Que- What is all-or-nothing situation for sharing in memory ?
a. Program makes all its data available to be accessed
b. It prohibits access to some
c. It creates rules who can access program memory
d. It separates program memory and data memory
Answer- Program makes all its data available to be accessed
Que- How is disadvantage of all-or-nothing approach overcome ?
a. Base/Bound
b. Relocation technique
c. Fence method
d. Tagged architecture
Answer- Tagged architecture
Que- What is true regarding tagged architecture ?
a. Every word of machine memory has one or more extra bits
b. Extra bits are used to do padding
c. Extra bits are not used to identify rights to that word
d. It is very compatible to code upgrades
Answer- Every word of machine memory has one or more extra bits
Que- What is best solution to have effect of unbounded number if base/bound registers?
a. Tagged architecture
b. Segmentation
c. Fence method
d. None of the mentioned
Answer- Segmentation
Que- What is major feature of segmentation ?
a. Program is divided in data memory and program memory
b. Program is executed in segments
c. Program is divided into pieces having different access rights
d. It has effect of an unbounded architecture
Answer- Program is divided into pieces having different access rights
Que- What is correct way the segmentation program address is stored ?
a. name, offset
b. start, stop
c. access, rights
d. offset, rights
Answer- name, offset
Que- What is main objective of protection ?
a. Ensure all objects are protected individually
b. Objects have different priority and thus different levels of protection
c. Ensure that each object is accessed correctly and only by allowed processes
d. None of the mentioned
Answer- Ensure that each object is accessed correctly and only by allowed processes
Que- What is principle of least privilege ?
a. Less privileges provide difficulty in executing admin tasks
b. Users can get temporary high privilege access
c. Users should be given just enough privileges to perform their tasks
d. None of the mentioned
Answer- Users should be given just enough privileges to perform their tasks
Que- What is need of protection ?
a. Prevent mischievous violation
b. Prevent and intentional
c. Ensure that each program component uses resources allotted to it only
d. All of the mentioned
Answer- All of the mentioned
Que- What is incorrect methods of revocation of access rights ?
a. Immediate/Delayed
b. Selective/General
c. Partial/total
d. Crucial
Answer- Crucial
Que- Why is it difficult to revoke capabilities ?
a. They are too many
b. They are not defined precicely
c. They are distributed throughout the system
d. None of the mentioned
Answer- They are distributed throughout the system
Que- What is the reacquisition scheme to revoke capability ?
a. When a process capability is revoked then it won't be able to reacquire it
b. Pointers are maintained for each object which can be used to revoke
c. Indirect pointing is done to revoke object's capabilities
d. Master key can be used compare and revoke.
Answer- When a process capability is revoked then it won't be able to reacquire it
Que- What is false regarding Back-Pointers scheme to revoke capability ?
a. List of pointers is maintained with each object
b. When revocation is required these pointers are followed
c. This scheme is not adopted in MULTICS system
d. These point to all capabilities associated with that object
Answer- This scheme is not adopted in MULTICS system
Que- What is true about Indirection to revoke capability ?
a. Capabilities point indirectly to the objects
b. Each capability will not have a unique entry in global
c. Table entries cannot be reused for other capabilities
d. This system was adopted in MULTICS system
Answer- Capabilities point indirectly to the objects
Que- How can Keys be defined or replaced ?
a. create [keyname] [bits].
b. set-key
c. Key
d. MAKE [Key Name].
Answer- set-key
Que- What are characteristics of Hydra system ?
a. It consist of known access rights and interpreted by the system
b. A user can of protection system can declare other rights
c. Hydra system is not flexible
d. Hydra doesn't provide rights amplification
Answer- It consist of known access rights and interpreted by the system
Que- What are characteristics of rights amplification in Hydra ?
a. This scheme allows a procedure to be certified as trustworthy
b. Amplification of rights cannot be stated explicitly in declaration
c. It includes kernel rights such as read
d. All of the mentioned
Answer- This scheme allows a procedure to be certified as trustworthy
Que- What is the problem of mutually suspicious subsystem ?
a. Service program can steal users data
b. Service program can malfunction and retain some rights of data provided by user
c. Calling program can get access to restricted portion from service program
d. Calling program gets unrestricted access
Answer- Service program can malfunction and retain some rights of data provided by user
Que- What are characteristics of Cambridge CAP system as compared to Hydra system ?
a. It is simpler and less powerful than hydra system
b. It is more powerful than hydra system
c. It is powerful than hydra system
d. It is not as secure as Hydra system
Answer- It is simpler and less powerful than hydra system
Que- What are two capabilities defined in CAP system ?
