0

Windows Operating System

Description: Windows Operating System Operating Systems with Case Study of UnixOperating SystemOperating System
Number of Questions: 25
Created by:
Tags: Windows Operating System Operating Systems with Case Study of Unix Operating System
Attempted 0/25 Correct 0 Score 0

Which of the following systems is a combination of processors and special softwares that is inside another device such as the electronic ignition system in cars?

  1. Workstation system

  2. Desktop system

  3. Embedded system

  4. Mini computer system

  5. Disk operating system


Correct Option: C
Explanation:

This system is a combination of processors and special softwares that is inside another device such as the electronic ignition system in cars.

Which of the following executive subsystems translates user mode read and write commands in read or write IRPs which it passes to device drivers?

  1. I/O Manager

  2. Process manager

  3. Power manager

  4. Technical account manager

  5. vCloud director


Correct Option: A
Explanation:

This executive subsystem translates user-mode read and write commands in read or write IRPs which it passes to device drivers.

Which of the following disk storages is a striped volume that stores all its data across several disks in stripes?

  1. Simple volume

  2. Spanned volume

  3. RAID level 2

  4. RAID-0 volume

  5. RAID level 6


Correct Option: D
Explanation:

This disk storage is a striped volume, stores all its data across several disks in stripes.

In which of the following techniques, the virtual machine simulates the complete hardware, allowing an unmodified operating system for a completely different CPU to run in the virtual machine?

  1. Para virtualisation

  2. Emulation

  3. Intercrosses communication

  4. Caching

  5. Stratification


Correct Option: B
Explanation:

In this technique, the virtual machine simulates the complete hardware, allowing an unmodified operating system for a completely different CPU to be run in the virtual machine.

Which of the following security bulletins issues with a vulnerability in the part of RPC that deals with message exchange over TCP/IP?

  1. MS04-029

  2. MS00-066

  3. MS03-001

  4. Secure socket layer

  5. MS03-026


Correct Option: E
Explanation:

This security bulletin issues with a vulnerability in the part of RPC that deals with message exchange over TCP/IP.

Which of the following executive subsystems determines whether an object or resources can be accessed via the use of access control list?

  1. Process manager

  2. Power manager

  3. Application assembler

  4. Security reference monitor

  5. vCloud networking and security manager


Correct Option: D
Explanation:

This executive subsystem determines whether an object or resource can be accessed via the use of access control list.

Which of the following utilities are a group of keyboard related support for people with typing issues and tells the keyboard to ignore repeated keystrokes?

  1. FilterKeys

  2. RepeatKeys

  3. MouseKeys

  4. PaintEvent

  5. KeyEvent


Correct Option: A
Explanation:

These utilities are a group of keyboard related support for people with typing issues and tells the keyboard to ignore repeated keystrokes.

In which of the following types of disk storage, if one disk fails then the data can be totally recovered from the other disk?

  1. Simple volume

  2. Spanned volume

  3. Mirrored volume

  4. RAID level 2

  5. RAID level 6


Correct Option: C
Explanation:

In this type of disk storage, if one disk fails then the data can be totally recovered from the other disk.

In which of the following techniques, the virtual machine only partially simulates enough hardware to allow an unmodified operating system to be run in isolation?

  1. Para virtualisation

  2. Native virtualisation

  3. Caching

  4. Network virtualisation

  5. Intercrosses communication


Correct Option: B
Explanation:

In this technique, the virtual machine only partially simulates enough hardware to allow an unmodified operating system to be run in isolation.

In which of the following utilities designed to make the system more accessible, windows is told to disregard keystrokes that are not held down for a certain time period?

  1. RepeatKeys

  2. SlowKeys

  3. MouseKeys

  4. KeyEvent

  5. TextEvent


Correct Option: B
Explanation:

In this utility designed to make the system more accessible, windows is told to disregard keystrokes that are not held down for a certain time period.

Which of the following security bulletins issues the particular vulnerability, affects the RPC endpoint mapper process which listens on TCP/IP port 135?

  1. MS04-029

  2. MS00-066

  3. Secure electronic transaction

  4. MS03-001

  5. MS03-010


Correct Option: E
Explanation:

This security bulletin issues the particular vulnerability, affects the RPC endpoint mapper process which listens on TCP/IP port 135.

Which of the following systems is a group of computers that work together closely so that in many respects they can be viewed as though they are a single computer?

  1. Desktop system

  2. Workstation system

  3. Computer cluster system

  4. Mini computer system

  5. Disk operating system


Correct Option: C
Explanation:

This system is a group of computers that work together closely so that in many respects, they can be viewed as though they are a single computer.

