OS & CN Quiz
Contents Quiz 01 OS .................................. .................................................. ................................. .................................. ................................. ................................. ....................... ...... 2 Quiz 02 OS .................................. .................................................. ................................. .................................. ................................. ................................. ....................... ...... 5 Quiz 03 OS .................................. .................................................. ................................. .................................. ................................. ................................. ....................... ...... 8 Quiz 04 OS .................................. .................................................. ................................. .................................. ................................. ................................. ..................... .... 10 Quiz 05 OS .................................. .................................................. ................................. .................................. ................................. ................................. ..................... .... 15 Quiz 01 CN .................................. .................................................. ................................. .................................. ................................. ................................. ..................... .... 18 Quiz 02 CN .................................. .................................................. ................................. .................................. ................................. ................................. ..................... .... 20 Quiz 03 CN .................................. .................................................. ................................. .................................. ................................. ................................. ..................... .... 23 Quiz 04 CN .................................. .................................................. ................................. .................................. ................................. ................................. ..................... .... 27
Quiz 01 OS Which of these statements about address space are not true? Select one: a. Address space space is the abstraction abstraction that that is referenced referenced to the set of addresses addresses a process b. None of others c. Address space is decoupled from the physical memory ___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Which of these statements about files are true? Select one or more: a. b. c. d.
File is a collection of related related information information File is an abstraction of of data stored on HDD File provides provides a place to keep files or a way way of grouping grouping file together together File includes includes block block special tiles and character special files
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Which of these statements about address space are true? Select one or more: a. Address space space is the abstraction abstraction that that is referenced referenced to the set of addresses addresses a process process b. Address space space is a space contain contain the address of of variables variables c. Address space is decoupled from the physical memory ___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Server OS serves multiple users at once over a network and allow the users to share --------and ------------ resources Select one: a. b. c. d.
Hardware, firmware Hardware, software Software, firmware Firmware, hardware
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Symbian, Palm, Windows Mobile, Windows CE are --------Select one: a. b. c. d.
Handheld OS Multiprocessor Multiprocessor OS PC OS Mainframe OS
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Which of these statements about files are not true? Select one:
a. File is an abstraction of of data stored on HDD b. File provides provides a place to keep files files or a way way of grouping grouping files together together c. File contains contains correlated correlated information: information: path name, root root directory, file descriptor, descriptor, Mourited file system, special file, a pipe d. File includes includes block block special files and character special files ___________________ _________ ___________________ ___________________ ___________________ __________________ ___________________ _________________ _______ Embedded OS is located in ----------Select one: a. b. c. d.
DISK RAM BIOS ROM
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ ------------systems are used in time-critical environments where reliability reliability is key k ey and data must be processed within a strict time limit Select one: a. b. c. d.
Embedded Real-time Hybrid Interactive
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ MainframeOS offers 3 kinds of services ----------Select one: a. b. c. d.
Batch, time-sharing, time-sharing, scheduler scheduler Real-time, batch, time-sharing Real-time, time sharing, protection Transaction processing, batch, time-sharing
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ ------------------ process routine job without interactive user present Select one: a. b. c. d.
Transaction processing systems Time sharing systems Batch systems Real-time systems
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ ---------------- runs on systems that have many CPUs (multi-processors, multi-cores, multi-cores, multichips) Select one: a. Multiprocessor Multiprocessor OS
b. Embedded OS c. PC OS d. Server OS ___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Which of these statements about processes are not true? Select one or more: a. b. c. d. e.
In modern OS, only single process exists at at time Process table stores stores all the information information of processes processes Process is a program on disk Associated with with each process is its file and directory Associated with with each process process is set set of resources such as executable executable code, code, data, stack, CPU registers value, and other information needing to run a program
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Which of these statements about processes are true? Select one or more: a. A program in execution b. Process table stores stores all the information information of processes processes c. Associated with with each process process is set set of resources such as executable executable code, code, data, stack, CPU registers value, and other information needing to run a program d. A program on disk e. Associated with with each process is its file file and directory ___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ ------------- serves multiple users at once over a network and allow the users to share hardware and software resources Select one: a. b. c. d.
