1. In analyzing the compilation of PL/I program, the term "Machine independent optimization" is associated with
A.
recognition of basic syntactic constructs through reductions.
B.
recognition of basic elements and creation of uniform symbols.
C. creation of more optional matrix.
D.
use of macro processor to produce more optimal assembly code
E. None of the above
Answer & Explanation
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
View Answer Workspace Report Discuss in Forum
2. An instruction in a programming language that is replaced by a sequence of instructions prior to assembly or compiling is known as
A. procedure name
B. macro
C. Label
D. Literal
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
3. A program
A.
is a device that performs a sequence of operations specified by instructions in memory.
B. is the device where information is stored
C. is a sequence of instructions
D.
is typically characterized by interactive processing and time of the CPU's time to allow quick response to each user.
E. None of the above
Answer & Explanation
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
4. A self-relocating program is one which
A.
cannot be made to execute in any area of storage other than the one designated for it at the time of its coding or translation.
B.
consists of a program and relevant information for its relocation.
C.
can itself performs the relocation of its addresssensitive portions.
D. All of the above
E. None of the above
Answer & Explanation
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
5. Banker's algorithm for resource allocation deals with
deadlock prevention
B. deadlock avoidance
C. deadlock recovery
D. mutual exclusion
E. None of the above
Answer & Explanation
Answer: Option B
6. A sequence of instructions, in a computer language, to get the desired result, is known as
A. Algorithm
B. Decision Table
C. Program
D. All of the above
E. None of the above
Answer & Explanation
Answer: Option C
7. Which, of the following, is true for testing and debugging?
A.
Testing checks for logical errors in the programs, while debugging is a process of correcting those errors in the program
B.
Testing detects the syntax errors in the program while debugging corrects those errors in the program
C. Testing and debugging indicate the same thing
D. All of the above
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
8. Information in a memory that is no longer valid or wanted is known as
A. non-volatile
B. volatile
C. surplus
D. garbage
E. None of the above
Answer & Explanation
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
View Answer Workspace Report Discuss in Forum
9. Which of the following filename extension suggests that the file is a backup copy of another file?
A. TXT
B. COM
C. BAS
D. BAK
E. None of the above
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
10. Relocation bits used by relocating loader are specified (generated) by
A. Relocating loader itself
B. Linker
C. Assembler or translator
D. Macro processor
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
11. Which of the following statements is false?
A.
a process scheduling algorithm is preemptive if the CPU can be forcibly removed from a process
B.
time sharing systems generally use preemptive CPU scheduling
C.
response time are more predictable in preemptive systems than in non preemptive systems
D.
real time systems generally use non-preemptive CPU scheduling
E. None of the above
Answer & Explanation
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
12. Nonmodifiable procedures are called
A. serially usable procedures
B. concurrent procedures
C. reentrant procedures
D. topdown procedures
E. None of the above
Answer & Explanation
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
13. The instruction register
A.
is a hardware memory device which denotes the location of the current instruction being executed.
B.
is a group of electrical circuits (hardware), that performs the intent of instructions fetched from memory.
C.
contains the address of the memory location that is to be read from or stored into.
D.
contains a copy of the designated memory location specified by the MAR after a "read" or the new contents of the memory prior to a "write".
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
14. Which of the following scheduling objectives should be applied to
the following: the system should admit jobs to create a mix that will keep most devices busy
A. to be fair
B. to balance resource utilization
C. to obey priorities
D. to be predictable
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
15. Multiprogramming systems:
A. are easier to develop than single programming system
B. execute each job faster
C. execute more jobs in the same time period
D. are used only on large mainframe computers
E. None of the above
Answer & Explanation
Answer: Option C .
16. Backups should be done
A. daily for most installations
B. weekly for most installations
C. as several image copies, followed by an incremental
D. as several incrementals, followed by an image copy
E. None of the above
Answer & Explanation
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
17. In an absolute loading scheme, which loader function is accomplished by assembler.
A. Reallocation
B. Allocation
C. Linking
D. Loading
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
18. The command interpreter
A. is usually the primary user interface
B. requires fixed format commands
C. is menu drive
D. is quite different from the SCL interpreter
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
19. A task in a blocked state
A. is executable
B. is running
C. must still be placed in the run queues
D. is waiting for same temporarily unavailable resources
E. None of the above
Answer & Explanation
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
20. System maintenance:
A. is usually not necessary
B. is necessary on all systems, regardless of how good
C. is not required if the system is well written
D. always requires several programs
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
21. Which of the following statements is not true about the FORTRAN language?
A. FORTRAN is a high level language
B.
A FORTRAN program, written for the IBM-PC, is totally different from a FORTRAN program written for execution on the SUN machine
C.
FORTRAN is extensively used to write programs for performing scientific computations
D. All of the above
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
22. A linker
A. creates a load module
B. is not necessary with variable partitions
C. must be run after the loader
D. is not needed with a good compiler
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
23. Uniform Symbols Table
A. contains all constants in the program
B.
a permanent table of decision rules in the form of patterns for matching with the uniform symbol table to discover syntactic structure.
C.
consists of a full or partial list of the token's as they appear in the program. Created by Lexical analysis and used for syntax analysis and interpretation
D. a permanent table which lists all key words and special symbols of the language in symbolic form.
E. None of the above
Answer & Explanation
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
24. In which of the storage placement strategies a program is placed in the smallest available hole in the main memory?
A. best fit
B. first fit
C. worst fit
D. buddy
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
25. In which addressing mode, the effective address of the operand is generated by adding a constant value to the contents of register?
A. absolute mode
B. indirect mode
C. immediate mode
D. index mode
E. None of the above
Answer & Explanation
Answer: Option D
Explanation:
26. The higher versions of the operating systems are so written that programs designed for earlier versions can still be run. What is it called?
A. Upgradability
B. Upward mobility
C. Universality
D. Upward compatibility
E. None of the above
Answer & Explanation
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
27. If special forms are needed for printing the output, the programmer specifies these forms through?
A. JCL
B. JPL
C. Utility programs
D. Load modules
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
28. Which policy replace a page if it is not in the favoured subset of a
process's pages?
