MCQOPTIONS
Saved Bookmarks
This section includes 4320 Mcqs, each offering curated multiple-choice questions to sharpen your Engineering knowledge and support exam preparation. Choose a topic below to get started.
| 2651. |
A public key encryption system |
| A. | allows anyone to decode the transmission |
| B. | allows only the correct sender to decode the data |
| C. | allows only the correct receiver to decode the data |
| D. | does not encode the data before transmitting it |
| E. | None of the above |
| Answer» D. does not encode the data before transmitting it | |
| 2652. |
The function(s) of file system is (are): |
| A. | to provide complete file naming freedom to the users and to permit controlled sharing of files |
| B. | to provide for long and short term storage of files with appropriate economic tradeoffs. |
| C. | to provide security against loss of information due to system failure |
| D. | all of the above |
| E. | None of the above |
| Answer» E. None of the above | |
| 2653. |
An instruction in a programming language that is replaced by a sequence of instructions prior to assembly or compiling is known as |
| A. | procedure name |
| B. | macro |
| C. | label |
| D. | literal |
| E. | None of the above |
| Answer» C. label | |
| 2654. |
A program |
| A. | is a device that performs a sequence of operations specified by instructions in memory. |
| B. | is the device where information is stored |
| C. | is a sequence of instructions |
| D. | is typically characterized by interactive processing and time of the CPU's time to allow quick response to each user. |
| E. | None of the above |
| Answer» D. is typically characterized by interactive processing and time of the CPU's time to allow quick response to each user. | |
| 2655. |
Banker's algorithm for resource allocation deals with |
| A. | deadlock prevention |
| B. | deadlock avoidance |
| C. | deadlock recovery |
| D. | mutual exclusion |
| E. | None of the above |
| Answer» C. deadlock recovery | |
| 2656. |
In which of the storage placement strategies a program is placed in the largest available hole in the main memory? |
| A. | best fit |
| B. | first fit |
| C. | worst fit |
| D. | buddy |
| E. | None of the above |
| Answer» D. buddy | |
| 2657. |
Which of the following is a block device |
| A. | mouse |
| B. | printer |
| C. | terminals |
| D. | disk |
| E. | None of the above |
| Answer» E. None of the above | |
| 2658. |
The problem of thrashing is affected significantly by: |
| A. | program structure |
| B. | program size |
| C. | primary-storage size |
| D. | all of the above |
| E. | None of the above |
| Answer» B. program size | |
| 2659. |
Which of the following software types is used to simplify using systems software? |
| A. | spreadsheet |
| B. | operating environment |
| C. | timesharing |
| D. | multitasking |
| E. | None of the above |
| Answer» D. multitasking | |
| 2660. |
Advantage(s) of using assembly language rather than machine language is (are): |
| A. | It is mnemonic and easy to read. |
| B. | Addresses any symbolic, not absolute |
| C. | Introduction of data to program is easier |
| D. | all of the above |
| E. | None of the above |
| Answer» E. None of the above | |
| 2661. |
The initial value of the semaphore that allows only one of the many processes to enter their critical sections, is |
| A. | 8 |
| B. | 1 |
| C. | 16 |
| D. | 0 |
| E. | None of the above |
| Answer» C. 16 | |
| 2662. |
A page fault |
| A. | is an error is a specific page |
| B. | occurs when a program accesses a page of memory |
| C. | is an access to a page not currently in memory |
| D. | is a reference to a page belonging to another program |
| E. | None of the above |
| Answer» D. is a reference to a page belonging to another program | |
| 2663. |
Changing oil in an automobile is an example of |
| A. | preventative maintenance |
| B. | scheduled maintenance |
| C. | both (a) and (b) |
| D. | neither (a) nor (b) |
| E. | None of the above |
| Answer» D. neither (a) nor (b) | |
| 2664. |
The parts of a system may be analyzed in the sequence |
| A. | outputs, objective, management, information processor, input, transformation |
| B. | objectives, outputs, management, information processor, input, transformation |
| C. | objectives, outputs, information processor, management, input transformation |
| D. | outputs, inputs, objectives, management, information processor, transformation |
| E. | None of the above |
| Answer» C. objectives, outputs, information processor, management, input transformation | |
| 2665. |
In applying the systems approach, the manager proceeds from the |
| A. | super system to the system to the subsystem level |
| B. | system to the sulpersystem to the subsystem level |
| C. | subsystem to the system to the supersystem level |
| D. | supersystem to the supersystem to the system level. |
| E. | None of the above |
| Answer» B. system to the sulpersystem to the subsystem level | |
| 2666. |
Data is gathered, describing what is happening in the |
| A. | input area |
| B. | transformation |
| C. | output area |
