MCQ Questions on Operating System

Operating System Questions and Answers

1. If there are multiple recycle bin for a hard disk
A. You can set different size for each recycle bin
B. You can choose which recycle bin to use to store your deleted files
C. You can make any one of them default recycle bin
D. None of above

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


2. Identify false statement
A. You can find deleted files in recycle bin
B. You can restore any files in recycle bin if you ever need
C. You can increase free space of disk by sending files in recycle bin
D. You can right click and choose Empty Recycle Bin to clean it at once

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


3. If the displayed system time and date is wrong, you can reset it using
A. Write
B. Calendar
C. Write file
D. Control panel

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


4. You should save your computer from?
A. Viruses
B. Time bombs
C. Worms
D. All of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


5. World Wide Web is being standard by
A. Worldwide corporation
B. W3C
C. World Wide Consortium
D. World Wide Web Standard

Answer

Answer: Option B
Explanation : The World Wide Web Consortium is the main international standards organization for the World Wide Web.


6. Which of the key is used to close the active window?
A. Ctrl+F4
B. Ctrl+F5
C. Alt+F6
D. None of above

Answer

Answer: Option D
Explanation : Ctrl+W & Alt+F4 is used to close the active window.


7. The shortcut key to open a task manager is:
A. Alt + F1
B. Alt + Ctrl + Delete
C. Alt + Tab
D. F1

Answer

Answer: Option B
Explanation : The shortcut key to open a task manager is “Alt + Ctrl + Delete”.


8. The windows feature is the ability of computer to automatically configure a new hardware component is that
A. Auto detect
B. Plug and play
C. Add remove hardware
D. None of above

Answer

Answer: Option B
Explanation : In computing, a plug and play device or computer bus, is one with a specification that facilitates the discovery of a hardware component in a system without the need for physical device configuration


9. Which of the following is not a part of the control panel?
A. Date and time
B. My documents
C. Add or remove program
D. Display

Answer

Answer: Option B
Explanation : My documents is not a part of the control panel.


10. The …… provides information about hardware installation, configuration and hardware status
A. Device manager
B. Control panel
C. Add new hardware
D. Program manager

Answer

Answer: Option A
Explanation : The Device manager provides information about hardware installation, configuration and hardware status.


11. A co-processor
A. Is relatively easy to support in software
B. Causes all processor to function equally
C. Works with any application
D. Is quite common in modern computer

Answer

Answer: Option A
Explanation : A coprocessor is a computer processor used to supplement the functions of the primary processor (the CPU). Operations performed by the coprocessor may be floating point arithmetic, graphics, signal processing, string processing, cryptography or I/O Interfacing with peripheral devices.


12. A Microsoft Windows is a(n)
A. Operating system
B. Graphic program
C. Word Processing
D. Database program

Answer

Answer: Option A
Explanation : Microsoft Windows is a group of Operating Systems manufactured by Microsoft. Windows is available in 32 and 64-bit versions and offers a graphical user interface (GUI), multitasking functionalities, virtual memory management capabilities, and support for several peripheral devices. Windows Operating Systems constitute client as well as server versions.


13. Which of the following is program group?
A. Accessories
B. Paint
C. Word
D. All of above

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


14. Which is not application software?
A. Windows NT
B. Page Maker
C. WinWord XP
D. Photoshop

Answer

Answer: Option A
Explanation : Windows NT is a family of operating systems produced by Microsoft.


15. The …… program compresses large files into a smaller file
A. WinZip
B. WinShrink
C. WinStyle
D. None of above

Answer

Answer: Option A
Explanation : WinZip is a Windows program that lets you archive and compress files so that you can store or distribute them more efficiently.


16. Which of the following is an example of a real time operating system?
A. Lynx
B. MS DOS
C. Windows XP
D. Process Control

Answer

Answer: Option D
Explanation : A real-time operating system (RTOS) is an operating system (OS) intended to serve real-time applications that process data as it comes in, typically without buffer delays. Processing time requirements (including any OS delay) are measured in tenths of seconds or shorter increments of time.


17. Which of the following operating system does not implement the multitasking truly?
A. Windows 98
B. Windows NT
C. Windows XP
D. MS DOS

Answer

Answer: Option D
Explanation : Multitasking, in an operating system, is allowing a user to perform more than one computer task (such as the operation of an application program) at a time. The operating system is able to keep track of where you are in these tasks and go from one to the other without losing information.
MS DOS does not implement the multitasking.


18. Which of the following windows version support 64 bit processor?
A. Windows 98
B. Windows 2000
C. Windows XP
D. Windows 95

Answer

Answer: Option C
Explanation : Microsoft Windows XP Professional x64 Edition, released on April 25, 2005, is an edition of Windows XP for x86-64 personal computers. It is designed to use the expanded 64-bit memory address space provided by the x86-64 architecture.
The primary benefit of moving to 64-bit is the increase in the maximum allocatable random-access memory (RAM).


19. Which of the following Operating systems is better for implementing a Client-Server network
A. MS DOS
B. Windows 95
C. Windows 98
D. Windows 2000

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


20. What program runs first after computer is booted and loading GUI?
A. Desktop Manager
B. File Manager
C. Windows Explorer
D. Authentication

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


21. Which of the following operating system do you choose to implement a client server network?
A. MS DOS
B. Windows
C. Windows 98
D. Windows 2000

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


22. My Computer was introduced from
A. Windows 3.1
B. Windows 3.11
C. Windows 95
D. Windows 98

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


23. Which of the following Windows do not have Start button
A. Windows Vista
B. Windows 7
C. Windows 8
D. None of above

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


24. Which is the latest version of MS Windows?
A. Windows 2007
B. Windows 8.1
C. Windows 2008
D. Windows 10

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


25. Which operating system doesn’t support networking between computers?
A. Windows 3.1
B. Windows 95
C. Windows 2000
D. Windows NT

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


26. The ……. contains commands associated with the My Computer window
A. Standard menu
B. Start menu
C. System menu
D. None of the above

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


27. ……. is the layer of a computer system between the hardware and the user program
A. Operating environment
B. Operating system
C. System environment
D. None of these

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


28. Which is the layer of a computer system between the hardware and the user program
A. Operating environment
B. Operating system
C. System environment
D. None

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


29. Which of the following is an example of utility?
A. Antivirus
B. Word
C. Operating system
D. Data recovery

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


30. When you start up the computer the boot up storage at which the BIOS versions manufacturer and data are displayed on the monitor is called
A. Bootstrap
B. Power on self test (POST)
C. System configuration
D. Kernel loading

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


31. The operating system is the most common type of …… Software
A. Communication
B. Application
C. System
D. Word processing software

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


32. Which is built directly on the hardware?
A. Computer Environment
B. Application Software
C. Operating System
D. Database System

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


33. …… system is built directly on the hardware
A. Environment
B. System
C. Operating
D. None

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


34. You can switch from one program to another on the desktop by clicking within the desired program’s window or by clicking on its …… button
A. Icon
B. Taskbar button
C. Folder
D. None of above

Answer

Answer: Option B
Explanation : You can switch from one program to another on the desktop by clicking within the desired program’s window or by clicking on its “Taskbar button” button.


35. The purpose of run command in start menu is to
A. Launch internet browser
B. Open internet explorer
C. Open windows explorer
D. Start programs

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


36. You can select My Computer icon and press Alt + Enter to
A. Delete it from desktop permanently
B. Open it in Explorer mode
C. Open System Properties dialog box
D. Pin it on Start menu

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


37. A relocate program form is one which
A. cannot be made to execute in any area of storage other than the one designated for it at the time of its coding or translation.
B. consists of a program and relevant information for its relocation.
C. can itself performs the relocation of its address-sensitive portions.
D. all of the above
E. None of the above

Answer

Answer: Option B
Explanation : A relocate program form is one which consists of a program and relevant information for its relocation.


38. You can switch from one program to another by clicking within the desired program’s icon from the
A. Application icon on desktop
B. Application icon from taskbar
C. Folder
D. None of above

Answer

Answer: Option B
Explanation : You can switch from one program to another by clicking within the desired program’s icon from the Application icon from taskbar.


39. If you want to execute more than one program at a time, the systems software you are using must be capable of:
A. word processing
B. virtual memory
C. compiling
D. multitasking
E. None of the above

Answer

Answer: Option D
Explanation : If you want to execute more than one program at a time, the systems software you are using must be capable of multitasking.


40. In analyzing the compilation of PL/I program, the description “resolving symbolic address (labels) and generating machine language” is associated with
A. Assembly and output
B. Code generation
C. Storage assignment
D. Syntax analysis
E. None of the above

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


41. Under multiprogramming, turnaround time for short jobs is usually _____ and that for long jobs is slightly _____.
A. lengthened; shortened
B. shortened; lengthened
C. shortened; shortened
D. lengthened; lengthened
E. None of the above

Answer

Answer: Option B
Explanation : Under multiprogramming, turnaround time for short jobs is usually shortened and that for long jobs is slightly lengthened.


42. Virtual memory typically located on
A. RAM
B. CPU
C. Flash card
D. Hard drive

Answer

Answer: Option D
Explanation : Virtual memory typically located on Hard drive


43. What is contained in the page table?
A. Base address of each frame and corresponding page number
B. Memory address and corresponding page number
C. File name and corresponding page number
D. None of Above

Answer

Answer: Option A
Explanation : Base address of each frame and corresponding page number are contained in the page table.


44. Which of the following does not support more than one program at a time?
A. DOS
B. Linux
C. Windows
D. Unix

Answer

Answer: Option A
Explanation : DOS is a family of disk operating systems. DOS primarily consists of MS-DOS and a rebranded. Only one program at a time can use them and DOS itself has no functionality to allow more than one program to execute at a time.


45. The process of transferring data intended for a peripheral device into a disk (or intermediate store) so that it can be transferred to peripheral at a more convenient time or in bulk, is known as
A. multiprogramming
B. spooling
C. caching
D. virtual programming
E. None of the above

Answer

Answer: Option B
Explanation : The process of transferring data intended for a peripheral device into a disk (or intermediate store) so that it can be transferred to peripheral at a more convenient time or in bulk, is known as ‘spooling’.


46. Round-robin scheduling
A. allows interactive tasks quicker access to the processor
B. is quite complex to implement
C. gives each task the same chance at the processor
D. allows processor-bound tasks more time in the processor
E. None of the above

Answer

Answer: Option C
Explanation : Round-robin scheduling gives each task the same chance at the processor


47. What is the name of the system which deals with the running of the actual computer and not with the programming problems?
A. Operating system
B. Systems program
C. Object program
D. Source program
E. None of the above

Answer

Answer: Option B
Explanation : Systems program deals with the running of the actual computer and not with the programming problems.


48. The most common systems security method is
A. passwords
B. encryption
C. firewall
D. all of the above
E. None of the above

Answer

Answer: Option A
Explanation : The most common systems security method is passwords.
Password : A password is a string of characters used for authenticating a user on a computer system. Most passwords are comprised of several characters, which can typically include letters, numbers, and most symbols, but not spaces.


49. Tree structure displays the
A. File only
B. Directory only
C. File and directory name
D. None of above

Answer

Answer: Option B
Explanation : Tree structure displays the Directory only.


50. Which of the following is not an operating system?
A. DOS
B. Linux
C. Windows
D. Oracle

Answer

Answer: Option D
Explanation : Oracle database (Oracle DB) is a relational database management system (RDBMS) from the Oracle Corporation.


51. Linux is a(n) ……. operating system
A. Open source
B. Microsoft
C. Windows
D. Mac

Answer

Answer: Option A
Explanation : Linux is a family of free and open-source software operating systems built around the Linux kernel. Typically, Linux is packaged in a form known as a Linux distribution for both desktop and server use.


52. Block caches or buffer caches are used
A. to improve disk performance
B. to handle interrupts
C. to increase the capacity of the main memory
D. to speed up main memory read operation
E. None of the above

Answer

Answer: Option A
Explanation : Block caches or buffer caches are used to improve disk performance


53. Which of the following statements is false?
A. a small page size causes large page tables
B. internal fragmentation is increased with small pages
C. a large page size causes instructions and data that will not be referenced brought into primary storage
D. I/O transfers are more efficient with large pages
E. None of the above

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


54. Which of the following is not a multitasking operating system?
A. Windows
B. Linux
C. Win NT
D. DOS

Answer

Answer: Option D
Explanation : DOS (Disk Operating System) is not a multitasking operating system


55. Two basic types of operating systems are:
A. sequential and direct
B. batch and timesharing
C. sequential and realtime
D. batch and interactive
E. None of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


56. Daisy chain is a device for
A. connecting a number of controllers to a device
B. connecting a number of devices to a controller
C. interconnecting a number of devices to a number of controllers
D. all of the above
E. None of the above

Answer

Answer: Option B
Explanation : A daisy chain is an interconnection of computer devices, peripherals, or network nodes in series, one after another. It is the computer equivalent of a series electrical circuit.


57. Which operating system can you give smallest file name?
A. Ps/2
B. Dos
C. Windows
D. Windows NT

Answer

Answer: Option B
Explanation : DOS (Disk Operating System) is an operating system that runs from a hard disk drive. The term can also refer to a particular family of disk operating systems, most commonly MS-DOS (Microsoft Disk Operating System).


58. Which one is not operating system?
A. P11
B. OS/2
C. Windows
D. Unix

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


59. The action of parsing the source program into the proper syntactic classes is known as
A. syntax analysis
B. lexical analysis
C. interpretation analysis
D. general syntax analysis
E. None of the above

Answer

Answer: Option B
Explanation : The action of parsing the source program into the proper syntactic classes is known as lexical analysis


60. Which, of the following is not true about the description of a decision table?
A. A decision table is easy to modify
B. A decision table is directly understood by the computer
C. A decision table is easy to understand
D. All of the above
E. None of the above

Answer

Answer: Option B
Explanation : A decision table is directly understood by the computer is not true about the description of a decision table


61. You should choose Sleep option when
A. The computer is tired after working for the whole day
B. You are leaving for a very short time and want to resume you work shortly
C. When computer gets hanged frequently. Let it sleep for some time
D. You finish working and going to bed

Answer

Answer: Option B
Explanation : Sleep mode, sometimes called standby or suspend mode, is a power-sparing state that a computer can enter when not in use. The computer’s state is maintained in RAM (random access memory). A computer usually wakes from sleep mode through touching a key, clicking the mouse or pressing the power button.


62. The ….. displays the name of every computer user on the computer
A. Wish list screen
B. Command screen
C. Welcome screen
D. None of the above

Answer

Answer: Option C
Explanation : Welcome screen displays the name of every computer user on the computer display screen (Computer Monitor).


63. In analyzing the compilation of PL/I program, the term “Machine independent optimization” is associated with
A. recognition of basic syntactic constructs through reductions
B. recognition of basic elements and creation of uniform symbols
C. creation of more optional matrix
D. use of macro processor to produce more optimal assembly code
E. None of the above

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


64. The category of software most appropriate for controlling the design and layout of complex document like newsletters and brochure is:
A. Word processing
B. Computer aided design
C. Web page authoring
D. Desktop publishing

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


65. Which one is not a system tool?

A. Backup
B. Disk defragment
C. Virus scanning
D. All of the above

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


66. Whenever you move a directory from one location to another
A. All files inside the directory are moved
B. All the subdirectory inside that directory are moved
C. The directory is moved the source file is not moved
D. Both A and B

Answer

Answer: Option D
Explanation : All the files inside the directory and inside subdirectory are moved in that location


67. The Basic Input Output System (BIOS) resides in
A. RAM
B. ROM
C. The CPU
D. Memory Cache

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


68. Which of the following does not occur during the power-on-self-test (POST)?
A. The scan disk utility begins to run
B. The video card and video memory are tested
C. The BIOS identification process occurs
D. Memory chip are checked to ensure that they are working properly

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


69. The memory which allocates space for DOS and application is called

A. Expanded memory
B. Cache memory
C. Virtual memory
D. Conventional memory

Answer

Answer: Option D
Explanation : In DOS memory management, conventional memory, also called base memory, is the first 640 kilobytes (640 × 1024 bytes) of the memory on IBM PC or compatible systems. It is the read-write memory directly addressable by the processor for use by the operating system and application programs.


70. The maximum size of a write file is limited to only
A. Name of the file
B. Extension of the file
C. The amount of memory in your computer
D. All of above

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


71. The operating system creates _____ from the physical computer
A. Virtual space
B. Virtual computers
C. Virtual device
D. None

Answer

Answer: Option B
Explanation : In computing, a virtual machine is an emulation of a computer system. Virtual machines are based on computer architectures and provide the functionality of a physical computer.


72. Which menu bar selection would you access to open file?
A. Option
B. Help
C. View
D. None of above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


73. Which of the following is drop down list?
A. List
B. Combo box
C. Text area
D. None

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


74. If you hard disk is partitioned into 3 drives, the number of recycle bin for that hard disk is
A. 1
B. 2
C. 3
D. 4

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


75. Which mode loads minimal set of drivers when starting Windows?
A. Safe Mode
B. Normal Mode
C. VGA Mode
D. Network Support Mode

Answer

Answer: Option A
Explanation : Safe mode is a diagnostic mode of a computer operating system (OS). It can also refer to a mode of operation by application software. In Windows, safe mode only allows essential system programs and services to start up at boot. Safe mode is intended to help fix most, if not all problems within an operating system. It is also widely used for removing rogue security software.