A. FIFO
B. LRU
C. LFU
D. Working set
E. None of the above
Answer & Explanation
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
29. Which of the following can be accesses by transfer vector approach of linking?
A. External data segments
B. External subroutines
C. Data located in other procedures
D. All of the above
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
30. Which of the following terms refers to the degree to which data in a database system are accurate and correct?
A. data security
B. data validity
C. data independence
D. data integrity
E. None of the above
Answer & Explanation
Answer: Option D
Explanation:
31. In analyzing the compilation of PL/I program, the term "Syntax analysis" is associated with
A.
recognition of basic syntactic constructs through reductions.
recognition of basic elements and creation of uniform symbols
C. creation of more optional matrix.
D.
use of macro processor to produce more optimal assembly code
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
32. A hardware device that is capable of executing a sequence of instructions, is known as
A. CPU
B. ALU
C. CU
D. Processor
E. None of the above
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
33. Which of following is/are the advantage(s) of modular programming?
A. The program is much easier to change
B. Modules can be reused in other programs
C. Easy debugging
D. Easy to compile
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
34. The function(s) performed by the paging software is (are)
A. Implementation of the access environment for all
programs in the system
B. Management of the physical address space
C. Sharing and protection
D. All of the above
E. None of the above
Answer & Explanation
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
35. A compiler for a high-level language that runs on one machine and produces code for a different machine is called is
A. optimizing compiler
B. one pass compiler
C. cross compiler
D. multipass compiler
E. None of the above
Answer: Option C
Explanation:
36. A critical region is
A. a program segment that has not been proved bug-free
B.
a program segment that often causes unexpected system crashes
C.
a program segment where shared resources are accessed
D.
one which is enclosed by a pair of P and V operations on semaphores
E. none is the above
Answer & Explanation
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
37. Assembler language
A. is usually the primary user interface
B. requires fixed-format commands
C. is a mnemonic form of machine language
D. is quite different from the SCL interpreter
E. None of the above
Answer & Explanation
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
38. The primary job of the operating system of a computer is to
A. command resources
B. manage resources
C. provide utilities
D. be user friendly
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
39. Which of the following is a measure to test how good or bad a modular design is
A. Module strength
B. Module coupling
C. Static analysis
D. All of the above
E. None of the above
Answer & Explanation
Answer: Option A
40. The Operating system manages
A. Memory
B. Processor
C. Disks and I/O devices
D. All of the above
E. None of the above
Answer & Explanation
Answer: Option D
41. The primary purpose of an operating system is to:
A. make computer easier to use
B. keep system programmers employed
C. make the most efficient use of the hardware
D. allow people to sue the computers
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
42. Which of the following is true about pseudocode
A. A machine language
B. An assembly language
C. A high-level language
D. All of the above
E. None of the above
Answer & Explanation
Answer: Option E
Explanation:
43. The principles of structured programming forbid the use of
A. WHILE-DO
B. GOTO
C. IF-THEN-ELSE
D. DO-WHILE
E. None of the above
Answer & Explanation
Answer: Option B
44. Which of the following capabilities is required for a system program to execute more than one program at a time?
A. word processing
B. compiling
C. virtual memory
D. multitasking
E. None of the above
Answer & Explanation
Answer: Option D
Section 4
1. Capacity planning
A. requires detailed system performance information
B. is independent of the operating system
C. does not depend on the monitoring tools available
D. is not needed in small installations
E. None of the above
Answer & Explanation
Answer: Option B
2. Poor response times are caused by
A. Processor busy
B. High I/O rate
C. High paging rates
D. Any of the above
E. None of the above
Answer & Explanation
Answer: Option D
3. Link encryption
A. is more secure than end-to-end encryption
B. is less secure than end-to-end encryption
C. can not be used in a public network
D. is used only to debug
E. None of the above
Answer & Explanation
Answer: Option B
4. A form of code that uses more than one process and processor, possibly of different type, and that may on occasions have more than one process or processor active at the same time, is known as
A. multiprogramming
B. multi threading
C. broadcasting
D. time sharing
E. None of the above
Answer & Explanation
Answer: Option B
5. The table created by lexical analysis to describe all literals used in the source program, is
A. Terminal table
B. Literal table
C. Identifier table
D. Reductions
E. None of the above
Answer: Option B
6. The term 'polling' in a computer means a process by which a computer system
A. detects/corrects errors
B.
multiplexes the inputs and updates the memory accordingly
C. decides correct alternative by analysing several ones
D. inquires to see if a terminal has any transaction to send
E. None of the above
Answer & Explanation
Answer: Option D.
7. In which addressing mode, the address of the location of the operand is given explicitly as a part of the instruction.
A. absolute mode
B. immediate mode
index mode
D. modulus mode
E. None of the above
Answer & Explanation
Answer: Option A
8. Under virtual storage,
A. a single program is processed by two or more CPUs
B.
two or more programs are stored concurrently in primary storage
C.
only the active pages of a program are stored in primary storage
D. interprogram interference may occur
E. None of the above
Answer & Explanation
Answer: Option C
9. A base register table
A.
allows the programmer to write base registers and displacements explicitly in the source program.
B.
is used to remember which of the general-purpose registers are currently available as base registers, and what base addresses they contain.
C.
allows multiple programs to reside in separate areas of core at the same time.
D.
is a term that refers to the control programs of an operating system.
E. None of the above
Answer & Explanation
Answer: Option B
10. File record length
should always be fixed
B. Should always be variable
C. depends upon the size of the file
D. should be chosen to match the data characteristics
E. None of the above
Answer & Explanation
Answer: Option D
11. A relationship between processes such that each has some part (critical section) which must not be executed while the critical section of another is being executed, is known as
A. semaphore
B. mutual exclusion
C. multiprogramming
D. multitasking
E. None of the above
Answer & Explanation
Answer: Option B
12. What is the name of the operating system which was originally designed by scientists and engineers for use by scientists and engineers?
A. XENIX
B. UNIX
C. OS/2
D. MS DOS
E. None of the above
Answer & Explanation
Answer: Option B
13. The most common security failure is
A. carelessness by users
B. depending on passwords
C. too much emphasis on preventing physical access
D. insufficient technology used to prevent breaches
E. None of the above
Answer & Explanation
Answer: Option A
14. Terminal Table
A. contains all constants in the program
B.
a permanent table of decision rules in the form of patterns for matching with the uniform symbol table to discover syntactic structure.
C.
consists of a full or partial list of the token's as they appear in the program. Created by Lexical analysis and used for syntax analysis and interpretation
D.
a permanent table which lists all key words and special symbols of the language in symbolic form.
E. None of the above
Answer & Explanation
Answer: Option D
15. Block or buffer caches are used
A. to improve disk performance
B. to handle interrupts
C. to increase the capacity of main memory
D. to speed up main memory read operation
E. None of the above
Answer & Explanation
Answer: Option A
16. The practice of "bundling" refers to
A. selling computers alone
B. selling peripheral devices with computer
C. selling software to run on computers
D. giving away software with a computer purchase
E. None of the above
Answer & Explanation
Answer: Option D
17. Special software to create a job queue is called a
A. Drive
B. Spooler
C. Interpreter
D. Linkage editor
E. None of the above
Answer & Explanation
Answer: Option B
18. All the time a computer is switched on, its operating system software has to stay in
main storage
B. primary storage
C. floppy disk
D. disk drive
E. None of the above
Answer & Explanation
Answer: Option B
19. Can you name of the major Operating System used in computers?
A. MS DOS
B. OS/2
C. UNIX
D. All of the above
E. None of the above
Answer & Explanation
Answer: Option D
20. Which of the following is not an advantage of multiprogramming?
A. increased throughput
B. shorter response time
C. decreased operating-system overhead
D. ability to assign priorities to jobs
E. None of the above
Answer & Explanation
Answer: Option C
21. Virtual Memory
A.
is a method of memory allocation by which the program is subdivided into equal portions, or pages and core is subdivided into equal portions or blocks.
