Quiz OS&CN
Quiz OS&CN
Quiz OS&CN
Contents
Quiz 01 OS ........................................................................................................................... 2
Quiz 02 OS ........................................................................................................................... 5
Quiz 03 OS ........................................................................................................................... 8
Quiz 04 OS ......................................................................................................................... 10
Quiz 05 OS ......................................................................................................................... 15
Quiz 01 CN ......................................................................................................................... 18
Quiz 02 CN ......................................................................................................................... 20
Quiz 03 CN ......................................................................................................................... 23
Quiz 04 CN ......................................................................................................................... 27
Quiz 01 OS
Which of these statements about address space are not true?
Select one:
a. Address space is the abstraction that is referenced to the set of addresses a process
b. None of others
c. Address space is decoupled from the physical memory
_________________________________________________________________________
Which of these statements about files are true?
Select one or more:
a.
b.
c.
d.
_________________________________________________________________________
Which of these statements about address space are true?
Select one or more:
a. Address space is the abstraction that is referenced to the set of addresses a process
b. Address space is a space contain the address of variables
c. Address space is decoupled from the physical memory
_________________________________________________________________________
Server OS serves multiple users at once over a network and allow the users to share --------and ------------ resources
Select one:
a.
b.
c.
d.
Hardware, firmware
Hardware, software
Software, firmware
Firmware, hardware
_________________________________________________________________________
Symbian, Palm, Windows Mobile, Windows CE are --------Select one:
a.
b.
c.
d.
Handheld OS
Multiprocessor OS
PC OS
Mainframe OS
_________________________________________________________________________
Which of these statements about files are not true?
Select one:
DISK
RAM
BIOS
ROM
_________________________________________________________________________
------------systems are used in time-critical environments where reliability is key and data
must be processed within a strict time limit
Select one:
a.
b.
c.
d.
Embedded
Real-time
Hybrid
Interactive
_________________________________________________________________________
MainframeOS offers 3 kinds of services ----------Select one:
a.
b.
c.
d.
_________________________________________________________________________
------------------ process routine job without interactive user present
Select one:
a.
b.
c.
d.
_________________________________________________________________________
---------------- runs on systems that have many CPUs (multi-processors, multi-cores, multichips)
Select one:
a. Multiprocessor OS
b. Embedded OS
c. PC OS
d. Server OS
_________________________________________________________________________
Which of these statements about processes are not true?
Select one or more:
a.
b.
c.
d.
e.
_________________________________________________________________________
Which of these statements about processes are true?
Select one or more:
a. A program in execution
b. Process table stores all the information of processes
c. Associated with each process is set of resources such as executable code, data,
stack, CPU registers value, and other information needing to run a program
d. A program on disk
e. Associated with each process is its file and directory
_________________________________________________________________________
------------- serves multiple users at once over a network and allow the users to share
hardware and software resources
Select one:
a.
b.
c.
d.
Mainframe OS
PC OS
Server OS
Multiprocessor OS
_________________________________________________________________________
Real-time system has ----------- and -------------- real-time system types
Select one or more:
a.
b.
c.
d.
Paper
Soft
Firm
Hard
_________________________________________________________________________
------------ offers 3 kinds of services: batch, transaction processing, timesharing
Select one:
a.
b.
c.
d.
PC OS
Mainframe OS
Server OS
Multiprocessor OS
_________________________________________________________________________
Allow multiple remote users to run jobs on the computer at once
Select one:
a.
b.
c.
d.
Real-time systems
Batch systems
Time sharing systems
Transaction processing systems
_________________________________________________________________________
Handling large numbers of small requests
Select one:
a.
b.
c.
d.
Real-time systems
Time sharing systems
Batch systems
Transaction processing systems
_________________________________________________________________________
---------- supports with dozens of programs started up at the boot time
Select one:
a.
b.
c.
d.
Multi-scheduling
Multi-processor
Multi-core
Multi-programming
_________________________________________________________________________
Quiz 02 OS
How much time is reasonable for the quantum in Round-Robin algorithm ?
Select one:
a.
b.
c.
d.
