Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

A public key encryption system

A. allows anyone to decode the transmission
B. allows only the correct sender to decode the data
C. allows only the correct receiver to decode the data
D. does not encode the data before transmitting it
E. None of the above
Answer» D. does not encode the data before transmitting it
2.

The function(s) of file system is (are):

A. to provide complete file naming freedom to the users and to permit controlled sharing of files
B. to provide for long and short term storage of files with appropriate economic tradeoffs.
C. to provide security against loss of information due to system failure
D. all of the above
E. None of the above
Answer» E. None of the above
3.

An instruction in a programming language that is replaced by a sequence of instructions prior to assembly or compiling is known as

A. procedure name
B. macro
C. label
D. literal
E. None of the above
Answer» C. label
4.

A program

A. is a device that performs a sequence of operations specified by instructions in memory.
B. is the device where information is stored
C. is a sequence of instructions
D. is typically characterized by interactive processing and time of the CPU's time to allow quick response to each user.
E. None of the above
Answer» D. is typically characterized by interactive processing and time of the CPU's time to allow quick response to each user.
5.

Banker's algorithm for resource allocation deals with

A. deadlock prevention
B. deadlock avoidance
C. deadlock recovery
D. mutual exclusion
E. None of the above
Answer» C. deadlock recovery
6.

In which of the storage placement strategies a program is placed in the largest available hole in the main memory?

A. best fit
B. first fit
C. worst fit
D. buddy
E. None of the above
Answer» D. buddy
7.

Which of the following is a block device

A. mouse
B. printer
C. terminals
D. disk
E. None of the above
Answer» E. None of the above
8.

The problem of thrashing is affected significantly by:

A. program structure
B. program size
C. primary-storage size
D. all of the above
E. None of the above
Answer» B. program size
9.

Which of the following software types is used to simplify using systems software?

A. spreadsheet
B. operating environment
C. timesharing
D. multitasking
E. None of the above
Answer» D. multitasking
10.

Advantage(s) of using assembly language rather than machine language is (are):

A. It is mnemonic and easy to read.
B. Addresses any symbolic, not absolute
C. Introduction of data to program is easier
D. all of the above
E. None of the above
Answer» E. None of the above
11.

The initial value of the semaphore that allows only one of the many processes to enter their critical sections, is

A. 8
B. 1
C. 16
D. 0
E. None of the above
Answer» C. 16
12.

A page fault

A. is an error is a specific page
B. occurs when a program accesses a page of memory
C. is an access to a page not currently in memory
D. is a reference to a page belonging to another program
E. None of the above
Answer» D. is a reference to a page belonging to another program
13.

Changing oil in an automobile is an example of

A. preventative maintenance
B. scheduled maintenance
C. both (a) and (b)
D. neither (a) nor (b)
E. None of the above
Answer» D. neither (a) nor (b)
14.

The parts of a system may be analyzed in the sequence

A. outputs, objective, management, information processor, input, transformation
B. objectives, outputs, management, information processor, input, transformation
C. objectives, outputs, information processor, management, input transformation
D. outputs, inputs, objectives, management, information processor, transformation
E. None of the above
Answer» C. objectives, outputs, information processor, management, input transformation
15.

In applying the systems approach, the manager proceeds from the

A. super system to the system to the subsystem level
B. system to the sulpersystem to the subsystem level
C. subsystem to the system to the supersystem level
D. supersystem to the supersystem to the system level.
E. None of the above
Answer» B. system to the sulpersystem to the subsystem level
16.

Data is gathered, describing what is happening in the

A. input area
B. transformation
C. output area
D. All of the above
E. None of the above
Answer» E. None of the above
17.

Ideally, the chairman of the MIS committee should be the

A. vice-president of manufacturing
B. vice-president of marketing
C. vice-president of finance
D. All of the above
E. None of the above.
Answer» F.
18.

The paperwork that travels with the materials through the production process is called a

A. shop packet
B. weigh bill
C. picking ticket
D. work order
E. None of the above
Answer» B. weigh bill
19.

The working set theory of programming behaviour of processes running within an operating system involves

A. the collection of pages that a process accesses
B. disk scheduling mechanisms
C. coalescing holes in memory
D. assigning the CPU to processes
E. None of the above
Answer» B. disk scheduling mechanisms
20.

The way of thinking that might facilitate attainment of a single, integrated information system is the

A. marketing concept
B. marketing mix
C. marketing grid
D. marketing matrix
E. None of the above
Answer» B. marketing mix
21.

A characteristic of a distributed MIS structure is:

A. computers supporting local DP operations
B. a multiprocessing environment
C. integrative sharing of the workload
D. All of the above
E. None of the above
Answer» D. All of the above
22.

Operating system is

A. A collection of hardware components
B. A collection of input-output devices
C. A collection of software routines
D. All of the above
E. None of the above
Answer» D. All of the above
23.

A file organization component of a VSAM file is:

A. relative record data set
B. keyed sequential data set
C. entry sequential data set
D. all of the above
E. None of the above
Answer» E. None of the above
24.

What is the name given to the software which can be legally compiled and often used for free?

A. Shareware program
B. Public domain program
C. Firmware program
D. Mindware
E. None of the above
Answer» C. Firmware program
25.

The SJF algorithm executes first the job

A. that last entered the queue
B. that first entered the queue
C. that has been in the queue the longest
D. with the least processor needs
E. None of the above
Answer» E. None of the above
26.