B.
consists of those addresses that may be generated by a processor during execution of a computation.
C.
is a method of allocating processor time.
D.
allows multiple programs to reside in separate areas of core at the time.
E. None of the above
Answer & Explanation
Answer: Option B
22. In a magnetic disk, data is recorded in a set of concentric tracks which are subdivided into
A. periods
B. sectors
C. zones
D. groups
E. None of the above
Answer & Explanation
Answer: Option B
23. The total time to prepare a disk drive mechanism for a block of data to be read from it is
A. latency
B. latency plus transmission time
C. latency plus seek time
D. latency plus seek time plus transmission time
E. None of the above
Answer & Explanation
Answer: Option C
24. Part of a program where the shared memory is accessed and which should be executed invisibly, is called
A. semaphores
directory
C. critical section
D. mutual exclusion
E. None of the above
Answer & Explanation
Answer: Option C
25. Indicate which, of the following, is not true about NassiShneiderman charts
A. These charts are type of graphical design tool
B. These charts cannot represent CASE constructs
C.
These charts can represent three fundamental control structures
D. All of the above
E. None of the above
Answer & Explanation
Answer: Option B
26. What is the name of the operating system that reads and reacts in terms of actual time.
A. Batch system
B. Quick response system
C. Real time system
D. Time sharing system
E. None of the above
Answer & Explanation
Answer: Option C
27. An incremental backup
A. should be done each month
B. uses more tapes
C. saves all files
D. saves only files that have recently changed
E. None of the above
Answer & Explanation
Answer: Option D
28. The powerful text editor called PC-Write can be used by anybody by paying a small fee. Such programs are called
A. Software
B. Shareware
C. Firmware
D. Mindware
E. None of the above
Answer & Explanation
Answer: Option B
29. The disadvantages of "Compile and Go" loading scheme is (are):
A.
a portion of memory is wasted because the core occupied by the assembler is unavailable to the object program.
B.
it is necessary to retranslate the user's program deck every time it is run.
C.
it is very difficult to handle multiple segments, especially if the source programs are in different languages, and to produce orderly modular programs.
D. all of the above
E. None of the above
Answer & Explanation
Answer: Option D
30. The operating system of a computer serves as a software interface between the user and
A. hardware
B. peripheral
C. memory
D. screen
E. None of the above
Answer & Explanation
Answer: Option A
31. Which of the following statement is true.
A.
The LRU algorithm pages out pages that have been used recently
B.
Thrashing is a natural consequence of virtual memory systems.
C.
Seek analysis is used for analysing control-unit busy problems.
D. All of the above
E. None of the above
Answer & Explanation
Answer: Option C
32. Which of the following is a phase of a compilation process
A. Lexical analysis
B. Code generation
C. Both of the above
D. Static analysis
E. None of the above
Answer & Explanation
Answer: Option C
33. Which are the most important features of Microsoft Windows program?
A. Windows
B. Pull-down menus
C. Icons
D. All of the above
E. None of the above
Answer & Explanation
Answer: Option D
34. Which of the following system program forgoes the production of object code to generate absolute machine code and load it into the physical main storage location from which it will be executed immediately upon completion of the assembly?
A. two pass assembler
B. load-and-go assembler
C. macroprocessor
D. compiler
E. None of the above
Answer & Explanation
Answer: Option B
35. Virtual memory is
A. simple to implement
B. used in all major commercial operating systems
C. less efficient in utilization of memory
D. useful when fast I/O devices are not available
E. None of the above
Answer & Explanation
Answer: Option B
36. Object code
A. is ready to execute
B. is the output of compilers, but not assemblers
C. must be "loaded" before execution
D. must be rewritten before execution
E. None of the above
Answer & Explanation
Answer: Option C
37. The term "operating system" means
A. a set of programs which controls computer working
B. the way a computer operator works
C. conversion of high level language into machine code
D. the way a floppy disk drive operates
E. None of the above
Answer & Explanation
Answer: Option A
38. Which of the following might be used to convert high-level language instructions into machine language?
A. system software
B. applications software
C. an operating environment
D. an interpreter
E. None of the above
Answer & Explanation
Answer: Option D
39. Indicate which is a pre-emptive scheduling algorithm
A. Round-robin
B. Shortest-job-next
C. Priority-based
D. All of the above
E. None of the above
Answer & Explanation
Answer: Option A
40. Which of the following, is necessary to work on a computer
A. Compiler
B. Operating system
C. Assembly
D. Interpreter of the above
E. None of the above
Answer & Explanation
Answer: Option B
41. Access time is the highest in the case of
A. floppy disk
B. cache
C. swapping devices
D. magnetic disk
E. None of the above
Answer & Explanation
Answer: Option D
42. Which of the following is not a characteristic of a daisy chaining priority control scheme?
A. priority is programmable
B. it is relatively easy to add more devices to the chain
C.
the failure of one device may affect other devices on the chain
D.
the number of control lines is independent of the number of devices on the chain
E. None of the above
Answer & Explanation
Answer: Option A
43. Assembler is
A.
a program that places programs into memory and prepares them for execution.
B.
a program that automate the translation of assembly language into machine language.
C.
a program that accepts a program written in a high level language and produces an object program.
D.
is a program that appears to execute a source program as if it were machine language.
E. None of the above
Answer & Explanation
Answer: Option B
44. Indicate which, of the following, in not true about an interpreter
A.
Interpreter generates an object program from the source program
B. Interpreter is a kind of translator
C. Interpreter analyses each source statement every time it is to be executed
D. All of the above
E. None of the above
Answer & Explanation
Answer: Option A
45. Object modules generated by assemblers that contain unresolved external references are resolved for two or more object modules by a/an
A. operating system
B. loader
C. linker
D. compiler
E. None of the above
Answer & Explanation
Answer: Option C
46. The advantage of a command processor running only built-in commands is:
A.
flexibility to the users in running lists of commands by simply collecting them in named batch command files
B.
the command set being common across different hardware configurations
C.
users can create system programs and run them as commands
D.
the processing is much faster than would other-wise be the case when user defined commands are used
E. None of the above
Answer & Explanation
Answer: Option B
47. Under multiprograming, turnaround time for short jobs is usually _____ and that for long jobs is slightly _____.
A. lengthened; shortened
B. shortened; lengthened
C. shortened; shortened
D. lengthened; lengthened
E. None of the above
Answer & Explanation
Answer: Option B
48. The most common systems security method is
A. passwords
B. encryption
C. firewall
D. all of the above
E. None of the above
Answer & Explanation
Answer: Option A
49. Two basic types of operating systems are:
A. sequential and direct
B. batch and timesharing
C. sequential and realtime
D. batch and interactive.
E. None of the above
Answer & Explanation
Answer: Option D
50. Daisy chain is a device for
A. connecting a number of controllers to a device
B. connecting a number of devices to a controller
C.
