Professional Documents
Culture Documents
A program is divided into small fixed size chunks are called as (pages)
What all ile systemcomes in the category of disk-based file system? OXFS AND HFS)
Which is the better way of partitioning the main memory in which each process is exactly the amount of memory it requires?
(VARIABLE SIZED)
In scheduling criteria the amount of time taken to execute a particular process is known ass URNAROUND)
Which component of OS is permanently stored on the chip (ROM) not on the disk drive?(FIRMWIARE
Chedk constraint can be used to enforce which integrity? (DOMAIN INTEGRITY)
Which type of program help the user to perorm a spedfic job? (APPLICATION SOFTWARE)
10 t (num>10) pint else it (num)
pint thank you. thank you
2. The priority of an incident refers to impact and urgeng
3. While doing deadlock recovery which process will considered as a victim process? interactive
4. Declare num as integer acoept num for counter =1 to num print counter +1 End for what will be the output of
the code if the input for num is 5? 23,4A5,6
6. which storage structure consisting about a information of a file? File control block
&. which type of vinus tries to avoid detection by modiftying parts of the system that could be used to detect it ?
stealth
9. in which algorithm the head from one end of the desk to the other servicing requests as it goes when it
moves
reaches the other end, however it immediately returns to the beginning of the disk, without servicing any
requests on the returm tip?{c-scan
10. compailer is a that comverts high evel code to meachine code (program
num1«=90and
num2>=100 print " n u m i > n u m 2 "
18. Int num=90,
num2 =100 if
if numi>num 2
18. Int num=90, num2 =100 if numi «=90 and num2 >=100 print "num1>num2" else print num 2> num 1 end
if numi>num 2
21. Whichofthe following is best defines the tem service ?(end withaustomer to own spedific costs and risk
2 Which of the following is true about service strategy 7all the above
23. Declatre num array of 10 elements accept values for num array int sum = 0 for counter =oto 9 sum
=Sum+numjcounter) end for sum of 10 mumbers
24. Int limit =20 for counter =0to imit Begin if (counterk5==0) print"good"good will print 5 times
25 _isa collection of database objects associated with one database user schema
26 What all le system comes under the catngories of virtul file system tmps.proc
28. Which phase of boot process fetdhes the more complexbootprogram file desk, which ot fum loads the Kema2
bootstp phase
29. When a user needs something to one bythe computer he/she give instrudionsin the form of to
computersofbare harduare
30. Which gives the rise of the concept of vitual memory&demand pagin
32 Which df the following is the international ncode of any sofbware that wil set of a malicious function wihen
specified condition are met? Logic bombs
33. Which dass of systenm software prOvides routine services funcions to other computer programs and aompute
users? System support programs
34. What are true about views ? they are logical tables, we can perform DML operations
sinavies
35.Command on windows as well as in unix and linux is used to attach sub directory to thetree at this tree
jundion Mikdir.
36. Which process or function is responcible for monitoring activities and events in the IT infrastructure?Event
adepe
essage
N 27C
36. Which process or function is responcible for monitoring activities and events in the ITinfrastructure?Event
management
40. Which anomaly leads to loss of data for rows that are not stored elsewhere deletetion anomaly
41. Which type of Trojan horse will modify or block data on a computer either it doesnt work properly or certain
fles can't be acoessed ransome
Edited
called as?2Frames
memoryis divided into small-foxed size chunks
are
1. the main
as Throughput
amount of process that complete
their execution per time unit is called
1. in sdheduling aiteria the