1. The part of machine level instruction, which tells the
central processor what has to be done, is
A. Operation code
B. Address
C. Locator
D. Flip-Flop
E. None of the
above
2. Which of the
following refers to the associative memory?
A. the address
of the data is generated by the CPU
B. the address
of the data is supplied by the users
C. there is no need for an address i.e. the data is used as an address
D. the data are
accessed sequentially
E. None of the
above
3 To avoid the race condition, the number of processes that
may be simultaneously inside their critical section is
A. 8
B. 1
C. 16
D. 0
E. None of the
above
4 A system program that combines the separately compiled
modules of a program into a form suitable for execution
A. assembler
B. linking loader
C. cross
compiler
D. load and go
E. None of the
above
6. Addressing
structure
A. defines
the fundamental method of determining effective operand addresses
B. are
variations in the use of fundamental addressing structures, or some associated
actions which are related to addressing.
C. performs
indicated operations on two fast registers of the machine and leave the result
in one of the registers.
D. all of the
above
E. None of the
above
7The Memory Buffer Register (MBR)
A. is a hardware
memory device which denotes the location of the current instruction being
executed.
B. is a group of
electrical circuits (hardware), that performs the intent of instructions
fetched from memory.
C. contains the
address of the memory location that is to be read from or stored into.
D. contains a
copy of the designated memory location specified by the MAR after a
"read" or the new contents of the memory prior to a
"write".
E. None of the
above
8 The strategy of allowing processes that are logically
runnable to be temporarily suspended is called
A. preemptive
scheduling
B. non
preemptive scheduling
C. shortest job
first
D. first come
first served
E. None of the
above
9. The Storage-to-Storage instructions
A. have both
their operands in the main store.
B. which perform
an operation on a register operand and an operand which is located in the main
store, generally leaving the result in the register, expect in the case of
store operation when it is also written into the specified storage location.
C. which perform
indicated operations on two fast registers of the machine and have the result
in one of the registers
D. all of the
above
E. None of the
above
10.The LRU algorithm
A. pages out
pages that have been used recently
B. pages out
pages that have not been used recently
C. pages out pages that have been least used recently
D. pages out the
first page in a given area
E. None of the
above
11.Which of the following systems software does the job of
merging the records from two files into one?
A. Security
software
B. Utility program
C. Networking
software
D. Documentation
system
E. None of the
above
12. Fork is
A. the
dispatching of a task
B. the creation
of a new job
C. the creation of a new process
D. increasing
the priority of a task
E. None of the
above
13.Thrashing
A. is a natural
consequence of virtual memory systems
B. can always be
avoided by swapping
C. always occurs
on large computers
D. can be caused by poor paging algorithms
E. None of the
above
14.Supervisor state is
A. never used
B. entered by
programs when they enter the processor
C. required to
perform any I/O
D. only allowed to the operating system
E. None of the
above
15. Which of the following instruction steps, would be
written within the diamond-shaped box, of a flowchart?
A. S = B - C
B. IS A<10
C. PRINT A
D. DATA X,4Z
E. None of the
above
17. Which of the following statements is false?
A. the technique
of storage compaction involves moving all occupied areas of storage to one end
or other of main storage
B. compaction does not involve relocation of programs
C. compaction is
also know as garbage collection
D. the system
must stop everything while it performs the compaction
E. None of the
above
18. Interprocess communication
A. is required
for all processes
B. is usually
done via disk drives
C. is never
necessary,
D. allows processes to synchronize activity
19.Which of the following functions is(are) performed by the
loader
A. allocate
space in memory for the programs and resolve symbolic references between object
decks
B. adjust all
address dependent locations, such as address constants, to correspond to the
allocated space.
C. physically
place the machine instructions and data into memory.
D. All of the above
E. None of the
above
20. User-Friendly Systems are:
A. required for
object-oriented programming
B. easy to
develop
C. common among
traditional mainframe operating systems
D. becoming
more common
E. None of the
above
21. Which of the following addressing modes, facilitates
access to an operand whose location is defined relative to the beginning of the
data structure in which it appears?
A. ascending
B. sorting
C. index
D. indirect
E. None of the
above
22. While running DOS on a PC, which command would be used
to duplicate the entire diskette?
A. COPY
B. DISKCOPY
C. CHKDSK
D. TYPE
E. None of the
above
23.Memory
A. is a device
that performs a sequence of operations specified by instructions in memory.
B. is the device where information is stored
C. is a sequence
of instructions
D. is typically
characterized by interactive processing and time-slicing of the CPU's time to
allow quick response to each user.
E. None of the
above
24. Which of the following rules out the use of GO TO?
A. Flowchart
B. HIPO-DIAGRAMS
C. Nassi-Shneiderman diagram
D. All of the
above
E. None of the
above
25.A system program that sets up an executable program in
main memory ready for execution is
A. assembler
B. linker
C. loader
D. compiler
E. None of the
above
26.
Which of the following are loaded into main memory when the
computer is booted?
A. internal command instructions
B. external command
instructions
C. utility
programs
D. word
processing instructions
E. None of the
above
28.What is the name given to the organized collection of
software that controls the overall operation of a computer?
A. Working
system
B. Peripheral
system
C. Operating system
D. Controlling
system
E. None of the
above
29. The principal of locality of reference justifies the use
of
A. reenterable
B. non reusable
C. virtual
memory
D. cache memory
E. None of the
above
30.The register or main memory location which contains the
effective address of the operand is known as
A. pointer
B. indexed
register
C. special
location
D. scratch pad
E. None of the
above
31.Assembly code data base is associated with
A. assembly language
version of the program which is created by the code generation phase and is
input to the assembly phase.
B. a permanent
table of decision rules in the form of patterns for matching with the uniform
symbol table to discover syntactic structure.
C. consists of a
full or partial list or the token's as they appear in the program. Created by
Lexical analysis and used for syntax analysis and interpretation.
D. a permanent
table which lists all key words and special symbols of the language in symbolic
form.
E. None of the
above
32. Thrashing can be avoided if
A. the pages, belonging
to the working set of the programs, are in main memory
B. the speed of
CPU is increased
C. the speed of
I/O processor is increased
D. all of the
above
E. None of the
above
33. In analyzing the compilation of PL/I program, the term
"Lexical analysis" is associated with
A. recognition
of basic syntactic constructs through reductions.