46 msec
16 msec
64 msec
128 msec
_________________________________________________________________________
Which statement is correct?
Select one:
a. Process and thread are similar
b. A thread can create many processes
_________________________________________________________________________
In a batch system, scheduling by SJF is provably better than FCFS if ------------Select one:
a.
b.
c.
d.
_________________________________________________________________________
If a process finishes a time interval with CPU, its state switches -----------Select one:
a.
b.
c.
d.
_________________________________________________________________________
Two or more processes accessing to a shared memory is an example of ----------Select one:
a.
b.
c.
d.
Mutual exclusion
Interprocess communication
Race condition
Critical region
_________________________________________________________________________
Which system requires pre-emptive scheduling algorithm?
Select one:
a.
b.
c.
d.
Interactive systems
Quantum systems
All of the others
Batch systems
_________________________________________________________________________
What happen if 2 processes have same priority in the Priority scheduling algorithm?
Select one:
a. Serve the process that has shorter burst time first, let the process that has longer
burst time wait
b. None of the others
c. Use Priority-inheritance solution.
d. Serve the process that comes first, let the process that comes later wait
_________________________________________________________________________
Which event cannot cause process creation?
Select one:
a.
b.
c.
d.
_________________________________________________________________________
Which event causes process involuntary termination?
Select one:
a.
b.
c.
d.
Error exit
Fatal error
Fatal exit
Kill exit
_________________________________________________________________________
Which statement is correct?
Select one:
a.
b.
c.
d.
_________________________________________________________________________
Which of the following is the benefit of thread?
Select one:
a.
b.
c.
d.
Synchronization
All of the others
Dependence
Resource sharing
_________________________________________________________________________
All threads in a process share
Select one:
a.
b.
c.
d.
Address space
Register
Program counter
Stack
_________________________________________________________________________
Choose the correct solution(s) for the process synchronization problems
Select one:
a.
b.
c.
d.
Busy waiting
Semaphore
Sleep and Wakeup
All of the others
_________________________________________________________________________
Quiz 03 OS
Memory compaction is a mechanism to ---------Select one:
a.
b.
c.
d.
_________________________________________________________________________
A page table entry does not provide information about -----------Select one:
a.
b.
c.
d.
_________________________________________________________________________
How many linear address spaces does paging provide?
Select one:
a.
b.
c.
d.
_________________________________________________________________________
What happen if there is no memory abstraction?
Select one:
a. Only one program can write to the memory
b. A program can prevent others to access memory
_________________________________________________________________________
In a swapping system, memory consists of the following block sizes in memory order: 12KB,
20 KB, 7KB, 9KB, 5KB, and 11KB. Which block is taken for a request of 10KB using the best
fit algorithm?
Select one:
a.
b.
c.
d.
20KB
12KB
9KB
11KB
_________________________________________________________________________
Global page replacement policy -------------Select one:
a.
b.
c.
d.
_________________________________________________________________________
Which statement is incorrect for a page?
Select one:
a.
b.
c.
d.
_________________________________________________________________________
The replacement policy replaces the page that has not been referenced for the longest time
Select one:
a.
b.
c.
d.
_________________________________________________________________________
Which technique requires the programmer to be aware that it is being used?
Select one:
a.
b.
c.
d.
_________________________________________________________________________
What is the best fit to allocate free memory to programs?
Select one:
a.
b.
c.
d.
Search entire list, find the hole close to the actual size
Search entire list, finds the hole has the largest size
None of the others
Search entire list, finds the hole match with the actual size
_________________________________________________________________________
Using virtual memory allows ------------Select one:
a.
b.
c.
d.
_________________________________________________________________________
The worst fit algorithm allocates memory to a request by ------------------Select one:
a. Choosing the first available memory block that is large enough from the location of
the last placement
b. Choosing the largest available memory block
c. Choosing the memory block that is closest in size to the request
d. Choosing the first available memory block that is large enough from the beginning of
the memory
_________________________________________________________________________
Quiz 04 OS
The 775 mode of a file in UNIX indicates ---------------Select one:
a. This file has read and execute permissions for all users
b. This file has read permissions for all users, execute permissions for group owner,
and write permission for file owner
c. This file has read, write and execute permissions for file owner only
d. This file has read and execute permissions for all users and write permission for file
owner
_________________________________________________________________________
Calls to modify file content based on file descriptor such as read() or write() on Unix are
referred to as --------------------Select one:
a.
b.
c.
d.
