P21csc205-Distributed Operating System
P21csc205-Distributed Operating System
P21csc205-Distributed Operating System
4. Which technique is based on compile-time program transformation for accessing remote data
in a distributed-memory parallel system?
a) cache coherence scheme b) computation migration
c) remote procedure call d) message passing
Ans: b
51. Select correct option for the message(Mi) transmission case "Mi must be delivered before mj
if Ti < Tj
a)Absolute Ordering b) Consistent Ordering
c)Causal Ordering d)total ordering
Ans:a
53. The process initiated by a method invocation, which may result in further invocations on
methods in other objects is called
a)A creation b)An action
c) A reaction d) An invitation
Ans:b
54. __ is a process that prevents multiple threads or processes from accessing shared resources at
the same time.
a)Critical section b) Deadlock
c)Message passing d)Mutual Exclusion
Ans:d
58. Which of the following algorithm is Token Based Algorithm for Mutual Exclusion
a)Lamport Algorithm b)Ricart–Agrawala‘s Algorithm
c)Suzuki-Kasami‘s Broadcast Algorithms d)Maekawa‘s Algorithm
Ans:c
29. What does Light Directory Access Protocol (LDAP) doesn’t store?
a) Users b) Address
c) Passwords d) Security Keys
Ans: b
36. A DoS attack coming from a large number of IP addresses, making it hard to manually filter
or crash the traffic from such sources is known as a _____________
a) GoS attack b) PDoS attack
c) DoS attack d) DDoS attack
Ans: d
37. DDoS stands for _________________
a) Direct Distribution of Server b) Distributed Denial of Service
c) Direct Distribution of Service d) Distributed Denial of Server
Ans: b
38. ___________ is a type of DoS threats to overload a server as it sends a large number of
requests requiring resources for handling & processing.
a) Network Layer DoS b) Physical Layer DoS
c) Transport Layer DoS d) Application Layer DoS
Ans: d
39. A digital signature is a mathematical technique which validates?
a) authenticity b) integrity
c) Non-repudiation d). All of the above
Ans :d
40. _____________ is a process which verifies the identity of a user who wants to access the
system.
a)Authentication b) Non-repudiation
c) Integrity d) None of the above
Ans : a
41. _____________ ensures that the message is real, accurate and safeguards from unauthorized
user modification during the transmission.
a)Authentication b)Non-repudiation
c) Integrity d) None of the above
Ans :c
42. How many algorithms digital signature consists of?
a) 2 b) 3
c) 4 d) 5
Ans : b
43. A _________ produces a signature for the document.
a) Key generation algorithm b) Signature verifying algorithm
c) Signing algorithm d) Authentication
Ans : c
44. Which algorithm algorithm provides the private key and its corresponding public key?
a)Key generation algorithm b)Signature verifying algorithm
c) Signing algorithm d)None of the above
Ans :a
45. Which of the following is not a type of digital signature?
a) Approval Signatures b) Non-Certified Signatures
c) Visible Digital Signature d) Invisible Digital Signature
Ans : b
53. A computer ________ is a malicious code which self-replicates by copying itself to other
programs.
a) program b) virus
c) application d) worm
Ans: b
54. Which of them is not an ideal way of spreading the virus?
a) Infected website b) Emails
c) Official Antivirus CDs d) USBs
Ans: c
55. In which year Apple II virus came into existence?
a) 1979 b) 1980
c) 1981 d) 1982
Ans: c
56. The virus hides itself from getting detected by ______ different ways.
a) 2 b) 3
c) 4 d) 5
Ans: b
57. _______________ infects the master boot record and it is challenging and a complex task to
remove this virus.
a) Boot Sector Virus b) Polymorphic
c) Multipartite d) Trojans
Ans: a
58. ________________ gets installed & stays hidden in your computer’s memory. It stays
involved to the specific type of files which it infects.
a) Boot Sector Virus b) Direct Action Virus
c) Polymorphic Virus d) Multipartite Virus
Ans: b
59. Direct Action Virus is also known as ___________
a) Non-resident virus b) Boot Sector Virus
c) Polymorphic Virus d) Multipartite Virus
Ans: a
60. ______________ infects the executables as well as the boot sectors.