76. Which of the following are loaded in safe mode?
A. Keyboard driver
B. Mouse driver
C. VGA drive
D. All of above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


77. The date and time displays on
A. Taskbar
B. Status bar
C. System tray
D. Launch pad

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


78. …… runs on a computer hardware and serves as a platform for other system to run on
A. Operating system
B. Application system
C. System software
D. All of above

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


79. Which runs on computer hardware and serve as platform for other software to run on?
A. Operating System
B. Application Software
C. System Software
D. All

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


80. Which is the first program run on a computer when the computer boots up?
A. System software
B. Operating system
C. System operations
D. None

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


81. Once text has been cut to the clipboard, you can …… that text into another document

A. Paste
B. Copy
C. Transfer
D. None of the above

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


82. What is the function of radio button?
A. To select multiple option
B. To select single option
C. To select all option
D. All of above

Answer

Answer: Option B
Explanation : A radio button or option button is a graphical control element that allows the user to choose only one of a predefined set of mutually exclusive options.


83. A ……. is a named location on a disk where files are stored
A. Folder
B. Pod
C. Version
D. None of the above

Answer

Answer: Option A
Explanation : When talking about file systems, a folder (also called directory, or catalog) is a way to organize computer files. A folder is a storage space that many files can be placed into to group them together and organize the computer. A folder can also contain other folders.


84. The Banker’s algorithm is used
A. to rectify deadlock
B. to detect deadlock
C. to prevent deadlock
D. to solve deadlock

Answer

Answer: Option C
Explanation : The Banker algorithm, sometimes referred to as the detection algorithm, is a resource allocation and deadlock avoidance algorithm developed by Edsger Dijkstra that tests for safety by simulating the allocation of predetermined maximum possible amounts of all resources, and then makes an “s-state” check to test for possible deadlock conditions for all other pending activities, before deciding whether allocation should be allowed to continue. Source : wikipedia.org


85. Which type of command requires additional files to perform specific operations?
A. Internal commands
B. External commands
C. Valuable commands
D. Primary commands

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


86. Which of the following is system software?
A. Operating system
B. Compiler
C. Utilities
D. All of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


87. The primary purpose of an operating system is:
A. To make the most efficient use of the computer hardware
B. To allow people to use the computer
C. To keep systems programmers employed
D. To make computers easier to use

Answer

Answer: Option A
Explanation : An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.
For hardware functions such as input and output and memory allocation, the operating system acts as an intermediary between programs and the computer hardware, although the application code is usually executed directly by the hardware and frequently makes system calls to an OS function or is interrupted by it. Source : wikipedia.org


88. A user-interface that is easy to use is considered to be
A. User-happy
B. User-simple
C. User-friendly
D. None of the above

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


89. A ….. is a flash memory storage device that plugins into a USB port
A. USB snap drive
B. USB flash drive
C. USB memory maker drive
D. None of above

Answer

Answer: Option B
Explanation : A USB flash drive is a device used for data storage that includes a flash memory and an integrated Universal Serial Bus (USB) interface. Most USB flash drives are removable and rewritable. Physically, they are small, durable and reliable.


90. You can use print manage window
A. To check status of files in the print queue
B. To cancel the print job
C. To interrupt printing
D. All of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


91. The ……. is the drive containing the files to be copied
A. Source drive
B. Destination drive
C. USB drive
D. None of the above

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


92. Which one of the following is not a multitasking operating system?
A. DOS
B. Windows
C. Unix
D. Linux

Answer

Answer: Option A
Explanation : DOS is not a multitasking operating system. DOS did however provide a Terminate and Stay Resident (TSR) function which allowed programs to remain resident in memory.


93. The most recent version of MAC OS is based on the …… operating system
A. Windows
B. Linux
C. Unix
D. CMOS

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


94. Recently deleted files are stored in
A. Recycle bin
B. Desktop
C. Taskbar
D. My computer

Answer

Answer: Option A
Explanation : In computing, the Trash (also known as the Recycle Bin in Windows and by other names in other operating systems ) is temporary storage for files that have been deleted in a file manager by the user, but not yet permanently erased from the file system. Typically, a recycle bin is presented as a special file directory to the user (whether or not it is actually a single directory depends on the implementation), allowing the user to browse deleted files, undelete those that were deleted by mistake, or delete them permanently (either one by one, or by the “Empty Trash” function). Source : wikipedia.org


95. Which of the following operating system reads and reacts in actual time?
A. Quick Response System
B. Real Time System
C. Time Sharing System
D. Batch Processing System

Answer

Answer: Option B
Explanation : A real-time operating system (RTOS) is an operating system (OS) intended to serve real-time applications that process data as it comes in, typically without buffer delays. Processing time requirements (including any OS delay) are measured in tenths of seconds or shorter increments of time. A real time system is a time bound system which has well defined fixed time constraints.


96. In Windows, start button is used to
A. Run applications
B. Device setting
C. Turn off the system
D. All of above

Answer

Answer: Option D
Explanation : The Start button was first introduced with the release of Microsoft Windows 95 and has been featured in all releases of Windows since. The Start button allows users to access their run applications, device setting, turn off the system, computer programs or configure Microsoft Windows easily by accessing the Start Menu.


97. Which one is true for unconditional disk formatting?
A. Destroys every byte of data on a disk by overwriting it with with blank spaces
B. Do not check/scan surface after format
C. Transfer system files after format
D. All of above

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


98. Which components appear in the initial Windows start up display?
A. Dialog boxes
B. Start menu
C. Taskbar
D. All of above

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


99. A small part of taskbar that has icons of background running applications is
A. Start button
B. Quick launch
C. Task bar
D. System tray

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


100. All of the following are TRUE regarding virtual memory EXCEPT
A. Any amount of RAM can be allocated to virtual memory
B. The setting for the amount of hard disk drive space to allocate virtual memory can be manually change
C. This temporary storage is called the swap file or page file
D. Virtual memory is the physical space o the hard drive

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


101. The essential difference between an operating system like Linux and one like Windows is that
A. Windows can run with an Intel processor whereas Linux cannot
B. Linux is a proprietary whereas Windows is not
C. There are multiple versions of Linux but only one version of Windows
D. Any programmer can modify Linux code which is not permitted with Windows

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


102. Which of the following is/are external commands?
A. Edit
B. Label
C. Sys
D. All of above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


103. An operating system version designed for use with a media center PC is Microsoft Windows XP
A. Home edition
B. Media center edition
C. Tablet PC edition
D. None of above

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


104. An operating system version designed for use with a tablet PC is Microsoft Windows XP
A. Home edition
B. Media center edition
C. Tablet PC edition
D. None of the above

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


105. What is dispatch latency?
A. The time taken by the dispatcher to stop one process and start another
B. The time taken by the processor to write a file into disk
C. The whole time taken by all processor
D. None of Above

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


106. Which is not an external command?
A. Edit
B. XCOPY
C. Sys
D. None of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


107. Which of the following is not essential to shut down your computer?
A. Save all opened files
B. Close all running applications
C. Switch off monitor
D. Cut off the power supply

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


108. A page fault occurs when
A. the Deadlock happens
B. the Segmentation starts
C. the page is found in the memory
D. the page is not found in the memory

Answer

Answer: Option D
Explanation : An interrupt that occurs when a program requests data that is not currently in real memory. The interrupt triggers the operating system to fetch the data from a virtual memory and load it into RAM. An invalid page fault or page fault error occurs when the operating system cannot find the data in virtual memory.


109. What is Dr. Watson?
A. IT Expert
B. Diagnosis tool
C. Surgeon
D. None

Answer

Answer: Option B
Explanation : Dr. Watson is a diagnostic tool that gathers information about your computer when a problem occurs with a program. The information gathered by Dr. Watson is called a snapshot. The snapshot includes information that: Identifies the program that has a problem.


110. You can move a window to a different position on your screen by dragging it by its
A. Move handle
B. Tail
C. Status bar
D. Title bar

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


111. Underlined text, such as text and folder names is referred to as
A. Hyperlink
B. Menu
C. Source drive
D. None of these

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


112. Which of the following is suitable after you install new drivers?
A. Shut Down
B. Restart
C. Sleep
D. Hibernate

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


113. Windows displays various options to shutdown. Which is suitable at the end of day?
A. Shut Down
B. Restart
C. Sleep
D. Hibernate

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


114. A bar that inform you the available options in your computer, opened applications, background running applications and can be used to switch between applications quickly is
A. Menu bar
B. Tool bar
C. Status bar
D. Task bar

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


115. Which of the following shutdown method is often called Warm Boot?
A. Shut Down
B. Restart
C. Sleep
D. Hibernate

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


116. ______ is most often done after fixing a problem, adding a new program or making configuration change
A. Shut Down
B. Restart
C. Sleep
D. Hibernate

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


117. Which components appear in the initial windows start up display?
A. Dialog box
B. Task bar
C. Start menu
D. All of the above

Answer

Answer: Option B
Explanation : A taskbar is an element of a graphical user interface which has various purposes. It typically shows which programs are currently running.


118. Taskbar is used for
A. Navigation program
B. Switching between program
C. Start a program
D. All of above

Answer

Answer: Option D
Explanation : Answer: Taskbar is used to launch an application through the start menu. It displays all the opened applications and files. It is used to set taskbar and desktop properties.


119. To install the new font in window XP
A. Start -> setting -> control panel -> font
B. Start -> setting -> control panel -> font -> install new font
C. Start -> control panel -> font -> install new font
D. Start -> setting -> font

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


120. When a peripheral device needs immediate attention from the operating system, it generates a(n)
A. Interrupt
B. Spool
C. Stack
D. Page file

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


121. ___ is a compromise mode between Shut Down and Sleep mode because it does not consume power and remembers the current state of your desktop
A. Shut Down
B. Restart
C. Sleep
D. Hibernate

Answer

Answer: Option D
Explanation : This option was designed for laptops and might not be available for all PCs. (For example, PCs with InstantGo don’t have the hibernate option.) Hibernate uses less power than sleep and when you start up the PC again, you’re back to where you left off (though not as fast as sleep).

Use hibernation when you know that you won’t use your laptop or tablet for an extended period and won’t have an opportunity to charge the battery during that time. First check to see if this option is available on your PC and if it is, turn it on. Source : microsoft.com


122. You should choose this mode if you don’t know how long you won’t use your computer but want to have the same desktop state when you resume
A. Shut Down
B. Restart
C. Sleep
D. Hibernate

Answer

Answer: Option D
Explanation : This option was designed for laptops and might not be available for all PCs. (For example, PCs with InstantGo don’t have the hibernate option.) Hibernate uses less power than sleep and when you start up the PC again, you’re back to where you left off (though not as fast as sleep).

Use hibernation when you know that you won’t use your laptop or tablet for an extended period and won’t have an opportunity to charge the battery during that time. First check to see if this option is available on your PC and if it is, turn it on. Source : microsoft.com


123. The category of operating system that you most likely have running on your PDA computer is a ……. Operating system
A. Real time
B. Single user single task
C. Single user multitask
D. Multiuser multitask

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


124. Running multiple programs at the same time is called:
A. Multitasking
B. Foreground tasking
C. Single tasking
D. Symmetric

Answer

Answer: Option A
Explanation : Multitasking, in an operating system, is allowing a user to perform more than one computer task (such as the operation of an application program) at a time. The operating system is able to keep track of where you are in these tasks and go from one to the other without losing information.


125. What is the meaning of “Hibernate” in Windows XP/Windows 7?
A. Restart the Computer in safe mode
B. Restart the Computer in hibernate mode
C. Shutdown the Computer terminating all the running applications
D. Shutdown the Computer without closing the running applications

Answer

Answer: Option D
Explanation : The computer saves the current state of the system from the computer’s RAM to the hard disk, then shuts down. When the computer is restarted, instead of going through the typical boot sequence, the previously saved state is automatically loaded into the RAM. The open windows and running programs from your previous session appear just as they were when the computer entered Hibernate mode. Basically, Hibernate mode acts like Standby mode, except the computer can be completely turned off. Source : techterms.com


126. ……. is an intermediate storage for deleted files
A. My computer
B. My documents
C. Recycle bin
D. None of above

Answer

Answer: Option C
Explanation : In computing, the Trash (also known as the Recycle Bin in Windows and by other names in other operating systems ) is temporary storage for files that have been deleted in a file manager by the user, but not yet permanently erased from the file system. Typically, a recycle bin is presented as a special file directory to the user, allowing the user to browse deleted files, undelete those that were deleted by mistake, or delete them permanently (either one by one, or by the “Empty Trash” function).


127. We can start the application from?
A. Log off
B. Network place
C. Recycle bin
D. Run

Answer

Answer: Option D
Explanation : On the Microsoft Windows operating system, the Run command is used to directly open an application or document whose path is known. It functions more or less like a single-line command line interface


128. Which of the following is not process states?
A. New
B. Running
C. Ready
D. Finished

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


129. In DOS, the maximum length of filename is
A. 5
B. 8
C. 11
D. 10

Answer

Answer: Option B
Explanation : The older MS-DOS FAT file system supports a maximum of 8 characters for the base file name and 3 characters for the extension, for a total of 12 characters including the dot separator. This is commonly known as an 8.3 file name.


130. The question mark (?) indicates in file searching
A. A single character
B. A group of character
C. Questions
D. None of above

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


131. Save operation means
A. Put data into processor
B. Put data into internal memory
C. Put data into secondary storage
D. Put data into monitor

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


132. CAD software is most likely to be used by
A. Web designer
B. Engineers
C. Project Manager
D. Magazine Editor

Answer

Answer: Option B
Explanation : Computer-aided design (CAD) is the use of computer systems to aid in the creation, modification, analysis, or optimization of a design. CAD software is used to increase the productivity of the designer, improve the quality of design, improve communications through documentation, and to create a database for manufacturing.


133. Which of the following is used to display the content of a certain drive or folder?
A. Click the drive or folder while holding down the Alt key
B. Triple click the drive or folder
C. Right click the drive or folder
D. Double click the drive or folder

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


134. A spooler is a
A. Location in memory that maintains the contents of documents until it prints out
B. Queue of print job that are waiting to print
C. Program that coordinates the print job that are waiting to process
D. Message sent from the printer to the operating system when a print job is completed

Answer

Answer: Option C
Explanation : A program that controls spooling — putting jobs on a queue and taking them off one at a time. Most operating systems come with one or more spoolers, such as a print spooler for spooling documents. In addition, some applications include spoolers. Many word processors, for example, include their own print spooler.
A good print spooler should allow you to change the order of documents in the queue and to cancel specific print jobs. Source : webopedia.com


135. Which of the following file menu option saves document to disk?
A. Save
B. Create
C. Rename
D. All of above

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


136. Booting means
A. Restarting computer
B. Installing program
C. Removing errors
D. Switch off

Answer

Answer: Option A
Explanation : To boot a computer is to load an operating system into the computer’s main memory or random access memory (RAM). Once the operating system is loaded, it’s ready for users to run applications.


137. The function of Dir/W is
A. Show all details of file
B. Show only file name and directory name
C. Shows only directory
D. All of the above

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


138. The problem with …. file is that they slow your computer’s operation
A. Fragmented
B. Formatted
C. Program
D. All of above

Answer

Answer: Option A
Explanation : In computer storage, fragmentation is a phenomenon in which storage space is used inefficiently, reducing capacity or performance and often both. The exact consequences of fragmentation depend on the specific system of storage allocation in use and the particular form of fragmentation.


139. When you rename a file five times then the number of file in the disk is
A. 1
B. 2
C. 3
D. 5

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


140. When you open my computer on desktop you see the information of
A. Hard disk
B. CD
C. Removable disk
D. All of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


141. Page stealing
A. Is a sign of an efficient system
B. Is taking page frame from other working sets
C. Should be the turning goal
D. Is taking layer disk space for page in page out

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


142. What do you mean by dialog box?
A. Interactive message box
B. Group of options
C. Set of controls
D. All of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


143. Which is not a system tool?
A. Folder
B. Backup
C. Scandisk
D. Format

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


144. User action such as keystroke or mouse click are referred to as
A. Interrupt
B. Tasks
C. Processes
D. Event

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


145. How can you optimize performance of your computer?
A. Delete unused files
B. Defrag disk
C. Scan for virus
D. All of above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


146. Dial up connection allows you to
A. Connect ISP
B. Internet
C. Server
D. All of above

Answer

Answer: Option A
Explanation : A dial-up connection is established when two or more communication devices use a public switched telephone network (PSTN) to connect to an Internet service provider (ISP).