B. recognition
of basic elements and creation of uniform symbols
C. creation of
more optional matrix.
D. use of macro
processor to produce more optimal assembly code
E. None of the
above
34. Resolution of
externally defined symbols is performed by
A. Linker
B. Loader
C. Compiler
D. Assembler
E. None of the
above
35. System generation:
A. is always
quite simple
B. is always
very difficult
C. varies in difficulty
between systems
D. requires
extensive tools to be understandable
E. None of the
above
36. The Memory
Address Register
A. is a hardware
memory device which denotes the location of the current instruction being
executed.
B. is a group of
electrical circuits (hardware), that performs the intent of instructions
fetched from memory.
C. contains
the address of the memory location that is to be read from or stored into.
D. contains a
copy of the designated memory location specified by the MAR after a
"read" or the new contents of the memory prior to a
"write".
E. None of the
above
View Answer Workspace Report Discuss in Forum
37.
In virtual memory systems, Dynamic address translation
A. is the
hardware necessary to implement paging
B. stores pages
at a specific location on disk
C. is useless
when swapping is used
D. is part of
the operating system paging algorithm
E. None of the
above
View Answer Workspace Report Discuss in Forum
38.
Fragmentation of the file system
A. occurs only
if the file system is used improperly
B. can always be
prevented
C. can be
temporarily removed by compaction
D. is a
characteristic of all file systems
E. None of the
above
View Answer Workspace Report Discuss in Forum
39.
A non-relocatable program is one which
A. cannot be
made to execute in any area of storage other than the one designated for it
at the time of its coding or translation.
B. consists of a
program and relevant information for its relocation.
C. can itself
performs the relocation of its address-sensitive portions.
D. all of the
above
E. None of the
above
View Answer Workspace Report Discuss in Forum
40.
Which of the following are(is) Language Processor(s)
A. assembles
B. compilers
C. interpreters
D. All of the
above
E. None of the
above
41.
In which addressing mode the effective address of the
operand is the contents of a register specified in the instruction and after
accessing the operand, the contents of this register is incremented to point to
the next item in the list?
A. index
addressing
B. indirect
addressing
C. auto
increment
D. auto
decrement
E. None of the
above
View Answer Workspace Report Discuss in Forum
42.
The memory allocation scheme subject to "external"
fragmentation is
A. segmentation
B. swapping
C. pure demand
paging
D. multiple contiguous
fixed partitions
E. None of the
above
View Answer Workspace Report Discuss in Forum
43.
While working with MS-DOS, which command will you use to
transfer a specific file from one disk to another?
A. DISKCOPY
B. COPY
C. RENAME
D. FORMAT
E. None of the
above
View Answer Workspace Report Discuss in Forum
44.
What is the name of the operating system for the laptop
computer called MacLite?
A. Windows
B. DOS
C. MS-DOS
D. OZ
E.
None of the abov
45.
In which addressing mode the contents of a register
specified in the instruction are first decremented, and then these contents are
used as the effective address of the operands?
A. index
addressing
B. indirect
addressing
C. auto
increment
D. auto decrement
E. None of the
above
46.
What is the name given to the values that are automatically
provided by software to reduce keystrokes and improve a computer user's
productivity?
A. Defined
values
B. Fixed values
C. Default
values
D. Special
values
E. None of the
above
View Answer Workspace Report Discuss in Forum
47.
Page stealing
A. is a sign of
an efficient system
B. is taking
page frames from other working sets
C. should be the
tuning goal
D. is taking
larger disk spaces for pages paged out
E. None of the
above
View Answer Workspace Report Discuss in Forum
48.
In MS-DOS 5.0, which is the number that acts as a code to
uniquely identify the software product?
A. MS
B. DOS
C. MS DOS
D. 5.0
E. None of the
above
View Answer Workspace Report Discuss in Forum
49.
Bug means
A. A logical
error in a program
B. A difficult
syntax error in a program
C. Documenting
programs using an efficient documentation tool
D. All of the
above
E. None of the
above
50.
Memory management is :
A. not used in
modern operating system
B. replaced
with virtual memory on current systems
C. not used on
multiprogramming systems
D. critical for
even the simplest operating systems
E. None of the
above
1.
The initial value of the semaphore that allows only one of
the many processes to enter their critical sections, is
A. 8
B. 1
C. 16
D. 0
E. None of the
above
View Answer Workspace Report Discuss in Forum
2.
The Register - to - Register (RR) instructions
A.have both their operands in the main store.
B.which perform an operation on a register operand and an
operand which is located in the main store, generally leaving the result in the
register, except in the case of store operation when it is also written into
the specified storage location.
C.which perform indicated operations on two fast
registers of the machine and leave the result in one of the registers.
D. all of the
above
E. None of the
above
View Answer Workspace Report Discuss in Forum
3.
A page fault
A. is an error
is a specific page
B. occurs when a
program accesses a page of memory
C. is an access
to a page not currently in memory
D. is a
reference to a page belonging to another program
E. None of the
above
View Answer Workspace Report Discuss in Forum
4.
An algorithm is best described as
A. A computer
language
B. A step by
step procedure for solving a problem
C. A branch of
mathematics
D. All of the
above
E. None of the
above
View Answer Workspace Report Discuss in Forum
5.
The process of transferring data intended for a peripheral
device into a disk (or intermediate store) so that it can be transferred to peripheral
at a more convenient time or in bulk, is known as
A. multiprogramming
B. spooling
C. caching
D. virtual
programming
E. None of the
above
6.
Block caches or buffer caches are used
A. to improve
disk performance
B. to handle
interrupts
C. to increase
the capacity of the main memory
D. to speed up
main memory read operation
E. None of the
above
View Answer Workspace Report Discuss in Forum
7.
Which of the following statements is false?
A. a small page
size causes large page tables
B. internal
fragmentation is increased with small pages
C. a large page
size causes instructions and data that will not be referenced brought into
primary storage
D. I/O transfers
are more efficient with large pages
E. None of the
above
View Answer Workspace Report Discuss in Forum
8.
The action of parsing the source program into the proper
syntactic classes is known as
A. syntax
analysis
B. lexical
analysis
C. interpretation
analysis
D. general
syntax analysis
E. None of the
above
View Answer Workspace Report Discuss in Forum
9.
