Que- The scheduler admits a process using :
a. two phase locking protocol
b. admission control algorithm
c. busy wait polling
d. none of the mentioned
Answer- busy wait polling
Que- The ____________ scheduling algorithm schedules periodic tasks using a static priority policy with preemption.
a. earliest deadline first
b. rate monotonic
c. first cum first served
d. priority
Answer- rate monotonic
Que- Rate monotonic scheduling assumes that the :
a. processing time of a periodic process is same for each CPU burst
b. processing time of a periodic process is different for each CPU burst
c. periods of all processes is the same
d. none of the mentioned
Answer- processing time of a periodic process is same for each CPU burst
Que- In rate monotonic scheduling, a process with a shorter period is assigned :
a. a higher priority
b. a lower priority
c. higher & lower priority
d. none of the mentioned
Answer- a higher priority
Que- There are two processes P1 and P2, whose periods are 50 and 100 respectively. P1 is assigned higher priority than P1.The processing times are t1 = 20 for P1 and t2 = 35 for P1 Is it possible to schedule these tasks so that each meets its deadline using Rate monotonic scheduling ?
a. yes
b. no
c. maybe
d. none of the mentioned
Answer- yes
Que- If a set of processes cannot be scheduled by rate monotonic scheduling algorithm, then :
a. they can be scheduled by EDF algorithm
b. they cannot be scheduled by EDF algorithm
c. they cannot be scheduled by any other algorithm
d. none of the mentioned
Answer- they cannot be scheduled by any other algorithm
Que- Can the processes in the previous question be scheduled without missing the deadlines ?
a. Yes
b. No
c. Maybe
d. None of the mentioned
Answer- No
Que- Remote Procedure Calls are used :
a. for communication between two processes remotely different from each other on the same system
b. for communication between two processes on the same system
c. for communication between two processes on separate systems
d. None of the mentioned
Answer- for communication between two processes on separate systems
Que- A multimedia file
a. is same as any other regular file
b. must be accessed at specific rate
c. stored on remote server can not be delivered to its client
d. none of the mentioned
Answer- must be accessed at specific rate
Que- In which type of streaming multimedia file is delivered to the client, but not shared?
a. real-time streaming
b. progressive download
c. compression
d. none of the mentioned
Answer- real-time streaming
Que- Which one of the following is the characteristic of a multimedia system?
a. high storage
b. high data rates
c. both high storage and high data rates
d. none of the mentioned
Answer- both high storage and high data rates
Que- The delay that occur during the playback of a stream is called
a. stream delay
b. playback delay
c. jitter
d. event delay
Answer- jitter
Que- Which algorithm can be optimized to meet the timing deadlines and rate requirements of continuous media?
a. Earliest-Deadline-First scheduling
b. SCAN-EDF scheduling
c. Both Earliest-Deadline-First scheduling & SCAN-EDF scheduling
d. None of the mentioned
Answer- Both Earliest-Deadline-First scheduling & SCAN-EDF scheduling
Que- Real time streaming protocol is used
a. to control streaming media servers
b. for establishing and controlling media sessions between endpoints
c. to provide real time control of playback of media files from the server
d. all of the mentioned
Answer- all of the mentioned
Que- In teardown state of real time streaming protocol
a. the server resources for client
b. server delivers the stream to client
c. server suspends delivery of stream
d. server breaks down the connection
Answer- server breaks down the connection
Que- CineBlitz multimedia server supports
a. real time clients
b. non-real time clients
c. both real time & non-real time clients
d. none of the mentioned
Answer- both real time & non-real time clients
Que- Multimedia system require hard real time scheduling
a. to ensure critical tasks will be serviced within timing deadlines
b. to deliver the media file to the client
c. to minimize the delay
d. for security
Answer- to ensure critical tasks will be serviced within timing deadlines
Que- Which one of the following resource is not necessarily required on a file server?
