Technical preparation

CSE MCQ

81. Viruses

82. The most common approach to authenticating a user identity is

83. Boot strap or vector is called

84. A major security problem for operating system is

85. Real-time displays

86. Global locks

87. Control-unit busy

88. A long-term process display should

89. Device busy

90. A long-term monitor

91. Link encryption

92. Seeks analysis

93. Trojan-Horse programs

94. Pre-emptive scheduling is the strategy of temporarily suspending a running process

95. In Round Robin CPU scheduling, as the time quantum is increased, the average turn around time

96. Which of the following refers to the associative memory?

97. Consider a logical address space of 8 pages of 1024 words mapped into memory of 32 frames. How many bits are there in the physical address?

98. Consider a logical address space of 8 pages of 1024 words mapped into memory of 32 frames. How many bits are there in the logical address?

99. Consider a computer with 8 Mbytes of main memory and a 128 K cache. The cache block size is 4 K. It uses a direct mapping scheme for cache management. How many different main memory blocks can map onto a given physical cache block ?

100. The first-fit, best-fit and the worst-fit algorithm can be used for