Mainframe OS PC OS Server OS Multiprocessor Multiprocessor OS
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Real-time system has ----------- and -------------- real-time system types Select one or more: a. b. c. d.
Paper Soft Firm Hard
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ ------------ offers 3 kinds of services: batch, transaction processing, processing, timesharing Select one:
a. b. c. d.
PC OS Mainframe OS Server OS Multiprocessor Multiprocessor OS
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Allow multiple multiple remote users to run jobs on the computer computer at once Select one: a. b. c. d.
Real-time systems Batch systems Time sharing systems Transaction processing systems
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Handling large numbers of small requests Select one: a. b. c. d.
Real-time systems Time sharing systems Batch systems Transaction processing systems
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ ---------- supports with dozens of programs started up at the boot time Select one: a. b. c. d.
Multi-scheduling Multi-processor Multi-core Multi-programming
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______
Quiz 02 OS How much time is reasonable for the quantum in Round-Robin algorithm ? Select one: a. b. c. d.
46 msec 16 msec 64 msec 128 msec
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Which statement is correct? Select one: a. Process and thread are similar b. A thread can create many processes
c. A process can create create many threads d. A process can only own a thread ___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ In which situation does race condition occur? Select one: a. b. c. d.
Two threads threads in a process process update update their stacks Two threads in a process modify a global variable Two processes communicate using socket A parent parent process process creates a child child process process
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ In a batch system, scheduling by SJF is provably better than FCFS if ------------Select one: a. b. c. d.
Process requests requests come simultaneously simultaneously and Turnaround Turnaround time is longer Process requests requests come simultaneously simultaneously and Turnaround Turnaround time is shorter Process requests requests come consequently and Turnaround Turnaround time is shorter Process requests requests come consequently and Turnaround Turnaround time is is longer
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ If a process finishes a time interval with CPU, its state switches -----------Select one: a. b. c. d.
From blocked to ready From running to blocked From running to ready From ready to running
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Two or more processes accessing accessing to a shared memory is an example of ----------Select one: a. b. c. d.
Mutual exclusion Interprocess communication communication Race condition Critical region
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Which system requires pre-emptive scheduling algorithm? Select one: a. b. c. d.
Interactive systems Quantum systems All of the others Batch systems
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______
What happen if 2 processes have same priority in the Priority scheduling scheduling algorithm? Select one: a. Serve the process process that has has shorter burst burst time first, let let the process that has longer longer burst time wait b. None of the others c. Use Priority-inheritance Priority-inheritance solution. d. Serve the process process that comes comes first, let the process that that comes later later wait ___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Which event cannot cause process creation? Select one: a. b. c. d.
A running running process process creates creates a set of threads A running running process performs a process creation creation system system call An operating system initializes a service service A user executes a program
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Which event causes process involuntary termination? termination? Select one: a. b. c. d.
Error exit Fatal error Fatal exit Kill exit
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Which statement is correct? Select one: a. b. c. d.
Shortest process process next next is advantageous for long jobs Round-robin with high quantum is advantageous for long jobs Shortest job first is advantageous advantageous for long long jobs First come first serve is advantageous advantageous for short jobs
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Which of the following is the benefit of thread? Select one: a. b. c. d.
Synchronization All of the others Dependence Resource sharing
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ All threads in a process process share Select one:
a. b. c. d.
Address space Register Program counter Stack
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Choose the correct solution(s) for the process synchronization synchronization problems Select one: a. b. c. d.
Busy waiting Semaphore Sleep and Wakeup All of the others
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______
Quiz 03 OS Memory compaction is a mechanism to ---------Select one: a. b. c. d.
