Exam ITI DB
Exam ITI DB
Exam ITI DB
1. The Main Memory consists of RAM (Random Access Memory) and ROM (Read Only Memory).
(1 Point)
© True
© false
2. All of the secondary storages used as Output devices only for permeant storage.(1 Point)
©) True
@ False
3. Bootstrap is a framework stored in ROM contains some instructions called basic input output
GHEB:
instructions (BIOS).(1 Point)
@ True
O False
4. Windows server 2008 and Novell Netware are batching operating systems.(1 Point)
O True
@ False
5. The purpose of the operating system is to ensure that it abstracts the HW and facilitates the
seamless execution of users’ applications using the system.(1 Point)
© True
() False
6. The application itself is the responsible for accessing the memory variable storage and perform
the calculations based on values in memory.(1 Point)
© True
© False
8. Interrupt vector contains the addresses for all Interrupt Service Routines (ISR) for all 1/O devices
that connected to the computer system.(1 Point)
® True
C) False
9. The process which running in user-mode services would be able to access the hardware directly.
(1 Point)
Cy
©) True
@ False
10.A Virtual Machine has its own guest OS, which may be the same as or different from the
underlying host OS.(1 Point)
@ True
O False
11.1. Which of the following are Output Devices? (Select all the correct answers)(1 Point)
a. Data Projectors
O b. Microphone
TEOUNG seco sasadaossessarsesess Is a program that controls the execution of other programs running on the
system. It acts as a facilitator and intermediate layer between the different software components
and the computer hardware.(1 Point)
(_} a. Bootstrap
b. Operating System
. The main objectives of any operating systems are: (Select all the correct answers)(1 Point)
=
Ww
15. Select the Advantages of virtualization from the following: (Select all the correct answers)(1 Point)
16. Which of the following are the responsibilities of an operating systems? (Select all the correct
answers)(1 Point)
b. File systems
c. Scheduling
d. Memory management
17. The types of addressing of memory in the operating systems are: (Select all the correct answers)
(1 Point)
} a. Logical Address
b. Physical Address
} c. Controlling
18. The way of management when the two processes need to save in the shared memory at the
same time, it is called 0.0.00... 1 Point)
a. Compilation.
) b. Execution.
ake Synchronization.
(_} d. Termination.
19.When a set of processes become blocked because each process is holding a resource and waiting
for another resource acquired by some other process. This is called ......(1 Point)
(_] a. Synchronization.
b. Deadlock.
(} ¢. Acceleration.
Oj d. Process Status.
20. The OS needs to be able to periodically clear temporarily created files that may no longer be
required for the functioning of the system. This is typically done Using a ........c eee on the
system.(1 Point)
a. Garbage Collector.
(_} b. Anti-Virus.
| c. Data Collector.
22. We are using ............ protocol to read our mails when internet connection is NOT available all the
time.(1 Point)
@ a.Pop3
©) b. IMAP4
c. UDP
©) d. FIP
23. What is the name of the attack method that can be used to crack passwords?(1 Point)
) a. DOS attack
@ c. Smurf attack
©) d. Spam
24. To communicate with hosts on the same LAN, we must use a........... (1 Point)
©) a.DNS
© b. Router
©) «. Switch
© 4d. DHCP
25. You must have an IP address to connect to the internet, you can get your IP address (if your
configuration was “obtain automatically " ) from:(1 Point)
a. Router
@ b. DHCP
) «. DNS
d. Switch
C) a. File Sharing
©) c. Easier Backups
) a. Switch
@ b. Linux
©) c. Routers
C) d. Firewalls
2 .A collection of computers and devices connected together via communication devices and
oc
) a. Workgroup
©) b. Server
) ¢. Mainframe
© d. Network
a. Hub
©) b. Switch
@ «Access Point
d. Router
30. An intrusion detection system (IDS) is primarily designed to perform what function?(1 Point)
Sle cae is ensuring that information is not revealed to unauthorized persons.(1 Point)
a. Confidentiality
b. Integrity
c. Security
‘O} d. Authorization
© a. Antivirus
©) b. backdoor
@ «Worm
©) d. Zombie
33. The modern TCP/IP Protocol Suite model consists of ......... Layers?(1 Point)
) a.4 layers
@ b.5S layers
c. 6 layers
d. 7 layers
@ a.ClassA
b, Class B
cS c. Class C
d. Class D
36. Which testing phase tests individual software modules combined together as a group?(1 Point)
© a. Module testing
© b. Integration testing
©) d. Software testing
37. The main focus of acceptance testing is:(1 Point)