| D. | All of the above |
| E. | None of the above |
| Answer» E. None of the above | |
| 2667. |
Ideally, the chairman of the MIS committee should be the |
| A. | vice-president of manufacturing |
| B. | vice-president of marketing |
| C. | vice-president of finance |
| D. | All of the above |
| E. | None of the above. |
| Answer» F. | |
| 2668. |
The paperwork that travels with the materials through the production process is called a |
| A. | shop packet |
| B. | weigh bill |
| C. | picking ticket |
| D. | work order |
| E. | None of the above |
| Answer» B. weigh bill | |
| 2669. |
The working set theory of programming behaviour of processes running within an operating system involves |
| A. | the collection of pages that a process accesses |
| B. | disk scheduling mechanisms |
| C. | coalescing holes in memory |
| D. | assigning the CPU to processes |
| E. | None of the above |
| Answer» B. disk scheduling mechanisms | |
| 2670. |
The way of thinking that might facilitate attainment of a single, integrated information system is the |
| A. | marketing concept |
| B. | marketing mix |
| C. | marketing grid |
| D. | marketing matrix |
| E. | None of the above |
| Answer» B. marketing mix | |
| 2671. |
A characteristic of a distributed MIS structure is: |
| A. | computers supporting local DP operations |
| B. | a multiprocessing environment |
| C. | integrative sharing of the workload |
| D. | All of the above |
| E. | None of the above |
| Answer» D. All of the above | |
| 2672. |
Operating system is |
| A. | A collection of hardware components |
| B. | A collection of input-output devices |
| C. | A collection of software routines |
| D. | All of the above |
| E. | None of the above |
| Answer» D. All of the above | |
| 2673. |
A file organization component of a VSAM file is: |
| A. | relative record data set |
| B. | keyed sequential data set |
| C. | entry sequential data set |
| D. | all of the above |
| E. | None of the above |
| Answer» E. None of the above | |
| 2674. |
What is the name given to the software which can be legally compiled and often used for free? |
| A. | Shareware program |
| B. | Public domain program |
| C. | Firmware program |
| D. | Mindware |
| E. | None of the above |
| Answer» C. Firmware program | |
| 2675. |
The SJF algorithm executes first the job |
| A. | that last entered the queue |
| B. | that first entered the queue |
| C. | that has been in the queue the longest |
| D. | with the least processor needs |
| E. | None of the above |
| Answer» E. None of the above | |
| 2676. |
The advantage(s) inherent to using high level languages is (are) |
| A. | Fewer people, less management and shorter transition in learning time |
| B. | Improved debugging capability, and superior documentation |
| C. | A greater degree of machine independence |
| D. | All of the above |
| E. | None of the above |
| Answer» E. None of the above | |
| 2677. |
Addressing modes |
| A. | defines the fundamental method of determining effective operand addresses |
| B. | are variations in the use of fundamental addressing structures, or some associated actions which are related to addressing. |
| C. | performs indicated operations on two fast registers of the machine and leave the result in one of the registers. |
| D. | all of the above |
| E. | None of the above |
| Answer» C. performs indicated operations on two fast registers of the machine and leave the result in one of the registers. | |
| 2678. |
Which of the following is a type of systems software used on microcomputers? |
| A. | MS-DOS |
| B. | PC-DOS |
| C. | Unix |
| D. | All of the above |
| E. | None of the above |
| Answer» E. None of the above | |
| 2679. |
A Processor |
| A. | is a device that performs a sequence of operations specified by instructions in memory. |
| B. | is the device where information is stored |
| C. | is a sequence of instructions |
| D. | is typically characterized by interactive processing and time of the CPU's time to allow quick response to each user. |
| E. | None of the above |
| Answer» B. is the device where information is stored | |
| 2680. |
With MS-DOS which command will divide the surface of the blank floppy disk into sectors and assign a unique address to each one? |
| A. | FORMAT command |
| B. | FAT command |
| C. | VER command |
| D. | CHKDSK command |
| E. | None of the above |
| Answer» B. FAT command | |
| 2681. |
Multiprogramming |
| A. | is a method of memory allocation by which the program is subdivided into equal portions, or pages and core is subdivided into equal portions or blocks. |
| B. | consists of those addresses that may be generated by a processor during execution of a computation. |
| C. | is a method of allocating processor time. |
| D. | allows multiple programs to reside in separate areas of core at the time. |
| E. | None of the above |
| Answer» E. None of the above | |
| 2682. |
A translator is best described as |
| A. | an application software |
| B. | a system software |
| C. | a hardware component |
| D. | all of the above |
| E. | None of the above |
| Answer» C. a hardware component | |
