0% found this document useful (0 votes)
40 views3 pages

List of Attempted Questions and Answers

The document contains a list of attempted questions and answers from a test on computer science topics. It includes questions about the development of UNIX, object-oriented technology, methods, registers, spooling, access control lists, and factors that influence resource policies. Most of the answers provided are correct, except for the register and access control list questions.

Uploaded by

api-27403543
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views3 pages

List of Attempted Questions and Answers

The document contains a list of attempted questions and answers from a test on computer science topics. It includes questions about the development of UNIX, object-oriented technology, methods, registers, spooling, access control lists, and factors that influence resource policies. Most of the answers provided are correct, except for the register and access control list questions.

Uploaded by

api-27403543
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 3

LIST OF ATTEMPTED QUESTIONS AND ANSWERS

Question The First version of UNIX was developed in 1969 by Ken


Thompson of the Research Group at :-
Correct Answer Bell Laboratories

Your Answer Bell Laboratories

Multiple Choice Single Answer


Question In Object Oriented technology following expression is
appropriate
Correct Answer object=data+menthods

Your Answer object=data+menthods

Multiple Choice Single Answer


Question A procedure body implementing an operation is termed as

Correct Answer Method

Your Answer Method

Select The Blank


Question During execution, ________ register holds the sector for the
code segment.
Correct Answer CS

Your Answer PS

True/False
Question In some operating system, spooling is managed by a system
daemon process.
Correct Answer True

Your Answer False

Select The Blank


Question Each column in the access matrix can be implemented as an
________ for one object.
Correct Answer Access list

Your Answer Capability list

Multiple Choice Single Answer


Question Policies for resource use may vary depending on the :-

Correct Answer Application

Your Answer System

You might also like