Operating System Set 5 (30 mcqs)

1) What is preferred way of encryption ?
a) pre shared secret key
b) Using key distribution center (KDC)
c) public key-encryption
d) symmetric key

2) What is not a role of encryption ?
a) It is used to protect data from unauthorized access during transmission
b) It is used to ensure user authentication
c) It is used to ensure data integrity
d) It is used to ensure data corruption doesn’t happens

3) What is cipher-block chaining ?
a) Data is logically ‘ANDed’ with previous block
b) Data is logically ‘ORed’ with previous block
c) Data is logically ‘XORed’ with previous block
d) none of the mentioned

4) What is not an encryption standard ?
a) AES
b) TES
c) Triple DES
d) DES

5) Which of following is not a stream cipher?
a) twofish
b) RC5
c) RC4
d) TBONE

6) What is a Hash Function ?
a) It creates a small flexible block of data
b) It creates a small,fixed block of data
c) It creates a encrypted block of data
d) none of the mentioned

7) MD5 produces __ bits hash data ?
a) 128
b) 150
c) 160
d) 112

8) SHA-1 produces __ bit of hash ?
a) 128
b) 160
c) 150
d) 112

9) Which two of the following are authentication algorithms ?
a) MAC
b) AES
c) DES
d) Digital-signature

10) What is role of Key Distribution Center ?
a) It is used to distribute keys to everyone in world
b) It intended to reduce the risks inherent in exchanging keys
c) a and b both
d) none of the mentioned

11. A multimedia file
a) is same as any other regular file
b) must be accessed at specific rate
c) stored on remote server can not be delivered to its client
d) none of the mentioned

12. In which type of streaming multimedia file is delivered to the client, but not shared?
a) real-time streaming
b) progressive download
c) compression
d) none of the mentioned

13. Which one of the following is the characteristic of a multimedia system?
a) high storage
b) high data rates
c) both (a) and (b)
d) none of the mentioned

14. The delay that occur during the playback of a stream is called
a) stream delay
b) playback delay
c) jitter
d) event delay

15. Which algorithm can be optimized to meet the timing deadlines and rate requirements of continuous media?
a) Earliest-Deadline-First scheduling
b) SCAN-EDF scheduling
c) both (a) and (b)
d) none of the mentioned

16. Real time streaming protocol is used
a) to control streaming media servers
b) for establishing and controlling media sessions between endpoints
c) to provide real time control of playback of media files from the server
d) all of the mentioned

17. In teardown state of real time streaming protocol
a) the server resources for client
b) server delivers the stream to client
c) server suspends delivery of stream
d) server breaks down the connection

18. CineBlitz multimedia server supports
a) real time clients
b) non-real time clients
c) both (a) and (b)
d) none of the mentioned

19. Multimedia system require hard real time scheduling
a) to ensure critical tasks will be serviced within timing deadlines
b) to deliver the media file to the client
c) to minimize the delay
d) for security

20. Which one of the following resource is not necessarily required on a file server?
a) secondary storage
b) processor
c) network
b) monitor

21. Which one of the following is not a secondary storage?
a) magnetic disks
b) magnetic tapes
c) RAM
d) none of the mentioned

22. Which private network uses storage protocol rather than networking protocol?
a) storage area network
b) local area network
c) wide area network
d) none of the mentioned

23. The time for the disk arm to move the heads to the cylinder containing the desired sector is called
a) disk time
b) seek time
c) arm time
d) sector time

24. Which algorithm of disk scheduling selects the request with the least seek time from the current head positions?
a) SSTF scheduling
b) FCFS scheduling
c) SCAN scheduling
d) LOOK scheduling

25. Operating system is responsible for
a) disk initialization
b) booting from disk
c) bad-bock recovery
d) all of the mentioned

26. A swap space can reside in
a) separate disk partition
b) RAM
c) cache
d) none of the mentioned

27. RAID level 1 refers to
a) disk arrays with striping
b) disk mirroring
c) both (a) and (b)
d) none of the mentioned

28. When we write something on the disk, which one of the following can not happen?
a) successful completion
b) partial failure
c) total failure
d) none of the mentioned

29. During recovery from a failure
a) each pair of physical block is examined
b) specified pair of physical block is examined
c) first pair of physical block is examined
d) none of the mentioned

30. The replacement of a bad block generally is not totally automatic because
a) data in bad block can not be replaced
b) data in bad block is usually lost
c) bad block does not contain any data
d) none of the mentioned

Answers
1-c 2-d 3-c 4-b 5-d
6-b 7-a 8-b 9-a,c 10-b
11-b 12-a 13-c 14-c 15-c
16-d 17-c 18-a 19-d 20-d
21-c 22-a 23-b 24-a 25-d
26-a 27-b 28-d 29-a 30-b

Sharing is caring!

Leave a Comment

Your email address will not be published. Required fields are marked *

shares