CSE MCQ
is more secure than end-to-end encryption
is less secure than end-to-end encryption
cannot be used in a large network
is used only to detect errors
is used for analyzing paging problems
is used for analyzing device busy problems
is used for analyzing control-unit busy problems
is only shown on real-time displays
are legitimate programs that allow unauthorized access
are hacker programs that do not show up on the system
really do not usually work
usually are immediately discovered
before the CPU time slice expires
to allow starving processes to run
when it requests I/O
none of these
increases
decreases
remains constant
varies irregularly
Address of the data is generated by the CPU
Address of the data is supplied by the users.
There is no need for an address ie the data is used as an address
Data are accessed sequentially
9 bits
11 bits
13 bits
15 bits
2048
256
64
None of these
contiguous allocation of memory
linked allocation of memory
indexed allocation of memory
all of these
14 bits
16 bit
page with corrupted data
the wrong page in the memory
page that is modified after being loaded into cache memory
page that is less frequently accessed
round-robin
first-come-first-served
preemptive
random scheduling
3.0 ns
68.0 ns
68.5 ns
78.5 ns
the set of k future references that the operating system will make
the set of future references that the operating system will make in the next 'k' time units
the set of k reference with high frequency
the set of pages that have been referenced in the last k time units
meet prescribed time constraints
aim better resource sharing
aim better system utilization
aim low system overhead
CPU protection
memory protection
file protection
3
5
4
2.5 Mbits/s
4.25 Mbits/s
1.5Mbits/s
3.75Mbits/s
2.5 s
2.9 s
3.1 s
3.6 s