D. interconnecting a number of devices to a number of controllers
all of the above
E. None of the above
Answer & Explanation
Answer: Option B
1. In which of the storage placement strategies a program is placed in the largest available hole in the main memory?
A. best fit
B. first fit
C. worst fit
D. buddy
E. None of the above
Answer & Explanation
Answer: Option C
2. Which of the following is a block device
A. mouse
B. printer
C. terminals
D. disk
E. None of the above
Answer & Explanation
Answer: Option D
3. The problem of thrashing is affected significantly by:
A. program structure
B. program size
C. primary-storage size
D. all of the above
E. None of the above
Answer & Explanation
Answer: Option A
4. Which of the following software types is used to simplify using systems software?
A. spreadsheet
B. operating environment
C. timesharing
D. multitasking
E. None of the above
Answer & Explanation
Answer: Option C
5. Advantage(s) of using assembly language rather than machine language is (are):
A. It is mnemonic and easy to read.
B. Addresses any symbolic, not absolute
C. Introduction of data to program is easier
D. all of the above
E. None of the above
Answer & Explanation
Answer: Option D
6. Which of the following is not true about the memory management?
A. virtual memory is used only in multi-user systems
B. segmentation suffers from external fragmentation
C. paging suffers from internal fragmentation
D. segmented memory can be paged
E. None of the above
Answer & Explanation
Answer: Option A
7. Job Control Language (JCL) statements are used to
A.
Read the input from the slow-speed card reader to the high-speed magnetic disk
B.
Specify, to the operating system, the beginning and end of a job in a batch
C. Allocate the CPU to a job
D. All of the above
E. None of the above
Answer & Explanation
Answer: Option B
8. Paging
A.
is a method of memory allocation by which the program is subdivided into equal portions, or pages and core is subdivided into equal portions or blocks.
B.
consists of those addresses that may be generated by a processor during execution of a computation.
C. is a method of allocating processor time.
D.
allows multiple programs to reside in separate areas of core at the time.
E. None of the above
Answer & Explanation
Answer: Option A
9. Which of the following is not true about documentation?
A.
Documentation, of a system, should be as clear and direct as possible
B.
Documentation increases the maintenance time and cost
C. Documentation gives better understanding of the
problem
D. All of the above
E. None of the above
Answer & Explanation
Answer: Option B
10. The system/370 assembler language
A.
allows the programmer to write base registers and displacements explicitly in the source program.
B.
is used to remember which of the general-purpose registers are currently available as base registers, and what base addresses they contain.
C.
allows multiple programs to reside in separate areas of core at the same time.
D.
is a term that refers to the control programs of an operating system.
E. None of the above
Answer & Explanation
Answer: Option A
11. Scheduling is
A. allowing jobs to use the processor
B. unrelated to performance consideration
C. not required in uniprocessor systems
D. the same regard-less of the purpose of the system
E. None of the above
Answer & Explanation
Answer: Option A
12. What scheduling algorithm allows processes that are logical runnable to be temporarily suspended?
A. preemptive scheduling
B. non-preemptive scheduling
C. FIFO
D. FCFS
E. None of the above
Answer & Explanation
Answer: Option A
13. In an absolute loading scheme, which loader function is accomplished by loader
A. Reallocation
B. Allocation
C. Linking
D. Loading
E. None of the above
Answer & Explanation
Answer: Option D
14. The computational technique used to compute the disk storage address of individual records is called:
A. bubble memory
B. key fielding
C. dynamic reallocation
D. hashing
E. None of the above
Answer & Explanation
Answer: Option D
15. For how many processes which are sharing common data, the Dekker's algorithm implements mutual exclusion?
A. 1
B. 2
C. 3
D. 4
E. None of the above
Answer & Explanation
Answer: Option B
16. The file structure that redefines its first record at a base of zero uses the term:
A. relative organization
B. key fielding
C. dynamic reallocation
D. hashing
E. None of the above
Answer & Explanation
Answer: Option A
17. What is the name given to all the programs inside the computer with makes it usable?
A. Application software
B. System software
C. Firm ware
D. Shareware
E. None of the above
Answer & Explanation
Answer: Option B
18. Semaphores
A. synchronize critical resources to prevent deadlock
B. synchronize critical resources to prevent contention
C. are used to do I/O
D. are used for memory management
E. None of the above
Answer & Explanation
Answer: Option A
19. The advantage(s) of incorporating the macro processor into pass 1 is(are):
A. many functions do not have to be implemented twice.
B.
Functions are combined and it is not necessary to create intermediate files as output from the macros processor and input to the assembler.
C.
more flexibility is available to the programmer in that he may use all the features of the assembler in conjunction with macros.
D. all of the above
E. None of the above
Answer & Explanation
Answer: Option D
20. In analyzing the compilation of PL/I program, the description "creation of more optimal matrix" is associated with
A. Assembly and output
B. Code generation
C. Syntax analysis
D. Machine independent optimization
E. None of the above
Answer & Explanation
Answer: Option D
21. In memory systems, boundary registers
A. are used for temporary program variable storage
B. are only necessary with fixed partitions
C. track page boundaries
D. track the beginning and ending of programs
E. None of the above
Answer & Explanation
Answer: Option D
22. Which of the following is true for machine language.
A. Repeated execution of program segments
B. Depicting flow of data in a system
C.
A sequence of instructions which, when followed properly, solves a problem
D.
the language which communicates with the computer using only the binary digits 1 and 0.
E. None of the above
Answer & Explanation
Answer: Option D
23. Which of the following is not applications software?
A. Word processing
B. Spreadsheet
C. UNIX
D. Desktop publishing
E. None of the above
Answer & Explanation
Answer: Option C
24. Scissoring enables
A. a part of data to be displayed
B. entire data to be displayed
C. full data display on full area of screen
D. no data to be displayed
E. None of the above
Answer & Explanation
Answer: Option A
25. A relocate program form is one which
A.
cannot be made to execute in any area of storage other than the one designated for it at the time of its coding or translation.
B.
consists of a program and relevant information for its relocation.
C.
can itself performs the relocation of its addresssensitive portions.
D. all of the above
E. None of the above
Answer & Explanation
Answer: Option B
26. If you want to execute more than one program at a time, the systems software you are using must be capable of:
A. word processing
B. virtual memory
C. compiling
D. multitasking
E. None of the above
Answer & Explanation
Answer: Option D
27. In analyzing the compilation of PL/I program, the description "resolving symbolic address (labels) and generating machine language" is associated with
A. Assembly and output
B. Code generation
C. Storage assignment
D. Syntax analysis
E. None of the above
Answer & Explanation
Answer: Option A
28. Round-robin scheduling
A. allows interactive tasks quicker access to the processor
B. is quite complex to implement
C. gives each task the same chance at the processor
D.
allows processor-bound tasks more time in the processor
E. None of the above
Answer & Explanation
Answer: Option C
29. What is the name of the system which deals with the running of the actual computer and not with the programming problems?