Which, of the following is not true about the description of
a decision table?
A. A decision
table is easy to modify
B. A decision
table is directly understood by the computer
C. A decision
table is easy to understand
D. All of the
above
E. None of the
above
View Answer Workspace Report Discuss in Forum
10.
Trojan-Horse programs
A. are
legitimate programs that allow unauthorized access
B. do not
usually work
C. are hidden
programs that do not show up on the system
D. usually are
immediately discovered
E. None of the
above
11.
When did IBM release the first version of disk operating
system DOS version 1.0?
A. 1981
B. 1982
C. 1983
D. 1984
E. None of the
above
12.
Which of the following is false about disk when compared to
main memory?
A. non-volatile
B. longer
storage capacity
C. lower price
per bit
D. faster
E. None of the
above
13.
Producer consumer problem can be solved using
A. semaphores
B. event
counters
C. monitors
D. all of the
above
E. None of the
above
14.
Most of the microcomputer's operating systems like Apple
DOS, MS DOS and PC DOS etc. are called disk operating systems because
A. they are
memory resident
B. they are
initially stored on disk
C. they are
available on magnetic tapes
D. they are
partly in primary memory and partly on disk
E. None of the
above
15.The CPU, after receiving an interrupt from an I/O device
A. halts for a
predetermined time
B. hands over
control of address bus and data bus to the interrupting device
C. branches off
to the interrupt service routine immediately
D. branches
off to the interrupt service routine after completion of the current
instruction
E. None of the
above
16.
Seeks analysis
A. is used for
analyzing paging problems
B. is used
for analyzing device busy problems
C. is used for
analyzing control-unit busy problems
D. is only shown
on real-time displays
E. None of the
above
17.Which is a permanent database in the general model of
compiler?
A. Literal Table
B. Identifier
Table
C. Terminal
Table
D. Source code
E. None of the
above
18.
What is the name of the technique in which the operating
system of a computer executes several programs concurrently by switching back
and forth between them?
A. Partitioning
B. Multitasking
C. Windowing
D. Paging
E. None of the
above
9.Operating system
A. links a
program with the subroutines it references
B. provides a
layered, user-friendly interface
C. enables the
programmer to draw a flowchart
D. all of the
above
E. None of the
above
20.
Software that measures, monitors, analyzes, and controls
real-world events is called:
A. system
software
B. real-time
software
C. scientific
software
D. business
software
E. None of the
above
21.
The details of all external symbols and relocation formation
(relocation list or map) is provided to linker by
A. Macro processor
B. Translator
C. Loader
D. Editor
E. None of the
above
View Answer Workspace Report Discuss in Forum
22.
The macro processor must perform
A. recognize
macro definitions and macro calls
B. save the
macro definitions
C. expand macros
calls and substitute arguments
D. all of the
above
E. None of the
above
23.
A development strategy whereby the executive control modules
of a system are coded and tested first, is known as
A. Bottom-up
development
B. Top-down
development
C. Left-Right
development
D. All of the
above
E. None of the
above
24.Which of the following is helpful in evaluating
applications software what will best suit your needs?
A. recommendations
by other users
B. computer
magazines
C. objective
software reviews
D. all of the
above
E. None of the
above
25. What problem is solved by Dijkstra's banker's algorithm?
A. mutual
exclusion
B. deadlock
recovery
C. deadlock
avoidance
D. cache
coherence
E.
None of the above
26.The dispatcher
A.actually schedules the tasks into the processor
B. puts tasks in
I/O wait
C. is always
small and simple
D. never changes
task priorities
E. None of the
above
27System programs such as Compilers are designed so that
they are
A. reenterable
B. non reusable
C. serially
usable
D. recursive
E. None of the
above
28.IBM released its first PC in 1981. Can you name the
operating system which was most popular at that time?
A. MS-DOS
B. PC-DOS
C. OS/360
D. CP/M
E. None of the
above
29 If the number of bits in a virtual address of a program
is 12 and the page size is 0.5 K bytes, the number of pages in the virtual
address space is
A. 16
B. 32
C. 64
D. 128
E. None of the
above
30.
Which table is a permanent database that has an entry for
each terminal symbol.
A. Terminal
table
B. Literal table
C. Identifier
table
D. Reductions
E. None of the
above
31.The function(s) of the Syntax phase is(are)
A. to
recognize the major constructs of the language and to call the appropriate
action routines that will generate the intermediate form or matrix for
these constructs.
B. to build a
literal table and an identifier table
C. to build a
uniform symbol table
D. to parse the
source program into the basic elements or tokens of the language.
E. None of the
above
32. Swapping
A. works best
with many small partitions
B. allows many
programs to use memory simultaneously
C. allows
each program in turn to use the memory
D. does not work
with overlaying
E. None of the
above
33.
A disk scheduling algorithm in an operating system causes
the disk arm to move back and forth across the disk surface in order to service
all requests in its path. This is a
A. First come
first served
B. Shortest Seek
Time First (SSTE)
C. Scan
D. FIFO
E. None of the
above
34.A translator is best described as
A. an
application software
B. a system
software
C. a hardware
component
D. all of the
above
E. None of the
above
35.Data encryption
A. is mostly
used by public networks
B. is mostly
used by financial networks
C. cannot be
used by private installations
D. is not
necessary, since data cannot be intercepted
E. None of the
above
36. What is the name given to the process of initializing a
microcomputer with its operating system?
A. Cold booting
B. Booting
C. Warm booting
D. Boot
recording
E. None of the
above
37.The function(s) of the Storage Assignment is (are)
A. to assign storage
to all variables referenced in the source program.
B. to assign
storage to all temporary locations that are necessary for intermediate results.
C. to assign
storage to literals, and to ensure that the storage is allocate and appropriate
locations are initialized.
D. all of the
above
E. None of the
above
38.A Processor
A.is a device that performs a sequence of operations
specified by instructions in memory.
B. is the device
where information is stored
C. is a sequence
of instructions
D. is typically
characterized by interactive processing and time of the CPU's time to allow
quick response to each user.
E. None of the
above
39.
With MS-DOS which command will divide the surface of the
blank floppy disk into sectors and assign a unique address to each one?
A. FORMAT
command
B. FAT command
C. VER command
D. CHKDSK
command
E. None of the
above
40.Multiprogramming
A. is a method
of memory allocation by which the program is subdivided into equal portions, or
pages and core is subdivided into equal portions or blocks.