Increase virtual memory size Reduce memory fragmentation fragmenta tion Load a page into memory due to page fault Replace a page by another page for a process
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ A page table entry entry does not provide provide information about -----------Select one: a. b. c. d.
What page frame number is What page size is Whether a page is modified or not Whether a page is present in memory or not
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ How many linear address spaces does paging provide? Select one: a. b. c. d.
Maximum RAM space Unlimited 1024 1
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ What happen if there is no memory abstraction? Select one: a. Only one one program program can write to the memory memory b. A program program can prevent others to access memory
c. Program‟s physical memory could be accessed by others d. Only one program can read the memory while others can write write ___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ What is the problem of swapping memory? Select one: a. b. c. d.
All of the others Difficult to know where to allocate allocate a program Difficult to know how to monitor a memory hole Difficult to know know how much memory should be be allocated for a program program
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ In a swapping system, memory consists of the following block sizes in memory order: 12KB, 20 KB, 7KB, 9KB, 5KB, and 11KB. W hich block is taken for a request of 10KB using the best fit algorithm? Select one: a. b. c. d.
20KB 12KB 9KB 11KB
___________________ _________ ___________________ ___________________ ____________________ ___________________ __________________ ________________ _______ Global page replacement policy -------------Select one: a. b. c. d.
Uses the first-in-first-out first-in-first-out page for replacement replacement Uses a page belonging to the same process for replacement Uses the least recently recently used used page page for replacement replacement Uses a page belonging to another process for replacement
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Which statement is incorrect for a page? Select one: a. b. c. d.
A page can be relocated to a different chunk of physical physical address during operation A page is mapped to a contiguous chunk of physical address A page is a contiguous chunk of virtual address A page can get various sizes in an operating system
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ The replacement policy replaces the page that has not been referenced for the longest time Select one: a. b. c. d.
Least recently used (LRU) policy Clock policy Optimal policy First in first out out (FIFO) policy
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Which technique requires the programmer to be aware that it is being used? Select one: a. b. c. d.
Not Recently Used Least Recently Used Pure Segmentation Segmentation Paging
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ What is the best fit to allocate free memory to programs? Select one: a. b. c. d.
Search entire entire list, find the hole close close to the actual size Search entire entire list, finds the hole has the largest largest size None of the others Search entire entire list, finds the hole match match with the actual size
___________________ _________ ____________________ ___________________ __________________ ___________________ ___________________ ________________ _______ Using virtual memory allows ------------Select one: a. b. c. d.
Fewer programs to be executed at the same time time More programs to be executed at the same time time More complex complex programs programs to be be executed executed at the same time Smaller programs programs to be executed executed at the same time
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ The worst fit algorithm allocates memory to a request by ------------------------------------Select one: a. Choosing the first available available memory block block that is large enough from the location of the last placement b. Choosing the largest available memory block c. Choosing the memory block that that is closest closest in size size to the request request d. Choosing the first available available memory block block that is large enough enough from the beginning beginning of the memory ___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______
Quiz 04 OS The 775 mode of a file in UNIX indicates ------------------------------Select one: a. This file has read and execute execute permissions permissions for all users users b. This file has has read permissions permissions for all all users, execute execute permissions permissions for group group owner, owner, and write permission for file owner c. This file has has read, write write and execute execute permissions permissions for file owner only only
d. This file has read and execute permissions permissions for all all users and write write permission permission for file owner ___________________ _________ ___________________ ___________________ ___________________ __________________ ___________________ _________________ _______ Calls to modify file content based on file descriptor such as read() or write() on Unix are referred to as --------------------Select one: a. b. c. d.
Function calls Procedure calls System calls User calls
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ A --------------- is created created when a user user opens an account account to access the computer computer system. Select one: a. b. c. d.
