Operating System MCQ (Multiple Choice Questions) - SchoolingAxis

Operating System MCQ (Multiple Choice Questions)

 Que- The scheduler admits a process using : 

a. two phase locking protocol 

b. admission control algorithm 

c. busy wait polling 

d. none of the mentioned 


Answer- busy wait polling        


Que- The ____________ scheduling algorithm schedules periodic tasks using a static priority policy with preemption. 

a. earliest deadline first 

b. rate monotonic 

c. first cum first served 

d. priority 


Answer- rate monotonic        


Que- Rate monotonic scheduling assumes that the : 

a. processing time of a periodic process is same for each CPU burst 

b. processing time of a periodic process is different for each CPU burst 

c. periods of all processes is the same 

d. none of the mentioned 


Answer- processing time of a periodic process is same for each CPU burst        


Que- In rate monotonic scheduling, a process with a shorter period is assigned : 

a. a higher priority 

b. a lower priority 

c. higher & lower priority 

d. none of the mentioned 


Answer- a higher priority        


Que- There are two processes P1 and P2, whose periods are 50 and 100 respectively. P1 is assigned higher priority than P1.The processing times are t1 = 20 for P1 and t2 = 35 for P1 Is it possible to schedule these tasks so that each meets its deadline using Rate monotonic scheduling ? 

a. yes 

b. no 

c. maybe 

d. none of the mentioned 


Answer- yes        


Que- If a set of processes cannot be scheduled by rate monotonic scheduling algorithm, then : 

a. they can be scheduled by EDF algorithm 

b. they cannot be scheduled by EDF algorithm 

c. they cannot be scheduled by any other algorithm 

d. none of the mentioned 


Answer- they cannot be scheduled by any other algorithm        


Que- Can the processes in the previous question be scheduled without missing the deadlines ? 

a. Yes 

b. No 

c. Maybe 

d. None of the mentioned 


Answer- No        


Que- Remote Procedure Calls are used : 

a. for communication between two processes remotely different from each other on the same system 

b. for communication between two processes on the same system 

c. for communication between two processes on separate systems 

d. None of the mentioned 


Answer- for communication between two processes on separate systems        


Que- A multimedia file 

a. is same as any other regular file 

b. must be accessed at specific rate 

c. stored on remote server can not be delivered to its client 

d. none of the mentioned  


Answer- must be accessed at specific rate        


Que- In which type of streaming multimedia file is delivered to the client, but not shared? 

a. real-time streaming 

b. progressive download 

c. compression 

d. none of the mentioned  


Answer- real-time streaming        


Que- Which one of the following is the characteristic of a multimedia system? 

a. high storage 

b. high data rates 

c. both high storage and high data rates 

d. none of the mentioned  


Answer- both high storage and high data rates        


Que- The delay that occur during the playback of a stream is called 

a. stream delay 

b. playback delay 

c. jitter 

d. event delay  


Answer- jitter        


Que- Which algorithm can be optimized to meet the timing deadlines and rate requirements of continuous media? 

a. Earliest-Deadline-First scheduling 

b. SCAN-EDF scheduling 

c. Both Earliest-Deadline-First scheduling & SCAN-EDF scheduling 

d. None of the mentioned  


Answer- Both Earliest-Deadline-First scheduling & SCAN-EDF scheduling        


Que- Real time streaming protocol is used 

a. to control streaming media servers 

b. for establishing and controlling media sessions between endpoints 

c. to provide real time control of playback of media files from the server 

d. all of the mentioned  


Answer- all of the mentioned         


Que- In teardown state of real time streaming protocol 

a. the server resources for client 

b. server delivers the stream to client 

c. server suspends delivery of stream 

d. server breaks down the connection  


Answer- server breaks down the connection         


Que- CineBlitz multimedia server supports 

a. real time clients 

b. non-real time clients 

c. both real time & non-real time clients 

d. none of the mentioned  


Answer- both real time & non-real time clients        


Que- Multimedia system require hard real time scheduling 

a. to ensure critical tasks will be serviced within timing deadlines 

b. to deliver the media file to the client 

c. to minimize the delay 

d. for security  


Answer- to ensure critical tasks will be serviced within timing deadlines        


Que- Which one of the following resource is not necessarily required on a file server? 

