OS
.pdf1.The file system permits users to create data collections, called files, with desirable properties, such as
***• Field, Record, File, Database
2.For terms are in common use when discussing files: ***• Field, Record, File, Database
3.What is a field? ***•It is the basic element of data
4.What is a record?***• It is a collection of related fields that can be treated as a unit by some application program
5.What is a file? ***•It is a collection of similar records.
6.In choosing a file organization, several criteria are important: ***• Short access time, Ease of update,
Economy of storage, Simple maintenance, Realibility
7.To understand the requirements for a file structure, it is helpful to consider the types of operations that may be performed on the directory: ***• Search, Delete, Create, List Directory, Update Directory
8.What is a Search? ***• When a user or application references a file, the directory must be searched to find the entry corresponding to that file.
9.What is a Create file? ***•When a new file is created, an entry must be added to the directory
10.What is a Delete file? ***• When a file is deleted, an entry must be removed from the directory
11.What is a List Directory? ***• All or a portion of the directory may be requested.
12.What is aUpdate Directory? ***• Because some file attributes are stored in the directory, a change in one of these attributes requires a change in the corresponding directory entry.
13.At the Secondary storage management what is a Volume? ***• A collection of addressable sectors in secondary memory that an OS or application can use for date storage
14.At the FILE SYSTEM SECURITY what is a Subject? ***• An entity capable of accessing objects
15.At the FILE SYSTEM SECURITY what is an Object? ***• Anything to which access is controlled
16.At the FILE SYSTEM SECURITY what is an Access right? ***• The way in which an object is accessed by a subject
17.At Linux Virtual File System Concept, The four primary object types in VFS are as follows: ***•
Superblock object, inode object, dentry object, file object
18.What is an EMBEDDED SYSTEMS? ***• combination of computer hardware and software, and perhaps additional mechanical or other part, designed to perform a dedicated function
19.CHARACTERISTICS OF EMBEDDED OPERATING SYSTEMS, Give definition to Real-time operation:
****• In many embedded systems, the correctness of a computation depends, in part, on the time at which it is delivered
20.Give the correct way to “Loading an eCos Configuration”: ***• GNU make utility>>Application source code>>GNU cross compiler>>GNU linker>>Executable file
21.Choose the correct choice of the “eCos Layered Structure” from bottomto- top? ***• Hardware abstraction layer, Kernel, I/O system, Standard C library, User application code
22.How many implemented separate modules has The HAL? ***• 3
23.How many main objectives has The eCos Kernel was designed to satisfy? ***• 4
24.What does “TINYOS” mean? ***• Represents a significant departure from other embedded operating systems
25.Three abstractions for resources are used in TinyOS: ***• Dedicated, Virtualized, Shared
26.What is a Computer Security? ****• The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information resources
27.This definition introduces three key objectives that are at the heart of computer security: ***•
Confidentiality, Integrity, Availability
28.Although the use of the CIA triad to define security objects is well established, some in the security field feel that additional concepts are needed to present a complete picture. Two of the most commonly mentioned are as follows: ***• Authenticity, Accountability
29.Network security attacks can be classified as: ***• Passive and active attacks
30.In an important early study of intrusion, Anderson[ANDE80] identified three classes of intruders:
****• Masquerader, misfeasor, clandestine user
31.What is a Virus? ****• Malware that, when executed, tries to replicate itself into other executable code
32.What is a Worm? ****• A computer program that can run independently and can propagate a complete working version of itself onto other hosts on a network
33.What is a Logic bomb? ****• A program inserted into software by an intruder
34.What is a Trojan horse? ****• A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legimate authorizations of a system entity that invokes the Trojan horse program
35.What is a Backdoor (trapdoor)? ****• Any mechanisms that bypasses a normal security check; it may allow unauthorized access to functionality
36.What is a Mobile code? ****• Software (e.g., script, macro, or other portable instruction) that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics
37.What is aExploits? ****• Code specific to a single vulnerability or set of vulnerabilities.
38.What is a Downloaders? ****• Program that installs other items on a machine that is under attack
39.What is an Auto-rooter? ****• Malicious hacker tools used to break into new machines remotely
40.What is a Kit (virus generator)? ****• Set of tools for generating new viruses automatically
41.What is a Spammer programs? ****• Used to send large volumes of unwanted e-mail.
