OS Final

Beschreibung

IITU
Hello World
Quiz von Hello World, aktualisiert more than 1 year ago
Hello World
Erstellt von Hello World vor fast 8 Jahre
613
1

Zusammenfassung der Ressource

Frage 1

Frage
1. TCP/IP stands for
Antworten
  • o TCP/IP (Transmission Control Protocol/Internet Protocol)
  • o TCP/IP (Transfer Control Protocol/Internet Protocol
  • o TCP/IP (Transmission Control Protocol/Individual Protocol)
  • o TCP/IP (Transcript Control Protocol/Internet Protocol)

Frage 2

Frage
2. When was TCP/IP developed?
Antworten
  • o 1978
  • o 1977
  • o 1976
  • o 1975

Frage 3

Frage
3. With whom TCP/IP was driven
Antworten
  • o Kahn and Cerf
  • o Ronald and Cerf
  • o Cerf and George
  • o McColin and Kahn

Frage 4

Frage
4. TCP is higher layer
Antworten
  • True
  • False

Frage 5

Frage
5. What is the function of a subnet mask
Antworten
  • o to determine whether an IP address exists on the local network or whether it must be routed outside the local network.
  • o process that applies binary logic to yield binary results
  • o It sends out ICMP (Internet Control Message Protocol) messages to verify both the logical addresses & the Physical connection.
  • o to determine whether an IP address exists on the global network or whether it must be routed outside the global network.

Frage 6

Frage
6. Which of the following is false about Subnet Mask?
Antworten
  • o The function of a subnet mask is to determine whether an IP address exists on the local network or whether it must be routed outside the local network.
  • o It is applied to a message’s destination address to extract the network address.
  • o If the extracted network address matches the local network ID, the destination is located on the local network.
  • o It sends out ICMP (Internet Control Message Protocol) messages to verify both the logical addresses & the Physical connection

Frage 7

Frage
7. Define a boolean algebra
Antworten
  • o process that applies binary logic to yield binary results
  • o to determine whether an IP address exists on the local network or whether it must be routed outside the local network.
  • o It sends out ICMP (Internet Control Message Protocol) messages to verify both the logical addresses & the Physical connection.
  • o to determine whether an IP address exists on the global network or whether it must be routed outside the global network.

Frage 8

Frage
8. Define class A
Antworten
  • o large organizations, governments
  • o medium sized organizations
  • o small organizations
  • o extra small organisations

Frage 9

Frage
9. Define class B
Antworten
  • o large organizations, governments
  • o medium sized organizations
  • o small organizations
  • o extra small organisations

Frage 10

Frage
10. Define class C
Antworten
  • o large organizations, governments
  • o medium sized organizations
  • o small organizations
  • o extra small organisation

Frage 11

Frage
11. In Class A an IP address starts with
Antworten
  • o 0
  • o 10
  • o 110
  • o 1010

Frage 12

Frage
12. In Class C the network prefix is
Antworten
  • o 24 bits long
  • o 16 bits long
  • o 8 bits long
  • o 32 bits long

Frage 13

Frage
13. Into how many classes divided the address space in classful addressing ?
Antworten
  • 5
  • 4
  • 3
  • 2

Frage 14

Frage
14. How many layers have ISO/OSI Network Model
Antworten
  • 7
  • 6
  • 8
  • 5

Frage 15

Frage
15. What is a link layer
Antworten
  • o Includes device driver and network interface card
  • o Handles the movement of packets
  • o Provides a reliable flow of data between two hosts
  • o Handles the details of the particular application

Frage 16

Frage
16. What is a network layer
Antworten
  • o Includes device driver and network interface card
  • o Handles the movement of packets
  • o Provides a reliable flow of data between two hosts
  • o Handles the details of the particular application

Frage 17

Frage
17. What is a transport layer
Antworten
  • o Includes device driver and network interface card
  • o Handles the movement of packets
  • o Provides a reliable flow of data between two hosts
  • o Handles the details of the particular application

Frage 18

Frage
18. What is an application layer
Antworten
  • o Includes device driver and network interface card
  • o Handles the movement of packets
  • o Provides a reliable flow of data between two hosts
  • o Handles the details of the particular application

Frage 19

Frage
19. In Class B an IP address starts with
Antworten
  • o 0
  • o 10
  • o 110
  • o 1010

Frage 20

Frage
20. In Class C an IP address starts with
Antworten
  • o 0
  • o 10
  • o 110
  • o 1010

Frage 21

Frage
21. In Class A the network prefix is
Antworten
  • o 24 bits long
  • o 16 bits long
  • o 8 bits long
  • o 32 bits long

