Operating System Questions and Answers
1. If there are multiple recycle bin for a hard disk
A. You can set different size for each recycle bin
B. You can choose which recycle bin to use to store your deleted files
C. You can make any one of them default recycle bin
D. None of above
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
2. Identify false statement
A. You can find deleted files in recycle bin
B. You can restore any files in recycle bin if you ever need
C. You can increase free space of disk by sending files in recycle bin
D. You can right click and choose Empty Recycle Bin to clean it at once
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
3. If the displayed system time and date is wrong, you can reset it using
A. Write
B. Calendar
C. Write file
D. Control panel
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
4. You should save your computer from?
A. Viruses
B. Time bombs
C. Worms
D. All of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
5. World Wide Web is being standard by
A. Worldwide corporation
B. W3C
C. World Wide Consortium
D. World Wide Web Standard
Answer
Answer: Option B
Explanation : The World Wide Web Consortium is the main international standards organization for the World Wide Web.
6. Which of the key is used to close the active window?
A. Ctrl+F4
B. Ctrl+F5
C. Alt+F6
D. None of above
Answer
Answer: Option D
Explanation : Ctrl+W & Alt+F4 is used to close the active window.
7. The shortcut key to open a task manager is:
A. Alt + F1
B. Alt + Ctrl + Delete
C. Alt + Tab
D. F1
Answer
Answer: Option B
Explanation : The shortcut key to open a task manager is “Alt + Ctrl + Delete”.
8. The windows feature is the ability of computer to automatically configure a new hardware component is that
A. Auto detect
B. Plug and play
C. Add remove hardware
D. None of above
Answer
Answer: Option B
Explanation : In computing, a plug and play device or computer bus, is one with a specification that facilitates the discovery of a hardware component in a system without the need for physical device configuration
9. Which of the following is not a part of the control panel?
A. Date and time
B. My documents
C. Add or remove program
D. Display
Answer
Answer: Option B
Explanation : My documents is not a part of the control panel.
10. The …… provides information about hardware installation, configuration and hardware status
A. Device manager
B. Control panel
C. Add new hardware
D. Program manager
Answer
Answer: Option A
Explanation : The Device manager provides information about hardware installation, configuration and hardware status.
11. A co-processor
A. Is relatively easy to support in software
B. Causes all processor to function equally
C. Works with any application
D. Is quite common in modern computer
Answer
Answer: Option A
Explanation : A coprocessor is a computer processor used to supplement the functions of the primary processor (the CPU). Operations performed by the coprocessor may be floating point arithmetic, graphics, signal processing, string processing, cryptography or I/O Interfacing with peripheral devices.
12. A Microsoft Windows is a(n)
A. Operating system
B. Graphic program
C. Word Processing
D. Database program
Answer
Answer: Option A
Explanation : Microsoft Windows is a group of Operating Systems manufactured by Microsoft. Windows is available in 32 and 64-bit versions and offers a graphical user interface (GUI), multitasking functionalities, virtual memory management capabilities, and support for several peripheral devices. Windows Operating Systems constitute client as well as server versions.
13. Which of the following is program group?
A. Accessories
B. Paint
C. Word
D. All of above
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
14. Which is not application software?
A. Windows NT
B. Page Maker
C. WinWord XP
D. Photoshop
Answer
Answer: Option A
Explanation : Windows NT is a family of operating systems produced by Microsoft.
15. The …… program compresses large files into a smaller file
A. WinZip
B. WinShrink
C. WinStyle
D. None of above
Answer
Answer: Option A
Explanation : WinZip is a Windows program that lets you archive and compress files so that you can store or distribute them more efficiently.
16. Which of the following is an example of a real time operating system?
A. Lynx
B. MS DOS
C. Windows XP
D. Process Control
Answer
Answer: Option D
Explanation : A real-time operating system (RTOS) is an operating system (OS) intended to serve real-time applications that process data as it comes in, typically without buffer delays. Processing time requirements (including any OS delay) are measured in tenths of seconds or shorter increments of time.
17. Which of the following operating system does not implement the multitasking truly?
A. Windows 98
B. Windows NT
C. Windows XP
D. MS DOS
Answer
Answer: Option D
Explanation : Multitasking, in an operating system, is allowing a user to perform more than one computer task (such as the operation of an application program) at a time. The operating system is able to keep track of where you are in these tasks and go from one to the other without losing information.
MS DOS does not implement the multitasking.
18. Which of the following windows version support 64 bit processor?
A. Windows 98
B. Windows 2000
C. Windows XP
D. Windows 95
Answer
Answer: Option C
Explanation : Microsoft Windows XP Professional x64 Edition, released on April 25, 2005, is an edition of Windows XP for x86-64 personal computers. It is designed to use the expanded 64-bit memory address space provided by the x86-64 architecture.
The primary benefit of moving to 64-bit is the increase in the maximum allocatable random-access memory (RAM).
19. Which of the following Operating systems is better for implementing a Client-Server network
A. MS DOS
B. Windows 95
C. Windows 98
D. Windows 2000
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
20. What program runs first after computer is booted and loading GUI?
A. Desktop Manager
B. File Manager
C. Windows Explorer
D. Authentication
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
21. Which of the following operating system do you choose to implement a client server network?
A. MS DOS
B. Windows
C. Windows 98
D. Windows 2000
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
22. My Computer was introduced from
A. Windows 3.1
B. Windows 3.11
C. Windows 95
D. Windows 98
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
23. Which of the following Windows do not have Start button
A. Windows Vista
B. Windows 7
C. Windows 8
D. None of above
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
24. Which is the latest version of MS Windows?
A. Windows 2007
B. Windows 8.1
C. Windows 2008
D. Windows 10
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
25. Which operating system doesn’t support networking between computers?
A. Windows 3.1
B. Windows 95
C. Windows 2000
D. Windows NT
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
26. The ……. contains commands associated with the My Computer window
A. Standard menu
B. Start menu
C. System menu
D. None of the above
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
27. ……. is the layer of a computer system between the hardware and the user program
A. Operating environment
B. Operating system
C. System environment
D. None of these
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
28. Which is the layer of a computer system between the hardware and the user program
A. Operating environment
B. Operating system
C. System environment
D. None
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
29. Which of the following is an example of utility?
A. Antivirus
B. Word
C. Operating system
D. Data recovery
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
30. When you start up the computer the boot up storage at which the BIOS versions manufacturer and data are displayed on the monitor is called
A. Bootstrap
B. Power on self test (POST)
C. System configuration
D. Kernel loading
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
31. The operating system is the most common type of …… Software
A. Communication
B. Application
C. System
D. Word processing software
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
32. Which is built directly on the hardware?
A. Computer Environment
B. Application Software
C. Operating System
D. Database System
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
33. …… system is built directly on the hardware
A. Environment
B. System
C. Operating
D. None
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
34. You can switch from one program to another on the desktop by clicking within the desired program’s window or by clicking on its …… button
A. Icon
B. Taskbar button
C. Folder
D. None of above
Answer
Answer: Option B
Explanation : You can switch from one program to another on the desktop by clicking within the desired program’s window or by clicking on its “Taskbar button” button.
35. The purpose of run command in start menu is to
A. Launch internet browser
B. Open internet explorer
C. Open windows explorer
D. Start programs
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
36. You can select My Computer icon and press Alt + Enter to
A. Delete it from desktop permanently
B. Open it in Explorer mode
C. Open System Properties dialog box
D. Pin it on Start menu
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
37. A relocate program form is one which
A. cannot be made to execute in any area of storage other than the one designated for it at the time of its coding or translation.
B. consists of a program and relevant information for its relocation.
C. can itself performs the relocation of its address-sensitive portions.
D. all of the above
E. None of the above
Answer
Answer: Option B
Explanation : A relocate program form is one which consists of a program and relevant information for its relocation.
38. You can switch from one program to another by clicking within the desired program’s icon from the
A. Application icon on desktop
B. Application icon from taskbar
C. Folder
D. None of above
Answer
Answer: Option B
Explanation : You can switch from one program to another by clicking within the desired program’s icon from the Application icon from taskbar.
39. If you want to execute more than one program at a time, the systems software you are using must be capable of:
A. word processing
B. virtual memory
C. compiling
D. multitasking
E. None of the above
Answer
Answer: Option D
Explanation : If you want to execute more than one program at a time, the systems software you are using must be capable of multitasking.
40. In analyzing the compilation of PL/I program, the description “resolving symbolic address (labels) and generating machine language” is associated with
A. Assembly and output
B. Code generation
C. Storage assignment
D. Syntax analysis
E. None of the above
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
41. Under multiprogramming, turnaround time for short jobs is usually _____ and that for long jobs is slightly _____.
A. lengthened; shortened
B. shortened; lengthened
C. shortened; shortened
D. lengthened; lengthened
E. None of the above
Answer
Answer: Option B
Explanation : Under multiprogramming, turnaround time for short jobs is usually shortened and that for long jobs is slightly lengthened.
42. Virtual memory typically located on
A. RAM
B. CPU
C. Flash card
D. Hard drive
Answer
Answer: Option D
Explanation : Virtual memory typically located on Hard drive
43. What is contained in the page table?
A. Base address of each frame and corresponding page number
B. Memory address and corresponding page number
C. File name and corresponding page number
D. None of Above
Answer
Answer: Option A
Explanation : Base address of each frame and corresponding page number are contained in the page table.
44. Which of the following does not support more than one program at a time?
A. DOS
B. Linux
C. Windows
D. Unix
Answer
Answer: Option A
Explanation : DOS is a family of disk operating systems. DOS primarily consists of MS-DOS and a rebranded. Only one program at a time can use them and DOS itself has no functionality to allow more than one program to execute at a time.
45. The process of transferring data intended for a peripheral device into a disk (or intermediate store) so that it can be transferred to peripheral at a more convenient time or in bulk, is known as
A. multiprogramming
B. spooling
C. caching
D. virtual programming
E. None of the above
Answer
Answer: Option B
Explanation : The process of transferring data intended for a peripheral device into a disk (or intermediate store) so that it can be transferred to peripheral at a more convenient time or in bulk, is known as ‘spooling’.
46. Round-robin scheduling
A. allows interactive tasks quicker access to the processor
B. is quite complex to implement
C. gives each task the same chance at the processor
D. allows processor-bound tasks more time in the processor
E. None of the above
Answer
Answer: Option C
Explanation : Round-robin scheduling gives each task the same chance at the processor
47. What is the name of the system which deals with the running of the actual computer and not with the programming problems?
A. Operating system
B. Systems program
C. Object program
D. Source program
E. None of the above
Answer
Answer: Option B
Explanation : Systems program deals with the running of the actual computer and not with the programming problems.
48. The most common systems security method is
A. passwords
B. encryption
C. firewall
D. all of the above
E. None of the above
Answer
Answer: Option A
Explanation : The most common systems security method is passwords.
Password : A password is a string of characters used for authenticating a user on a computer system. Most passwords are comprised of several characters, which can typically include letters, numbers, and most symbols, but not spaces.
49. Tree structure displays the
A. File only
B. Directory only
C. File and directory name
D. None of above
Answer
Answer: Option B
Explanation : Tree structure displays the Directory only.
50. Which of the following is not an operating system?
A. DOS
B. Linux
C. Windows
D. Oracle
Answer
Answer: Option D
Explanation : Oracle database (Oracle DB) is a relational database management system (RDBMS) from the Oracle Corporation.
51. Linux is a(n) ……. operating system
A. Open source
B. Microsoft
C. Windows
D. Mac
Answer
Answer: Option A
Explanation : Linux is a family of free and open-source software operating systems built around the Linux kernel. Typically, Linux is packaged in a form known as a Linux distribution for both desktop and server use.
52. Block caches or buffer caches are used
A. to improve disk performance
B. to handle interrupts
C. to increase the capacity of the main memory
D. to speed up main memory read operation
E. None of the above
Answer
Answer: Option A
Explanation : Block caches or buffer caches are used to improve disk performance
53. Which of the following statements is false?
A. a small page size causes large page tables
B. internal fragmentation is increased with small pages
C. a large page size causes instructions and data that will not be referenced brought into primary storage
D. I/O transfers are more efficient with large pages
E. None of the above
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
54. Which of the following is not a multitasking operating system?
A. Windows
B. Linux
C. Win NT
D. DOS
Answer
Answer: Option D
Explanation : DOS (Disk Operating System) is not a multitasking operating system
55. Two basic types of operating systems are:
A. sequential and direct
B. batch and timesharing
C. sequential and realtime
D. batch and interactive
E. None of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
56. Daisy chain is a device for
A. connecting a number of controllers to a device
B. connecting a number of devices to a controller
C. interconnecting a number of devices to a number of controllers
D. all of the above
E. None of the above
Answer
Answer: Option B
Explanation : A daisy chain is an interconnection of computer devices, peripherals, or network nodes in series, one after another. It is the computer equivalent of a series electrical circuit.
57. Which operating system can you give smallest file name?
A. Ps/2
B. Dos
C. Windows
D. Windows NT
Answer
Answer: Option B
Explanation : DOS (Disk Operating System) is an operating system that runs from a hard disk drive. The term can also refer to a particular family of disk operating systems, most commonly MS-DOS (Microsoft Disk Operating System).
58. Which one is not operating system?
A. P11
B. OS/2
C. Windows
D. Unix
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
59. The action of parsing the source program into the proper syntactic classes is known as
A. syntax analysis
B. lexical analysis
C. interpretation analysis
D. general syntax analysis
E. None of the above
Answer
Answer: Option B
Explanation : The action of parsing the source program into the proper syntactic classes is known as lexical analysis
60. Which, of the following is not true about the description of a decision table?
A. A decision table is easy to modify
B. A decision table is directly understood by the computer
C. A decision table is easy to understand
D. All of the above
E. None of the above
Answer
Answer: Option B
Explanation : A decision table is directly understood by the computer is not true about the description of a decision table
61. You should choose Sleep option when
A. The computer is tired after working for the whole day
B. You are leaving for a very short time and want to resume you work shortly
C. When computer gets hanged frequently. Let it sleep for some time
D. You finish working and going to bed
Answer
Answer: Option B
Explanation : Sleep mode, sometimes called standby or suspend mode, is a power-sparing state that a computer can enter when not in use. The computer’s state is maintained in RAM (random access memory). A computer usually wakes from sleep mode through touching a key, clicking the mouse or pressing the power button.
62. The ….. displays the name of every computer user on the computer
A. Wish list screen
B. Command screen
C. Welcome screen
D. None of the above
Answer
Answer: Option C
Explanation : Welcome screen displays the name of every computer user on the computer display screen (Computer Monitor).
63. In analyzing the compilation of PL/I program, the term “Machine independent optimization” is associated with
A. recognition of basic syntactic constructs through reductions
B. recognition of basic elements and creation of uniform symbols
C. creation of more optional matrix
D. use of macro processor to produce more optimal assembly code
E. None of the above
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
64. The category of software most appropriate for controlling the design and layout of complex document like newsletters and brochure is:
A. Word processing
B. Computer aided design
C. Web page authoring
D. Desktop publishing
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
65. Which one is not a system tool?
A. Backup
B. Disk defragment
C. Virus scanning
D. All of the above
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
66. Whenever you move a directory from one location to another
A. All files inside the directory are moved
B. All the subdirectory inside that directory are moved
C. The directory is moved the source file is not moved
D. Both A and B
Answer
Answer: Option D
Explanation : All the files inside the directory and inside subdirectory are moved in that location
67. The Basic Input Output System (BIOS) resides in
A. RAM
B. ROM
C. The CPU
D. Memory Cache
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
68. Which of the following does not occur during the power-on-self-test (POST)?
A. The scan disk utility begins to run
B. The video card and video memory are tested
C. The BIOS identification process occurs
D. Memory chip are checked to ensure that they are working properly
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
69. The memory which allocates space for DOS and application is called
A. Expanded memory
B. Cache memory
C. Virtual memory
D. Conventional memory
Answer
Answer: Option D
Explanation : In DOS memory management, conventional memory, also called base memory, is the first 640 kilobytes (640 × 1024 bytes) of the memory on IBM PC or compatible systems. It is the read-write memory directly addressable by the processor for use by the operating system and application programs.
70. The maximum size of a write file is limited to only
A. Name of the file
B. Extension of the file
C. The amount of memory in your computer
D. All of above
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
71. The operating system creates _____ from the physical computer
A. Virtual space
B. Virtual computers
C. Virtual device
D. None
Answer
Answer: Option B
Explanation : In computing, a virtual machine is an emulation of a computer system. Virtual machines are based on computer architectures and provide the functionality of a physical computer.
72. Which menu bar selection would you access to open file?
A. Option
B. Help
C. View
D. None of above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
73. Which of the following is drop down list?
A. List
B. Combo box
C. Text area
D. None
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
74. If you hard disk is partitioned into 3 drives, the number of recycle bin for that hard disk is
A. 1
B. 2
C. 3
D. 4
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
75. Which mode loads minimal set of drivers when starting Windows?
A. Safe Mode
B. Normal Mode
C. VGA Mode
D. Network Support Mode
Answer
Answer: Option A
Explanation : Safe mode is a diagnostic mode of a computer operating system (OS). It can also refer to a mode of operation by application software. In Windows, safe mode only allows essential system programs and services to start up at boot. Safe mode is intended to help fix most, if not all problems within an operating system. It is also widely used for removing rogue security software.