Which of the following executive subsystems manages the communication between the environment subsystem and components of the executives?

  1. IPC manager

  2. Process manager

  3. Power manager

  4. Deployment descriptor

  5. Technical account manager


Correct Option: A
Explanation:

This executive subsystem manages the communication between the environment subsystem and the components of the executive.

Which of the following utilities are used to allow multiple keystrokes to one key, to be ignored within a certain time frame?

  1. BounceKeys

  2. RepeatKeys

  3. MouseKeys

  4. KeyEvent

  5. ActionEvent


Correct Option: A
Explanation:

These utilities are used to allow multiple keystrokes to one key, to be ignored within a certain time frame.

Which of the following security bulletins issues newly identified vulnerabilities in the part of RPCSS services that deals with RPC messages for DCOM activation?

  1. MS00-066

  2. MS04-029

  3. SSL

  4. SET

  5. MS03-039


Correct Option: E
Explanation:

This security bulletin issues newly identified vulnerabilities in the part of RPCSS services that deals with RPC messages for DCOM activation.

Which of the following utilities are designed to make the system more accessible and give Windows 2000 the ability to support speech augmentation devices?

  1. KeyEvent

  2. ActionEvent

  3. MouseKeys

  4. SerialKeys

  5. RepeatKeys


Correct Option: D
Explanation:

These utilities are designed to make the system more accessible and give Windows 2000 the ability to support speech augmentation devices.

Which of the following executive subsystems controls the paging of memory in and out of the physical memory to the disk storage?

  1. ProtectedMemory

  2. Virtual memory manager

  3. Main memory management

  4. Process manager

  5. Power manager


Correct Option: B
Explanation:

This executive subsystem controls the paging of memory in and out of physical memory to disk storage.

Which of the following modes is made up of subsystems that can pass I/O requests to the appropriate kernel mode drivers via the I/O manager?

  1. Kernel mode

  2. Transport mode

  3. Tunnel mode

  4. Shared mode

  5. User mode


Correct Option: E
Explanation:

This mode is made up of subsystems that can pass I/O requests to the appropriate kernel mode drivers via the I/O manager.

Which of the following executive subsystems is a special executive subsystem that all the other executive subsystems must pass through to gain access to Windows 2000 resources?

  1. Process manager

  2. Power manager

  3. Object manager

  4. Application assembler

  5. Technical account manager


Correct Option: C
Explanation:

This executive subsystem is a special executive subsystem that all the other executive subsystems must pass through to gain access to Windows 2000 resources.

Which of the following utilities is designed to make the system more accessible to assist the users with visual impairments with system messages?

  1. RepeatKeys

  2. Narrator

  3. MouseKeys

  4. Caching

  5. Intercrosses communication


Correct Option: B
Explanation:

This utility designed to make the system more accessible to assist the users with visuals impairments with system messages.

Which of the following executive subsystems handles plug and play and supports device detection and installation at boot time?

  1. Integral subsystem

  2. PnP manager

  3. Technical account manager

  4. Power manager

  5. Process manager


Correct Option: B
Explanation:

This executive subsystem handles plug and play and supports device detection and installation at boot time.

Which of the following executive subsystems controls the way that output is painted to the screen and handles input events?

  1. Window manager

  2. Environment subsystem

  3. Technical account manager

  4. Process manager

  5. Power manager


Correct Option: A
Explanation:

This executive subsystem controls the way that output is painted to the screen and handles input events.

Which of the following types of disk storage consists of multiple disks and uses block level striping with parity data distributed across all member disks?

  1. Spanned volume

  2. Simple volume

  3. RAID level 2

  4. RAID-5 volume

  5. RAID level 6


Correct Option: D
Explanation:

This type of disk storage consists of multiple disks and uses block level striping with parity data distributed across all member disks.

In which of the following security bulletins, several of the RPC servers associated with system services in Microsoft exchange server and SQL server do not adequately validate inputs?

  1. MS04-029

  2. MS00-066

  3. MS01-041

  4. MS003-001

  5. Secure electronic transaction


Correct Option: C
Explanation:

In this security bulletin, several of the RPC servers associated with system services in Microsoft exchange server and SQL server do not adequately validate inputs.

In which of the following utilities designed to make the system more accessible, a user can press the modifier key and release that key and then press the combination key?

  1. RepeatKeys

  2. MouseKeys

  3. StickyKeys

  4. ActionEvent

  5. KeyEvent


Correct Option: C
Explanation:

In these utilities, designed to make the system more accessible, a user can press the modifier key and release that key and then press the combination key.

- Hide questions