Frage 22

Frage
22. In Class B the network prefix is
Antworten
  • o 24 bits long
  • o 16 bits long
  • o 8 bits long
  • o 32 bits long

Frage 23

Frage
23. PING stands for
Antworten
  • o Packet Internet Groper
  • o Pocket Internet Groper
  • o Ping Internet Groper
  • o Packet Internet Gathering

Frage 24

Frage
24. ICMP stands for
Antworten
  • o Internet Control Message Protocol
  • o Internet Control Machine Protocol
  • o Internet Clarify Message Protocol
  • o Internet Control Management Protocol

Frage 25

Frage
25. Define PING
Antworten
  • o command verifies OSI Layer 3
  • o verifies both the logical addresses & the Physical connection
  • o process that applies binary logic to yield binary results
  • o verifies the Physical connection

Frage 26

Frage
26. Virtual memory provides
Antworten
  • o Automatic storage allocation
  • o Protection
  • o Sharibility
  • o All the above

Frage 27

Frage
27. Where Virtual Machine was developed?
Antworten
  • o Lancaster University
  • o Manchester University
  • o MIT
  • o Cambridge

Frage 28

Frage
28. What is the first commercial computer with virtual machine
Antworten
  • o B5000
  • o B5550
  • o B5500
  • o C5000

Frage 29

Frage
29. When was the first commercial computer with virtual machine released?
Antworten
  • o 1961
  • o 1962
  • o 1963
  • o 1964

Frage 30

Frage
30. Which of the following is false about VM and performance?
Antworten
  • o Better performance: we can use more memory than we have
  • o Nothing; mapping to memory or disk is just as easy
  • o Worse performance: reading from disk is slower than RAM
  • o Good performance: reading from disk is slower than RAM

Frage 31

Frage
31. Which of the following is false about usability of Virtual Memory?
Antworten
  • o Not enough memory
  • o Holes in the address space
  • o Keeping program secure
  • o Keeping program insecure

Frage 32

Frage
32. Define virtual address space
Antworten
  • o process refers to the logical (or virtual) view of how a process is stored in memory
  • o used to translate the virtual addresses seen by the application into physical addresses
  • o a segment of virtual memory that has been assigned a direct byte-for-byte correlation with some portion of a file or file-like resource.
  • o none of the mentioned

Frage 33

Frage
33. Define a page tables
Antworten
  • o process refers to the logical (or virtual) view of how a process is stored in memory
  • o used to translate the virtual addresses seen by the application into physical addresses
  • o a segment of virtual memory that has been assigned a direct byte-for-byte correlation with some portion of a file or file-like resource.
  • o none of the mentioned

Frage 34

Frage
34. Which of the following is incorrect about Subnet Mask
Antworten
  • o The function of a subnet mask is to determine whether an IP address exists on the local network or whether it must be routed outside the local network.
  • o It is applied to a message’s destination address to extract the network address.
  • o to determine whether an IP address exists on the global network or whether it must be routed outside the global network.
  • o If the extracted network address matches the local network ID, the destination is located on the local network.

Frage 35

Frage
35. What is a port number for SSH
Antworten
  • o TCP 22
  • o TCP 33
  • o TCP 25
  • o TCP 443

Frage 36

Frage
36. POP stands for
Antworten
  • o Post Office Protocol
  • o Postal Office Protocol
  • o Pop Office Protocol
  • o Prefix Office Protocol

Frage 37

Frage
37. Common port number for web pages
Antworten
  • o 80
  • o 23
  • o 25
  • o 110

Frage 38

Frage
38. Common port number for telnet
Antworten
  • o 80
  • o 23
  • o 25
  • o 110

Frage 39

Frage
39. Common port number for mail
Antworten
  • o 80
  • o 23
  • o 25 and 110
  • o 111

Frage 40

Frage
40. How many classes have a subnet mask
Antworten
  • 1
  • 2
  • 3
  • 4

Frage 41

Frage
41. At the FILE SYSTEM SECURITY what is an Access right?
Antworten
  • o The way in which an object is accessed by a subject
  • o Anything to which access is controlled
  • o An entity capable of accessing objects
  • o None of them

Frage 42

Frage
42. At Linux Virtual File System Concept, The four primary object types in VFS are as follows:
Antworten
  • o Superblock object, inode object, dentry object, file object
  • o System object, software object, hardware object, network object
  • o Virtual object, physical object, i/o object, calling object
  • o File system object, user object, disk object, mapping object