76. Which of the following are loaded in safe mode?
A. Keyboard driver
B. Mouse driver
C. VGA drive
D. All of above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
77. The date and time displays on
A. Taskbar
B. Status bar
C. System tray
D. Launch pad
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
78. …… runs on a computer hardware and serves as a platform for other system to run on
A. Operating system
B. Application system
C. System software
D. All of above
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
79. Which runs on computer hardware and serve as platform for other software to run on?
A. Operating System
B. Application Software
C. System Software
D. All
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
80. Which is the first program run on a computer when the computer boots up?
A. System software
B. Operating system
C. System operations
D. None
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
81. Once text has been cut to the clipboard, you can …… that text into another document
A. Paste
B. Copy
C. Transfer
D. None of the above
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
82. What is the function of radio button?
A. To select multiple option
B. To select single option
C. To select all option
D. All of above
Answer
Answer: Option B
Explanation : A radio button or option button is a graphical control element that allows the user to choose only one of a predefined set of mutually exclusive options.
83. A ……. is a named location on a disk where files are stored
A. Folder
B. Pod
C. Version
D. None of the above
Answer
Answer: Option A
Explanation : When talking about file systems, a folder (also called directory, or catalog) is a way to organize computer files. A folder is a storage space that many files can be placed into to group them together and organize the computer. A folder can also contain other folders.
84. The Banker’s algorithm is used
A. to rectify deadlock
B. to detect deadlock
C. to prevent deadlock
D. to solve deadlock
Answer
Answer: Option C
Explanation : The Banker algorithm, sometimes referred to as the detection algorithm, is a resource allocation and deadlock avoidance algorithm developed by Edsger Dijkstra that tests for safety by simulating the allocation of predetermined maximum possible amounts of all resources, and then makes an “s-state” check to test for possible deadlock conditions for all other pending activities, before deciding whether allocation should be allowed to continue. Source : wikipedia.org
85. Which type of command requires additional files to perform specific operations?
A. Internal commands
B. External commands
C. Valuable commands
D. Primary commands
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
86. Which of the following is system software?
A. Operating system
B. Compiler
C. Utilities
D. All of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
87. The primary purpose of an operating system is:
A. To make the most efficient use of the computer hardware
B. To allow people to use the computer
C. To keep systems programmers employed
D. To make computers easier to use
Answer
Answer: Option A
Explanation : An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.
For hardware functions such as input and output and memory allocation, the operating system acts as an intermediary between programs and the computer hardware, although the application code is usually executed directly by the hardware and frequently makes system calls to an OS function or is interrupted by it. Source : wikipedia.org
88. A user-interface that is easy to use is considered to be
A. User-happy
B. User-simple
C. User-friendly
D. None of the above
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
89. A ….. is a flash memory storage device that plugins into a USB port
A. USB snap drive
B. USB flash drive
C. USB memory maker drive
D. None of above
Answer
Answer: Option B
Explanation : A USB flash drive is a device used for data storage that includes a flash memory and an integrated Universal Serial Bus (USB) interface. Most USB flash drives are removable and rewritable. Physically, they are small, durable and reliable.
90. You can use print manage window
A. To check status of files in the print queue
B. To cancel the print job
C. To interrupt printing
D. All of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
91. The ……. is the drive containing the files to be copied
A. Source drive
B. Destination drive
C. USB drive
D. None of the above
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
92. Which one of the following is not a multitasking operating system?
A. DOS
B. Windows
C. Unix
D. Linux
Answer
Answer: Option A
Explanation : DOS is not a multitasking operating system. DOS did however provide a Terminate and Stay Resident (TSR) function which allowed programs to remain resident in memory.
93. The most recent version of MAC OS is based on the …… operating system
A. Windows
B. Linux
C. Unix
D. CMOS
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
94. Recently deleted files are stored in
A. Recycle bin
B. Desktop
C. Taskbar
D. My computer
Answer
Answer: Option A
Explanation : In computing, the Trash (also known as the Recycle Bin in Windows and by other names in other operating systems ) is temporary storage for files that have been deleted in a file manager by the user, but not yet permanently erased from the file system. Typically, a recycle bin is presented as a special file directory to the user (whether or not it is actually a single directory depends on the implementation), allowing the user to browse deleted files, undelete those that were deleted by mistake, or delete them permanently (either one by one, or by the “Empty Trash” function). Source : wikipedia.org
95. Which of the following operating system reads and reacts in actual time?
A. Quick Response System
B. Real Time System
C. Time Sharing System
D. Batch Processing System
Answer
Answer: Option B
Explanation : A real-time operating system (RTOS) is an operating system (OS) intended to serve real-time applications that process data as it comes in, typically without buffer delays. Processing time requirements (including any OS delay) are measured in tenths of seconds or shorter increments of time. A real time system is a time bound system which has well defined fixed time constraints.
96. In Windows, start button is used to
A. Run applications
B. Device setting
C. Turn off the system
D. All of above
Answer
Answer: Option D
Explanation : The Start button was first introduced with the release of Microsoft Windows 95 and has been featured in all releases of Windows since. The Start button allows users to access their run applications, device setting, turn off the system, computer programs or configure Microsoft Windows easily by accessing the Start Menu.
97. Which one is true for unconditional disk formatting?
A. Destroys every byte of data on a disk by overwriting it with with blank spaces
B. Do not check/scan surface after format
C. Transfer system files after format
D. All of above
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
98. Which components appear in the initial Windows start up display?
A. Dialog boxes
B. Start menu
C. Taskbar
D. All of above
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
99. A small part of taskbar that has icons of background running applications is
A. Start button
B. Quick launch
C. Task bar
D. System tray
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
100. All of the following are TRUE regarding virtual memory EXCEPT
A. Any amount of RAM can be allocated to virtual memory
B. The setting for the amount of hard disk drive space to allocate virtual memory can be manually change
C. This temporary storage is called the swap file or page file
D. Virtual memory is the physical space o the hard drive
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
101. The essential difference between an operating system like Linux and one like Windows is that
A. Windows can run with an Intel processor whereas Linux cannot
B. Linux is a proprietary whereas Windows is not
C. There are multiple versions of Linux but only one version of Windows
D. Any programmer can modify Linux code which is not permitted with Windows
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
102. Which of the following is/are external commands?
A. Edit
B. Label
C. Sys
D. All of above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
103. An operating system version designed for use with a media center PC is Microsoft Windows XP
A. Home edition
B. Media center edition
C. Tablet PC edition
D. None of above
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
104. An operating system version designed for use with a tablet PC is Microsoft Windows XP
A. Home edition
B. Media center edition
C. Tablet PC edition
D. None of the above
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
105. What is dispatch latency?
A. The time taken by the dispatcher to stop one process and start another
B. The time taken by the processor to write a file into disk
C. The whole time taken by all processor
D. None of Above
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
106. Which is not an external command?
A. Edit
B. XCOPY
C. Sys
D. None of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
107. Which of the following is not essential to shut down your computer?
A. Save all opened files
B. Close all running applications
C. Switch off monitor
D. Cut off the power supply
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
108. A page fault occurs when
A. the Deadlock happens
B. the Segmentation starts
C. the page is found in the memory
D. the page is not found in the memory
Answer
Answer: Option D
Explanation : An interrupt that occurs when a program requests data that is not currently in real memory. The interrupt triggers the operating system to fetch the data from a virtual memory and load it into RAM. An invalid page fault or page fault error occurs when the operating system cannot find the data in virtual memory.
109. What is Dr. Watson?
A. IT Expert
B. Diagnosis tool
C. Surgeon
D. None
Answer
Answer: Option B
Explanation : Dr. Watson is a diagnostic tool that gathers information about your computer when a problem occurs with a program. The information gathered by Dr. Watson is called a snapshot. The snapshot includes information that: Identifies the program that has a problem.
110. You can move a window to a different position on your screen by dragging it by its
A. Move handle
B. Tail
C. Status bar
D. Title bar
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
111. Underlined text, such as text and folder names is referred to as
A. Hyperlink
B. Menu
C. Source drive
D. None of these
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
112. Which of the following is suitable after you install new drivers?
A. Shut Down
B. Restart
C. Sleep
D. Hibernate
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
113. Windows displays various options to shutdown. Which is suitable at the end of day?
A. Shut Down
B. Restart
C. Sleep
D. Hibernate
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
114. A bar that inform you the available options in your computer, opened applications, background running applications and can be used to switch between applications quickly is
A. Menu bar
B. Tool bar
C. Status bar
D. Task bar
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
115. Which of the following shutdown method is often called Warm Boot?
A. Shut Down
B. Restart
C. Sleep
D. Hibernate
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
116. ______ is most often done after fixing a problem, adding a new program or making configuration change
A. Shut Down
B. Restart
C. Sleep
D. Hibernate
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
117. Which components appear in the initial windows start up display?
A. Dialog box
B. Task bar
C. Start menu
D. All of the above
Answer
Answer: Option B
Explanation : A taskbar is an element of a graphical user interface which has various purposes. It typically shows which programs are currently running.
118. Taskbar is used for
A. Navigation program
B. Switching between program
C. Start a program
D. All of above
Answer
Answer: Option D
Explanation : Answer: Taskbar is used to launch an application through the start menu. It displays all the opened applications and files. It is used to set taskbar and desktop properties.
119. To install the new font in window XP
A. Start -> setting -> control panel -> font
B. Start -> setting -> control panel -> font -> install new font
C. Start -> control panel -> font -> install new font
D. Start -> setting -> font
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
120. When a peripheral device needs immediate attention from the operating system, it generates a(n)
A. Interrupt
B. Spool
C. Stack
D. Page file
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
121. ___ is a compromise mode between Shut Down and Sleep mode because it does not consume power and remembers the current state of your desktop
A. Shut Down
B. Restart
C. Sleep
D. Hibernate
Answer
Answer: Option D
Explanation : This option was designed for laptops and might not be available for all PCs. (For example, PCs with InstantGo don’t have the hibernate option.) Hibernate uses less power than sleep and when you start up the PC again, you’re back to where you left off (though not as fast as sleep).
Use hibernation when you know that you won’t use your laptop or tablet for an extended period and won’t have an opportunity to charge the battery during that time. First check to see if this option is available on your PC and if it is, turn it on. Source : microsoft.com
122. You should choose this mode if you don’t know how long you won’t use your computer but want to have the same desktop state when you resume
A. Shut Down
B. Restart
C. Sleep
D. Hibernate
Answer
Answer: Option D
Explanation : This option was designed for laptops and might not be available for all PCs. (For example, PCs with InstantGo don’t have the hibernate option.) Hibernate uses less power than sleep and when you start up the PC again, you’re back to where you left off (though not as fast as sleep).
Use hibernation when you know that you won’t use your laptop or tablet for an extended period and won’t have an opportunity to charge the battery during that time. First check to see if this option is available on your PC and if it is, turn it on. Source : microsoft.com
123. The category of operating system that you most likely have running on your PDA computer is a ……. Operating system
A. Real time
B. Single user single task
C. Single user multitask
D. Multiuser multitask
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
124. Running multiple programs at the same time is called:
A. Multitasking
B. Foreground tasking
C. Single tasking
D. Symmetric
Answer
Answer: Option A
Explanation : Multitasking, in an operating system, is allowing a user to perform more than one computer task (such as the operation of an application program) at a time. The operating system is able to keep track of where you are in these tasks and go from one to the other without losing information.
125. What is the meaning of “Hibernate” in Windows XP/Windows 7?
A. Restart the Computer in safe mode
B. Restart the Computer in hibernate mode
C. Shutdown the Computer terminating all the running applications
D. Shutdown the Computer without closing the running applications
Answer
Answer: Option D
Explanation : The computer saves the current state of the system from the computer’s RAM to the hard disk, then shuts down. When the computer is restarted, instead of going through the typical boot sequence, the previously saved state is automatically loaded into the RAM. The open windows and running programs from your previous session appear just as they were when the computer entered Hibernate mode. Basically, Hibernate mode acts like Standby mode, except the computer can be completely turned off. Source : techterms.com
126. ……. is an intermediate storage for deleted files
A. My computer
B. My documents
C. Recycle bin
D. None of above
Answer
Answer: Option C
Explanation : In computing, the Trash (also known as the Recycle Bin in Windows and by other names in other operating systems ) is temporary storage for files that have been deleted in a file manager by the user, but not yet permanently erased from the file system. Typically, a recycle bin is presented as a special file directory to the user, allowing the user to browse deleted files, undelete those that were deleted by mistake, or delete them permanently (either one by one, or by the “Empty Trash” function).
127. We can start the application from?
A. Log off
B. Network place
C. Recycle bin
D. Run
Answer
Answer: Option D
Explanation : On the Microsoft Windows operating system, the Run command is used to directly open an application or document whose path is known. It functions more or less like a single-line command line interface
128. Which of the following is not process states?
A. New
B. Running
C. Ready
D. Finished
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
129. In DOS, the maximum length of filename is
A. 5
B. 8
C. 11
D. 10
Answer
Answer: Option B
Explanation : The older MS-DOS FAT file system supports a maximum of 8 characters for the base file name and 3 characters for the extension, for a total of 12 characters including the dot separator. This is commonly known as an 8.3 file name.
130. The question mark (?) indicates in file searching
A. A single character
B. A group of character
C. Questions
D. None of above
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
131. Save operation means
A. Put data into processor
B. Put data into internal memory
C. Put data into secondary storage
D. Put data into monitor
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
132. CAD software is most likely to be used by
A. Web designer
B. Engineers
C. Project Manager
D. Magazine Editor
Answer
Answer: Option B
Explanation : Computer-aided design (CAD) is the use of computer systems to aid in the creation, modification, analysis, or optimization of a design. CAD software is used to increase the productivity of the designer, improve the quality of design, improve communications through documentation, and to create a database for manufacturing.
133. Which of the following is used to display the content of a certain drive or folder?
A. Click the drive or folder while holding down the Alt key
B. Triple click the drive or folder
C. Right click the drive or folder
D. Double click the drive or folder
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
134. A spooler is a
A. Location in memory that maintains the contents of documents until it prints out
B. Queue of print job that are waiting to print
C. Program that coordinates the print job that are waiting to process
D. Message sent from the printer to the operating system when a print job is completed
Answer
Answer: Option C
Explanation : A program that controls spooling — putting jobs on a queue and taking them off one at a time. Most operating systems come with one or more spoolers, such as a print spooler for spooling documents. In addition, some applications include spoolers. Many word processors, for example, include their own print spooler.
A good print spooler should allow you to change the order of documents in the queue and to cancel specific print jobs. Source : webopedia.com
135. Which of the following file menu option saves document to disk?
A. Save
B. Create
C. Rename
D. All of above
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
136. Booting means
A. Restarting computer
B. Installing program
C. Removing errors
D. Switch off
Answer
Answer: Option A
Explanation : To boot a computer is to load an operating system into the computer’s main memory or random access memory (RAM). Once the operating system is loaded, it’s ready for users to run applications.
137. The function of Dir/W is
A. Show all details of file
B. Show only file name and directory name
C. Shows only directory
D. All of the above
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
138. The problem with …. file is that they slow your computer’s operation
A. Fragmented
B. Formatted
C. Program
D. All of above
Answer
Answer: Option A
Explanation : In computer storage, fragmentation is a phenomenon in which storage space is used inefficiently, reducing capacity or performance and often both. The exact consequences of fragmentation depend on the specific system of storage allocation in use and the particular form of fragmentation.
139. When you rename a file five times then the number of file in the disk is
A. 1
B. 2
C. 3
D. 5
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
140. When you open my computer on desktop you see the information of
A. Hard disk
B. CD
C. Removable disk
D. All of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
141. Page stealing
A. Is a sign of an efficient system
B. Is taking page frame from other working sets
C. Should be the turning goal
D. Is taking layer disk space for page in page out
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
142. What do you mean by dialog box?
A. Interactive message box
B. Group of options
C. Set of controls
D. All of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
143. Which is not a system tool?
A. Folder
B. Backup
C. Scandisk
D. Format
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
144. User action such as keystroke or mouse click are referred to as
A. Interrupt
B. Tasks
C. Processes
D. Event
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
145. How can you optimize performance of your computer?
A. Delete unused files
B. Defrag disk
C. Scan for virus
D. All of above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
146. Dial up connection allows you to
A. Connect ISP
B. Internet
C. Server
D. All of above
Answer
Answer: Option A
Explanation : A dial-up connection is established when two or more communication devices use a public switched telephone network (PSTN) to connect to an Internet service provider (ISP).
