Hello World
Quiz by , created more than 1 year ago

IITU

606
1
0
Hello World
Created by Hello World over 7 years ago
Close

OS Final

Question 1 of 100

1

1. TCP/IP stands for

Select one of the following:

  • o TCP/IP (Transmission Control Protocol/Internet Protocol)

  • o TCP/IP (Transfer Control Protocol/Internet Protocol

  • o TCP/IP (Transmission Control Protocol/Individual Protocol)

  • o TCP/IP (Transcript Control Protocol/Internet Protocol)

Explanation

Question 2 of 100

1

2. When was TCP/IP developed?

Select one of the following:

  • o 1978

  • o 1977

  • o 1976

  • o 1975

Explanation

Question 3 of 100

1

3. With whom TCP/IP was driven

Select one of the following:

  • o Kahn and Cerf

  • o Ronald and Cerf

  • o Cerf and George

  • o McColin and Kahn

Explanation

Question 4 of 100

1

4. TCP is higher layer

Select one of the following:

  • True
  • False

Explanation

Question 5 of 100

1

5. What is the function of a subnet mask

Select one of the following:

  • o to determine whether an IP address exists on the local network or whether it must be routed outside the local network.

  • o process that applies binary logic to yield binary results

  • o It sends out ICMP (Internet Control Message Protocol) messages to verify both the logical addresses & the Physical connection.

  • o to determine whether an IP address exists on the global network or whether it must be routed outside the global network.

Explanation

Question 6 of 100

1

6. Which of the following is false about Subnet Mask?

Select one of the following:

  • o The function of a subnet mask is to determine whether an IP address exists on the local network or whether it must be routed outside the local network.

  • o It is applied to a message’s destination address to extract the network address.

  • o If the extracted network address matches the local network ID, the destination is located on the local network.

  • o It sends out ICMP (Internet Control Message Protocol) messages to verify both the logical addresses & the Physical connection

Explanation

Question 7 of 100

1

7. Define a boolean algebra

Select one of the following:

  • o process that applies binary logic to yield binary results

  • o to determine whether an IP address exists on the local network or whether it must be routed outside the local network.

  • o It sends out ICMP (Internet Control Message Protocol) messages to verify both the logical addresses & the Physical connection.

  • o to determine whether an IP address exists on the global network or whether it must be routed outside the global network.

Explanation

Question 8 of 100

1

8. Define class A

Select one of the following:

  • o large organizations, governments

  • o medium sized organizations

  • o small organizations

  • o extra small organisations

Explanation

Question 9 of 100

1

9. Define class B

Select one of the following:

  • o large organizations, governments

  • o medium sized organizations

  • o small organizations

  • o extra small organisations

Explanation

Question 10 of 100

1

10. Define class C

Select one of the following:

  • o large organizations, governments

  • o medium sized organizations

  • o small organizations

  • o extra small organisation

Explanation

Question 11 of 100

1

11. In Class A an IP address starts with

Select one of the following:

  • o 0

  • o 10

  • o 110

  • o 1010

Explanation

Question 12 of 100

1

12. In Class C the network prefix is

Select one of the following:

  • o 24 bits long

  • o 16 bits long

  • o 8 bits long

  • o 32 bits long

Explanation

Question 13 of 100

1

13. Into how many classes divided the address space in classful addressing ?

Select one of the following:

  • 5

  • 4

  • 3

  • 2

Explanation

Question 14 of 100

1

14. How many layers have ISO/OSI Network Model

Select one of the following:

  • 7

  • 6

  • 8

  • 5

Explanation

Question 15 of 100

1

15. What is a link layer

Select one of the following:

  • o Includes device driver and network interface card

  • o Handles the movement of packets

  • o Provides a reliable flow of data between two hosts

  • o Handles the details of the particular application

Explanation

Question 16 of 100

1

16. What is a network layer

Select one of the following:

  • o Includes device driver and network interface card

  • o Handles the movement of packets

  • o Provides a reliable flow of data between two hosts

  • o Handles the details of the particular application

Explanation

Question 17 of 100

1

17. What is a transport layer

Select one of the following:

  • o Includes device driver and network interface card

  • o Handles the movement of packets

  • o Provides a reliable flow of data between two hosts

  • o Handles the details of the particular application

Explanation

Question 18 of 100

1

18. What is an application layer

Select one of the following:

  • o Includes device driver and network interface card

  • o Handles the movement of packets

  • o Provides a reliable flow of data between two hosts

  • o Handles the details of the particular application

Explanation

Question 19 of 100

1

19. In Class B an IP address starts with

Select one of the following:

  • o 0

  • o 10

  • o 110

  • o 1010

Explanation

Question 20 of 100

1

20. In Class C an IP address starts with

Select one of the following:

  • o 0

  • o 10

  • o 110

  • o 1010

Explanation

Question 21 of 100

1

21. In Class A the network prefix is

Select one of the following:

  • o 24 bits long

  • o 16 bits long

  • o 8 bits long

  • o 32 bits long

Explanation

Question 22 of 100

1

22. In Class B the network prefix is

Select one of the following:

  • o 24 bits long

  • o 16 bits long

  • o 8 bits long

  • o 32 bits long

Explanation

Question 23 of 100

1

23. PING stands for

Select one of the following:

  • o Packet Internet Groper

  • o Pocket Internet Groper

  • o Ping Internet Groper

  • o Packet Internet Gathering

Explanation

Question 24 of 100

1

24. ICMP stands for

Select one of the following:

  • o Internet Control Message Protocol

  • o Internet Control Machine Protocol

  • o Internet Clarify Message Protocol

  • o Internet Control Management Protocol

Explanation

Question 25 of 100

1

25. Define PING

Select one of the following:

  • o command verifies OSI Layer 3

  • o verifies both the logical addresses & the Physical connection

  • o process that applies binary logic to yield binary results

  • o verifies the Physical connection

Explanation

Question 26 of 100

1

26. Virtual memory provides

Select one of the following:

  • o Automatic storage allocation

  • o Protection

  • o Sharibility

  • o All the above

Explanation

Question 27 of 100

1

27. Where Virtual Machine was developed?

Select one of the following:

  • o Lancaster University

  • o Manchester University

  • o MIT

  • o Cambridge

Explanation

Question 28 of 100

1

28. What is the first commercial computer with virtual machine

Select one of the following:

  • o B5000

  • o B5550

  • o B5500

  • o C5000

Explanation

Question 29 of 100

1

29. When was the first commercial computer with virtual machine released?

Select one of the following:

  • o 1961

  • o 1962

  • o 1963

  • o 1964

Explanation

Question 30 of 100

1

30. Which of the following is false about VM and performance?

Select one of the following:

  • o Better performance: we can use more memory than we have

  • o Nothing; mapping to memory or disk is just as easy

  • o Worse performance: reading from disk is slower than RAM

  • o Good performance: reading from disk is slower than RAM

Explanation

Question 31 of 100

1

31. Which of the following is false about usability of Virtual Memory?

Select one of the following:

  • o Not enough memory

  • o Holes in the address space

  • o Keeping program secure

  • o Keeping program insecure

Explanation

Question 32 of 100

1

32. Define virtual address space

Select one of the following:

  • o process refers to the logical (or virtual) view of how a process is stored in memory

  • o used to translate the virtual addresses seen by the application into physical addresses

  • o a segment of virtual memory that has been assigned a direct byte-for-byte correlation with some portion of a file or file-like resource.

  • o none of the mentioned

Explanation

Question 33 of 100

1

33. Define a page tables

Select one of the following:

  • o process refers to the logical (or virtual) view of how a process is stored in memory

  • o used to translate the virtual addresses seen by the application into physical addresses

  • o a segment of virtual memory that has been assigned a direct byte-for-byte correlation with some portion of a file or file-like resource.

  • o none of the mentioned

Explanation

Question 34 of 100

1

34. Which of the following is incorrect about Subnet Mask

Select one of the following:

  • o The function of a subnet mask is to determine whether an IP address exists on the local network or whether it must be routed outside the local network.

  • o It is applied to a message’s destination address to extract the network address.