Directory Volume MFD Subdirectory
___________________ _________ ___________________ ___________________ ____________________ ___________________ __________________ ________________ _______ Allocating a single single set of blocks blocks with the first block block and length to a file at the time of creating creating is referred to as -------------Select one: a. b. c. d.
i-node allocation contiguous allocation link list allocation chained allocation
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Step 01. MBR locates the active partition, reads in its boot block and executes it Step 02. The computer is booted, the BIOS reads in and executes the MBR Step 03. The program in boot block loads the OS contained in that partition Mechanism of booted computer is Select one: a. b. c. d.
2, 3, 1 None of others 1, 2, 3 3, 2, 1
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ A symbolic link link in a file system on Unix is --------------------------------Select one:
a. b. c. d.
A A A A
file copied copied to appear in in more than one directory directory directory to store store special special files name created to point to a file naming another file file file created created to provide a backup of another file
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ The purpose of an extension is to -----------Select one: a. b. c. d.
Identify the type of file Identify the file size Identify the file owner Identify the directory in which which the file is stored
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ ------------- allocation allows allows files to t o use any storage st orage space available available on the t he disk. Select one: a. b. c. d.
Add-on storage Noncontiguous storage Contiguous storage Fragmented storage
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ The File Manager is in charge of the system‟s ------------- components. components. Select one: a. b. c. d.
Electronic Physical Data Software
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ File descriptor of the standard error by default is an integer value --------------Select one: a. b. c. d.
2 3 1 0
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Which one is not file structure? Select one: a. b. c. d.
Sequence of bytes Sequence of records Tree structure Star structure
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ When using random access files, the program used to store the data follows a set of instructions, called a ------------- algorithm, that transforms each key into a number, the record‟s logical address. Select one: a. b. c. d.
Lookup Grouping Translation Hashing
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ The file‟s type includes ------------Select one: a. b. c. d.
Regular, Directories, Character Special Regular, Binary, Character Special, CD-ROM Regular, Directories, Character Special, Block Special Regular, Directories, Directories , Character Special, Device Driver
___________________ _________ ___________________ ___________________ ___________________ __________________ ___________________ _________________ _______ Which of these statements about the Linked List Allocation are true? Select one or more: a. First word of each block is used as pointer to the next one and the rest of of the block is for data b. The amount of data storage in a block is not a power of two because the pointer takes up a few bytes c. Random access is extremely slow d. Internal and External External fragmentation are generated ___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ The „1^(st)‟ block in each partition is called ---------Select one: a. b. c. d.
Super block MBR Boot block Free block
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ The requirements for long-term information storage are -------------Select one or more: a. b. c. d.
Multiple processes must must be able to access the information information concurrently concurrently The information information must be survived the termination of of process using using it All of others It must be possible to store a very large amount amount of address address
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ ----------- are special files with listings of filenames and their attributes. Select one: a. b. c. d.
Programs Databases Directories Data files
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ The file system‟s function are ------------Select one or more: a. b. c. d.
Mapping files onto address space Hiding the complexity of storage hardware devices None of others Providing the users users a uniform logical logical view of the information stored on these devices devices
___________________ _________ ___________________ ___________________ ___________________ __________________ ___________________ _________________ _______ System calls for managing directories directories exclude ---------Select one: a. b. c. d.
Opendir Link Seed Unlink
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ A UNIX or Linux system system might identify a file as: /usr/imfst/flynn/inventory.doc. /usr/imfst/flynn/inventory.doc. What represents the root directory is ------------. - -----------. Select one: a. b. c. d.
usr / flynn imfst
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ The file‟s structure includes ------------Select one: a. b. c. d.
unstructured sequence of unstructured sequence of unstructured sequence of unstructured sequence of
bytes, binary sequence, tree bytes, bytes, text, tree bytes, bytes, random, tree bytes, record sequence, tree
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______
As long as users refer refer to files in the ------------------------- directory, they can access their their files without entering the complete name from the highest level to the lowest. Select one: a. b. c. d.
home working default root
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ On magnetic disks, files can be organized in one of three ways; ------------Select one a. b. c. d.
sequential, direct, or indexed sequential indexed direct, indexed indexed indirect, or random random sequential, random, or indirect sequential, indirect, or direct
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ ---------- are having one directory containing all files Select one: a. b. c. d.