B. consists of
those addresses that may be generated by a processor during execution of a
computation.
C. is a method
of allocating processor time.
D. allows
multiple programs to reside in separate areas of core at the time.
E. None of the
above
41.A translator which reads an entire programme written in a
high level language and converts it into machine language code is:
A. assembler
B. translator
C. compiler
D. system
software
E. None of the
above
42 The advantage(s) inherent to using high level languages
is (are)
A. Fewer people,
less management and shorter transition in learning time
B. Improved
debugging capability, and superior documentation
C. A greater
degree of machine independence
D. All of the
above
E. None of the
above
43. Addressing modes
A. defines the
fundamental method of determining effective operand addresses
B. are
variations in the use of fundamental addressing structures, or some associated
actions which are related to addressing.
C. performs
indicated operations on two fast registers of the machine and leave the result
in one of the registers.
D. all of the
above
E. None of the
above
44.In which way(s) a macro processor for assembly language
can be implemented:
A. independent
two-pass processor
B. independent
one-pass processor
C. processor
incorporated into pass 1 of a standard two-pass assembler
D. all of the
above
E. None of the
above
45.Which of the following is a type of systems software used
on microcomputers?
A. MS-DOS
B. PC-DOS
C. Unix
D. All of the
above
E. None of the
above
46. The working set theory of programming behaviour of
processes running within an operating system involves
A. the
collection of pages that a process accesses
B. disk
scheduling mechanisms
C. coalescing
holes in memory
D. assigning the
CPU to processes
E. None of the
above
48.A file organization component of a VSAM file is:
A. relative
record data set
B. keyed
sequential data set
C. entry
sequential data set
D. all of the
above
E. None of the
above
49 What is the name given to the software which can be
legally compiled and often used for free?
A. Shareware
program
B. Public
domain program
C. Firmware
program
D. Mindware
E. None of the
above
50.The SJF algorithm executes first the job
A. that last
entered the queue
B. that first
entered the queue
C. that has been
in the queue the longest
D. with the
least processor needs
E. None of the
above
1.
In which of the storage placement strategies a program is
placed in the largest available hole in the main memory?
A. best fit
B. first fit
C. worst fit
D. buddy
E. None of the
above
2.Which of the following is a block device
A. mouse
B. printer
C. terminals
D. disk
E. None of the
above
3.The problem of thrashing is affected significantly by:
A. program
structure
B. program size
C. primary-storage
size
D. all of the
above
E. None of the
above
4.Which of the following software types is used to simplify
using systems software?
A. spreadsheet
B. operating
environment
C. timesharing
D. multitasking
E. None of the
above
5 Advantage(s) of using assembly language rather than
machine language is (are):
A. It is
mnemonic and easy to read.
B. Addresses any
symbolic, not absolute
C. Introduction
of data to program is easier
D. all of the
above
E. None of the
above
6.Which of the following is not true about the memory
management?
A. virtual
memory is used only in multi-user systems
B. segmentation
suffers from external fragmentation
C. paging
suffers from internal fragmentation
D. segmented
memory can be paged
E. None of the
above
7.Job Control Language (JCL) statements are used to
A. Read the
input from the slow-speed card reader to the high-speed magnetic disk
B. Specify,
to the operating system, the beginning and end of a job in a batch
C. Allocate the
CPU to a job
D. All of the
above
E. None of the
above
8.Paging
A. is a method
of memory allocation by which the program is subdivided into equal
portions, or pages and core is subdivided into equal portions or blocks.
B. consists of
those addresses that may be generated by a processor during execution of a
computation.
C. is a method
of allocating processor time.
D. allows
multiple programs to reside in separate areas of core at the time.
E. None of the
above
View Answer Workspace Report Discuss in Forum
9.
Which of the following is not true about documentation?
A. Documentation,
of a system, should be as clear and direct as possible
B. Documentation
increases the maintenance time and cost
C. Documentation
gives better understanding of the problem
D. All of the
above
E. None of the
above
View Answer Workspace Report Discuss in Forum
10.
The system/370 assembler language
A. allows the
programmer to write base registers and displacements explicitly in the
source program.
B. is used to
remember which of the general-purpose registers are currently available as base
registers, and what base addresses they contain.
C. allows
multiple programs to reside in separate areas of core at the same time.
D. is a term
that refers to the control programs of an operating system.
E. None of the
above
11.
Scheduling is
A. allowing
jobs to use the processor
B. unrelated to
performance consideration
C. not required
in uniprocessor systems
D. the same
regard-less of the purpose of the system
E. None of the
above
View Answer Workspace Report Discuss in Forum
12.
Which of the following statements is not true.
A. time sharing
is an example of multiprogramming
B. JCL is used
only to communicate between systems programmers
C. a batch
file contains a series of operating system commands
D. the primary
function of operating systems is to make the computer hardware easily usable.
E. None of the
above
13.What scheduling algorithm allows processes that are
logical runnable to be temporarily suspended?
A. preemptive
scheduling
B. non-preemptive
scheduling
C. FIFO
D. FCFS
E. None of the
above
14.In an absolute loading scheme, which loader function is
accomplished by loader
A. Reallocation
B. Allocation
C. Linking
D. Loading
E. None of the
above
15.The computational technique used to compute the disk
storage address of individual records is called:
A. bubble memory
B. key fielding
C. dynamic
reallocation
D. hashing
E. None of the
above
16.For how many processes which are sharing common data, the
Dekker's algorithm implements mutual exclusion?
A. 1
B. 2
C. 3
D. 4
E. None of the
above
17.The file structure that redefines its first record at a
base of zero uses the term:
A. relative
organization
B. key fielding
C. dynamic
reallocation
D. hashing
E. None of the
above
18.What is the name given to all the programs inside the
computer with makes it usable?
A. Application
software
B. System software
C. Firm ware
D. Shareware
E. None of the
above
19. Semaphores
A. synchronize
critical resources to prevent deadlock
B. synchronize
critical resources to prevent contention
C. are used to
do I/O
D. are used for
memory management
E. None of the
above
20.The advantage(s) of incorporating the macro processor
into pass 1 is(are):
A. many
functions do not have to be implemented twice.