Frage 43

Frage
43. What is an EMBEDDED SYSTEMS?
Antworten
  • o combination of computer hardware and software, and perhaps additional mechanical or other part, designed to perform a dedicated function
  • o A file consists of a collection of records
  • o The cache manager calls the log file system to prompt it to flush the log file to disk.
  • o Once the log file updates are safely on disk, the cache manager flushes the volume changes to disk

Frage 44

Frage
44. CHARACTERISTICS OF EMBEDDED OPERATING SYSTEMS, Give definition to Real-time operation:
Antworten
  • o In many embedded systems, the correctness of a computation depends, in part, on the time at which it is delivered
  • o Embedded software may execute in response to external events
  • o Condtional compilation can be used
  • o There is virtually no device that needs to be supported by all versions of the OS, and the range of I/O devices is large

Frage 45

Frage
45. Give the correct way to “Loading an eCos Configuration”:
Antworten
  • o GNU make utility>>Application source code>>GNU cross compiler>>GNU linker>>Executable file
  • o Application source code>>GNU linker>>GNU cross compiler>>GNU make utility>>Executable file
  • o GNU linker>>Application source code>>GNU make utility>>GNU cross compiler>>Executable file
  • o GNU cross compiler>>GNU linker>>GNU make utility>>Application source code>>Executable file

Frage 46

Frage
46. Choose the correct choice of the “eCos Layered Structure” from bottom- to- top?
Antworten
  • o Hardware abstraction layer, Kernel, I/O system, Standard C library, User application code
  • o Kernel, I/O system, Standard C library, User application code, Hardware abstraction layer
  • o User application code, Standard C library, I/O system, Kernel, Hardware abstraction layer
  • o I/O system, Kernel, Hardware abstraction layer, Standard C library, User application code.

Frage 47

Frage
47. How many implemented separate modules has The HAL?
Antworten
  • 3
  • 4
  • 5
  • 6

Frage 48

Frage
48. How many main objectives has The eCos Kernel was designed to satisfy?
Antworten
  • 4
  • 5
  • 6
  • 7

Frage 49

Frage
49. What does “TINYOS” mean?
Antworten
  • o Represents a significant departure from other embedded operating systems
  • o is a flag that a thread can check before executing a particular piece of code.
  • o A different distributes of Linux.
  • o A different versions of Windows.

Frage 50

Frage
50. Three abstractions for resources are used in TinyOS:
Antworten
  • o Dedicated, Virtualized, Shared
  • o Abstracted, Powered, Protected
  • o Determined, Called, Multiplexed
  • o Needed, Controlled, Used

Frage 51

Frage
51. What is a Computer Security?
Antworten
  • o The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information resources
  • o Comparing the information systems with computer systems
  • o Updating hardware and software
  • o Creating the local and global networks for computer systems

Frage 52

Frage
52. This definition introduces three key objectives that are at the heart of computer security:
Antworten
  • o Confidentiality, Integrity, Availability
  • o Protection, Updating, Creating
  • o Attacking, Copying, Pasting
  • o Dividing, Working, Researching

Frage 53

Frage
53. Although the use of the CIA triad to define security objects is well established, some in the security field feel that additional concepts are needed to present a complete picture. Two of the most commonly mentioned are as follows:
Antworten
  • o Authenticity, Accountability
  • o Loggin, Entering
  • o Accessibility, Availability
  • o Realibility, Security

Frage 54

Frage
54. Network security attacks can be classified as:
Antworten
  • o Passive and active attacks
  • o Dangerous and undangerous
  • o Correct and incorrect
  • o Direct and indirect.

Frage 55

Frage
55. In an important early study of intrusion, Anderson[ANDE80] identified three classes of intruders:
Antworten
  • o Masquerader, misfeasor, clandestine user
  • o Individual, legitimate, authorized
  • o Control, exploit, system
  • o Outside, inside, offside.

Frage 56

Frage
56. How many parts of Memory Hierarchy?
Antworten
  • 5
  • 4
  • 3
  • 2

Frage 57

Frage
57. In Memory Hierarchy, at the Outboard storage which of the following are included:
Antworten
  • o Cache
  • o Main memory
  • o Magnetic tape
  • o Magnetic disk

Frage 58

Frage
58. In Memory Hierarchy, at the Off-line storage which of the following are included:
Antworten
  • o Cache
  • o Magnetic disk
  • o Magnetic tape
  • o Main memory

Frage 59

Frage
59. In Memory Hierarchy, at the Inboard memory which of the following are included:
Antworten
  • o Main memory
  • o Magnetic disk
  • o Magnetic tape
  • o Optical disk