Mono-Level Mono-Level Directory Systems Multi-Level Directory Systems Single-Level Directory Systems Hierarchical Directory Systems
Quiz 05 OS The controller‟s job to convert the t he --------- into a block of bytes and perform any ---------necessary Select one: a. b. c. d.
Error correction / serial serial bit stream stream Serial byte stream / interrupt Interrupt / serial byte stream Serial bit stream / error correction
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Without DMA, the ----------- is responsible for the physical movement of data between main memory and the device. Select one: a. b. c. d.
CPU Memory controller Bus Disk
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ I / O devices are ------------
Select one: a. b. c. d.
Video card, card, compact flash card, Ethernet card, card, wireless wireless card SATA disk disk drive, drive, mainboard, mainboard, SCSI disk, disk, modem CD-ROM, USB, monitor, scanner Keyboard, mouse, printer, RAM memory
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Which statement is incorrect for device driver? Select one: a. Device driver driver normally normally operates as as a part of of the operating operating system kernel b. Device driver is device control control register register and device data data buffer c. Device driver is generally written by the device‟s manufacturer and delivered along with the device d. Device driver driver is some device-specific device-specific code for controlling a device ___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ A disk queue with with requests for I/O blocks blocks on cylinders cylinders in orders: 10, 22, 22, 20, 2, 40, 6, 38. Assume that the disk disk head is initially initially at cylinder cylinder 18 and the head move move downward. downward. How many cylinders does Total head movement move when the elevator algorithms are used? Select one: a. b. c. d.
62 54 144 60
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Of the three components of access time in a movable-head Disk Arm Scheduling Algorithms, ------------ is the longest. Select one: a. b. c. d.
Delay time Search time Seek time Transfer time
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ ------------- control the transfer of information between the disk drives and the rest of the computer system. Select one: a. b. c. d.
System controllers Disk drive controllers Disk drive interfaces System interfaces
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ I/O software is typically organized in four layers as following
Select one: a. Program counter handlers, device drivers, device-independent operating system software, user-level I/O software b. Interrupt handlers, handlers, system-level system-level I/O software, software, device-independent device-independent operating operating system software, user-level I/O software c. Interrupt handlers, handlers, device device drivers, drivers, device-independe device-independent nt operating operating system software, user-level I/O software d. Interrupt handlers, handlers, device device drivers, device-indepe device-independent ndent operating operating system software, software, system-level I/O software ___________________ _________ ___________________ ___________________ ___________________ __________________ ___________________ _________________ _______ ------------ devices are assigned to only one job at a time. Select one: a. b. c. d.
Static Dedicated Shared Virtual
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Which one is not a property of a precise interrupt? Select one: a. b. c. d.
No instruction beyond the one pointed to by the PC has been executed The execution execution state of the the instruction pointed to by the PC is known All instructions before the one pointed to by the PC have partially executed The PC (Program Counter) is saved in a known place
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Which DVD format provides the largest storage capacity? Select one: a. b. c. d.
Dual-layer, single-sided single-s ided Single-layer, Single-layer , single-sided Single-layer, Single-layer , double-sided Dual-layer, double-sided
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Mapping all the control registers into the memory space allows ------------Select one: a. b. c. d.
The CPU to communicate with the control register and the device data buffers Processes to communicate communicate with their threads threads Processes to communicate with other processes The CPU to communicate with the RAM memory and processes
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______
Quiz 01 CN Which of the following can not a host ? Select one: a. b. c. d.
PDA Computer Router Smartphone
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Which layer interprets the meaning of data? Select one: a. b. c. d.
Presentation Session Data link Transport
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Which method is not about switching? Select one: a. b. c. d.
Frequency Division Multiplexing Packet Switching Transmission Rate Time Division Multiplexing
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ What statement is incorrect about protocols? Select one: a. b. c. d.
Protocols define define order of of messages messages in network All communication communicat ion activity in network governed by protocols Protocols define format of of messages messages in in network network Protocols define communication between a human to another human
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ What is the reason that UDP is best effort data delivery protocol? protocol? Select one: a. b. c. d.
UDP try to send packets as fast as it can UDP does not setup the connection before sending messages All of the others UDP sends packets without checking whether whether the packets arrives to the receiver or not
___________________ _________ ___________________ ___________________ ___________________ ___________________ ____________________ ________________ ______ Two main elements related to network-core functions are
Select one: a. b. c. d.
Forwarding table and queueing algorithm Output link link algorithm algorithm and forwarding algorithm Routing algorithm and forwarding table Routing algorithm and queueing algorithm
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Store and forward technique that entire packet must arrive at router before it can be transmitted on next link exists in Select one: a. b. c. d.
Circuit switching None of circuit switching and package package switching switching Both of circuit switching and package switching Package switching
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ The fourth layer in OSI network model is ---------Select one: a. b. c. d.
Transport Application Network Session
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ In the transmission delay calculation t = L/R, what is R? Select one: a. b. c. d.
Link bandwidth of the link Time to process at router Speed of switching Propagation speed in medium
___________________ _________ ___________________ ___________________ ___________________ __________________ ___________________ _________________ _______ The data that the t he Network layer processes is called --------Select one: a. b. c. d.
Segment Frame Message Datagram
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ What is maximum data rate for fiber cable? Select one: a. 100Gbps
b. 10Gbps c. 100Mbps d. 1Gbps ___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Sources of packet delay does not include Select one: a. b. c. d.
Processing time at node Waiting time on loss Propagation time on medium Waiting time in buffer
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ In OSI model, as data packet moves from the lower to t he upper layer header are --------Select one: a. b. c. d.
Added Modified Removed Rearranged
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Network protocols define Select one: a. b. c. d.
Connection configuration and message message order between between network network entities Routing information informatio n and algorithm in networks Message format and action taken taken on message transmission Communication Communication link link configuration configuration and packet forwarding
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Packet loss and delay are usually caused by Select one: a. b. c. d.
Low packet packet arrival arrival rate and and small output link link capacity capacity High packet arrival rate and and large output link capacity Low packet arrival arrival rate and large large output output link link capacity capacity High packet arrival rate and and small output link capacity
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______
Quiz 02 CN ------------ is a protocol to transfer file to / from remote host using client / server model. Select one: a. FTP b. HTTP c. SSH
d. Telnet ___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ ------------- is a protocol to deliver / store email to / on receiver‟s server. Select one: a. b. c. d.
SMTP IMAP HTTP POP3
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ What is the characteristic of a network application? Select one: a. b. c. d.
Connect routers to end systems. Run on routers. Help routers find end systems. Run on end systems.
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ ------------ is an HTTP method that allows users to upload input data to server. Select one: a. b. c. d.
DOWNLOAD method POST method SHOW method GET method
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Which of the following is hybrid of client-server and P2P? Select one: a. b. c. d. e.
Skype EBay DNS BitTorrent Telnet
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ A DNS query resolution resolution mechanism mechanism that repeatedly repeatedly sends a query to different different servers is referred to as -----------Select one: a. b. c. d.
Semantic query resolution Iterated query resolution Keyword query resolution Recursive query resolution
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Which statement is incorrect about peer-to-peer (P2P) networks? Select one: a. b. c. d.
Peers directly connect to all other peers in a P2P network Peers can join and leave a P2P network network arbitrarily File distribution distribution on a P2P network network is faster than than on a client-server client-server network network Peers can play roles of server and client in a P2P network
___________________ _________ ___________________ ___________________ ___________________ __________________ ___________________ _________________ _______ How does the HTTP protocol implement caching? caching? Select one: a. b. c. d. e.
Using proxy server Using cookie Using hidden input Using client cache Using the If-modified-since If-modified-since header
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ What can be used to identify the process? Select one: a. Both IP address address of the host host running the process and the port port associated with that process. b. Process ID assigned by server c. Name of the application running on the host d. Port associated with that process ___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ What is the protocol used to obtain email from / to an email server? Select one: a. b. c. d.
IMAP SNMP SMTP IGMP
___________________ _________ ___________________ ___________________ ___________________ __________________ ___________________ _________________ _______ The ---------------- that together implement the DNS distributed database, store -----------------for the hostname to IP address mappings. Select one: a. b. c. d. e.
Root servers ------------ IP address Root servers servers ----------------------- IP address and post post number number Authoritative servers ------------ Entries Name servers --------- Resource Records Resource Records ------------- Name servers
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Assume the RTT 200ms, 200ms, the transmission transmission time of a Web object object 10ms, how long does it take take to download that object from a Web server to a client if using non-persistent non-persistent HTTP? Select one: a. b. c. d. e.
210ms 240ms 420ms 410ms 220ms
___________________ _________ ___________________ ___________________ ____________________ ___________________ __________________ ________________ _______ For what is a Telnet client used? Select one: a. b. c. d.
To see the endpoints endpoints of your your sessions sessions To see your IP address address and configuration details To see the route an IP packet packet takes across multiple multiple routers routers To issue commands to a remote server
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ The client-server model significantly relies on -------------- infrastructure servers, the Peer-toPeer model, instead, pairs of interminably connected peers, communicates ------------ with each other Select one: a. b. c. d.
Usually-off ----------- directly Always-off ----------- indirectly Always-on ----------- directly Usually-on ----------- directly
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ What happen when you can connect to the FTP server by typing “telnet 112.158.25.4.21” but you can not connect to the same FTP server by typing “telnet ftp.example.com 21”? Select one: a. b. c. d.
No DNS configuration ADSL connection connecti on has problem All of the others. Server is shutdown
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Assume a website website has only 5 different different small images, images, using persistent persistent HTTP, a client needs needs --------- to be server Select one: a. 4 UDP connections b. A single TCP connection c. Multiple TCP connections
d. 4 TCP connections connections ___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Which two protocols are used to control the transfer of web resources from a web server to a client browser? Select one: a. b. c. d.
FTP, HTTP ASP, HTML HTTP, HTTPS HTML, HTTP
Quiz 03 CN RDT can be applicable with supporting of --------Select one: a. b. c. d.
UDP GBN FSM TCP
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ ------------ applications typically use ----------Select one: a. b. c. d.
Elastic ------ DNS Loss-tolerant ------- UDP Loss-tolerant ------- TCP Elastic ------- HTTP
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Chose the application(s) where UDP protocol can be used? Select one or more: a. b. c. d.
Web DNS Audio stream Video stream
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Which three features allow TCP to reliably and accurately track the transmission of data from source to destination? Select one: a. b. c. d.
Encapsulation, Encapsulation, session session establishment, establishment, best best effort effort delivery delivery None of the others Flow control, session establishment, establishme nt, numbering and sequencing Encapsulation, Encapsulation, flow control, connectionless connectionless services services
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ What is the purpose of checksum code in UDP segment header? Select one: a. b. c. d.
To verify error in protocol‟s segment To verify error in header To verify error in datagram To verify verify error in IP address address
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ What is purpose of port in IP address? Select one: a. b. c. d.
To determine what is destination process socket at destination host To determine what channel is used at destination host To know what memory is used at destination host To determine what cable is used at destination host
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Multiplexing Multiplexing is capability of Transport Layer to -------------Select one: a. b. c. d.
Forward socket‟s packages through Handle one socket‟s package to send Handle multiple socket‟s packages to send Split socket‟s packages to send
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ What are main different aspects between Transport Layer and Network Layer? Select one: a. b. c. d.