147. A utility that can be used to minimize the number of fragmented files and enhance the speed
A. Disk space
B. Defrag
C. Scandisk
D. Double space

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


148. Scandisk
A. Checks the disk
B. Give information about disk
C. Run from DOS mode
D. All of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


149. To properly exit Windows
A. Click the stop button on the desktop
B. Click the exit button on the desktop
C. Select shut down from Start menu
D. None of above

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


150. To change the volume label
A. Vol
B. Label
C. Scandisk
D. None

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


151. Which of the following is a disk compression tools?
A. Drive space
B. Defragmenter
C. Scandisk
D. None of the above

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


152. Recently used application file list appears in the Windows operating system
A. Setting menu
B. Documents menu
C. Run dialog box
D. Programs menu

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


153. ……. are specially designed computer chips that reside inside other devices, such as your car or electric thermostat
A. Server
B. Embedded computer
C. Robotic computer
D. Mainframes

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


154. To save your computer from viruses you will do
A. Install antivirus software and run it
B. Make physical safe for the removal disk
C. Scan the removable disk before using it
D. All of the above

Answer

Answer: Option A
Explanation : Antivirus software, or anti-virus software, also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses,


155. The title bar always displays on
A. Top of the open windows
B. Left side of the open window
C. Right side of the open window
D. All of above

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


156. Which is not external command?
A. Doskey
B. Verify
C. Print
D. Find

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


157. What is the method of handling deadlocks?
A. Use a protocol to ensure that the system will never enter a deadlock state
B. Allow the system to enter the deadlock state and then recover
C. Pretend that deadlocks never occur in the system
D. All of the Above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


158. To delete a file without allowing it to store in recycle bin
A. Press Delete key
B. Press Shift + Delete key
C. Press Ctrl + Delete key
D. Press Alt + Delete key

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


159. Operating system is a ……
A. System software
B. Application software
C. Presentation software
D. Database software

Answer

Answer: Option A
Explanation : An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.


160. To display a shortcut menu for an object you use
A. Click the object
B. Right click the object
C. Point the object and press Ctrl+P
D. Touch the object on the screen with your finger

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


161. Which of the following separates primary file and extension is
A. Dot
B. Period
C. Point
D. All of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


162. Underlined character on the menu or dialog box known as
A. Hot spot
B. Hot key
C. Pane
D. Underline word

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


163. In Microsoft windows, the graphical pattern on the desktop used as background for windows is
A. Icons
B. Wall paper
C. Picture
D. Background

Answer

Answer: Option B
Explanation : More commonly referred to as a desktop background in Windows, a wallpaper is an image that is used as a backdrop on any graphical user interface that has a desktop. More plainly, it is the picture or pattern you see on the main screen after your computer has booted up.


164. All of the following are task performed by the operating system except
A. Managing hardware on the computer
B. Controlling the access that application program has to the CPU
C. Performing housekeeping task like file compression and disk defragmentation
D. Provides an interface for user to interact with computer

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


165. Which key deletes text before, or to the left, of the insertion point?
A. PageUp
B. Delete
C. PageDown
D. BackSpace

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


166. The chunks of a memory are known as
A. Sector
B. Offset
C. Page
D. Frame

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


167. Which of the following is not an operating system?
A. CP / M
B. Unix
C. Pascal
D. MS DOS

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


168. Operating system is like a
A. Government
B. Police
C. Parliament
D. All of above

Answer

Answer: Option A
Explanation : The operating system provides the basic rules, conventions, protections, and services necessary for the functioning of application programs such as editors, spreadsheets, browsers, and games.
Government plays a similar role in the functioning of a modern society. Government furnishes the rules, conventions, protections, and basic services necessary for the smooth functioning and interactions of businesses and individuals.


169. Start / restart the computer is called
A. Exit
B. Run
C. Option
D. Boot

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


170. Which file is transferred when computer is start up?
A. Document
B. Program files
C. Operating system
D. System files

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


171. Generally quick launch toolbar is displayed on
A. the left side of taskbar
B. the right side of taskbar
C. on the middle of taskbar
D. a bar out of taskbar

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


172. Which is not a valid file system?
A. FAT 16
B. FAT 32
C. NTFS
D. FXZ

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


173. Which file system DOS typically use?
A. FAT 16
B. FAT 32
C. NTFS
D. LMFS

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


174. Which file system Windows 95 typically use?
A. FAT 16
B. FAT 32
C. NTFS
D. LMFS

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


175. Which of the following is not a mode in starting Windows?
A. Command Prompt
B. Safe Mode
C. Normal Mode
D. Turbo Mode

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


176. Which of the following is default mode for Windows to start?
A. Command Prompt
B. Safe Mode
C. Normal Mode
D. None of above

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


177. The file system “NTFS” stands for
A. New Type File System
B. Never Terminated File System
C. New Technology File System
D. Non Terminated File System

Answer

Answer: Option C
Explanation : NTFS (New Technology File System) is a proprietary file system developed by Microsoft. Starting with Windows NT 3.1, it is the default file system of the Windows NT family.


178. Which one of the following is not the function of Operating System?
A. Resource Management
B. File Management
C. Networking
D. Processor Management

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


179. How do you connect internet in your system?
A. My computer >> dialup networking
B. Control panel >> modem
C. Network neighborhood
D. None of above

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


180. The following applications may appear on system tray except
A. System Clock
B. Volume Control
C. Network Connection
D. MS Office Suite

Answer

Answer: Option D
Explanation : MS Office Suite is not appear in system tray


181. Which of the following is text browser?
A. Lynx
B. Hot Java
C. c. Netscape
D. Internet Explorer

Answer

Answer: Option A
Explanation : Lynx is a customizable text-based web browser for use on cursor-addressable character cell terminals. As of May 2017, it is the oldest web browser still in general use and active development, having started in 1992.


182. Which of the following is default location of saving and opening file?
A. Desktop
B. My computer
C. My documents
D. All of above

Answer

Answer: Option C
Explanation : My documents is the default location of saving and opening the files in windows operating system.


183. By default we can save the file in
A. Desktop
B. Recycle bin
C. My document
D. My computer

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


184. ____ is the operating systems File and folder Manager
A. Windows Explorer
B. Windows Control Panel
C. My Computer
D. My Documents

Answer

Answer: Option A
Explanation : File Explorer, previously known as Windows Explorer, is a file manager application that is included with releases of the Microsoft Windows operating system from Windows 95 onwards. It provides a graphical user interface for accessing the file systems.


185. It is used to explorer the contents of computer, drives as well as manage files
A. Recent Places
B. My Document
C. My Computer
D. My Network Place

Answer

Answer: Option B
Explanation : My Documents is the commonly recognized name of a special folder in Microsoft Windows This folder is supposed to be a personal area where users store their personal non-shared documents.


186. The Primary job of the operating system is
A. Manage Commands
B. Manage Users
C. Manage Programs
D. Manage Resources

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


187. Which of the following is not an operating system?
A. Windows 2000
B. Linux
C. Mac OS
D. Notepad

Answer

Answer: Option D
Explanation : Notepad is a simple text editor for Microsoft Windows and a basic text-editing program which enables computer users to create documents. It was first released as a mouse-based MS-DOS program in 1983, and has been included in all versions of Microsoft Windows since Windows 1.0 in 1985.


188. Scandisk analyze and repair damage to which of the following?
A. Physical clusters
B. FAT
C. Lost clusters
D. All of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


189. Find can be used to
A. Locate a program
B. Locate a document
C. Locate a network computer
D. All of above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


190. The necessary conditions needed before deadlock can occur?
A. No Mutual Exclusion Hold and wait Preemption Circular Wait
B. Mutual Exclusion No Hold and wait Preemption Circular Wait
C. Mutual Exclusion Hold and wait No Preemption Circular Wait
D. Mutual Exclusion Hold and wait Preemption No Circular Wait

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


191. …… is a new windows feature that offers a number of methods for searching for a file or folder?
A. Find
B. Search
C. Locate
D. All of the above

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


192. The OS used to operate the mobile phone is a
A. Smart card OS
B. Embedded OS
C. Multiuser OS
D. None of above

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


193. UNIX operating system is a(n)
A. Time sharing operating system
B. Multi-user operating system
C. Multi-tasking operating system
D. All of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


194. When we double click on my computer
A. Show the content of your saved files
B. Show the list of your computer drive
C. List of deleted files and folders
D. All of the above

Answer

Answer: Option B
Explanation : When we double click on my computer show the list of your computer drive.


195. The ability of an operating system to control the activities of multiple program at the same time is called
A. Multitasking
B. Multiprocessing
C. Multioperating
D. Multipaging

Answer

Answer: Option A
Explanation : In computing, multitasking is the concurrent execution of multiple tasks over a certain period of time. New tasks can interrupt already started ones before they finish, instead of waiting for them to end.


196. Disk label name can be up to …… characters
A. 8
B. 9
C. 11
D. 255

Answer

Answer: Option C
Explanation : Disk label name can be up to 11 characters


197. Which of the following is the part of the operating system?
A. Cell
B. FAT
C. Kernel
D. Disk

Answer

Answer: Option C
Explanation : A kernel is the central part of an operating system. It manages the operations of the computer and the hardware – most notably memory and CPU time. There are two types of kernels: A microkernel, which only contains basic functionality; A monolithic kernel, which contains many device drivers.


198. Directory is similar to ……
A. File
B. Folder
C. Item
D. None of above

Answer

Answer: Option B
Explanation : In computing, a directory is a file system cataloging structure which contains references to other computer files, and possibly other directories. On many computers, directories are known as folders, or drawers to provide some relevancy to a workbench or the traditional office file cabinet.


199. Sleep is a good mode to use because
A. It saves power which in true is saving money
B. It makes computer fresh after it wakes up
C. It consumes low battery when you start it again
D. All of above

Answer

Answer: Option A
Explanation : Sleep is a good mode to use because it saves power which in true is saving money


200. What hole will allocates in “Worst-Fit” algorithm of memory management?
A. It allocates the smaller hole than required memory hole
B. It allocates the smallest hole from the available memory holes
C. It allocates the largest hole from the available memory holes
D. It allocates the exact same size memory hole

Answer

Answer: Option C
Explanation : Worst Fit allocates a process to the partition which is largest sufficient among the freely available partitions available in the main memory. If a large process comes at a later stage, then memory will not have space to accommodate it.


201. …… is used in operating system to separate mechanism from policy
A. Single level implementation
B. Two level implementation
C. Multi level implementation
D. None

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


202. The modern keyboard typically has __________ Function keys.
A. 10
B. 12
C. 14
D. 16

Answer

Answer: Option B
Explanation : The modern keyboard typically has 12 Function keys.
F1, F2, F3, F4, F5, F6, F7, F8, F9, F10, F11, F12


203. Essential files of MS DOS are
A. Command.com
B. Io.sys
C. Msdos.sys
D. All of above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


204. Which Operating System doesn’t support long file names?
A. OS / 2
B. Windows 95
C. MS-DOS
D. Windows NT

Answer

Answer: Option C
Explanation : MS-DOS Operating System doesn’t support long file names


205. We need system files to run
A. MS Word
B. MS Excel
C. MS Dos
D. MS Access

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


206. What is the function of folder?
A. Save files
B. Delete files
C. Move files
D. All of the above

Answer

Answer: Option D
Explanation : A digital folder has the same purpose as a physical folder – to store documents. Computer folders can also store other types of files, such as applications, archives, scripts, and libraries. Folders can even store other folders, which may contain additional files and folders. Folders are designed for organizing files.


207. Which button might you find in a windows title bar?
A. Close button
B. Maximize button
C. Minimize button
D. All of the above

Answer

Answer: Option D
Explanation :


208. Press the ….. button to have the window fill the entire screen
A. Close
B. Maximize
C. Minimize
D. None of the above

Answer

Answer: Option B
Explanation : Press the Maximize Button to have the window fill the entire screen


209. The box on ……. that allows you to choose where to go and is located below the standard toolbar
A. System menu
B. Address bar
C. Menu bar
D. None of these

Answer

Answer: Option B
Explanation : The box on Address bar that allows you to choose where to go and is located below the standard toolbar


210. Which windows features can be accessed from the start menu?
A. Help
B. Windows Explorer
C. Microsoft Network
D. All of above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


211. ……. are list of commands that appear on the screen
A. GUIS
B. Icons
C. Menus
D. Windows

Answer

Answer: Option C
Explanation : Menus are list of commands that appear on the screen


212. A …… is a set of computer instructions that carry out a task on the computer
A. Program
B. Database
C. Memory files
D. None of the above

Answer

Answer: Option A
Explanation : A Program is a set of computer instructions that carry out a task on the computer


213. A real time operating system is most likely to be used for which of the following task?
A. Controlling access to a shared printer in a network
B. Ensuring that system clock works correctly on server
C. Managing the access to system files in a laptop computers
D. Controlling the fuel injection system of an automobile engines

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


214. An operating system is a program or a group of programs that
A. Helps in checking the spelling of Word
B. Maintain the relationship in Database
C. Manages the resources of the Computer
D. Performs the calculations of cells in Excel

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


215. What is the function of an operating system?
A. Manages computer’s resources very efficiently
B. Takes care of scheduling jobs for execution
C. Manages the flow of data and instructions
D. All of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


216. Poor response time are usually caused by
A. Process busy
B. High I/I rates
C. High paging rate
D. Any of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


217. Where will store data first time when you copy
A. Clipboard
B. Clipbook
C. Hard disk
D. CD

Answer

Answer: Option A
Explanation : In clipboard first time data is store when copy.


218. GUI means
A. Graphic user interface
B. Geographic user interface
C. Graphical user interface
D. Geometric user interface

Answer

Answer: Option C
Explanation : The graphical user interface (GUI), is a type of user interface that allows users to interact with electronic devices through graphical icons and visual indicators such as secondary notation, instead of text-based user interfaces, typed command labels or text navigation.


219. Use of icons and windows are characteristics of ……. interface
A. Command driven
B. Windows orientated
C. Graphical user
D. Menu driven

Answer

Answer: Option C
Explanation : Use of icons and windows are characteristics of graphical user interface.


220. Windows can run
A. One application only
B. Two applications only
C. Four applications only
D. All of above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


221. You can switch from one program to another on the desktop by clicking within the desired program’s window or by clicking on its …… button
A. Icon
B. Taskbar button
C. Folder
D. None of above

Answer

Answer: Option B
Explanation : You can switch from one program to another on the desktop by clicking within the desired program’s window or by clicking on its “Taskbar button” button.


222. You can switch from one program to another by clicking within the desired program’s icon from the
A. Application icon on desktop
B. Application icon from taskbar
C. Folder
D. None of above

Answer

Answer: Option B
Explanation : You can switch from one program to another by clicking within the desired program’s icon from the Application icon from taskbar.


223. A tiny dot of light on the monitor is called

A. Silicon chip
B. Optical illusion
C. Icon
D. Pixel

Answer

Answer: Option D
Explanation : A pixel is a single point in a graphic image. Graphics monitors display pictures by dividing the display screen into thousands (or millions) of pixels, arranged in rows and columns. The pixels are so close together that they appear connected.


224. Virtual memory typically located on
A. RAM
B. CPU
C. Flash card
D. Hard drive

Answer

Answer: Option D
Explanation : Virtual memory typically located on Hard drive


225. What is contained in the page table?
A. Base address of each frame and corresponding page number
B. Memory address and corresponding page number
C. File name and corresponding page number
D. None of Above

Answer

Answer: Option A
Explanation : Base address of each frame and corresponding page number are contained in the page table.


226. Who is called a supervisor of computer activity?
A. Memory
B. Operating System
C. I / O Devices
D. Control Unit

Answer

Answer: Option B
Explanation : Operating System is called a supervisor of computer activity.


227. Operating System manages
A. Memory
B. Processor
C. I / O devices
D. All of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


228. Tree structure displays the
A. File only
B. Directory only
C. File and directory name
D. None of above

Answer

Answer: Option B
Explanation : Tree structure displays the Directory only.


229. To send email, we use
A. MS Excel
B. Outlook Explorer
C. HTML
D. Netscape Navigator

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


230. What does FAT stands for?
A. File attribute type
B. File allocation table
C. Format All Tabs settings
D. File for all type

Answer

Answer: Option B
Explanation : File Allocation Table (FAT) is a computer file system architecture and a family of industry-standard file systems utilizing it. The FAT file system is a continuing standard which borrows source code from the original, legacy file system and proves to be simple and robust. It offers useful performance even in lightweight implementations, but cannot deliver the same performance, reliability and scalability as some modern file systems. It is, however, supported for compatibility reasons by nearly all currently developed operating systems for personal computers and many mobile devices and embedded systems, and thus is a well-suited format for data exchange between computers and devices of almost any type and age from 1981 up to the present. Source : wikipedia.org


231. Which of the following concept is best to preventing page faults?
A. Paging
B. The working set
C. Hit ratios
D. Address location resolution

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


232. Fonts install from
A. Add from control panel
B. Font setup file
C. Font.exe file
D. All of above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


233. The operating feature that integrates the file created in different application into WebPages
A. Web integration
B. Internet integration
C. Intranet integration
D. Hypertext integration

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


234. Which is not concerned with control panel?
A. Printer
B. Run application
C. Font
D. Keyboard

Answer

Answer: Option B
Explanation : Run application is not concerned with control panel


235. Which icon would you access in the printer window to install a printer drive?
A. Add printer wizard
B. Setup
C. Install
D. None of above

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


236. Unicode standard is
A. Keyboard layout
B. Software
C. Font
D. Character encoding system

Answer

Answer: Option D
Explanation : Unicode is a computing industry standard for the consistent encoding, representation, and handling of text expressed in most of the world’s writing systems. The standard is maintained by the Unicode Consortium, and as of June 2018 the most recent version, Unicode 11.0, contains a repertoire of 137,439 characters covering 146 modern and historic scripts, as well as multiple symbol sets and emoji. The character repertoire of the Unicode Standard is synchronized with ISO/IEC 10646, and both are code-for-code identical. Source : wikipedia.org


237. Which of the following is the allocation method of a disk space?
A. Contiguous allocation
B. Linked allocation
C. Indexed allocation
D. All of the Above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


238. You can set the width taskbar area and different components in it
A. By right click and set width menu
B. If the taskbar is not yet locked
C. If the applications are not opened
D. If other toolbars are not enabled

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


239. A ….. is a windows component that is designed to store other components so these can be organized efficiently?
A. Document
B. Window
C. Folder
D. All of above

Answer

Answer: Option C
Explanation : A Folder is a windows component that is designed to store other components so these can be organized efficiently.


