Home / Computer Science / Operating System :: section-7

Computer Science :: Operating System

  1. A public key encryption system

  2. A.

     allows anyone to decode the transmission

    B.

     allows only the correct sender to decode the data

    C.

     allows only the correct receiver to decode the data

    D.

     does not encode the data before transmitting it

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  3. Feed back queue

  4. A.

     are very easy to implement

    B.

     dispatch tasks according to execution characteristics

    C.

     are used to favor real-time tasks

    D.

     require manual intervention to implement properly

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  5. In which addressing mode the operand is given explicitly in the instruction?

  6. A.

     absolute mode

    B.

     immediate mode

    C.

     indirect mode

    D.

     index mode

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  7. The technique, for sharing the time of a computer among several jobs. Which switches jobs so rapidly such that each job appears to have the computer to itself:

  8. A.

     time sharing

    B.

     time out

    C.

     time domain

    D.

     FIFO

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  9. Capacity planning

  10. A.

     requires detailed system performance information

    B.

     is independent of the operating system

    C.

     does not depend on the monitoring tools available

    D.

     is not needed in small installations

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  11. Poor response times are caused by

  12. A.

     Processor busy

    B.

     High I/O rate

    C.

     High paging rates

    D.

     Any of the above

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  13. Link encryption

  14. A.

     is more secure than end-to-end encryption

    B.

     is less secure than end-to-end encryption

    C.

     can not be used in a public network

    D.

     is used only to debug

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  15. A form of code that uses more than one process and processor, possibly of different type, and that may on occasions have more than one process or processor active at the same time, is known as

  16. A.

     multiprogramming

    B.

     multithreading

    C.

     broadcasting

    D.

     time sharing

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  17. The table created by lexical analysis to describe all literals used in the source program is

  18. A.

     Terminal table

    B.

     Literal table

    C.

     Identifier table

    D.

     Reductions

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  19. The term 'polling' in a computer means a process by which a computer system

  20. A.

     detects/corrects errors

    B.

     multiplexes the inputs and updates the memory accordingly

    C.

     decides correct alternative by analysing several ones

    D.

     inquires to see if a terminal has any transaction to send

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum