Operating System Mcqs

Page No. 98

What is the role of base/bound registers?


aThey give starting address to a program


bProgram’s addresses are neatly confined to space between the base and the bound registers


cThey provide encrypted environment


dThis technique doesn’t protects a program’s address from modification by another user



What is the basic need in protecting memory in multi-user environment?


aWe need two registers one ‘start’ and other ‘end’


bWe need a variable register


cA fence register has to be used known as base register.


dNone of the mentioned



How can fence and relocation be used together?


aTo each program address, the contents of fence register are added


bTo contents of fence register is subtracted from actual address of program


cTo each program address, the contents of fence register are not added


dNone of the mentioned



What is correct regarding ‘relocation’ w.r.t protecting memory?


aIt is a process of taking a program as if it began at address 0


bIt is a process of taking a program as if it began at address 0A


cFence cannot be used within relocation process


dAll of the mentioned



What is not true regarding ‘Fence’?


aIt is implemented via hardware register


bIt doesn’t protect users from each other


cIt good to protect OS from abusive users


dIts implementation is unrestricted and can take any amount of space in Operating system.



What is true regarding ‘Fence’?


aIts a method to confine users to one side of a boundary


bIt can protect Operating system from one user


cIt cannot protect users from each other


dAll of the mentioned


View Answer All of the mentioned

What are the two capabilities defined in CAP system?


adata & software capability


baddress & data capability


chardware & software capability


dsoftware capability



What are the characteristics of Cambridge CAP system as compared to Hydra system?


aIt is simpler and less powerful than hydra system


bIt is more powerful than hydra system


cIt is powerful than hydra system


dIt is not as secure as Hydra system



What is the problem of mutually suspicious subsystem?


aService program can steal users data


bService program can malfunction and retain some rights of data provided by user


cCalling program can get access to restricted portion from service program


dCalling program gets unrestricted access



What are the characteristics of rights amplification in Hydra?


aThis scheme allows a procedure to be certified as trustworthy


bAmplification of rights cannot be stated explicitly in declaration


cIt includes kernel rights such as read


dAll of the mentioned



Goto Page No.

Page 98 of 108

Alphabetical MCQs Categories

Here below You find all kind of categories of MCQs in alphabetical order.


"Comprehensive Collection of MCQs: Alphabetically Organized by Subject"

"Discover an extensive collection of multiple-choice questions (MCQs) neatly categorized by subject from A to Z. This resource is designed for anyone eager to explore various topics in a straightforward and organized manner. Whether you're a student preparing for exams, an educator seeking supplementary materials, or simply curious about different subjects, this compilation offers a convenient way to learn and assess your knowledge. With questions arranged alphabetically, navigation is effortless, allowing you to delve into subjects of interest at your own pace. Engage, learn, and expand your understanding with this accessible and comprehensive repository of MCQs!"


BolPakistan

bolpakistan.com.pk includes Job Mcqs and Pak Mcqs is the Top Largest Mcqs Forum in World, in which you can read Mcqs of All Subjects, PPSC test preparation, FPSC, NTS and PPSC PAST PAPERS, PPSC PAST MCQS. A Collection of Repeated MCQs for JOBs seekers.

Copyright © 2024, Designed & Developed by BolPakistan