a. secondary storage 

b. processor 

c. network 

d. monitor  


Answer- monitor         


Que- The major difference between a multimedia file and a regular file is : 

a. the size 

b. the attributes 

c. the ownership 

d. the rate at which the file must be accessed 


Answer- the rate at which the file must be accessed        


Que- Video is represented as a series of images formally known as : 

a. pics 

b. shots 

c. frames 

d. snaps 


Answer- frames        


Que- The faster the frames are displayed, : 

a. the rougher the video appears 

b. the smoother the video appears 

c. it gets blurry 

d. none of the mentioned 


Answer- the smoother the video appears        


Que- The characteristic of the eye to retain the image for a short time after it has been presented is known as : 

a. persistence of vision 

b. learning power 

c. memory mapped input 

d. none of the mentioned 


Answer- persistence of vision        


Que- Local playback is when : 

a. the multimedia data are delivered from a local file system 

b. a computer next to you is playing something 

c. a multimedia file is being played on a system in the local network 

d. none of the mentioned 


Answer- the multimedia data are delivered from a local file system        


Que- Multimedia files stored on a remote server are delivered to a client across the network using a technique known as : 

a. download 

b. streaming 

c. flowing 

d. leaking 


Answer- streaming        


Que- The two types of streaming techniques are : 

a. progressive download & real time streaming 

b. regular download & real time streaming 

c. real time & virtual time streaming 

d. virtual time streaming 


Answer- progressive download & real time streaming        


Que- A media file containing audio or video is downloaded and stored on the client's local file system in : 

a. progressive download 

b. regular download 

c. real time streaming 

d. virtual time streaming 


Answer- progressive download        


Que- Progressive download is most useful for : 

a. short video clips 

b. long video clips 

c. extremely long and high quality videos 

d. none of the mentioned 


Answer- short video clips        


Que- The media file is streamed to the client but is only played and not stored by the client in : 

a. progressive download 

b. regular download 

c. real time streaming 

d. virtual time streaming 


Answer- real time streaming        


Que- Real time streaming is most useful for : 

a. short video clips 

b. long video clips 

c. extremely short and low quality videos 

d. none of the mentioned 


Answer- long video clips        


Que- The ability to move around within a media stream is known as : 

a. buffering 

b. random access 

c. access 

d. sequential access 


Answer- random access        


Que- The two types of real time streaming are : 

a. live & on demand streaming 

b. dead & static streaming 

c. static & on demand streaming 

d. on demand streaming 


Answer- live & on demand streaming        


Que- Random access is not allowed in : 

a. live streaming 

b. dead streaming 

c. static streaming 

d. on demand streaming 


Answer- live streaming        


Que- The streaming that takes place as the event is occurring is : 

a. live streaming 

b. dead streaming 

c. static streaming 

d. on demand streaming 


Answer- on demand streaming        


Que- For a computer to deliver continuous media it must guarantee the specific rate and timing requirements, also known as : 

a. deadline 

b. quality of service 

c. period 

d. burst time 


Answer- quality of service        


Que- For QOS to be implemented properly : 

a. file systems must be efficient to meet the rate requirements of continuous media 

b. network protocols must support bandwidth requirements while minimizing delay and jitter 

c. all of the mentioned 

d. none of the mentioned 


Answer- all of the mentioned        


Que- Once a file is compressed : 

a. it has a better quality 

b. it takes up less space for storage 

c. it cannot be delivered to the client more quickly 

d. none of the mentioned 


Answer- it takes up less space for storage        


Que- Compression ratio is the ratio of : 

a. the original file size to the size of the compressed file 

b. the number of pixels in a frame of the original size to those in a frame of the compressed file 

c. compressed file size to the original file size 

d. none of the mentioned 


Answer- the original file size to the size of the compressed file        


Que- Lossy and lossless are classifications of : 

a. multimedia storage systems 

b. files 

c. compression algorithms 

d. all of the mentioned 


Answer- compression algorithms        


Que- Lossy techniques provide ___________ when compared to lossless techniques. 

a. lower compression ratios 

b. much higher compression ratios 

c. similar compression ratios 

d. none of the mentioned 


Answer- much higher compression ratios        


Que- The full form of MPEG is : 

a. Motion Pictures Engineering Group 

b. Motion Picture Engineers Group 

c. Motion Picture Experts Group 

d. None of the mentioned 


Answer- Motion Picture Experts Group        


Que- MPEG compression : 

a. stores the compression values of each frame 

b. stores the differences between successive frames 

c. stores multiple frames' values together 

d. none of the mentioned 


Answer- stores the differences between successive frames        


Que- The three levels in QoS are : 

a. Best effort service 

b. Soft QoS 

c. Hard QoS 

d. All of the mentioned 


Answer- All of the mentioned        


Que- The level that treats different types of traffics in different ways, giving certain traffic streams higher priority than other streams and with best efforts, but no guarantees are made : 

a. Best effort service 

b. Soft QoS 

c. Worst effort service 

d. Hard QoS 


Answer- Soft QoS        


Que- The quality of service requirements are guaranteed in : 

a. Best effort service 

b. Soft QoS 

c. Worst effort service 

d. Hard QoS 


Answer- Hard QoS        


Que- The factors that define QoS are : 

a. Throughput 

b. Jitter 

c. Delay 

d. All of the mentioned 


Answer- All of the mentioned        


Que- Delay and Jitter : 

a. mean the same thing 

b. are two completely different things 

c. all of the mentioned 

d. none of the mentioned 


Answer- are two completely different things        


Que- Delay is : 

a. the time from when a request is first submitted to when the desired result is produced 

b. the delay that occurs during playback of the stream 

c. how the errors are handled during transmission and processing of continuous media 

d. none of the mentioned 


Answer- the time from when a request is first submitted to when the desired result is produced        