Frage 60

Frage
60. Cache Design has these properties?
Antworten
  • o Size, block size, mapping function, replacement algorithm, write policy
  • o Size, search function, write function, read policy, vector algorithm
  • o Size, mapping algorithm, vector function, write policy, replacement function
  • o Size, blocking algorithm, search function, replacement vector, read policy

Frage 61

Frage
61. Three techniques are possible for I/O operations:
Antworten
  • o Programmed I/O, Interrupt-driven I/O, Direct memory access(DMA)
  • o Object-oriented I/O, Design I/O, Usable I/O
  • o Machine I/O, Architecture I/O, Hardware I/O
  • o Control I/O, Status I/O, Transfer I/O

Frage 62

Frage
62. How many principles has Deadlock?:
Antworten
  • o 3
  • o 5
  • o 2
  • o 6

Frage 63

Frage
63. Which of the following principles has Deadlock?
Antworten
  • o Prevention, Avoidance, Detection
  • o Execution, Association, Starvation
  • o Exclusion, Avoidance, Starvation
  • o Starvation, Detection, Exclusion

Frage 64

Frage
64. Much of the work in security and protection as it relates to operating systems can be roughly grouped into four categories?
Antworten
  • o Availability, confidentiality, data integrity, authenticity
  • o Safety, accountability, reliability, density
  • o Usability, integrity, confidentiality, reliability
  • o Flexibility, availability, accountability, authenticity

Frage 65

Frage
65. The central themes of operating system design are all concerned with the management of processes and threads?
Antworten
  • o Multiprogramming, multiprocessing, distributed processing
  • o Multitasking, multiprogramming, multithreading
  • o Multiprocessing, uniprocessing, multitasking
  • o Multithreading, distributed processing, uniprocessing

Frage 66

Frage
66. Which one of the following linux file system does not support journaling feture?
Antworten
  • o ext2
  • o ext3
  • o ext4
  • o none of the mentioned

Frage 67

Frage
67. With the installation of Linux, a super user account is created called as _____
Antworten
  • o Superuser
  • o User
  • o Administrator
  • o Root

Frage 68

Frage
68. Which command would you use if you want to remove the password assigned to a group?
Antworten
  • o gpasswd – r
  • o gpasswd – d
  • o userdel
  • o delgroup

Frage 69

Frage
69. What command is used to remove files?
Antworten
  • o Dm
  • o Rm
  • o Del
  • o Erase
  • o Wc

Frage 70

Frage
70. What command is used to remove the directory?
Antworten
  • o Remove
  • o Rdir
  • o Mdir
  • o Delete
  • o Rmdir

Frage 71

Frage
71. Convert this number systems: BIN(1111000111) to DEC?
Antworten
  • o 967
  • o 912
  • o 868
  • o 898

Frage 72

Frage
72. Convert this number systems: BIN(10101010101) to DEC?:
Antworten
  • o 1365
  • o 1432
  • o 1295
  • o 1523

Frage 73

Frage
73. Convert this number systems: BIN(1100001100) to DEC?:
Antworten
  • o 780
  • o 795
  • o 824
  • o 912

Frage 74

Frage
74. Convert this number systems: BIN(1111000111) to DEC?
Antworten
  • o 967
  • o 912
  • o 868
  • o 898

Frage 75

Frage
75. Which of the following is not one of the principles of dealing with deadlock?
Antworten
  • o Initialization
  • o Prevention
  • o Avoidance
  • o Detection

Frage 76

Frage
76. Current allocation of resources to processes where there is at least one sequence that does not result in deadlock is called:
Antworten
  • o Safe state
  • o Unsafe state
  • o Ambiguous state
  • o Alternative state

Frage 77

Frage
77. Current allocation of resources to processes where there is no sequence that does not result in deadlock is called:
Antworten
  • o Unsafe state
  • o Safe state
  • o Ambiguous state
  • o Alternative state

Frage 78

Frage
78. Can you solve the Dining Philosophers’ Problem using monitors?
Antworten
  • o Yes
  • o No
  • o Yes, but only if there are less than five philosophers
  • o No, unless there are more than five philosophers

Frage 79

Frage
79. A fixed-length block of main memory is called:
Antworten
  • o Frame
  • o Page
  • o Segment
  • o Section

Frage 80

Frage
80. A fixed-length block of data in secondary memory is called:
Antworten
  • o Frame
  • o Page
  • o Segment
  • o Section

Frage 81

Frage
81. A variable-length block of data that resides in secondary memory is called:
Antworten
  • o Frame
  • o Page
  • o Segment
  • o Section

Frage 82

Frage
82. When free memory is split into many unconnected pieces we call it:
Antworten
  • o Internal fragmentation
  • o External fragmentation
  • o Compaction
  • o Memory distribution