B. Functions are
combined and it is not necessary to create intermediate files as output from
the macros processor and input to the assembler.
C. more
flexibility is available to the programmer in that he may use all the features
of the assembler in conjunction with macros.
D. all of the
above
E. None of the
above
21.
In analyzing the compilation of PL/I program, the
description "creation of more optimal matrix" is associated with
A. Assembly and
output
B. Code
generation
C. Syntax
analysis
D. Machine
independent optimization
E. None of the
above
22.In memory systems, boundary registers
A. are used for
temporary program variable storage
B. are only
necessary with fixed partitions
C. track page
boundaries
D. track the beginning and ending of programs
E. None of the
above
23.Which of the following is true for machine language.
A. Repeated
execution of program segments
B. Depicting
flow of data in a system
C. A
sequence of instructions which, when followed properly, solves a problem
D. the
language which communicates with the computer using only the binary digits 1
and 0.
E. None of the
above
D. Desktop publishing
E. None of the
above
25.Scissoring enables
A. a part of data to be displayed
B. entire data
to be displayed
C. full data
display on full area of screen
D. no data to be
displayed
E. None of the
above
26.A relocate program form is one which
A. cannot be
made to execute in any area of storage other than the one designated for it at
the time of its coding or translation.
B. consists
of a program and relevant information for its relocation.
C. can itself
performs the relocation of its address-sensitive portions.
D. all of the
above
E. None of the
above
27. If you want to execute more than one program at a time,
the systems software you are using must be capable of:
A. word
processing
B. virtual
memory
C. compiling
D. multitasking
E. None of the
above
28 In analyzing the compilation of PL/I program, the
description "resolving symbolic address (labels) and generating machine
language" is associated with
A. Assembly and output
B. Code
generation
C. Storage
assignment
D. Syntax
analysis
E. None of the
above
29.Round-robin scheduling
A. allows
interactive tasks quicker access to the processor
B. is quite
complex to implement
C. gives each task the same chance at the processor
D. allows
processor-bound tasks more time in the processor
E. None of the
above
30.What is the name of the system which deals with the
running of the actual computer and not with the programming problems?
A. Operating
system
B. Systems program
C. Object
program
D. Source
program
E. None of the
above
31.What is the initial value of the semaphore to allow only
one of the many processes to enter their critical section?
A. 8
B. 1
C. 16
D. 0
E. None of the
above
32. Four necessary conditions for
deadlock to exist are: mutual exclusion, no-preemption, circular wait and
A. hold
and wait
B. deadlock
avoidance
C. race
around condition
D. buffer
overflow
E. None
of the above
33.If you do not know which version of MS-DOS you are
working with, which command will you use after having booted your operating
system?
A. FORMAT
command
B. DIR command
C. VER command
D. DISK command
E. None of the
above
34.A partitioned data set is most used for
A. a program or source library
B. storing
program data
C. storing
backup information
D. storing ISAM
files
E. None of the
above
35.Page-map table is
A. A data file
B. A directory
C. Used for
address translation
D. All of the
above
E. None of the
above
36.
The main function of the dispatcher (the portion of the
process scheduler) is
A. swapping a
process to the disk
B. assigning ready process to the CPU
C. suspending
some of the processes when the CPU load is high
D. bring
processes from the disk to the main memory
E. None of the
above
37.The errors that can be pointed out by the compiler are
A. Syntax errors
B. Semantic
errors
C. Logical
errors
D. Internal
errors
E. None of the
above
38.When a computer is first turned on or restarted, a
special type of absolute loader is executed, called a
A. "Compile
and Go" loader
B. Boot loader
C. Bootstrap loader
D. Relating
loader
E. None of the
above
39. Which, of the following checks, cannot be carried out on
the input data to a system?
A. consistency
check
B. Syntax check
C. Range check
D. All of the
above
E. None of the
above
40. A program that converts a high-level language program to
a set of instructions that can run on a computer is called a
A. Compiler
B. Debugger
C. Editor
D. All of the
above
E. None of the
above
41. Which of the following is characteristic of an operating
system?
A. resource
management
B. error
recovery
C. memory
management
D. All the above
E. None of the
above
42.In MS-DOS, relocatable object files and load modules have
extensions
A. .OBJ and .COM or .EXE, respectively
B. .COM and
.OBJ, respectively
C. .EXE and
.OBJ, respectively
D. .DAS and
.EXE, respectively
E. None of the
above
43.The state transition initiated by the user process itself
in an operating system is
A. block
B. dispatch
C. wake up
D. timer run out
E. None of the
above
44.Which of the following program is not a utility?
A. Debugger
B. Editor
C. Spooler
D. All of the
above
E. None of the
above
45.The function(s) of file system is (are):
A. to provide
complete file naming freedom to the users and to permit controlled sharing of
files
B. to provide
for long and short term storage of files with appropriate economic tradeoffs.
C. to provide
security against loss of information due to system failure
D. all of the above
E.
None of the above
46.A public key encryption system
A. allows anyone
to decode the transmission
B. allows only
the correct sender to decode the data
C. allows only the correct receiver to decode the data
D. does not
encode the data before transmitting it
E. None of the
above
47.Feed back queue
A. are very easy
to implement
B. dispatch tasks according to execution characteristics
C. are used to
favor real-time tasks
D. require
manual intervention to implement properly
E. None of the
above
48.In which addressing mode the operand is given explicitly
in the instruction?
A. absolute mode
B. immediate mode
C. indirect mode
D. index mode
E. None of the
above
49.The technique, for sharing the time of a computer among
several jobs. Which switches jobs so rapidly such that each job appears to have
the computer to itself:
A. time
sharing
B. time out
C. time domain
D. FIFO
E. None of the
above
1. Capacity planning
A. requires
detailed system performance information
B. is independent of the operating system
C. does not
depend on the monitoring tools available
D. is not needed
in small installations
E. None of the
above
2.Poor response times are caused by
A. Processor
busy
B. High I/O rate
C. High paging
rates
D. Any of the above
E. None of the
above
3. Link encryption
A. is more
secure than end-to-end encryption
B. is less secure than end-to-end encryption
C. can not be
used in a public network
D. is used only
to debug
E. None of the
above
4.A form of code that uses more than one process and
processor, possibly of different type, and that may on occasions have more than
one process or processor active at the same time, is known as
A. multiprogramming
B. multi threading
C. broadcasting
D. time sharing
E. None of the
above
5.The table created by lexical analysis to describe all
literals used in the source program, is
A. Terminal
table
B. Literal table
C. Identifier
table
D. Reductions
E. None of the
above
6.The term 'polling' in a computer means a process by which
a computer system
A. detects/corrects
errors
B. multiplexes
the inputs and updates the memory accordingly
C. decides
correct alternative by analysing several ones
D. inquires to see if a terminal has any transaction to send
E. None of the
above
7 In which addressing mode, the address of the location of
the operand is given explicitly as a part of the instruction.