147. A utility that can be used to minimize the number of fragmented files and enhance the speed
A. Disk space
B. Defrag
C. Scandisk
D. Double space
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
148. Scandisk
A. Checks the disk
B. Give information about disk
C. Run from DOS mode
D. All of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
149. To properly exit Windows
A. Click the stop button on the desktop
B. Click the exit button on the desktop
C. Select shut down from Start menu
D. None of above
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
150. To change the volume label
A. Vol
B. Label
C. Scandisk
D. None
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
151. Which of the following is a disk compression tools?
A. Drive space
B. Defragmenter
C. Scandisk
D. None of the above
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
152. Recently used application file list appears in the Windows operating system
A. Setting menu
B. Documents menu
C. Run dialog box
D. Programs menu
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
153. ……. are specially designed computer chips that reside inside other devices, such as your car or electric thermostat
A. Server
B. Embedded computer
C. Robotic computer
D. Mainframes
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
154. To save your computer from viruses you will do
A. Install antivirus software and run it
B. Make physical safe for the removal disk
C. Scan the removable disk before using it
D. All of the above
Answer
Answer: Option A
Explanation : Antivirus software, or anti-virus software, also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses,
155. The title bar always displays on
A. Top of the open windows
B. Left side of the open window
C. Right side of the open window
D. All of above
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
156. Which is not external command?
A. Doskey
B. Verify
C. Print
D. Find
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
157. What is the method of handling deadlocks?
A. Use a protocol to ensure that the system will never enter a deadlock state
B. Allow the system to enter the deadlock state and then recover
C. Pretend that deadlocks never occur in the system
D. All of the Above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
158. To delete a file without allowing it to store in recycle bin
A. Press Delete key
B. Press Shift + Delete key
C. Press Ctrl + Delete key
D. Press Alt + Delete key
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
159. Operating system is a ……
A. System software
B. Application software
C. Presentation software
D. Database software
Answer
Answer: Option A
Explanation : An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.
160. To display a shortcut menu for an object you use
A. Click the object
B. Right click the object
C. Point the object and press Ctrl+P
D. Touch the object on the screen with your finger
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
161. Which of the following separates primary file and extension is
A. Dot
B. Period
C. Point
D. All of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
162. Underlined character on the menu or dialog box known as
A. Hot spot
B. Hot key
C. Pane
D. Underline word
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
163. In Microsoft windows, the graphical pattern on the desktop used as background for windows is
A. Icons
B. Wall paper
C. Picture
D. Background
Answer
Answer: Option B
Explanation : More commonly referred to as a desktop background in Windows, a wallpaper is an image that is used as a backdrop on any graphical user interface that has a desktop. More plainly, it is the picture or pattern you see on the main screen after your computer has booted up.
164. All of the following are task performed by the operating system except
A. Managing hardware on the computer
B. Controlling the access that application program has to the CPU
C. Performing housekeeping task like file compression and disk defragmentation
D. Provides an interface for user to interact with computer
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
165. Which key deletes text before, or to the left, of the insertion point?
A. PageUp
B. Delete
C. PageDown
D. BackSpace
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
166. The chunks of a memory are known as
A. Sector
B. Offset
C. Page
D. Frame
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
167. Which of the following is not an operating system?
A. CP / M
B. Unix
C. Pascal
D. MS DOS
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
168. Operating system is like a
A. Government
B. Police
C. Parliament
D. All of above
Answer
Answer: Option A
Explanation : The operating system provides the basic rules, conventions, protections, and services necessary for the functioning of application programs such as editors, spreadsheets, browsers, and games.
Government plays a similar role in the functioning of a modern society. Government furnishes the rules, conventions, protections, and basic services necessary for the smooth functioning and interactions of businesses and individuals.
169. Start / restart the computer is called
A. Exit
B. Run
C. Option
D. Boot
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
170. Which file is transferred when computer is start up?
A. Document
B. Program files
C. Operating system
D. System files
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
171. Generally quick launch toolbar is displayed on
A. the left side of taskbar
B. the right side of taskbar
C. on the middle of taskbar
D. a bar out of taskbar
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
172. Which is not a valid file system?
A. FAT 16
B. FAT 32
C. NTFS
D. FXZ
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
173. Which file system DOS typically use?
A. FAT 16
B. FAT 32
C. NTFS
D. LMFS
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
174. Which file system Windows 95 typically use?
A. FAT 16
B. FAT 32
C. NTFS
D. LMFS
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
175. Which of the following is not a mode in starting Windows?
A. Command Prompt
B. Safe Mode
C. Normal Mode
D. Turbo Mode
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
176. Which of the following is default mode for Windows to start?
A. Command Prompt
B. Safe Mode
C. Normal Mode
D. None of above
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
177. The file system “NTFS” stands for
A. New Type File System
B. Never Terminated File System
C. New Technology File System
D. Non Terminated File System
Answer
Answer: Option C
Explanation : NTFS (New Technology File System) is a proprietary file system developed by Microsoft. Starting with Windows NT 3.1, it is the default file system of the Windows NT family.
178. Which one of the following is not the function of Operating System?
A. Resource Management
B. File Management
C. Networking
D. Processor Management
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
179. How do you connect internet in your system?
A. My computer >> dialup networking
B. Control panel >> modem
C. Network neighborhood
D. None of above
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
180. The following applications may appear on system tray except
A. System Clock
B. Volume Control
C. Network Connection
D. MS Office Suite
Answer
Answer: Option D
Explanation : MS Office Suite is not appear in system tray
181. Which of the following is text browser?
A. Lynx
B. Hot Java
C. c. Netscape
D. Internet Explorer
Answer
Answer: Option A
Explanation : Lynx is a customizable text-based web browser for use on cursor-addressable character cell terminals. As of May 2017, it is the oldest web browser still in general use and active development, having started in 1992.
182. Which of the following is default location of saving and opening file?
A. Desktop
B. My computer
C. My documents
D. All of above
Answer
Answer: Option C
Explanation : My documents is the default location of saving and opening the files in windows operating system.
183. By default we can save the file in
A. Desktop
B. Recycle bin
C. My document
D. My computer
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
184. ____ is the operating systems File and folder Manager
A. Windows Explorer
B. Windows Control Panel
C. My Computer
D. My Documents
Answer
Answer: Option A
Explanation : File Explorer, previously known as Windows Explorer, is a file manager application that is included with releases of the Microsoft Windows operating system from Windows 95 onwards. It provides a graphical user interface for accessing the file systems.
185. It is used to explorer the contents of computer, drives as well as manage files
A. Recent Places
B. My Document
C. My Computer
D. My Network Place
Answer
Answer: Option B
Explanation : My Documents is the commonly recognized name of a special folder in Microsoft Windows This folder is supposed to be a personal area where users store their personal non-shared documents.
186. The Primary job of the operating system is
A. Manage Commands
B. Manage Users
C. Manage Programs
D. Manage Resources
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
187. Which of the following is not an operating system?
A. Windows 2000
B. Linux
C. Mac OS
D. Notepad
Answer
Answer: Option D
Explanation : Notepad is a simple text editor for Microsoft Windows and a basic text-editing program which enables computer users to create documents. It was first released as a mouse-based MS-DOS program in 1983, and has been included in all versions of Microsoft Windows since Windows 1.0 in 1985.
188. Scandisk analyze and repair damage to which of the following?
A. Physical clusters
B. FAT
C. Lost clusters
D. All of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
189. Find can be used to
A. Locate a program
B. Locate a document
C. Locate a network computer
D. All of above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
190. The necessary conditions needed before deadlock can occur?
A. No Mutual Exclusion Hold and wait Preemption Circular Wait
B. Mutual Exclusion No Hold and wait Preemption Circular Wait
C. Mutual Exclusion Hold and wait No Preemption Circular Wait
D. Mutual Exclusion Hold and wait Preemption No Circular Wait
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
191. …… is a new windows feature that offers a number of methods for searching for a file or folder?
A. Find
B. Search
C. Locate
D. All of the above
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
192. The OS used to operate the mobile phone is a
A. Smart card OS
B. Embedded OS
C. Multiuser OS
D. None of above
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
193. UNIX operating system is a(n)
A. Time sharing operating system
B. Multi-user operating system
C. Multi-tasking operating system
D. All of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
194. When we double click on my computer
A. Show the content of your saved files
B. Show the list of your computer drive
C. List of deleted files and folders
D. All of the above
Answer
Answer: Option B
Explanation : When we double click on my computer show the list of your computer drive.
195. The ability of an operating system to control the activities of multiple program at the same time is called
A. Multitasking
B. Multiprocessing
C. Multioperating
D. Multipaging
Answer
Answer: Option A
Explanation : In computing, multitasking is the concurrent execution of multiple tasks over a certain period of time. New tasks can interrupt already started ones before they finish, instead of waiting for them to end.
196. Disk label name can be up to …… characters
A. 8
B. 9
C. 11
D. 255
Answer
Answer: Option C
Explanation : Disk label name can be up to 11 characters
197. Which of the following is the part of the operating system?
A. Cell
B. FAT
C. Kernel
D. Disk
Answer
Answer: Option C
Explanation : A kernel is the central part of an operating system. It manages the operations of the computer and the hardware – most notably memory and CPU time. There are two types of kernels: A microkernel, which only contains basic functionality; A monolithic kernel, which contains many device drivers.
198. Directory is similar to ……
A. File
B. Folder
C. Item
D. None of above
Answer
Answer: Option B
Explanation : In computing, a directory is a file system cataloging structure which contains references to other computer files, and possibly other directories. On many computers, directories are known as folders, or drawers to provide some relevancy to a workbench or the traditional office file cabinet.
199. Sleep is a good mode to use because
A. It saves power which in true is saving money
B. It makes computer fresh after it wakes up
C. It consumes low battery when you start it again
D. All of above
Answer
Answer: Option A
Explanation : Sleep is a good mode to use because it saves power which in true is saving money
200. What hole will allocates in “Worst-Fit” algorithm of memory management?
A. It allocates the smaller hole than required memory hole
B. It allocates the smallest hole from the available memory holes
C. It allocates the largest hole from the available memory holes
D. It allocates the exact same size memory hole
Answer
Answer: Option C
Explanation : Worst Fit allocates a process to the partition which is largest sufficient among the freely available partitions available in the main memory. If a large process comes at a later stage, then memory will not have space to accommodate it.
201. …… is used in operating system to separate mechanism from policy
A. Single level implementation
B. Two level implementation
C. Multi level implementation
D. None
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
202. The modern keyboard typically has __________ Function keys.
A. 10
B. 12
C. 14
D. 16
Answer
Answer: Option B
Explanation : The modern keyboard typically has 12 Function keys.
F1, F2, F3, F4, F5, F6, F7, F8, F9, F10, F11, F12
203. Essential files of MS DOS are
A. Command.com
B. Io.sys
C. Msdos.sys
D. All of above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
204. Which Operating System doesn’t support long file names?
A. OS / 2
B. Windows 95
C. MS-DOS
D. Windows NT
Answer
Answer: Option C
Explanation : MS-DOS Operating System doesn’t support long file names
205. We need system files to run
A. MS Word
B. MS Excel
C. MS Dos
D. MS Access
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
206. What is the function of folder?
A. Save files
B. Delete files
C. Move files
D. All of the above
Answer
Answer: Option D
Explanation : A digital folder has the same purpose as a physical folder – to store documents. Computer folders can also store other types of files, such as applications, archives, scripts, and libraries. Folders can even store other folders, which may contain additional files and folders. Folders are designed for organizing files.
207. Which button might you find in a windows title bar?
A. Close button
B. Maximize button
C. Minimize button
D. All of the above
Answer
Answer: Option D
Explanation :
208. Press the ….. button to have the window fill the entire screen
A. Close
B. Maximize
C. Minimize
D. None of the above
Answer
Answer: Option B
Explanation : Press the Maximize Button to have the window fill the entire screen
209. The box on ……. that allows you to choose where to go and is located below the standard toolbar
A. System menu
B. Address bar
C. Menu bar
D. None of these
Answer
Answer: Option B
Explanation : The box on Address bar that allows you to choose where to go and is located below the standard toolbar
210. Which windows features can be accessed from the start menu?
A. Help
B. Windows Explorer
C. Microsoft Network
D. All of above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
211. ……. are list of commands that appear on the screen
A. GUIS
B. Icons
C. Menus
D. Windows
Answer
Answer: Option C
Explanation : Menus are list of commands that appear on the screen
212. A …… is a set of computer instructions that carry out a task on the computer
A. Program
B. Database
C. Memory files
D. None of the above
Answer
Answer: Option A
Explanation : A Program is a set of computer instructions that carry out a task on the computer
213. A real time operating system is most likely to be used for which of the following task?
A. Controlling access to a shared printer in a network
B. Ensuring that system clock works correctly on server
C. Managing the access to system files in a laptop computers
D. Controlling the fuel injection system of an automobile engines
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
214. An operating system is a program or a group of programs that
A. Helps in checking the spelling of Word
B. Maintain the relationship in Database
C. Manages the resources of the Computer
D. Performs the calculations of cells in Excel
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
215. What is the function of an operating system?
A. Manages computer’s resources very efficiently
B. Takes care of scheduling jobs for execution
C. Manages the flow of data and instructions
D. All of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
216. Poor response time are usually caused by
A. Process busy
B. High I/I rates
C. High paging rate
D. Any of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
217. Where will store data first time when you copy
A. Clipboard
B. Clipbook
C. Hard disk
D. CD
Answer
Answer: Option A
Explanation : In clipboard first time data is store when copy.
218. GUI means
A. Graphic user interface
B. Geographic user interface
C. Graphical user interface
D. Geometric user interface
Answer
Answer: Option C
Explanation : The graphical user interface (GUI), is a type of user interface that allows users to interact with electronic devices through graphical icons and visual indicators such as secondary notation, instead of text-based user interfaces, typed command labels or text navigation.
219. Use of icons and windows are characteristics of ……. interface
A. Command driven
B. Windows orientated
C. Graphical user
D. Menu driven
Answer
Answer: Option C
Explanation : Use of icons and windows are characteristics of graphical user interface.
220. Windows can run
A. One application only
B. Two applications only
C. Four applications only
D. All of above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
221. You can switch from one program to another on the desktop by clicking within the desired program’s window or by clicking on its …… button
A. Icon
B. Taskbar button
C. Folder
D. None of above
Answer
Answer: Option B
Explanation : You can switch from one program to another on the desktop by clicking within the desired program’s window or by clicking on its “Taskbar button” button.
222. You can switch from one program to another by clicking within the desired program’s icon from the
A. Application icon on desktop
B. Application icon from taskbar
C. Folder
D. None of above
Answer
Answer: Option B
Explanation : You can switch from one program to another by clicking within the desired program’s icon from the Application icon from taskbar.
223. A tiny dot of light on the monitor is called
A. Silicon chip
B. Optical illusion
C. Icon
D. Pixel
Answer
Answer: Option D
Explanation : A pixel is a single point in a graphic image. Graphics monitors display pictures by dividing the display screen into thousands (or millions) of pixels, arranged in rows and columns. The pixels are so close together that they appear connected.
224. Virtual memory typically located on
A. RAM
B. CPU
C. Flash card
D. Hard drive
Answer
Answer: Option D
Explanation : Virtual memory typically located on Hard drive
225. What is contained in the page table?
A. Base address of each frame and corresponding page number
B. Memory address and corresponding page number
C. File name and corresponding page number
D. None of Above
Answer
Answer: Option A
Explanation : Base address of each frame and corresponding page number are contained in the page table.
226. Who is called a supervisor of computer activity?
A. Memory
B. Operating System
C. I / O Devices
D. Control Unit
Answer
Answer: Option B
Explanation : Operating System is called a supervisor of computer activity.
227. Operating System manages
A. Memory
B. Processor
C. I / O devices
D. All of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
228. Tree structure displays the
A. File only
B. Directory only
C. File and directory name
D. None of above
Answer
Answer: Option B
Explanation : Tree structure displays the Directory only.
229. To send email, we use
A. MS Excel
B. Outlook Explorer
C. HTML
D. Netscape Navigator
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
230. What does FAT stands for?
A. File attribute type
B. File allocation table
C. Format All Tabs settings
D. File for all type
Answer
Answer: Option B
Explanation : File Allocation Table (FAT) is a computer file system architecture and a family of industry-standard file systems utilizing it. The FAT file system is a continuing standard which borrows source code from the original, legacy file system and proves to be simple and robust. It offers useful performance even in lightweight implementations, but cannot deliver the same performance, reliability and scalability as some modern file systems. It is, however, supported for compatibility reasons by nearly all currently developed operating systems for personal computers and many mobile devices and embedded systems, and thus is a well-suited format for data exchange between computers and devices of almost any type and age from 1981 up to the present. Source : wikipedia.org
231. Which of the following concept is best to preventing page faults?
A. Paging
B. The working set
C. Hit ratios
D. Address location resolution
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
232. Fonts install from
A. Add from control panel
B. Font setup file
C. Font.exe file
D. All of above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
233. The operating feature that integrates the file created in different application into WebPages
A. Web integration
B. Internet integration
C. Intranet integration
D. Hypertext integration
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
234. Which is not concerned with control panel?
A. Printer
B. Run application
C. Font
D. Keyboard
Answer
Answer: Option B
Explanation : Run application is not concerned with control panel
235. Which icon would you access in the printer window to install a printer drive?
A. Add printer wizard
B. Setup
C. Install
D. None of above
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
236. Unicode standard is
A. Keyboard layout
B. Software
C. Font
D. Character encoding system
Answer
Answer: Option D
Explanation : Unicode is a computing industry standard for the consistent encoding, representation, and handling of text expressed in most of the world’s writing systems. The standard is maintained by the Unicode Consortium, and as of June 2018 the most recent version, Unicode 11.0, contains a repertoire of 137,439 characters covering 146 modern and historic scripts, as well as multiple symbol sets and emoji. The character repertoire of the Unicode Standard is synchronized with ISO/IEC 10646, and both are code-for-code identical. Source : wikipedia.org
237. Which of the following is the allocation method of a disk space?
A. Contiguous allocation
B. Linked allocation
C. Indexed allocation
D. All of the Above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
238. You can set the width taskbar area and different components in it
A. By right click and set width menu
B. If the taskbar is not yet locked
C. If the applications are not opened
D. If other toolbars are not enabled
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
239. A ….. is a windows component that is designed to store other components so these can be organized efficiently?
A. Document
B. Window
C. Folder
D. All of above
Answer
Answer: Option C
Explanation : A Folder is a windows component that is designed to store other components so these can be organized efficiently.