240. When you cut or copy the text or picture, it stores temporarily in the
A. File
B. Clipboard
C. Icon
D. All of above

Answer

Answer: Option B
Explanation : The clipboard is a data buffer used for short-term data storage and/or data transfer between documents or applications used by cut, copy and paste operations and provided by the operating system.


241. Windows 2000 server uses the
A. FAT 16
B. NTFS
C. FAT 64
D. FAT 32

Answer

Answer: Option B
Explanation : Windows 2000 server uses the NTFS (New Technology File System).


242. First-in-First-Out (FIFO) scheduling is
A. Non Preemptive Scheduling
B. Preemptive Scheduling
C. Fair Share Scheduling
D. Deadline Scheduling

Answer

Answer: Option A
Explanation : First-in-First-Out (FIFO) scheduling is “Non Preemptive Scheduling”.


243. Which one of the following key is used to refresh the active window?
A. F7
B. F8
C. F9
D. F5

Answer

Answer: Option D
Explanation : “F5” key is used to refresh the active window.


244. To display system boot menu which of the following key you must press?
A. F4
B. F7
C. F8
D. F5

Answer

Answer: Option C
Explanation : To display system boot menu F8 key you must press?


245. Press ____ key while booting to display Advanced Boot Menu
A. F5
B. F6
C. F8
D. Del

Answer

Answer: Option C
Explanation : Press F8 key while booting to display Advanced Boot Menu.


246. Which operating system does not support long file names?
A. OS/2
B. Windows 98
C. DOS 6.2
D. Windows NT

Answer

Answer: Option C
Explanation : DOS 6.2 operating system does not support long file names


247. Which operating system uses short file names?
A. Windows
B. Unix
C. DOS
D. All of above

Answer

Answer: Option C
Explanation : DOS operating system uses short file names


248. Bringing a page into memory only when it is needed, this mechanism is called
A. Deadlock
B. Page Fault
C. Dormant Paging
D. Demand Paging

Answer

Answer: Option D
Explanation : In computer operating systems, demand paging (as opposed to anticipatory paging) is a method of virtual memory management. In a system that uses demand paging, the operating system copies a disk page into physical memory only if an attempt is made to access it and that page is not already in memory


249. It is the default folder for many Windows Applications to save your file
A. My Document
B. My Pictures
C. Documents and Settings
D. My Computer

Answer

Answer: Option A
Explanation : My Document is the default folder for many Windows Applications to save your file.


250. The component of Windows that lets you to transfer contents from one document to another
A. Briefcase
B. Clipboard
C. Document
D. Boot

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


251. What do you mean by Memory Compaction?
A. Combine multiple equal memory holes into one big hole
B. Combine multiple small memory holes into one big hole
C. Divide big memory hole into small holes
D. Divide memory hole by 2

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


252. Desktop is a
A. Provides work space
B. Screen saver
C. Display program
D. Working with my document

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


253. Which of the following is not a system tool?
A. Scandisk
B. Drive space
C. Disk defragmenter
D. Doskey

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


254. Which of the following statement about directories is false?
A. Directories can exist inside directories
B. The root directory is always at the highest level
C. Directories cannot be renamed
D. Directories can be deleted

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


255. The program that is responsible for loading the operating system into RAM is called
A. BIOS
B. Bootstrap program
C. Device driver
D. Supervisor program

Answer

Answer: Option B
Explanation : A bootstrap is the program that initializes the operating system (OS) during startup. The term bootstrap or bootstrapping originated in the early 1950s. It referred to a bootstrap load button that was used to initiate a hardwired bootstrap program, or smaller program that executed a larger program such as the OS.


256. Which of the following key is used to move the pointer from one pane to next pane?
A. F3
B. F4
C. F5
D. F6

Answer

Answer: Option D
Explanation : F6 key is used to move the pointer from one pane to next pane


257. In a folder, which of the following key is used to rename the file or folder
A. F3
B. F4
C. F2
D. F7

Answer

Answer: Option C
Explanation : In a folder, “F2” key is used to rename the file or folder


258. A character that represents one or more unknown character is
A. Wildcard character
B. All file name
C. Extensions
D. None of above

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


259. Which of the following file format supports in Windows 7?
A. NTFS
B. BSD
C. EXT
D. All of the above

Answer

Answer: Option A
Explanation : NTFS file format supports in Windows 7


260. Anything you cut or copy on to the clipboard remains there until you
A. Change it
B. Clear
C. Exit windows
D. All of the above

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


261. Multi programming systems ……
A. Are easier to develop than single programming system
B. Execute each job faster
C. Execute more jobs in the same time period
D. Are used only by large mainframe computer

Answer

Answer: Option C
Explanation : Multi programming systems execute more jobs in the same time period


262. Netscape navigator is a
A. Browser
B. Compose
C. Editor
D. None of these

Answer

Answer: Option A
Explanation : Netscape navigator is a Browser.
The Netscape web browser is the general name for a series of web browsers formerly produced by Netscape Communications Corporation, a former subsidiary of AOL.


263. To print documents from Windows
A. File >> Print
B. Drag the document icon over your printers icon
C. Edit print
D. Both A and B

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


264. Which of the following appear in Windows menu bar?
A. Help
B. File
C. Edit
D. All of above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


265. The operating system allows the user to organize the computer’s contents in a hierarchical structure of directories that include all of the following except:
A. Files
B. Folders
C. Drives
D. System

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


266. Copying a process from memory to disk to allow space for other processes is Called
A. Swapping
B. Deadlock
C. Demand Paging
D. Page Fault

Answer

Answer: Option A
Explanation : Copying a process from memory to disk to allow space for other processes is called Swapping


267. Any files deleted in Windows goes into
A. Trash can
B. Recycle bin
C. Deleted Files
D. None of above

Answer

Answer: Option B
Explanation : Any files deleted in Windows goes into Recycle bin.


268. Which of the following is a disk compression tool?
A. Drive space
B. Scan disk
C. Defragmenter
D. None of the above

Answer

Answer: Option A
Explanation : Drive Space is a disk compression utility supplied with MS-DOS starting from version 6.0. The purpose of Drive Space is to increase the amount of data the user could store on disks, by transparently compressing and decompressing data on-the-fly. It is primarily intended for use with hard drives, but use for floppy disks is also supported.


269. What does Belady’s Anomaly related to?
A. Page Replacement Algorithm
B. Memory Management Algorithm
C. Deadlock Prevention Algorithm
D. Disk Scheduling Algorithm

Answer

Answer: Option A
Explanation : In computer storage, Belady’s Anomaly is the name given to the phenomenon where increasing the number of page frames results in an increase in the number of page faults for a given memory access pattern. This phenomenon is commonly experienced when using the First in First Out (FIFO) page replacement algorithm.


270. A ….. allows you to write on screen with a digital pen and convert that writing into characters that the PC can process
A. Monitor RS
B. Tablet PC
C. Database manager
D. Media Center

Answer

Answer: Option B
Explanation : A ‘Tablet PC’ allows you to write on screen with a digital pen and convert that writing into characters that the PC can process.


271. What should be the extension to execute files?
A. EXE
B. BAT
C. COM
D. All of the above

Answer

Answer: Option D
Explanation : EXE is a file extension for an executable file format. An executable is a file that contains a program – that is, a particular kind of file that is capable of being executed or run as a program in the computer.


272. Driver is
A. Hardware controller
B. Hardware and gain controller
C. Data controller
D. All of above

Answer

Answer: Option A
Explanation : A program that controls a device. Every device, whether it be a printer, disk drive, or keyboard, must have a driver program. Many drivers, such as the keyboard driver, come with the operating system. For other devices, you may need to load a new driver when you connect the device to your computer.


273. Part of the POST process is to ensure that the test of essential peripheral device coincides with the hardware configuration that stored in
A. ROM
B. The hard drive
C. CMOS
D. Cache Memory

Answer

Answer: Option C
Explanation : CMOS (complementary metal-oxide-semiconductor) is the term usually used to describe the small amount of memory on a computer motherboard that stores the BIOS settings.


274. The memory resident portion of operating system is called the
A. Registry
B. API
C. CMOS
D. Kernel

Answer

Answer: Option D
Explanation : The memory resident portion of operating system is called the Kernel.


275. System files allocated at
A. Boot area
B. FAT area
C. Data area
D. Directory

Answer

Answer: Option A
Explanation : System files allocated at Boot area


276. …… transforms one interface into other interface
A. Program
B. Software
C. Data
D. None

Answer

Answer: Option B
Explanation : Software transforms one interface into other interface


277. …….. interface consists of thing like program counter, register, interrupts and terminal
A. Hardware
B. Software
C. Data
D. None

Answer

Answer: Option A
Explanation : Hardware interface consists of thing like program counter, register, interrupts and terminal


278. Boot startup process
A. Loads system files to RAM
B. Checks the computer connections
C. Clean up the computer memory
D. Prepare the computer ready

Answer

Answer: Option A
Explanation : Boot startup process is Loads system files to RAM.


279. When you delete file, where it resides?
A. Briefcase
B. Recycle bin
C. CD
D. Desktop

Answer

Answer: Option B
Explanation : In computing, the Trash is temporary storage for files that have been deleted in a file manager by the user, but not yet permanently erased from the file system.


280. Which of the following command is used to switch between the window programs?
A. Alt+Tab
B. Alt+F4
C. Ctrl+Tab
D. None of the above

Answer

Answer: Option A
Explanation : Alt+Tab command is used to switch between the window programs


281. ……. show characteristics with both hardware and software
A. Operating system
B. Software
C. Data
D. None

Answer

Answer: Option A
Explanation : Operating system show characteristics with both hardware and software


282. To prevent the addition and deletion of files on a disk or tape we use
A. Format
B. Write protect
C. Create back up
D. None of above

Answer

Answer: Option B
Explanation : Write protection is the term used to denote the locking mechanism which prevents modification or deletion of data on a storage device. Write protection helps in the preventing accidental and intentional data modification and also helps protect against virus attacks.


283. During the boot process, the ….. looks for the system file
A. CD
B. BIOS
C. CPU
D. DVD

Answer

Answer: Option B
Explanation : During the boot process, the ‘BIOS’ looks for the system file


284. Which of the following resources must be protected by the operating system?
A. I/O
B. Memory
C. CPU
D. All of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


285. What are the two types of Semaphore?
A. Digital Semaphores and Binary Semaphores
B. Analog Semaphores and Octal Semaphores
C. Counting Semaphores and Binary Semaphores
D. Critical Semaphores and System Semaphores

Answer

Answer: Option C
Explanation : Semaphore is a simply a variable. This variable is used to solve critical section problem and to achieve process synchronization in the multi processing environment.
The two most common kinds of semaphores are counting semaphores and binary semaphores. Counting semaphore can take non-negative integer values and Binary semaphore can take the value 0 & 1. only.


286. Who is called a supervisor of computer activity?
A. CPU
B. OS
C. Control Unit
D. Application Program

Answer

Answer: Option B
Explanation : OS is called a supervisor of computer activity.


287. Font folder is located on
A. Program folder
B. Ms Word file
C. Control Panel folder
D. Desktop folder

Answer

Answer: Option C
Explanation : Font folder is located on ‘Control Panel folder’.


288. From where do you change mouse setting?
A. Setting >> mouse
B. Hardware setting
C. Control panel >> mouse
D. None of the above

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


289. Work group means
A. Computer in network
B. Individual user
C. Connection
D. All of the above

Answer

Answer: Option A
Explanation : Work group means Computer in network


290. The core of operating system is:
A. Unix
B. Kernel
C. Command.com
D. None of these

Answer

Answer: Option B
Explanation : The core of the operating system is Kernel.


291. Which of the following memory unit that processor can access more rapidly
A. Main Memory
B. Virtual Memory
C. Cache memory
D. Read Only Memory

Answer

Answer: Option C
Explanation : Cache memory unit that processor can access more rapidly.


292. Small pictures appear on the desktop
A. Windows
B. Icon
C. Button
D. None of above

Answer

Answer: Option B
Explanation : Small pictures appear on the desktop is called icon


293. A graphical user interface displays
A. Graphics
B. Text
C. Both of Above
D. None of Above

Answer

Answer: Option C
Explanation : A graphical user interface displays both Graphics and Text.


294. To change the screen saver you can go from
A. Control panel display
B. Right click in desktop and properties
C. Both of Above
D. None of These

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


295. You can add or remove program
A. Add / Remove program from control panel
B. Delete the shortcut icon from desktop
C. Both A and B
D. None of Above

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


296. Which of the following is a program group?
A. Word pad
B. Paint brush
C. Accessories
D. None of the above

Answer

Answer: Option C
Explanation : Accessories is a program group


297. A program in execution is called
A. A Paging
B. A Process
C. A virtual memory
D. A Demand Page

Answer

Answer: Option B
Explanation : A program in execution is called ‘A Process’


298. What is the default file extension created by notepad?
A. .doc
B. .html
C. .txt
D. .tif

Answer

Answer: Option C
Explanation : .txt is the default file extension created by notepad.


299. Which of the following is not the user file extension?
A. .ppt
B. .xls
C. .sys
D. .doc

Answer

Answer: Option C
Explanation : .sys is not the user file extension


300. Which of the following is the extension of WordPad?
A. .ppt
B. .xls
C. .rtf
D. None of above

Answer

Answer: Option C
Explanation : .rtf is the extension of WordPad


301. The ……. is a temporary storage area in memory where you can attach text or graphics information
A. Clipboard
B. Copyboard
C. Both a and b
D. None of above

Answer

Answer: Option A
Explanation : The Clipboard is a temporary storage area in memory where you can attach text or graphics information.


302. An embedded object might appear in a document as
A. Embedding
B. Linking
C. Both
D. None of above

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


303. When a computer is first turned on or restarted, a special type of absolute loader called
A. Compile and go loader
B. Boot loader
C. Bootstrap loader
D. Relating loader

Answer

Answer: Option C
Explanation : When a computer is first turned on or restarted, a special type of absolute loader called ‘Bootstrap loader’.


304. In which type of the following OS, the response time is very crucial.
A. Network Operating System
B. Real Time Operating System
C. Batch Operating System
D. Unix Operating System

Answer

Answer: Option B
Explanation : Real Time Operating System, the response time is very crucial.


305. Which of the following is a correct association between a vendor and an operating system
A. Redhat Linux
B. Microsoft Unix
C. AT ; T DOS
D. Novell Linux

Answer

Answer: Option A
Explanation : Redhat Linux is a correct association between a vendor and an operating system.


306. …… controls the way in which the computer system functions and provides a means by which users can interact with the computer
A. The platform
B. The operating system
C. Application software
D. The motherboard

Answer

Answer: Option B
Explanation : The operating system controls the way in which the computer system functions and provides a means by which users can interact with the computer.


307. Which one of the following is not a layer of operating system?
A. Kernel
B. Shell
C. Application program
D. Critical selection

Answer

Answer: Option D
Explanation : Critical selection is not a layer of the operating system


308. Which is not the function of the operating system?
A. Memory management
B. Disk management
C. Application management
D. Virus protection

Answer

Answer: Option D
Explanation : Virus protection is not the function of the operating system


309. Which of the key is used to close the active window?
A. Ctrl+F4
B. Ctrl+F5
C. Alt+F6
D. None of above

Answer

Answer: Option D
Explanation : Ctrl+W & Alt+F4 is used to close the active window.


310. The virtual memory is
A. An extremely large main memory
B. An extremely large secondary memory
C. An illusion of extremely large main memory
D. A type of memory used in super computer

Answer

Answer: Option C
Explanation : The virtual memory is an illusion of extremely large main memory


311. The shortcut key to open a task manager is:
A. Alt + F1
B. Alt + Ctrl + Delete
C. Alt + Tab
D. F1

Answer

Answer: Option B
Explanation : The shortcut key to open a task manager is “Alt + Ctrl + Delete”.


312. The windows feature is the ability of computer to automatically configure a new hardware component is that
A. Auto detect
B. Plug and play
C. Add remove hardware
D. None of above

Answer

Answer: Option B
Explanation : In computing, a plug and play device or computer bus, is one with a specification that facilitates the discovery of a hardware component in a system without the need for physical device configuration


313. Internet Explorer is
A. an Internet browser
B. provided by Windows OS
C. an access point for Word Wide Web
D. All of above

Answer

Answer: Option D
Explanation : Internet Explorer is a series of graphical web browsers developed by Microsoft and included in the Microsoft Windows line of operating systems, starting in 1995.


314. Which of the following is not a part of the control panel?
A. Date and time
B. My documents
C. Add or remove program
D. Display

Answer

Answer: Option B
Explanation : My documents is not a part of the control panel.