a. data & software capability
b. address & data capability
c. hardware & software capability
d. software capability
Answer- data & software capability
Que- In distributed system each processor has its own
a. local memory
b. clock
c. both local memory and clock
d. none of the mentioned
Answer- both local memory and clock
Que- If one site fails in distributed system
a. the remaining sites can continue operating
b. all the sites will stop working
c. directly connected sites will stop working
d. none of the mentioned
Answer- the remaining sites can continue operating
Que- Network operating system runs on
a. server
b. every system in the network
c. both server and every system in the network
d. none of the mentioned
Answer- server
Que- Which technique is based on compile-time program transformation for accessing remote data in a distributed-memory parallel system.
a. cache coherence scheme
b. computation migration
c. remote procedure call
d. message passing
Answer- computation migration
Que- Logical extension of computation migration is
a. process migration
b. system migration
c. thread migration
d. data migration
Answer- process migration
Que- Processes on the remote systems are identified by
a. host ID
b. host name and identifier
c. identifier
d. process ID
Answer- host name and identifier
Que- Which routing technique is used in distributed system?
a. fixed routing
b. virtual routing
c. dynamic routing
d. all of the mentioned
Answer- all of the mentioned
Que- In distributed systems, link and site failure is detected by
a. polling
b. handshaking
c. token passing
d. none of the mentioned
Answer- handshaking
Que- The capability of a system to adapt the increased service load is called
a. scalability
b. tolerance
c. capacity
d. none of the mentioned
Answer- scalability
Que- Internet provides _______ for remote login.
a. telnet
b. http
c. ftp
d. RPC
Answer- telnet
Que- What is not true about distributed system ?
a. It is a collection of processor
b. All processors are synchronized
c. They do not share memory
d. None of the mentioned
Answer- All processors are synchronized
Que- What are characteristics of processor in distributed system ?
a. They vary in size and function
b. They are same in size and function
c. They are manufactured with single purpose
d. They are real-time devices
Answer- They vary in size and function
Que- What are characteristics of distributed file system ?
a. Its users, servers and storage devices are dispersed
b. Service activity is not carried out across the network
c. They have single centralized data repository
d. There are multiple dependent storage devices
Answer- Its users, servers and storage devices are dispersed
Que- What is not a major reason for building distributed systems ?
a. Resource sharing
b. Computation speedup
c. Reliability
d. Simplicity
Answer- Simplicity
Que- What are types of distributed operating system ?
a. Network Operating system
b. Zone based Operating system
c. Level based Operating system
d. All of the mentioned
Answer- Network Operating system
Que- What are characteristic of Network Operating Systems ?
a. Users are aware of multiplicity of machines
b. They are transparent
c. They are simple to use
d. All of the mentioned
Answer- Users are aware of multiplicity of machines
Que- How are access to resources of various machines is done ?
a. Remote logging using ssh or telnet
b. Zone are configured for automatic access
c. FTP is not used
d. All of the mentioned
Answer- Remote logging using ssh or telnet
Que- What are characteristics of Distributed Operating system ?
a. Users are aware of multiplicity of machines
b. Access is done like local resources
c. Users are aware of multiplicity of machines
d. They have multiple zones to access files
Answer- Access is done like local resources
Que- What are characteristics of data migration ?
a. transfer data by entire file or immediate portion required
b. transfer the computation rather than the data
c. execute an entire process or parts of it at different sites
d. none of the mentioned
Answer- transfer data by entire file or immediate portion required
Que- What are characteristics of computation migration ?
a. transfer data by entire file or immediate portion required
b. transfer the computation rather than the data
c. execute an entire process or parts of it at different sites
d. none of the mentioned
Answer- transfer the computation rather than the data
Que- What are characteristics of process migration ?
a. transfer data by entire file or immediate portion required
b. transfer the computation rather than the data
c. execute an entire process or parts of it at different sites
d. none of the mentioned
Answer- execute an entire process or parts of it at different sites
Que- What are parts of network structure ?
a. Workstation
b. Gateway
c. Laptop
d. All of the mentioned
Answer- All of the mentioned
Que- What are valid network topology ?
a. Multiaccess bus
b. Ring
c. Star
d. All of the mentioned
Answer- All of the mentioned
Que- What are sites in network topology compared ?
a. Basic cost
b. Communication cost
c. Reliability
d. All of the mentioned
Answer- All of the mentioned
Que- Which design features of a communication network are important ?
a. Naming and name resolution
b. Routing strategies
c. Connection strategies
d. All of the mentioned
Answer- All of the mentioned
Que- What are characteristics of Naming and Name resolution ?
a. name systems in the network
b. address messages with the process-id
c. virtual circuit
d. message switching
Answer- address messages with the process-id
Que- What are routing strategies which is not used in distributed systems ?
a. Fixed routing
b. Token routing
c. Virtual circuit
d. Dynamic routing
Answer- Virtual circuit
Que- What are connection strategies not used in distributed systems ?
a. Circuit switching
b. Message switching
c. Token switching
d. Packet switching
Answer- Token switching