A. absolute mode
B. immediate
mode
C. index mode
D. modulus mode
E. None of the
above
8.Under virtual
storage,
A. a single
program is processed by two or more CPUs
B. two or more
programs are stored concurrently in primary storage
C. only the active pages of a program are stored in primary storage
D. interprogram
interference may occur
E. None of the
above
9. A base register
table
A. allows the
programmer to write base registers and displacements explicitly in the source
program.
B. is used to
remember which of the general-purpose registers are currently available as base
registers, and what base addresses they contain.
C. allows
multiple programs to reside in separate areas of core at the same time.
D. is a term
that refers to the control programs of an operating system.
E. None of the
above
10.File record length
A. should always
be fixed
B. Should always
be variable
C. depends upon
the size of the file
D. should be
chosen to match the data characteristics
E. None of the
above
11. A relationship between processes such that each has some
part (critical section) which must not be executed while the critical section
of another is being executed, is known as
A. semaphore
B. mutual exclusion
C. multiprogramming
D. multitasking
E. None of the
above
12. What is the name
of the operating system which was originally designed by scientists and
engineers for use by scientists and engineers?
A. XENIX
B. UNIX
C. OS/2
D. MS DOS
E. None of the
above
13. The most common
security failure is
A. carelessness by users
B. depending on
passwords
C. too much
emphasis on preventing physical access
D. insufficient
technology used to prevent breaches
E. None of the
above
14.Terminal Table
A. contains all
constants in the program
B. a permanent
table of decision rules in the form of patterns for matching with the uniform
symbol table to discover syntactic structure.
C. consists of a
full or partial list of the token's as they appear in the program. Created by
Lexical analysis and used for syntax analysis and interpretation
D. a permanent
table which lists all key words and special symbols of the language in symbolic
form.
E. None of the
above
15.Block or buffer
caches are used
A. to improve disk performance
B. to handle
interrupts
C. to increase
the capacity of main memory
D. to speed up
main memory read operation
E. None of the
above
16. The practice of "bundling" refers to
A. selling
computers alone
B. selling
peripheral devices with computer
C. selling
software to run on computers
D. giving away software with a computer purchase
E. None of the
above
17. Special software to create a job queue is called a
A. Drive
B. Spooler
C. Interpreter
D. Linkage
editor
E. None of the
above
18. All the time a computer is switched on, its operating
system software has to stay in
A. main storage
B. primary storage
C. floppy disk
D. disk drive
E. None of the
above
19. Can you name of the major Operating System used in
computers?
A. MS DOS
B. OS/2
C. UNIX
D. All of the above
E. None of the
above
20. Which of the following is not an advantage of
multiprogramming?
A. increased
throughput
B. shorter
response time
C. decreased operating-system overhead
D. ability to
assign priorities to jobs
E. None of the
above
21. Virtual Memory
A. is a method
of memory allocation by which the program is subdivided into equal portions, or
pages and core is subdivided into equal portions or blocks.
B. consists of
those addresses that may be generated by a processor during execution of a
computation.
C. is a method
of allocating processor time.
D. allows
multiple programs to reside in separate areas of core at the time.
E. None of the
above
22. In a magnetic disk, data is recorded in a set of
concentric tracks which are subdivided into
A. periods
B. sectors
C. zones
D. groups
E. None of the
above
23.The total time to prepare a disk drive mechanism for a
block of data to be read from it is
A. latency
B. latency plus
transmission time
C. latency plus seek time
D. latency plus
seek time plus transmission time
E. None of the
above
24.Part of a program where the shared memory is accessed and
which should be executed invisibly, is called
A. semaphores
B. directory
C. critical section
D. mutual
exclusion
E. None of the above
25. Indicate which,
of the following, is not true about Nassi-Shneiderman charts
A. These charts
are type of graphical design tool
B. These charts cannot represent CASE constructs
C. These charts
can represent three fundamental control structures
D. All of the
above
E. None of the
above
26. What is the
name of the operating system that reads and reacts in terms of actual time.
A. Batch system
B. Quick
response system
C. Real time system
D. Time sharing
system
E. None of the
above
27. An incremental
backup
A. should be
done each month
B. uses more
tapes
C. saves all
files
D. saves only files that have recently changed
E. None of the
above
28. The powerful text editor called PC-Write can be used by
anybody by paying a small fee. Such programs are called
A. Software
B. Shareware
C. Firmware
D. Mindware
E. None of the
above
29. The disadvantages of "Compile and Go" loading
scheme is (are):
A. a portion of
memory is wasted because the core occupied by the assembler is unavailable to
the object program.
B. it is
necessary to retranslate the user's program deck every time it is run.
C. it is very
difficult to handle multiple segments, especially if the source programs are in
different languages, and to produce orderly modular programs.
D. all of the above
E. None of the
above
30. The operating system of a computer serves as a software
interface between the user and
A. hardware
B. peripheral
C. memory
D. screen
E. None of the
above
31. Which of the following statement is true.
A. The LRU
algorithm pages out pages that have been used recently
B. Thrashing is
a natural consequence of virtual memory systems.
C. Seek
analysis is used for analysing control-unit busy problems.
D. All of the
above
E. None of the
above
32. Which of the following is a phase of a compilation
process
A. Lexical
analysis
B. Code
generation
C. Both of the above
D. Static
analysis
E. None of the
above
33.Which are the most important features of Microsoft
Windows program?
A. Windows
B. Pull-down
menus
C. Icons
D. All of the above
E. None of the
above
34.Which of the following system program forgoes the
production of object code to generate absolute machine code and load it into
the physical main storage location from which it will be executed immediately
upon completion of the assembly?