Frage 83

Frage
83. Memory partitioning algorithm that uses binary tree as a data structure is called:
Antworten
  • o First-fit algorithm
  • o Next-fit algorithm
  • o Buddy system
  • o Best-fit algorithm

Frage 84

Frage
84. A state in which the system spends most of its time swapping pieces rather than executing instructions is called:
Antworten
  • o Virtual memory
  • o Thrashing
  • o Swapping
  • o Spanning

Frage 85

Frage
85. What command do you use to create Linux file systems?
Antworten
  • o Fdisk
  • o Mkfs
  • o Fsck
  • o Mount

Frage 86

Frage
86. What command is not used to list the files chap01, chap02 and chap04?
Antworten
  • o ls chap*
  • o ls chap[124]
  • o ls - x chap0[124]
  • o ls chap0[124]

Frage 87

Frage
87. What is operating system?
Antworten
  • o collection of programs that manages hardware resources
  • o system service provider to the application programs
  • o link to interface the hardware and application programs
  • o all of the mentioned

Frage 88

Frage
88. The main function of the command interpreter is
Antworten
  • o to get and execute the next user-specified command
  • o to provide the interface between the API and application program
  • o to handle the files in operating system
  • o none of the mentioned

Frage 89

Frage
89. To create a file
Antworten
  • o allocate the space in file system
  • o make an entry for new file in directory
  • o both (a) and (b)
  • o none of the mentioned

Frage 90

Frage
90. What is a Server?
Antworten
  • o is a computer program running to serve the requests of other programs, the "clients".
  • o Simple computer
  • o Optical device
  • o Types of laptops

Frage 91

Frage
91. Show incorrect choice, when we mean types of Server:
Antworten
  • o Cooking server
  • o Database server
  • o Client server
  • o Application server

Frage 92

Frage
92. What is a Create file?
Antworten
  • o When a new file is created, an entry must be added to the directory
  • o When a user or application references a file, the directory must be searched to find the entry corresponding to that file..
  • o When a file is deleted, an entry must be removed from the directory.
  • o All or a portion of the directory may be requested.

Frage 93

Frage
93. What is a Delete file?
Antworten
  • o When a file is deleted, an entry must be removed from the directory
  • o When a user or application references a file, the directory must be searched to find the entry corresponding to that file..
  • o When a new file is created, an entry must be added to the directory.
  • o All or a portion of the directory may be requested.

Frage 94

Frage
94. Given the IP address 172.16.12.54 with a mask of 255.255.255.240, which of the following are valid host addresses on the different subnet?
Antworten
  • o 172.16.12.64
  • o 172.16.12.57
  • o 172.16.12.49
  • o 172.16.12.48
  • o 172.16.12.63
  • o 172.16.12.45

Frage 95

Frage
95. You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which classful subnet mask would you use?
Antworten
  • o 255.255.255.192
  • o 255.255.255.224
  • o 255.255.255.240
  • o 255.255.255.248

Frage 96

Frage
96. Given the IP address 172.16.12.54 with a mask of 255.255.255.240, which of the following are valid broadcast addresses?
Antworten
  • o 172.16.12.64
  • o 172.16.12.57
  • o 172.16.12.49
  • o 172.16.12.48
  • o 172.16.12.63
  • o 172.16.12.45

Frage 97

Frage
97. File type can be represented by
Antworten
  • o file name
  • o file extension
  • o file identifier
  • o none of the mentioned

Frage 98

Frage
98. What does GNU stand for?
Antworten
  • o GNU's not Unix
  • o Greek Needed Unix
  • o General Unix
  • o General Noble Unix
  • o None of the above

Frage 99

Frage
99. Which of the following is not a principle of storage management responsibilities?
Antworten
  • o Process isolation
  • o Process termination
  • o Automatic allocation and management
  • o Protection and access control

Frage 100

Frage
100. Virtual memory takes advantage of
Antworten
  • o Fast CPU
  • o Large secondary memory
  • o Modular programming
  • o Scheduling
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

Biology Revision - Y10 Mock
Tom Mitchell
Biology- Genes and Variation
Laura Perry
AQA Physics P1 Quiz
Bella Statham
Acids and Bases
Sarah Egan
Using GoConqr to teach science
Sarah Egan
Using GoConqr to study science
Sarah Egan
GCSE Combined Science
Derek Cumberbatch
Physics Revision
Tom Mitchell
The Circulatory System
Shane Buckley
Acids and Bases
silviaod119
Elements, Compounds and Mixtures
silviaod119