Unit – 1 Introduction to operating system
Unit – 2 Process Management
Unit – 3 Process Scheduling
Unit – 4 Deadlock
Unit – 5 Memory Management
Unit – 6 Files and protection
1. A file system is a system for: a) Managing files and directories (CORRECT) b) Executing programs c) Communicating with devices d) Handling user input
2. File system design considers factors such as: a) File naming conventions b) Storage allocation methods c) Access control mechanisms (CORRECT) d) All of the above
3. Sequential access allows reading or writing data one unit after another in a specific order. a) True (CORRECT) b) False
4. Direct access allows accessing any data unit (e.g., record) by directly calculating its location using its index. a) True (CORRECT) b) False
5. Swapping is the temporary transfer of data between main memory and secondary storage (e.g., hard disk) to make space for active processes. a) True (CORRECT) b) False
6. Contiguous allocation stores a file in a single, continuous block of memory. a) True (CORRECT) b) False
7. Linked allocation allocates file data into blocks scattered across the storage device, linked by pointers in each block. a) True (CORRECT) b) False
8. Indexed allocation uses an index table that maps logical file blocks to physical storage blocks. a) True (CORRECT) b) False
9. Authentication verifies the identity of a user attempting to access the system. a) True (CORRECT) b) False
10. Access control determines who can access resources and what operations they are allowed to perform. a) True (CORRECT) b) False
11. Access rights specify the specific permissions granted to users or groups for accessing resources (e.g., read, write, execute). a) True (CORRECT) b) False
12. System logs record system events, user activities, and security-related information for auditing and troubleshooting purposes. a) True (CORRECT) b) False
13. Protection mechanisms aim to safeguard resources from unauthorized access, modification, or destruction. a) True (CORRECT) b) False
14. Common security threats include unauthorized access, data breaches, malware attacks, and denial-of-service attacks. a) True (CORRECT) b) False
15. Passwords are a common authentication method, requiring users to provide a secret key or phrase for verification. a) True (CORRECT) b) False
16. Multi-factor authentication (MFA) utilizes two or more independent verification factors to enhance security. a) True (CORRECT) b) False
17. Access control lists (ACLs) explicitly define access rights for individual users or groups for specific resources. a) True (CORRECT) b) False
18. Capabilities are tokens issued to users that grant them specific rights to access resources, reducing the risk of unauthorized access. a) True (CORRECT) b) False
19. Encryption scrambles data into an unreadable format using a key, protecting confidentiality from unauthorized parties. a) True (CORRECT) b) False
20. Regularly updating software and applying security patches are essential steps in maintaining a secure system. a) True (CORRECT) b) False