My Report

Operating System Practice Test 9


Correct Answer: 2 points | Wrong: -1 point
Grades: A* (100% score) | A (80%-99%) | B (60%-80%) | C (40%-60%) | D (0%-40%)
advertisement
 5%

Question 1 of 20

1. RAID level 5 is also known as ____________

Question 1 of 20

Question 2 of 20

2. The magneto-optic head flies ___________ the disk surface than a magnetic disk head does.

Question 2 of 20

Question 3 of 20

3. Access matrix model for user authentication contains _____________

Question 3 of 20

Question 4 of 20

4. Which principle states that programs, users and even the systems be given just enough privileges to perform their task?

Question 4 of 20

Question 5 of 20

5. Virtual memory uses disk space as an extension of _________

Question 5 of 20

Question 6 of 20

6. Which two rights allow a process to change the entries in a column?

Question 6 of 20

Question 7 of 20

7. RAID level ____ spreads parity and data among all N+1 disks rather than storing data in N disks and parity in 1.

Question 7 of 20

Question 8 of 20

8. If the set of resources available to the process is fixed throughout the process's lifetime then its domain is _____________

Question 8 of 20

Question 9 of 20

9. Which one of the following is capability based protection system?

Question 9 of 20

Question 10 of 20

10. What are the three additional operations to change the contents of the access-matrix?

Question 10 of 20

Question 11 of 20

11. Who can add new rights and remove some rights?

Question 11 of 20

Question 12 of 20

12. In the _______ algorithm, the disk head moves from one end to the other, servicing requests along the way. When the head reaches the other end, it immediately returns to the beginning of the disk without servicing any requests on the return trip.

Question 12 of 20

Question 13 of 20

13. A single parity bit can be used for ____________

Question 13 of 20

Question 14 of 20

14. The code segment that misuses its environment is called a _____________

Question 14 of 20

Question 15 of 20

15. _______ is an approach to restricting system access to authorized users.

Question 15 of 20

Question 16 of 20

16. For most computers, the bootstrap is stored in ________

Question 16 of 20

Question 17 of 20

17. Multipartite viruses attack on _____________

Question 17 of 20

Question 18 of 20

18. RAID level 3 does not have _________ as in RAID level 1.

Question 18 of 20

Question 19 of 20

19. When a fixed amount of swap space is created during disk partitioning, more swap space can be added only by?
I) repartitioning of the disk
II) adding another swap space elsewhere

Question 19 of 20

Question 20 of 20

20. What does the access matrix represent?

Question 20 of 20


 

Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.