315. The …… provides information about hardware installation, configuration and hardware status
A. Device manager
B. Control panel
C. Add new hardware
D. Program manager

Answer

Answer: Option A
Explanation : The Device manager provides information about hardware installation, configuration and hardware status.


316. Which of the following is not a video file extension?
A. .avi
B. .wav
C. .mpeg
D. .mov

Answer

Answer: Option B
Explanation : .wav is not a video file extension


317. What is the extension of the font file?
A. .ttf
B. .mdb
C. .fft
D. .txt

Answer

Answer: Option A
Explanation : .ttf is the extension of the font file


318. Which is not executable file?
A. .com
B. .exe
C. .bat
D. .txt

Answer

Answer: Option D
Explanation : .txt is not executable file


319. To move to the beginning of a line of text, press the __________ key.
A. A
B. PgUp
C. Enter
D. Home

Answer

Answer: Option D
Explanation : To move to the beginning of a line of text, press the Home key.


320. When was MS Windows operating system introduced?
A. 1975
B. 1985
C. 1995
D. 2000

Answer

Answer: Option B
Explanation : Microsoft Windows is a group of several graphical operating system families, all of which are developed, marketed, and sold by Microsoft.
Microsoft introduced an operating environment named Windows on November 20, 1985, as a graphical operating system shell for MS-DOS in response to the growing interest in graphical user interfaces (GUIs). Source : wikipedia.org


321. The Storage-to-Storage instructions
A. have both their operands in the main store.
B. which perform an operation on a register operand and an operand which is located in the main store generally leaving the result in the register expect in the case of store operation when it is also
C. which perform indicated operations on two fast registers of the machine and have the result in one of the registers
D. all of the above
E. None of the above

Answer

Answer: Option A
Explanation : The Storage-to-Storage instructions have both their operands in the main store.


322. First operating system was developed in
A. 1958
B. 1976
C. 1956
D. 1946

Answer

Answer: Option C
Explanation : The first operating system used for real work was GM-NAA I/O, produced in 1956 by General Motors’ Research division for its IBM 704.


323. The LRU algorithm
A. pages out pages that have been used recently
B. pages out pages that have not been used recently
C. pages out pages that have been least used recently
D. pages out the first page in a given area
E. None of the above

Answer

Answer: Option C
Explanation : In a computer operating system that uses paging for virtual memory management, page replacement algorithms decide which memory pages to page out, sometimes called swap out, or write to disk, when a page of memory needs to be allocated.


324. Which of the following systems software does the job of merging the records from two files into one?
A. Security software
B. Utility program
C. Networking software
D. Documentation system
E. None of the above

Answer

Answer: Option B
Explanation : Utility program systems software does the job of merging the records from two files into one


325. The maximum length of any single path from the root directory?
A. 54
B. 63
C. 80
D. 27

Answer

Answer: Option B
Explanation : The maximum length of any single path from the root directory is 63.


326. The part of machine level instruction, which tells the central processor what has to be done, is
A. Operation code
B. Address
C. Locator
D. Flip-Flop
E. None of the above

Answer

Answer: Option A
Explanation : The part of machine level instruction, which tells the central processor what has to be done, is Operation code


327. Fork is
A. the dispatching of a task
B. the creation of a new job
C. the creation of a new process
D. increasing the priority of a task
E. None of the above

Answer

Answer: Option C
Explanation : In computing, particularly in the context of the Unix operating system and its workalikes, fork is an operation whereby a process creates a copy of itself. It is usually a system call, implemented in the kernel. Fork is the primary method of process creation on Unix-like operating systems.


328. Which of the following refers to the associative memory?
A. the address of the data is generated by the CPU
B. the address of the data is supplied by the users
C. there is no need for an address i.e. the data is used as an address
D. the data are accessed sequentially
E. None of the above

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


329. To avoid the race condition, the number of processes that may be simultaneously inside their critical section is
A. 8
B. 1
C. 16
D. 0
E. None of the above

Answer

Answer: Option B
Explanation : To avoid the race condition, the number of processes that may be simultaneously inside their critical section is 1.


330. Thrashing
A. is a natural consequence of virtual memory systems
B. can always be avoided by swapping
C. always occurs on large computers
D. can be caused by poor paging algorithms
E. None of the above

Answer

Answer: Option D
Explanation : In computer science, thrashing occurs when a computer’s virtual memory resources become saturated, leading to a constant state of paging, to the exclusion of most application-level processing. This causes the performance of the computer to degrade or collapse. Source : wikipedia.org


331. Supervisor state is
A. never used
B. entered by programs when they enter the processor
C. required to perform any I/O
D. only allowed to the operating system
E. None of the above

Answer

Answer: Option D
Explanation : The supervisor state is a special mode of operation to which the user has no access. When it is in the supervisor state, the processor and its actions are entirely controled by the Operating System (OS).


332. Which of the following instruction steps, would be written within the diamond-shaped box, of a flowchart?
A. S = B – C
B. IS A<10
C. PRINT A
D. DATA X4Z
E. None of the above

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


333. Which of the following statements is false?
A. the technique of storage compaction involves moving all occupied areas of storage to one end or other of main storage
B. compaction does not involve relocation of programs
C. compaction is also know as garbage collection
D. the system must stop everything while it performs the compaction
E. None of the above

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


334. Interprocess communication
A. is required for all processes
B. is usually done via disk drives
C. is never necessary
D. allows processes to synchronize activity
E. None of the above

Answer

Answer: Option D
Explanation : Interprocess communication allows processes to synchronize activity


335. Which of the following functions is(are) performed by the loader
A. allocate space in memory for the programs and resolve symbolic references between object decks
B. adjust all address dependent locations such as address constants to correspond to the allocated space.
C. physically place the machine instructions and data into memory.
D. All of the above
E. None of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


336. A system program that combines the separately compiled modules of a program into a form suitable for execution
A. assembler
B. linking loader
C. cross compiler
D. load and go
E. None of the above

Answer

Answer: Option B
Explanation : A system program that combines the separately compiled modules of a program into a form suitable for execution is linking loader.


337. Process is
A. program in High level language kept on disk
B. contents of main memory
C. a program in execution
D. a job in secondary memory
E. None of the above

Answer

Answer: Option C
Explanation : Process is a program in execution.


338. Addressing structure
A. defines the fundamental method of determining effective operand addresses
B. are variations in the use of fundamental addressing structures or some associated actions which are related to addressing.
C. performs indicated operations on two fast registers of the machine and leave the result in one of the registers.
D. all of the above
E. None of the above

Answer

Answer: Option A
Explanation : Addressing structure is defines the fundamental method of determining effective operand addresses.


339. The Memory Buffer Register (MBR)
A. is a hardware memory device which denotes the location of the current instruction being executed.
B. is a group of electrical circuits (hardware) that performs the intent of instructions fetched from memory.
C. contains the address of the memory location that is to be read from or stored into.
D. contains a copy of the designated memory location specified by the MAR after a “read” or the new contents of the memory prior to a “write”.
E. None of the above

Answer

Answer: Option D
Explanation : The Memory Buffer Register (MBR) contains a copy of the designated memory location specified by the MAR after a “read” or the new contents of the memory prior to a “write”.


340. The strategy of allowing processes that are logically runnable to be temporarily suspended is called
A. preemptive scheduling
B. non preemptive scheduling
C. shortest job first
D. first come first served
E. None of the above

Answer

Answer: Option A
Explanation : The strategy of allowing processes that are logically runnable to be temporarily suspended is called preemptive scheduling.


341. A system program that sets up an executable program in main memory ready for execution is
A. assembler
B. linker
C. loader
D. compiler
E. None of the above

Answer

Answer: Option C
Explanation : A system program that sets up an executable program in main memory ready for execution is loader


342. Which of the following are loaded into main memory when the computer is booted?
A. internal command instructions
B. external command instructions
C. utility programs
D. word processing instructions
E. None of the above

Answer

Answer: Option A
Explanation : Internal command instructions are loaded into main memory when the computer is booted


343. The FIFO algorithm
A. executes first the job that last entered the queue
B. executes first the job that first entered the queue
C. execute first the job that has been in the queue the longest
D. executes first the job with the least processor needs
E. None of the above

Answer

Answer: Option B
Explanation : The simplest page-replacement algorithm is a FIFO algorithm. The first-in, first-out (FIFO) page replacement algorithm is a low-overhead algorithm that requires little bookkeeping on the part of the operating system. In simple words, on a page fault, the frame that has been in memory the longest is replaced.


344. What is the name given to the organized collection of software that controls the overall operation of a computer?
A. Working system
B. Peripheral system
C. Operating system
D. Controlling system
E. None of the above

Answer

Answer: Option C
Explanation : Operating system is the organized collection of software that controls the overall operation of a computer.


345. The principle of locality of reference justifies the use of
A. reenterable
B. non reusable
C. virtual memory
D. cache memory
E. None of the above

Answer

Answer: Option D
Explanation : The principle of locality of reference justifies the use of cache memory


346. User-Friendly Systems are:
A. required for object-oriented programming
B. easy to develop
C. common among traditional mainframe operating systems
D. becoming more common
E. None of the above

Answer

Answer: Option D
Explanation : User-Friendly Systems are becoming more common


347. Which of the following addressing modes, facilitates access to an operand whose location is defined relative to the beginning of the data structure in which it appears?
A. ascending
B. sorting
C. index
D. indirect
E. None of the above

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


348. While running DOS on a PC, which command would be used to duplicate the entire diskette?
A. COPY
B. DISKCOPY
C. CHKDSK
D. TYPE
E. None of the above

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


349. Memory
A. is a device that performs a sequence of operations specified by instructions in memory.
B. is the device where information is stored
C. is a sequence of instructions
D. is typically characterized by interactive processing and time-slicing of the CPU
E. None of the above

Answer

Answer: Option B
Explanation : Memory is the device where information is stored.


350. Which of the following rules out the use of GO TO?
A. Flowchart
B. HIPO-DIAGRAMS
C. Nassi-Shneiderman diagram
D. All of the above
E. None of the above

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


351. The register or main memory location which contains the effective address of the operand is known as
A. pointer
B. indexed register
C. special location
D. scratch pad
E. None of the above

Answer

Answer: Option A
Explanation : The register or main memory location which contains the effective address of the operand is known as pointer.


352. Assembly code data base is associated with
A. assembly language version of the program which is created by the code generation phase and is input to the assembly phase.
B. a permanent table of decision rules in the form of patterns for matching with the uniform symbol table to discover syntactic structure.
C. consists of a full or partial list or the token
D. a permanent table which lists all key words and special symbols of the language in symbolic form.
E. None of the above

Answer

Answer: Option A
Explanation : Assembly code data base is associated with the assembly language version of the program which is created by the code generation phase and is input to the assembly phase.


353. Thrashing can be avoided if
A. the pages belonging to the working set of the programs are in main memory
B. the speed of CPU is increased
C. the speed of I/O processor is increased
D. all of the above
E. None of the above

Answer

Answer: Option A
Explanation : Thrashing can be avoided if the pages, belonging to the working set of the programs, are in main memory.


354. In analyzing the compilation of PL/I program, the term “Lexical analysis” is associated with
A. recognition of basic syntactic constructs through reductions.
B. recognition of basic elements and creation of uniform symbols
C. creation of more optional matrix.
D. use of macro processor to produce more optimal assembly code
E. None of the above

Answer

Answer: Option B
Explanation : In analyzing the compilation of PL/I program, the term “Lexical analysis” is associated with recognition of basic elements and creation of uniform symbols.


355. Resolution of externally defined symbols is performed by
A. Linker
B. Loader
C. Compiler
D. Assembler
E. None of the above

Answer

Answer: Option A
Explanation : Resolution of externally defined symbols is performed by Linker


356. System generation:
A. is always quite simple
B. is always very difficult
C. varies in difficulty between systems
D. requires extensive tools to be understandable
E. None of the above

Answer

Answer: Option C
Explanation : System generation varies in difficulty between systems


357. The Memory Address Register
A. is a hardware memory device which denotes the location of the current instruction being executed.
B. is a group of electrical circuits (hardware) that performs the intent of instructions fetched from memory.
C. contains the address of the memory location that is to be read from or stored into.
D. contains a copy of the designated memory location specified by the MAR after a “read” or the new contents of the memory prior to a “write”.
E. None of the above

Answer

Answer: Option C
Explanation : The Memory Address Register contains the address of the memory location that is to be read from or stored into.


358. Which of the following are(is) Language Processor(s)
A. assembles
B. compilers
C. interpreters
D. All of the above
E. None of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


359. In virtual memory systems, Dynamic address translation
A. is the hardware necessary to implement paging
B. stores pages at a specific location on disk
C. is useless when swapping is used
D. is part of the operating system paging algorithm
E. None of the above

Answer

Answer: Option A
Explanation : In virtual memory systems, Dynamic address translation is the hardware necessary to implement paging


360. Fragmentation of the file system
A. occurs only if the file system is used improperly
B. can always be prevented
C. can be temporarily removed by compaction
D. is a characteristic of all file systems
E. None of the above

Answer

Answer: Option C
Explanation : Fragmentation of the file system can be temporarily removed by compaction


361. In which addressing mode the effective address of the operand is the contents of a register specified in the instruction and after accessing the operand, the contents of this register is incremented to point to the next item in the list?
A. index addressing
B. indirect addressing
C. auto increment
D. auto decrement
E. None of the above

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


362. The memory allocation scheme subject to “external” fragmentation is
A. segmentation
B. swapping
C. pure demand paging
D. multiple contiguous fixed partitions
E. None of the above

Answer

Answer: Option A
Explanation : The memory allocation scheme subject to “external” fragmentation is segmentation.


363. While working with MS-DOS, which command will you use to transfer a specific file from one disk to another?
A. DISKCOPY
B. COPY
C. RENAME
D. FORMAT
E. None of the above

Answer

Answer: Option B
Explanation : Working with MS-DOS, ‘COPY’ command will you use to transfer a specific file from one disk to another?


364. A non-relocatable program is one which
A. can not be made to execute in any area of storage other than the one designated for it at the time of its coding or translation.
B. consists of a program and relevant information for its relocation.
C. can itself performs the relocation of its address-sensitive portions.
D. all of the above
E. None of the above

Answer

Answer: Option A
Explanation : A non-relocatable program is one which can not be made to execute in any area of storage other than the one designated for it at the time of its coding or translation.


365. What is the name of the operating system for the laptop computer called MacLite?
A. Windows
B. DOS
C. MS-DOS
D. OZ
E. None of the above

Answer

Answer: Option D
Explanation : OZ operating system for the laptop computer called MacLite.


366. Memory management is :
A. not used in modern operating system
B. replaced with virtual memory on current systems
C. not used on multiprogramming systems
D. critical for even the simplest operating systems
E. None of the above

Answer

Answer: Option D
Explanation : Memory management is critical for even the simplest operating systems


367. The initial value of the semaphore that allows only one of the many processes to enter their critical sections, is
A. 8
B. 1
C. 16
D. 0
E. None of the above

Answer

Answer: Option B
Explanation : The initial value of the semaphore that allows only one of the many processes to enter their critical sections, is 1.


368. The Register – to – Register (RR) instructions
A. have both their operands in the main store.
B. which perform an operation on a register operand and an operand which is located in the main store generally leaving the result in the register except in the case of store operation when it is also
C. which perform indicated operations on two fast registers of the machine and leave the result in one of the registers.
D. all of the above
E. None of the above

Answer

Answer: Option C
Explanation : The Register – to – Register (RR) instructions which perform indicated operations on two fast registers of the machine and leave the result in one of the registers.


369. A page fault
A. is an error is a specific page
B. occurs when a program accesses a page of memory
C. is an access to a page not currently in memory
D. is a reference to a page belonging to another program
E. None of the above

Answer

Answer: Option C
Explanation : A page fault (sometimes called #PF, PF or hard fault) is a type of exception raised by computer hardware when a running program accesses a memory page that is not currently mapped by the memory management unit (MMU) into the virtual address space of a process.


370. An algorithm is best described as
A. A computer language
B. A step by step procedure for solving a problem
C. A branch of mathematics
D. All of the above
E. None of the above

Answer

Answer: Option B
Explanation : An algorithm is best described as a step by step procedure for solving a problem


371. In which addressing mode the contents of a register specified in the instruction are first decremented, and then these contents are used as the effective address of the operands?
A. index addressing
B. indirect addressing
C. auto increment
D. auto decrement
E. None of the above

Answer

Answer: Option D
Explanation : Auto decrement mode the contents of a register specified in the instruction are first decremented, and then these contents are used as the effective address of the operands


372. What is the name given to the values that are automatically provided by software to reduce keystrokes and improve a computer user’s productivity?
A. Defined values
B. Fixed values
C. Default values
D. Special values
E. None of the above

Answer

Answer: Option C
Explanation : Default values are automatically provided by software to reduce keystrokes and improve a computer user’s productivity.


373. Page stealing
A. is a sign of an efficient system
B. is taking page frames from other working sets
C. should be the tuning goal
D. is taking larger disk spaces for pages paged out
E. None of the above

Answer

Answer: Option B
Explanation : Page stealing is taking page frames from other working sets


374. In MS-DOS 5.0, which is the number that acts as a code to uniquely identify the software product?
A. MS
B. DOS
C. MS DOS
D. 5
E. None of the above

Answer

Answer: Option D
Explanation : In MS-DOS 5.0, 5 is the number that acts as a code to uniquely identify the software product?