a. secondary storage
b. processor
c. network
d. monitor
Answer- monitor
Que- The major difference between a multimedia file and a regular file is :
a. the size
b. the attributes
c. the ownership
d. the rate at which the file must be accessed
Answer- the rate at which the file must be accessed
Que- Video is represented as a series of images formally known as :
a. pics
b. shots
c. frames
d. snaps
Answer- frames
Que- The faster the frames are displayed, :
a. the rougher the video appears
b. the smoother the video appears
c. it gets blurry
d. none of the mentioned
Answer- the smoother the video appears
Que- The characteristic of the eye to retain the image for a short time after it has been presented is known as :
a. persistence of vision
b. learning power
c. memory mapped input
d. none of the mentioned
Answer- persistence of vision
Que- Local playback is when :
a. the multimedia data are delivered from a local file system
b. a computer next to you is playing something
c. a multimedia file is being played on a system in the local network
d. none of the mentioned
Answer- the multimedia data are delivered from a local file system
Que- Multimedia files stored on a remote server are delivered to a client across the network using a technique known as :
a. download
b. streaming
c. flowing
d. leaking
Answer- streaming
Que- The two types of streaming techniques are :
a. progressive download & real time streaming
b. regular download & real time streaming
c. real time & virtual time streaming
d. virtual time streaming
Answer- progressive download & real time streaming
Que- A media file containing audio or video is downloaded and stored on the client's local file system in :
a. progressive download
b. regular download
c. real time streaming
d. virtual time streaming
Answer- progressive download
Que- Progressive download is most useful for :
a. short video clips
b. long video clips
c. extremely long and high quality videos
d. none of the mentioned
Answer- short video clips
Que- The media file is streamed to the client but is only played and not stored by the client in :
a. progressive download
b. regular download
c. real time streaming
d. virtual time streaming
Answer- real time streaming
Que- Real time streaming is most useful for :
a. short video clips
b. long video clips
c. extremely short and low quality videos
d. none of the mentioned
Answer- long video clips
Que- The ability to move around within a media stream is known as :
a. buffering
b. random access
c. access
d. sequential access
Answer- random access
Que- The two types of real time streaming are :
a. live & on demand streaming
b. dead & static streaming
c. static & on demand streaming
d. on demand streaming
Answer- live & on demand streaming
Que- Random access is not allowed in :
a. live streaming
b. dead streaming
c. static streaming
d. on demand streaming
Answer- live streaming
Que- The streaming that takes place as the event is occurring is :
a. live streaming
b. dead streaming
c. static streaming
d. on demand streaming
Answer- on demand streaming
Que- For a computer to deliver continuous media it must guarantee the specific rate and timing requirements, also known as :
a. deadline
b. quality of service
c. period
d. burst time
Answer- quality of service
Que- For QOS to be implemented properly :
a. file systems must be efficient to meet the rate requirements of continuous media
b. network protocols must support bandwidth requirements while minimizing delay and jitter
c. all of the mentioned
d. none of the mentioned
Answer- all of the mentioned
Que- Once a file is compressed :
a. it has a better quality
b. it takes up less space for storage
c. it cannot be delivered to the client more quickly
d. none of the mentioned
Answer- it takes up less space for storage
Que- Compression ratio is the ratio of :
a. the original file size to the size of the compressed file
b. the number of pixels in a frame of the original size to those in a frame of the compressed file
c. compressed file size to the original file size
d. none of the mentioned
Answer- the original file size to the size of the compressed file
Que- Lossy and lossless are classifications of :
a. multimedia storage systems
b. files
c. compression algorithms
d. all of the mentioned
Answer- compression algorithms
Que- Lossy techniques provide ___________ when compared to lossless techniques.
a. lower compression ratios
b. much higher compression ratios
c. similar compression ratios
d. none of the mentioned
Answer- much higher compression ratios
Que- The full form of MPEG is :
a. Motion Pictures Engineering Group
b. Motion Picture Engineers Group
c. Motion Picture Experts Group
d. None of the mentioned
Answer- Motion Picture Experts Group
Que- MPEG compression :
a. stores the compression values of each frame
b. stores the differences between successive frames
c. stores multiple frames' values together
d. none of the mentioned
Answer- stores the differences between successive frames
Que- The three levels in QoS are :
a. Best effort service
b. Soft QoS
c. Hard QoS
d. All of the mentioned
Answer- All of the mentioned
Que- The level that treats different types of traffics in different ways, giving certain traffic streams higher priority than other streams and with best efforts, but no guarantees are made :
a. Best effort service
b. Soft QoS
c. Worst effort service
d. Hard QoS
Answer- Soft QoS
Que- The quality of service requirements are guaranteed in :
a. Best effort service
b. Soft QoS
c. Worst effort service
d. Hard QoS
Answer- Hard QoS
Que- The factors that define QoS are :
a. Throughput
b. Jitter
c. Delay
d. All of the mentioned
Answer- All of the mentioned
Que- Delay and Jitter :
a. mean the same thing
b. are two completely different things
c. all of the mentioned
d. none of the mentioned
Answer- are two completely different things
Que- Delay is :
a. the time from when a request is first submitted to when the desired result is produced
b. the delay that occurs during playback of the stream
c. how the errors are handled during transmission and processing of continuous media
d. none of the mentioned
Answer- the time from when a request is first submitted to when the desired result is produced
Que- Admission control is :
a. the delay that occurs during playback of the stream
b. the practice of admitting a request for service only if the server has sufficient resources to satisfy the request
c. how the errors are handled during transmission and processing of continuous media
d. none of the mentioned
Answer- the practice of admitting a request for service only if the server has sufficient resources to satisfy the request
Que- An admission control scheme assigns a __________ to each type of resource.