Function calls
Procedure calls
System calls
User calls
_________________________________________________________________________
A --------------- is created when a user opens an account to access the computer system.
Select one:
a.
b.
c.
d.
Directory
Volume
MFD
Subdirectory
_________________________________________________________________________
Allocating a single set of blocks with the first block and length to a file at the time of creating
is referred to as -------------Select one:
a.
b.
c.
d.
i-node allocation
contiguous allocation
link list allocation
chained allocation
_________________________________________________________________________
Step 01. MBR locates the active partition, reads in its boot block and executes it
Step 02. The computer is booted, the BIOS reads in and executes the MBR
Step 03. The program in boot block loads the OS contained in that partition
Mechanism of booted computer is
Select one:
a.
b.
c.
d.
2, 3, 1
None of others
1, 2, 3
3, 2, 1
_________________________________________________________________________
A symbolic link in a file system on Unix is ----------------Select one:
a.
b.
c.
d.
_________________________________________________________________________
The purpose of an extension is to -----------Select one:
a.
b.
c.
d.
_________________________________________________________________________
------------- allocation allows files to use any storage space available on the disk.
Select one:
a.
b.
c.
d.
Add-on storage
Noncontiguous storage
Contiguous storage
Fragmented storage
_________________________________________________________________________
The File Manager is in charge of the systems ------------- components.
Select one:
a.
b.
c.
d.
Electronic
Physical
Data
Software
_________________________________________________________________________
File descriptor of the standard error by default is an integer value --------------Select one:
a.
b.
c.
d.
2
3
1
0
_________________________________________________________________________
Which one is not file structure?
Select one:
a.
b.
c.
d.
Sequence of bytes
Sequence of records
Tree structure
Star structure
_________________________________________________________________________
When using random access files, the program used to store the data follows a set of
instructions, called a ------------- algorithm, that transforms each key into a number, the
records logical address.
Select one:
a.
b.
c.
d.
Lookup
Grouping
Translation
Hashing
_________________________________________________________________________
The files type includes ------------Select one:
a.
b.
c.
d.
_________________________________________________________________________
Which of these statements about the Linked List Allocation are true?
Select one or more:
a. First word of each block is used as pointer to the next one and the rest of the block is
for data
b. The amount of data storage in a block is not a power of two because the pointer
takes up a few bytes
c. Random access is extremely slow
d. Internal and External fragmentation are generated
_________________________________________________________________________
The 1^(st) block in each partition is called ---------Select one:
a.
b.
c.
d.
Super block
MBR
Boot block
Free block
_________________________________________________________________________
The requirements for long-term information storage are -------------Select one or more:
a.
b.
c.
d.
_________________________________________________________________________
----------- are special files with listings of filenames and their attributes.
Select one:
a.
b.
c.
d.
Programs
Databases
Directories
Data files
_________________________________________________________________________
The file systems function are ------------Select one or more:
a.
b.
c.
d.
_________________________________________________________________________
System calls for managing directories exclude ---------Select one:
a.
b.
c.
d.
Opendir
Link
Seed
Unlink
_________________________________________________________________________
A UNIX or Linux system might identify a file as: /usr/imfst/flynn/inventory.doc. What
represents the root directory is ------------.
Select one:
a.
b.
c.
d.
usr
/
flynn
imfst
_________________________________________________________________________
The files structure includes ------------Select one:
a.
b.
c.
d.
_________________________________________________________________________
As long as users refer to files in the ------------- directory, they can access their files without
entering the complete name from the highest level to the lowest.
Select one:
a.
b.
c.
d.
home
working
default
root
_________________________________________________________________________
On magnetic disks, files can be organized in one of three ways; ------------Select one
a.
b.
c.
d.