375. Bug means
A. A logical error in a program
B. A difficult syntax error in a program
C. Documenting programs using an efficient documentation tool
D. All of the above
E. None of the above

Answer

Answer: Option A
Explanation : A software bug is an error, flaw, failure or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways.


376. The process of transferring data intended for a peripheral device into a disk (or intermediate store) so that it can be transferred to peripheral at a more convenient time or in bulk, is known as
A. multiprogramming
B. spooling
C. caching
D. virtual programming
E. None of the above

Answer

Answer: Option B
Explanation : The process of transferring data intended for a peripheral device into a disk (or intermediate store) so that it can be transferred to peripheral at a more convenient time or in bulk, is known as ‘spooling’.


377. Block caches or buffer caches are used
A. to improve disk performance
B. to handle interrupts
C. to increase the capacity of the main memory
D. to speed up main memory read operation
E. None of the above

Answer

Answer: Option A
Explanation : Block caches or buffer caches are used to improve disk performance


378. Which of the following statements is false?
A. a small page size causes large page tables
B. internal fragmentation is increased with small pages
C. a large page size causes instructions and data that will not be referenced brought into primary storage
D. I/O transfers are more efficient with large pages
E. None of the above

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


379. The action of parsing the source program into the proper syntactic classes is known as
A. syntax analysis
B. lexical analysis
C. interpretation analysis
D. general syntax analysis
E. None of the above

Answer

Answer: Option B
Explanation : The action of parsing the source program into the proper syntactic classes is known as lexical analysis


380. Which, of the following is not true about the description of a decision table?
A. A decision table is easy to modify
B. A decision table is directly understood by the computer
C. A decision table is easy to understand
D. All of the above
E. None of the above

Answer

Answer: Option B
Explanation : A decision table is directly understood by the computer is not true about the description of a decision table


381. Trojan-Horse programs
A. are legitimate programs that allow unauthorized access
B. do not usually work
C. are hidden programs that do not show up on the system
D. usually are immediately discovered
E. None of the above

Answer

Answer: Option A
Explanation : Trojan-Horse programs are legitimate programs that allow unauthorized access


382. When did IBM release the first version of disk operating system DOS version 1.0?
A. 1981
B. 1982
C. 1983
D. 1984
E. None of the above

Answer

Answer: Option A
Explanation : In 1981 IBM release the first version of disk operating system DOS version 1.0.


383. Which of the following is false about disk when compared to main memory?
A. non-volatile
B. longer storage capacity
C. lower price per bit
D. faster
E. None of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


384. Producer consumer problem can be solved using
A. semaphores
B. event counters
C. monitors
D. all of the above
E. None of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


385. Most of the microcomputer’s operating systems like Apple DOS, MS DOS and PC DOS etc. are called disk operating systems because
A. they are memory resident
B. they are initially stored on disk
C. they are available on magnetic tapes
D. they are partly in primary memory and partly on disk
E. None of the above

Answer

Answer: Option B
Explanation : Microcomputer’s operating systems like Apple DOS, MS DOS and PC DOS etc. are called disk operating systems because they are initially stored on disk


386. The CPU, after receiving an interrupt from an I/O device
A. halts for a predetermined time
B. hands over control of address bus and data bus to the interrupting device
C. branches off to the interrupt service routine immediately
D. branches off to the interrupt service routine after completion of the current instruction
E. None of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


387. Seeks analysis
A. is used for analyzing paging problems
B. is used for analyzing device busy problems
C. is used for analyzing control-unit busy problems
D. is only shown on real-time displays
E. None of the above

Answer

Answer: Option B
Explanation : Seeks analysis is used for analyzing device busy problems


388. Which is a permanent database in the general model of the compiler?
A. Literal Table
B. Identifier Table
C. Terminal Table
D. Source code
E. None of the above

Answer

Answer: Option C
Explanation : Terminal Table is a permanent database in the general model of the compiler


389. What is the name of the technique in which the operating system of a computer executes several programs concurrently by switching back and forth between them?
A. Partitioning
B. Multitasking
C. Windowing
D. Paging
E. None of the above

Answer

Answer: Option B
Explanation : In Multitasking the operating system of a computer executes several programs concurrently by switching back and forth between them.


390. Operating system
A. links a program with the subroutines it references
B. provides a layered user-friendly interface
C. enables the programmer to draw a flowchart
D. all of the above
E. None of the above

Answer

Answer: Option B
Explanation : Operating system provides a layered, user-friendly interface


391. Which table is a permanent database that has an entry for each terminal symbol.
A. Terminal table
B. Literal table
C. Identifier table
D. Reductions
E. None of the above

Answer

Answer: Option A
Explanation : Terminal table is a permanent database that has an entry for each terminal symbol.


392. The function(s) of the Syntax phase is(are)
A. to recognize the major constructs of the language and to call the appropriate action routines that will generate the intermediate form or matrix for these constructs.
B. to build a literal table and an identifier table
C. to build a uniform symbol table
D. to parse the source program into the basic elements or tokens of the language.
E. None of the above

Answer

Answer: Option A
Explanation : The functions of the Syntax phase are to recognize the major constructs of the language and to call the appropriate action routines that will generate the intermediate form or matrix for these constructs.


393. Swapping
A. works best with many small partitions
B. allows many programs to use memory simultaneously
C. allows each program in turn to use the memory
D. does not work with overlaying
E. None of the above

Answer

Answer: Option C
Explanation : Swapping is allows each program in turn to use the memory


394. A disk scheduling algorithm in an operating system causes the disk arm to move back and forth across the disk surface in order to service all requests in its path. This is a
A. First come first served
B. Shortest Seek Time First (SSTE)
C. Scan
D. FIFO
E. None of the above

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


395. A translator is best described as
A. an application software
B. a system software
C. a hardware component
D. all of the above
E. None of the above

Answer

Answer: Option B
Explanation : A translator is best described as a system software


396. Software that measures, monitors, analyzes, and controls real-world events is called:
A. system software
B. real-time software
C. scientific software
D. business software
E. None of the above

Answer

Answer: Option B
Explanation : Software that measures, monitors, analyzes, and controls real-world events is called real-time software


397. The details of all external symbols and relocation formation (relocation list or map) is provided to linker by
A. Macro processor
B. Translator
C. Loader
D. Editor
E. None of the above

Answer

Answer: Option B
Explanation : The details of all external symbols and relocation formation (relocation list or map) is provided to linker by Translator


398. The macro processor must perform
A. recognize macro definitions and macro calls
B. save the macro definitions
C. expand macros calls and substitute arguments
D. all of the above
E. None of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


399. A development strategy whereby the executive control modules of a system are coded and tested first, is known as
A. Bottom-up development
B. Top-down development
C. Left-Right development
D. All of the above
E. None of the above

Answer

Answer: Option B
Explanation : A development strategy whereby the executive control modules of a system are coded and tested first, is known as Top-down development.


400. Which of the following is helpful in evaluating applications software what will best suit your needs?
A. recommendations by other users
B. computer magazines
C. objective software reviews
D. all of the above
E. None of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


401. What problem is solved by Dijkstra’s banker’s algorithm?
A. mutual exclusion
B. deadlock recovery
C. deadlock avoidance
D. cache coherence
E. None of the above

Answer

Answer: Option C
Explanation : Deadlock avoidance problem is solved by Dijkstra’s banker’s algorithm


402. The dispatcher
A. actually schedules the tasks into the processor
B. puts tasks in I/O wait
C. is always small and simple
D. never changes task priorities
E. None of the above

Answer

Answer: Option A
Explanation : The dispatcher actually schedules the tasks into the processor.


403. System programs such as Compilers are designed so that they are
A. reenterable
B. non reusable
C. serially usable
D. recursive
E. None of the above

Answer

Answer: Option A
Explanation : System programs such as Compilers are designed so that they are reenterable


404. IBM released its first PC in 1981. Can you name the operating system which was most popular at that time?
A. MS-DOS
B. PC-DOS
C. OS/360
D. CP/M
E. None of the above

Answer

Answer: Option D
Explanation : CP/M, originally standing for Control Program/Monitor and later Control Program for Microcomputers, is a mass-market operating system created for Intel 8080/85-based microcomputers by Gary Kildall of Digital Research, Inc. Initially confined to single-tasking on 8-bit processors and no more than 64 kilobytes of memory, later versions of CP/M added multi-user variations and were migrated to 16-bit processors. CP/M was displaced by DOS soon after the 1981 introduction of the IBM PC.


405. If the number of bits in a virtual address of a program is 16 and the page size is 0.5 K bytes, the number of pages in the virtual address space is
A. 16
B. 32
C. 64
D. 128
E. None of the above

Answer

Answer: Option D
Explanation : If the number of bits in a virtual address of a program is 16 and the page size is 0.5 K bytes, the number of pages in the virtual address space is 128.


406. Data encryption
A. is mostly used by public networks
B. is mostly used by financial networks
C. cannot be used by private installations
D. is not necessary since data cannot be intercepted
E. None of the above

Answer

Answer: Option B
Explanation : Data encryption is mostly used by financial networks
Data encryption translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it. Encrypted data is commonly referred to as ciphertext, while unencrypted data is called plaintext.


407. What is the name given to the process of initializing a microcomputer with its operating system?
A. Cold booting
B. Booting
C. Warm booting
D. Boot recording
E. None of the above

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


408. The function(s) of the Storage Assignment is (are)
A. to assign storage to all variables referenced in the source program.
B. to assign storage to all temporary locations that are necessary for intermediate results.
C. to assign storage to literals and to ensure that the storage is allocate and appropriate locations are initialized.
D. all of the above
E. None of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


409. A Processor
A. is a device that performs a sequence of operations specified by instructions in memory.
B. is the device where information is stored
C. is a sequence of instructions
D. is typically characterized by interactive processing and time of the CPU
E. None of the above

Answer

Answer: Option A
Explanation : A Processor is a device that performs a sequence of operations specified by instructions in memory.


410. With MS-DOS which command will divide the surface of the blank floppy disk into sectors and assign a unique address to each one?
A. FORMAT command
B. FAT command
C. VER command
D. CHKDSK command
E. None of the above

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


411. Multiprogramming
A. is a method of memory allocation by which the program is subdivided into equal portions or pages and core is subdivided into equal portions or blocks.
B. consists of those addresses that may be generated by a processor during execution of a computation.
C. is a method of allocating processor time.
D. allows multiple programs to reside in separate areas of core at the time.
E. None of the above

Answer

Answer: Option D
Explanation : Multiprogramming allows multiple programs to reside in separate areas of core at the time.


412. A translator which reads an entire programme written in a high level language and converts it into machine language code is:
A. assembler
B. translator
C. compiler
D. system software
E. None of the above

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


413. The advantage(s) inherent to using high level languages is (are)
A. Fewer people less management and shorter transition in learning time
B. Improved debugging capability and superior documentation
C. A greater degree of machine independence
D. All of the above
E. None of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


414. Addressing modes
A. defines the fundamental method of determining effective operand addresses
B. are variations in the use of fundamental addressing structures or some associated actions which are related to addressing.
C. performs indicated operations on two fast registers of the machine and leave the result in one of the registers.
D. all of the above
E. None of the above

Answer

Answer: Option B
Explanation : Addressing modes are variations in the use of fundamental addressing structures, or some associated actions which are related to addressing.


415. In which way(s) a macro processor for assembly language can be implemented:
A. independent two-pass processor
B. independent one-pass processor
C. processor incorporated into pass 1 of a standard two-pass assembler
D. all of the above
E. None of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


416. Which of the following is a type of systems software used on microcomputers?
A. MS-DOS
B. PC-DOS
C. Unix
D. All of the above
E. None of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


417. The working set theory of programming behaviour of processes running within an operating system involves
A. the collection of pages that a process accesses
B. disk scheduling mechanisms
C. coalescing holes in memory
D. assigning the CPU to processes
E. None of the above

Answer

Answer: Option A
Explanation : The working set theory of programming behaviour of processes running within an operating system involves the collection of pages that a process accesses


418. Operating system is
A. A collection of hardware components
B. A collection of input-output devices
C. A collection of software routines
D. All of the above
E. None of the above

Answer

Answer: Option C
Explanation : Operating system is a collection of software routines


419. A file organization component of a VSAM file is:
A. relative record data set
B. keyed sequential data set
C. entry sequential data set
D. all of the above
E. None of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


420. What is the name given to the software which can be legally compiled and often used for free?
A. Shareware program
B. Public domain program
C. Firmware program
D. Mindware
E. None of the above

Answer

Answer: Option B
Explanation : Public-domain software (program) refers to any program that is not copyrighted. Public-domain software (program) is free and can be used without restrictions. The term public-domain software is often used incorrectly to include freeware, free software that is nevertheless copyrighted.


421. The SJF algorithm executes first the job
A. that last entered the queue
B. that first entered the queue
C. that has been in the queue the longest
D. with the least processor needs
E. None of the above

Answer

Answer: Option D
Explanation : The shortest job first (SJF) or shortest job next, is a scheduling policy that selects the waiting process with the smallest execution time to execute next.


422. In which of the storage placement strategies a program is placed in the largest available hole in the main memory?
A. best fit
B. first fit
C. worst fit
D. buddy
E. None of the above

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


423. Which of the following is a block device
A. mouse
B. printer
C. terminals
D. disk
E. None of the above

Answer

Answer: Option D
Explanation : A block device is a computer data storage device that supports reading and (optionally) writing data in fixed-size blocks, sectors, or clusters. These blocks are generally 512 bytes or a multiple thereof in size.


424. The problem of thrashing is affected significantly by:
A. program structure
B. program size
C. primary-storage size
D. all of the above
E. None of the above

Answer

Answer: Option A
Explanation : The problem of thrashing is affected significantly by program structure


425. Which of the following software types is used to simplify using systems software?
A. spreadsheet
B. operating environment
C. timesharing
D. multitasking
E. None of the above

Answer

Answer: Option C
Explanation : In computing, time-sharing is the sharing of a computing resource among many users by means of multiprogramming and multi-tasking at the same time. Its introduction in the 1960s and emergence as the prominent model of computing in the 1970s represented a major technological shift in the history of computing.


426. Advantage(s) of using assembly language rather than machine language is (are):
A. It is mnemonic and easy to read.
B. Addresses any symbolic not absolute
C. Introduction of data to program is easier
D. all of the above
E. None of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


427. Which of the following is not true about the memory management?
A. virtual memory is used only in multi-user systems
B. segmentation suffers from external fragmentation
C. paging suffers from internal fragmentation
D. segmented memory can be paged
E. None of the above

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


428. Job Control Language (JCL) statements are used to
A. Read the input from the slow-speed card reader to the high-speed magnetic disk
B. Specify to the operating system the beginning and end of a job in a batch
C. Allocate the CPU to a job
D. All of the above
E. None of the above

Answer

Answer: Option B
Explanation : JCL (job control language) is a language for describing jobs (units of work) to the MVS, OS/390, and VSE operating systems, which run on IBM’s S/390 large server (mainframe) computers. These operating systems allocate their time and space resources among the total number of jobs that have been started in the computer.


429. Paging
A. is a method of memory allocation by which the program is subdivided into equal portions or pages and core is subdivided into equal portions or blocks.
B. consists of those addresses that may be generated by a processor during execution of a computation.
C. is a method of allocating processor time.
D. allows multiple programs to reside in separate areas of core at the time.
E. None of the above

Answer

Answer: Option A
Explanation : In computer operating systems, paging is a memory management scheme by which a computer stores and retrieves data from secondary storage for use in main memory. In this scheme, the operating system retrieves data from secondary storage in same-size blocks called pages. Paging is an important part of virtual memory implementations in modern operating systems, using secondary storage to let programs exceed the size of available physical memory.


430. Which of the following is not true about documentation?
A. Documentation of a system should be as clear and direct as possible
B. Documentation increases the maintenance time and cost
C. Documentation gives better understanding of the problem
D. All of the above
E. None of the above

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


431. The system/370 assembler language
A. allows the programmer to write base registers and displacements explicitly in the source program.
B. is used to remember which of the general-purpose registers are currently available as base registers and what base addresses they contain.
C. allows multiple programs to reside in separate areas of core at the same time.
D. is a term that refers to the control programs of an operating system.
E. None of the above

Answer

Answer: Option A
Explanation : The system/370 assembler language allows the programmer to write base registers and displacements explicitly in the source program.


432. Scheduling is
A. allowing jobs to use the processor
B. unrelated to performance consideration
C. not required in uniprocessor systems
D. the same regard-less of the purpose of the system
E. None of the above

Answer

Answer: Option A
Explanation : The process scheduling is the activity of the process manager that handles the removal of the running process from the CPU and the selection of another process on the basis of a particular strategy. Process scheduling is an essential part of Multiprogramming operating systems.


433. What scheduling algorithm allows processes that are logical runnable to be temporarily suspended?
A. preemptive scheduling
B. non-preemptive scheduling
C. FIFO
D. FCFS
E. None of the above

Answer

Answer: Option A
Explanation : Preemptive Scheduling: A scheduling discipline is preemptive if, once a process has been given the CPU can taken away. The strategy of allowing processes that are logically runable to be temporarily suspended is called Preemptive Scheduling and it is contrast to the “run to completion” method.


