• ( 11 ) Process is___________.

    • 1) A program in execution
    • 2) An instance of a program running on a computer
    • 3) The entity that can be assigned to and executed
    • 4) All of the above.
    • Discussion in forum
      Answer : 4) All of the above.
      Solution : A process is an instance of a program running in a computer. It is close in meaning to task , a term used in some operating systems. In UNIX and some other operating systems, a process is started when a program is initiated (either by a user entering a shell command or by another program). Like a task, a process is a running program with which a particular set of data is associated so that the process can be kept track of. An application that is being shared by multiple users will generally have one process at some stage of execution for each user.








      discussion


      Answer : 4) All of the above.

    • ( 12 ) Which of the following objects require protection ?

    • 1) CPU
    • 2) Printers
    • 3) Tape drives
    • 4) both 2 and 3
    • Discussion in forum
      Answer : 4) both 2 and 3
      Solution : Tape drives and Printers require protection.








      discussion


      Answer : 4) both 2 and 3

    • ( 13 ) If a disk fails in RAID level ___ rebuilding lost data is easiest

    • 1) 1
    • 2) 2
    • 3) 3
    • 4) 4
    • Discussion in forum
      Answer : 1) 1
      Solution : Data can be copied from another disk in raid level 1, for other raid levels all other disks have to be accessed.








      discussion


      Answer : 1) 1

    • ( 14 ) RAID level _____ is also known as block interleaved parity organisation and uses block level striping and keeps a parity block on a seperate disk.

    • 1) 1
    • 2) 2
    • 3) 3
    • 4) 4
    • Discussion in forum
      Answer : 4) 4
      Solution : RAID level 4 is also known as block interleaved parity organisation and uses block level striping and keeps a parity block on a seperate disk.








      discussion


      Answer : 4) 4

    • ( 15 ) For any type of access, contiguous allocation requires ______ access to get a disk block.

    • 1) only one
    • 2) atleast two
    • 3) exactly two
    • 4) None of these
    • Discussion in forum
      Answer : 1) only one
      Solution : We can easily keep the initial address of the file in memory and calculate immediately the disk address of the ith block and read it directly.








      discussion


      Answer : 1) only one

    • ( 16 ) If there are 32 segments, each of size 1Kb, then the logical address should have :

    • 1) 13 bits
    • 2) 14 bits
    • 3) 15 bits
    • 4) 16 bits
    • Discussion in forum
      Answer : 1) 13 bits
      Solution : To specify a particular segment, 5 bits are required. To select a particular byte after selecting a page, 10 more bits are required. Hence 15 bits are required.








      discussion


      Answer : 1) 13 bits

    • ( 17 ) To control access the three bits used in UNIX are represented by

    • 1) r
    • 2) w
    • 3) ex
    • 4) x
    • Discussion in forum
      Answer : 4) x
      Solution : To control access the three bits used in UNIX are represented by x








      discussion


      Answer : 4) x

    • ( 18 ) ___________is a special type of programming language used to provide instructions to the monitor simple batch processing schema.

    • 1) Processing control language (PCL)
    • 2) Batch control language (BCL)
    • 3) Monitor control language (MCL)
    • 4) Job control language (JCL)
    • Discussion in forum
      Answer : 4) Job control language (JCL)
      Solution : Job control language (JCL) is a special type of programming language used to provide instructions to the monitor simple batch processing schema.








      discussion


      Answer : 4) Job control language (JCL)

    • ( 19 ) In UNIX, groups can be created and modified by :

    • 1) superuser
    • 2) any user
    • 3) a programmer only
    • 4) the people in the group only
    • Discussion in forum
      Answer : 1) superuser
      Solution : In UNIX, groups can be created and modified by superuser.








      discussion


      Answer : 1) superuser

    • ( 20 ) The___________policy restricts scanning to one direction only.

    • 1) SCAN
    • 2) C-SCAN
    • 3) N-Step SCAN
    • 4) Both 1 and 2
    • Discussion in forum
      Answer : 2) C-SCAN
      Solution : The C-SCAN policy restricts scanning to one direction only.








      discussion


      Answer : 2) C-SCAN





Top