Resource Protection MCQ Quiz – Objective Question with Answer for Embedded System Resource Protection

11. Which of the following uses a swap file to provide the virtual memory?

A. Windows NT
B. kernel
C. memory
D. memory management unit

Answer: A

The Windows NT uses a swap file for providing a virtual memory environment. This file is dynamic and varies with the amount of memory that all the software including the device driver, operating systems, and so on.

 

12. What is the size of the swap file in Windows 3.1?

A. 25 Mbytes
B. 30 Mbytes
C. 50 Mbytes
D. 100 Mbytes

Answer: B

Windows 3.1 has a swap file of size 25 Mbytes.

 

13. What is the nature of the swap file in Windows NT?

A. static
B. dynamic
C. linear
D. non-linear

Answer: B

The swap file used in the Windows NT is dynamic and it varies with the amount of memory that all the software including the device driver, operating systems, and so on.

 

14. What limits the amount of virtual memory in Windows 3.1?

A. size of the swap file
B. nature of swap file
C. static file
D. dynamic file

Answer: A

The swap file of Windows 3.1 has a size of 25 Mbytes and thus limits the amount of virtual memory that it can support.

 

15. Which of the following control and supervises the memory requirements of an operating system?

A. processor
B. physical memory manager
C. virtual memory manager
D. ram

Answer: C

The virtual memory manager can control and supervises the memory requirements of the operating system.

 

16. What is the size of the linear address in the virtual memory manager?

A. 2 Gbytes
B. 12 Gbytes
C. 4 Gbytes
D. 16 Gbytes

Answer: C

The virtual memory manager can allocate a linear address space of size 4 Gbytes to each process which is unique and cannot be accessed by the other processes.

 

17. How many modes are used to isolate the kernel and the other components of the operating system?

A. 2
B. 3
C. 4
D. 5

Answer: A

Two modes are used for isolating the kernel and the other components of the operating system from any process and user applications that are running. These are kernel mode and the user mode.

 

18. Which are the two modes used in the isolation of the kernel and the user?

A. real mode and virtual mode
B. real mode and user mode
C. user mode and kernel mode
D. kernel mode and real mode

Answer: C

The two modes are kernel mode and the user mode which are used for isolating the kernel and the other components of the operating system from any process and user applications that are running.

 

19. Which of the following must be used to isolate the access in the user mode?

A. device driver
B. software driver
C. on-chip memory
D. peripherals

Answer: A

The device driver is used to control and isolate the access when it is in user mode. This is used to ensure that no conflict is caused.

 

20. Which mode uses 16 higher real-time class priority levels?

A. real mode
B. user mode
C. kernel mode
D. protected mode

Answer: C

The kernel-mode processes use the 16 higher real-time class priority levels and the operating system processes will take the preference over the user applications.

Scroll to Top