Your Answer Context-switch daemon Multiple Choice Single Answer Question Modern operating systems are :Correct Answer Interrupt driven Your Answer Interrupt driven Match The Following Question Correct Answer Your Answer Bounded-buffer Fixed size buffer Fixed size buffer Producer Produces process Produces process Consumer Consumes process Consumes process Unbounded-buffer No limit on size of buffer

No limit on size of buffer Multiple Choice Multiple Answer Question In Linux, the paging system can be divided into sections, namely:Correct Answer Policy algorithm , Paging mechanism Your Answer Policy algorithm , Paging mechanism Multiple Choice Single Answer Question A process data section contains:Correct Answer Global variables Your Answer Temporary data True/False Question OOSAD approach is applicable only to stable systems. Correct Answer False Your Answer False True/False Question Segment length may change during execution. Correct Answer True Your Answer True Multiple Choice Multiple Answer Question The movement of information between levels of a storage hierarchy may be of two types depending on the hardware design and the controlling operating system software such as :Correct Answer Explicit , Implicit Your Answer Explicit , Implicit

Multiple Choice Single Answer Question Collection of similar datatypes is called as Correct Answer Array Your Answer Array True/False Question At Human level, user must be screened carefully so that the chance of authorizing a user who then gives access to an intruder is reduced. Correct Answer True Your Answer True True/False Question The user process issues a network I/O system call to send the character to the remote machine. Correct Answer True Your Answer False Multiple Choice Multiple Answer Question Most computers have hardware clocks and timers that provide three basic functions, such as :Correct Answer Give the current time , Give the elapsed time , Set a timer to trigger operation at certain time Your Answer Give the current time , Give the elapsed time , Set a timer to trigger operation at certain time Multiple Choice Single Answer Question C++ is basically a procedural language having extension of Correct Answer Object Oriented technology Your Answer Object Oriented technology

Related Documents