A. Operating system
B. Systems program
C. Object program
D. Source program
E. None of the above
Answer & Explanation
Answer: Option B
30. What is the initial value of the semaphore to allow only one of the many processes to enter their critical section?
A. 8
B. 1
C. 16
D. 0
E. None of the above
Answer & Explanation
Answer: Option B
31. Four necessary conditions for deadlock to exist are: mutual exclusion, no-preemption, circular wait and
A. hold and wait
B. deadlock avoidance
C. race around condition
D. buffer overflow
E. None of the above
Answer & Explanation
Answer: Option A
32. If you do not know which version of MS-DOS you are working with, which command will you use after having booted your operating system?
A. FORMAT command
B. DIR command
C. VER command
D. DISK command
E. None of the above
Answer & Explanation
Answer: Option C
33. A partitioned data set is most used for
A. a program or source library
B. storing program data
C. storing backup information
D. storing ISAM files
E. None of the above
Answer & Explanation
Answer: Option A
34. Page-map table is
A. A data file
B. A directory
C. Used for address translation
D. All of the above
E. None of the above
Answer & Explanation
Answer: Option C
35. The main function of the dispatcher (the portion of the process scheduler) is
A. swapping a process to the disk
B. assigning ready process to the CPU
C.
suspending some of the processes when the CPU load is high
D. bring processes from the disk to the main memory
E. None of the above
Answer & Explanation
Answer: Option B
36. The errors that can be pointed out by the compiler are
A. Syntax errors
B. Semantic errors
C. Logical errors
D. Internal errors
E. None of the above
Answer & Explanation
Answer: Option A
37. When a computer is first turned on or restarted, a special type of absolute loader is executed, called a
A. "Compile and Go" loader
B. Boot loader
C. Bootstrap loader
D. Relating loader
E. None of the above
Answer & Explanation
Answer: Option C
38. Which, of the following checks, cannot be carried out on the input data to a system?
A. consistency check
B. Syntax check
C. Range check
D. All of the above
E. None of the above
Answer & Explanation
Answer: Option B
39. A program that converts a high-level language program to a set of instructions that can run on a computer is called a
A. Compiler
B. Debugger
C. Editor
D. All of the above
E. None of the above
Answer & Explanation
Answer: Option A
40. Which of the following is characteristic of an operating system?
A. resource management
B. error recovery
C. memory management
D. All the above
E. None of the above
Answer & Explanation
Answer: Option D
41. In MS-DOS, relocatable object files and load modules have
extensions
A. .OBJ and .COM or .EXE, respectively
B. .COM and .OBJ, respectively
C. .EXE and .OBJ, respectively
D. .DAS and .EXE, respectively
E. None of the above
Answer & Explanation
Answer: Option A
42. The state transition initiated by the user process itself in an operating system is
A. block
B. dispatch
C. wake up
D. timer run out
E. None of the above
Answer & Explanation
Answer: Option A
43. Which of the following program is not a utility?
A. Debugger
B. Editor
C. Spooler
D. All of the above
E. None of the above
Answer & Explanation
Answer: Option C
44. The function(s) of file system is (are):
A.
to provide complete file naming freedom to the users and to permit controlled sharing of files
B.
to provide for long and short term storage of files with appropriate economic tradeoffs.
C.
to provide security against loss of information due to system failure
D. all of the above
E. None of the above
Answer & Explanation
Answer: Option D
45. A public key encryption system
A. allows anyone to decode the transmission
B. allows only the correct sender to decode the data
C. allows only the correct receiver to decode the data
D. does not encode the data before transmitting it
E. None of the above
Answer & Explanation
Answer: Option C
46. Feed back queue
A. are very easy to implement
B. dispatch tasks according to execution characteristics
C. are used to favor real-time tasks
D. require manual intervention to implement properly
E. None of the above
Answer & Explanation
Answer: Option B
47. In which addressing mode the operand is given explicitly in the instruction?
A. absolute mode
B. immediate mode
C. indirect mode
D. index mode
E. None of the above
Answer & Explanation
Answer: Option B
48. The technique, for sharing the time of a computer among several jobs. Which switches jobs so rapidly such that each job appears to have the computer to itself:
A. time sharing
B. time out
C. time domain
D. FIFO
E. None of the above
Answer & Explanation
Answer: Option A
1. The initial value of the semaphore that allows only one of the many processes to enter their critical sections, is
A. 8
B. 1
C. 16
D. 0
E. None of the above
Answer & Explanation
Answer: Option B
2. The Register - to - Register (RR) instructions
A. have both their operands in the main store.
B.
which perform an operation on a register operand and an operand which is located in the main store, generally leaving the result in the register, except in the case of store operation when it is also written into the specified storage location.
C.
which perform indicated operations on two fast registers of the machine and leave the result in one of the registers.
D. all of the above
E. None of the above
Answer & Explanation
Answer: Option C
3. A page fault
A. is an error is a specific page
B. occurs when a program accesses a page of memory
C. is an access to a page not currently in memory
D. is a reference to a page belonging to another program
E. None of the above
Answer & Explanation
Answer: Option C
4. An algorithm is best described as
A. A computer language
B. A step by step procedure for solving a problem
C. A branch of mathematics
D. All of the above
E. None of the above
Answer & Explanation
Answer: Option B
5. The process of transferring data intended for a peripheral device into a disk (or intermediate store) so that it can be transferred to peripheral at a more convenient time or in bulk, is known as
A. multiprogramming
B. spooling
C. caching
D. virtual programming
E. None of the above
Answer & Explanation
Answer: Option B
6. Block caches or buffer caches are used
A. to improve disk performance
B. to handle interrupts
C. to increase the capacity of the main memory
D. to speed up main memory read operation
E. None of the above
Answer & Explanation
Answer: Option A
7. Which of the following statements is false?
A. a small page size causes large page tables
B. internal fragmentation is increased with small pages
C.
a large page size causes instructions and data that will not be referenced brought into primary storage
D. I/O transfers are more efficient with large pages
E. None of the above
Answer & Explanation
Answer: Option B
8. The action of parsing the source program into the proper syntactic classes is known as
A. syntax analysis
B. lexical analysis
C. interpretation analysis
D. general syntax analysis
E. None of the above
Answer & Explanation
Answer: Option B
9. Which, of the following is not true about the description of a decision table?
A. A decision table is easy to modify
B. A decision table is directly understood by the computer
C. A decision table is easy to understand
D. All of the above
E. None of the above
Answer & Explanation
Answer: Option B
10. Trojan-Horse programs
A. are legitimate programs that allow unauthorized access
B. do not usually work
C. are hidden programs that do not show up on the system
D. usually are immediately discovered
E. None of the above
Answer & Explanation
Answer: Option A
11. When did IBM release the first version of disk operating system DOS version 1.0?
A. 1981
B. 1982
C. 1983
D. 1984
E. None of the above
Answer & Explanation
Answer: Option A
12. Which of the following is false about disk when compared to main memory?
A. non-volatile
B. longer storage capacity
C. lower price per bit
D. faster
E. None of the above
Answer & Explanation
Answer: Option D
13. Producer consumer problem can be solved using
A. semaphores
B. event counters
C. monitors
D. all of the above
E. None of the above
Answer & Explanation
Answer: Option D
14. Most of the microcomputer's operating systems like Apple DOS, MS DOS and PC DOS etc. are called disk operating systems because
A. they are memory resident
B. they are initially stored on disk
C. they are available on magnetic tapes
D. they are partly in primary memory and partly on disk
E. None of the above
Answer & Explanation
Answer: Option B
15. The CPU, after receiving an interrupt from an I/O device
A. halts for a predetermined time
B.