42.What is a Flooders? ****• Used to attack networked computer systems with a large volume of traffic to carry out a denial-of-service (DoS) attack
43.What is a Keyloggers? *-***• Captures keystrokes on a compromised system
44.What is a Rootkit? ****• Set of hacker tools used after attacker has broken into a computer system and gained root-level access
45.What is a Zombie, bot? ****• Program activated on an infected machine that is activated to launch attacks on other machines
46.What is a Spyware? ****• Software that collects information from a computer and transmits it to another system
47.What is aAdware? ****• Advertising that is integrated into software
48. What is aInfection mechanism? ****• The means by which a virus spreads, enabling it to replicate
49.A virus classification by target includes the following categories,What is a File infector? *****•
Infects files that the operating system or shellconsider to be executable
50.What is a Multiplatform? ****• Newer worms are not limited to Windows machines but can attack a variety of platforms, especially the popular varieties of UNIX
51.Uses of Bots, What does mean Spamming ? ****• With the help of a botnet and thousands of bots, an attacker is ableto send massive amounts of bulk e-mail (spam)
52.A rootkitmaybe? ***** • Persistent, Memory based,User mode, Kernel mode
53.Memory based, rootkit? ******• Has no persistent code and therefore cannot survive a reboot
54.What is a Authentication? ***** • is the basis for mosttypes of access control and for user accountability
55.An authentication process consists of two steps: ***** • Identificationstep, Verificationstep
56.Among the potential drawbacks are the following [NIST95]: **** • Requires special reader, Token loss, User dissatisfaction
57.Access control policies are generally grouped into the following categories: ****** • Discretionary access control, Mandatory access control, Role-based access control
58.The following definitions from RFC 2828 (Internet Security Glossary) are relevant to our discussion: -
***** • Securityintrusion, Intrusiondetection
59.How many IDSs can be classified: ***** 5
60.IDSs can be classified as follows: ***** • Host-based IDS, Network-based IDS, Sensors, Analyzers, User interface
61.Malware Defense. Antivirus Approaches. The next best approach is to be able to do the following:
**** • Detection, Identification, Removal
62.If we say about Generic Decryption, what we are meaning of Virus signature scanner: **** • A module that scans the target code looking for known virus signatures
63.At Generic Client/Server Architecture (Client workstation) show correct way from bottom-to-top?
**** • Hardware platform, Client operating system, Communications software, Application logic,
Presentation services
64.[BREW97] lists four benefits that can be achieved with clustering. These can also be thought of as objectives or design requirements: ***** • Absolute scalability, Incremental scalability, High availability,
Superior price/performance
65.Parallelizing Computation, In some cases, effective use of a cluster requires executing software from a single application in parallel. [KAPP00] lists three general approaches to the problem: **** •
Parallelizing compiler, Parallelized application, Parametric computing
66.The Windows Cluster Server design makes use of the following concepts: *** • Cluster Service,
Resource, Online, Group
67.The major components of Sun Cluster are: ***** • Object and communication support, Process management, Networking, Global distributed file system
68.What is a Server? **** • is a computer program running to serve the requests of other programs, the "clients".
69.Show incorrect choice, when we mean types of Server: **** • Cooking server
70.The Sun Cluster networking subsystem has how many key elements? **** • 3
71.Which of the following is not a function of the CPU? **** • Processing video display data
72. The main principle underlying the design of operating systems is **** • |
Abstraction |
73.Which of the following is not considered to be internal part of the computer? ****•
Communication device (network card, modem, etc)
74.Which of the following is an example of input-output device? **** • Network card
75. Which of the following is not a layer of the system bus? **** • |
Sound bus |
|
||
76. How CPU’s status registers are also called? **** • |
Flags |
|
|
|
77. How is CPU’s internal memory called? *** • |
Flags |
|
|
|
78. Stopping the current sequencing of the processor is called **** • |
Interrupt |
|
||
79. Main reason for improving CPU utilization is: **** • |
Slowness of I/O devices compared to |
|||
CPU |
|
|
|
|
80. What are the correct types of multiple interrupt handling? **** • |
Sequential and nested |
|||
81. What is stored in cache memory? ****• Copy of a portion of the main memory |
|
|||
82. What is the main principle underlying the design of caching systems? ****• |
