OS & Network & Testing

A vibrant and engaging digital illustration depicting various aspects of Operating Systems, Networking devices, and Testing environments, featuring computers, network cables, servers, and security symbols in a tech-themed background.

OS & Networking Mastery Quiz

Test your knowledge of Operating Systems, Networking, and Testing with our comprehensive quiz. This quiz is designed for individuals looking to enhance their understanding and assess their expertise in these critical areas of technology.

  • Multiple choice and checkbox questions
  • Covers a range of topics in OS and networking
  • Assess your knowledge with instant feedback
38 Questions10 MinutesCreated by AnalyzingData24
The Main Memory consists of RAM (Random Access Memory) and ROM (Read Only Memory).
True
False
All of the secondary storages used as Output devices only for permeant storage.(
True
False
Bootstrap is a framework stored in ROM contains some instructions called basic input output instructions (BIOS).
True
False
Windows server 2008 and Novell Netware are batching operating systems.
True
False
The purpose of the operating system is to ensure that it abstracts the HW and facilitates the seamless execution of users’ applications using the system.
True
False
The application itself is the responsible for accessing the memory variable storage and perform the calculations based on values in memory.
True
False
Threads help in performing parallelism within the same process.
True
False
Interrupt vector contains the addresses for all Interrupt Service Routines (ISR) for all 1/O devices that connected to the computer system.
True
False
The process which running in user-mode services would be able to access the hardware directly.
True
False
A Virtual Machine has its own guest OS, which may be the same as or different from the underlying host OS.
True
False
Which of the following are Output Devices? (Select all the correct answers)
Data Projectors
Microphone
Speaker and Headphones
Scanner (2D and 3D)
Printer (2D and 3D) — inkjet or laser
The .............. Is a program that controls the execution of other programs running on the
system. It acts as a facilitator and intermediate layer between the different software components
and the computer hardware.(
Bootstrap
Operating System
Database Management System
Embedded System
The main objectives of any operating systems are: (Select all the correct answers)(
Efficiency of the OS in terms of responsiveness, fluidity, and so on.
Ability to abstract and extend to new devices and software
Ease of usability to the user in terms of making it convenient
Control the flow of data through local networks.
The Usage type categorization of operating systems are: (Select all the correct answers)
Batch Operating Systems
Time Sharing Operating Systems
Parallel — Distributed Operating Systems
Network Operating Systems
Real Time Operating Systems
All of the above
Select the Advantages of virtualization from the following: (Select all the correct answers)
Emulate more machines than are physically available.
Run operating systems where the physical hardware is unavailable.
Run legacy systems.
Debug problems (suspend and resume the problem machine).
All of the above
Which of the following are the responsibilities of an operating systems? (Select all the correct answers)
Access and protection
File systems
Scheduling
Memory management
I/O and resource management
The types of addressing of memory in the operating systems are: (Select all the correct answers)
Logical Address
Physical Address
Controlling
None of the above.
The way of management when the two processes need to save in the shared memory at the same time, it is called ........
Compilation.
Execution.
Ynchronization.
Termination.
.When a set of processes become blocked because each process is holding a resource and waiting for another resource acquired by some other process. This is called ..........
Synchronization.
Deadlock.
Acceleration.
Process Status.
The OS needs to be able to periodically clear temporarily created files that may no longer be required for the functioning of the system. This is typically done Using a ........ On the system.
 
Garbage Collector.
Anti-Virus.
Data Collector.
None of the above.
We can find our IP address on a MS Windows based computer, by using
Control Panel\Network and Internet\Network and Sharing Center
Ipconfig Command
Ipconfig /all Command
All the above
We are using ............ Protocol to read our mails when internet connection is NOT available all the time.
Pop3
IMAP4
UDP
FIP
What is the name of the attack method that can be used to crack passwords?
DOS attack
Brute force attack
Smurf attack
Spam
To communicate with hosts on the same LAN, we must use a...........
DNS
Router
Switch
DHCP
You must have an IP address to connect to the internet, you can get your IP address (if your configuration was “obtain automatically " ) from:
Router
DHCP
DNS
Switch
What is the benefit of the Networking?
File Sharing
Easier access to Resources
Easier Backups
All of the Above
.Which of the following is not the Networking Devices?
Switch
Linux
Routers
Firewalls
.A collection of computers and devices connected together via communication devices and transmission media is called
Workgroup
Server
Mainframe
Network
Which of the following devices is dedicated to connect several computers wirelessly?
Hub
Switch
Access Point
Router
.............. Is ensuring that information is not revealed to unauthorized persons.
Confidentiality
Integrity
Security
Authorization
Which of The Following Malicious Program is Replicate Automatically?
Antivirus
Backdoor
Worm
Worm
The modern TCP/IP Protocol Suite model consists of ......... Layers?
4 layers
5 layers
6 layers
7 layers
In which class the IP address 70.70.70.70 exists?
Class A
Class B
Class C
Class D
If one site fails in distributed system then ..................
The remaining sites can continue operating
All the sites will stop working
Directly connected sites will stop working
None of the mentioned
Which testing phase tests individual software modules combined together as a group?
Module testing
Integration testing
White Box testing
Software testing
The main focus of acceptance testing is
Finding faults in the system
Ensuring that the system is acceptable to all users
Testing the system with other systems
Testing for a business perspective
Testing by an independent test team
Which is NOT true - The black box tester
Should be able to understand a functional specification or requirements document
Should be able to understand the source code
Is highly motivated to find faults
Is creative to find the system’s weaknesses
Beta testing is:
Performed by customers at their own site
Performed by customers at their software developer's site
Performed by an independent test team
Useful ta test bespoke software
Performed as early as possible in the lifecycle
{"name":"OS & Network & Testing", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge of Operating Systems, Networking, and Testing with our comprehensive quiz. This quiz is designed for individuals looking to enhance their understanding and assess their expertise in these critical areas of technology.Multiple choice and checkbox questionsCovers a range of topics in OS and networkingAssess your knowledge with instant feedback","img":"https:/images/course1.png"}
Powered by: Quiz Maker