Quiz Sail Part 2 Flashcards
Access matrix model for user authentication contains:
A: a list of objects
B: a function which returns an object’s type
C: a list of domains
D: all of the mentioned
D: all of the mentioned
In the single level directory:
A: all of the mentioned
B: all files must have unique names
C: all files must have unique owners
D: all directories must have unique names
B: all files must have unique names
A parent process calling –?– system call will be suspended until children processes terminate.
A: fork
B: exit
C: wait
D: exec
C: wait
In a system that does not support swapping:
A: binding of symbolic addresses to physical addresses normally takes place during execution
B: the compiler normally binds symbolic addresses (variables) to relocatable addresses
C: the loader binds relocatable addresses to physical addresses
D: the compiler normally binds symbolic addresses to physical addresses
B: the compiler normally binds symbolic addresses (variables) to relocatable addresses
What is breach of availability?
A: This violation involves unauthorized use of resources
B: This violation involves unauthorized destruction of data
C: This violation involves unauthorized modification of data
D: This type of violation involves unauthorized reading of data
B: This violation involves unauthorized destruction of data
To differentiate the many network services a system supports –?– are used.
A: Variables
B: Service names
C: Sockets
D: Ports
D: Ports
Spinlocks are:
A: Locks that avoid time wastage in context switches
B: CPU cycles wasting locks over critical sections of programs
C: Locks that work better on multiprocessor systems
D: All of the mentioned
D: All of the mentioned
The code segment that misuses its environment is called a:
A: code stacker
B: trojan horse
C: internal thief
D: none of the mentioned
B: trojan horse
The circular wait condition can be prevented by:
A: using thread
B: defining a linear ordering of resource types
C: all of the mentioned
D: using pipes
B: defining a linear ordering of resource types
The idea of overlays is to:
A: all of the mentioned
B: data that are needed at any given time
C: enable a process to be larger than the amount of memory allocated to it
D: keep in memory only those instructions
A: all of the mentioned
External fragmentation exists when:
A: a request cannot be satisfied even when the total memory is free
B: none of the mentioned
C: the total memory is insufficient to satisfy a request
D: enough total memory exists to satisfy a request but it is not contiguous
D: enough total memory exists to satisfy a request but it is not contiguous
The usefulness of signals as a general inter process communication mechanism is limited because:
A: none of the mentioned
B: they cannot carry information directly
C: they do not work between processes
D: they are user generated
B: they cannot carry information directly
Error handler codes, to handle unusual errors are:
A: almost never executed
B: executed very often
C: none of the mentioned
D: executed periodically
A: almost never executed
A file is a/an –?– data type.
A: abstract
B: private
C: primitive
A: abstract
The current directory contains, most of the files that are:
A: of current interest to the user
B: not of current interest to the system
C: not used in the system
D: stored currently in the system
A: of current interest to the user
The –?– keeps state information about the use of I/O components.
A: OS
B: CPU
C: shell
D: kernel
D: kernel
In a time-sharing operating system, when the time slot given to a process is completed, the process goes from the running state to the:
A: Blocked state
B: Terminated state
C: Suspended state
D: Ready state
D: Ready state
When an attempt is to make a machine or network resource unavailable to its intended users, the attack is called:
A: tarvation attack
B: slow read attack
C: denial-of-service attack
D: spoofed attack
C: denial-of-service attack
In operating system, each process has its own:
A: open files
B: address space and global variables
C: all of the mentioned
D: pending alarms, signals and signal handlers
C: all of the mentioned
In UNIX, even an ’empty’ disk has a percentage of its space lost to:
A: stacks
B: programs
C: inodes
D: virtual memory
C: inodes
Swap space exists in:
A: primary memory
B: secondary memory
C: cpu
D: none of the mentioned
B: secondary memory
_____ is the concept in which a process is copied into main memory from the secondary memory according to the requirement.
A: Swapping
B: Paging
C: Segmentation
D: Demand paging
D: Demand paging
The minimum number of frames to be allocated to a process is decided by the:
A: the amount of available physical memory
B: none of the mentioned
C: operating System
D: instruction set architecture
D: instruction set architecture
What is all-or-nothing situation for sharing in memory?
A: Program makes all its data available to be accessed
B: It prohibits access to some
C: It separates program memory and data memory
D: It creates rules who can access program memory
A: Program makes all its data available to be accessed