434. In an absolute loading scheme, which loader function is accomplished by the loader
A. Reallocation
B. Allocation
C. Linking
D. Loading
E. None of the above

Answer

Answer: Option D
Explanation : In an absolute loading scheme, Loading function is accomplished by the loader


435. The computational technique used to compute the disk storage address of individual records is called:
A. bubble memory
B. key fielding
C. dynamic reallocation
D. hashing
E. None of the above

Answer

Answer: Option D
Explanation : The computational technique used to compute the disk storage address of individual records is called hashing.


436. For how many processes which are sharing common data, the Dekker’s algorithm implements mutual exclusion?
A. 1
B. 2
C. 3
D. 4
E. None of the above

Answer

Answer: Option B
Explanation : Dekker’s algorithm is the first known correct solution to the mutual exclusion problem in concurrent programming. The solution is attributed to Dutch mathematician Th. J. Dekker by Edsger W. Dijkstra in an unpublished paper on sequential process descriptions and his manuscript on cooperating sequential processes.


437. The file structure that redefines its first record at a base of zero uses the term:
A. relative organization
B. key fielding
C. dynamic reallocation
D. hashing
E. None of the above

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


438. What is the name given to all the programs inside the computer with makes it usable?
A. Application software
B. System software
C. Firm ware
D. Shareware
E. None of the above

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


439. Semaphores
A. synchronize critical resources to prevent deadlock
B. synchronize critical resources to prevent contention
C. are used to do I/O
D. are used for memory management
E. None of the above

Answer

Answer: Option A
Explanation : Semaphores synchronize critical resources to prevent deadlock


440. The advantage(s) of incorporating the macro processor into pass 1 is(are):
A. many functions do not have to be implemented twice.
B. Functions are combined and it is not necessary to create intermediate files as output from the macros processor and input to the assembler.
C. more flexibility is available to the programmer in that he may use all the features of the assembler in conjunction with macros.
D. all of the above
E. None of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


441. In analyzing the compilation of PL/I program, the description “creation of more optimal matrix” is associated with
A. Assembly and output
B. Code generation
C. Syntax analysis
D. Machine independent optimization
E. None of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


442. In memory systems, boundary registers
A. are used for temporary program variable storage
B. are only necessary with fixed partitions
C. track page boundaries
D. track the beginning and ending of programs
E. None of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


443. What is the initial value of the semaphore to allow only one of the many processes to enter their critical section?
A. 8
B. 1
C. 16
D. 0
E. None of the above

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


444. Which of the following is true for machine language.
A. Repeated execution of program segments
B. Depicting flow of data in a system
C. A sequence of instructions which when followed properly solves a problem
D. the language which communicates with the computer using only the binary digits 1 and 0.
E. None of the above

Answer

Answer: Option D
Explanation : The language which communicates with the computer using only the binary digits 1 and 0.


445. Four necessary conditions for deadlock to exist are: mutual exclusion, no-preemption, circular wait and
A. hold and wait
B. deadlock avoidance
C. race around condition
D. buffer overflow
E. None of the above

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


446. If you do not know which version of MS-DOS you are working with, which command will you use after having booted your operating system?
A. FORMAT command
B. DIR command
C. VER command
D. DISK command
E. None of the above

Answer

Answer: Option C
Explanation : In computing, ver is a command in various DOS, FlexOS, OS/2 and Microsoft Windows command line interpreters such as COMMAND.COM, cmd.exe and 4DOS/4NT. It prints the name and version of the operating system or the command shell.


447. Which of the following is not applications software?
A. Word processing
B. Spreadsheet
C. UNIX
D. Desktop publishing
E. None of the above

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


448. Scissoring enables
A. a part of data to be displayed
B. entire data to be displayed
C. full data display on full area of screen
D. no data to be displayed
E. None of the above

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


449. A partitioned data set is most used for
A. a program or source library
B. storing program data
C. storing backup information
D. storing ISAM files
E. None of the above

Answer

Answer: Option A
Explanation : A partitioned data set is most used for a program or source library


450. Page-map table is
A. A data file
B. A directory
C. Used for address translation
D. All of the above
E. None of the above

Answer

Answer: Option C
Explanation : Page-map table is used for address translation


451. The main function of the dispatcher (the portion of the process scheduler) is
A. swapping a process to the disk
B. assigning ready process to the CPU
C. suspending some of the processes when the CPU load is high
D. bring processes from the disk to the main memory
E. None of the above

Answer

Answer: Option B
Explanation : The main function of the dispatcher is assigning ready process to the CPU


452. Which of the following is characteristic of an operating system?
A. resource management
B. error recovery
C. memory management
D. All the above
E. None of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


453. The errors that can be pointed out by the compiler are
A. Syntax errors
B. Semantic errors
C. Logical errors
D. Internal errors
E. None of the above

Answer

Answer: Option A
Explanation : The errors that can be pointed out by the compiler are ‘Syntax errors’.


454. When a computer is first turned on or restarted, a special type of absolute loader is executed, called a
A. “Compile and Go” loader
B. Boot loader
C. Bootstrap loader
D. Relating loader
E. None of the above

Answer

Answer: Option C
Explanation : A bootstrap loader is a program that resides in the computer’s EPROM, ROM, or other non-volatile memory. It is automatically executed by the processor when turning on the computer.


455. In MS-DOS, relocatable object files and load modules have extensions
A. .OBJ and .COM or .EXE respectively
B. .COM and .OBJ respectively
C. .EXE and .OBJ respectively
D. .DAS and .EXE respectively
E. None of the above

Answer

Answer: Option A
Explanation : In MS-DOS, relocatable object files and load modules have extensions is .OBJ and .COM or .EXE, respectively.
.OBJ : OBJ is a geometry definition file format first developed by Wavefront Technologies for its Advanced Visualizer animation package. The file format is open and has been adopted by other 3D graphics application vendors.

.COM : The domain name com is a top-level domain in the Domain Name System of the Internet. Its name is derived from the word commercial, indicating its original intended purpose for domains registered by commercial organizations. Later, the domain opened for general purposes.

.EXE : EXE is a file extension for an executable file format. An executable is a file that contains a program – that is, a particular kind of file that is capable of being executed or run as a program in the computer. An executable file can be run by a program in Microsoft DOS or Windows through a command or a double click.


456. Which, of the following checks, cannot be carried out on the input data to a system?
A. consistency check
B. Syntax check
C. Range check
D. All of the above
E. None of the above

Answer

Answer: Option B
Explanation : Syntax check cannot be carried out on the input data to a system.


457. The state transition initiated by the user process itself in an operating system is
A. block
B. dispatch
C. wake up
D. timer run out
E. None of the above

Answer

Answer: Option A
Explanation : The state transition initiated by the user process itself in an operating system is block.


458. Which of the following program is not a utility?
A. Debugger
B. Editor
C. Spooler
D. All of the above
E. None of the above

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


459. A program that converts a high-level language program to a set of instructions that can run on a computer is called a
A. Compiler
B. Debugger
C. Editor
D. All of the above
E. None of the above

Answer

Answer: Option A
Explanation : A compiler is computer software that transforms computer code written in one programming language (the source language) into another programming language (the target language). Compilers are a type of translator that support digital devices, primarily computers. The name compiler is primarily used for programs that translate source code from a high-level programming language to a lower level language. Source : wikipedia.org


460. The function(s) of file system is (are):
A. to provide complete file naming freedom to the users and to permit controlled sharing of files
B. to provide for long and short term storage of files with appropriate economic tradeoffs.
C. to provide security against loss of information due to system failure
D. all of the above
E. None of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


461. Poor response times are caused by
A. Processor busy
B. High I/O rate
C. High paging rates
D. Any of the above
E. None of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


462. Link encryption
A. is more secure than end-to-end encryption
B. is less secure than end-to-end encryption
C. can not be used in a public network
D. is used only to debug
E. None of the above

Answer

Answer: Option B
Explanation : Link encryption is less secure than end-to-end encryption.
Link encryption is an approach to communications security that encrypts and decrypts all traffic at each network routing point (e.g. network switch, or node through which it passes) until arrival at its final destination.


463. A form of code that uses more than one process and processor, possibly of different type, and that may on occasions have more than one process or processor active at the same time, is known as
A. multiprogramming
B. multithreading
C. broadcasting
D. time sharing
E. None of the above

Answer

Answer: Option B
Explanation : A form of code that uses more than one process and processor, possibly of different type, and that may on occasions have more than one process or processor active at the same time, is known as multithreading


464. A public key encryption system
A. allows anyone to decode the transmission
B. allows only the correct sender to decode the data
C. allows only the correct receiver to decode the data
D. does not encode the data before transmitting it
E. None of the above

Answer

Answer: Option C
Explanation : A public key encryption system allows only the correct receiver to decode the data.


465. The table created by lexical analysis to describe all literals used in the source program is
A. Terminal table
B. Literal table
C. Identifier table
D. Reductions
E. None of the above

Answer

Answer: Option B
Explanation : The table created by lexical analysis to describe all literals used in the source program is Literal table.


466. The term ‘polling’ in a computer means a process by which a computer system
A. detects/corrects errors
B. multiplexes the inputs and updates the memory accordingly
C. decides correct alternative by analysing several ones
D. inquires to see if a terminal has any transaction to send
E. None of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


467. Feed back queue
A. are very easy to implement
B. dispatch tasks according to execution characteristics
C. are used to favor real-time tasks
D. require manual intervention to implement properly
E. None of the above

Answer

Answer: Option B
Explanation : Feed back queue dispatch tasks according to execution characteristics.


468. In which addressing mode the operand is given explicitly in the instruction?
A. absolute mode
B. immediate mode
C. indirect mode
D. index mode
E. None of the above

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


469. The technique, for sharing the time of a computer among several jobs. Which switches jobs so rapidly such that each job appears to have the computer to itself:
A. time sharing
B. time out
C. time domain
D. FIFO
E. None of the above

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


470. Capacity planning
A. requires detailed system performance information
B. is independent of the operating system
C. does not depend on the monitoring tools available
D. is not needed in small installations
E. None of the above

Answer

Answer: Option B
Explanation : Capacity planning is independent of the operating system


471. In which addressing mode, the address of the location of the operand is given explicitly as a part of the instruction.
A. absolute mode
B. immediate mode
C. index mode
D. modulus mode
E. None of the above

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


472. Under virtual storage,
A. a single program is processed by two or more CPUs
B. two or more programs are stored concurrently in primary storage
C. only the active pages of a program are stored in primary storage
D. interprogram interference may occur
E. None of the above

Answer

Answer: Option C
Explanation : Under virtual storage only the active pages of a program are stored in primary storage.


473. A base register table
A. allows the programmer to write base registers and displacements explicitly in the source program.
B. is used to remember which of the general-purpose registers are currently available as base registers and what base addresses they contain.
C. allows multiple programs to reside in separate areas of core at the same time.
D. is a term that refers to the control programs of an operating system.
E. None of the above

Answer

Answer: Option B
Explanation : A base register table is used to remember which of the general-purpose registers are currently available as base registers, and what base addresses they contain.


474. File record length
A. should always be fixed
B. Should always be variable
C. depends upon the size of the file
D. should be chosen to match the data characteristics
E. None of the above

Answer

Answer: Option D
Explanation : File record length should be chosen to match the data characteristics.


475. A relationship between processes such that each has some part (critical section) which must not be executed while the critical section of another is being executed, is known as
A. semaphore
B. mutual exclusion
C. multiprogramming
D. multitasking
E. None of the above

Answer

Answer: Option B
Explanation : A relationship between processes such that each has some part (critical section) which must not be executed while the critical section of another is being executed, is known as mutual exclusion


476. What is the name of the operating system which was originally designed by scientists and engineers for use by scientists and engineers?
A. XENIX
B. UNIX
C. OS/2
D. MS DOS
E. None of the above

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


477. The most common security failure is
A. carelessness by users
B. depending on passwords
C. too much emphasis on preventing physical access
D. insufficient technology used to prevent breaches
E. None of the above

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


478. Terminal Table
A. contains all constants in the program
B. a permanent table of decision rules in the form of patterns for matching with the uniform symbol table to discover syntactic structure.
C. consists of a full or partial list of the token’s as they appear in the program. Created by Lexical analysis and used for syntax analysis and interpretation
D. a permanent table which lists all key words and special symbols of the language in symbolic form.
E. None of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


479. Block or buffer caches are used
A. to improve disk performance
B. to handle interrupts
C. to increase the capacity of main memory
D. to speed up main memory read operation
E. None of the above

Answer

Answer: Option A
Explanation : Block or buffer caches are used to improve disk performance.


480. The practice of “bundling” refers to
A. selling computers alone
B. selling peripheral devices with computer
C. selling software to run on computers
D. giving away software with a computer purchase
E. None of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


481. Special software to create a job queue is called a
A. Drive
B. Spooler
C. Interpreter
D. Linkage editor
E. None of the above

Answer

Answer: Option B
Explanation : Special software to create a job queue is called a spooler


482. All the time a computer is switched on, its operating system software has to stay in
A. main storage
B. primary storage
C. floppy disk
D. disk drive
E. None of the above

Answer

Answer: Option B
Explanation : All the time a computer is switched on, its operating system software has to stay in primary storage


483. Can you name of the major Operating System used in computers?
A. MS DOS
B. OS/2
C. UNIX
D. All of the above
E. None of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


484. Which of the following is not an advantage of multiprogramming?
A. increased throughput
B. shorter response time
C. decreased operating-system overhead
D. ability to assign priorities to jobs
E. None of the above

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


485. Virtual Memory
A. is a method of memory allocation by which the program is subdivided into equal portions or pages and core is subdivided into equal portions or blocks.
B. consists of those addresses that may be generated by a processor during execution of a computation.
C. is a method of allocating processor time.
D. allows multiple programs to reside in separate areas of core at the time.
E. None of the above

Answer

Answer: Option B
Explanation : Virtual Memory consists of those addresses that may be generated by a processor during execution of a computation.


486. In a magnetic disk, data is recorded in a set of concentric tracks which are subdivided into
A. periods
B. sectors
C. zones
D. groups
E. None of the above

Answer

Answer: Option B
Explanation : In a magnetic disk, data is recorded in a set of concentric tracks which are subdivided into sectors


487. The total time to prepare a disk drive mechanism for a block of data to be read from it is
A. latency
B. latency plus transmission time
C. latency plus seek time
D. latency plus seek time plus transmission time
E. None of the above

Answer

Answer: Option C
Explanation : The total time to prepare a disk drive mechanism for a block of data to be read from it is latency plus seek time


488. Part of a program where the shared memory is accessed and which should be executed invisibly is called
A. semaphores
B. directory
C. critical section
D. mutual exclusion
E. None of the above

Answer

Answer: Option C
Explanation : Part of a program where the shared memory is accessed and which should be executed invisibly is called critical section


489. Indicate which, of the following, is not true about Nassi-Shneiderman charts
A. These charts are type of graphical design tool
B. These charts cannot represent CASE constructs
C. These charts can represent three fundamental control structures
D. All of the above
E. None of the above

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


490. What is the name of the operating system that reads and reacts in terms of actual time.
A. Batch system
B. Quick response system
C. Real time system
D. Time sharing system
E. None of the above

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


491. An incremental backup
A. should be done each month
B. uses more tapes
C. saves all files
D. saves only files that have recently changed
E. None of the above

Answer

Answer: Option D
Explanation : An incremental backup saves only files that have recently changed


492. The powerful text editor called PC-Write can be used by anybody by paying a small fee. Such programs are called
A. Software
B. Shareware
C. Firmware
D. Mindware
E. None of the above

Answer

Answer: Option B
Explanation : The powerful text editor called PC-Write can be used by anybody by paying a small fee. Such programs are called Shareware


493. The disadvantages of “Compile and Go” loading scheme is (are):
A. a portion of memory is wasted because the core occupied by the assembler is unavailable to the object program.
B. it is necessary to retranslate the user’s program deck every time it is run.
C. it is very difficult to handle multiple segments especially if the source programs are in different languages and to produce orderly modular programs.
D. all of the above
E. None of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


494. The operating system of a computer serves as a software interface between the user and
A. hardware
B. peripheral
C. memory
D. screen
E. None of the above

Answer

Answer: Option A
Explanation : The operating system of a computer serves as a software interface between the user and hardware


495. Which of the following statement is true.
A. The LRU algorithm pages out pages that have been used recently
B. Thrashing is a natural consequence of virtual memory systems.
C. Seek analysis is used for analysing control-unit busy problems.
D. All of the above
E. None of the above

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


496. Which of the following is a phase of a compilation process
A. Lexical analysis
B. Code generation
C. Both of the above
D. Static analysis
E. None of the above

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


497. Which are the most important features of Microsoft Windows program?
A. Windows
B. Pull-down menus
C. Icons
D. All of the above
E. None of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


498. Which of the following system program forgoes the production of object code to generate absolute machine code and load it into the physical main storage location from which it will be executed immediately upon completion of the assembly?
A. two pass assembler
B. load-and-go assembler
C. macroprocessor
D. compiler
E. None of the above

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


499. Virtual memory is
A. simple to implement
B. used in all major commercial operating systems
C. less efficient in utilization of memory
D. useful when fast I/O devices are not available
E. None of the above

Answer

Answer: Option B
Explanation : Virtual memory is used in all major commercial operating systems


500. Object code
A. is ready to execute
B. is the output of compilers but not assemblers
C. must be “loaded” before execution
D. must be rewritten before execution
E. None of the above

Answer

Answer: Option C
Explanation : Object code must be “loaded” before execution


501. The term “operating system” means
A. a set of programs which controls computer working
B. the way a computer operator works
C. conversion of high level language into machine code
D. the way a floppy disk drive operates
E. None of the above

Answer

Answer: Option A
Explanation : The term “operating system” means a set of programs which controls computer working.


