

MCQOPTIONS
Saved Bookmarks
This section includes 227 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.
51. |
Indicate which, of the following, in not true about an interpreter |
A. | Interpreter generates an object program from the source program |
B. | Interpreter is a kind of translator |
C. | Interpreter analyses each source statement every time it is to be executed |
D. | All of the above |
Answer» B. Interpreter is a kind of translator | |
52. |
Assembler language |
A. | is usually the primary user interface |
B. | requires fixed-format commands |
C. | is a mnemonic form of machine language |
D. | is quite different from the SCL interpreter |
Answer» D. is quite different from the SCL interpreter | |
53. |
Which of the following system program forgoes the production of object code to generate absolute machine code and load it into the physical main storage location from which it will be executed immediately upon completion of the assembly? |
A. | two pass assembler |
B. | load-and-go assembler |
C. | macroprocessor |
D. | compiler |
Answer» C. macroprocessor | |
54. |
The term "operating system" means |
A. | a set of programs which controls computer working |
B. | the way a computer operator works |
C. | conversion of high level language into machine code |
D. | the way a floppy disk drive operates |
Answer» B. the way a computer operator works | |
55. |
Semaphores |
A. | synchronize critical resources to prevent deadlock |
B. | synchronize critical resources to prevent contention |
C. | are used to do I/O |
D. | are used for memory management |
Answer» B. synchronize critical resources to prevent contention | |
56. |
The command interpreter |
A. | is usually the primary user interface |
B. | requires fixed format commands |
C. | is menu drive |
D. | is quite different from the SCL interpreter |
Answer» B. requires fixed format commands | |
57. |
The most common security failure is |
A. | carelessness by users |
B. | depending on passwords |
C. | too much emphasis on preventing physical access |
D. | insufficient technology used to prevent breaches |
Answer» B. depending on passwords | |
58. |
The principles of structured programming forbid the use of |
A. | WHILE-DO |
B. | GOTO |
C. | IF-THEN-ELSE |
D. | DO-WHILE |
Answer» C. IF-THEN-ELSE | |
59. |
A compiler for a high-level language that runs on one machine and produces code for a different machine is called is |
A. | optimizing compiler |
B. | one pass compiler |
C. | cross compiler |
D. | multipass compiler |
Answer» D. multipass compiler | |
60. |
The function(s) of the Storage Assignment is (are) |
A. | to assign storage to all variables referenced in the source program. |
B. | to assign storage to all temporary locations that are necessary for intermediate results. |
C. | to assign storage to literals, and to ensure that the storage is allocate and appropriate locations are initialized. |
D. | all of the above |
Answer» E. | |
61. |
A task in a blocked state |
A. | is executable |
B. | is running |
C. | must still be placed in the run queues |
D. | is waiting for same temporarily unavailable resources |
Answer» E. | |
62. |
Paging |
A. | is a method of memory allocation by which the program is subdivided into equal portions, or pages and core is subdivided into equal portions or blocks. |
B. | consists of those addresses that may be generated by a processor during execution of a computation. |
C. | is a method of allocating processor time. |
D. | allows multiple programs to reside in separate areas of core at the time. |
Answer» B. consists of those addresses that may be generated by a processor during execution of a computation. | |
63. |
System programs such as Compilers are designed so that they are |
A. | reenterable |
B. | non reusable |
C. | serially usable |
D. | recursive |
Answer» B. non reusable | |
64. |
Multiprogramming systems: |
A. | are easier to develop than single programming system |
B. | execute each job faster |
C. | execute more jobs in the same time period |
D. | are used only on large mainframe computers |
Answer» D. are used only on large mainframe computers | |
65. |
What problem is solved by Dijkstra's banker's algorithm? |
A. | mutual exclusion |
B. | deadlock recovery |
C. | deadlock avoidance |
D. | cache coherence |
Answer» D. cache coherence | |
66. |
Which, of the following, is true for testing and debugging? |
A. | Testing checks for logical errors in the programs, while debugging is a process of correcting those errors in the program |
B. | Testing detects the syntax errors in the program while debugging corrects those errors in the program |
