OS bits

1)A file is ______________                                                                [  a]
A. file is usually non volatile  B.Volatile  C.constant D.none
2) A file sometimes called a __________________                       [  a ]
A. data set  B.disjoint sets  C.a&b  D.none of these
3) A major security problem for OS is _ _ _ _ _ _                           [a   ]
A.authentication  B.processing  C.verify  D.none
4) Access time is the highest in the case of____________            [b  ]
A.tapes  B.magnetic disks  C.HDD D.pendrives
5) Creation of a file system is known as _ _ _ _ _ _ _ _formatting[c  ]
A.circular B.complex C.logical  D.none
6) Fence register is used for______________________                [ a ]
A.memory protection B.modified bit C referenced bit  D.none
7) A disk that has a boot partition is called a                                     [a ]
a) System disk b) Trap disk c) Partition disk d) Live disk
8. Disk mirroring is in RAID leve l                                                        [c ]
a) 3 b) 2 c) 1 d) 0
9. Which of the following is not capability system that extends protection to user-defined software objects?                                                                   [ d]
a) Hydra b) Cambridge CAP system c) Mach d) Miranda
10. MULTICS uses a ______ structure in addition to file access. [c ]
a) Star b) Hybrid c) Ring d) Tree
11. DES works on a chunk of bits at a time is known as a _______ cipher.[b ]
a) Stream b) Hybrid c) Black d) White
12) Where does the Swap space reside                        [b ]
A)RAM B)Disk C)ROM D)On Chip Cache
13). An Audit Log                                                               [d ]
A)Simply records the time B)User C)Type of all access to an object D)All of these
14). The major security problem of O.S is                     [c ]
A)Human Problem B)Physical Problem
C)Authentication Problem D)None
15) A Temporary storage area, attached to the CPU for I/O operations is [ b]
A) Channel B)Buffer C)Register D)Core
16). In a serial communication , Extra Clock is needed                                  [b ]
A)To make efficient use of RS-232 B)For programmed Band rate control
C)To synchronize the devices D)All of these
17). Punched cards use                                                                                       [c ]
A)Alphanumeric code B)EBCDIC code C)Hollerith code D)ASCII code
18). Which of the following resources can cause Deadlock                         [d ]
A)Printers B)Shared programs C)Read only files D)All
19). A Partitioned data set is mostly used for                                                 [ a]
A)A Program or source library B)Storing program Data

C)Storing back up information D)Storing ISAM files 

No comments:

Post a Comment