502. Which of the following might be used to convert high-level language instructions into machine language?
A. system software
B. applications software
C. an operating environment
D. an interpreter
E. None of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


503. Indicate which is a pre-emptive scheduling algorithm
A. Round-robin
B. Shortest-job-next
C. Priority-based
D. All of the above
E. None of the above

Answer

Answer: Option A
Explanation : Round-robin is a pre-emptive scheduling algorithm.


504. Which of the following, is necessary to work on a computer
A. Compiler
B. Operating system
C. Assembly
D. Interpreter of the above
E. None of the above

Answer

Answer: Option B
Explanation : Operating system is necessary to work on a computer.


505. Access time is the highest in the case of
A. floppy disk
B. cache
C. swapping devices
D. magnetic disk
E. None of the above

Answer

Answer: Option D
Explanation : Access time is the highest in the case of magnetic disk


506. Which of the following is not a characteristic of a daisy chaining priority control scheme?
A. priority is programmable
B. it is relatively easy to add more devices to the chain
C. the failure of one device may affect other devices on the chain
D. the number of control lines is independent of the number of devices on the chain
E. None of the above

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


507. Assembler is
A. a program that places programs into memory and prepares them for execution.
B. a program that automate the translation of assembly language into machine language.
C. a program that accepts a program written in a high level language and produces an object program.
D. is a program that appears to execute a source program as if it were machine language.
E. None of the above

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


508. Indicate which, of the following, in not true about an interpreter
A. Interpreter generates an object program from the source program
B. Interpreter is a kind of translator
C. Interpreter analyses each source statement every time it is to be executed
D. All of the above
E. None of the above

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


509. Object modules generated by assemblers that contain unresolved external references are resolved for two or more object modules by a/an
A. operating system
B. loader
C. linker
D. compiler
E. None of the above

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


510. The advantage of a command processor running only built-in commands is:
A. flexibility to the users in running lists of commands by simply collecting them in named batch command files
B. the command set being common across different hardware configurations
C. users can create system programs and run them as commands
D. the processing is much faster than would other-wise be the case when user defined commands are used
E. None of the above

Answer

Answer: Option B
Explanation : The advantage of a command processor running only built-in commands is the command set being common across different hardware configurations.


511. Under multiprogramming, turnaround time for short jobs is usually _____ and that for long jobs is slightly _____.
A. lengthened; shortened
B. shortened; lengthened
C. shortened; shortened
D. lengthened; lengthened
E. None of the above

Answer

Answer: Option B
Explanation : Under multiprogramming, turnaround time for short jobs is usually shortened and that for long jobs is slightly lengthened.


512. The most common systems security method is
A. passwords
B. encryption
C. firewall
D. all of the above
E. None of the above

Answer

Answer: Option A
Explanation : The most common systems security method is passwords.
Password : A password is a string of characters used for authenticating a user on a computer system. Most passwords are comprised of several characters, which can typically include letters, numbers, and most symbols, but not spaces.


513. Two basic types of operating systems are:
A. sequential and direct
B. batch and timesharing
C. sequential and realtime
D. batch and interactive
E. None of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


514. Daisy chain is a device for
A. connecting a number of controllers to a device
B. connecting a number of devices to a controller
C. interconnecting a number of devices to a number of controllers
D. all of the above
E. None of the above

Answer

Answer: Option B
Explanation : A daisy chain is an interconnection of computer devices, peripherals, or network nodes in series, one after another. It is the computer equivalent of a series electrical circuit.


515. In analyzing the compilation of PL/I program, the term “Machine independent optimization” is associated with
A. recognition of basic syntactic constructs through reductions
B. recognition of basic elements and creation of uniform symbols
C. creation of more optional matrix
D. use of macro processor to produce more optimal assembly code
E. None of the above

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


516. An instruction in a programming language that is replaced by a sequence of instructions prior to assembly or compiling is known as
A. procedure name
B. macro
C. label
D. literal
E. None of the above

Answer

Answer: Option B
Explanation : An instruction in a programming language that is replaced by a sequence of instructions prior to assembly or compiling is known as macro.


517. A program
A. is a device that performs a sequence of operations specified by instructions in memory.
B. is the device where information is stored
C. is a sequence of instructions
D. is typically characterized by interactive processing and time of the CPU
E. None of the above

Answer

Answer: Option C
Explanation : A program is a sequence of instructions


518. A self-relocating program is one which
A. cannot be made to execute in any area of storage other than the one designated for it at the time of its coding or translation.
B. consists of a program and relevant information for its relocation.
C. can itself performs the relocation of its address-sensitive portions.
D. All of the above
E. None of the above

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


519. Banker’s algorithm for resource allocation deals with
A. deadlock prevention
B. deadlock avoidance
C. deadlock recovery
D. mutual exclusion
E. None of the above

Answer

Answer: Option B
Explanation : The Banker algorithm, sometimes referred to as the detection algorithm, is a resource allocation and deadlock avoidance algorithm developed by Edsger Dijkstra that tests for safety by simulating the allocation of predetermined maximum possible amounts of all resources, and then makes an “s-state” check to test for possible deadlock conditions for all other pending activities, before deciding whether allocation should be allowed to continue.


520. A sequence of instructions, in a computer language, to get the desired result, is known as
A. Algorithm
B. Decision Table
C. Program
D. All of the above
E. None of the above

Answer

Answer: Option C
Explanation : A sequence of instructions, in a computer language, to get the desired result, is known as program


521. Which, of the following, is true for testing and debugging?
A. Testing checks for logical errors in the programs while debugging is a process of correcting those errors in the program
B. Testing detects the syntax errors in the program while debugging corrects those errors in the program
C. Testing and debugging indicate the same thing
D. All of the above
E. None of the above

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


522. Information in a memory that is no longer valid or wanted is known as
A. non-volatile
B. volatile
C. surplus
D. garbage
E. None of the above

Answer

Answer: Option D
Explanation : Information in a memory that is no longer valid or wanted is known as garbage.


523. Which of the following filename extension suggests that the file is a backup copy of another file?
A. .txt
B. .com
C. .bas
D. .bak
E. None of the above

Answer

Answer: Option D
Explanation : In computing, “.bak” is a filename extension commonly used to signify a backup copy of a file.
When a program is about to overwrite an existing file (for example, when the user saves the document they are working on), the program may first make a copy of the existing file, with .bak appended to the filename. This common .bak naming scheme makes it possible to retrieve the original contents of the file. In a similar manner, a user may also manually make a copy of the file before the change and append .bak to the filename.


524. Relocation bits used by relocating loader are specified (generated) by
A. Relocating loader itself
B. Linker
C. Assembler or translator
D. Macro processor
E. None of the above

Answer

Answer: Option B
Explanation : Relocation bits used by relocating loader are specified (generated) by linker


525. Which of the following statements is false?
A. a process scheduling algorithm is preemptive if the CPU can be forcibly removed from a process
B. time sharing systems generally use preemptive CPU scheduling
C. response time are more predictable in preemptive systems than in non preemptive systems
D. real time systems generally use non-preemptive CPU scheduling
E. None of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


526. Non-modifiable procedures are called
A. serially usable procedures
B. concurrent procedures
C. reentrant procedures
D. topdown procedures
E. None of the above

Answer

Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board


527. The instruction register
A. is a hardware memory device which denotes the location of the current instruction being executed.
B. is a group of electrical circuits (hardware) that performs the intent of instructions fetched from memory.
C. contains the address of the memory location that is to be read from or stored into.
D. contains a copy of the designated memory location specified by the MAR after a “read” or the new contents of the memory prior to a “write”.
E. None of the above

Answer

Answer: Option B
Explanation : The instruction register is a group of electrical circuits (hardware), that performs the intent of instructions fetched from memory.


528. Which of the following scheduling objectives should be applied to the following: the system should admit jobs to create a mix that will keep most devices busy
A. to be fair
B. to balance resource utilization
C. to obey priorities
D. to be predictable
E. None of the above

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


529. Multiprogramming systems:
A. are easier to develop than single programming system
B. execute each job faster
C. execute more jobs in the same time period
D. are used only on large mainframe computers
E. None of the above

Answer

Answer: Option C
Explanation : Multitasking has the same meaning of multiprogramming but in a more general sense, as it refers to having multiple (programs, processes, tasks, threads) running at the same time. This term is used in modern operating systems when multiple tasks share a common processing resource (e.g., CPU and Memory).


530. Backups should be done
A. daily for most installations
B. weekly for most installations
C. as several image copies followed by an incremental
D. as several incrementals followed by an image copy
E. None of the above

Answer

Answer: Option D
Explanation : Backups should be done as several incrementals, followed by an image copy


531. In an absolute loading scheme, which loader function is accomplished by assembler.
A. Reallocation
B. Allocation
C. Linking
D. Loading
E. None of the above

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


532. The command interpreter
A. is usually the primary user interface
B. requires fixed format commands
C. is menu drive
D. is quite different from the SCL interpreter
E. None of the above

Answer

Answer: Option A
Explanation : The command interpreter is usually the primary user interface


533. A task in a blocked state
A. is executable
B. is running
C. must still be placed in the run queues
D. is waiting for same temporarily unavailable resources
E. None of the above

Answer

Answer: Option D
Explanation : A task in a blocked state is waiting for same temporarily unavailable resources


534. System maintenance:
A. is usually not necessary
B. is necessary on all systems regardless of how good
C. is not required if the system is well written
D. always requires several programs
E. None of the above

Answer

Answer: Option B
Explanation : System maintenance is necessary on all systems, regardless of how good


535. Which of the following statements is not true about the FORTRAN language?
A. FORTRAN is a high level language
B. A FORTRAN program written for the IBM-PC is totally different from a FORTRAN program written for execution on the SUN machine
C. FORTRAN is extensively used to write programs for performing scientific computations
D. All of the above
E. None of the above

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


536. A linker
A. creates a load module
B. is not necessary with variable partitions
C. must be run after the loader
D. is not needed with a good compiler
E. None of the above

Answer

Answer: Option A
Explanation : A linker creates a load module


537. Uniform Symbols Table
A. contains all constants in the program
B. a permanent table of decision rules in the form of patterns for matching with the uniform symbol table to discover syntactic structure
C. consists of a full or partial list of the token’s as they appear in the program. Created by Lexical analysis and used for syntax analysis and interpretation
D. a permanent table which lists all key words and special symbols of the language in symbolic form
E. None of the above

Answer

Answer: Option C
Explanation : Uniform Symbols Table consists of a full or partial list of the token’s as they appear in the program. Created by Lexical analysis and used for syntax analysis and interpretation


538. In which of the storage placement strategies a program is placed in the smallest available hole in the main memory?
A. best fit
B. first fit
C. worst fit
D. buddy
E. None of the above

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


539. In which addressing mode, the effective address of the operand is generated by adding a constant value to the contents of register?
A. absolute mode
B. indirect mode
C. immediate mode
D. index mode
E. None of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


540. The higher versions of the operating systems are so written that programs designed for earlier versions can still be run. What is it called?
A. Upgradability
B. Upward mobility
C. Universality
D. Upward compatibility
E. None of the above

Answer

Answer: Option D
Explanation : Refers to software that runs not only on the computer for which it was designed, but also on newer and more powerful models. For example, a program designed to run on an Intel 386 microprocessor, which also runs on a Pentium, is upward compatible. Upward compatibility is important because it means you can move to a newer, larger, and more sophisticated computer without converting your data.


541. If special forms are needed for printing the output, the programmer specifies these forms through?
A. JCL
B. JPL
C. Utility programs
D. Load modules
E. None of the above

Answer

Answer: Option A
Explanation : Job Control Language (JCL) is a name for scripting languages used on IBM mainframe operating systems to instruct the system on how to run a batch job or start a subsystem.

More specifically, the purpose of JCL is to say which programs to run, using which files or devices for input or output, and at times to also indicate under what conditions to skip a step.


542. Which policy replace a page if it is not in the favoured subset of a process’s pages?
A. FIFO
B. LRU
C. LFU
D. Working set
E. None of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


543. Which of the following can be accesses by transfer vector approach of linking?
A. External data segments
B. External subroutines
C. Data located in other procedures
D. All of the above
E. None of the above

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


544. Which of the following terms refers to the degree to which data in a database system are accurate and correct?
A. data security
B. data validity
C. data independence
D. data integrity
E. None of the above

Answer

Answer: Option D
Explanation : Data integrity is a fundamental component of information security. In its broadest use, “data integrity” refers to the accuracy and consistency of data stored in a database, data warehouse, data mart or other construct.


545. In analyzing the compilation of PL/I program, the term “Syntax analysis” is associated with
A. recognition of basic syntactic constructs through reductions
B. recognition of basic elements and creation of uniform symbols
C. creation of more optional matrix
D. use of macro processor to produce more optimal assembly code
E. None of the above

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


546. A hardware device that is capable of executing a sequence of instructions, is known as
A. CPU
B. ALU
C. CU
D. Processor
E. None of the above

Answer

Answer: Option D
Explanation : A hardware device that is capable of executing a sequence of instructions, is known as processor


547. Which of following is/are the advantage(s) of modular programming?
A. The program is much easier to change
B. Modules can be reused in other programs
C. Easy debugging
D. Easy to compile
E. None of the above

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


548. The function(s) performed by the paging software is (are)
A. Implementation of the access environment for all programs in the system
B. Management of the physical address space
C. Sharing and protection
D. All of the above
E. None of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


549. A compiler for a high-level language that runs on one machine and produces code for a different machine is called
A. optimizing compiler
B. one pass compiler
C. cross compiler
D. multipass compiler
E. None of the above

Answer

Answer: Option C
Explanation : A compiler for a high-level language that runs on one machine and produces code for a different machine is called cross compiler.


550. A critical region is
A. a program segment that has not been proved bug-free
B. a program segment that often causes unexpected system crashes
C. a program segment where shared resources are accessed
D. one which is enclosed by a pair of P and V operations on semaphores
E. none is the above

Answer

Answer: Option D
Explanation : A critical region is one which is enclosed by a pair of P and V operations on semaphores


551. Assembler language
A. is usually the primary user interface
B. requires fixed-format commands
C. is a mnemonic form of machine language
D. is quite different from the SCL interpreter
E. None of the above

Answer

Answer: Option C
Explanation : Assembler language is a mnemonic form of machine language


552. The primary job of the operating system of a computer is to
A. command resources
B. manage resources
C. provide utilities
D. be user friendly
E. None of the above

Answer

Answer: Option B
Explanation : The primary job of the operating system of a computer is to manage resources


553. Which of the following is a measure to test how good or bad a modular design is
A. Module strength
B. Module coupling
C. Static analysis
D. All of the above
E. None of the above

Answer

Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board


554. The Operating system manages
A. Memory
B. Processor
C. Disks and I/O devices
D. All of the above
E. None of the above

Answer

Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board


555. The primary purpose of an operating system is to:
A. make computer easier to use
B. keep system programmers employed
C. make the most efficient use of the hardware
D. allow people to sue the computers
E. None of the above

Answer

Answer: Option A
Explanation : The primary purpose of an operating system is to make computer easier to use.


556. Which of the following is true about pseudocode
A. A machine language
B. An assembly language
C. A high-level language
D. All of the above
E. None of the above

Answer

Answer: Option E
Explanation : No explanation is given for this question Let’s Discuss on Board


557. The principles of structured programming forbid the use of
A. WHILE-DO
B. GOTO
C. IF-THEN-ELSE
D. DO-WHILE
E. None of the above

Answer

Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board


558. Which of the following capabilities is required for a system program to execute more than one program at a time?
A. word processing
B. compiling
C. virtual memory
D. multitasking
E. None of the above

Answer

Answer: Option D
Explanation : In computing, multitasking is the concurrent execution of multiple tasks (also known as processes) over a certain period of time. New tasks can interrupt already started ones before they finish, instead of waiting for them to end. As a result, a computer executes segments of multiple tasks in an interleaved manner, while the tasks share common processing resources such as central processing units (CPUs) and main memory.


559. For Windows 10, Microsoft released _________ in place of MS Paint.
A. Paint 10
B. New MS Paint
C. Paint 3D
D. Universal Paint

Answer

Answer: Option C
Explanation : In the April 2017 “Creators Update” for Windows 10, Microsoft released Paint 3D, a revamp of Paint built on Universal Windows Platform.


560. Which of the key is used to close the active window?
A. Ctrl+F4
B. Alt+F4
C. Alt+F6
D. Ctrl+F5

Answer

Answer: Option B
Explanation : Alt+F4 closes the current window.


Leave a Comment