logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Operating Systems Concepts Comments

  • Question
  • Trojan-Horse programs


  • Options
  • A. are legitimate programs that allow unauthorized access
  • B. do not usually work
  • C. are hidden programs that do not show up on the system
  • D. usually are immediately discovered
  • E. None of the above

  • Correct Answer
  • are legitimate programs that allow unauthorized access 


  • Operating Systems Concepts problems


    Search Results


    • 1. System programs such as Compilers are designed so that they are

    • Options
    • A. reenterable
    • B. non reusable
    • C. serially usable
    • D. recursive
    • E. None of the above
    • Discuss
    • 2. A development strategy whereby the executive control modules of a system are coded and tested first, is known as

    • Options
    • A. Bottom-up development
    • B. Top-down development
    • C. Left-Right development
    • D. All of the above
    • E. None of the above
    • Discuss
    • 3. When did IBM release the first version of disk operating system DOS version 1.0?

    • Options
    • A. 1981
    • B. 1982
    • C. 1983
    • D. 1984
    • E. None of the above
    • Discuss
    • 4. The process of transferring data intended for a peripheral device into a disk (or intermediate store) so that it can be transferred to peripheral at a more convenient time or in bulk, is known as

    • Options
    • A. multiprogramming
    • B. spooling
    • C. caching
    • D. virtual programming
    • E. None of the above
    • Discuss
    • 5. The action of parsing the source program into the proper syntactic classes is known as

    • Options
    • A. syntax analysis
    • B. lexical analysis
    • C. interpretation analysis
    • D. general syntax analysis
    • E. None of the above
    • Discuss
    • 6. What is the name of the technique in which the operating system of a computer executes several programs concurrently by switching back and forth between them?

    • Options
    • A. Partitioning
    • B. Multitasking
    • C. Windowing
    • D. Paging
    • E. None of the above
    • Discuss
    • 7. In which way(s) a macro processor for assembly language can be implemented:

    • Options
    • A. independent two-pass processor
    • B. independent one-pass processor
    • C. processor incorporated into pass 1 of a standard two-pass assembler
    • D. all of the above
    • E. None of the above
    • Discuss
    • 8. Block caches or buffer caches are used

    • Options
    • A. to improve disk performance
    • B. to handle interrupts
    • C. to increase the capacity of the main memory
    • D. to speed up main memory read operation
    • E. None of the above
    • Discuss
    • 9. Operating system

    • Options
    • A. links a program with the subroutines it references
    • B. provides a layered, user-friendly interface
    • C. enables the programmer to draw a flowchart
    • D. all of the above
    • E. None of the above
    • Discuss
    • 10. What problem is solved by Dijkstra's banker's algorithm?

    • Options
    • A. mutual exclusion
    • B. deadlock recovery
    • C. deadlock avoidance
    • D. cache coherence
    • E. None of the above
    • Discuss


    Comments

    There are no comments.

Enter a new Comment