Sunteți pe pagina 1din 14

1. Capacity planning A. B. C. D. E.

requires detailed system performance information is independent of the operating system does not depend on the monitoring tools available is not needed in small installations None of the above

Answer: Option B

2.

Poor response times are caused by A. B. C. D. E. Processor busy High I/O rate High paging rates Any of the above None of the above

Answer: Option D Explanation:

3.

Link encryption A. B. C. D. E. is more secure than end-to-end encryption is less secure than end-to-end encryption can not be used in a public network is used only to debug None of the above

Answer: Option B

4.

A form of code that uses more than one process and processor, possibly of different type, and that may on occasions have more than one process or processor active at the same time, is known as A. B. C. D. E. multiprogramming multi threading broadcasting time sharing None of the above

Answer: Option B

5.

The table created by lexical analysis to describe all literals used in the source program, is A. B. C. D. E. Terminal table Literal table Identifier table Reductions None of the above

Answer: Option B 6. The term 'polling' in a computer means a process by which a computer system A. B. C. D. E. detects/corrects errors multiplexes the inputs and updates the memory accordingly decides correct alternative by analysing several ones inquires to see if a terminal has any transaction to send None of the above

Answer: Option D

7.

In which addressing mode, the address of the location of the operand is given explicitly as a part of the instruction. A. B. C. D. E. absolute mode immediate mode index mode modulus mode None of the above

Answer: Option A

8.

Under virtual storage, A. B. C. D. E. a single program is processed by two or more CPUs two or more programs are stored concurrently in primary storage only the active pages of a program are stored in primary storage interprogram interference may occur None of the above

Answer: Option C

9.

A base register table A. B. C. D. E. allows the programmer to write base registers and displacements explicitly in the source program. is used to remember which of the general-purpose registers are currently available as base registers, and what base addresses they contain. allows multiple programs to reside in separate areas of core at the same time. is a term that refers to the control programs of an operating system. None of the above

Answer: Option B

10. File record length A. B. C. D. E. should always be fixed Should always be variable depends upon the size of the file should be chosen to match the data characteristics None of the above

Answer: Option D 11. A relationship between processes such that each has some part (critical section) which must not be executed while the critical section of another is being executed, is known as A. B. C. D. E. semaphore mutual exclusion multiprogramming multitasking None of the above

Answer: Option B

12. What is the name of the operating system which was originally designed by scientists and engineers for use by scientists and engineers? A. B. C. XENIX UNIX OS/2

D. E.

MS DOS None of the above

Answer: Option B

13. The most common security failure is A. B. C. D. E. carelessness by users depending on passwords too much emphasis on preventing physical access insufficient technology used to prevent breaches None of the above

Answer: Option A

14. Terminal Table A. B. C. D. E. contains all constants in the program a permanent table of decision rules in the form of patterns for matching with the uniform symbol table to discover syntactic structure. consists of a full or partial list of the token's as they appear in the program. Created by Lexical analysis and used for syntax analysis and interpretation a permanent table which lists all key words and special symbols of the language in symbolic form. None of the above

Answer: Option D 15. Block or buffer caches are used A. B. C. D. E. to improve disk performance to handle interrupts to increase the capacity of main memory to speed up main memory read operation None of the above

Answer: Option A 16. The practice of "bundling" refers to A. B. selling computers alone selling peripheral devices with computer

C. D. E.

selling software to run on computers giving away software with a computer purchase None of the above

Answer: Option D

17. Special software to create a job queue is called a A. B. C. D. E. Drive Spooler Interpreter Linkage editor None of the above

Answer: Option B 18. All the time a computer is switched on, its operating system software has to stay in A. B. C. D. E. main storage primary storage floppy disk disk drive None of the above

Answer: Option B

19. Can you name of the major Operating System used in computers? A. B. C. D. E. MS DOS OS/2 UNIX All of the above None of the above

Answer: Option D

20. Which of the following is not an advantage of multiprogramming? A. B. increased throughput shorter response time

C. D. E.

decreased operating-system overhead ability to assign priorities to jobs None of the above

Answer: Option C 21. Virtual Memory A. B. C. D. E. is a method of memory allocation by which the program is subdivided into equal portions, or pages and core is subdivided into equal portions or blocks. consists of those addresses that may be generated by a processor during execution of a computation. is a method of allocating processor time. allows multiple programs to reside in separate areas of core at the time. None of the above

Answer: Option B

22. In a magnetic disk, data is recorded in a set of concentric tracks which are subdivided into A. B. C. D. E. periods sectors zones groups None of the above

Answer: Option B

23. The total time to prepare a disk drive mechanism for a block of data to be read from it is A. B. C. D. E. latency latency plus transmission time latency plus seek time latency plus seek time plus transmission time None of the above

Answer: Option C

24. Part of a program where the shared memory is accessed and which should be executed invisibly, is called

A. B. C. D. E.

semaphores directory critical section mutual exclusion None of the above

Answer: Option C

25. Indicate which, of the following, is not true about Nassi-Shneiderman charts A. B. C. D. E. These charts are type of graphical design tool These charts cannot represent CASE constructs These charts can represent three fundamental control structures All of the above None of the above

