Professional Documents
Culture Documents
Answer: c
Explanation: None.
2. To differentiate the many network services a system supports ______ are used.
a) Variables
b) Sockets
c) Ports
d) Service names
View Answer
Answer: c
Explanation: None.
3. RPC provides a(an) _____ on the client side, a separate one for each remote
procedure.
a) stub
b) identifier
c) name
d) process identifier
View Answer
Answer: a
Explanation: None.
4. What is stub?
a) transmits the message to the server where the server side stub receives the
message and invokes procedure on the server side
b) packs the parameters into a form transmittable over the network
c) locates the port on the server
d) all of the mentioned
View Answer
Answer: d
Explanation: None.
Answer: c
Explanation: None.
Answer: d
Explanation: None.
Answer: b
Explanation: None.
8. A process that is based on IPC mechanism which executes on different systems and
can communicate with other processes using message based communication, is called
________
a) Local Procedure Call
b) Inter Process Communication
c) Remote Procedure Call
d) Remote Machine Invocation
View Answer
Answer: c
Explanation: None.
This set of Operating System Multiple Choice Questions & Answers (MCQs) focuses on
“Inter Process Communication”.
Answer: b
Explanation: None.
Answer: a
Explanation: None.
3. Which of the following two operations are provided by the IPC facility?
a) write & delete message
b) delete & receive message
c) send & delete message
d) receive & send message
View Answer
Answer: d
Explanation: None.
Answer: c
Explanation: None.
5. The link between two processes P and Q to send and receive messages is called
__________
a) communication link
b) message-passing link
c) synchronization link
d) all of the mentioned
View Answer
Answer: a
Explanation: None.
Answer: b
Explanation: None.
Answer: c
Explanation: None.
Answer: b
Explanation: None.
Answer: b
Explanation: None.
Answer: b
Explanation: None.
11. Bounded capacity and Unbounded capacity queues are referred to as __________
a) Programmed buffering
b) Automatic buffering
c) User defined buffering
d) No buffering
View Answer
Answer: b
Explanation: None.
This set of Operating System Multiple Choice Questions & Answers (MCQs) focuses on
“Security – Cryptography”.
Answer: c
Explanation: Pre Shared key can be compromised and either party can be suspected.
Likewise KDC or symmetric key can have breach which are undesirable. Public and
private key encryption is a known industry standard.
2. What is not a role of encryption?
a) It is used to protect data from unauthorized access during transmission
b) It is used to ensure user authentication
c) It is used to ensure data integrity
d) It is used to ensure data corruption doesn’t happens
View Answer
Answer: d
Explanation: Encryption doesn’t have error correction or detection facility thus cannot be
used to safeguard from data corruption.
Answer: c
Explanation: None.
Answer: b
Explanation: None.
Answer: d
Explanation: None.
Answer: b
Explanation: None.
Answer: a
Explanation: None.
Answer: b
Explanation: None.
Answer: a
Explanation: None.