1)A file is ______________
[ a]
A. file is usually non volatile B.Volatile
C.constant D.none
2) A file
sometimes called a __________________ [ a ]
A. data set B.disjoint sets C.a&b
D.none of these
3) A major security problem for OS is _ _ _ _ _ _ [a ]
A.authentication
B.processing C.verify D.none
4) Access time is the highest in the case of____________ [b ]
A.tapes B.magnetic
disks C.HDD D.pendrives
5) Creation of a file system is known as _ _ _ _ _ _ _
_formatting[c ]
A.circular B.complex C.logical D.none
6) Fence register is used for______________________ [ a ]
A.memory protection B.modified bit C referenced bit D.none
7) A disk that has a boot partition is called a [a ]
a) System disk b) Trap disk c) Partition disk d) Live disk
8. Disk mirroring is in RAID leve l [c ]
a) 3 b) 2 c) 1 d) 0
9. Which of the following is not capability system that
extends protection to user-defined software objects? [ d]
a) Hydra b) Cambridge CAP system c) Mach d) Miranda
10. MULTICS uses a ______ structure in addition to file
access. [c ]
a) Star b) Hybrid c) Ring d) Tree
11. DES works on a chunk of bits at a time is known as a
_______ cipher.[b ]
a) Stream b) Hybrid c) Black d) White
12) Where does the Swap space reside [b ]
A)RAM B)Disk C)ROM D)On Chip Cache
13). An Audit Log
[d ]
A)Simply records the time B)User C)Type of all access to an
object D)All of these
14). The major security problem of O.S is [c ]
A)Human Problem B)Physical Problem
C)Authentication Problem D)None
15) A Temporary storage area, attached to the CPU for I/O
operations is [ b]
A) Channel B)Buffer C)Register D)Core
16). In a serial communication , Extra Clock is needed [b ]
A)To make efficient use of RS-232 B)For programmed Band rate
control
C)To synchronize the devices D)All of these
17). Punched cards use [c ]
A)Alphanumeric code B)EBCDIC code C)Hollerith code D)ASCII
code
18). Which of the following resources can cause Deadlock [d ]
A)Printers B)Shared programs C)Read only files D)All
19). A Partitioned data set is mostly used for [ a]
A)A Program or source library B)Storing program Data
C)Storing back up information D)Storing ISAM files
No comments:
Post a Comment