_________________________________________________________________________
---------- are having one directory containing all files
Select one:
a.
b.
c.
d.
Quiz 05 OS
The controllers job to convert the --------- into a block of bytes and perform any ---------necessary
Select one:
a.
b.
c.
d.
_________________________________________________________________________
Without DMA, the ----------- is responsible for the physical movement of data between main
memory and the device.
Select one:
a.
b.
c.
d.
CPU
Memory controller
Bus
Disk
_________________________________________________________________________
I / O devices are ------------
Select one:
a.
b.
c.
d.
_________________________________________________________________________
Which statement is incorrect for device driver?
Select one:
a. Device driver normally operates as a part of the operating system kernel
b. Device driver is device control register and device data buffer
c. Device driver is generally written by the devices manufacturer and delivered along
with the device
d. Device driver is some device-specific code for controlling a device
_________________________________________________________________________
A disk queue with requests for I/O blocks on cylinders in orders: 10, 22, 20, 2, 40, 6, 38.
Assume that the disk head is initially at cylinder 18 and the head move downward. How
many cylinders does Total head movement move when the elevator algorithms are used?
Select one:
a.
b.
c.
d.
62
54
144
60
_________________________________________________________________________
Of the three components of access time in a movable-head Disk Arm Scheduling Algorithms,
------------ is the longest.
Select one:
a.
b.
c.
d.
Delay time
Search time
Seek time
Transfer time
_________________________________________________________________________
------------- control the transfer of information between the disk drives and the rest of the
computer system.
Select one:
a.
b.
c.
d.
System controllers
Disk drive controllers
Disk drive interfaces
System interfaces
_________________________________________________________________________
I/O software is typically organized in four layers as following
Select one:
a. Program counter handlers, device drivers, device-independent operating system
software, user-level I/O software
b. Interrupt handlers, system-level I/O software, device-independent operating system
software, user-level I/O software
c. Interrupt handlers, device drivers, device-independent operating system software,
user-level I/O software
d. Interrupt handlers, device drivers, device-independent operating system software,
system-level I/O software
_________________________________________________________________________
------------ devices are assigned to only one job at a time.
Select one:
a.
b.
c.
d.
Static
Dedicated
Shared
Virtual
_________________________________________________________________________
Which one is not a property of a precise interrupt?
Select one:
a.
b.
c.
d.
_________________________________________________________________________
Which DVD format provides the largest storage capacity?
Select one:
a.
b.
c.
d.
Dual-layer, single-sided
Single-layer, single-sided
Single-layer, double-sided
Dual-layer, double-sided
_________________________________________________________________________
Mapping all the control registers into the memory space allows ------------Select one:
a.
b.
c.
d.
The CPU to communicate with the control register and the device data buffers
Processes to communicate with their threads
Processes to communicate with other processes
The CPU to communicate with the RAM memory and processes
_________________________________________________________________________
Quiz 01 CN
Which of the following can not a host ?
Select one:
a.
b.
c.
d.
PDA
Computer
Router
Smartphone
_________________________________________________________________________
Which layer interprets the meaning of data?
Select one:
a.
b.
c.
d.
Presentation
Session
Data link
Transport
_________________________________________________________________________
Which method is not about switching?
Select one:
a.
b.
c.
d.
_________________________________________________________________________
What statement is incorrect about protocols?
Select one:
a.
b.
c.
d.
_________________________________________________________________________
What is the reason that UDP is best effort data delivery protocol?
Select one:
a.
b.
c.
d.
_________________________________________________________________________
Two main elements related to network-core functions are
Select one:
a.
b.
c.
d.
_________________________________________________________________________
Store and forward technique that entire packet must arrive at router before it can be
transmitted on next link exists in
Select one:
a.
b.
c.
d.
Circuit switching
None of circuit switching and package switching
Both of circuit switching and package switching
Package switching
_________________________________________________________________________
The fourth layer in OSI network model is ---------Select one:
a.
b.
c.
d.
Transport
Application
Network
Session
_________________________________________________________________________
In the transmission delay calculation t = L/R, what is R?
Select one:
a.
b.
c.
d.