The advantage(s) inherent to using high level languages is (are)

A. Fewer people, less management and shorter transition in learning time
B. Improved debugging capability, and superior documentation
C. A greater degree of machine independence
D. All of the above
E. None of the above
Answer» E. None of the above
27.

Addressing modes

A. defines the fundamental method of determining effective operand addresses
B. are variations in the use of fundamental addressing structures, or some associated actions which are related to addressing.
C. performs indicated operations on two fast registers of the machine and leave the result in one of the registers.
D. all of the above
E. None of the above
Answer» C. performs indicated operations on two fast registers of the machine and leave the result in one of the registers.
28.

Which of the following is a type of systems software used on microcomputers?

A. MS-DOS
B. PC-DOS
C. Unix
D. All of the above
E. None of the above
Answer» E. None of the above
29.

A Processor

A. is a device that performs a sequence of operations specified by instructions in memory.
B. is the device where information is stored
C. is a sequence of instructions
D. is typically characterized by interactive processing and time of the CPU's time to allow quick response to each user.
E. None of the above
Answer» B. is the device where information is stored
30.

With MS-DOS which command will divide the surface of the blank floppy disk into sectors and assign a unique address to each one?

A. FORMAT command
B. FAT command
C. VER command
D. CHKDSK command
E. None of the above
Answer» B. FAT command
31.

Multiprogramming

A. is a method of memory allocation by which the program is subdivided into equal portions, or pages and core is subdivided into equal portions or blocks.
B. consists of those addresses that may be generated by a processor during execution of a computation.
C. is a method of allocating processor time.
D. allows multiple programs to reside in separate areas of core at the time.
E. None of the above
Answer» E. None of the above
32.

A translator is best described as

A. an application software
B. a system software
C. a hardware component
D. all of the above
E. None of the above
Answer» C. a hardware component
33.

Data encryption

A. is mostly used by public networks
B. is mostly used by financial networks
C. cannot be used by private installations
D. is not necessary, since data cannot be intercepted
E. None of the above
Answer» C. cannot be used by private installations
34.

The details of all external symbols and relocation formation (relocation list or map) is provided to linker by

A. Macro processor
B. Translator
C. Loader
D. Editor
E. None of the above
Answer» C. Loader
35.

Block caches or buffer caches are used

A. to improve disk performance
B. to handle interrupts
C. to increase the capacity of the main memory
D. to speed up main memory read operation
E. None of the above
Answer» B. to handle interrupts
36.

What is the name of the operating system that reads and reacts in terms of actual time.

A. Batch system
B. Quick response system
C. Real time system
D. Time sharing system
E. None of the above
Answer» D. Time sharing system
37.

An incremental backup

A. should be done each month
B. uses more tapes
C. saves all files
D. saves only files that have recently changed
E. None of the above
Answer» E. None of the above
38.

Virtual Memory

A. is a method of memory allocation by which the program is subdivided into equal portions, or pages and core is subdivided into equal portions or blocks.
B. consists of those addresses that may be generated by a processor during execution of a computation.
C. is a method of allocating processor time.
D. allows multiple programs to reside in separate areas of core at the time.
E. None of the above
Answer» C. is a method of allocating processor time.
39.

In a magnetic disk, data is recorded in a set of concentric tracks which are subdivided into

A. periods
B. sectors
C. zones
D. groups
E. None of the above
Answer» C. zones
40.

The dispatcher

A. actually schedules the tasks into the processor
B. puts tasks in I/O wait
C. is always small and simple
D. never changes task priorities
E. None of the above
Answer» B. puts tasks in I/O wait
41.

System programs such as Compilers are designed so that they are

A. reenterable
B. non reusable
C. serially usable
D. recursive
E. None of the above
Answer» B. non reusable
42.

IBM released its first PC in 1981. Can you name the operating system which was most popular at that time?

A. MS-DOS
B. PC-DOS
C. OS/360
D. CP/M
E. None of the above
Answer» E. None of the above
43.

If the number of bits in a virtual address of a program is 16 and the page size is 0.5 K bytes, the number of pages in the virtual address space is

A. 16
B. 32
C. 64
D. 128
E. None of the above
Answer» E. None of the above
44.

Which table is a permanent database that has an entry for each terminal symbol.

A. Terminal table
B. Literal table
C. Identifier table
D. Reductions
E. None of the above
Answer» B. Literal table
45.

Which of the following is helpful in evaluating applications software what will best suit your needs?

A. recommendations by other users
B. computer magazines
C. objective software reviews
D. all of the above
E. None of the above
Answer» E. None of the above
46.

What problem is solved by Dijkstra's banker's algorithm?

A. mutual exclusion
B. deadlock recovery
C. deadlock avoidance
D. cache coherence
E. None of the above
Answer» D. cache coherence
47.

Software that measures, monitors, analyzes, and controls real-world events is called:

A. system software
B. real-time software
C. scientific software
D. business software
E. None of the above
Answer» C. scientific software
48.

Operating system

A. links a program with the subroutines it references
B. provides a layered, user-friendly interface
C. enables the programmer to draw a flowchart
D. all of the above
E. None of the above
Answer» C. enables the programmer to draw a flowchart
49.

Which, of the following is not true about the description of a decision table?

A. A decision table is easy to modify
B. A decision table is directly understood by the computer
C. A decision table is easy to understand
D. All of the above
E. None of the above
Answer» C. A decision table is easy to understand
50.

Trojan-Horse programs

A. are legitimate programs that allow unauthorized access
B. do not usually work
C. are hidden programs that do not show up on the system
D. usually are immediately discovered
E. None of the above
Answer» B. do not usually work