Explore topic-wise MCQs in Engineering.

This section includes 4320 Mcqs, each offering curated multiple-choice questions to sharpen your Engineering knowledge and support exam preparation. Choose a topic below to get started.

2651.

A public key encryption system

A. allows anyone to decode the transmission
B. allows only the correct sender to decode the data
C. allows only the correct receiver to decode the data
D. does not encode the data before transmitting it
E. None of the above
Answer» D. does not encode the data before transmitting it
2652.

The function(s) of file system is (are):

A. to provide complete file naming freedom to the users and to permit controlled sharing of files
B. to provide for long and short term storage of files with appropriate economic tradeoffs.
C. to provide security against loss of information due to system failure
D. all of the above
E. None of the above
Answer» E. None of the above
2653.

An instruction in a programming language that is replaced by a sequence of instructions prior to assembly or compiling is known as

A. procedure name
B. macro
C. label
D. literal
E. None of the above
Answer» C. label
2654.

A program

A. is a device that performs a sequence of operations specified by instructions in memory.
B. is the device where information is stored
C. is a sequence of instructions
D. is typically characterized by interactive processing and time of the CPU's time to allow quick response to each user.
E. None of the above
Answer» D. is typically characterized by interactive processing and time of the CPU's time to allow quick response to each user.
2655.

Banker's algorithm for resource allocation deals with

A. deadlock prevention
B. deadlock avoidance
C. deadlock recovery
D. mutual exclusion
E. None of the above
Answer» C. deadlock recovery
2656.

In which of the storage placement strategies a program is placed in the largest available hole in the main memory?

A. best fit
B. first fit
C. worst fit
D. buddy
E. None of the above
Answer» D. buddy
2657.

Which of the following is a block device

A. mouse
B. printer
C. terminals
D. disk
E. None of the above
Answer» E. None of the above
2658.

The problem of thrashing is affected significantly by:

A. program structure
B. program size
C. primary-storage size
D. all of the above
E. None of the above
Answer» B. program size
2659.

Which of the following software types is used to simplify using systems software?

A. spreadsheet
B. operating environment
C. timesharing
D. multitasking
E. None of the above
Answer» D. multitasking
2660.

Advantage(s) of using assembly language rather than machine language is (are):

A. It is mnemonic and easy to read.
B. Addresses any symbolic, not absolute
C. Introduction of data to program is easier
D. all of the above
E. None of the above
Answer» E. None of the above
2661.

The initial value of the semaphore that allows only one of the many processes to enter their critical sections, is

A. 8
B. 1
C. 16
D. 0
E. None of the above
Answer» C. 16
2662.

A page fault

A. is an error is a specific page
B. occurs when a program accesses a page of memory
C. is an access to a page not currently in memory
D. is a reference to a page belonging to another program
E. None of the above
Answer» D. is a reference to a page belonging to another program
2663.

Changing oil in an automobile is an example of

A. preventative maintenance
B. scheduled maintenance
C. both (a) and (b)
D. neither (a) nor (b)
E. None of the above
Answer» D. neither (a) nor (b)
2664.

The parts of a system may be analyzed in the sequence

A. outputs, objective, management, information processor, input, transformation
B. objectives, outputs, management, information processor, input, transformation
C. objectives, outputs, information processor, management, input transformation
D. outputs, inputs, objectives, management, information processor, transformation
E. None of the above
Answer» C. objectives, outputs, information processor, management, input transformation
2665.

In applying the systems approach, the manager proceeds from the

A. super system to the system to the subsystem level
B. system to the sulpersystem to the subsystem level
C. subsystem to the system to the supersystem level
D. supersystem to the supersystem to the system level.
E. None of the above
Answer» B. system to the sulpersystem to the subsystem level
2666.

Data is gathered, describing what is happening in the

A. input area
B. transformation
C. output area
D. All of the above
E. None of the above
Answer» E. None of the above
2667.

Ideally, the chairman of the MIS committee should be the

A. vice-president of manufacturing
B. vice-president of marketing
C. vice-president of finance
D. All of the above
E. None of the above.
Answer» F.
2668.

The paperwork that travels with the materials through the production process is called a

A. shop packet
B. weigh bill
C. picking ticket
D. work order
E. None of the above
Answer» B. weigh bill
2669.

The working set theory of programming behaviour of processes running within an operating system involves

A. the collection of pages that a process accesses
B. disk scheduling mechanisms
C. coalescing holes in memory
D. assigning the CPU to processes
E. None of the above
Answer» B. disk scheduling mechanisms
2670.

The way of thinking that might facilitate attainment of a single, integrated information system is the

A. marketing concept
B. marketing mix
C. marketing grid
D. marketing matrix
E. None of the above
Answer» B. marketing mix
2671.

A characteristic of a distributed MIS structure is:

A. computers supporting local DP operations
B. a multiprocessing environment
C. integrative sharing of the workload
D. All of the above
E. None of the above
Answer» D. All of the above
2672.

Operating system is

A. A collection of hardware components
B. A collection of input-output devices
C. A collection of software routines
D. All of the above
E. None of the above
Answer» D. All of the above
2673.

A file organization component of a VSAM file is:

A. relative record data set
B. keyed sequential data set
C. entry sequential data set
D. all of the above
E. None of the above
Answer» E. None of the above
2674.

What is the name given to the software which can be legally compiled and often used for free?

A. Shareware program
B. Public domain program
C. Firmware program
D. Mindware
E. None of the above
Answer» C. Firmware program
2675.

The SJF algorithm executes first the job

A. that last entered the queue
B. that first entered the queue
C. that has been in the queue the longest
D. with the least processor needs
E. None of the above
Answer» E. None of the above
2676.