| 2683. |
Data encryption |
| A. | is mostly used by public networks |
| B. | is mostly used by financial networks |
| C. | cannot be used by private installations |
| D. | is not necessary, since data cannot be intercepted |
| E. | None of the above |
| Answer» C. cannot be used by private installations | |
| 2684. |
The details of all external symbols and relocation formation (relocation list or map) is provided to linker by |
| A. | Macro processor |
| B. | Translator |
| C. | Loader |
| D. | Editor |
| E. | None of the above |
| Answer» C. Loader | |
| 2685. |
Block caches or buffer caches are used |
| A. | to improve disk performance |
| B. | to handle interrupts |
| C. | to increase the capacity of the main memory |
| D. | to speed up main memory read operation |
| E. | None of the above |
| Answer» B. to handle interrupts | |
| 2686. |
What is the name of the operating system that reads and reacts in terms of actual time. |
| A. | Batch system |
| B. | Quick response system |
| C. | Real time system |
| D. | Time sharing system |
| E. | None of the above |
| Answer» D. Time sharing system | |
| 2687. |
An incremental backup |
| A. | should be done each month |
| B. | uses more tapes |
| C. | saves all files |
| D. | saves only files that have recently changed |
| E. | None of the above |
| Answer» E. None of the above | |
| 2688. |
Virtual Memory |
| A. | is a method of memory allocation by which the program is subdivided into equal portions, or pages and core is subdivided into equal portions or blocks. |
| B. | consists of those addresses that may be generated by a processor during execution of a computation. |
| C. | is a method of allocating processor time. |
| D. | allows multiple programs to reside in separate areas of core at the time. |
| E. | None of the above |
| Answer» C. is a method of allocating processor time. | |
| 2689. |
In a magnetic disk, data is recorded in a set of concentric tracks which are subdivided into |
| A. | periods |
| B. | sectors |
| C. | zones |
| D. | groups |
| E. | None of the above |
| Answer» C. zones | |
| 2690. |
The dispatcher |
| A. | actually schedules the tasks into the processor |
| B. | puts tasks in I/O wait |
| C. | is always small and simple |
| D. | never changes task priorities |
| E. | None of the above |
| Answer» B. puts tasks in I/O wait | |
| 2691. |
System programs such as Compilers are designed so that they are |
| A. | reenterable |
| B. | non reusable |
| C. | serially usable |
| D. | recursive |
| E. | None of the above |
| Answer» B. non reusable | |
| 2692. |
IBM released its first PC in 1981. Can you name the operating system which was most popular at that time? |
| A. | MS-DOS |
| B. | PC-DOS |
| C. | OS/360 |
| D. | CP/M |
| E. | None of the above |
| Answer» E. None of the above | |
| 2693. |
If the number of bits in a virtual address of a program is 16 and the page size is 0.5 K bytes, the number of pages in the virtual address space is |
| A. | 16 |
| B. | 32 |
| C. | 64 |
| D. | 128 |
| E. | None of the above |
| Answer» E. None of the above | |
| 2694. |
Which table is a permanent database that has an entry for each terminal symbol. |
| A. | Terminal table |
| B. | Literal table |
| C. | Identifier table |
| D. | Reductions |
| E. | None of the above |
| Answer» B. Literal table | |
| 2695. |
Which of the following is helpful in evaluating applications software what will best suit your needs? |
| A. | recommendations by other users |
| B. | computer magazines |
| C. | objective software reviews |
| D. | all of the above |
| E. | None of the above |
| Answer» E. None of the above | |
| 2696. |
What problem is solved by Dijkstra's banker's algorithm? |
| A. | mutual exclusion |
| B. | deadlock recovery |
| C. | deadlock avoidance |
| D. | cache coherence |
| E. | None of the above |
| Answer» D. cache coherence | |
| 2697. |
Software that measures, monitors, analyzes, and controls real-world events is called: |
| A. | system software |
| B. | real-time software |
| C. | scientific software |
| D. | business software |
| E. | None of the above |
| Answer» C. scientific software | |
| 2698. |
Operating system |
| A. | links a program with the subroutines it references |
| B. | provides a layered, user-friendly interface |
| C. | enables the programmer to draw a flowchart |
| D. | all of the above |
| E. | None of the above |
| Answer» C. enables the programmer to draw a flowchart | |
| 2699. |
Which, of the following is not true about the description of a decision table? |
| A. | A decision table is easy to modify |
| B. | A decision table is directly understood by the computer |
| C. | A decision table is easy to understand |
| D. | All of the above |
| E. | None of the above |
| Answer» C. A decision table is easy to understand | |
| 2700. |
Trojan-Horse programs |
| A. | are legitimate programs that allow unauthorized access |
| B. | do not usually work |
| C. | are hidden programs that do not show up on the system |
| D. | usually are immediately discovered |
| E. | None of the above |
| Answer» B. do not usually work | |