hands over control of address bus and data bus to the interrupting device
C.
branches off to the interrupt service routine immediately
D.
branches off to the interrupt service routine after completion of the current instruction
E. None of the above
Answer & Explanation
Answer: Option D
16. Seeks analysis
A. is used for analyzing paging problems
B. is used for analyzing device busy problems
C. is used for analyzing control-unit busy problems
D. is only shown on real-time displays
E. None of the above
Answer & Explanation
Answer: Option B
17. Which is a permanent database in the general model of compiler?
A. Literal Table
B. Identifier Table
C. Terminal Table
D. Source code
E. None of the above
Answer & Explanation
Answer: Option C
18. What is the name of the technique in which the operating system of a computer executes several programs concurrently by switching back and forth between them?
A. Partitioning
B. Multitasking
C. Windowing
D. Paging
E. None of the above
Answer & Explanation
Answer: Option B
19. Operating system
A. links a program with the subroutines it references
B. provides a layered, user-friendly interface
C. enables the programmer to draw a flowchart
D. all of the above
E. None of the above
Answer & Explanation
Answer: Option B
20. Software that measures, monitors, analyzes, and controls realworld events is called:
A. system software
B. real-time software
C. scientific software
D. business software
E. None of the above
Answer & Explanation
Answer: Option B
21. The details of all external symbols and relocation formation (relocation list or map) is provided to linker by
A. Macro processor
B. Translator
C. Loader
D. Editor
E. None of the above
Answer & Explanation
Answer: Option B
22. The macro processor must perform
A. recognize macro definitions and macro calls
B. save the macro definitions
C. expand macros calls and substitute arguments
D. all of the above
E. None of the above
Answer & Explanation
Answer: Option D
23. A development strategy whereby the executive control modules of a system are coded and tested first, is known as
A. Bottom-up development
B. Top-down development
C. Left-Right development
D. All of the above
E. None of the above
Answer & Explanation
Answer: Option B
24. Which of the following is helpful in evaluating applications software what will best suit your needs?
A. recommendations by other users
B. computer magazines
C. objective software reviews
D. all of the above
E. None of the above
Answer & Explanation
Answer: Option D
25. What problem is solved by Dijkstra's banker's algorithm?
A. mutual exclusion
B. deadlock recovery
C. deadlock avoidance
D. cache coherence
E. None of the above
Answer & Explanation
Answer: Option C
26. The dispatcher
A. actually schedules the tasks into the processor
B. puts tasks in I/O wait
C. is always small and simple
D. never changes task priorities
E. None of the above
Answer & Explanation
Answer: Option A
27. System programs such as Compilers are designed so that they are
A. reenterable
B. non reusable
C. serially usable
D. recursive
E. None of the above
Answer & Explanation
Answer: Option A
28. IBM released its first PC in 1981. Can you name the operating system which was most popular at that time?
A. MS-DOS
B. PC-DOS
C. OS/360
D. CP/M
E. None of the above
Answer & Explanation
Answer: Option D
29. If the number of bits in a virtual address of a program is 16 and the page size is 0.5 K bytes, the number of pages in the virtual address space is
A. 16
B. 32
C. 64
D. 128
E. None of the above
Answer & Explanation
Answer: Option D
30. Which table is a permanent database that has an entry for each terminal symbol.
A. Terminal table
B. Literal table
C. Identifier table
D. Reductions
E. None of the above
Answer & Explanation
Answer: Option A
31. The function(s) of the Syntax phase is(are)
A.
to recognize the major constructs of the language and to call the appropriate action routines that will generate the intermediate form or matrix for these constructs.
B. to build a literal table and an identifier table
C. to build a uniform symbol table
D.
to parse the source program into the basic elements or tokens of the language.
E. None of the above
Answer & Explanation
Answer: Option A
32. Swapping
A. works best with many small partitions
B. allows many programs to use memory simultaneously
C. allows each program in turn to use the memory
D. does not work with overlaying
E. None of the above
Answer & Explanation
Answer: Option C
33. A disk scheduling algorithm in an operating system causes the disk arm to move back and forth across the disk surface in order to service all requests in its path. This is a
A. First come first served
B. Shortest Seek Time First (SSTE)
C. Scan
D. FIFO
E. None of the above
Answer & Explanation
Answer: Option C
34. A translator is best described as
A. an application software
B. a system software
C. a hardware component
D. all of the above
E. None of the above
Answer & Explanation
Answer: Option B
35. Data encryption
A. is mostly used by public networks
B. is mostly used by financial networks
C. cannot be used by private installations
D. is not necessary, since data cannot be intercepted
E. None of the above
Answer & Explanation
Answer: Option B
36. What is the name given to the process of initializing a microcomputer with its operating system?
A. Cold booting
B. Booting
C. Warm booting
D. Boot recording
E. None of the above
Answer & Explanation
Answer: Option B
37. The function(s) of the Storage Assignment is (are)
A.
to assign storage to all variables referenced in the source program.
B.
to assign storage to all temporary locations that are necessary for intermediate results.
C.
to assign storage to literals, and to ensure that the storage is allocate and appropriate locations are initialized.
D. all of the above
E. None of the above
Answer & Explanation
Answer: Option D
38. A Processor
A.
is a device that performs a sequence of operations specified by instructions in memory.
B. is the device where information is stored
C. is a sequence of instructions
D.
is typically characterized by interactive processing and time of the CPU's time to allow quick response to each user.
E. None of the above
Answer & Explanation
Answer: Option A
39. With MS-DOS which command will divide the surface of the blank floppy disk into sectors and assign a unique address to each one?
A. FORMAT command
B. FAT command
C. VER command
D. CHKDSK command
E. None of the above
Answer & Explanation
Answer: Option A
40. Multiprogramming
A.
is a method of memory allocation by which the program is subdivided into equal portions, or pages and core is subdivided into equal portions or blocks.
B.
consists of those addresses that may be generated by a processor during execution of a computation.
C. is a method of allocating processor time.
D.
allows multiple programs to reside in separate areas of core at the time.
E. None of the above
Answer & Explanation
Answer: Option D
41. A translator which reads an entire programme written in a high level language and converts it into machine language code is:
A. assembler
B. translator
C. compiler
D. system software
E. None of the above
Answer & Explanation
Answer: Option C
42. The advantage(s) inherent to using high level languages is (are)
A.