Answer: Option B 26. 26. What is the name of the operating system that reads and reacts in terms of actual time. A. B. C. Batch system Quick response system Real time system

D. Time sharing system E. None of the above

Answer: Option C 27. An incremental backup A. B. C. D. E. should be done each month uses more tapes saves all files saves only files that have recently changed None of the above

Answer: Option D

28. The powerful text editor called PC-Write can be used by anybody by paying a small fee. Such programs are called A. B. C. D. E. Software Shareware Firmware Mindware None of the above

Answer: Option B

29. The disadvantages of "Compile and Go" loading scheme is (are): A. B. C. D. E. a portion of memory is wasted because the core occupied by the assembler is unavailable to the object program. it is necessary to retranslate the user's program deck every time it is run. it is very difficult to handle multiple segments, especially if the source programs are in different languages, and to produce orderly modular programs. all of the above None of the above

Answer: Option D

30. The operating system of a computer serves as a software interface between the user and A. B. C. D. E. hardware peripheral memory screen None of the above

Answer: Option A

31. Which of the following statement is true. A. B. C. D. E. The LRU algorithm pages out pages that have been used recently Thrashing is a natural consequence of virtual memory systems. Seek analysis is used for analysing control-unit busy problems. All of the above None of the above

Answer: Option C

32. Which of the following is a phase of a compilation process A. B. C. D. E. Lexical analysis Code generation Both of the above Static analysis None of the above

Answer: Option C

33. Which are the most important features of Microsoft Windows program? A. B. C. D. E. Windows Pull-down menus Icons All of the above None of the above

Answer: Option D

34. Which of the following system program forgoes the production of object code to generate absolute machine code and load it into the physical main storage location from which it will be executed immediately upon completion of the assembly? A. B. C. D. E. two pass assembler load-and-go assembler macroprocessor compiler None of the above

Answer: Option B

35. Virtual memory is A. B. C. simple to implement used in all major commercial operating systems less efficient in utilization of memory

D. E.

useful when fast I/O devices are not available None of the above

Answer: Option B 36. Object code A. B. C. D. E. is ready to execute is the output of compilers, but not assemblers must be "loaded" before execution must be rewritten before execution None of the above

Answer: Option C

37. The term "operating system" means A. B. C. D. E. a set of programs which controls computer working the way a computer operator works conversion of high level language into machine code the way a floppy disk drive operates None of the above

Answer: Option A

38. Which of the following might be used to convert high-level language instructions into machine language? A. B. C. D. E. system software applications software an operating environment an interpreter None of the above

Answer: Option D

39. Indicate which is a pre-emptive scheduling algorithm A. B. Round-robin Shortest-job-next

C. D. E.

Priority-based All of the above None of the above

Answer: Option A

40. Which of the following, is necessary to work on a computer A. B. C. D. E. Compiler Operating system Assembly Interpreter of the above None of the above

Answer: Option B

41. Access time is the highest in the case of A. B. C. D. E. floppy disk cache swapping devices magnetic disk None of the above

Answer: Option D

42. Which of the following is not a characteristic of a daisy chaining priority control scheme? A. B. C. D. E. priority is programmable it is relatively easy to add more devices to the chain the failure of one device may affect other devices on the chain the number of control lines is independent of the number of devices on the chain None of the above

Answer: Option A

43. Assembler is A. a program that places programs into memory and prepares them for execution.

B. C. D. E.

a program that automate the translation of assembly language into machine language. a program that accepts a program written in a high level language and produces an object program. is a program that appears to execute a source program as if it were machine language. None of the above

Answer: Option B

44. Indicate which, of the following, in not true about an interpreter A. B. C. D. E. Interpreter generates an object program from the source program Interpreter is a kind of translator Interpreter analyses each source statement every time it is to be executed All of the above None of the above

Answer: Option A

45. Object modules generated by assemblers that contain unresolved external references are resolved for two or more object modules by a/an A. B. C. D. E. operating system loader linker compiler None of the above

Answer: Option C

46. The advantage of a command processor running only built-in commands is: A. B. C. D. E. flexibility to the users in running lists of commands by simply collecting them in named batch command files the command set being common across different hardware configurations users can create system programs and run them as commands the processing is much faster than would other-wise be the case when user defined commands are used None of the above

Answer: Option B

47. Under multiprograming, turnaround time for short jobs is usually _____ and that for long jobs is slightly _____. A. B. C. D. E. lengthened; shortened shortened; lengthened shortened; shortened lengthened; lengthened None of the above

Answer: Option B

48. The most common systems security method is A. B. C. D. E. passwords encryption firewall all of the above None of the above

Answer: Option A

49. Two basic types of operating systems are: A. B. C. D. E. sequential and direct batch and timesharing sequential and realtime batch and interactive. None of the above

Answer: Option D

50. Daisy chain is a device for A. B. C. D. E. connecting a number of controllers to a device connecting a number of devices to a controller interconnecting a number of devices to a number of controllers all of the above None of the above

Answer: Option B

S-ar putea să vă placă și