1.
What is not true regarding ‘Fence’ ?
Answer: Option 'D'
Its implementation is unrestricted and can take any amount of space in Operating system.
2.
What is true regarding ‘Fence’ ?
Answer: Option 'D'
All of the mentioned
3.
What is correct regarding ‘relocation’ w.r.t protecting memory ?
Answer: Option 'A'
It is a process of taking a program as if it began at address 0
4.
How can fence and relocation be used together ?
Answer: Option 'A'
To each program address, the contents of fence register are added
5.
What is basic need in protecting memory in multi-user environment ?
Answer: Option 'C'
A fence register has to be used known as base register.
6.
What is role of base/bound registers ?
Answer: Option 'C'
Program’s addresses are neatly confined to space between the base and the bound registers
7.
How is disadvantage of all-or-nothing approach overcome ?
Answer: Option 'D'
Tagged architecture
8.
What is all-or-nothing situation for sharing in memory ?
Answer: Option 'A'
Program makes all its data available to be accessed
9.
What is correct way the segmentation program address is stored ?
Answer: Option 'A'
OS can retrieve the real address via looking for the table then making a simple calculation : address of the name + offset.
10.
What is major feature of segmentation ?
Answer: Option 'C'
Program is divided into pieces having different access rights
11.
What is best solution to have effect of unbounded number if base/bound registers?
Answer: Option 'B'
Segmentation
12.
What is true regarding tagged architecture ?
Answer: Option 'A'
Every word of machine memory has one or more extra bits
13.
What is need of protection ?
Answer: Option 'D'
All of the mentioned
14.
What is main objective of protection ?
Answer: Option 'C'
Ensure that each object is accessed correctly and only by allowed processes
15.
What is principle of least privilege ?
Answer: Option 'C'
Users should be given just enough privileges to perform their tasks