  • o to determine whether an IP address exists on the global network or whether it must be routed outside the global network.

  • o If the extracted network address matches the local network ID, the destination is located on the local network.

Explanation

Question 35 of 100

1

35. What is a port number for SSH

Select one of the following:

  • o TCP 22

  • o TCP 33

  • o TCP 25

  • o TCP 443

Explanation

Question 36 of 100

1

36. POP stands for

Select one of the following:

  • o Post Office Protocol

  • o Postal Office Protocol

  • o Pop Office Protocol

  • o Prefix Office Protocol

Explanation

Question 37 of 100

1

37. Common port number for web pages

Select one of the following:

  • o 80

  • o 23

  • o 25

  • o 110

Explanation

Question 38 of 100

1

38. Common port number for telnet

Select one of the following:

  • o 80

  • o 23

  • o 25

  • o 110

Explanation

Question 39 of 100

1

39. Common port number for mail

Select one of the following:

  • o 80

  • o 23

  • o 25 and 110

  • o 111

Explanation

Question 40 of 100

1

40. How many classes have a subnet mask

Select one of the following:

  • 1

  • 2

  • 3

  • 4

Explanation

Question 41 of 100

1

41. At the FILE SYSTEM SECURITY what is an Access right?

Select one of the following:

  • o The way in which an object is accessed by a subject

  • o Anything to which access is controlled

  • o An entity capable of accessing objects

  • o None of them

Explanation

Question 42 of 100

1

42. At Linux Virtual File System Concept, The four primary object types in VFS are as follows:

Select one of the following:

  • o Superblock object, inode object, dentry object, file object

  • o System object, software object, hardware object, network object

  • o Virtual object, physical object, i/o object, calling object

  • o File system object, user object, disk object, mapping object

Explanation

Question 43 of 100

1

43. What is an EMBEDDED SYSTEMS?

Select one of the following:

  • o combination of computer hardware and software, and perhaps additional mechanical or other part, designed to perform a dedicated function

  • o A file consists of a collection of records

  • o The cache manager calls the log file system to prompt it to flush the log file to disk.

  • o Once the log file updates are safely on disk, the cache manager flushes the volume changes to disk

Explanation

Question 44 of 100

1

44. CHARACTERISTICS OF EMBEDDED OPERATING SYSTEMS, Give definition to Real-time operation:

Select one of the following:

  • o In many embedded systems, the correctness of a computation depends, in part, on the time at which it is delivered

  • o Embedded software may execute in response to external events

  • o Condtional compilation can be used

  • o There is virtually no device that needs to be supported by all versions of the OS, and the range of I/O devices is large

Explanation

Question 45 of 100

1

45. Give the correct way to “Loading an eCos Configuration”:

Select one of the following:

  • o GNU make utility>>Application source code>>GNU cross compiler>>GNU linker>>Executable file

  • o Application source code>>GNU linker>>GNU cross compiler>>GNU make utility>>Executable file

  • o GNU linker>>Application source code>>GNU make utility>>GNU cross compiler>>Executable file

  • o GNU cross compiler>>GNU linker>>GNU make utility>>Application source code>>Executable file

Explanation

Question 46 of 100

1

46. Choose the correct choice of the “eCos Layered Structure” from bottom- to- top?

Select one of the following:

  • o Hardware abstraction layer, Kernel, I/O system, Standard C library, User application code

  • o Kernel, I/O system, Standard C library, User application code, Hardware abstraction layer

  • o User application code, Standard C library, I/O system, Kernel, Hardware abstraction layer

  • o I/O system, Kernel, Hardware abstraction layer, Standard C library, User application code.

Explanation

Question 47 of 100

1

47. How many implemented separate modules has The HAL?

Select one of the following:

  • 3

  • 4

  • 5

  • 6

Explanation

Question 48 of 100

1

48. How many main objectives has The eCos Kernel was designed to satisfy?

Select one of the following:

  • 4

  • 5

  • 6

  • 7

Explanation

Question 49 of 100

1

49. What does “TINYOS” mean?

Select one of the following:

  • o Represents a significant departure from other embedded operating systems

  • o is a flag that a thread can check before executing a particular piece of code.