Fewer people, less management and shorter transition in learning time
B.
Improved debugging capability, and superior documentation
C. A greater degree of machine independence
D. All of the above
E. None of the above
Answer & Explanation
Answer: Option D
43. Addressing modes
A.
defines the fundamental method of determining effective operand addresses
B.
are variations in the use of fundamental addressing structures, or some associated actions which are related to addressing.
C.
performs indicated operations on two fast registers of the machine and leave the result in one of the registers.
D. all of the above
E. None of the above
Answer & Explanation
Answer: Option B
44. In which way(s) a macro processor for assembly language can be implemented:
A. independent two-pass processor
B. independent one-pass processor
C.
processor incorporated into pass 1 of a standard twopass assembler
D. all of the above
E. None of the above
Answer & Explanation
Answer: Option D
Explanation:
No answer de
45. Which of the following is a type of systems software used on microcomputers?
A. MS-DOS
B. PC-DOS
C. Unix
D. All of the above
E. None of the above
Answer & Explanation
Answer: Option D
46. The working set theory of programming behaviour of processes running within an operating system involves
A. the collection of pages that a process accesses
B. disk scheduling mechanisms
C. coalescing holes in memory
D. assigning the CPU to processes
E. None of the above
Answer & Explanation
Answer: Option A
47. Operating system is
A. A collection of hardware components
B. A collection of input-output devices
C. A collection of software routines
D. All of the above
E. None of the above
Answer & Explanation
Answer: Option C
48. A file organization component of a VSAM file is:
A. relative record data set
B. keyed sequential data set
C. entry sequential data set
D. all of the above
E. None of the above
Answer & Explanation
Answer: Option D
49. What is the name given to the software which can be legally compiled and often used for free?
A. Shareware program
B. Public domain program
C. Firmware program
D. Mindware
E. None of the above
Answer & Explanation
Answer: Option B
50. The SJF algorithm executes first the job
A. that last entered the queue
B. that first entered the queue
C. that has been in the queue the longest
D. with the least processor needs
E. None of the above
Answer & Explanation
Answer: Option D
1. The part of machine level instruction, which tells the central processor what has to be done, is
A. Operation code
B. Address
C. Locator
D. Flip-Flop
E. None of the above
Answer & Explanation
Answer: Option A
2. Which of the following refers to the associative memory?
A. the address of the data is generated by the CPU
B. the address of the data is supplied by the users
C.
there is no need for an address i.e. the data is used as an address
D. the data are accessed sequentially
E. None of the above
Answer & Explanation
Answer: Option C
3. To avoid the race condition, the number of processes that may be simultaneously inside their critical section is
A. 8
B. 1
C. 16
D. 0
E. None of the above
Answer & Explanation
Answer: Option B
4. A system program that combines the separately compiled modules of a program into a form suitable for execution
A. assembler
B. linking loader
C. cross compiler
D. load and go
E. None of the above
Answer & Explanation
Answer: Option B
5. Process is
A. program in High level language kept on disk
B. contents of main memory
C. a program in execution
D. a job in secondary memory
E. None of the above
Answer & Explanation
Answer: Option C
6. Addressing structure
A.
defines the fundamental method of determining effective operand addresses
B.
are variations in the use of fundamental addressing structures, or some associated actions which are related to addressing.
C.
performs indicated operations on two fast registers of the machine and leave the result in one of the registers.
D. all of the above
E. None of the above
Answer & Explanation
Answer: Option A
7. The Memory Buffer Register (MBR)
A.
is a hardware memory device which denotes the location of the current instruction being executed.
B.
is a group of electrical circuits (hardware), that performs the intent of instructions fetched from memory.
C.
contains the address of the memory location that is to be read from or stored into.
D.
contains a copy of the designated memory location specified by the MAR after a "read" or the new contents of the memory prior to a "write".
E. None of the above
Answer & Explanation
Answer: Option D
8. The strategy of allowing processes that are logically runnable to be temporarily suspended is called
A. preemptive scheduling
B. non preemptive scheduling
C. shortest job first
D. first come first served
E. None of the above
Answer & Explanation
Answer: Option A
9. The Storage-to-Storage instructions
A. have both their operands in the main store.
B.
which perform an operation on a register operand and an operand which is located in the main store, generally leaving the result in the register, expect in the case of store operation when it is also written into the specified storage location.
C.
which perform indicated operations on two fast registers of the machine and have the result in one of the registers
D. all of the above
E. None of the above
Answer & Explanation
Answer: Option A
10. The LRU algorithm
A. pages out pages that have been used recently
B. pages out pages that have not been used recently
C. pages out pages that have been least used recently
D. pages out the first page in a given area
E. None of the above
Answer & Explanation
Answer: Option C
11. Which of the following systems software does the job of merging the records from two files into one?
A. Security software
B. Utility program
C. Networking software
D. Documentation system
E. None of the above
Answer & Explanation
Answer: Option B
12. Fork is
A. the dispatching of a task
B. the creation of a new job
C. the creation of a new process
D. increasing the priority of a task
E. None of the above
Answer & Explanation
Answer: Option C
13. Thrashing
A. is a natural consequence of virtual memory systems
B. can always be avoided by swapping
C. always occurs on large computers
D. can be caused by poor paging algorithms
E. None of the above
Answer & Explanation
Answer: Option D
14. Supervisor state is
A. never used
B. entered by programs when they enter the processor
C. required to perform any I/O
D. only allowed to the operating system
E. None of the above
Answer & Explanation
Answer: Option D
15. Which of the following instruction steps, would be written within the diamond-shaped box, of a flowchart?
A. S = B - C
B. IS A<10
C. PRINT A
D. DATA X,4Z
E. None of the above
Answer & Explanation
Answer: Option B
16. Which of the following statements is false?
A.
the technique of storage compaction involves moving all occupied areas of storage to one end or other of main storage
B. compaction does not involve relocation of programs
C. compaction is also know as garbage collection
D.
the system must stop everything while it performs the compaction
E. None of the above
Answer & Explanation
Answer: Option B
17. Interprocess communication
A. is required for all processes
B. is usually done via disk drives
C. is never necessary,
D. allows processes to synchronize activity
Answer & Explanation
Answer: Option D
18. Which of the following functions is(are) performed by the loader
A.
allocate space in memory for the programs and resolve symbolic references between object decks
B.
adjust all address dependent locations, such as address constants, to correspond to the allocated space.
C.
physically place the machine instructions and data into memory.
D. All of the above
E. None of the above
Answer & Explanation
Answer: Option D
19. User-Friendly Systems are:
A. required for object-oriented programming
B. easy to develop
C. common among traditional mainframe operating
systems
D. becoming more common
E. None of the above
Answer & Explanation
Answer: Option D
20. Which of the following addressing modes, facilitates access to an operand whose location is defined relative to the beginning of the data structure in which it appears?