240. When you cut or copy the text or picture, it stores temporarily in the
A. File
B. Clipboard
C. Icon
D. All of above
Answer
Answer: Option B
Explanation : The clipboard is a data buffer used for short-term data storage and/or data transfer between documents or applications used by cut, copy and paste operations and provided by the operating system.
241. Windows 2000 server uses the
A. FAT 16
B. NTFS
C. FAT 64
D. FAT 32
Answer
Answer: Option B
Explanation : Windows 2000 server uses the NTFS (New Technology File System).
242. First-in-First-Out (FIFO) scheduling is
A. Non Preemptive Scheduling
B. Preemptive Scheduling
C. Fair Share Scheduling
D. Deadline Scheduling
Answer
Answer: Option A
Explanation : First-in-First-Out (FIFO) scheduling is “Non Preemptive Scheduling”.
243. Which one of the following key is used to refresh the active window?
A. F7
B. F8
C. F9
D. F5
Answer
Answer: Option D
Explanation : “F5” key is used to refresh the active window.
244. To display system boot menu which of the following key you must press?
A. F4
B. F7
C. F8
D. F5
Answer
Answer: Option C
Explanation : To display system boot menu F8 key you must press?
245. Press ____ key while booting to display Advanced Boot Menu
A. F5
B. F6
C. F8
D. Del
Answer
Answer: Option C
Explanation : Press F8 key while booting to display Advanced Boot Menu.
246. Which operating system does not support long file names?
A. OS/2
B. Windows 98
C. DOS 6.2
D. Windows NT
Answer
Answer: Option C
Explanation : DOS 6.2 operating system does not support long file names
247. Which operating system uses short file names?
A. Windows
B. Unix
C. DOS
D. All of above
Answer
Answer: Option C
Explanation : DOS operating system uses short file names
248. Bringing a page into memory only when it is needed, this mechanism is called
A. Deadlock
B. Page Fault
C. Dormant Paging
D. Demand Paging
Answer
Answer: Option D
Explanation : In computer operating systems, demand paging (as opposed to anticipatory paging) is a method of virtual memory management. In a system that uses demand paging, the operating system copies a disk page into physical memory only if an attempt is made to access it and that page is not already in memory
249. It is the default folder for many Windows Applications to save your file
A. My Document
B. My Pictures
C. Documents and Settings
D. My Computer
Answer
Answer: Option A
Explanation : My Document is the default folder for many Windows Applications to save your file.
250. The component of Windows that lets you to transfer contents from one document to another
A. Briefcase
B. Clipboard
C. Document
D. Boot
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
251. What do you mean by Memory Compaction?
A. Combine multiple equal memory holes into one big hole
B. Combine multiple small memory holes into one big hole
C. Divide big memory hole into small holes
D. Divide memory hole by 2
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
252. Desktop is a
A. Provides work space
B. Screen saver
C. Display program
D. Working with my document
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
253. Which of the following is not a system tool?
A. Scandisk
B. Drive space
C. Disk defragmenter
D. Doskey
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
254. Which of the following statement about directories is false?
A. Directories can exist inside directories
B. The root directory is always at the highest level
C. Directories cannot be renamed
D. Directories can be deleted
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
255. The program that is responsible for loading the operating system into RAM is called
A. BIOS
B. Bootstrap program
C. Device driver
D. Supervisor program
Answer
Answer: Option B
Explanation : A bootstrap is the program that initializes the operating system (OS) during startup. The term bootstrap or bootstrapping originated in the early 1950s. It referred to a bootstrap load button that was used to initiate a hardwired bootstrap program, or smaller program that executed a larger program such as the OS.
256. Which of the following key is used to move the pointer from one pane to next pane?
A. F3
B. F4
C. F5
D. F6
Answer
Answer: Option D
Explanation : F6 key is used to move the pointer from one pane to next pane
257. In a folder, which of the following key is used to rename the file or folder
A. F3
B. F4
C. F2
D. F7
Answer
Answer: Option C
Explanation : In a folder, “F2” key is used to rename the file or folder
258. A character that represents one or more unknown character is
A. Wildcard character
B. All file name
C. Extensions
D. None of above
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
259. Which of the following file format supports in Windows 7?
A. NTFS
B. BSD
C. EXT
D. All of the above
Answer
Answer: Option A
Explanation : NTFS file format supports in Windows 7
260. Anything you cut or copy on to the clipboard remains there until you
A. Change it
B. Clear
C. Exit windows
D. All of the above
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
261. Multi programming systems ……
A. Are easier to develop than single programming system
B. Execute each job faster
C. Execute more jobs in the same time period
D. Are used only by large mainframe computer
Answer
Answer: Option C
Explanation : Multi programming systems execute more jobs in the same time period
262. Netscape navigator is a
A. Browser
B. Compose
C. Editor
D. None of these
Answer
Answer: Option A
Explanation : Netscape navigator is a Browser.
The Netscape web browser is the general name for a series of web browsers formerly produced by Netscape Communications Corporation, a former subsidiary of AOL.
263. To print documents from Windows
A. File >> Print
B. Drag the document icon over your printers icon
C. Edit print
D. Both A and B
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
264. Which of the following appear in Windows menu bar?
A. Help
B. File
C. Edit
D. All of above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
265. The operating system allows the user to organize the computer’s contents in a hierarchical structure of directories that include all of the following except:
A. Files
B. Folders
C. Drives
D. System
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
266. Copying a process from memory to disk to allow space for other processes is Called
A. Swapping
B. Deadlock
C. Demand Paging
D. Page Fault
Answer
Answer: Option A
Explanation : Copying a process from memory to disk to allow space for other processes is called Swapping
267. Any files deleted in Windows goes into
A. Trash can
B. Recycle bin
C. Deleted Files
D. None of above
Answer
Answer: Option B
Explanation : Any files deleted in Windows goes into Recycle bin.
268. Which of the following is a disk compression tool?
A. Drive space
B. Scan disk
C. Defragmenter
D. None of the above
Answer
Answer: Option A
Explanation : Drive Space is a disk compression utility supplied with MS-DOS starting from version 6.0. The purpose of Drive Space is to increase the amount of data the user could store on disks, by transparently compressing and decompressing data on-the-fly. It is primarily intended for use with hard drives, but use for floppy disks is also supported.
269. What does Belady’s Anomaly related to?
A. Page Replacement Algorithm
B. Memory Management Algorithm
C. Deadlock Prevention Algorithm
D. Disk Scheduling Algorithm
Answer
Answer: Option A
Explanation : In computer storage, Belady’s Anomaly is the name given to the phenomenon where increasing the number of page frames results in an increase in the number of page faults for a given memory access pattern. This phenomenon is commonly experienced when using the First in First Out (FIFO) page replacement algorithm.
270. A ….. allows you to write on screen with a digital pen and convert that writing into characters that the PC can process
A. Monitor RS
B. Tablet PC
C. Database manager
D. Media Center
Answer
Answer: Option B
Explanation : A ‘Tablet PC’ allows you to write on screen with a digital pen and convert that writing into characters that the PC can process.
271. What should be the extension to execute files?
A. EXE
B. BAT
C. COM
D. All of the above
Answer
Answer: Option D
Explanation : EXE is a file extension for an executable file format. An executable is a file that contains a program – that is, a particular kind of file that is capable of being executed or run as a program in the computer.
272. Driver is
A. Hardware controller
B. Hardware and gain controller
C. Data controller
D. All of above
Answer
Answer: Option A
Explanation : A program that controls a device. Every device, whether it be a printer, disk drive, or keyboard, must have a driver program. Many drivers, such as the keyboard driver, come with the operating system. For other devices, you may need to load a new driver when you connect the device to your computer.
273. Part of the POST process is to ensure that the test of essential peripheral device coincides with the hardware configuration that stored in
A. ROM
B. The hard drive
C. CMOS
D. Cache Memory
Answer
Answer: Option C
Explanation : CMOS (complementary metal-oxide-semiconductor) is the term usually used to describe the small amount of memory on a computer motherboard that stores the BIOS settings.
274. The memory resident portion of operating system is called the
A. Registry
B. API
C. CMOS
D. Kernel
Answer
Answer: Option D
Explanation : The memory resident portion of operating system is called the Kernel.
275. System files allocated at
A. Boot area
B. FAT area
C. Data area
D. Directory
Answer
Answer: Option A
Explanation : System files allocated at Boot area
276. …… transforms one interface into other interface
A. Program
B. Software
C. Data
D. None
Answer
Answer: Option B
Explanation : Software transforms one interface into other interface
277. …….. interface consists of thing like program counter, register, interrupts and terminal
A. Hardware
B. Software
C. Data
D. None
Answer
Answer: Option A
Explanation : Hardware interface consists of thing like program counter, register, interrupts and terminal
278. Boot startup process
A. Loads system files to RAM
B. Checks the computer connections
C. Clean up the computer memory
D. Prepare the computer ready
Answer
Answer: Option A
Explanation : Boot startup process is Loads system files to RAM.
279. When you delete file, where it resides?
A. Briefcase
B. Recycle bin
C. CD
D. Desktop
Answer
Answer: Option B
Explanation : In computing, the Trash is temporary storage for files that have been deleted in a file manager by the user, but not yet permanently erased from the file system.
280. Which of the following command is used to switch between the window programs?
A. Alt+Tab
B. Alt+F4
C. Ctrl+Tab
D. None of the above
Answer
Answer: Option A
Explanation : Alt+Tab command is used to switch between the window programs
281. ……. show characteristics with both hardware and software
A. Operating system
B. Software
C. Data
D. None
Answer
Answer: Option A
Explanation : Operating system show characteristics with both hardware and software
282. To prevent the addition and deletion of files on a disk or tape we use
A. Format
B. Write protect
C. Create back up
D. None of above
Answer
Answer: Option B
Explanation : Write protection is the term used to denote the locking mechanism which prevents modification or deletion of data on a storage device. Write protection helps in the preventing accidental and intentional data modification and also helps protect against virus attacks.
283. During the boot process, the ….. looks for the system file
A. CD
B. BIOS
C. CPU
D. DVD
Answer
Answer: Option B
Explanation : During the boot process, the ‘BIOS’ looks for the system file
284. Which of the following resources must be protected by the operating system?
A. I/O
B. Memory
C. CPU
D. All of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
285. What are the two types of Semaphore?
A. Digital Semaphores and Binary Semaphores
B. Analog Semaphores and Octal Semaphores
C. Counting Semaphores and Binary Semaphores
D. Critical Semaphores and System Semaphores
Answer
Answer: Option C
Explanation : Semaphore is a simply a variable. This variable is used to solve critical section problem and to achieve process synchronization in the multi processing environment.
The two most common kinds of semaphores are counting semaphores and binary semaphores. Counting semaphore can take non-negative integer values and Binary semaphore can take the value 0 & 1. only.
286. Who is called a supervisor of computer activity?
A. CPU
B. OS
C. Control Unit
D. Application Program
Answer
Answer: Option B
Explanation : OS is called a supervisor of computer activity.
287. Font folder is located on
A. Program folder
B. Ms Word file
C. Control Panel folder
D. Desktop folder
Answer
Answer: Option C
Explanation : Font folder is located on ‘Control Panel folder’.
288. From where do you change mouse setting?
A. Setting >> mouse
B. Hardware setting
C. Control panel >> mouse
D. None of the above
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
289. Work group means
A. Computer in network
B. Individual user
C. Connection
D. All of the above
Answer
Answer: Option A
Explanation : Work group means Computer in network
290. The core of operating system is:
A. Unix
B. Kernel
C. Command.com
D. None of these
Answer
Answer: Option B
Explanation : The core of the operating system is Kernel.
291. Which of the following memory unit that processor can access more rapidly
A. Main Memory
B. Virtual Memory
C. Cache memory
D. Read Only Memory
Answer
Answer: Option C
Explanation : Cache memory unit that processor can access more rapidly.
292. Small pictures appear on the desktop
A. Windows
B. Icon
C. Button
D. None of above
Answer
Answer: Option B
Explanation : Small pictures appear on the desktop is called icon
293. A graphical user interface displays
A. Graphics
B. Text
C. Both of Above
D. None of Above
Answer
Answer: Option C
Explanation : A graphical user interface displays both Graphics and Text.
294. To change the screen saver you can go from
A. Control panel display
B. Right click in desktop and properties
C. Both of Above
D. None of These
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
295. You can add or remove program
A. Add / Remove program from control panel
B. Delete the shortcut icon from desktop
C. Both A and B
D. None of Above
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
296. Which of the following is a program group?
A. Word pad
B. Paint brush
C. Accessories
D. None of the above
Answer
Answer: Option C
Explanation : Accessories is a program group
297. A program in execution is called
A. A Paging
B. A Process
C. A virtual memory
D. A Demand Page
Answer
Answer: Option B
Explanation : A program in execution is called ‘A Process’
298. What is the default file extension created by notepad?
A. .doc
B. .html
C. .txt
D. .tif
Answer
Answer: Option C
Explanation : .txt is the default file extension created by notepad.
299. Which of the following is not the user file extension?
A. .ppt
B. .xls
C. .sys
D. .doc
Answer
Answer: Option C
Explanation : .sys is not the user file extension
300. Which of the following is the extension of WordPad?
A. .ppt
B. .xls
C. .rtf
D. None of above
Answer
Answer: Option C
Explanation : .rtf is the extension of WordPad
301. The ……. is a temporary storage area in memory where you can attach text or graphics information
A. Clipboard
B. Copyboard
C. Both a and b
D. None of above
Answer
Answer: Option A
Explanation : The Clipboard is a temporary storage area in memory where you can attach text or graphics information.
302. An embedded object might appear in a document as
A. Embedding
B. Linking
C. Both
D. None of above
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
303. When a computer is first turned on or restarted, a special type of absolute loader called
A. Compile and go loader
B. Boot loader
C. Bootstrap loader
D. Relating loader
Answer
Answer: Option C
Explanation : When a computer is first turned on or restarted, a special type of absolute loader called ‘Bootstrap loader’.
304. In which type of the following OS, the response time is very crucial.
A. Network Operating System
B. Real Time Operating System
C. Batch Operating System
D. Unix Operating System
Answer
Answer: Option B
Explanation : Real Time Operating System, the response time is very crucial.
305. Which of the following is a correct association between a vendor and an operating system
A. Redhat Linux
B. Microsoft Unix
C. AT ; T DOS
D. Novell Linux
Answer
Answer: Option A
Explanation : Redhat Linux is a correct association between a vendor and an operating system.
306. …… controls the way in which the computer system functions and provides a means by which users can interact with the computer
A. The platform
B. The operating system
C. Application software
D. The motherboard
Answer
Answer: Option B
Explanation : The operating system controls the way in which the computer system functions and provides a means by which users can interact with the computer.
307. Which one of the following is not a layer of operating system?
A. Kernel
B. Shell
C. Application program
D. Critical selection
Answer
Answer: Option D
Explanation : Critical selection is not a layer of the operating system
308. Which is not the function of the operating system?
A. Memory management
B. Disk management
C. Application management
D. Virus protection
Answer
Answer: Option D
Explanation : Virus protection is not the function of the operating system
309. Which of the key is used to close the active window?
A. Ctrl+F4
B. Ctrl+F5
C. Alt+F6
D. None of above
Answer
Answer: Option D
Explanation : Ctrl+W & Alt+F4 is used to close the active window.
310. The virtual memory is
A. An extremely large main memory
B. An extremely large secondary memory
C. An illusion of extremely large main memory
D. A type of memory used in super computer
Answer
Answer: Option C
Explanation : The virtual memory is an illusion of extremely large main memory
311. The shortcut key to open a task manager is:
A. Alt + F1
B. Alt + Ctrl + Delete
C. Alt + Tab
D. F1
Answer
Answer: Option B
Explanation : The shortcut key to open a task manager is “Alt + Ctrl + Delete”.
312. The windows feature is the ability of computer to automatically configure a new hardware component is that
A. Auto detect
B. Plug and play
C. Add remove hardware
D. None of above
Answer
Answer: Option B
Explanation : In computing, a plug and play device or computer bus, is one with a specification that facilitates the discovery of a hardware component in a system without the need for physical device configuration
313. Internet Explorer is
A. an Internet browser
B. provided by Windows OS
C. an access point for Word Wide Web
D. All of above
Answer
Answer: Option D
Explanation : Internet Explorer is a series of graphical web browsers developed by Microsoft and included in the Microsoft Windows line of operating systems, starting in 1995.
314. Which of the following is not a part of the control panel?
A. Date and time
B. My documents
C. Add or remove program
D. Display
Answer
Answer: Option B
Explanation : My documents is not a part of the control panel.