_________________________________________________________________________
The data that the Network layer processes is called --------Select one:
a.
b.
c.
d.
Segment
Frame
Message
Datagram
_________________________________________________________________________
What is maximum data rate for fiber cable?
Select one:
a. 100Gbps
b. 10Gbps
c. 100Mbps
d. 1Gbps
_________________________________________________________________________
Sources of packet delay does not include
Select one:
a.
b.
c.
d.
_________________________________________________________________________
In OSI model, as data packet moves from the lower to the upper layer header are --------Select one:
a.
b.
c.
d.
Added
Modified
Removed
Rearranged
_________________________________________________________________________
Network protocols define
Select one:
a.
b.
c.
d.
_________________________________________________________________________
Packet loss and delay are usually caused by
Select one:
a.
b.
c.
d.
_________________________________________________________________________
Quiz 02 CN
------------ is a protocol to transfer file to / from remote host using client / server model.
Select one:
a. FTP
b. HTTP
c. SSH
d. Telnet
_________________________________________________________________________
------------- is a protocol to deliver / store email to / on receivers server.
Select one:
a.
b.
c.
d.
SMTP
IMAP
HTTP
POP3
_________________________________________________________________________
What is the characteristic of a network application?
Select one:
a.
b.
c.
d.
_________________________________________________________________________
------------ is an HTTP method that allows users to upload input data to server.
Select one:
a.
b.
c.
d.
DOWNLOAD method
POST method
SHOW method
GET method
_________________________________________________________________________
Which of the following is hybrid of client-server and P2P?
Select one:
a.
b.
c.
d.
e.
Skype
EBay
DNS
BitTorrent
Telnet
_________________________________________________________________________
A DNS query resolution mechanism that repeatedly sends a query to different servers is
referred to as -----------Select one:
a.
b.
c.
d.
_________________________________________________________________________
Which statement is incorrect about peer-to-peer (P2P) networks?
Select one:
a.
b.
c.
d.
_________________________________________________________________________
How does the HTTP protocol implement caching?
Select one:
a.
b.
c.
d.
e.
_________________________________________________________________________
What can be used to identify the process?
Select one:
a. Both IP address of the host running the process and the port associated with that
process.
b. Process ID assigned by server
c. Name of the application running on the host
d. Port associated with that process
_________________________________________________________________________
What is the protocol used to obtain email from / to an email server?
Select one:
a.
b.
c.
d.
IMAP
SNMP
SMTP
IGMP
_________________________________________________________________________
The ---------------- that together implement the DNS distributed database, store -----------------for the hostname to IP address mappings.
Select one:
a.
b.
c.
d.
e.
_________________________________________________________________________
Assume the RTT 200ms, the transmission time of a Web object 10ms, how long does it take
to download that object from a Web server to a client if using non-persistent HTTP?
Select one:
a.
b.
c.
d.
e.
210ms
240ms
420ms
410ms
220ms
_________________________________________________________________________
For what is a Telnet client used?
Select one:
a.
b.
c.
d.
_________________________________________________________________________
The client-server model significantly relies on -------------- infrastructure servers, the Peer-toPeer model, instead, pairs of interminably connected peers, communicates ------------ with
each other
Select one:
a.
b.
c.
d.
_________________________________________________________________________
What happen when you can connect to the FTP server by typing telnet 112.158.25.4.21 but
you can not connect to the same FTP server by typing telnet ftp.example.com 21?
Select one:
a.
b.
c.
d.
No DNS configuration
ADSL connection has problem
All of the others.
Server is shutdown
_________________________________________________________________________
Assume a website has only 5 different small images, using persistent HTTP, a client needs --------- to be server
Select one:
a. 4 UDP connections
b. A single TCP connection
c. Multiple TCP connections
d. 4 TCP connections
_________________________________________________________________________
Which two protocols are used to control the transfer of web resources from a web server to a
client browser?
Select one:
a.
b.
c.
d.
FTP, HTTP
ASP, HTML
HTTP, HTTPS
HTML, HTTP
Quiz 03 CN
RDT can be applicable with supporting of --------Select one:
a.
b.
c.
d.
