Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 950 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

801.

The controller is connected to the

A. processor bus
B. system bus
C. external bus
D. none of the mentioned
Answer» C. external bus
802.

When the R/W bit of the status register of the DMA controller is set to 1.

A. read operation is performed
B. write operation is performed
C. read & write operation is performed
D. none of the mentioned
Answer» B. write operation is performed
803.

After the completion of the DMA transfer, the processor is notified by

A. acknowledge signal
B. interrupt signal
C. wmfc signal
D. none of the mentioned
Answer» C. wmfc signal
804.

Can a single DMA controller perform operations on two different disks simultaneously?

A. true
B. false
Answer» B. false
805.

In DMA transfers, the required signals and addresses are given by the

A. processor
B. device drivers
C. dma controllers
D. the program itself
Answer» D. the program itself
806.

The DMA differs from the interrupt mode by

A. the involvement of the processor for the operation
B. the method of accessing the i/o devices
C. the amount of data transfer possible
D. none of the mentioned
Answer» E.
807.

How is a privilege exception dealt with?

A. the program is halted and the system switches into supervisor mode and restarts the program execution
B. the program is stopped and removed from the queue
C. the system switches the mode and starts the execution of a new process
D. the system switches mode and runs the debugger
Answer» B. the program is stopped and removed from the queue
808.

The instructions which can be run only supervisor mode are?

A. non-privileged instructions
B. system instructions
C. privileged instructions
D. exception instructions
Answer» D. exception instructions
809.

The DMA transfers are performed by a control circuit called as

A. device interface
B. dma controller
C. data controller
D. overlooker
Answer» C. data controller
810.

In trace mode of operation is

A. the program is interrupted after each detection
B. the program will not be stopped and the errors are sorted out after the complete program is scanned
C. there is no effect on the program, i.e the program is executed without rectification of errors
D. the program is halted only at specific points
Answer» B. the program will not be stopped and the errors are sorted out after the complete program is scanned
811.

What are the different modes of operation of a computer?

A. user and system mode
B. user and supervisor mode
C. supervisor and trace mode
D. supervisor, user and trace mode
Answer» C. supervisor and trace mode
812.

The two facilities provided by the debugger is

A. trace points
B. break points
C. compile
D. both trace and break points
Answer» E.
813.

The program used to find out errors is called

A. debugger
B. compiler
C. assembler
D. scanner
Answer» B. compiler
814.

           is/are types of exceptions.

A. trap
B. interrupt
C. system calls
D. all of the mentioned
Answer» E.
815.

If during the execution of an instruction an exception is raised then

A. the instruction is executed and the exception is handled
B. the instruction is halted and the exception is handled
C. the processor completes the execution and saves the data and then handle the exception
D. none of the mentioned
Answer» C. the processor completes the execution and saves the data and then handle the exception
816.

Interrupts initiated by an instruction is called as

A. internal
B. external
C. hardware
D. software
Answer» C. hardware
817.

The added output of the bits of the interrupt register and the mask register is set as an input of

A. priority decoder
B. priority encoder
C. process id encoder
D. multiplexer
Answer» C. process id encoder
818.

                              register is used for the purpose of controlling the status of each interrupt request in parallel priority interrupt.

A. mass
B. mark
C. make
D. mask
Answer» E.
819.

              interrupt method uses register whose bits are set separately by interrupt signal for each device.

A. parallel priority interrupt
B. serial priority interrupt
C. daisy chaining
D. none of the mentioned
Answer» B. serial priority interrupt
820.

                    method is used to establish priority by serially connecting all devices that request an interrupt.

A. vectored-interrupting
B. daisy chain
C. priority
D. polling
Answer» C. priority
821.

In daisy chaining device 0 will pass the signal only if it has

A. interrupt request
B. no interrupt request
C. both no interrupt and interrupt request
D. none of the mentioned
Answer» C. both no interrupt and interrupt request
822.

Which table handle stores the addresses of the interrupt handling sub- routines?

A. interrupt-vector table
B. vector table
C. symbol link table
D. none of the mentioned
Answer» B. vector table
823.

The processor indicates to the devices that it is ready to receive interrupts

A. by enabling the interrupt request line
B. by enabling the irq bits
C. by activating the interrupt acknowledge line
D. none of the mentioned
Answer» D. none of the mentioned
824.

The starting address sent by the device in vectored interrupt is called as

A. location id
B. interrupt vector
C. service location
D. service id
Answer» C. service location
825.

The code sent by the device in vectored interrupt is            long.

A. upto 16 bits
B. upto 32 bits
C. upto 24 bits
D. 4-8 bits
Answer» E.
826.

In vectored interrupts, how does the device identify itself to the processor?

A. by sending its device id
B. by sending the machine code for the interrupt service routine
C. by sending the starting address of the service routine
D. none of the mentioned
Answer» D. none of the mentioned
827.

The interrupt servicing mechanism in which the requesting device identifies itself to the processor to be serviced is

A. polling
B. vectored interrupts
C. interrupt nesting
D. simultaneous requesting
Answer» C. interrupt nesting
828.

When dealing with multiple devices interrupts, which mechanism is easy to implement?

A. polling method
B. vectored interrupts
C. interrupt nesting
D. none of the mentioned
Answer» B. vectored interrupts
829.

Which interrupt is unmaskable?

A. rst 5.5
B. rst 7.5
C. trap
D. both rst 5.5 and 7.5
Answer» D. both rst 5.5 and 7.5
830.

An interrupt that can be temporarily ignored is

A. vectored interrupt
B. non-maskable interrupt
C. maskable interrupt
D. high priority interrupt
Answer» D. high priority interrupt
831.

The resistor which is attached to the service line is called

A. push-down resistor
B. pull-up resistor
C. break down resistor
D. line resistor
Answer» C. break down resistor
832.

The time between the receiver of an interrupt and its service is

A. interrupt delay
B. interrupt latency
C. cycle time
D. switching time
Answer» C. cycle time
833.

The signal sent to the device from the processor to the device after receiving an interrupt is

A. interrupt-acknowledge
B. return signal
C. service signal
D. permission signal
Answer» B. return signal
834.

A single Interrupt line can be used to service n different devices.

A. true
B. false
Answer» B. false
835.

The interrupt-request line is a part of the

A. data line
B. control line
C. address line
D. none of the mentioned
Answer» C. address line
836.

The method of accessing the I/O devices by repeatedly checking the status flags is

A. program-controlled i/o
B. memory-mapped i/o
C. i/o mapped
D. none of the mentioned
Answer» B. memory-mapped i/o
837.

The sub-routine service procedure is similar to that of the interrupt service routine in

A. method of context switch
B. returning
C. process execution
D. method of context switch & process execution
Answer» E.
838.

The stack frame for each subroutine is present in

A. main memory
B. system heap
C. processor stack
D. none of the mentioned
Answer» D. none of the mentioned
839.

           the most suitable data structure used to store the return addresses in the case of nested subroutines.

A. heap
B. stack
C. queue
D. list
Answer» C. queue
840.

The data structure suitable for scheduling processes is

A. list
B. heap
C. queue
D. stack
Answer» D. stack
841.

The reserved memory or private space of the subroutine gets deallocated when

A. the stop instruction is executed by the routine
B. the pointer reaches the end of the space
C. when the routine’s return statement is executed
D. none of the mentioned
Answer» D. none of the mentioned
842.

In the case of nested subroutines, the stack top is always

A. the saved contents of the called sub routine
B. the saved contents of the calling sub routine
C. the return addresses of the called sub routine
D. none of the mentioned
Answer» B. the saved contents of the calling sub routine
843.

              pointer is used to point to parameters passed or local parameters of the subroutine.

A. stack pointer
B. frame pointer
C. parameter register
D. log register
Answer» C. parameter register
844.

The private space gets allocated to each subroutine when

A. the first statement of the routine is executed
B. when the context switch takes place
C. when the routine gets called
D. when the allocate instruction is executed
Answer» D. when the allocate instruction is executed
845.

If the subroutine exceeds the private space allocated to it then the values are pushed onto

A. stack
B. system heap
C. reserve space
D. stack frame
Answer» B. system heap
846.

The private work space dedicated to a subroutine is called as

A. system heap
B. reserve
C. stack frame
D. allocation
Answer» D. allocation
847.

The most Flexible way of logging the return addresses of the subroutines is by using

A. registers
B. stacks
C. memory locations
D. none of the mentioned
Answer» C. memory locations
848.

The most efficient way of handling parameter passing is by using

A. general purpose registers
B. stacks
C. memory locations
D. none of the mentioned
Answer» B. stacks
849.

The appropriate return addresses are obtained with the help of          in case of nested routines.

A. mar
B. mdr
C. buffers
D. stack-pointers
Answer» E.
850.

In case of nested subroutines the return addresses are stored in

A. system heap
B. special memory buffers
C. processor stack
D. registers
Answer» D. registers