Explore topic-wise MCQs in C Programming.

This section includes 391 Mcqs, each offering curated multiple-choice questions to sharpen your C Programming knowledge and support exam preparation. Choose a topic below to get started.

251.

In daisy chaining device 0 will pass the signal only if it has..

A. Interrupt request
B. No interrupt request
C. Both a and b
D. None of the above
Answer» C. Both a and b
252.

The average time required to reach a storage location in memory and obtain its contents is called the

A. seek time
B. turnaround time
C. access time
D. transfer time
Answer» D. transfer time
253.

Which interrupt is unmaskable…??

A. RST 5.5
B. RST 7.5
C. TRAP
D. Both a and b
Answer» D. Both a and b
254.

The average time for reading/writing the 512-byte sector for the disk rotating at 10,000 RPM when its time is 6 ms, its transfer rate is 50 MB/sec, and its controller overhead is 0.2 ms

A. 2ms
B. 3.3ms
C. 4.7ms
D. 5ms
Answer» D. 5ms
255.

The peak rate which transfer data between the I/O device and the main-memory, is known as

A. Bit rate
B. Data rate
C. Hit time
D. Hit miss
Answer» C. Hit time
256.

A scheme in which portions of the I/O address space are given to I/O devices, is called

A. Data mapped
B. Memory-mapped I/O
C. Backplane
D. both a and b
Answer» C. Backplane
257.

The data transfer rate is given by the formula

A. Transfer size- transfer time
B. Transfer size transfer time
C. Transfer size+transfer time
D. Transfer size*transfer time
Answer» C. Transfer size+transfer time
258.

The higher availability cost is reduced to 1/N, where N is the

A. No of disks
B. Reliability
C. Seek
D. Bit rate
Answer» B. Reliability
259.

DMA interface unit eliminates the need to use CPU registers to transfer data from

A. MAR to MBR
B. MBR to MAR
C. I/O units to memory
D. Memory to I/O units
Answer» E.
260.

_________ method is used to establish priority by serially connecting all devices that request an interrupt.

A. Vectored-interrupting
B. Daisy chain
C. Priority
D. Polling
Answer» C. Priority
261.

The resistor which is attached to the service line is called _____.

A. Push-down resistor
B. Pull-up resistor
C. Break down resistor
D. Line resistor
Answer» C. Break down resistor
262.

______ type circuits are generally used for interrupt service linesi) open-collectorii) open-drainiii) XORiv) XNOR

A. i,ii
B. ii
C. ii,iii
D. ii,iv
Answer» B. ii
263.

Which table handle stores the addresses of the interrupt handling sub-routines

A. Interrupt-vector table
B. Vector table
C. Symbol link table
D. None of these
Answer» B. Vector table
264.

For accessing data, the operating system must direct the disk using three-stage process called

A. Seek
B. Peek
C. Geek
D. Leek
Answer» B. Peek
265.

The hardware component replacing while the system is being run, is known as

A. Cold swapping
B. Blocking cache
C. Hit time
D. Hot swapping
Answer» E.
266.

The processor indicates to the devices that it is ready to recieve interrupts

A. By enabling the interrupt request line
B. By enabling the IRQ bits
C. By activating the interrupt acknowledge line
D. Either a or b
Answer» D. Either a or b
267.

____ register is used for the purpose of controlling the status of each interrupt request in parallel priority interrupt.

A. Mass
B. Mark
C. Make
D. Mask
Answer» E.
268.

Spread of data in the multiple disks, is refered to as

A. SCSI
B. RAID
C. Striping
D. Hit rate
Answer» D. Hit rate
269.

When dealing with multiple device interrupts , which mechanism is easy to implement

A. Polling method
B. Vectored interrupts
C. Interrupt nesting
D. None of the above
Answer» B. Vectored interrupts
270.

A bus connecting processor and memory, is known as

A. Processor-memory bus
B. Bus transaction
C. Backplane bus
D. Synchronous bus
Answer» B. Bus transaction
271.

The interrupt servicing mechanism in which the reqesting device identifies itself to the processor to be serviced is

A. Polling
B. Vectored interrupts
C. Interrupt nesting
D. Simultaneous requesting
Answer» C. Interrupt nesting
272.

A bus which is designed for allowing processors, I/O devices and memory, is called a

A. Processor-memory bus
B. Bus transaction
C. Synchronous bus
D. Backplane bus
Answer» E.
273.

1GB of data is referred in bytes as

A. 1,000,000,000 bytes
B. 1,000,000,0 bytes
C. 1,000,000 bytes
D. 1,00,000,000 bytes
Answer» B. 1,000,000,0 bytes
274.

Request, which is used for indicating a read request for memory, is known as

A. ReadReq
B. WriteReq
C. DataReq
D. Hot swapping
Answer» B. WriteReq
275.

A unit on the bus that initiates bus requests is called

A. Slave
B. Controller master
C. Striping
D. Bus master
Answer» E.
276.

To improve the availability of storage of disk, leveraging redundancy is captured in the

