Breaking physical memory into fixed-sized bloclcs called as: (1) Packets (2) Page (3) Frames (4) Segments

1 Answer

Answer :

Frames

Related questions

Description : UDP packets are called as _________ a. Segments b. Checksum c. Frames d. Datagrams

Last Answer : d. Datagrams

Description : The data link layer takes the packets from _________ and encapsulates them into frames for transmission. a) network layer b) physical layer c) transport layer d) application layer

Last Answer : a) network layer

Description : Consider a program that consists of 8 pages (from 0 to 7) and we have 4 page frames in the physical memory for the pages. The page reference string is :  1 2 3 2 5 6 3 4 6 3 7 3 1 5 3 6 3 4 2 4 3 4 5 ... to fill available page frames with pages): (A) 9 and 6 (B) 10 and 7 (C) 9 and 7 (D) 10 and 6

Last Answer : (B) 10 and 7

Description : Suppose that the virtual Address space has eight pages and physical memory with four page frames. If LRU page replacement algorithm is used, .............. number of page faults occur with the reference string. 0 2 1 3 5 4 6 3 7 4 7 3 3 5 5 3 1 1 1 7 2 3 4 1 (A) 11 (B) 12 (C) 10 (D) 9

Last Answer : (A) 11

Description : A memory management system has 64 pages with 512 bytes page size. Physical memory consists of 32 page frames. Number of bits required in logical and physical address are respectively: (1) 14 and 15 (2) 14 and 29 (3) 15 and 14 (4) 16 and 32

Last Answer : (3) 15 and 14

Description : Fragmentation is: a) Dividing the secondary memory into equal sized fragments b) Fragments of memory words used in a page c) Fragments of memory words unused in a page d) None of The Above

Last Answer : c) Fragments of memory words unused in a page

Description : Network Layer is used for (A) Breaking up the data in frames for transmission (B) Deal with Error correction (C) Automatic Recovery of Procedure (D) Physical Architecture

Last Answer : (D) Physical Architecture

Description : The network layer encapsulates the data into _______of data. A. bits B. frames C. packets D. bytes

Last Answer : C. packets

Description : The network layer is concerned with __________ of data. a. bits b. frames c. packets d. bytes

Last Answer : c. packets

Description : The network layer is concerned with __________ of data. a) bits b) frames c) packets d) bytes

Last Answer : c) packets

Description : A job has four pages A, B, C, D and the main memory has two page frames only. The job needs to process its pages in following order: ABACABDBACD Assuming that a page interrupt occurs when a new page is brought in the main ... replacement algorithms are (A) 9 and 7 (B) 7 and 6 (C) 9 and 8 (D) 8 and 6

Last Answer : (C) 9 and 8

Description : Suppose that the number of instructions executed between page faults is directly proportional to the number of page frames allocated to a program. If the available memory is doubled, the mean interval between page faults is also ... memory were available? (A) 60 sec (B) 30 sec (C) 45 sec (D) 10 sec

Last Answer : Answer: C Explanation: T = Ninstr x 1µs + 15,000 x 2,000 µs = 60s Ninstr x 1µs = 60,000,000 µs - 30,000,000 µs = 30,000,000 µs Ninstr = 30,000,000 The number of instruction ... doesn't mean that the program runs twice as fast as on the first system. Here, the performance increase is of 25%.

Description : Page stealing 1) Is a sign of an efficient system 2) Is taking page frames from other working sets 3) Should be the tuning goal 4) Is taking larger disk spaces for pages paged out

Last Answer : 2) Is taking page frames from other working sets

Description : Page stealing 1 Is a sign of an efficient system 2 Is taking page frames from other working sets 3 Should be the tuning goal 4 Is taking larger disk spaces for pages paged out

Last Answer : 2 Is taking page frames from other working sets

Description : _______ is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses. a) Cybergaming crime b) Memory shaving c) Syn flooding d) Software piracy e) None of these

Last Answer : a) Cybergaming crime

Description : In TCP/IP Reference model, the job of ............... layer is to permit hosts to inject packets into any network and travel them independently to the destination. (A) Physical (B) Transport (C) Application (D) Host-to-network

Last Answer : Answer: Marks to all

Description : HTML is basically used to design: (A) Web-page (B) Web-site (C) Graphics (D) Tables and Frames

Last Answer : (A) Web-page

Description : A LRU page replacement is used with four page frames and eight pages. How many page faults will occur with the reference string 0172327103 if the four frames are initially empty? (A) 6 (B) 7 (C) 5 (D) 8

Last Answer : (B) 7

Description : Consider the reference string 0 1 2 3 0 1 4 0 1 2 3 4 If FIFO page replacement algorithm is used, then the number of page faults with three page frames and four page frames are .......... and ........... respectively. (A) 10, 9 (B) 9, 9 (C) 10, 10 (D) 9, 10

Last Answer : (D) 9, 10

Description : In________framing, we need adelimiter (flag) to define the boundary of two frames. A) fixed-size B) variable-size C) standard D) none of the above

Last Answer : variable-size

Description : In_______framing, there isno need for defining the boundariesof frames. A) fixed-size B) variable-size C) standard D) none of the above

Last Answer : none of the above

Description : In _______ framing, there is no need for defining the boundaries of frames. A. fixed-size B. variable-size C. standard D. none of the above

Last Answer : A. fixed-size

Description : The _______ layer provides a well defined service interface to the network layer, determining how the bits of the physical layer are grouped into frames A. Data Link B. Physical C. Network D. Session

Last Answer : A. Data Link

Description : When a physical property such as charge exists in discrete "packets" rather than in continuous amounts, the property is said to be: w) discontinuous x) abrupt y) quantized z) noncontinuous

Last Answer : ANSWER: Y -- QUANTIZED

Description : State weather the following statement is true or false for Token Bus 1).It is a linear or tree- shaped cable onto which the stations are attached. 2). the token propagates around the logical ring, with only the token holder ... 3. false C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : D. 1. true, 2. true, 3. false

Description : Which of the following contains output segments of AI programming? a) Printed language and synthesized b) Manipulation of physical object c) Locomotion d) All of the mentioned

Last Answer : d) All of the mentioned

Description : Which of the following contains the output segments of Artificial Intelligence programming? a) Printed language and synthesized speech b) Manipulation of physical object c) Locomotion d) All of the mentioned

Last Answer : d) All of the mentioned

Description : Which are the different segments of memory ?