a. processor
b. memory location
c. resource manager
d. all of the mentioned
Answer- resource manager
Que- A scheduling algorithm can use either ___________ priority or ________ priority.
a. static, still
b. static, dynamic
c. live, dead
d. none of the mentioned
Answer- static, dynamic
Que- The priority of a process will ______________ if the scheduler assigns it a static priority.
a. change
b. remain unchanged
c. depends on the operating system
d. none of the mentioned
Answer- remain unchanged
Que- As disks have relatively low transfer rates and relatively high latency rates, disk schedulers must reduce latency times to :
a. ensure high bandwidth
b. ensure low bandwidth
c. make sure data is transferred
d. reduce data transfer speeds
Answer- ensure high bandwidth
Que- Servicing requests strictly according to deadline using EDF may result in :
a. lower seek times
b. lower bandwidth
c. higher seek time
d. higher bandwidth
Answer- higher seek time
Que- The hybrid algorithm that combines EDF with SCAN algorithm is known as :
a. EDS
b. SDF
c. SCAN-EDF
d. None of the mentioned
Answer- SCAN-EDF
Que- If several requests have different deadlines that are relatively close together, then using the SCAN - EDF algorithm :
a. the SCAN ordering will service the requests in that batch
b. the EDF ordering will service the requests in that batch
c. the FCFS ordering will service the requests in that batch
d. none of the mentioned
Answer- the SCAN ordering will service the requests in that batch
Que- Multimedia systems require _________ scheduling to ensure critical tasks will be serviced within timing deadlines.
a. soft real time
b. hard real time
c. normal
d. none of the mentioned
Answer- hard real time
Que- The EDF scheduler uses ________ to order requests according to their deadlines.
a. stack
b. disks
c. queue
d. none of the mentioned
Answer- queue
Que- In SCAN - EDF, requests with the same deadlines are ordered according to :
a. SCAN policy
b. EDF policy
c. FCFS policy
d. FIFO policy
Answer- SCAN policy
Que- The three general methods for delivering content from a server to a client across a network are :
a. unicasting
b. multicasting
c. broadcasting
d. all of the mentioned
Answer- all of the mentioned
Que- Unicasting delivers the content to :
a. a single client
b. all clients, regardless whether they want the content or not
c. a group of receivers who indicate they wish to receive the content
d. none of the mentioned
Answer- a single client
Que- Broadcasting delivers the content to :
a. a single client
b. all clients, regardless whether they want the content or not
c. a group of receivers who indicate they wish to receive the content
d. none of the mentioned
Answer- all clients, regardless whether they want the content or not
Que- Multicasting delivers the content to :
a. a single client
b. all clients, regardless whether they want the content or not
c. a group of receivers who indicate they wish to receive the content
d. none of the mentioned
Answer- a group of receivers who indicate they wish to receive the content
Que- RTSP stands for :
a. Real Time Streaming Policy
b. Real Time Streaming Protocol
c. Real Time Systems Protocol
d. Read Time Streaming Policy
Answer- Real Time Streaming Protocol
Que- HTTP is __________
a. a stateful protocol
b. a stateless protocol
c. a protocol that maintains the status of its connection with the client
d. a stateless protocol that does not maintain the status of its connection with the client
Answer- a stateless protocol that does not maintain the status of its connection with the client
Que- RTSP includes the following states :
a. SETUP
b. PLAY
c. PAUSE
d. All of the mentioned
Answer- All of the mentioned
Que- In the SETUP state :
a. the server is setup
b. the client is setup
c. the server allocates resources for the client session
d. the client sends requests to the server
Answer- the server allocates resources for the client session
Que- In the TEARDOWN state :
a. the server breaks down the connection and releases the resources allocated for the session
b. the client breaks down the connection and releases the resources allocated for the session
c. the system crashes
d. none of the mentioned
Answer- the server breaks down the connection and releases the resources allocated for the session
Que- RTP stands for :
a. real time protocol
b. real time transmission control protocol
c. real time transmission protocol
d. real time transport protocol
Answer- real time transport protocol
Que- The problem with unicast delivery is that the :
a. memory allocation is difficult
b. server must establish a separate unicast session for each client
c. the routers must support unicasting
d. the clients must be close to the server
Answer- server must establish a separate unicast session for each client
Que- The difficulty with multicasting from a practical point of view is :
a. memory allocation is difficult
b. server must establish a separate unicast session for each client
c. the routers must support multicasting
d. none of the mentioned
Answer- the routers must support multicasting
Que- To let a client have random access to a media stream :
a. the protocol used must not be stateless
b. the server must support download
c. the stream should give access rights to the client
d. all of the mentioned
Answer- the protocol used must not be stateless
Que- Which of the following are forms of malicious attack ?