Physical communication Logical communication Target objects in communication communication Destination Destinati on host in communication communicati on
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ How many basic protocols supported by Transport Layer? Select one: a. b. c. d.
1 3 4 2
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Which statement is correct about protocols in Transport Layer? Select one:
a. b. c. d.
UCP is connectionless connectionless transport transport protocol TCP is is connectionless connectionless transport transport protocol TCP is connection-oriented connection-oriented transport protocol UCP is connection-oriented connection-oriented transport protocol
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Host A and B are communicating over a TCP connection, host A sends to host B t he first segment with size 105 bytes, sequence number 600, the source port 1028, the destination port 80. What is the ACK number, the source port number, the destination port number in the ACK segment sent sent by host B to host A? Select one: a. b. c. d.
ACK ACK ACK ACK
number: number: 700, source port: port: 80, destination destination port: 1028 number: number: 705, source port: port: 80, destination destination port: port: 1028 number: number: 705, 705, source source port: 1028, destination destination port: 80 number: number: 706, source port: port: 1028, destination destination port: 80
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ What is a disadvantage of using a connection-oriented protocol such as TCP ? Select one: a. Packet acknowledgement may add overhead. b. The application layer must assume responsibility for correct sequencing of the data packets. c. Loss or duplication of data packets is more likely likely to occur. occur. d. All of the others ___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ In Congestion avoidance of TCP flow control, if timeout occurs while the current congestion window size is 16, t he congestion window will -----------Select one: a. b. c. d.
Reduce Reduce Reduce Remain
to 1 to 8 to 0 16
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ In Reliable Data Transfer 3.0, given 1 Gbps link, 15 ms prop, delay, 16000 bit packet, calculate Usender Select one: a. b. c. d.
0.0027 0.0053 0.00027 0.00533
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______
Quiz 04 CN Which one is NOT an IP address ? Select one: a. b. c. d.
235.222.1.1 30.80.80.80 54.258.255.1 90.190.200.0
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ How “big” is an IPv6 Internet address? Select one: a. b. c. d. e.
20 octets 32 bytes 128 bytes 128 bits 32 bits
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ What information in IP header is used to route packet in router? Select one: a. b. c. d.
Destination Address field Destination Destinati on Address and Source Address fields Destination Address, Source Address, and Protocol f ields Source Address field
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ A ----------- routing routing table is updated periodically periodically using one of of the adaptive routing routing protocols. Select one: a. b. c. d.
Hierarchical Static Dynamic Deterministic
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Which statement is correct about router? Select one: a. b. c. d.
All interfaces have the same same IP address. address. Interfaces does does not not have IP addresses addresses at at all. Each interface to have have a routing table. Each interface to have an unique IP address.
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ In IP Header, HL field value of decimal 10 means ----------.
Select one: a. b. c. d. e.
There are 10 10 bytes bytes in the header. header. None of the above. There are 40 bytes of options. There are 40 bytes in the header. There are 10 bytes of options. options.
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ What does the “time-to“time-to-live” live” field (8 bits) do in an IP header? Select one: a. b. c. d. e.
Sets frame priority Prevents infinite looping Records the transmission transmission time for tracert tracert functions functions Error checking Frame sequence numbering
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ When you use the ping command to send ICMP message across a network, what‟s the request / reply pair you will see? Select one: a. b. c. d.
SYN request and ACK reply Echo off and Echo on ICMP hold and ICMP send Echo request and Echo reply
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ If the fragment offset has a value of 100 and fragment flag=0, it means that -------. Select one: a. b. c. d. e.
None of the above. The datagram has not been fragmented. fragment ed. The datagram is 100 100 bytes in size. This is the last fragment. The first byte of of the datagram is byte byte 100.
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______ Which of the following is a private IP address? Select one: a. b. c. d. e.
12.0.0.1 172.20.14.36 168.172.19.39 190.168.0.2 172.33.194.30
___________________ _________ ___________________ ___________________ ___________________ ___________________ ___________________ ________________ _______