Last Answer : Ans. 1. Stack Segment - contains local variables and Reference variables(variables that hold the address of an object in the heap) 2. Heap Segment - contains all created objects in runtime, ... variables) 3. Code Segment - The segment where the actual compiled Java bytecodes resides when loaded

Description : In UNIX operating system, when a process creates a new process using the fork() system call, which of the following state is shared between the parent process and child process? (A) Heap (B) Stack (C) Shared memory segments (D) Both Heap and Stack

Last Answer : (C) Shared memory segments 

Description : Where can I find a double memory foam mattress to fit a California King sized bed?

Last Answer : Sleep Number has a variety of double memory foam mattresses that fit a California King Sized bed. You can find a Sleep Number Bed Store near you, or order online via their website: http://www.sleepnumber.com/

Description : ..................... provides a larger sized of virtual memory but require virtual memory which provides multidimensional memory. A) Paging method B) Segmentation method C) Paging and segmentation method D) None of these

Last Answer : B) Segmentation method

Description : Reserve Bank of India has made it mandatory on the banks to discontinue the practice of stapling the currency note packets under _______ of the Banking Regulation Act, 1949 A. Section 35A B. Section 25A C. Section 15A D. Section 30A E. None of the Above

Last Answer : A. Section 35A Explanation: The Reserve Bank of India has made it mandatory on the banks to discontinue the practice of stapling the currency note packets. It has issued a directive to banks under Section 35A of the Banking Regulation Act, 1949.

Description : The ________is a network layer Internet protocol that provides message packets to report errors and other information regarding IP packet processing back to the source: a) Internet Control Message ... Standard Flexible Message Protocol c) Internet Dynamic Chartered Message Protocol d) None of These

Last Answer : a) Internet Control Message Protocol

Description : The ________is a three layer network protocol that contains addressing information and some control information that enables packets to be routed: a) User Datagram Protocol b) Internet Protocol c) Dynamic Host Configuration Protocol d) None of These

Last Answer : b) Internet Protocol

Description : Which among the following is correct characteristics about proxy server: a) A proxy server may act as a firewall by responding to input packets in the manner of an application while blocking other packets. b) A ... as a proxy on behalf of the network user; d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : Application layer firewalls works on the application level of the ____stack (i.e. all browser traffic or all telnet or FTP traffic) and may intercept all packets travelling to or from an application: a) TCP b) IP c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Which of the following devices is specially designed to forward packets to specific ports based on the packet's address? 1) Specialty hub 2) Switching hub 3) Port hub 4) Filtering hub

Last Answer : 2) Switching hub

Description : Which of the following devices discriminates between multicast and unicast packets? 1) Multicast switch 2) Bicast switch 3) Bicast router 4) Mulicast Router

Last Answer : 4) Mulicast Router

Description : Which of the following devices is specially designed to forward packets to specific ports based on the packet's address? 1 Specialty hub 2 Switching hub 3 Port hub 4 Filtering hub

Last Answer : 2 Switching hub

Description : Which of the following devices discriminates between multicast and unicast packets? 1 Multicast switch 2 Bicast switch 3 Bicast router 4 Mulicast Router

Last Answer : 4 Mulicast Router

Description : Which algorithm is used to decide the path to transfer the packets from source to destination? (1) Routing (2) Pathing (3) Selecting (4) Directing

Last Answer : Routing

Description : Technique to implement virtual memory where memory is divided into units of fixed size memory is _________ A. Paging B. De-fragments C. Segmentation D. None of the above

Last Answer : A. Paging

Description : Memories in which any location can be reached in a fixed amount of time after specifying its address is called ________ A. Sequential Access Memory B. Random Access Memory C. Quick Access Memory D. Mass storage

Last Answer : B. Random Access Memory

Description : When does a Page fault occur? (1) There is an error in a specific page (2) A program accesses a page not currently in main memory (3) A program accesses a page of main memory (4) A program accesses a page belonging to another program

Last Answer : A program accesses a page not currently in main memory

Description : Find out the wrong one from the following: a) HTML 3 was developed in 1995 b) HTML 3.2 was next official version support for Tables, Images, Heading and other elements that is Align attributes etc. ... is current official standard version. d) None of These e) All of the Above f) None of These

Last Answer : f) None of These

Description : In which mode can the computers that are associated send frames directly to each other? (1) Adhoc mode (2) Infrastructure mode (3) Structured mode (4) Anonymous mode 

Last Answer : Adhoc mode

Description : “KBS” in AI stands for? a) Knowledge Based Scenario b) Knowledge Based System c) Knowledge Based Segments d) Knowing Best System

Last Answer : b) Knowledge Based System

Description : “KBS” in AI stands for? a) Knowledge Based Scenario b) Knowledge Based System c) Knowledge Based Segments d) Knowing Best System

Last Answer : b) Knowledge Based System

Description : Which computers are used as servers for any medium sized organizations? A) Mainframe Computer B) Mini Computers C) Micro Computers D) Super Computers

Last Answer : Answer : B

Description : Is breaking your pencil physical or chemical?

Last Answer : Physical change- it is still wood, graphite and paint- just in adifferent shape.