a. Theft of information
b. Modification of data
c. Wiping of information
d. All of the mentioned
Answer- All of the mentioned
Que- What are common security threats ?
a. File Shredding
b. File sharing and permission
c. File corrupting
d. File integrity
Answer- File sharing and permission
Que- From the following, which is not a common file permission ?
a. Write
b. Execute
c. Stop
d. Read
Answer- Stop
Que- Which of the following is a good practice ?
a. Give full permission for remote transferring
b. Grant read only permission
c. Grant limited permission to specified account
d. Give both read and write permission but not execute
Answer- Grant limited permission to specified account
Que- What is not a good practice for user administration ?
a. Isolating a system after a compromise
b. Perform random auditing procedures
c. Granting privileges on a per host basis
d. Using telnet and FTP for remote access
Answer- Using telnet and FTP for remote access
Que- Which of the following is least secure method of authentication ?
a. Key card
b. fingerprint
c. retina pattern
d. Password
Answer- Password
Que- Which of the following is a strong password ?
a. 19thAugust88
b. Delhi88
c. P@assw0rd
d. !augustdelhi
Answer- P@assw0rd
Que- Why is one time password safe ?
a. It is easy to generated
b. It cannot be shared
c. It is different for every access
d. It is a complex encrypted password
Answer- It is different for every access
Que- What does Light Directory Access Protocol (LDAP) doesn't store ?
a. Users
b. Address
c. Passwords
d. Security Keys
Answer- Address
Que- What is characteristic of RADIUS system ?
a. It is essential for centralized encryption and authentication
b. It works on Network layer to deny access to unauthorized people
c. It provides centralized authentication mechanism via network devices
d. It's a strong File access system
Answer- It provides centralized authentication mechanism via network devices
Que- Which happens first authorization or authentication ?
a. Authorization
b. Authentication
c. Authorization & Authentication are same
d. None of the mentioned
Answer- Authorization
Que- What is characteristics of Authorization ?
a. RADIUS and RSA
b. 3 way handshaking with syn and fin
c. Multilayered protection for securing resources
d. Deals with privileges and rights
Answer- Deals with privileges and rights
Que- What forces the user to change password at first logon ?
a. Default behavior of OS
b. Part of AES encryption practice
c. Devices being accessed forces the user
d. Account administrator
Answer- Account administrator
Que- What is not a best practice for password policy ?
a. Deciding maximum age of password
b. Restriction on password reuse and history
c. Password encryption
d. Having change password every 2 years
Answer- Having change password every 2 years
Que- What is breach of integrity ?
a. This type of violation involves unauthorized reading of data
b. This violation involves unauthorized modification of data
c. This violation involves unauthorized destruction of data
d. This violation involves unauthorized use of resources
Answer- This violation involves unauthorized modification of data
Que- What is breach of confidentiality ?
a. This type of violation involves unauthorized reading of data
b. This violation involves unauthorized modification of data
c. This violation involves unauthorized destruction of data
d. This violation involves unauthorized use of resources
Answer- This type of violation involves unauthorized reading of data
Que- What is theft of service ?
a. This type of violation involves unauthorized reading of data
b. This violation involves unauthorized modification of data
c. This violation involves unauthorized destruction of data
d. This violation involves unauthorized use of resources
Answer- This violation involves unauthorized use of resources