Principle of |
|||
locality |
|
|
|
|
83. Which of the following is not a layer in OS design? **** • I/O level
84. What is the most obvious solution to low CPU utilization problem? **** • Multiprogramming
85. A processis **** • Instance of running program
86. Which of the following is not a principle of storage management responsibilities? ****• Process termination
87. Virtual memory takes advantage of **** • Large secondary memory
88. In a microkernel OS the scheduler resides in: ****• Kernel
89.Thread is: *** • Dispatchable unit of work
90.Which of the following cannot be interrupted? **** • Atomic operation
91.In Linux, the graphic subsystem is located in **** • User level
92.Which of the following is not considered to be a part of the process? *****• File structure
93.Trace of the process is: **** • List of instructions that are executed
94.Dispatcher is: **** • Small program which switches the processor from one process to another
95.The problem with two-state process model is **** • Single queue
96.Process spawning is **** • Creation of child process
97. A good reason for process suspension is **** • |
Swapping |
|
98. Which of the following is not a type of OS control table? *****• |
Time table |
99.Another term for spawning is: **** • Forking
100.File tables provide information about: ***** • Files, their location, status
101.Process control block consists of the following ***** • Process ID, state information, control information
102.Two modes of execution most processors support is: ***** • User mode and system mode
103.Which of the following is not a proper step in process creation? ***** • Clearing the memory
104.Which of the following is not a reason to switch a process? **** • Kernel update
105. Three types of operating system kernel process design: ***** • Separate kernel, OS functions within user processes, OS functions are separate processes
106.What thread approach did MS-DOS use? **** • One process, one thread
107.What thread approach does Java run-time environment use? **** • One process, multiple threads
108.What thread approach does Windows use? **** •Multiple processes, multiple threads per process
109.What controls the process in a single-threaded process model? ****• Process control block
110. |
What controls the process in a multi-threaded process model? ***** • Process control block |
|
111. |
What controls the thread in a multi-threaded process model? **** • |
Thread control block |
112.Threadexecutionstatesare: ***** • Spawn, Block, Unblock, Finished
113.What relationship between threads and number of processes is used in old traditional UNIX implementations? ****** • One to one
114.What relationship between threads and number of processes is used Windows NT, OS/2, Solaris,
Linux? **** • Many to one
115.What relationship between threads and number of processes is used cloud computing? ***** • One to many
116.What relationship between threads and number of processes is used in TRIX systems? **** •
One to many
117.What type of parallel processor architecture is used in GPU (graphic cards) design? ***** • SIMD
118. |
What type of parallel processor architecture is used in multi-core processors? **** • |
MIMD |
||
shared memory |
|
|
|
|
119. |
What type of parallel processor architecture is used in clusters? **** • MIMD distributed |
|||
memory |
|
|
|
|
120. Two main types of OS kernels are: ***** • Microkernel and monolithic kernel |
|
|
||
121. Processes in Windows are implemented as: ***** • |
Objects |
|
|
|
122. |
A sequence of one or more statements that appear to be indivisible is: **** • |
Atomic operation |
123. A section of code within a process that requires access to shared resources and that must not be executed while another operation is in a corresponding section of code is called: **** • Critical section
124. A situation in which two or more processes are unable to proceed because each is waiting for one of the others to do something is called: ***** • Deadlock
125.A requirement that when one process is in a critical section that accesses shared resources no other operation may be in a critical section that accesses any of those shared resources is called: *****
• Mutual exclusion
126.A situation in which a runnable process is overlooked intinitely by the scheduler, although it is able
to proceed, it is never chosen: **** • Starvation |
|
|
127. |
What is a hardware way of handling mutual exclusion? **** • |
Disabling interrupts |
128. |
A simple integer value with a queue used for signaling among processes is called ****** • |
|
|
Semaphore. |
|
129. |
Two general categories of resources are: **** • Reusable and consumable |
|
130. |
An example of reusable resource is: ***** • Processor |
|
131.Which of the following is not one of the principles of dealing with deadlock? ***** • Initialization
132.Current allocation of resources to processes where there is at least one sequence that does not result in deadlock is called: ***** • Safe state