C. | Testing and debugging indicate the same thing |
D. | All of the above |
Answer» B. Testing detects the syntax errors in the program while debugging corrects those errors in the program | |
67. |
Daisy chain is a device for |
A. | connecting a number of controllers to a device |
B. | connecting a number of devices to a controller |
C. | interconnecting a number of devices to a number of controllers |
D. | all of the above |
Answer» C. interconnecting a number of devices to a number of controllers | |
68. |
The function(s) of file system is (are): |
A. | to provide complete file naming freedom to the users and to permit controlled sharing of files |
B. | to provide for long and short term storage of files with appropriate economic tradeoffs. |
C. | to provide security against loss of information due to system failure |
D. | all of the above |
Answer» E. | |
69. |
Operating system is |
A. | A collection of hardware components |
B. | A collection of input-output devices |
C. | A collection of software routines |
D. | All of the above |
Answer» D. All of the above | |
70. |
The total time to prepare a disk drive mechanism for a block of data to be read from it is |
A. | latency |
B. | latency plus transmission time |
C. | latency plus seek time |
D. | latency plus seek time plus transmission time |
Answer» D. latency plus seek time plus transmission time | |
71. |
Addressing modes |
A. | defines the fundamental method of determining effective operand addresses |
B. | are variations in the use of fundamental addressing structures, or some associated actions which are related to addressing. |
C. | performs indicated operations on two fast registers of the machine and leave the result in one of the registers. |
D. | all of the above |
Answer» C. performs indicated operations on two fast registers of the machine and leave the result in one of the registers. | |
72. |
With MS-DOS which command will divide the surface of the blank floppy disk into sectors and assign a unique address to each one? |
A. | FORMAT command |
B. | FAT command |
C. | VER command |
D. | CHKDSK command |
Answer» B. FAT command | |
73. |
Object modules generated by assemblers that contain unresolved external references are resolved for two or more object modules by a/an |
A. | operating system |
B. | loader |
C. | linker |
D. | compiler |
Answer» D. compiler | |
74. |
Data encryption |
A. | is mostly used by public networks |
B. | is mostly used by financial networks |
C. | cannot be used by private installations |
D. | is not necessary, since data cannot be intercepted |
Answer» C. cannot be used by private installations | |
75. |
Which of the following is characteristic of an operating system? |
A. | resource management |
B. | error recovery |
C. | memory management |
D. | All the above |
Answer» E. | |
76. |
A relocate program form is one which |
A. | cannot be made to execute in any area of storage other than the one designated for it at the time of its coding or translation. |
B. | consists of a program and relevant information for its relocation. |
C. | can itself performs the relocation of its address-sensitive portions. |
D. | all of the above |
Answer» C. can itself performs the relocation of its address-sensitive portions. | |
77. |
File record length |
A. | should always be fixed |
B. | Should always be variable |
C. | depends upon the size of the file |
D. | should be chosen to match the data characteristics |
Answer» E. | |
78. |
A translator is best described as |
A. | an application software |
B. | a system software |
C. | a hardware component |
D. | all of the above |
Answer» C. a hardware component | |
79. |
A disk scheduling algorithm in an operating system causes the disk arm to move back and forth across the disk surface in order to service all requests in its path. This is a |
A. | First come first served |
B. | Shortest Seek Time First (SSTE) |
C. | Scan |
D. | FIFO |
Answer» D. FIFO | |
80. |
The computational technique used to compute the disk storage address of individual records is called: |
A. | bubble memory |
B. | key fielding |
C. | dynamic reallocation |
D. | hashing |
Answer» E. | |
81. |
In a magnetic disk, data is recorded in a set of concentric tracks which are subdivided into |
A. | periods |
B. | sectors |
C. | zones |
D. | groups |
Answer» C. zones | |
82. |
Two basic types of operating systems are: |
A. | sequential and direct |
B. | batch and timesharing |
C. | sequential and realtime |
D. | batch and interactive. |
Answer» E. | |
83. |
Indicate which, of the following, is not true about Nassi-Shneiderman charts |
A. | These charts are type of graphical design tool |