315. The …… provides information about hardware installation, configuration and hardware status
A. Device manager
B. Control panel
C. Add new hardware
D. Program manager
Answer
Answer: Option A
Explanation : The Device manager provides information about hardware installation, configuration and hardware status.
316. Which of the following is not a video file extension?
A. .avi
B. .wav
C. .mpeg
D. .mov
Answer
Answer: Option B
Explanation : .wav is not a video file extension
317. What is the extension of the font file?
A. .ttf
B. .mdb
C. .fft
D. .txt
Answer
Answer: Option A
Explanation : .ttf is the extension of the font file
318. Which is not executable file?
A. .com
B. .exe
C. .bat
D. .txt
Answer
Answer: Option D
Explanation : .txt is not executable file
319. To move to the beginning of a line of text, press the __________ key.
A. A
B. PgUp
C. Enter
D. Home
Answer
Answer: Option D
Explanation : To move to the beginning of a line of text, press the Home key.
320. When was MS Windows operating system introduced?
A. 1975
B. 1985
C. 1995
D. 2000
Answer
Answer: Option B
Explanation : Microsoft Windows is a group of several graphical operating system families, all of which are developed, marketed, and sold by Microsoft.
Microsoft introduced an operating environment named Windows on November 20, 1985, as a graphical operating system shell for MS-DOS in response to the growing interest in graphical user interfaces (GUIs). Source : wikipedia.org
321. The Storage-to-Storage instructions
A. have both their operands in the main store.
B. which perform an operation on a register operand and an operand which is located in the main store generally leaving the result in the register expect in the case of store operation when it is also
C. which perform indicated operations on two fast registers of the machine and have the result in one of the registers
D. all of the above
E. None of the above
Answer
Answer: Option A
Explanation : The Storage-to-Storage instructions have both their operands in the main store.
322. First operating system was developed in
A. 1958
B. 1976
C. 1956
D. 1946
Answer
Answer: Option C
Explanation : The first operating system used for real work was GM-NAA I/O, produced in 1956 by General Motors’ Research division for its IBM 704.
323. The LRU algorithm
A. pages out pages that have been used recently
B. pages out pages that have not been used recently
C. pages out pages that have been least used recently
D. pages out the first page in a given area
E. None of the above
Answer
Answer: Option C
Explanation : In a computer operating system that uses paging for virtual memory management, page replacement algorithms decide which memory pages to page out, sometimes called swap out, or write to disk, when a page of memory needs to be allocated.
324. Which of the following systems software does the job of merging the records from two files into one?
A. Security software
B. Utility program
C. Networking software
D. Documentation system
E. None of the above
Answer
Answer: Option B
Explanation : Utility program systems software does the job of merging the records from two files into one
325. The maximum length of any single path from the root directory?
A. 54
B. 63
C. 80
D. 27
Answer
Answer: Option B
Explanation : The maximum length of any single path from the root directory is 63.
326. The part of machine level instruction, which tells the central processor what has to be done, is
A. Operation code
B. Address
C. Locator
D. Flip-Flop
E. None of the above
Answer
Answer: Option A
Explanation : The part of machine level instruction, which tells the central processor what has to be done, is Operation code
327. Fork is
A. the dispatching of a task
B. the creation of a new job
C. the creation of a new process
D. increasing the priority of a task
E. None of the above
Answer
Answer: Option C
Explanation : In computing, particularly in the context of the Unix operating system and its workalikes, fork is an operation whereby a process creates a copy of itself. It is usually a system call, implemented in the kernel. Fork is the primary method of process creation on Unix-like operating systems.
328. Which of the following refers to the associative memory?
A. the address of the data is generated by the CPU
B. the address of the data is supplied by the users
C. there is no need for an address i.e. the data is used as an address
D. the data are accessed sequentially
E. None of the above
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
329. To avoid the race condition, the number of processes that may be simultaneously inside their critical section is
A. 8
B. 1
C. 16
D. 0
E. None of the above
Answer
Answer: Option B
Explanation : To avoid the race condition, the number of processes that may be simultaneously inside their critical section is 1.
330. Thrashing
A. is a natural consequence of virtual memory systems
B. can always be avoided by swapping
C. always occurs on large computers
D. can be caused by poor paging algorithms
E. None of the above
Answer
Answer: Option D
Explanation : In computer science, thrashing occurs when a computer’s virtual memory resources become saturated, leading to a constant state of paging, to the exclusion of most application-level processing. This causes the performance of the computer to degrade or collapse. Source : wikipedia.org
331. Supervisor state is
A. never used
B. entered by programs when they enter the processor
C. required to perform any I/O
D. only allowed to the operating system
E. None of the above
Answer
Answer: Option D
Explanation : The supervisor state is a special mode of operation to which the user has no access. When it is in the supervisor state, the processor and its actions are entirely controled by the Operating System (OS).
332. Which of the following instruction steps, would be written within the diamond-shaped box, of a flowchart?
A. S = B – C
B. IS A<10
C. PRINT A
D. DATA X4Z
E. None of the above
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
333. Which of the following statements is false?
A. the technique of storage compaction involves moving all occupied areas of storage to one end or other of main storage
B. compaction does not involve relocation of programs
C. compaction is also know as garbage collection
D. the system must stop everything while it performs the compaction
E. None of the above
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
334. Interprocess communication
A. is required for all processes
B. is usually done via disk drives
C. is never necessary
D. allows processes to synchronize activity
E. None of the above
Answer
Answer: Option D
Explanation : Interprocess communication allows processes to synchronize activity
335. Which of the following functions is(are) performed by the loader
A. allocate space in memory for the programs and resolve symbolic references between object decks
B. adjust all address dependent locations such as address constants to correspond to the allocated space.
C. physically place the machine instructions and data into memory.
D. All of the above
E. None of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
336. A system program that combines the separately compiled modules of a program into a form suitable for execution
A. assembler
B. linking loader
C. cross compiler
D. load and go
E. None of the above
Answer
Answer: Option B
Explanation : A system program that combines the separately compiled modules of a program into a form suitable for execution is linking loader.
337. Process is
A. program in High level language kept on disk
B. contents of main memory
C. a program in execution
D. a job in secondary memory
E. None of the above
Answer
Answer: Option C
Explanation : Process is a program in execution.
338. Addressing structure
A. defines the fundamental method of determining effective operand addresses
B. are variations in the use of fundamental addressing structures or some associated actions which are related to addressing.
C. performs indicated operations on two fast registers of the machine and leave the result in one of the registers.
D. all of the above
E. None of the above
Answer
Answer: Option A
Explanation : Addressing structure is defines the fundamental method of determining effective operand addresses.
339. The Memory Buffer Register (MBR)
A. is a hardware memory device which denotes the location of the current instruction being executed.
B. is a group of electrical circuits (hardware) that performs the intent of instructions fetched from memory.
C. contains the address of the memory location that is to be read from or stored into.
D. contains a copy of the designated memory location specified by the MAR after a “read” or the new contents of the memory prior to a “write”.
E. None of the above
Answer
Answer: Option D
Explanation : The Memory Buffer Register (MBR) contains a copy of the designated memory location specified by the MAR after a “read” or the new contents of the memory prior to a “write”.
340. The strategy of allowing processes that are logically runnable to be temporarily suspended is called
A. preemptive scheduling
B. non preemptive scheduling
C. shortest job first
D. first come first served
E. None of the above
Answer
Answer: Option A
Explanation : The strategy of allowing processes that are logically runnable to be temporarily suspended is called preemptive scheduling.
341. A system program that sets up an executable program in main memory ready for execution is
A. assembler
B. linker
C. loader
D. compiler
E. None of the above
Answer
Answer: Option C
Explanation : A system program that sets up an executable program in main memory ready for execution is loader
342. Which of the following are loaded into main memory when the computer is booted?
A. internal command instructions
B. external command instructions
C. utility programs
D. word processing instructions
E. None of the above
Answer
Answer: Option A
Explanation : Internal command instructions are loaded into main memory when the computer is booted
343. The FIFO algorithm
A. executes first the job that last entered the queue
B. executes first the job that first entered the queue
C. execute first the job that has been in the queue the longest
D. executes first the job with the least processor needs
E. None of the above
Answer
Answer: Option B
Explanation : The simplest page-replacement algorithm is a FIFO algorithm. The first-in, first-out (FIFO) page replacement algorithm is a low-overhead algorithm that requires little bookkeeping on the part of the operating system. In simple words, on a page fault, the frame that has been in memory the longest is replaced.
344. What is the name given to the organized collection of software that controls the overall operation of a computer?
A. Working system
B. Peripheral system
C. Operating system
D. Controlling system
E. None of the above
Answer
Answer: Option C
Explanation : Operating system is the organized collection of software that controls the overall operation of a computer.
345. The principle of locality of reference justifies the use of
A. reenterable
B. non reusable
C. virtual memory
D. cache memory
E. None of the above
Answer
Answer: Option D
Explanation : The principle of locality of reference justifies the use of cache memory
346. User-Friendly Systems are:
A. required for object-oriented programming
B. easy to develop
C. common among traditional mainframe operating systems
D. becoming more common
E. None of the above
Answer
Answer: Option D
Explanation : User-Friendly Systems are becoming more common
347. Which of the following addressing modes, facilitates access to an operand whose location is defined relative to the beginning of the data structure in which it appears?
A. ascending
B. sorting
C. index
D. indirect
E. None of the above
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
348. While running DOS on a PC, which command would be used to duplicate the entire diskette?
A. COPY
B. DISKCOPY
C. CHKDSK
D. TYPE
E. None of the above
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
349. Memory
A. is a device that performs a sequence of operations specified by instructions in memory.
B. is the device where information is stored
C. is a sequence of instructions
D. is typically characterized by interactive processing and time-slicing of the CPU
E. None of the above
Answer
Answer: Option B
Explanation : Memory is the device where information is stored.
350. Which of the following rules out the use of GO TO?
A. Flowchart
B. HIPO-DIAGRAMS
C. Nassi-Shneiderman diagram
D. All of the above
E. None of the above
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
351. The register or main memory location which contains the effective address of the operand is known as
A. pointer
B. indexed register
C. special location
D. scratch pad
E. None of the above
Answer
Answer: Option A
Explanation : The register or main memory location which contains the effective address of the operand is known as pointer.
352. Assembly code data base is associated with
A. assembly language version of the program which is created by the code generation phase and is input to the assembly phase.
B. a permanent table of decision rules in the form of patterns for matching with the uniform symbol table to discover syntactic structure.
C. consists of a full or partial list or the token
D. a permanent table which lists all key words and special symbols of the language in symbolic form.
E. None of the above
Answer
Answer: Option A
Explanation : Assembly code data base is associated with the assembly language version of the program which is created by the code generation phase and is input to the assembly phase.
353. Thrashing can be avoided if
A. the pages belonging to the working set of the programs are in main memory
B. the speed of CPU is increased
C. the speed of I/O processor is increased
D. all of the above
E. None of the above
Answer
Answer: Option A
Explanation : Thrashing can be avoided if the pages, belonging to the working set of the programs, are in main memory.
354. In analyzing the compilation of PL/I program, the term “Lexical analysis” is associated with
A. recognition of basic syntactic constructs through reductions.
B. recognition of basic elements and creation of uniform symbols
C. creation of more optional matrix.
D. use of macro processor to produce more optimal assembly code
E. None of the above
Answer
Answer: Option B
Explanation : In analyzing the compilation of PL/I program, the term “Lexical analysis” is associated with recognition of basic elements and creation of uniform symbols.
355. Resolution of externally defined symbols is performed by
A. Linker
B. Loader
C. Compiler
D. Assembler
E. None of the above
Answer
Answer: Option A
Explanation : Resolution of externally defined symbols is performed by Linker
356. System generation:
A. is always quite simple
B. is always very difficult
C. varies in difficulty between systems
D. requires extensive tools to be understandable
E. None of the above
Answer
Answer: Option C
Explanation : System generation varies in difficulty between systems
357. The Memory Address Register
A. is a hardware memory device which denotes the location of the current instruction being executed.
B. is a group of electrical circuits (hardware) that performs the intent of instructions fetched from memory.
C. contains the address of the memory location that is to be read from or stored into.
D. contains a copy of the designated memory location specified by the MAR after a “read” or the new contents of the memory prior to a “write”.
E. None of the above
Answer
Answer: Option C
Explanation : The Memory Address Register contains the address of the memory location that is to be read from or stored into.
358. Which of the following are(is) Language Processor(s)
A. assembles
B. compilers
C. interpreters
D. All of the above
E. None of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
359. In virtual memory systems, Dynamic address translation
A. is the hardware necessary to implement paging
B. stores pages at a specific location on disk
C. is useless when swapping is used
D. is part of the operating system paging algorithm
E. None of the above
Answer
Answer: Option A
Explanation : In virtual memory systems, Dynamic address translation is the hardware necessary to implement paging
360. Fragmentation of the file system
A. occurs only if the file system is used improperly
B. can always be prevented
C. can be temporarily removed by compaction
D. is a characteristic of all file systems
E. None of the above
Answer
Answer: Option C
Explanation : Fragmentation of the file system can be temporarily removed by compaction
361. In which addressing mode the effective address of the operand is the contents of a register specified in the instruction and after accessing the operand, the contents of this register is incremented to point to the next item in the list?
A. index addressing
B. indirect addressing
C. auto increment
D. auto decrement
E. None of the above
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
362. The memory allocation scheme subject to “external” fragmentation is
A. segmentation
B. swapping
C. pure demand paging
D. multiple contiguous fixed partitions
E. None of the above
Answer
Answer: Option A
Explanation : The memory allocation scheme subject to “external” fragmentation is segmentation.
363. While working with MS-DOS, which command will you use to transfer a specific file from one disk to another?
A. DISKCOPY
B. COPY
C. RENAME
D. FORMAT
E. None of the above
Answer
Answer: Option B
Explanation : Working with MS-DOS, ‘COPY’ command will you use to transfer a specific file from one disk to another?
364. A non-relocatable program is one which
A. can not be made to execute in any area of storage other than the one designated for it at the time of its coding or translation.
B. consists of a program and relevant information for its relocation.
C. can itself performs the relocation of its address-sensitive portions.
D. all of the above
E. None of the above
Answer
Answer: Option A
Explanation : A non-relocatable program is one which can not be made to execute in any area of storage other than the one designated for it at the time of its coding or translation.
365. What is the name of the operating system for the laptop computer called MacLite?
A. Windows
B. DOS
C. MS-DOS
D. OZ
E. None of the above
Answer
Answer: Option D
Explanation : OZ operating system for the laptop computer called MacLite.
366. Memory management is :
A. not used in modern operating system
B. replaced with virtual memory on current systems
C. not used on multiprogramming systems
D. critical for even the simplest operating systems
E. None of the above
Answer
Answer: Option D
Explanation : Memory management is critical for even the simplest operating systems
367. The initial value of the semaphore that allows only one of the many processes to enter their critical sections, is
A. 8
B. 1
C. 16
D. 0
E. None of the above
Answer
Answer: Option B
Explanation : The initial value of the semaphore that allows only one of the many processes to enter their critical sections, is 1.
368. The Register – to – Register (RR) instructions
A. have both their operands in the main store.
B. which perform an operation on a register operand and an operand which is located in the main store generally leaving the result in the register except in the case of store operation when it is also
C. which perform indicated operations on two fast registers of the machine and leave the result in one of the registers.
D. all of the above
E. None of the above
Answer
Answer: Option C
Explanation : The Register – to – Register (RR) instructions which perform indicated operations on two fast registers of the machine and leave the result in one of the registers.
369. A page fault
A. is an error is a specific page
B. occurs when a program accesses a page of memory
C. is an access to a page not currently in memory
D. is a reference to a page belonging to another program
E. None of the above
Answer
Answer: Option C
Explanation : A page fault (sometimes called #PF, PF or hard fault) is a type of exception raised by computer hardware when a running program accesses a memory page that is not currently mapped by the memory management unit (MMU) into the virtual address space of a process.
370. An algorithm is best described as
A. A computer language
B. A step by step procedure for solving a problem
C. A branch of mathematics
D. All of the above
E. None of the above
Answer
Answer: Option B
Explanation : An algorithm is best described as a step by step procedure for solving a problem
371. In which addressing mode the contents of a register specified in the instruction are first decremented, and then these contents are used as the effective address of the operands?
A. index addressing
B. indirect addressing
C. auto increment
D. auto decrement
E. None of the above
Answer
Answer: Option D
Explanation : Auto decrement mode the contents of a register specified in the instruction are first decremented, and then these contents are used as the effective address of the operands
372. What is the name given to the values that are automatically provided by software to reduce keystrokes and improve a computer user’s productivity?
A. Defined values
B. Fixed values
C. Default values
D. Special values
E. None of the above
Answer
Answer: Option C
Explanation : Default values are automatically provided by software to reduce keystrokes and improve a computer user’s productivity.
373. Page stealing
A. is a sign of an efficient system
B. is taking page frames from other working sets
C. should be the tuning goal
D. is taking larger disk spaces for pages paged out
E. None of the above
Answer
Answer: Option B
Explanation : Page stealing is taking page frames from other working sets
374. In MS-DOS 5.0, which is the number that acts as a code to uniquely identify the software product?
A. MS
B. DOS
C. MS DOS
D. 5
E. None of the above
Answer
Answer: Option D
Explanation : In MS-DOS 5.0, 5 is the number that acts as a code to uniquely identify the software product?
