Memory Protection - Operating System Questions & Answers

1.

What is not true regarding ‘Fence’ ?

   A.) It is implemented via hardware register
   B.) It doesn’t protect users from each other
   C.) It good to protect OS from abusive users
   D.) Its implementation is unrestricted and can take any amount of space in Operating system.

Answer: Option 'D'

Its implementation is unrestricted and can take any amount of space in Operating system.

2.

What is true regarding ‘Fence’ ?

   A.) Its a method to confine users to one side of a boundary
   B.) It can protect Operating system from one user
   C.) It cannot protect users from each other
   D.) All of the mentioned

Answer: Option 'D'

All of the mentioned

3.

What is correct regarding ‘relocation’ w.r.t protecting memory ?

   A.) It is a process of taking a program as if it began at address 0
   B.) It is a process of taking a program as if it began at address 0A
   C.) Fence cannot be used within relocation process
   D.) All of the mentioned

Answer: Option 'A'

​It is a process of taking a program as if it began at address 0

4.

How can fence and relocation be used together ?

   A.) To each program address, the contents of fence register are added
   B.) To contents of fence register is subtracted from actual address of program
   C.) To each program address, the contents of fence register are not added
   D.) None of the mentioned

Answer: Option 'A'

​To each program address, the contents of fence register are added

5.

What is basic need in protecting memory in multi-user environment ?

   A.) We need two registers one ‘start’ and other ‘end’
   B.) We need a variable register
   C.) A fence register has to be used known as base register.
   D.) None of the mentioned

Answer: Option 'C'

​A fence register has to be used known as base register.

6.

What is role of base/bound registers ?

   A.) They give starting address to a program
   B.) They provide encrypted environment
   C.) Program’s addresses are neatly confined to space between the base and the bound registers
   D.) This technique doesn’t protects a program’s address from modification by another user

Answer: Option 'C'

​Program’s addresses are neatly confined to space between the base and the bound registers

7.

How is disadvantage of all-or-nothing approach overcome ?

   A.) Base/Bound
   B.) Relocation technique
   C.) Fence method
   D.) Tagged architecture

Answer: Option 'D'

Tagged architecture

8.

What is all-or-nothing situation for sharing in memory ?

   A.) Program makes all its data available to be accessed
   B.) It prohibits access to some
   C.) It creates rules who can access program memory
   D.) It separates program memory and data memory

Answer: Option 'A'

Program makes all its data available to be accessed

9.

What is correct way the segmentation program address is stored ?

   A.) name, offset
   B.) start, stop
   C.) access, rights
   D.) offset, rights

Answer: Option 'A'

OS can retrieve the real address via looking for the table then making a simple calculation : address of the name + offset.

10.

What is major feature of segmentation ?

   A.) Program is divided in data memory and program memory
   B.) Program is executed in segments
   C.) Program is divided into pieces having different access rights
   D.) It has effect of an unbounded architecture

Answer: Option 'C'

Program is divided into pieces having different access rights

Memory Protection - Operating System Questions & Answers Download Pdf

Recent Posts