B. | These charts cannot represent CASE constructs |
C. | These charts can represent three fundamental control structures |
D. | All of the above |
Answer» C. These charts can represent three fundamental control structures | |
84. |
Round-robin scheduling |
A. | allows interactive tasks quicker access to the processor |
B. | is quite complex to implement |
C. | gives each task the same chance at the processor |
D. | allows processor-bound tasks more time in the processor |
Answer» D. allows processor-bound tasks more time in the processor | |
85. |
The operating system of a computer serves as a software interface between the user and |
A. | hardware |
B. | peripheral |
C. | memory |
D. | screen |
Answer» B. peripheral | |
86. |
A file organization component of a VSAM file is: |
A. | relative record data set |
B. | keyed sequential data set |
C. | entry sequential data set |
D. | all of the above |
Answer» E. | |
87. |
Multiprogramming |
A. | is a method of memory allocation by which the program is subdivided into equal portions, or pages and core is subdivided into equal portions or blocks. |
B. | consists of those addresses that may be generated by a processor during execution of a computation. |
C. | is a method of allocating processor time. |
D. | allows multiple programs to reside in separate areas of core at the time. |
Answer» E. | |
88. |
All the time a computer is switched on, its operating system software has to stay in |
A. | main storage |
B. | primary storage |
C. | floppy disk |
D. | disk drive |
Answer» C. floppy disk | |
89. |
Information in a memory that is no longer valid or wanted is known as |
A. | non-volatile |
B. | volatile |
C. | surplus |
D. | garbage |
Answer» E. | |
90. |
Which policy replace a page if it is not in the favoured subset of a process's pages? |
A. | FIFO |
B. | LRU |
C. | LFU |
D. | Working set |
Answer» E. | |
91. |
A partitioned data set is most used for |
A. | a program or source library |
B. | storing program data |
C. | storing backup information |
D. | storing ISAM files |
Answer» B. storing program data | |
92. |
Which of the following is true for machine language. |
A. | Repeated execution of program segments |
B. | Depicting flow of data in a system |
C. | A sequence of instructions which, when followed properly, solves a problem |
D. | the language which communicates with the computer using only the binary digits 1 and 0. |
Answer» E. | |
93. |
The technique, for sharing the time of a computer among several jobs. Which switches jobs so rapidly such that each job appears to have the computer to itself: |
A. | time sharing |
B. | time out |
C. | time domain |
D. | FIFO |
Answer» B. time out | |
94. |
Which of the following can be accesses by transfer vector approach of linking? |
A. | External data segments |
B. | External subroutines |
C. | Data located in other procedures |
D. | All of the above |
Answer» C. Data located in other procedures | |
95. |
Which of the following scheduling objectives should be applied to the following: the system should admit jobs to create a mix that will keep most devices busy |
A. | to be fair |
B. | to balance resource utilization |
C. | to obey priorities |
D. | to be predictable |
Answer» C. to obey priorities | |
96. |
Most of the microcomputer's operating systems like Apple DOS, MS DOS and PC DOS etc. are called disk operating systems because |
A. | they are memory resident |
B. | they are initially stored on disk |
C. | they are available on magnetic tapes |
D. | they are partly in primary memory and partly on disk |
Answer» C. they are available on magnetic tapes | |
97. |
Which is a permanent database in the general model of compiler? |
A. | Literal Table |
B. | Identifier Table |
C. | Terminal Table |
D. | Source code |
Answer» D. Source code | |
98. |
Which of the following is not a characteristic of a daisy chaining priority control scheme? |
A. | priority is programmable |
B. | it is relatively easy to add more devices to the chain |
C. | the failure of one device may affect other devices on the chain |
D. | the number of control lines is independent of the number of devices on the chain |
Answer» B. it is relatively easy to add more devices to the chain | |
99. |
Software that measures, monitors, analyzes, and controls real-world events is called: |
A. | system software |
B. | real-time software |
C. | scientific software |
D. | business software |
Answer» C. scientific software | |
100. |
In which of the storage placement strategies a program is placed in the smallest available hole in the main memory? |
A. | best fit |
B. | first fit |
C. | worst fit |
D. | buddy |
Answer» B. first fit | |