375. Bug means
A. A logical error in a program
B. A difficult syntax error in a program
C. Documenting programs using an efficient documentation tool
D. All of the above
E. None of the above
Answer
Answer: Option A
Explanation : A software bug is an error, flaw, failure or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways.
376. The process of transferring data intended for a peripheral device into a disk (or intermediate store) so that it can be transferred to peripheral at a more convenient time or in bulk, is known as
A. multiprogramming
B. spooling
C. caching
D. virtual programming
E. None of the above
Answer
Answer: Option B
Explanation : The process of transferring data intended for a peripheral device into a disk (or intermediate store) so that it can be transferred to peripheral at a more convenient time or in bulk, is known as ‘spooling’.
377. Block caches or buffer caches are used
A. to improve disk performance
B. to handle interrupts
C. to increase the capacity of the main memory
D. to speed up main memory read operation
E. None of the above
Answer
Answer: Option A
Explanation : Block caches or buffer caches are used to improve disk performance
378. Which of the following statements is false?
A. a small page size causes large page tables
B. internal fragmentation is increased with small pages
C. a large page size causes instructions and data that will not be referenced brought into primary storage
D. I/O transfers are more efficient with large pages
E. None of the above
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
379. The action of parsing the source program into the proper syntactic classes is known as
A. syntax analysis
B. lexical analysis
C. interpretation analysis
D. general syntax analysis
E. None of the above
Answer
Answer: Option B
Explanation : The action of parsing the source program into the proper syntactic classes is known as lexical analysis
380. Which, of the following is not true about the description of a decision table?
A. A decision table is easy to modify
B. A decision table is directly understood by the computer
C. A decision table is easy to understand
D. All of the above
E. None of the above
Answer
Answer: Option B
Explanation : A decision table is directly understood by the computer is not true about the description of a decision table
381. Trojan-Horse programs
A. are legitimate programs that allow unauthorized access
B. do not usually work
C. are hidden programs that do not show up on the system
D. usually are immediately discovered
E. None of the above
Answer
Answer: Option A
Explanation : Trojan-Horse programs are legitimate programs that allow unauthorized access
382. When did IBM release the first version of disk operating system DOS version 1.0?
A. 1981
B. 1982
C. 1983
D. 1984
E. None of the above
Answer
Answer: Option A
Explanation : In 1981 IBM release the first version of disk operating system DOS version 1.0.
383. Which of the following is false about disk when compared to main memory?
A. non-volatile
B. longer storage capacity
C. lower price per bit
D. faster
E. None of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
384. Producer consumer problem can be solved using
A. semaphores
B. event counters
C. monitors
D. all of the above
E. None of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
385. Most of the microcomputer’s operating systems like Apple DOS, MS DOS and PC DOS etc. are called disk operating systems because
A. they are memory resident
B. they are initially stored on disk
C. they are available on magnetic tapes
D. they are partly in primary memory and partly on disk
E. None of the above
Answer
Answer: Option B
Explanation : Microcomputer’s operating systems like Apple DOS, MS DOS and PC DOS etc. are called disk operating systems because they are initially stored on disk
386. The CPU, after receiving an interrupt from an I/O device
A. halts for a predetermined time
B. hands over control of address bus and data bus to the interrupting device
C. branches off to the interrupt service routine immediately
D. branches off to the interrupt service routine after completion of the current instruction
E. None of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
387. Seeks analysis
A. is used for analyzing paging problems
B. is used for analyzing device busy problems
C. is used for analyzing control-unit busy problems
D. is only shown on real-time displays
E. None of the above
Answer
Answer: Option B
Explanation : Seeks analysis is used for analyzing device busy problems
388. Which is a permanent database in the general model of the compiler?
A. Literal Table
B. Identifier Table
C. Terminal Table
D. Source code
E. None of the above
Answer
Answer: Option C
Explanation : Terminal Table is a permanent database in the general model of the compiler
389. What is the name of the technique in which the operating system of a computer executes several programs concurrently by switching back and forth between them?
A. Partitioning
B. Multitasking
C. Windowing
D. Paging
E. None of the above
Answer
Answer: Option B
Explanation : In Multitasking the operating system of a computer executes several programs concurrently by switching back and forth between them.
390. Operating system
A. links a program with the subroutines it references
B. provides a layered user-friendly interface
C. enables the programmer to draw a flowchart
D. all of the above
E. None of the above
Answer
Answer: Option B
Explanation : Operating system provides a layered, user-friendly interface
391. Which table is a permanent database that has an entry for each terminal symbol.
A. Terminal table
B. Literal table
C. Identifier table
D. Reductions
E. None of the above
Answer
Answer: Option A
Explanation : Terminal table is a permanent database that has an entry for each terminal symbol.
392. The function(s) of the Syntax phase is(are)
A. to recognize the major constructs of the language and to call the appropriate action routines that will generate the intermediate form or matrix for these constructs.
B. to build a literal table and an identifier table
C. to build a uniform symbol table
D. to parse the source program into the basic elements or tokens of the language.
E. None of the above
Answer
Answer: Option A
Explanation : The functions of the Syntax phase are to recognize the major constructs of the language and to call the appropriate action routines that will generate the intermediate form or matrix for these constructs.
393. Swapping
A. works best with many small partitions
B. allows many programs to use memory simultaneously
C. allows each program in turn to use the memory
D. does not work with overlaying
E. None of the above
Answer
Answer: Option C
Explanation : Swapping is allows each program in turn to use the memory
394. A disk scheduling algorithm in an operating system causes the disk arm to move back and forth across the disk surface in order to service all requests in its path. This is a
A. First come first served
B. Shortest Seek Time First (SSTE)
C. Scan
D. FIFO
E. None of the above
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
395. A translator is best described as
A. an application software
B. a system software
C. a hardware component
D. all of the above
E. None of the above
Answer
Answer: Option B
Explanation : A translator is best described as a system software
396. Software that measures, monitors, analyzes, and controls real-world events is called:
A. system software
B. real-time software
C. scientific software
D. business software
E. None of the above
Answer
Answer: Option B
Explanation : Software that measures, monitors, analyzes, and controls real-world events is called real-time software
397. The details of all external symbols and relocation formation (relocation list or map) is provided to linker by
A. Macro processor
B. Translator
C. Loader
D. Editor
E. None of the above
Answer
Answer: Option B
Explanation : The details of all external symbols and relocation formation (relocation list or map) is provided to linker by Translator
398. The macro processor must perform
A. recognize macro definitions and macro calls
B. save the macro definitions
C. expand macros calls and substitute arguments
D. all of the above
E. None of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
399. A development strategy whereby the executive control modules of a system are coded and tested first, is known as
A. Bottom-up development
B. Top-down development
C. Left-Right development
D. All of the above
E. None of the above
Answer
Answer: Option B
Explanation : A development strategy whereby the executive control modules of a system are coded and tested first, is known as Top-down development.
400. Which of the following is helpful in evaluating applications software what will best suit your needs?
A. recommendations by other users
B. computer magazines
C. objective software reviews
D. all of the above
E. None of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
401. What problem is solved by Dijkstra’s banker’s algorithm?
A. mutual exclusion
B. deadlock recovery
C. deadlock avoidance
D. cache coherence
E. None of the above
Answer
Answer: Option C
Explanation : Deadlock avoidance problem is solved by Dijkstra’s banker’s algorithm
402. The dispatcher
A. actually schedules the tasks into the processor
B. puts tasks in I/O wait
C. is always small and simple
D. never changes task priorities
E. None of the above
Answer
Answer: Option A
Explanation : The dispatcher actually schedules the tasks into the processor.
403. System programs such as Compilers are designed so that they are
A. reenterable
B. non reusable
C. serially usable
D. recursive
E. None of the above
Answer
Answer: Option A
Explanation : System programs such as Compilers are designed so that they are reenterable
404. IBM released its first PC in 1981. Can you name the operating system which was most popular at that time?
A. MS-DOS
B. PC-DOS
C. OS/360
D. CP/M
E. None of the above
Answer
Answer: Option D
Explanation : CP/M, originally standing for Control Program/Monitor and later Control Program for Microcomputers, is a mass-market operating system created for Intel 8080/85-based microcomputers by Gary Kildall of Digital Research, Inc. Initially confined to single-tasking on 8-bit processors and no more than 64 kilobytes of memory, later versions of CP/M added multi-user variations and were migrated to 16-bit processors. CP/M was displaced by DOS soon after the 1981 introduction of the IBM PC.
405. If the number of bits in a virtual address of a program is 16 and the page size is 0.5 K bytes, the number of pages in the virtual address space is
A. 16
B. 32
C. 64
D. 128
E. None of the above
Answer
Answer: Option D
Explanation : If the number of bits in a virtual address of a program is 16 and the page size is 0.5 K bytes, the number of pages in the virtual address space is 128.
406. Data encryption
A. is mostly used by public networks
B. is mostly used by financial networks
C. cannot be used by private installations
D. is not necessary since data cannot be intercepted
E. None of the above
Answer
Answer: Option B
Explanation : Data encryption is mostly used by financial networks
Data encryption translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it. Encrypted data is commonly referred to as ciphertext, while unencrypted data is called plaintext.
407. What is the name given to the process of initializing a microcomputer with its operating system?
A. Cold booting
B. Booting
C. Warm booting
D. Boot recording
E. None of the above
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
408. The function(s) of the Storage Assignment is (are)
A. to assign storage to all variables referenced in the source program.
B. to assign storage to all temporary locations that are necessary for intermediate results.
C. to assign storage to literals and to ensure that the storage is allocate and appropriate locations are initialized.
D. all of the above
E. None of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
409. A Processor
A. is a device that performs a sequence of operations specified by instructions in memory.
B. is the device where information is stored
C. is a sequence of instructions
D. is typically characterized by interactive processing and time of the CPU
E. None of the above
Answer
Answer: Option A
Explanation : A Processor is a device that performs a sequence of operations specified by instructions in memory.
410. With MS-DOS which command will divide the surface of the blank floppy disk into sectors and assign a unique address to each one?
A. FORMAT command
B. FAT command
C. VER command
D. CHKDSK command
E. None of the above
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
411. Multiprogramming
A. is a method of memory allocation by which the program is subdivided into equal portions or pages and core is subdivided into equal portions or blocks.
B. consists of those addresses that may be generated by a processor during execution of a computation.
C. is a method of allocating processor time.
D. allows multiple programs to reside in separate areas of core at the time.
E. None of the above
Answer
Answer: Option D
Explanation : Multiprogramming allows multiple programs to reside in separate areas of core at the time.
412. A translator which reads an entire programme written in a high level language and converts it into machine language code is:
A. assembler
B. translator
C. compiler
D. system software
E. None of the above
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
413. The advantage(s) inherent to using high level languages is (are)
A. Fewer people less management and shorter transition in learning time
B. Improved debugging capability and superior documentation
C. A greater degree of machine independence
D. All of the above
E. None of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
414. Addressing modes
A. defines the fundamental method of determining effective operand addresses
B. are variations in the use of fundamental addressing structures or some associated actions which are related to addressing.
C. performs indicated operations on two fast registers of the machine and leave the result in one of the registers.
D. all of the above
E. None of the above
Answer
Answer: Option B
Explanation : Addressing modes are variations in the use of fundamental addressing structures, or some associated actions which are related to addressing.
415. In which way(s) a macro processor for assembly language can be implemented:
A. independent two-pass processor
B. independent one-pass processor
C. processor incorporated into pass 1 of a standard two-pass assembler
D. all of the above
E. None of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
416. Which of the following is a type of systems software used on microcomputers?
A. MS-DOS
B. PC-DOS
C. Unix
D. All of the above
E. None of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
417. The working set theory of programming behaviour of processes running within an operating system involves
A. the collection of pages that a process accesses
B. disk scheduling mechanisms
C. coalescing holes in memory
D. assigning the CPU to processes
E. None of the above
Answer
Answer: Option A
Explanation : The working set theory of programming behaviour of processes running within an operating system involves the collection of pages that a process accesses
418. Operating system is
A. A collection of hardware components
B. A collection of input-output devices
C. A collection of software routines
D. All of the above
E. None of the above
Answer
Answer: Option C
Explanation : Operating system is a collection of software routines
419. A file organization component of a VSAM file is:
A. relative record data set
B. keyed sequential data set
C. entry sequential data set
D. all of the above
E. None of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
420. What is the name given to the software which can be legally compiled and often used for free?
A. Shareware program
B. Public domain program
C. Firmware program
D. Mindware
E. None of the above
Answer
Answer: Option B
Explanation : Public-domain software (program) refers to any program that is not copyrighted. Public-domain software (program) is free and can be used without restrictions. The term public-domain software is often used incorrectly to include freeware, free software that is nevertheless copyrighted.
421. The SJF algorithm executes first the job
A. that last entered the queue
B. that first entered the queue
C. that has been in the queue the longest
D. with the least processor needs
E. None of the above
Answer
Answer: Option D
Explanation : The shortest job first (SJF) or shortest job next, is a scheduling policy that selects the waiting process with the smallest execution time to execute next.
422. In which of the storage placement strategies a program is placed in the largest available hole in the main memory?
A. best fit
B. first fit
C. worst fit
D. buddy
E. None of the above
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
423. Which of the following is a block device
A. mouse
B. printer
C. terminals
D. disk
E. None of the above
Answer
Answer: Option D
Explanation : A block device is a computer data storage device that supports reading and (optionally) writing data in fixed-size blocks, sectors, or clusters. These blocks are generally 512 bytes or a multiple thereof in size.
424. The problem of thrashing is affected significantly by:
A. program structure
B. program size
C. primary-storage size
D. all of the above
E. None of the above
Answer
Answer: Option A
Explanation : The problem of thrashing is affected significantly by program structure
425. Which of the following software types is used to simplify using systems software?
A. spreadsheet
B. operating environment
C. timesharing
D. multitasking
E. None of the above
Answer
Answer: Option C
Explanation : In computing, time-sharing is the sharing of a computing resource among many users by means of multiprogramming and multi-tasking at the same time. Its introduction in the 1960s and emergence as the prominent model of computing in the 1970s represented a major technological shift in the history of computing.
426. Advantage(s) of using assembly language rather than machine language is (are):
A. It is mnemonic and easy to read.
B. Addresses any symbolic not absolute
C. Introduction of data to program is easier
D. all of the above
E. None of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
427. Which of the following is not true about the memory management?
A. virtual memory is used only in multi-user systems
B. segmentation suffers from external fragmentation
C. paging suffers from internal fragmentation
D. segmented memory can be paged
E. None of the above
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
428. Job Control Language (JCL) statements are used to
A. Read the input from the slow-speed card reader to the high-speed magnetic disk
B. Specify to the operating system the beginning and end of a job in a batch
C. Allocate the CPU to a job
D. All of the above
E. None of the above
Answer
Answer: Option B
Explanation : JCL (job control language) is a language for describing jobs (units of work) to the MVS, OS/390, and VSE operating systems, which run on IBM’s S/390 large server (mainframe) computers. These operating systems allocate their time and space resources among the total number of jobs that have been started in the computer.
429. Paging
A. is a method of memory allocation by which the program is subdivided into equal portions or pages and core is subdivided into equal portions or blocks.
B. consists of those addresses that may be generated by a processor during execution of a computation.
C. is a method of allocating processor time.
D. allows multiple programs to reside in separate areas of core at the time.
E. None of the above
Answer
Answer: Option A
Explanation : In computer operating systems, paging is a memory management scheme by which a computer stores and retrieves data from secondary storage for use in main memory. In this scheme, the operating system retrieves data from secondary storage in same-size blocks called pages. Paging is an important part of virtual memory implementations in modern operating systems, using secondary storage to let programs exceed the size of available physical memory.
430. Which of the following is not true about documentation?
A. Documentation of a system should be as clear and direct as possible
B. Documentation increases the maintenance time and cost
C. Documentation gives better understanding of the problem
D. All of the above
E. None of the above
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
431. The system/370 assembler language
A. allows the programmer to write base registers and displacements explicitly in the source program.
B. is used to remember which of the general-purpose registers are currently available as base registers and what base addresses they contain.
C. allows multiple programs to reside in separate areas of core at the same time.
D. is a term that refers to the control programs of an operating system.
E. None of the above
Answer
Answer: Option A
Explanation : The system/370 assembler language allows the programmer to write base registers and displacements explicitly in the source program.
432. Scheduling is
A. allowing jobs to use the processor
B. unrelated to performance consideration
C. not required in uniprocessor systems
D. the same regard-less of the purpose of the system
E. None of the above
Answer
Answer: Option A
Explanation : The process scheduling is the activity of the process manager that handles the removal of the running process from the CPU and the selection of another process on the basis of a particular strategy. Process scheduling is an essential part of Multiprogramming operating systems.
433. What scheduling algorithm allows processes that are logical runnable to be temporarily suspended?
A. preemptive scheduling
B. non-preemptive scheduling
C. FIFO
D. FCFS
E. None of the above
Answer
Answer: Option A
Explanation : Preemptive Scheduling: A scheduling discipline is preemptive if, once a process has been given the CPU can taken away. The strategy of allowing processes that are logically runable to be temporarily suspended is called Preemptive Scheduling and it is contrast to the “run to completion” method.