Que- Admission control is : 

a. the delay that occurs during playback of the stream 

b. the practice of admitting a request for service only if the server has sufficient resources to satisfy the request 

c. how the errors are handled during transmission and processing of continuous media 

d. none of the mentioned 


Answer- the practice of admitting a request for service only if the server has sufficient resources to satisfy the request        


Que- An admission control scheme assigns a __________ to each type of resource. 

a. processor 

b. memory location 

c. resource manager 

d. all of the mentioned 


Answer- resource manager        


Que- A scheduling algorithm can use either ___________ priority or ________ priority. 

a. static, still 

b. static, dynamic 

c. live, dead 

d. none of the mentioned 


Answer- static, dynamic        


Que- The priority of a process will ______________ if the scheduler assigns it a static priority. 

a. change 

b. remain unchanged 

c. depends on the operating system 

d. none of the mentioned 


Answer- remain unchanged        


Que- As disks have relatively low transfer rates and relatively high latency rates, disk schedulers must reduce latency times to : 

a. ensure high bandwidth 

b. ensure low bandwidth 

c. make sure data is transferred 

d. reduce data transfer speeds 


Answer- ensure high bandwidth        


Que- Servicing requests strictly according to deadline using EDF may result in : 

a. lower seek times 

b. lower bandwidth 

c. higher seek time 

d. higher bandwidth 


Answer- higher seek time        


Que- The hybrid algorithm that combines EDF with SCAN algorithm is known as : 

a. EDS 

b. SDF 

c. SCAN-EDF 

d. None of the mentioned 


Answer- SCAN-EDF        


Que- If several requests have different deadlines that are relatively close together, then using the SCAN - EDF algorithm : 

a. the SCAN ordering will service the requests in that batch 

b. the EDF ordering will service the requests in that batch 

c. the FCFS ordering will service the requests in that batch 

d. none of the mentioned 


Answer- the SCAN ordering will service the requests in that batch        


Que- Multimedia systems require _________ scheduling to ensure critical tasks will be serviced within timing deadlines. 

a. soft real time 

b. hard real time 

c. normal 

d. none of the mentioned 


Answer- hard real time        


Que- The EDF scheduler uses ________ to order requests according to their deadlines. 

a. stack 

b. disks 

c. queue 

d. none of the mentioned 


Answer- queue        


Que- In SCAN - EDF, requests with the same deadlines are ordered according to : 

a. SCAN policy 

b. EDF policy 

c. FCFS policy 

d. FIFO policy 


Answer- SCAN policy        


Que- The three general methods for delivering content from a server to a client across a network are : 

a. unicasting 

b. multicasting 

c. broadcasting 

d. all of the mentioned 


Answer- all of the mentioned        


Que- Unicasting delivers the content to : 

a. a single client 

b. all clients, regardless whether they want the content or not 

c. a group of receivers who indicate they wish to receive the content 

d. none of the mentioned 


Answer- a single client        


Que- Broadcasting delivers the content to : 

a. a single client 

b. all clients, regardless whether they want the content or not 

c. a group of receivers who indicate they wish to receive the content 

d. none of the mentioned 


Answer- all clients, regardless whether they want the content or not        


Que- Multicasting delivers the content to : 

a. a single client 

b. all clients, regardless whether they want the content or not 

c. a group of receivers who indicate they wish to receive the content 

d. none of the mentioned 


Answer- a group of receivers who indicate they wish to receive the content        


Que- RTSP stands for : 

a. Real Time Streaming Policy 

b. Real Time Streaming Protocol 

c. Real Time Systems Protocol 

d. Read Time Streaming Policy 


Answer- Real Time Streaming Protocol        


Que- HTTP is __________ 

a. a stateful protocol 

b. a stateless protocol 

c. a protocol that maintains the status of its connection with the client 

d. a stateless protocol that does not maintain the status of its connection with the client 


Answer- a stateless protocol that does not maintain the status of its connection with the client        


Que- RTSP includes the following states : 

a. SETUP 

b. PLAY 

c. PAUSE 

d. All of the mentioned 


Answer- All of the mentioned        


Que- In the SETUP state : 

a. the server is setup 

b. the client is setup 

c. the server allocates resources for the client session 

d. the client sends requests to the server 


Answer- the server allocates resources for the client session        


Que- In the TEARDOWN state : 

a. the server breaks down the connection and releases the resources allocated for the session 

b. the client breaks down the connection and releases the resources allocated for the session 

c. the system crashes 

d. none of the mentioned 


Answer- the server breaks down the connection and releases the resources allocated for the session        