  • o A different distributes of Linux.

  • o A different versions of Windows.

Explanation

Question 50 of 100

1

50. Three abstractions for resources are used in TinyOS:

Select one of the following:

  • o Dedicated, Virtualized, Shared

  • o Abstracted, Powered, Protected

  • o Determined, Called, Multiplexed

  • o Needed, Controlled, Used

Explanation

Question 51 of 100

1

51. What is a Computer Security?

Select one of the following:

  • o The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information resources

  • o Comparing the information systems with computer systems

  • o Updating hardware and software

  • o Creating the local and global networks for computer systems

Explanation

Question 52 of 100

1

52. This definition introduces three key objectives that are at the heart of computer security:

Select one of the following:

  • o Confidentiality, Integrity, Availability

  • o Protection, Updating, Creating

  • o Attacking, Copying, Pasting

  • o Dividing, Working, Researching

Explanation

Question 53 of 100

1

53. Although the use of the CIA triad to define security objects is well established, some in the security field feel that additional concepts are needed to present a complete picture. Two of the most commonly mentioned are as follows:

Select one of the following:

  • o Authenticity, Accountability

  • o Loggin, Entering

  • o Accessibility, Availability

  • o Realibility, Security

Explanation

Question 54 of 100

1

54. Network security attacks can be classified as:

Select one of the following:

  • o Passive and active attacks

  • o Dangerous and undangerous

  • o Correct and incorrect

  • o Direct and indirect.

Explanation

Question 55 of 100

1

55. In an important early study of intrusion, Anderson[ANDE80] identified three classes of intruders:

Select one of the following:

  • o Masquerader, misfeasor, clandestine user

  • o Individual, legitimate, authorized

  • o Control, exploit, system

  • o Outside, inside, offside.

Explanation

Question 56 of 100

1

56. How many parts of Memory Hierarchy?

Select one of the following:

  • 5

  • 4

  • 3

  • 2

Explanation

Question 57 of 100

1

57. In Memory Hierarchy, at the Outboard storage which of the following are included:

Select one of the following:

  • o Cache

  • o Main memory

  • o Magnetic tape

  • o Magnetic disk

Explanation

Question 58 of 100

1

58. In Memory Hierarchy, at the Off-line storage which of the following are included:

Select one of the following:

  • o Cache

  • o Magnetic disk

  • o Magnetic tape

  • o Main memory

Explanation

Question 59 of 100

1

59. In Memory Hierarchy, at the Inboard memory which of the following are included:

Select one of the following:

  • o Main memory

  • o Magnetic disk

  • o Magnetic tape

  • o Optical disk

Explanation

Question 60 of 100

1

60. Cache Design has these properties?

Select one of the following:

  • o Size, block size, mapping function, replacement algorithm, write policy

  • o Size, search function, write function, read policy, vector algorithm

  • o Size, mapping algorithm, vector function, write policy, replacement function

  • o Size, blocking algorithm, search function, replacement vector, read policy

Explanation

Question 61 of 100

1

61. Three techniques are possible for I/O operations:

Select one of the following:

  • o Programmed I/O, Interrupt-driven I/O, Direct memory access(DMA)

  • o Object-oriented I/O, Design I/O, Usable I/O

  • o Machine I/O, Architecture I/O, Hardware I/O

  • o Control I/O, Status I/O, Transfer I/O

Explanation

Question 62 of 100

1

62. How many principles has Deadlock?:

Select one of the following:

  • o 3

  • o 5

  • o 2

  • o 6

Explanation

Question 63 of 100

1

63. Which of the following principles has Deadlock?

Select one of the following:

  • o Prevention, Avoidance, Detection

  • o Execution, Association, Starvation

  • o Exclusion, Avoidance, Starvation

  • o Starvation, Detection, Exclusion

Explanation

Question 64 of 100

1

64. Much of the work in security and protection as it relates to operating systems can be roughly grouped into four categories?