434. In an absolute loading scheme, which loader function is accomplished by the loader
A. Reallocation
B. Allocation
C. Linking
D. Loading
E. None of the above
Answer
Answer: Option D
Explanation : In an absolute loading scheme, Loading function is accomplished by the loader
435. The computational technique used to compute the disk storage address of individual records is called:
A. bubble memory
B. key fielding
C. dynamic reallocation
D. hashing
E. None of the above
Answer
Answer: Option D
Explanation : The computational technique used to compute the disk storage address of individual records is called hashing.
436. For how many processes which are sharing common data, the Dekker’s algorithm implements mutual exclusion?
A. 1
B. 2
C. 3
D. 4
E. None of the above
Answer
Answer: Option B
Explanation : Dekker’s algorithm is the first known correct solution to the mutual exclusion problem in concurrent programming. The solution is attributed to Dutch mathematician Th. J. Dekker by Edsger W. Dijkstra in an unpublished paper on sequential process descriptions and his manuscript on cooperating sequential processes.
437. The file structure that redefines its first record at a base of zero uses the term:
A. relative organization
B. key fielding
C. dynamic reallocation
D. hashing
E. None of the above
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
438. What is the name given to all the programs inside the computer with makes it usable?
A. Application software
B. System software
C. Firm ware
D. Shareware
E. None of the above
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
439. Semaphores
A. synchronize critical resources to prevent deadlock
B. synchronize critical resources to prevent contention
C. are used to do I/O
D. are used for memory management
E. None of the above
Answer
Answer: Option A
Explanation : Semaphores synchronize critical resources to prevent deadlock
440. The advantage(s) of incorporating the macro processor into pass 1 is(are):
A. many functions do not have to be implemented twice.
B. Functions are combined and it is not necessary to create intermediate files as output from the macros processor and input to the assembler.
C. more flexibility is available to the programmer in that he may use all the features of the assembler in conjunction with macros.
D. all of the above
E. None of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
441. In analyzing the compilation of PL/I program, the description “creation of more optimal matrix” is associated with
A. Assembly and output
B. Code generation
C. Syntax analysis
D. Machine independent optimization
E. None of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
442. In memory systems, boundary registers
A. are used for temporary program variable storage
B. are only necessary with fixed partitions
C. track page boundaries
D. track the beginning and ending of programs
E. None of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
443. What is the initial value of the semaphore to allow only one of the many processes to enter their critical section?
A. 8
B. 1
C. 16
D. 0
E. None of the above
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
444. Which of the following is true for machine language.
A. Repeated execution of program segments
B. Depicting flow of data in a system
C. A sequence of instructions which when followed properly solves a problem
D. the language which communicates with the computer using only the binary digits 1 and 0.
E. None of the above
Answer
Answer: Option D
Explanation : The language which communicates with the computer using only the binary digits 1 and 0.
445. Four necessary conditions for deadlock to exist are: mutual exclusion, no-preemption, circular wait and
A. hold and wait
B. deadlock avoidance
C. race around condition
D. buffer overflow
E. None of the above
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
446. If you do not know which version of MS-DOS you are working with, which command will you use after having booted your operating system?
A. FORMAT command
B. DIR command
C. VER command
D. DISK command
E. None of the above
Answer
Answer: Option C
Explanation : In computing, ver is a command in various DOS, FlexOS, OS/2 and Microsoft Windows command line interpreters such as COMMAND.COM, cmd.exe and 4DOS/4NT. It prints the name and version of the operating system or the command shell.
447. Which of the following is not applications software?
A. Word processing
B. Spreadsheet
C. UNIX
D. Desktop publishing
E. None of the above
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
448. Scissoring enables
A. a part of data to be displayed
B. entire data to be displayed
C. full data display on full area of screen
D. no data to be displayed
E. None of the above
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
449. A partitioned data set is most used for
A. a program or source library
B. storing program data
C. storing backup information
D. storing ISAM files
E. None of the above
Answer
Answer: Option A
Explanation : A partitioned data set is most used for a program or source library
450. Page-map table is
A. A data file
B. A directory
C. Used for address translation
D. All of the above
E. None of the above
Answer
Answer: Option C
Explanation : Page-map table is used for address translation
451. The main function of the dispatcher (the portion of the process scheduler) is
A. swapping a process to the disk
B. assigning ready process to the CPU
C. suspending some of the processes when the CPU load is high
D. bring processes from the disk to the main memory
E. None of the above
Answer
Answer: Option B
Explanation : The main function of the dispatcher is assigning ready process to the CPU
452. Which of the following is characteristic of an operating system?
A. resource management
B. error recovery
C. memory management
D. All the above
E. None of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
453. The errors that can be pointed out by the compiler are
A. Syntax errors
B. Semantic errors
C. Logical errors
D. Internal errors
E. None of the above
Answer
Answer: Option A
Explanation : The errors that can be pointed out by the compiler are ‘Syntax errors’.
454. When a computer is first turned on or restarted, a special type of absolute loader is executed, called a
A. “Compile and Go” loader
B. Boot loader
C. Bootstrap loader
D. Relating loader
E. None of the above
Answer
Answer: Option C
Explanation : A bootstrap loader is a program that resides in the computer’s EPROM, ROM, or other non-volatile memory. It is automatically executed by the processor when turning on the computer.
455. In MS-DOS, relocatable object files and load modules have extensions
A. .OBJ and .COM or .EXE respectively
B. .COM and .OBJ respectively
C. .EXE and .OBJ respectively
D. .DAS and .EXE respectively
E. None of the above
Answer
Answer: Option A
Explanation : In MS-DOS, relocatable object files and load modules have extensions is .OBJ and .COM or .EXE, respectively.
.OBJ : OBJ is a geometry definition file format first developed by Wavefront Technologies for its Advanced Visualizer animation package. The file format is open and has been adopted by other 3D graphics application vendors.
.COM : The domain name com is a top-level domain in the Domain Name System of the Internet. Its name is derived from the word commercial, indicating its original intended purpose for domains registered by commercial organizations. Later, the domain opened for general purposes.
.EXE : EXE is a file extension for an executable file format. An executable is a file that contains a program – that is, a particular kind of file that is capable of being executed or run as a program in the computer. An executable file can be run by a program in Microsoft DOS or Windows through a command or a double click.
456. Which, of the following checks, cannot be carried out on the input data to a system?
A. consistency check
B. Syntax check
C. Range check
D. All of the above
E. None of the above
Answer
Answer: Option B
Explanation : Syntax check cannot be carried out on the input data to a system.
457. The state transition initiated by the user process itself in an operating system is
A. block
B. dispatch
C. wake up
D. timer run out
E. None of the above
Answer
Answer: Option A
Explanation : The state transition initiated by the user process itself in an operating system is block.
458. Which of the following program is not a utility?
A. Debugger
B. Editor
C. Spooler
D. All of the above
E. None of the above
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
459. A program that converts a high-level language program to a set of instructions that can run on a computer is called a
A. Compiler
B. Debugger
C. Editor
D. All of the above
E. None of the above
Answer
Answer: Option A
Explanation : A compiler is computer software that transforms computer code written in one programming language (the source language) into another programming language (the target language). Compilers are a type of translator that support digital devices, primarily computers. The name compiler is primarily used for programs that translate source code from a high-level programming language to a lower level language. Source : wikipedia.org
460. The function(s) of file system is (are):
A. to provide complete file naming freedom to the users and to permit controlled sharing of files
B. to provide for long and short term storage of files with appropriate economic tradeoffs.
C. to provide security against loss of information due to system failure
D. all of the above
E. None of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
461. Poor response times are caused by
A. Processor busy
B. High I/O rate
C. High paging rates
D. Any of the above
E. None of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
462. Link encryption
A. is more secure than end-to-end encryption
B. is less secure than end-to-end encryption
C. can not be used in a public network
D. is used only to debug
E. None of the above
Answer
Answer: Option B
Explanation : Link encryption is less secure than end-to-end encryption.
Link encryption is an approach to communications security that encrypts and decrypts all traffic at each network routing point (e.g. network switch, or node through which it passes) until arrival at its final destination.
463. A form of code that uses more than one process and processor, possibly of different type, and that may on occasions have more than one process or processor active at the same time, is known as
A. multiprogramming
B. multithreading
C. broadcasting
D. time sharing
E. None of the above
Answer
Answer: Option B
Explanation : A form of code that uses more than one process and processor, possibly of different type, and that may on occasions have more than one process or processor active at the same time, is known as multithreading
464. A public key encryption system
A. allows anyone to decode the transmission
B. allows only the correct sender to decode the data
C. allows only the correct receiver to decode the data
D. does not encode the data before transmitting it
E. None of the above
Answer
Answer: Option C
Explanation : A public key encryption system allows only the correct receiver to decode the data.
465. The table created by lexical analysis to describe all literals used in the source program is
A. Terminal table
B. Literal table
C. Identifier table
D. Reductions
E. None of the above
Answer
Answer: Option B
Explanation : The table created by lexical analysis to describe all literals used in the source program is Literal table.
466. The term ‘polling’ in a computer means a process by which a computer system
A. detects/corrects errors
B. multiplexes the inputs and updates the memory accordingly
C. decides correct alternative by analysing several ones
D. inquires to see if a terminal has any transaction to send
E. None of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
467. Feed back queue
A. are very easy to implement
B. dispatch tasks according to execution characteristics
C. are used to favor real-time tasks
D. require manual intervention to implement properly
E. None of the above
Answer
Answer: Option B
Explanation : Feed back queue dispatch tasks according to execution characteristics.
468. In which addressing mode the operand is given explicitly in the instruction?
A. absolute mode
B. immediate mode
C. indirect mode
D. index mode
E. None of the above
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
469. The technique, for sharing the time of a computer among several jobs. Which switches jobs so rapidly such that each job appears to have the computer to itself:
A. time sharing
B. time out
C. time domain
D. FIFO
E. None of the above
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
470. Capacity planning
A. requires detailed system performance information
B. is independent of the operating system
C. does not depend on the monitoring tools available
D. is not needed in small installations
E. None of the above
Answer
Answer: Option B
Explanation : Capacity planning is independent of the operating system
471. In which addressing mode, the address of the location of the operand is given explicitly as a part of the instruction.
A. absolute mode
B. immediate mode
C. index mode
D. modulus mode
E. None of the above
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
472. Under virtual storage,
A. a single program is processed by two or more CPUs
B. two or more programs are stored concurrently in primary storage
C. only the active pages of a program are stored in primary storage
D. interprogram interference may occur
E. None of the above
Answer
Answer: Option C
Explanation : Under virtual storage only the active pages of a program are stored in primary storage.
473. A base register table
A. allows the programmer to write base registers and displacements explicitly in the source program.
B. is used to remember which of the general-purpose registers are currently available as base registers and what base addresses they contain.
C. allows multiple programs to reside in separate areas of core at the same time.
D. is a term that refers to the control programs of an operating system.
E. None of the above
Answer
Answer: Option B
Explanation : A base register table is used to remember which of the general-purpose registers are currently available as base registers, and what base addresses they contain.
474. File record length
A. should always be fixed
B. Should always be variable
C. depends upon the size of the file
D. should be chosen to match the data characteristics
E. None of the above
Answer
Answer: Option D
Explanation : File record length should be chosen to match the data characteristics.
475. A relationship between processes such that each has some part (critical section) which must not be executed while the critical section of another is being executed, is known as
A. semaphore
B. mutual exclusion
C. multiprogramming
D. multitasking
E. None of the above
Answer
Answer: Option B
Explanation : A relationship between processes such that each has some part (critical section) which must not be executed while the critical section of another is being executed, is known as mutual exclusion
476. What is the name of the operating system which was originally designed by scientists and engineers for use by scientists and engineers?
A. XENIX
B. UNIX
C. OS/2
D. MS DOS
E. None of the above
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
477. The most common security failure is
A. carelessness by users
B. depending on passwords
C. too much emphasis on preventing physical access
D. insufficient technology used to prevent breaches
E. None of the above
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
478. Terminal Table
A. contains all constants in the program
B. a permanent table of decision rules in the form of patterns for matching with the uniform symbol table to discover syntactic structure.
C. consists of a full or partial list of the token’s as they appear in the program. Created by Lexical analysis and used for syntax analysis and interpretation
D. a permanent table which lists all key words and special symbols of the language in symbolic form.
E. None of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
479. Block or buffer caches are used
A. to improve disk performance
B. to handle interrupts
C. to increase the capacity of main memory
D. to speed up main memory read operation
E. None of the above
Answer
Answer: Option A
Explanation : Block or buffer caches are used to improve disk performance.
480. The practice of “bundling” refers to
A. selling computers alone
B. selling peripheral devices with computer
C. selling software to run on computers
D. giving away software with a computer purchase
E. None of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
481. Special software to create a job queue is called a
A. Drive
B. Spooler
C. Interpreter
D. Linkage editor
E. None of the above
Answer
Answer: Option B
Explanation : Special software to create a job queue is called a spooler
482. All the time a computer is switched on, its operating system software has to stay in
A. main storage
B. primary storage
C. floppy disk
D. disk drive
E. None of the above
Answer
Answer: Option B
Explanation : All the time a computer is switched on, its operating system software has to stay in primary storage
483. Can you name of the major Operating System used in computers?
A. MS DOS
B. OS/2
C. UNIX
D. All of the above
E. None of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
484. Which of the following is not an advantage of multiprogramming?
A. increased throughput
B. shorter response time
C. decreased operating-system overhead
D. ability to assign priorities to jobs
E. None of the above
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
485. Virtual Memory
A. is a method of memory allocation by which the program is subdivided into equal portions or pages and core is subdivided into equal portions or blocks.
B. consists of those addresses that may be generated by a processor during execution of a computation.
C. is a method of allocating processor time.
D. allows multiple programs to reside in separate areas of core at the time.
E. None of the above
Answer
Answer: Option B
Explanation : Virtual Memory consists of those addresses that may be generated by a processor during execution of a computation.
486. In a magnetic disk, data is recorded in a set of concentric tracks which are subdivided into
A. periods
B. sectors
C. zones
D. groups
E. None of the above
Answer
Answer: Option B
Explanation : In a magnetic disk, data is recorded in a set of concentric tracks which are subdivided into sectors
487. The total time to prepare a disk drive mechanism for a block of data to be read from it is
A. latency
B. latency plus transmission time
C. latency plus seek time
D. latency plus seek time plus transmission time
E. None of the above
Answer
Answer: Option C
Explanation : The total time to prepare a disk drive mechanism for a block of data to be read from it is latency plus seek time
488. Part of a program where the shared memory is accessed and which should be executed invisibly is called
A. semaphores
B. directory
C. critical section
D. mutual exclusion
E. None of the above
Answer
Answer: Option C
Explanation : Part of a program where the shared memory is accessed and which should be executed invisibly is called critical section
489. Indicate which, of the following, is not true about Nassi-Shneiderman charts
A. These charts are type of graphical design tool
B. These charts cannot represent CASE constructs
C. These charts can represent three fundamental control structures
D. All of the above
E. None of the above
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
490. What is the name of the operating system that reads and reacts in terms of actual time.
A. Batch system
B. Quick response system
C. Real time system
D. Time sharing system
E. None of the above
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
491. An incremental backup
A. should be done each month
B. uses more tapes
C. saves all files
D. saves only files that have recently changed
E. None of the above
Answer
Answer: Option D
Explanation : An incremental backup saves only files that have recently changed
492. The powerful text editor called PC-Write can be used by anybody by paying a small fee. Such programs are called
A. Software
B. Shareware
C. Firmware
D. Mindware
E. None of the above
Answer
Answer: Option B
Explanation : The powerful text editor called PC-Write can be used by anybody by paying a small fee. Such programs are called Shareware
493. The disadvantages of “Compile and Go” loading scheme is (are):
A. a portion of memory is wasted because the core occupied by the assembler is unavailable to the object program.
B. it is necessary to retranslate the user’s program deck every time it is run.
C. it is very difficult to handle multiple segments especially if the source programs are in different languages and to produce orderly modular programs.
D. all of the above
E. None of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
494. The operating system of a computer serves as a software interface between the user and
A. hardware
B. peripheral
C. memory
D. screen
E. None of the above
Answer
Answer: Option A
Explanation : The operating system of a computer serves as a software interface between the user and hardware
495. Which of the following statement is true.
A. The LRU algorithm pages out pages that have been used recently
B. Thrashing is a natural consequence of virtual memory systems.
C. Seek analysis is used for analysing control-unit busy problems.
D. All of the above
E. None of the above
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
496. Which of the following is a phase of a compilation process
A. Lexical analysis
B. Code generation
C. Both of the above
D. Static analysis
E. None of the above
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
497. Which are the most important features of Microsoft Windows program?
A. Windows
B. Pull-down menus
C. Icons
D. All of the above
E. None of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
498. Which of the following system program forgoes the production of object code to generate absolute machine code and load it into the physical main storage location from which it will be executed immediately upon completion of the assembly?