a) Non-resident virus b) Boot Sector Virus
c) Polymorphic Virus d) Multipartite Virus
Ans: d
UNIT-IV
1. What is Unix?
a) Unix is a programming language b) Unix is a software program
c) Unix is an operating system d) Unix is a text editor
Ans: c
9. Which part of the Unix operating system interacts with the hardware?
a) Application program b) Vi editor
c) Shell d) Kernel
Ans: d
10. Which command is used to display the documentation of commands in Unix?
a) man b) whatis
c) help d) search
Ans: a
11. Which Unix command is used for changing the current directory?
a) pwd b) rm
c) cd d) cp
Ans: c
12. Which command is used for printing the current working directory?
a) dir b) HOME
c) cd d) pwd
Ans: d
14. Which command is used by the user to change their login password in Unix?
a) cp b) man
c) reset d) passwd
Ans: d
15. Which command is used for displaying the contents of a file in Unix?
a) mkdir b) cat
c) rm d) cp
Ans: b
16. Which command is used to compress files?
a) gzip b) gunzip
c) comm. d) cmp
Ans: a
17. Which command is used for displaying the beginning of a file in Unix?
a) lp b) begin
c) pr d) head
Ans: d
18. Which symbol is used with the tail command to print the file from the selected line?
a) %% b) ^
c) + d) –
Ans: c
19. Which command is used to delete all files in a directory?
a) del * b) rm *
c) mv * d) rmdir *
Ans: b
20. echo command is used for _________
a) displaying diagnostic messages b) displaying date and time
c) displaying errors d) displaying operating system details
Ans: a
21. What is the function of cp command in Unix?
a) delete a given file b) change the directory
c) list all the available files in the current directory d) cp is a command used for copying files
and directories
Ans: d
25. Which Unix command is used for counting words, lines, and characters in a file?
a) wc b) man
c) count d) diff
Ans: a
26. In UNIX, which command is used to change the permissions of a file?
a) chown b) chgrp
c) chmod d) ch
Ans: c
.
27. Which symbol is used to change permissions for hidden files in Unix?
a) * b) $
c) & d) .
Ans: d
28. Which command is used for saving and quitting the vi editor simultaneously?
a) ‘:x’ b) :f
c) :q d) :w
Ans: a
29. How can we escape to the UNIX shell without quitting vi editor?
a) using ‘:sh’ command and using ctrl-Z b) using ‘:sh’ command
c) using ctrl-Z d) using ctrl-D
Ans: a
30. For creating and removing directories, which of the following system calls are used?
a) mkdir and rmdir b) rmdir and chown
c) chdir and chown d) mkdir and chdir
Ans: d
31. Which of the following files are known as special files in Unix?
a) /dev/null b) sample.txt
c) /dev/null and /dev/tty d) /dev/tty
Ans: c
34. Which process is immediately set up by the kernel when we log on to a Unix system?
a) System b) bash
c) shell d) parent
Ans: c.
36. Which of the following system call is used for creating a new process in Unix?
a) new b) wait
c) read d) fork
Ans: d.
43. Which of the following command will be used for searching “director” in emp.lst?
a) grep “director” emp.lst b) grep -director emp.lst
c) grep -v “director” emp.lst d) grep “director”
Ans: a.
44. Which of the following command is used for searching for a pattern in one or more file(s)?
a) paste b) grep
c) cd d) cp
Ans: b.
47. To run the script, we should make it executable first by using _____
a) chmod +w b) chmod +rwx
c) chmod +x d) chmod +r
Ans: c.
49. Which command is used to find out the consumption of a specific directory?
a) mem b) dv
c) du d) df
Ans: c.
54. What is the default delimiter used by the cut command for cutting fields?
a) underscore b) space
c) tab d) double tab
Ans: c
2. Device files are used by the kernel for operating the device.
a) True b) False
Ans: a
3. When we log in, the UNIX places us in a directory, called ______ directory
a) home b) main
c) parent d) current
Ans: a
13. Which of the following symbol is used to indicate the absence of a permission of a file?
a) $ b) &
c) + d) –
Ans: d
26. When the process has completed its execution it is called ______
a) born b) terminated
c) waiting d) exit
Ans: d
29. Some attributes of every process are maintained by the kernel in memory in a separate
structure called the ______
a) pcb b) task control block
c) process table d) task table
Ans: c
30. Process table and process control block store same attributes of a process.
a) True b) False
Ans: b
35. To know the PID of your current shell, which command will be used?
a) echo $$ b) echo $
c) $SHELL d) $PATH
Ans: a
37. What is the PID of the first process that is set up when the system is booted?
a) 1 b) 0
c) any d) 2
Ans: b
39. Which of the following variable wait within the to enable a process
a) a condition is defined by a condition variable
b) objects Boolean objects can be used by condition variables
c) semaphore must be used
d) all of the mentioned
e) both a and b
Ans:a
40. In which the access takes place when different processes try to access the same data
concurrently and the outcome of the execution depends on the specific order, is called
a) dynamic condition b) race condition
c) essential condition d) critical condition
e) both a and b
Ans: b
49. The wait operation of the semaphore basically works on the basic _______ system call.
a) stop() b) block()
c) hold() d) wait()
Ans: b
50. The signal operation of the semaphore basically works on the basic _______ system call.
a) continue() b) wakeup()
c) getup() d) start()
Ans: b
51. If the semaphore value is negative ____________
a) its magnitude is the number of processes waiting on that semaphore
b) it is invalid
c) no operation can be further performed on it until the signal operation is performed on it
d) none of the mentioned
Ans: a
52. The code that changes the value of the semaphore is ____________
a) remainder section code b) non – critical section code
c) critical section code d) none of the mentioned
Ans: c
58. Which option is used for counting the number of characters in a file only.
a) –l b) -W
c) –c d) -w
Ans: c
60.UNIX offers a pager named ____ which has replaced the original pager of UNIX called ____
a) more, less b) less, more
c) more, pg d) pg, more
Ans: c