133.Current allocation of resources to processes where there is no sequence that does not result in deadlock is called: ***** • Unsafe state
134.Can you solve the Dining Philosophers’ Problem using monitors? ******• Yes
135. A fixed-length block of main memory is called: *****• |
Frame |
136.A fixed-length block of data in secondary memory is called: **** •Page
137.A variable-length block of data that resides in secondary memory is called: **** • Segment
138. When free memory is split into many unconnected pieces we call it: **** • |
External |
fragmentation |
|
139.Memory partitioning algorithm that uses binary tree as a data structure is called: **** • Buddy system
140.A state in which the system spends most of its time swapping pieces rather than executing
instructions is called: **** • Thrashing |
|
141. Convert this number systems: HEX(D9A) to DEC? **** • |
3482 |
142. Convert this number systems: HEX(DD2) to DEC?: ****• |
3538 |
143. Convert this number systems: HEX(BA8) to DEC? ***** • |
2984 |
144. Convert this number systems: HEX(78E) to DEC? ****• |
1934 |
145. Convert this number systems: HEX(ABF) to DEC? *****• |
2751 |
146. Convert this number systems: HEX(CCA) to DEC?: *****• |
3274 |
147. Convert this number systems: HEX(BDF) to DEC?: ****• |
3039 |
148. Convert this number systems: HEX(FFA) to DEC? ****• |
4090 |
149. Convert this number systems: OCT(1234) to DEC? ****• |
668 |
150. Convert this number systems: OCT(4321) to DEC? ****• |
2257 |
151. Convert this number systems: OCT(5477) to DEC? ****• |
2879 |
152. Convert this number systems: OCT(7132) to DEC? ****• |
3674 |
153. Convert this number systems: OCT(6512) to DEC? ***** • 3402
154. Convert this number systems: OCT(5614) to DEC? ****• 2956
155.Convert this number systems: OCT(7745) to DEC? *****• 4069
156.Convert this number systems: OCT(6734) to DEC? *****• 3548
157. Convert this number systems: BIN(111000111) to DEC?: ****• |
455 |
|
158. Convert this number systems: BIN(1100110011) to DEC? ****• |
819 |
|
159.Convert this number systems: BIN(10101010101) to DEC?: ***• |
1365 |
|
160. Convert this number systems: BIN(1100001100) to DEC?: ***• |
780 |
|
161. Convert this number systems: BIN(1111000111) to DEC? ***• |
967 |
|
162. Convert this number systems: BIN(10101010101) to DEC?: *** |
1365 |
|
163. Convert this number systems: BIN(1100001100) to DEC?: ***• |
780 |
|
164. Convert this number systems: BIN(1111000111) to DEC? ****• |
967 |
|
165. Convert this number systems: DEC(5879) to HEX?: ****• |
16F7 |
|
166. Convert this number systems: DEC(6791) to HEX?: ***/*• 1A87 |
|
|
167. Convert this number systems: DEC(7123) to HEX? ****• |
1BD3 |
|
168.Convert this number systems: DEC(8134) to HEX?: -*-***•1FC6
169.Convert this number systems: DEC(9123) to HEX?: *****• 23A3
170. Convert this number systems: DEC(8577) to HEX? ****• |
2181 |
171. Convert this number systems: DEC(9578) to HEX?: ****• |
256A |
172. Convert this number systems: DEC(9845) to HEX?: ****• |
2675 |
173. Convert this number systems: DEC(4591) to OCT? ****• |
10757 |
174. Convert this number systems: DEC(5123) to OCT?: ***• |
12003 |
175. Convert this number systems: DEC(4812) to OCT?: --****•11314 |
|
176. Convert this number systems: DEC(5129) to OCT? ****• |
12011 |
177. Convert this number systems: DEC(1465) to BIN?: ****• |
10110111001 |
178. Convert this number systems: DEC(1081) to BIN?: ****• |
10000111001 |
179. Convert this number systems: DEC(945) to BIN? ****• |
1110110001 |
180. Convert this number systems: OCT(6735) to HEX?: ****• |
DDD |
181. Convert this number systems: OCT(7123) to HEX?: *****• E53 |
|
182. Convert this number systems: OCT(5771) to HEX? ****• |
BF9 |
183.How many parts of Memory Hierarchy? ***** 3
184.In Memory Hierarchy, at the Outboard storage which of the following are included: ****• Magnetic
disk
185. In Memory Hierarchy, at the Off-line storage which of the following are included: ****• Magnetic tape
186.In Memory Hierarchy, at the Inboard memory which of the following are included: *****•Main memory
187.Cache Design has these properties? ****• Size, block size, mapping function, replacement algorithm, write policy
188. Three techniques are possible for I/O operations: ****• |
Programmed I/O, Interrupt-driven I/O, |
|
Direct memory access(DMA) |
|
|
189. How many principles has Deadlock?: *****• |
3 |
|
190. Which of the following principles has Deadlock? *****• |
Prevention, Avoidance, Detection |
191.Much of the work in security and protection as it relates to operating systems can be roughly grouped into four categories? **** • Availability, confidentiality, data integrity, authenticity
192.The central themes of operating system design are all concerned with the management of processes and threads? **** • Multiprogramming, multiprocessing, distributed processing