Select one of the following:

  • o Availability, confidentiality, data integrity, authenticity

  • o Safety, accountability, reliability, density

  • o Usability, integrity, confidentiality, reliability

  • o Flexibility, availability, accountability, authenticity

Explanation

Question 65 of 100

1

65. The central themes of operating system design are all concerned with the management of processes and threads?

Select one of the following:

  • o Multiprogramming, multiprocessing, distributed processing

  • o Multitasking, multiprogramming, multithreading

  • o Multiprocessing, uniprocessing, multitasking

  • o Multithreading, distributed processing, uniprocessing

Explanation

Question 66 of 100

1

66. Which one of the following linux file system does not support journaling feture?

Select one of the following:

  • o ext2

  • o ext3

  • o ext4

  • o none of the mentioned

Explanation

Question 67 of 100

1

67. With the installation of Linux, a super user account is created called as _____

Select one of the following:

  • o Superuser

  • o User

  • o Administrator

  • o Root

Explanation

Question 68 of 100

1

68. Which command would you use if you want to remove the password assigned to a group?

Select one of the following:

  • o gpasswd – r

  • o gpasswd – d

  • o userdel

  • o delgroup

Explanation

Question 69 of 100

1

69. What command is used to remove files?

Select one of the following:

  • o Dm

  • o Rm

  • o Del

  • o Erase

  • o Wc

Explanation

Question 70 of 100

1

70. What command is used to remove the directory?

Select one of the following:

  • o Remove

  • o Rdir

  • o Mdir

  • o Delete

  • o Rmdir

Explanation

Question 71 of 100

1

71. Convert this number systems: BIN(1111000111) to DEC?

Select one of the following:

  • o 967

  • o 912

  • o 868

  • o 898

Explanation

Question 72 of 100

1

72. Convert this number systems: BIN(10101010101) to DEC?:

Select one of the following:

  • o 1365

  • o 1432

  • o 1295

  • o 1523

Explanation

Question 73 of 100

1

73. Convert this number systems: BIN(1100001100) to DEC?:

Select one of the following:

  • o 780

  • o 795

  • o 824

  • o 912

Explanation

Question 74 of 100

1

74. Convert this number systems: BIN(1111000111) to DEC?

Select one of the following:

  • o 967

  • o 912

  • o 868

  • o 898

Explanation

Question 75 of 100

1

75. Which of the following is not one of the principles of dealing with deadlock?

Select one of the following:

  • o Initialization

  • o Prevention

  • o Avoidance

  • o Detection

Explanation

Question 76 of 100

1

76. Current allocation of resources to processes where there is at least one sequence that does not result in deadlock is called:

Select one of the following:

  • o Safe state

  • o Unsafe state

  • o Ambiguous state

  • o Alternative state

Explanation

Question 77 of 100

1

77. Current allocation of resources to processes where there is no sequence that does not result in deadlock is called:

Select one of the following:

  • o Unsafe state

  • o Safe state

  • o Ambiguous state

  • o Alternative state

Explanation

Question 78 of 100

1

78. Can you solve the Dining Philosophers’ Problem using monitors?

Select one of the following:

  • o Yes

  • o No

  • o Yes, but only if there are less than five philosophers

  • o No, unless there are more than five philosophers

Explanation

Question 79 of 100

1

79. A fixed-length block of main memory is called:

Select one of the following:

  • o Frame

  • o Page

  • o Segment

  • o Section

Explanation

Question 80 of 100

1

80. A fixed-length block of data in secondary memory is called:

Select one of the following:

  • o Frame

  • o Page

  • o Segment

  • o Section

Explanation

Question 81 of 100

1

81. A variable-length block of data that resides in secondary memory is called:

Select one of the following:

  • o Frame

  • o Page

  • o Segment

  • o Section

Explanation

Question 82 of 100

1

82. When free memory is split into many unconnected pieces we call it:

Select one of the following:

  • o Internal fragmentation

  • o External fragmentation

  • o Compaction

  • o Memory distribution

Explanation

Question 83 of 100

1

83. Memory partitioning algorithm that uses binary tree as a data structure is called:

Select one of the following:

  • o First-fit algorithm

  • o Next-fit algorithm

  • o Buddy system

  • o Best-fit algorithm

Explanation

Question 84 of 100

1

84. A state in which the system spends most of its time swapping pieces rather than executing instructions is called:

Select one of the following:

  • o Virtual memory

  • o Thrashing

  • o Swapping

  • o Spanning

Explanation

Question 85 of 100

1

85. What command do you use to create Linux file systems?

Select one of the following:

  • o Fdisk

  • o Mkfs

  • o Fsck

  • o Mount

Explanation

Question 86 of 100

1

86. What command is not used to list the files chap01, chap02 and chap04?

Select one of the following:

  • o ls chap*

  • o ls chap[124]

  • o ls - x chap0[124]

  • o ls chap0[124]

Explanation

Question 87 of 100

1

87. What is operating system?

Select one of the following:

  • o collection of programs that manages hardware resources

  • o system service provider to the application programs

  • o link to interface the hardware and application programs

  • o all of the mentioned

Explanation

Question 88 of 100

1

88. The main function of the command interpreter is

Select one of the following:

  • o to get and execute the next user-specified command

  • o to provide the interface between the API and application program

  • o to handle the files in operating system

  • o none of the mentioned

Explanation

Question 89 of 100

1

89. To create a file

Select one of the following:

  • o allocate the space in file system

  • o make an entry for new file in directory

  • o both (a) and (b)

  • o none of the mentioned

Explanation

Question 90 of 100

1

90. What is a Server?

Select one of the following:

  • o is a computer program running to serve the requests of other programs, the "clients".

  • o Simple computer

  • o Optical device

  • o Types of laptops

Explanation

Question 91 of 100

1

91. Show incorrect choice, when we mean types of Server:

Select one of the following:

  • o Cooking server

  • o Database server

  • o Client server

  • o Application server

Explanation

Question 92 of 100

1

92. What is a Create file?

Select one of the following:

  • o When a new file is created, an entry must be added to the directory

  • o When a user or application references a file, the directory must be searched to find the entry corresponding to that file..

  • o When a file is deleted, an entry must be removed from the directory.

  • o All or a portion of the directory may be requested.

Explanation

Question 93 of 100

1

93. What is a Delete file?

Select one of the following:

  • o When a file is deleted, an entry must be removed from the directory

  • o When a user or application references a file, the directory must be searched to find the entry corresponding to that file..

  • o When a new file is created, an entry must be added to the directory.

  • o All or a portion of the directory may be requested.

Explanation

Question 94 of 100

1

94. Given the IP address 172.16.12.54 with a mask of 255.255.255.240, which of the following are valid host addresses on the different subnet?

Select one of the following:

  • o 172.16.12.64

  • o 172.16.12.57

  • o 172.16.12.49

  • o 172.16.12.48

  • o 172.16.12.63

  • o 172.16.12.45

Explanation

Question 95 of 100

1

95. You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which classful subnet mask would you use?

Select one of the following:

  • o 255.255.255.192

  • o 255.255.255.224

  • o 255.255.255.240

  • o 255.255.255.248

Explanation

Question 96 of 100

1

96. Given the IP address 172.16.12.54 with a mask of 255.255.255.240, which of the following are valid broadcast addresses?

Select one of the following:

  • o 172.16.12.64

  • o 172.16.12.57

  • o 172.16.12.49

  • o 172.16.12.48

  • o 172.16.12.63

  • o 172.16.12.45

Explanation

Question 97 of 100

1

97. File type can be represented by

Select one of the following:

  • o file name

  • o file extension

  • o file identifier

  • o none of the mentioned

Explanation

Question 98 of 100

1

98. What does GNU stand for?

Select one of the following:

  • o GNU's not Unix

  • o Greek Needed Unix

  • o General Unix

  • o General Noble Unix

  • o None of the above

Explanation

Question 99 of 100

1

99. Which of the following is not a principle of storage management responsibilities?

Select one of the following:

  • o Process isolation

  • o Process termination

  • o Automatic allocation and management

  • o Protection and access control

Explanation

Question 100 of 100

1

100. Virtual memory takes advantage of

Select one of the following:

  • o Fast CPU

  • o Large secondary memory

  • o Modular programming

  • o Scheduling

Explanation