A. two pass
assembler
B. load-and-go assembler
C. macroprocessor
D. compiler
E. None of the
above
35.Virtual memory is
A. simple to
implement
B. used in all major commercial operating systems
C. less
efficient in utilization of memory
D. useful when
fast I/O devices are not available
E. None of the
above
36.Object code
A. is ready to
execute
B. is the output
of compilers, but not assemblers
C. must be
"loaded" before execution
D. must be rewritten before execution
E. None of the
above
37.The term "operating system" means
A. a set of programs which controls computer working
B. the way a
computer operator works
C. conversion of
high level language into machine code
D. the way a
floppy disk drive operates
E. None of the
above
38.Which of the following might be used to convert
high-level language instructions into machine language?
A. system
software
B. applications
software
C. an operating
environment
D. an interpreter
E. None of the
above
39.Indicate which is a pre-emptive scheduling algorithm
A. Round-robin
B. Shortest-job-next
C. Priority-based
D. All of the
above
E. None of the
above
40.Which of the following, is necessary to work on a
computer
A. Compiler
B. Operating system
C. Assembly
D. Interpreter
of the above
E. None of the
above
41.Access time is the highest in the case of
A. floppy disk
B. cache
C. swapping
devices
D. magnetic disk
E. None of the
above
42.Which of the following is not a characteristic of a daisy
chaining priority control scheme?
A. priority is programmable
B.it is relatively easy to add more devices to the chain
C. the failure
of one device may affect other devices on the chain
D.the number of control lines is independent of the number
of devices on the chain
E. None of the
above
43.Assembler is
A. a program
that places programs into memory and prepares them for execution.
B. a program
that automate the translation of assembly language into machine language.
C. a program
that accepts a program written in a high level language and produces an object
program.
D. is a program
that appears to execute a source program as if it were machine language.
E. None of the
above
44.Indicate which, of the following, in not true about an
interpreter
A. Interpreter generates an object program from the source program
B. Interpreter
is a kind of translator
C. Interpreter
analyses each source statement every time it is to be executed
D. All of the
above
E. None of the
above
45.Object modules generated by assemblers that contain
unresolved external references are resolved for two or more object modules by
a/an
A. operating
system
B. loader
C. linker
D. compiler
E. None of the
above
46.The advantage of a command processor running only
built-in commands is:
A. flexibility
to the users in running lists of commands by simply collecting them in named
batch command files
B. the command set being common across different hardware configurations
C. users can
create system programs and run them as commands
D. the
processing is much faster than would other-wise be the case when user defined
commands are used
E. None of the
above
47Under multiprograming, turnaround time for short jobs is
usually _____ and that for long jobs is slightly _____.
A. lengthened;
shortened
B. shortened; lengthened
C. shortened;
shortened
D. lengthened;
lengthened
E. None of the
above
48.The most common systems security method is
A. passwords
B. encryption
C. firewall
D. all of the
above
E. None of the
above
49. Two basic types of operating systems are:
A. sequential
and direct
B. batch and
timesharing
C. sequential
and realtime
D. batch and
interactive.
E. None of the
above
50. Daisy chain is a device for
A. connecting a
number of controllers to a device
B. connecting a number of devices to a controller
C. interconnecting
a number of devices to a number of controllers
D. all of the
above
E. None of the
above
1. In analyzing the compilation of PL/I program, the term
"Machine independent optimization" is associated with
A. recognition
of basic syntactic constructs through reductions.
B. recognition
of basic elements and creation of uniform symbols.
C. creation of
more optional matrix.
D. use of macro processor to produce more optimal assembly code
E. None of the
above
2.An instruction in a programming language that is replaced
by a sequence of instructions prior to assembly or compiling is known as
A. procedure
name
B. macro
C. label
D. literal
E. None of the
above
3. A program
A. is a device
that performs a sequence of operations specified by instructions in memory.
B. is the device
where information is stored
C. is a sequence of instructions
D. is typically characterized
by interactive processing and time of the CPU's time to allow quick response to
each user.
E. None of the
above
4.A self-relocating
program is one which
A. cannot be
made to execute in any area of storage other than the one designated for it at
the time of its coding or translation.
B. consists of a
program and relevant information for its relocation.
C. can itself
performs the relocation of its address-sensitive portions.
D. All of the
above
E. None of the
above
5.Banker's algorithm for resource allocation deals with
A. deadlock
prevention
B. deadlock avoidance
C. deadlock
recovery
D. mutual
exclusion
E. None of the
above
6.A sequence of instructions, in a computer language, to get
the desired result, is known as
A. Algorithm
B. Decision Table
C. Program
D. All of the
above
E. None of the
above
7.Which, of the Allowing, is true for testing and debugging?
A. Testing
checks for logical errors in the programs, while debugging is a process of
correcting those errors in the program
B. Testing detects
the syntax errors in the program while debugging corrects those errors in the
program
C.Testing and debugging indicate the same
thing
D. All of the
above
E. None of the
above
8.Information in a memory that is no longer valid or wanted
is known as
A. non-volatile
B. volatile
C. surplus
D. garbage
E. None of the
above
9. Which of the following filename extension suggests that
the file is a backup copy of another file?
A. TXT
B. COM
C. BAS
D. BAK
E. None of the
above
10.Relocation bits used by relocating loader are specified
(generated) by
A. Relocating
loader itself
B. Linker
C. Assembler or
translator
D. Macro
processor
E. None of the
above
11. Which of the following statements is false?
A. a process
scheduling algorithm is preemptive if the CPU can be forcibly removed from a
process
B. time sharing
systems generally use preemptive CPU scheduling
C. response time
are more predictable in preemptive systems than in non preemptive systems
D. real time systems generally use non-preemptive CPU scheduling
E. None of the
above
12.Nonmodifiable procedures are called
A. serially
usable procedures
B. concurrent
procedures
C. reentrant procedures
D. topdown
procedures
E. None of the
above
13.The instruction register
A. is a hardware
memory device which denotes the location of the current instruction being
executed.
B. is a group
of electrical circuits (hardware), that performs the intent of instructions
fetched from memory.
C. contains the
address of the memory location that is to be read from or stored into.
D. contains a
copy of the designated memory location specified by the MAR after a
"read" or the new contents of the memory prior to a
"write".