UDP
GBN
FSM
TCP
_________________________________________________________________________
------------ applications typically use ----------Select one:
a.
b.
c.
d.
_________________________________________________________________________
Chose the application(s) where UDP protocol can be used?
Select one or more:
a.
b.
c.
d.
Web
DNS
Audio stream
Video stream
_________________________________________________________________________
Which three features allow TCP to reliably and accurately track the transmission of data from
source to destination?
Select one:
a.
b.
c.
d.
_________________________________________________________________________
What is the purpose of checksum code in UDP segment header?
Select one:
a.
b.
c.
d.
_________________________________________________________________________
What is purpose of port in IP address?
Select one:
a.
b.
c.
d.
_________________________________________________________________________
Multiplexing is capability of Transport Layer to -------------Select one:
a.
b.
c.
d.
_________________________________________________________________________
What are main different aspects between Transport Layer and Network Layer?
Select one:
a.
b.
c.
d.
Physical communication
Logical communication
Target objects in communication
Destination host in communication
_________________________________________________________________________
How many basic protocols supported by Transport Layer?
Select one:
a.
b.
c.
d.
1
3
4
2
_________________________________________________________________________
Which statement is correct about protocols in Transport Layer?
Select one:
a.
b.
c.
d.
_________________________________________________________________________
Host A and B are communicating over a TCP connection, host A sends to host B the first
segment with size 105 bytes, sequence number 600, the source port 1028, the destination
port 80. What is the ACK number, the source port number, the destination port number in the
ACK segment sent by host B to host A?
Select one:
a.
b.
c.
d.
_________________________________________________________________________
What is a disadvantage of using a connection-oriented protocol such as TCP ?
Select one:
a. Packet acknowledgement may add overhead.
b. The application layer must assume responsibility for correct sequencing of the data
packets.
c. Loss or duplication of data packets is more likely to occur.
d. All of the others
_________________________________________________________________________
In Congestion avoidance of TCP flow control, if timeout occurs while the current congestion
window size is 16, the congestion window will -----------Select one:
a.
b.
c.
d.
Reduce to 1
Reduce to 8
Reduce to 0
Remain 16
_________________________________________________________________________
In Reliable Data Transfer 3.0, given 1 Gbps link, 15 ms prop, delay, 16000 bit packet,
calculate Usender
Select one:
a.
b.
c.
d.
0.0027
0.0053
0.00027
0.00533
_________________________________________________________________________
Quiz 04 CN
Which one is NOT an IP address ?
Select one:
a.
b.
c.
d.
235.222.1.1
30.80.80.80
54.258.255.1
90.190.200.0
_________________________________________________________________________
How big is an IPv6 Internet address?
Select one:
a.
b.
c.
d.
e.
20 octets
32 bytes
128 bytes
128 bits
32 bits
_________________________________________________________________________
What information in IP header is used to route packet in router?
Select one:
a.
b.
c.
d.
_________________________________________________________________________
A ----------- routing table is updated periodically using one of the adaptive routing protocols.
Select one:
a.
b.
c.
d.
Hierarchical
Static
Dynamic
Deterministic
_________________________________________________________________________
Which statement is correct about router?
Select one:
a.
b.
c.
d.
_________________________________________________________________________
In IP Header, HL field value of decimal 10 means ----------.
Select one:
a.
b.
c.
d.
e.
_________________________________________________________________________
What does the time-to-live field (8 bits) do in an IP header?
Select one:
a.
b.
c.
d.
e.
_________________________________________________________________________
When you use the ping command to send ICMP message across a network, whats the
request / reply pair you will see?
Select one:
a.
b.
c.
d.
_________________________________________________________________________
If the fragment offset has a value of 100 and fragment flag=0, it means that -------.
Select one:
a.
b.
c.
d.
e.
_________________________________________________________________________
Which of the following is a private IP address?
Select one:
a.
b.
c.
d.
e.
12.0.0.1
172.20.14.36
168.172.19.39
190.168.0.2
172.33.194.30
_________________________________________________________________________