A. ascending
B. sorting
C. index
D. indirect
E. None of the above
Answer & Explanation
Answer: Option C
21. While running DOS on a PC, which command would be used to duplicate the entire diskette?
A. COPY
B. DISKCOPY
C. CHKDSK
D. TYPE
E. None of the above
Answer & Explanation
Answer: Option B
22. Memory
A.
is a device that performs a sequence of operations specified by instructions in memory.
B. is the device where information is stored
C. is a sequence of instructions
D. is typically characterized by interactive processing and time-slicing of the CPU's time to allow quick response to
each user.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
23. Which of the following rules out the use of GO TO?
A. Flowchart
B. HIPO-DIAGRAMS
C. Nassi-Shneiderman diagram
D. All of the above
E. None of the above
Answer & Explanation
Answer: Option C
24. A system program that sets up an executable program in main memory ready for execution is
A. assembler
B. linker
C. loader
D. compiler
E. None of the above
Answer & Explanation
Answer: Option C
25. Which of the following are loaded into main memory when the computer is booted?
A. internal command instructions
B. external command instructions
C. utility programs
D. word processing instructions
E. None of the above
Answer & Explanation
Answer: Option A
26. The FIFO algorithm
A. executes first the job that last entered the queue
B. executes first the job that first entered the queue
C.
execute first the job that has been in the queue the longest
D. executes first the job with the least processor needs
E. None of the above
Answer & Explanation
Answer: Option B
27. What is the name given to the organized collection of software that controls the overall operation of a computer?
A. Working system
B. Peripheral system
C. Operating system
D. Controlling system
E. None of the above
Answer & Explanation
Answer: Option C
28. The principle of locality of reference justifies the use of
A. reenterable
B. non reusable
C. virtual memory
D. cache memory
E. None of the above
Answer & Explanation
Answer: Option D
29. The register or main memory location which contains the effective address of the operand is known as
A. pointer
B. indexed register
C. special location
D. scratch pad
E. None of the above
Answer & Explanation
Answer: Option A
30. Assembly code data base is associated with A. assembly language version of the program which is created by the code generation phase and is input to
the assembly phase.
B.
a permanent table of decision rules in the form of patterns for matching with the uniform symbol table to discover syntactic structure.
C.
consists of a full or partial list or the token's as they appear in the program. Created by Lexical analysis and used for syntax analysis and interpretation.
D.
a permanent table which lists all key words and special symbols of the language in symbolic form.
E. None of the above
Answer & Explanation
Answer: Option A
31. Thrashing can be avoided if
A.
the pages, belonging to the working set of the programs, are in main memory
B. the speed of CPU is increased
C. the speed of I/O processor is increased
D. all of the above
E. None of the above
Answer & Explanation
Answer: Option A
32. In analyzing the compilation of PL/I program, the term "Lexical analysis" is associated with
A.
recognition of basic syntactic constructs through reductions.
B.
recognition of basic elements and creation of uniform symbols
C. creation of more optional matrix.
D.
use of macro processor to produce more optimal assembly code
E. None of the above
Answer & Explanation
Answer: Option B
33. Resolution of externally defined symbols is performed by
A. Linker
B. Loader
C. Compiler
D. Assembler
E. None of the above
Answer & Explanation
Answer: Option A
34. System generation:
A. is always quite simple
B. is always very difficult
C. varies in difficulty between systems
D. requires extensive tools to be understandable
E. None of the above
Answer & Explanation
Answer: Option C
35. The Memory Address Register
A.
is a hardware memory device which denotes the location of the current instruction being executed.
B.
is a group of electrical circuits (hardware), that performs the intent of instructions fetched from memory.
C.
contains the address of the memory location that is to be read from or stored into.
D.
contains a copy of the designated memory location specified by the MAR after a "read" or the new contents of the memory prior to a "write".
E. None of the above
Answer & Explanation
Answer: Option C
36. In virtual memory systems, Dynamic address translation
A. is the hardware necessary to implement paging
B. stores pages at a specific location on disk
C. is useless when swapping is used
D. is part of the operating system paging algorithm
E. None of the above
Answer & Explanation
Answer: Option A
37. Fragmentation of the file system
A. occurs only if the file system is used improperly
B. can always be prevented
C. can be temporarily removed by compaction
D. is a characteristic of all file systems
E. None of the above
Answer & Explanation
Answer: Option C
38. A non-relocatable program is one which
A.
cannot be made to execute in any area of storage other than the one designated for it at the time of its coding or translation.
B.
consists of a program and relevant information for its relocation.
C.
can itself performs the relocation of its addresssensitive portions.
D. all of the above
E. None of the above
Answer & Explanation
Answer: Option A
39. Which of the following are(is) Language Processor(s)
A. assembles
B. compilers
C. interpreters
D. All of the above
E. None of the above
Answer & Explanation
Answer: Option D
40. In which addressing mode the effective address of the operand is the contents of a register specified in the instruction and after accessing the operand, the contents of this register is incremented to point to the next item in the list?
A. index addressing
B. indirect addressing
C. auto increment
D. auto decrement
E. None of the above
Answer & Explanation
Answer: Option C
41. The memory allocation scheme subject to "external" fragmentation is
A. segmentation
B. swapping
C. pure demand paging
D. multiple contiguous fixed partitions
E. None of the above
Answer & Explanation
Answer: Option A
42. While working with MS-DOS, which command will you use to transfer a specific file from one disk to another?
A. DISKCOPY
B. COPY
C. RENAME
D. FORMAT
E. None of the above
Answer & Explanation
Answer: Option B
43. What is the name of the operating system for the laptop computer called MacLite?
A. Windows
B. DOS
C. MS-DOS
D. OZ
E. None of the above
Answer & Explanation
Answer: Option D
44. In which addressing mode the contents of a register specified in the instruction are first decremented, and then these contents are used as the effective address of the operands?
A. index addressing
B. indirect addressing
C. auto increment
D. auto decrement
E. None of the above
Answer & Explanation
Answer: Option D
45. What is the name given to the values that are automatically provided by software to reduce keystrokes and improve a computer user's productivity?
A. Defined values
B. Fixed values
C. Default values
D. Special values
E. None of the above
Answer & Explanation
Answer: Option C
46. Page stealing
A. is a sign of an efficient system
B. is taking page frames from other working sets
C. should be the tuning goal
D. is taking larger disk spaces for pages paged out
E. None of the above
Answer & Explanation
Answer: Option B
47. In MS-DOS 5.0, which is the number that acts as a code to uniquely identify the software product?
A. MS
B. DOS
C. MS DOS
D. 5.0
E. None of the above
Answer & Explanation
Answer: Option D
48. Bug means
A. A logical error in a program
B. A difficult syntax error in a program
C.
Documenting programs using an efficient documentation tool
D. All of the above
E. None of the above
Answer & Explanation
Answer: Option A
49. Memory management is :
A. not used in modern operating system
B. replaced with virtual memory on current systems
C. not used on multiprogramming systems
D. critical for even the simplest operating systems
E. None of the above
Answer & Explanation
Answer: Option D
Subscribe to:
Posts (Atom)
No comments:
Post a Comment