Que- RTP stands for : 

a. real time protocol 

b. real time transmission control protocol 

c. real time transmission protocol 

d. real time transport protocol 


Answer- real time transport protocol        


Que- The problem with unicast delivery is that the : 

a. memory allocation is difficult 

b. server must establish a separate unicast session for each client 

c. the routers must support unicasting 

d. the clients must be close to the server 


Answer- server must establish a separate unicast session for each client        


Que- The difficulty with multicasting from a practical point of view is : 

a. memory allocation is difficult 

b. server must establish a separate unicast session for each client 

c. the routers must support multicasting 

d. none of the mentioned 


Answer- the routers must support multicasting        


Que- To let a client have random access to a media stream : 

a. the protocol used must not be stateless 

b. the server must support download 

c. the stream should give access rights to the client 

d. all of the mentioned 


Answer- the protocol used must not be stateless        


Que- Which of the following are forms of malicious attack ? 

a. Theft of information 

b. Modification of data 

c. Wiping of information 

d. All of the mentioned 


Answer- All of the mentioned        


Que- What are common security threats ? 

a. File Shredding 

b. File sharing and permission 

c. File corrupting 

d. File integrity 


Answer- File sharing and permission        


Que- From the following, which is not a common file permission ? 

a. Write 

b. Execute 

c. Stop 

d. Read 


Answer- Stop        


Que- Which of the following is a good practice ? 

a. Give full permission for remote transferring 

b. Grant read only permission 

c. Grant limited permission to specified account 

d. Give both read and write permission but not execute 


Answer- Grant limited permission to specified account        


Que- What is not a good practice for user administration ? 

a. Isolating a system after a compromise 

b. Perform random auditing procedures 

c. Granting privileges on a per host basis 

d. Using telnet and FTP for remote access 


Answer- Using telnet and FTP for remote access        


Que- Which of the following is least secure method of authentication ? 

a. Key card 

b. fingerprint 

c. retina pattern 

d. Password 


Answer- Password        


Que- Which of the following is a strong password ? 

a. 19thAugust88 

b. Delhi88 

c. P@assw0rd 

d. !augustdelhi 


Answer- P@assw0rd        


Que- Why is one time password safe ? 

a. It is easy to generated 

b. It cannot be shared 

c. It is different for every access 

d. It is a complex encrypted password 


Answer- It is different for every access        


Que- What does Light Directory Access Protocol (LDAP) doesn't store ? 

a. Users 

b. Address 

c. Passwords 

d. Security Keys 


Answer- Address        


Que- What is characteristic of RADIUS system ? 

a. It  is essential for centralized encryption and authentication 

b. It works on Network layer to deny access to unauthorized people 

c. It provides centralized authentication mechanism via network devices 

d. It's a strong File access system 


Answer- It provides centralized authentication mechanism via network devices        


Que- Which happens first authorization or authentication ? 

a. Authorization 

b. Authentication 

c. Authorization & Authentication are same 

d. None of the mentioned 


Answer- Authorization        


Que- What is characteristics of Authorization ? 

a. RADIUS and RSA 

b. 3 way handshaking with syn and fin 

c. Multilayered protection for securing resources 

d. Deals with privileges and rights 


Answer- Deals with privileges and rights        


Que- What forces the user to change password at first logon ? 

a. Default behavior of OS 

b. Part of AES encryption practice 

c. Devices being accessed forces the user 

d. Account administrator 


Answer- Account administrator        


Que- What is not a best practice for password policy ? 

a. Deciding maximum age of password 

b. Restriction on password reuse and history 

c. Password encryption 

d. Having change password every 2 years 


Answer- Having change password every 2 years        


Que- What is breach of integrity ? 

a. This type of violation involves unauthorized reading of data 

b. This violation involves unauthorized modification of data 

c. This violation involves unauthorized destruction of data 

d. This violation involves unauthorized use of resources 


Answer- This violation involves unauthorized modification of data        


Que- What is breach of confidentiality ? 

a. This type of violation involves unauthorized reading of data 

b. This violation involves unauthorized modification of data 

c. This violation involves unauthorized destruction of data 

d. This violation involves unauthorized use of resources 


Answer- This type of violation involves unauthorized reading of data        


Que- What is theft of service ? 

a. This type of violation involves unauthorized reading of data 

b. This violation involves unauthorized modification of data 

c. This violation involves unauthorized destruction of data 

d. This violation involves unauthorized use of resources 


Answer- This violation involves unauthorized use of resources        


Previous Post Next Post