You are on page 1of 4

3:39 PM Edited

A program is divided into small fixed size chunks are called as (pages)

What all ile systemcomes in the category of disk-based file system? OXFS AND HFS)

Which is the better way of partitioning the main memory in which each process is exactly the amount of memory it requires?
(VARIABLE SIZED)

Identily the symbols used for input/output in flowcharts (Parallelogram)

In scheduling criteria the amount of time taken to execute a particular process is known ass URNAROUND)
Which component of OS is permanently stored on the chip (ROM) not on the disk drive?(FIRMWIARE
Chedk constraint can be used to enforce which integrity? (DOMAIN INTEGRITY)

isa colledtion of same type of date? (ARRAY)

Which type of program help the user to perorm a spedfic job? (APPLICATION SOFTWARE)
10 t (num>10) pint else it (num)
pint thank you. thank you
2. The priority of an incident refers to impact and urgeng
3. While doing deadlock recovery which process will considered as a victim process? interactive

4. Declare num as integer acoept num for counter =1 to num print counter +1 End for what will be the output of
the code if the input for num is 5? 23,4A5,6

5. What is not a kind of interface design? A OR B not sure(Shell sripting

6. which storage structure consisting about a information of a file? File control block

7.new application development is an example of type of project development

&. which type of vinus tries to avoid detection by modiftying parts of the system that could be used to detect it ?
stealth

9. in which algorithm the head from one end of the desk to the other servicing requests as it goes when it
moves
reaches the other end, however it immediately returns to the beginning of the disk, without servicing any
requests on the returm tip?{c-scan

10. compailer is a that comverts high evel code to meachine code (program

11. named ram location is called as variable

has scored 132 runs, identify the program construct used


to identify
12. team A has scored 130 runs and team B
which team has won the match decision

and most secure computing


aims to build an os whidh provides a fast simple
13. which open project
soure
time on web chromium os
eperience for the people who mosty spend
and redability.
virtualize multiple disk drives into
one or more arrays to improve performance
14 itis a virtual way to
Whidh tedhnique should be implemented here?raid

of system calls? cpu scheduling


15. What is not the eample
for
and os which already installed on a computer
vulnerabilities of sopftware
16. What type of Trojan seelksecurity
malicious intent? Exploit

view when there is no existing base


table?force
17.Which option can be used to areate a
num 1 end
else print num 2 >

num1«=90and
num2>=100 print " n u m i > n u m 2 "
18. Int num=90,
num2 =100 if
if numi>num 2
18. Int num=90, num2 =100 if numi «=90 and num2 >=100 print "num1>num2" else print num 2> num 1 end
if numi>num 2

19. Truncate is which type of sql statement? DDL

20. Byteshort, and long are subtypes of_data type? Integer

21. Whichofthe following is best defines the tem service ?(end withaustomer to own spedific costs and risk

2 Which of the following is true about service strategy 7all the above

23. Declatre num array of 10 elements accept values for num array int sum = 0 for counter =oto 9 sum
=Sum+numjcounter) end for sum of 10 mumbers

24. Int limit =20 for counter =0to imit Begin if (counterk5==0) print"good"good will print 5 times

25 _isa collection of database objects associated with one database user schema

26 What all le system comes under the catngories of virtul file system tmps.proc

27. Atributesada goodprogram?allthe above

28. Which phase of boot process fetdhes the more complexbootprogram file desk, which ot fum loads the Kema2
bootstp phase

29. When a user needs something to one bythe computer he/she give instrudionsin the form of to
computersofbare harduare

30. Which gives the rise of the concept of vitual memory&demand pagin

31. Sofbuareis designed to operate the computer harcware?system softuare

32 Which df the following is the international ncode of any sofbware that wil set of a malicious function wihen
specified condition are met? Logic bombs

33. Which dass of systenm software prOvides routine services funcions to other computer programs and aompute
users? System support programs

34. What are true about views ? they are logical tables, we can perform DML operations
sinavies

35.Command on windows as well as in unix and linux is used to attach sub directory to thetree at this tree
jundion Mikdir.

36. Which process or function is responcible for monitoring activities and events in the IT infrastructure?Event
adepe

essage

N 27C
36. Which process or function is responcible for monitoring activities and events in the ITinfrastructure?Event
management

37. is used to scam the code line byline.interpreter

38. Which is the primary storage object in a database table

39. In which situation the process goes on to an infinite wait? When a


dead lock occurs

40. Which anomaly leads to loss of data for rows that are not stored elsewhere deletetion anomaly

41. Which type of Trojan horse will modify or block data on a computer either it doesnt work properly or certain
fles can't be acoessed ransome

42. A user has reported an intrupted in service, after the incident


record is areated the issue escalated to next level
nd level intervention to fox the issue
and the 1 st level is not able to resolve the incident, which requires the 2
permanentlywhat of escalation is this ? functional escalation
type
column
43. Which part of the table is assigned a speafic data type?

Edited

called as?2Frames
memoryis divided into small-foxed size chunks
are
1. the main

correct option that represents the


1to outer print inner print end dhoose the
1. For outer =1 to 3 begin Forinner
=

output of the code12123

to cerntra to proper memory management?Logical


1. The concept of a_ that is bound to a separate
address space and physical addres space

share commorn processing resources?Multi-tasing


1. In whidh technique multiple process

as Throughput
amount of process that complete
their execution per time unit is called
1. in sdheduling aiteria the

would destroy links between tables?Roreign key


prevents action that
single processeor.Multi-programming
of programs simontaniously by
a
1.t is a tedhnique to execute number

2 What is not a kind of interface design?Shell


saipting

integrated development environment


3.1DEis

You might also like