E. None of the
above
14.Which of the following scheduling objectives should be
applied to the following: the system should admit jobs to create a mix that
will keep most devices busy
A. to be fair
B. to balance resource utilization
C. to obey
priorities
D. to be
predictable
E. None of the
above
15.Multiprogramming systems:
A. are easier to
develop than single programming system
B. execute each
job faster
C. execute more jobs in the same time period
D. are used only
on large mainframe computers
E. None of the
above
16. Backups should be done
A. daily for
most installations
B. weekly for
most installations
C. as several
image copies, followed by an incremental
D. as several incrementals, followed by an image copy
E. None of the
above
17.In an absolute loading scheme, which loader function is
accomplished by assembler.
A. Reallocation
B. Allocation
C. Linking
D. Loading
E. None of the
above
18. The command interpreter
A. is usually the primary user interface
B. requires
fixed format commands
C. is menu drive
D. is quite
different from the SCL interpreter
E. None of the
above
19.A task in a blocked state
A. is executable
B. is running
C. must still be
placed in the run queues
D. is waiting for same temporarily unavailable resources
E. None of the
above
20.System maintenance:
A. is usually
not necessary
B. is necessary on all systems, regardless of how good
C. is not
required if the system is well written
D. always
requires several programs
E.
None of the above
22.A linker
A. creates a load module
B. is not
necessary with variable partitions
C. must be run
after the loader
D. is not needed
with a good compiler
E. None of the
above
23.Uniform Symbols Table
A. contains all
constants in the program
B. a permanent
table of decision rules in the form of patterns for matching with the uniform
symbol table to discover syntactic structure.
C. consists of
a full or partial list of the token's as they appear in the program. Created by
Lexical analysis and used for syntax analysis and interpretation
D. a permanent
table which lists all key words and special symbols of the language in symbolic
form.
E. None of the
above
24. In which of the storage placement strategies a program
is placed in the smallest available hole in the main memory?
A. best fit
B. first fit
C. worst fit
D. buddy
E. None of the
above
25. In which addressing mode, the effective address of the
operand is generated by adding a constant value to the contents of register?
A. absolute mode
B. indirect mode
C. immediate
mode
D. index mode
E. None of the
above
26. The higher versions of the operating systems are so
written that programs designed for earlier versions can still be run. What is it
called?
A. Upgradability
B. Upward
mobility
C. Universality
D. Upward compatibility
E. None of the
above
View Answer Workspace Report Discuss in Forum
27.
If special forms are needed for printing the output, the
programmer specifies these forms through?
A. JCL
B. JPL
C. Utility
programs
D. Load modules
E. None of the
above
View Answer Workspace Report Discuss in Forum
28.
Which policy replace a page if it is not in the favoured
subset of a process's pages?
A. FIFO
B. LRU
C. LFU
D. Working set
E. None of the
above
View Answer Workspace Report Discuss in Forum
29.
Which of the following can be accesses by transfer vector
approach of linking?
A. External data
segments
B. External subroutines
C. Data located
in other procedures
D. All of the
above
E. None of the
above
View Answer Workspace Report Discuss in Forum
30.
Which of the following terms refers to the degree to which
data in a database system are accurate and correct?
A. data security
B. data validity
C. data
independence
D. data integrity
E. None of the
above
31.
In analyzing the compilation of PL/I program, the term
"Syntax analysis" is associated with
A. recognition
of basic syntactic constructs through reductions.
B. recognition
of basic elements and creation of uniform symbols
C. creation of
more optional matrix.
D. use of macro
processor to produce more optimal assembly code
E. None of the
above
View Answer Workspace Report Discuss in Forum
32.
A hardware device that is capable of executing a sequence of
instructions, is known as
A. CPU
B. ALU
C. CU
D. Processor
E. None of the
above
View Answer Workspace Report Discuss in Forum
33.
Which of following is/are the advantage(s) of modular
programming?
A. The program is much easier to change
B. Modules can
be reused in other programs
C. Easy
debugging
D. Easy to
compile
E. None of the
above
View Answer Workspace Report Discuss in Forum
34.
The function(s) performed by the paging software is (are)
A. Implementation
of the access environment for all programs in the system
B. Management of
the physical address space
C. Sharing and
protection
D. All of the above
E. None of the
above
View Answer Workspace Report Discuss in Forum
35.
A compiler for a high-level language that runs on one
machine and produces code for a different machine is called is
A. optimizing
compiler
B. one pass
compiler
C. cross compiler
D. multipass
compiler
E. None of the
above
36.
A critical region is
A. a program
segment that has not been proved bug-free
B. a program
segment that often causes unexpected system crashes
C. a program
segment where shared resources are accessed
D. one which is enclosed by a pair of P and V operations on semaphores
E. none is the
above
View Answer Workspace Report Discuss in Forum
37.
Assembler language
A. is usually
the primary user interface
B. requires
fixed-format commands
C. is a mnemonic form of machine language
D. is quite
different from the SCL interpreter
E. None of the
above
View Answer Workspace Report Discuss in Forum
38.
The primary job of the operating system of a computer is to
A. command
resources
B. manage resources
C. provide
utilities
D. be user
friendly
E. None of the
above
View Answer Workspace Report Discuss in Forum
39.
Which of the following is a measure to test how good or bad
a modular design is
A. Module strength
B. Module
coupling
C. Static
analysis
D. All of the
above
E. None of the
above
View Answer Workspace Report Discuss in Forum
40.
The Operating system manages
A. Memory
B. Processor
C. Disks and I/O
devices
D. All of the above
E. None of the
above
41.
The primary purpose of an operating system is to:
A. make computer easier to use
B. keep system
programmers employed
C. make the most
efficient use of the hardware
D. allow people
to sue the computers
E. None of the
above
View Answer Workspace Report Discuss in Forum
42.
Which of the following is true about pseudocode
A. A machine
language
B. An assembly
language
C. A high-level
language
D. All of the
above
E. None of the above
View Answer Workspace Report Discuss in Forum
43.
The principles of structured programming forbid the use of
A. WHILE-DO
B. GOTO
C. IF-THEN-ELSE
D. DO-WHILE
E. None of the
above
View Answer Workspace Report Discuss in Forum
44.
Which of the following capabilities is required for a system
program to execute more than one program at a time?
A. word
processing
B. compiling
C. virtual
memory
D. multitasking
E. None of the
above

0 Comments