MockTest3.docx
Revision for your Resit Test
Your third test is based on lectures 14 to 21. The actual test consists of 30 multiple choice questions only.
A situation where several processes access and manipulate the same data concurrently and the outcome of the execution depends on the particular order in which access takes place is called ____________
Data consistency
Race condition
Aging
Starvation
The segment of code in which the process may change common variables, update tables, write into files is known as ____________
Program
Critical section
Non – critical section
Synchronizing
Which of the following conditions must be satisfied to solve the critical section problem?
Mutual Exclusion
Progress
Bounded Waiting
All of the above
Mutual exclusion implies that ____________
If a process is executing in its critical section, then no other process must be executing in their critical sections
If a process is executing in its critical section, then other processes must be executing in their critical sections
If a process is executing in its critical section, then all the resources of the system must be blocked until it finishes execution
None of the above
Bounded waiting implies that there exists a bound on the number of times a process is allowed to enter its critical section ____________
After a process has made a request to enter its critical section and before the request is granted
When another process is in its critical section
Before a process has made a request to enter its critical section
None of the above
Semaphore is a/an _______ to solve the critical section problem.
Hardware for a system
Special program for a system
Integer variable
None of the above
What are the two kinds of semaphores?
Mutex & counting
Binary & counting
Counting & decimal
Decimal & binary
The dining – philosophers problem will occur in case of ____________
5 philosophers and 5 forks
4 philosophers and 5 forks
3 philosophers and 5 forks
6 philosophers and 5 forks
A monitor is a type of ____________
Semaphore
Low level synchronization construct
High level synchronization construct
None of the above
The monitor construct ensures that ____________
Only one process can be active at a time within the monitor
n number of processes can be active at a time within the monitor (n being greater than 1)
The queue has only one process in it at a time
All of the above
What are the operations that can be invoked on a condition variable?
hold & wait
Signal & hold
Continue & signal
Wait & signal
Which of the following condition is required for a deadlock to be possible?
Mutual exclusion
A process may hold allocated resources while awaiting assignment of other resources
no resource can be forcibly removed from a process holding it
All of the above
A system is in the safe state if ____________
The system can allocate resources to each process in some order and still avoid a deadlock
There exist a safe sequence
All of the above
None of the above
The circular wait condition can be prevented by ____________
Using thread
Defining a linear ordering of resource types
Using pipes
All of the above
A problem encountered in multitasking when a process is perpetually denied necessary resources is called ____________
Deadlock
Starvation
Inversion
Aging
What is Address Binding?
Going to an address in memory
Locating an address with the help of another address
Binding two addresses together to form a new address in a different memory space
A mapping from one address space to another
Binding of instructions and data to memory addresses can be done at ____________
Compile time
Load time
Execution time
All of the above
If the process can be moved during its execution from one memory segment to another, then binding must be ____________
Delayed until run time
Preponed to compile time
Preponed to load time
None of the above
What is Dynamic loading?
Loading multiple routines dynamically
Loading a routine only when it is called
Loading multiple routines randomly
None of the above
What is the advantage of dynamic loading?
A used routine is used multiple times
An unused routine is never loaded
CPU utilization increases
All of the above
If a higher priority process arrives and wants service, the memory manager can swap out the lower priority process to execute the higher priority process. When the higher priority process finishes, the lower priority process is swapped back in and continues execution. This variant of swapping is sometimes called?
Priority swapping
Pull out, push in
Roll out, roll in
None of the above
The address generated by the CPU is referred to as ____________
Physical address
Logical address
Neither physical nor logical
None of the above
Which of the following are forms of malicious attack?
Theft of information
Modification of data
Wiping of information
All of the above
The address loaded into the memory address register of the memory is referred to as ____________
Physical address
Logical address
Neither physical nor logical
None of the mentioned
The run time mapping from virtual to physical addresses is done by a hardware device called the ____________
Virtual to physical mapper
Memory management unit
Memory mapping unit
None of the above
In contiguous memory allocation ____________
Each process is contained in a single contiguous section of memory
All processes are contained in a single contiguous section of memory
The memory space is contiguous
None of the above
The relocation register helps in ____________
Providing more address space to processes
A different address space to processes
To protect the address spaces of processes
None of the above
Physical memory is broken into fixed-sized blocks called ________
Frames
Pages
Backing store
None of the above
Logical memory is broken into blocks of the same size called ________
Frames
Pages
Backing store
None of the above
The size of a page is typically ____________
Varied
Power of 2
Power of 4
None of the above
When the valid – invalid bit is set to valid, it means that the associated page ____________
Is in the TLB
Has data in it
Is in the process’s logical address space
Is the system’s physical address space
The CPU hardware has a wire called __________ that the CPU senses after executing every instruction.
Interrupt request line
Interrupt bus
Interrupt receive line
Interrupt sense line
The _________ determines the cause of the interrupt, performs the necessary processing and executes a return from the interrupt instruction to return the CPU to the execution state prior to the interrupt.
Interrupt request line
Device driver
Interrupt handler
All of the above
In general the two interrupt request lines are ____________
Maskable & non maskable interrupts
Blocked & non maskable interrupts
Maskable & blocked interrupts
None of the above
For large data transfers, _________ is used.
DMA
Programmed I/O
Controller register
None of the above
What is the breach of integrity?
This type of violation involves unauthorized reading of data
This violation involves unauthorized modification of data
This violation involves unauthorized destruction of data
This violation involves unauthorized use of resources
What is breach of confidentiality?
This type of violation involves unauthorized reading of data
This violation involves unauthorized modification of data
This violation involves unauthorized destruction of data
This violation involves unauthorized use of resources
What is breach of availability?
This type of violation involves unauthorized reading of data
This violation involves unauthorized modification of data
This violation involves unauthorized destruction of data
This violation involves unauthorized use of resources
What is known as a DOS attack?
It is attacked to block traffic of network
It is attacked to harm contents stored in HDD by worm spawn processes
It is an attempt to make a machine or network resource unavailable
None of the above
What is Trojan horse?
It is a useful way to encrypt password
It is a user which steals valuable information
It is a rogue program which tricks users
It’s a brute force attack algorithm
What is trap door?
It is trap door in WarGames
It is a hole in software left by designer
It is a Trojan horse
It is a virus which traps and locks user terminal
Which mechanism is used by worm process?
Trap door
Fake process
Spawn Process
VAX process
What is known as masquerading?
When one participant in communication pretends to be someone else
When attacker modifies data in communication
When attack is of fraudulent repeat of a valid data
When attack gains access to remote systems
What is used to protect network from outside internet access?
A trusted antivirus
24 hours scanning for virus
Firewall to separate trusted and untrusted network
Deny users access to websites which can potentially cause security leak
Which direction access cannot happen using DMZ zone by default?
Company computer to DMZ
Internet to DMZ
Internet to company computer
Company computer to internet
What are characteristic of Network Operating Systems?
Users are aware of multiplicity of machines
They are transparent
They are simple to use
All of the above
What are the characteristics of Distributed Operating system?
Users are aware of multiplicity of machines
Access is done like local resources
They have multiple zones to access files
None of the above
What are the characteristics of data migration?
Transfer data by entire file or immediate portion required
Transfer the computation rather than the data
Execute an entire process or parts of it at different sites
None of the above
What are the characteristics of process migration?
A.Transfer data by entire file or immediate portion required
B. Transfer the computation rather than the data
C. Execute an entire process or parts of it at different sites
D. None of the above
How many layers does the Internet model ISO consist of?
A.Three
B. Five
C. Seven
D. Eight