A. two pass assembler
B. load-and-go assembler
C. macroprocessor
D. compiler
E. None of the above
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
499. Virtual memory is
A. simple to implement
B. used in all major commercial operating systems
C. less efficient in utilization of memory
D. useful when fast I/O devices are not available
E. None of the above
Answer
Answer: Option B
Explanation : Virtual memory is used in all major commercial operating systems
500. Object code
A. is ready to execute
B. is the output of compilers but not assemblers
C. must be “loaded” before execution
D. must be rewritten before execution
E. None of the above
Answer
Answer: Option C
Explanation : Object code must be “loaded” before execution
501. The term “operating system” means
A. a set of programs which controls computer working
B. the way a computer operator works
C. conversion of high level language into machine code
D. the way a floppy disk drive operates
E. None of the above
Answer
Answer: Option A
Explanation : The term “operating system” means a set of programs which controls computer working.
502. Which of the following might be used to convert high-level language instructions into machine language?
A. system software
B. applications software
C. an operating environment
D. an interpreter
E. None of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
503. Indicate which is a pre-emptive scheduling algorithm
A. Round-robin
B. Shortest-job-next
C. Priority-based
D. All of the above
E. None of the above
Answer
Answer: Option A
Explanation : Round-robin is a pre-emptive scheduling algorithm.
504. Which of the following, is necessary to work on a computer
A. Compiler
B. Operating system
C. Assembly
D. Interpreter of the above
E. None of the above
Answer
Answer: Option B
Explanation : Operating system is necessary to work on a computer.
505. Access time is the highest in the case of
A. floppy disk
B. cache
C. swapping devices
D. magnetic disk
E. None of the above
Answer
Answer: Option D
Explanation : Access time is the highest in the case of magnetic disk
506. Which of the following is not a characteristic of a daisy chaining priority control scheme?
A. priority is programmable
B. it is relatively easy to add more devices to the chain
C. the failure of one device may affect other devices on the chain
D. the number of control lines is independent of the number of devices on the chain
E. None of the above
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
507. Assembler is
A. a program that places programs into memory and prepares them for execution.
B. a program that automate the translation of assembly language into machine language.
C. a program that accepts a program written in a high level language and produces an object program.
D. is a program that appears to execute a source program as if it were machine language.
E. None of the above
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
508. Indicate which, of the following, in not true about an interpreter
A. Interpreter generates an object program from the source program
B. Interpreter is a kind of translator
C. Interpreter analyses each source statement every time it is to be executed
D. All of the above
E. None of the above
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
509. Object modules generated by assemblers that contain unresolved external references are resolved for two or more object modules by a/an
A. operating system
B. loader
C. linker
D. compiler
E. None of the above
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
510. The advantage of a command processor running only built-in commands is:
A. flexibility to the users in running lists of commands by simply collecting them in named batch command files
B. the command set being common across different hardware configurations
C. users can create system programs and run them as commands
D. the processing is much faster than would other-wise be the case when user defined commands are used
E. None of the above
Answer
Answer: Option B
Explanation : The advantage of a command processor running only built-in commands is the command set being common across different hardware configurations.
511. Under multiprogramming, turnaround time for short jobs is usually _____ and that for long jobs is slightly _____.
A. lengthened; shortened
B. shortened; lengthened
C. shortened; shortened
D. lengthened; lengthened
E. None of the above
Answer
Answer: Option B
Explanation : Under multiprogramming, turnaround time for short jobs is usually shortened and that for long jobs is slightly lengthened.
512. The most common systems security method is
A. passwords
B. encryption
C. firewall
D. all of the above
E. None of the above
Answer
Answer: Option A
Explanation : The most common systems security method is passwords.
Password : A password is a string of characters used for authenticating a user on a computer system. Most passwords are comprised of several characters, which can typically include letters, numbers, and most symbols, but not spaces.
513. Two basic types of operating systems are:
A. sequential and direct
B. batch and timesharing
C. sequential and realtime
D. batch and interactive
E. None of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
514. Daisy chain is a device for
A. connecting a number of controllers to a device
B. connecting a number of devices to a controller
C. interconnecting a number of devices to a number of controllers
D. all of the above
E. None of the above
Answer
Answer: Option B
Explanation : A daisy chain is an interconnection of computer devices, peripherals, or network nodes in series, one after another. It is the computer equivalent of a series electrical circuit.
515. In analyzing the compilation of PL/I program, the term “Machine independent optimization” is associated with
A. recognition of basic syntactic constructs through reductions
B. recognition of basic elements and creation of uniform symbols
C. creation of more optional matrix
D. use of macro processor to produce more optimal assembly code
E. None of the above
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
516. An instruction in a programming language that is replaced by a sequence of instructions prior to assembly or compiling is known as
A. procedure name
B. macro
C. label
D. literal
E. None of the above
Answer
Answer: Option B
Explanation : An instruction in a programming language that is replaced by a sequence of instructions prior to assembly or compiling is known as macro.
517. A program
A. is a device that performs a sequence of operations specified by instructions in memory.
B. is the device where information is stored
C. is a sequence of instructions
D. is typically characterized by interactive processing and time of the CPU
E. None of the above
Answer
Answer: Option C
Explanation : A program is a sequence of instructions
518. A self-relocating program is one which
A. cannot be made to execute in any area of storage other than the one designated for it at the time of its coding or translation.
B. consists of a program and relevant information for its relocation.
C. can itself performs the relocation of its address-sensitive portions.
D. All of the above
E. None of the above
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
519. Banker’s algorithm for resource allocation deals with
A. deadlock prevention
B. deadlock avoidance
C. deadlock recovery
D. mutual exclusion
E. None of the above
Answer
Answer: Option B
Explanation : The Banker algorithm, sometimes referred to as the detection algorithm, is a resource allocation and deadlock avoidance algorithm developed by Edsger Dijkstra that tests for safety by simulating the allocation of predetermined maximum possible amounts of all resources, and then makes an “s-state” check to test for possible deadlock conditions for all other pending activities, before deciding whether allocation should be allowed to continue.
520. A sequence of instructions, in a computer language, to get the desired result, is known as
A. Algorithm
B. Decision Table
C. Program
D. All of the above
E. None of the above
Answer
Answer: Option C
Explanation : A sequence of instructions, in a computer language, to get the desired result, is known as program
521. Which, of the following, is true for testing and debugging?
A. Testing checks for logical errors in the programs while debugging is a process of correcting those errors in the program
B. Testing detects the syntax errors in the program while debugging corrects those errors in the program
C. Testing and debugging indicate the same thing
D. All of the above
E. None of the above
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
522. Information in a memory that is no longer valid or wanted is known as
A. non-volatile
B. volatile
C. surplus
D. garbage
E. None of the above
Answer
Answer: Option D
Explanation : Information in a memory that is no longer valid or wanted is known as garbage.
523. Which of the following filename extension suggests that the file is a backup copy of another file?
A. .txt
B. .com
C. .bas
D. .bak
E. None of the above
Answer
Answer: Option D
Explanation : In computing, “.bak” is a filename extension commonly used to signify a backup copy of a file.
When a program is about to overwrite an existing file (for example, when the user saves the document they are working on), the program may first make a copy of the existing file, with .bak appended to the filename. This common .bak naming scheme makes it possible to retrieve the original contents of the file. In a similar manner, a user may also manually make a copy of the file before the change and append .bak to the filename.
524. Relocation bits used by relocating loader are specified (generated) by
A. Relocating loader itself
B. Linker
C. Assembler or translator
D. Macro processor
E. None of the above
Answer
Answer: Option B
Explanation : Relocation bits used by relocating loader are specified (generated) by linker
525. Which of the following statements is false?
A. a process scheduling algorithm is preemptive if the CPU can be forcibly removed from a process
B. time sharing systems generally use preemptive CPU scheduling
C. response time are more predictable in preemptive systems than in non preemptive systems
D. real time systems generally use non-preemptive CPU scheduling
E. None of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
526. Non-modifiable procedures are called
A. serially usable procedures
B. concurrent procedures
C. reentrant procedures
D. topdown procedures
E. None of the above
Answer
Answer: Option C
Explanation : No explanation is given for this question Let’s Discuss on Board
527. The instruction register
A. is a hardware memory device which denotes the location of the current instruction being executed.
B. is a group of electrical circuits (hardware) that performs the intent of instructions fetched from memory.
C. contains the address of the memory location that is to be read from or stored into.
D. contains a copy of the designated memory location specified by the MAR after a “read” or the new contents of the memory prior to a “write”.
E. None of the above
Answer
Answer: Option B
Explanation : The instruction register is a group of electrical circuits (hardware), that performs the intent of instructions fetched from memory.
528. Which of the following scheduling objectives should be applied to the following: the system should admit jobs to create a mix that will keep most devices busy
A. to be fair
B. to balance resource utilization
C. to obey priorities
D. to be predictable
E. None of the above
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
529. Multiprogramming systems:
A. are easier to develop than single programming system
B. execute each job faster
C. execute more jobs in the same time period
D. are used only on large mainframe computers
E. None of the above
Answer
Answer: Option C
Explanation : Multitasking has the same meaning of multiprogramming but in a more general sense, as it refers to having multiple (programs, processes, tasks, threads) running at the same time. This term is used in modern operating systems when multiple tasks share a common processing resource (e.g., CPU and Memory).
530. Backups should be done
A. daily for most installations
B. weekly for most installations
C. as several image copies followed by an incremental
D. as several incrementals followed by an image copy
E. None of the above
Answer
Answer: Option D
Explanation : Backups should be done as several incrementals, followed by an image copy
531. In an absolute loading scheme, which loader function is accomplished by assembler.
A. Reallocation
B. Allocation
C. Linking
D. Loading
E. None of the above
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
532. The command interpreter
A. is usually the primary user interface
B. requires fixed format commands
C. is menu drive
D. is quite different from the SCL interpreter
E. None of the above
Answer
Answer: Option A
Explanation : The command interpreter is usually the primary user interface
533. A task in a blocked state
A. is executable
B. is running
C. must still be placed in the run queues
D. is waiting for same temporarily unavailable resources
E. None of the above
Answer
Answer: Option D
Explanation : A task in a blocked state is waiting for same temporarily unavailable resources
534. System maintenance:
A. is usually not necessary
B. is necessary on all systems regardless of how good
C. is not required if the system is well written
D. always requires several programs
E. None of the above
Answer
Answer: Option B
Explanation : System maintenance is necessary on all systems, regardless of how good
535. Which of the following statements is not true about the FORTRAN language?
A. FORTRAN is a high level language
B. A FORTRAN program written for the IBM-PC is totally different from a FORTRAN program written for execution on the SUN machine
C. FORTRAN is extensively used to write programs for performing scientific computations
D. All of the above
E. None of the above
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
536. A linker
A. creates a load module
B. is not necessary with variable partitions
C. must be run after the loader
D. is not needed with a good compiler
E. None of the above
Answer
Answer: Option A
Explanation : A linker creates a load module
537. Uniform Symbols Table
A. contains all constants in the program
B. a permanent table of decision rules in the form of patterns for matching with the uniform symbol table to discover syntactic structure
C. consists of a full or partial list of the token’s as they appear in the program. Created by Lexical analysis and used for syntax analysis and interpretation
D. a permanent table which lists all key words and special symbols of the language in symbolic form
E. None of the above
Answer
Answer: Option C
Explanation : Uniform Symbols Table consists of a full or partial list of the token’s as they appear in the program. Created by Lexical analysis and used for syntax analysis and interpretation
538. In which of the storage placement strategies a program is placed in the smallest available hole in the main memory?
A. best fit
B. first fit
C. worst fit
D. buddy
E. None of the above
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
539. In which addressing mode, the effective address of the operand is generated by adding a constant value to the contents of register?
A. absolute mode
B. indirect mode
C. immediate mode
D. index mode
E. None of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
540. The higher versions of the operating systems are so written that programs designed for earlier versions can still be run. What is it called?
A. Upgradability
B. Upward mobility
C. Universality
D. Upward compatibility
E. None of the above
Answer
Answer: Option D
Explanation : Refers to software that runs not only on the computer for which it was designed, but also on newer and more powerful models. For example, a program designed to run on an Intel 386 microprocessor, which also runs on a Pentium, is upward compatible. Upward compatibility is important because it means you can move to a newer, larger, and more sophisticated computer without converting your data.
541. If special forms are needed for printing the output, the programmer specifies these forms through?
A. JCL
B. JPL
C. Utility programs
D. Load modules
E. None of the above
Answer
Answer: Option A
Explanation : Job Control Language (JCL) is a name for scripting languages used on IBM mainframe operating systems to instruct the system on how to run a batch job or start a subsystem.
More specifically, the purpose of JCL is to say which programs to run, using which files or devices for input or output, and at times to also indicate under what conditions to skip a step.
542. Which policy replace a page if it is not in the favoured subset of a process’s pages?
A. FIFO
B. LRU
C. LFU
D. Working set
E. None of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
543. Which of the following can be accesses by transfer vector approach of linking?
A. External data segments
B. External subroutines
C. Data located in other procedures
D. All of the above
E. None of the above
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
544. Which of the following terms refers to the degree to which data in a database system are accurate and correct?
A. data security
B. data validity
C. data independence
D. data integrity
E. None of the above
Answer
Answer: Option D
Explanation : Data integrity is a fundamental component of information security. In its broadest use, “data integrity” refers to the accuracy and consistency of data stored in a database, data warehouse, data mart or other construct.
545. In analyzing the compilation of PL/I program, the term “Syntax analysis” is associated with
A. recognition of basic syntactic constructs through reductions
B. recognition of basic elements and creation of uniform symbols
C. creation of more optional matrix
D. use of macro processor to produce more optimal assembly code
E. None of the above
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
546. A hardware device that is capable of executing a sequence of instructions, is known as
A. CPU
B. ALU
C. CU
D. Processor
E. None of the above
Answer
Answer: Option D
Explanation : A hardware device that is capable of executing a sequence of instructions, is known as processor
547. Which of following is/are the advantage(s) of modular programming?
A. The program is much easier to change
B. Modules can be reused in other programs
C. Easy debugging
D. Easy to compile
E. None of the above
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
548. The function(s) performed by the paging software is (are)
A. Implementation of the access environment for all programs in the system
B. Management of the physical address space
C. Sharing and protection
D. All of the above
E. None of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
549. A compiler for a high-level language that runs on one machine and produces code for a different machine is called
A. optimizing compiler
B. one pass compiler
C. cross compiler
D. multipass compiler
E. None of the above
Answer
Answer: Option C
Explanation : A compiler for a high-level language that runs on one machine and produces code for a different machine is called cross compiler.
550. A critical region is
A. a program segment that has not been proved bug-free
B. a program segment that often causes unexpected system crashes
C. a program segment where shared resources are accessed
D. one which is enclosed by a pair of P and V operations on semaphores
E. none is the above
Answer
Answer: Option D
Explanation : A critical region is one which is enclosed by a pair of P and V operations on semaphores
551. Assembler language
A. is usually the primary user interface
B. requires fixed-format commands
C. is a mnemonic form of machine language
D. is quite different from the SCL interpreter
E. None of the above
Answer
Answer: Option C
Explanation : Assembler language is a mnemonic form of machine language
552. The primary job of the operating system of a computer is to
A. command resources
B. manage resources
C. provide utilities
D. be user friendly
E. None of the above
Answer
Answer: Option B
Explanation : The primary job of the operating system of a computer is to manage resources
553. Which of the following is a measure to test how good or bad a modular design is
A. Module strength
B. Module coupling
C. Static analysis
D. All of the above
E. None of the above
Answer
Answer: Option A
Explanation : No explanation is given for this question Let’s Discuss on Board
554. The Operating system manages
A. Memory
B. Processor
C. Disks and I/O devices
D. All of the above
E. None of the above
Answer
Answer: Option D
Explanation : No explanation is given for this question Let’s Discuss on Board
555. The primary purpose of an operating system is to:
A. make computer easier to use
B. keep system programmers employed
C. make the most efficient use of the hardware
D. allow people to sue the computers
E. None of the above
Answer
Answer: Option A
Explanation : The primary purpose of an operating system is to make computer easier to use.
556. Which of the following is true about pseudocode
A. A machine language
B. An assembly language
C. A high-level language
D. All of the above
E. None of the above
Answer
Answer: Option E
Explanation : No explanation is given for this question Let’s Discuss on Board
557. The principles of structured programming forbid the use of
A. WHILE-DO
B. GOTO
C. IF-THEN-ELSE
D. DO-WHILE
E. None of the above
Answer
Answer: Option B
Explanation : No explanation is given for this question Let’s Discuss on Board
558. Which of the following capabilities is required for a system program to execute more than one program at a time?
A. word processing
B. compiling
C. virtual memory
D. multitasking
E. None of the above
Answer
Answer: Option D
Explanation : In computing, multitasking is the concurrent execution of multiple tasks (also known as processes) over a certain period of time. New tasks can interrupt already started ones before they finish, instead of waiting for them to end. As a result, a computer executes segments of multiple tasks in an interleaved manner, while the tasks share common processing resources such as central processing units (CPUs) and main memory.
559. For Windows 10, Microsoft released _________ in place of MS Paint.
A. Paint 10
B. New MS Paint
C. Paint 3D
D. Universal Paint
Answer
Answer: Option C
Explanation : In the April 2017 “Creators Update” for Windows 10, Microsoft released Paint 3D, a revamp of Paint built on Universal Windows Platform.
560. Which of the key is used to close the active window?
A. Ctrl+F4
B. Alt+F4
C. Alt+F6
D. Ctrl+F5
Answer
Answer: Option B
Explanation : Alt+F4 closes the current window.