A. SCSI
B. RAID
C. SRAM
D. DRAM
Answer» C. SRAM
277.

1000 disks having 1,200,000-hour MTTF and disks being used 24 hours a day, and failed disks are being replaced with a new ones, then no that will fail over five years (43,800 hours) is,

A. 25
B. 30
C. 36
D. 40
Answer» D. 40
278.

Reads/writes requests to I/O devices, are called

A. Input request
B. Output request
C. I/O requests
D. Peripheral requests
Answer» D. Peripheral requests
279.

Measuring the continuous service accomplishment and equivalently of the time to failure from a reference point is called

A. Reference
B. Reliability
C. Hit time
D. Hit rate
Answer» C. Hit time
280.

______ interrupt method uses register whose bits are set separately by interrupt signal for each device:

A. Parallel priority interrupt
B. Serial priority interrupt
C. Daisy chaining
D. None of the above
Answer» B. Serial priority interrupt
281.

The process that periodically checks the status of an I/O devices, is known as

A. Cold swapping
B. I/O instructions
C. Polling
D. Dealing
Answer» D. Dealing
282.

When the process is returned after an interrupt service ______ should be loaded againi) Register contentsii) Condition codesiii) Stack contentsiv) Return addresses

A. i,iv
B. ii,iii and iv
C. iii,iv
D. i,ii
Answer» E.
283.

The starting address sent by the device in vectored interrupt is called as

A. Location id
B. Interrupt vector
C. Service location
D. Service id
Answer» C. Service location
284.

The 32-bit, 33MHz PCI bus will have peak bandwidth of about

A. 111 MB/sec
B. 123 MB/sec
C. 143 MB/sec
D. 133 MB/sec
Answer» E.
285.

In vectored interrupts, how does the device identify itself to the processor..?

A. By sending its device id
B. By sending the machine code for the interrupt service routine
C. By sending the starting address of the service routine
D. Either a or c
Answer» D. Either a or c
286.

What does the following command line signify? prog1|prog2

A. It runs prog1 first, prog2 second
B. It runs prog2 first, prog1 second
C. It runs both the programs, pipes output of prog1 to input of prog2
D. It runs both the programs, pipes output of prog2 to input of prog1
Answer» D. It runs both the programs, pipes output of prog2 to input of prog1
287.

Which among the following is odd one out?

A. printf
B. fprintf
C. putchar
D. scanf
Answer» E.
288.

For a typical program, the input is taken using

A. scanf
B. Files
C. Command-line
D. All of the mentioned
Answer» E.
289.

The value of EOF is_____

A. -1
B. 0
C. 1
D. 10
Answer» B. 0
290.

In memory-mapped I/O…

A. The I/O devices and the memory share the same address space
B. The I/O devices have a seperate address space
C. The memory and I/O devices have an associated address space
D. A part of the memory is specifically set aside for the I/O operation
Answer» B. The I/O devices have a seperate address space
291.

What is the function of the mode ' w+'?

A. create text file for writing, discard previous contents if any
B. create text file for update, discard previous contents if any
C. create text file for writing, do not discard previous contents if any
D. create text file for update, do not discard previous contents if any
Answer» C. create text file for writing, do not discard previous contents if any
292.

Which of the following will return a non-zero value when checked with isspace(c)?

A. blank
B. newline
C. return
D. all of the mentioned
Answer» E.
293.

What type of return-type used in String operations?

A. void only
B. void and (char *) only
C. void and int only
D. void, int and (char *) only
Answer» E.
294.

What is the purpose of sprintf?

A. It prints the data into stdout
B. It writes the formatted data into a string
C. It writes the formatted data into a file
D. None of the mentioned
Answer» C. It writes the formatted data into a file
295.

Which among the following mathematical function do not have a 'double' return-type?

A. srand(x);
B. ceil(x);
C. floor(x);
D. both ceil(x); and floor(x);
Answer» B. ceil(x);
296.

Which of the following fopen() statements are illegal?

A. fp = fopen(“abc.txt”, “r”);
B. fp = fopen(“/home/user1/abc.txt”, “w”);
C. fp = fopen(“abc”, “w”);
D. none of the mentioned
Answer» E.
297.

fwrite() can be used only with files that are opened in binary mode.

A. true
B. false
Answer» B. false
298.

Which is true about function tolower?

A. The function tolower is defined in <ctype.h>
B. Converts an uppercase letter to lowercase
C. returns other characters untouched
D. None of the mentioned
Answer» E.
299.

Which mathematical function among the following does NOT require int parameters?

A. div(x, y);
B. srand(x);
C. sqrt(x);
D. all of the mentioned
Answer» D. all of the mentioned
300.

Escape sequences are prefixed with ________

A. %
B. /
C.
D. None of the mentioned
Answer» E.