Operating System Mcqs

Page No. 97

When an attempt is to make a machine or network resource unavailable to its intended users, the attack is called _____________


adenial-of-service attack


bslow read attack


cspoofed attack


dstarvation attack



What is the need of protection?


aPrevent mischievous violation


bPrevent and intentional


cEnsure that each program component uses resources allotted to it only


dAll of the mentioned


View Answer All of the mentioned

What is the principle of least privilege?


aLess privileges provide difficulty in executing admin tasks


bUsers can get temporary high privilege access


cUsers should be given just enough privileges to perform their tasks


dNone of the mentioned



What is the main objective of protection?


aEnsure all objects are protected individually


bObjects have different priority and thus different levels of protection


cEnsure that each object is accessed correctly and only by allowed processes


dNone of the mentioned



What is the correct way the segmentation program address is stored?


aname, offset


bstart, stop


caccess, rights


doffset, rights


View Answer name, offset

What is a major feature of segmentation?


aProgram is divided in data memory and program memory


bProgram is executed in segments


cProgram is divided into pieces having different access rights


dIt has effect of an unbounded architecture



What is best solution to have effect of unbounded number if base/bound registers?


aTagged architecture


bSegmentation


cFence method


dNone of the mentioned


View Answer Segmentation

What is true regarding tagged architecture?


aEvery word of machine memory has one or more extra bits


bExtra bits are used to do padding


cExtra bits are not used to identify rights to that word


dIt is very compatible to code upgrades



How is disadvantage of all-or-nothing approach overcome?


aBase/Bound


bRelocation technique


cFence method


dTagged architecture


View Answer Tagged architecture

What is all-or-nothing situation for sharing in memory?


aProgram makes all its data available to be accessed


bIt prohibits access to some


cIt creates rules who can access program memory


dIt separates program memory and data memory



Goto Page No.

Page 97 of 108

Alphabetical MCQs Categories

Here below You find all kind of categories of MCQs in alphabetical order.


"Comprehensive Collection of MCQs: Alphabetically Organized by Subject"

"Discover an extensive collection of multiple-choice questions (MCQs) neatly categorized by subject from A to Z. This resource is designed for anyone eager to explore various topics in a straightforward and organized manner. Whether you're a student preparing for exams, an educator seeking supplementary materials, or simply curious about different subjects, this compilation offers a convenient way to learn and assess your knowledge. With questions arranged alphabetically, navigation is effortless, allowing you to delve into subjects of interest at your own pace. Engage, learn, and expand your understanding with this accessible and comprehensive repository of MCQs!"


BolPakistan

bolpakistan.com.pk includes Job Mcqs and Pak Mcqs is the Top Largest Mcqs Forum in World, in which you can read Mcqs of All Subjects, PPSC test preparation, FPSC, NTS and PPSC PAST PAPERS, PPSC PAST MCQS. A Collection of Repeated MCQs for JOBs seekers.

Copyright © 2024, Designed & Developed by BolPakistan