The advantage(s) inherent to using high level languages is (are)

A. Fewer people, less management and shorter transition in learning time
B. Improved debugging capability, and superior documentation
C. A greater degree of machine independence
D. All of the above
E. None of the above
Answer» E. None of the above
2677.

Addressing modes

A. defines the fundamental method of determining effective operand addresses
B. are variations in the use of fundamental addressing structures, or some associated actions which are related to addressing.
C. performs indicated operations on two fast registers of the machine and leave the result in one of the registers.
D. all of the above
E. None of the above
Answer» C. performs indicated operations on two fast registers of the machine and leave the result in one of the registers.
2678.

Which of the following is a type of systems software used on microcomputers?

A. MS-DOS
B. PC-DOS
C. Unix
D. All of the above
E. None of the above
Answer» E. None of the above
2679.

A Processor

A. is a device that performs a sequence of operations specified by instructions in memory.
B. is the device where information is stored
C. is a sequence of instructions
D. is typically characterized by interactive processing and time of the CPU's time to allow quick response to each user.
E. None of the above
Answer» B. is the device where information is stored
2680.

With MS-DOS which command will divide the surface of the blank floppy disk into sectors and assign a unique address to each one?

A. FORMAT command
B. FAT command
C. VER command
D. CHKDSK command
E. None of the above
Answer» B. FAT command
2681.

Multiprogramming

A. is a method of memory allocation by which the program is subdivided into equal portions, or pages and core is subdivided into equal portions or blocks.
B. consists of those addresses that may be generated by a processor during execution of a computation.
C. is a method of allocating processor time.
D. allows multiple programs to reside in separate areas of core at the time.
E. None of the above
Answer» E. None of the above
2682.

A translator is best described as

A. an application software
B. a system software
C. a hardware component
D. all of the above
E. None of the above
Answer» C. a hardware component
2683.

Data encryption

A. is mostly used by public networks
B. is mostly used by financial networks
C. cannot be used by private installations
D. is not necessary, since data cannot be intercepted
E. None of the above
Answer» C. cannot be used by private installations
2684.

The details of all external symbols and relocation formation (relocation list or map) is provided to linker by

A. Macro processor
B. Translator
C. Loader
D. Editor
E. None of the above
Answer» C. Loader
2685.

Block caches or buffer caches are used

A. to improve disk performance
B. to handle interrupts
C. to increase the capacity of the main memory
D. to speed up main memory read operation
E. None of the above
Answer» B. to handle interrupts
2686.

What is the name of the operating system that reads and reacts in terms of actual time.

A. Batch system
B. Quick response system
C. Real time system
D. Time sharing system
E. None of the above
Answer» D. Time sharing system
2687.

An incremental backup

A. should be done each month
B. uses more tapes
C. saves all files
D. saves only files that have recently changed
E. None of the above
Answer» E. None of the above
2688.

Virtual Memory

A. is a method of memory allocation by which the program is subdivided into equal portions, or pages and core is subdivided into equal portions or blocks.
B. consists of those addresses that may be generated by a processor during execution of a computation.
C. is a method of allocating processor time.
D. allows multiple programs to reside in separate areas of core at the time.
E. None of the above
Answer» C. is a method of allocating processor time.
2689.

In a magnetic disk, data is recorded in a set of concentric tracks which are subdivided into

A. periods
B. sectors
C. zones
D. groups
E. None of the above
Answer» C. zones
2690.

The dispatcher

A. actually schedules the tasks into the processor
B. puts tasks in I/O wait
C. is always small and simple
D. never changes task priorities
E. None of the above
Answer» B. puts tasks in I/O wait
2691.

System programs such as Compilers are designed so that they are

A. reenterable
B. non reusable
C. serially usable
D. recursive
E. None of the above
Answer» B. non reusable
2692.

IBM released its first PC in 1981. Can you name the operating system which was most popular at that time?

A. MS-DOS
B. PC-DOS
C. OS/360
D. CP/M
E. None of the above
Answer» E. None of the above
2693.

If the number of bits in a virtual address of a program is 16 and the page size is 0.5 K bytes, the number of pages in the virtual address space is

A. 16
B. 32
C. 64
D. 128
E. None of the above
Answer» E. None of the above
2694.

Which table is a permanent database that has an entry for each terminal symbol.

A. Terminal table
B. Literal table
C. Identifier table
D. Reductions
E. None of the above
Answer» B. Literal table
2695.

Which of the following is helpful in evaluating applications software what will best suit your needs?

A. recommendations by other users
B. computer magazines
C. objective software reviews
D. all of the above
E. None of the above
Answer» E. None of the above
2696.

What problem is solved by Dijkstra's banker's algorithm?

A. mutual exclusion
B. deadlock recovery
C. deadlock avoidance
D. cache coherence
E. None of the above
Answer» D. cache coherence
2697.

Software that measures, monitors, analyzes, and controls real-world events is called:

A. system software
B. real-time software
C. scientific software
D. business software
E. None of the above
Answer» C. scientific software
2698.

Operating system

A. links a program with the subroutines it references
B. provides a layered, user-friendly interface
C. enables the programmer to draw a flowchart
D. all of the above
E. None of the above
Answer» C. enables the programmer to draw a flowchart
2699.

Which, of the following is not true about the description of a decision table?

A. A decision table is easy to modify
B. A decision table is directly understood by the computer
C. A decision table is easy to understand
D. All of the above
E. None of the above
Answer» C. A decision table is easy to understand
2700.

Trojan-Horse programs

A. are legitimate programs that allow unauthorized access
B. do not usually work
C. are hidden programs that do not show up on the system
D. usually are immediately discovered
E. None of the above
Answer» B. do not usually work