Explore topic-wise MCQs in Computer Science.

This section includes 227 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.

51.

Indicate which, of the following, in not true about an interpreter

A. Interpreter generates an object program from the source program
B. Interpreter is a kind of translator
C. Interpreter analyses each source statement every time it is to be executed
D. All of the above
Answer» B. Interpreter is a kind of translator
52.

Assembler language

A. is usually the primary user interface
B. requires fixed-format commands
C. is a mnemonic form of machine language
D. is quite different from the SCL interpreter
Answer» D. is quite different from the SCL interpreter
53.

Which of the following system program forgoes the production of object code to generate absolute machine code and load it into the physical main storage location from which it will be executed immediately upon completion of the assembly?

A. two pass assembler
B. load-and-go assembler
C. macroprocessor
D. compiler
Answer» C. macroprocessor
54.

The term "operating system" means

A. a set of programs which controls computer working
B. the way a computer operator works
C. conversion of high level language into machine code
D. the way a floppy disk drive operates
Answer» B. the way a computer operator works
55.

Semaphores

A. synchronize critical resources to prevent deadlock
B. synchronize critical resources to prevent contention
C. are used to do I/O
D. are used for memory management
Answer» B. synchronize critical resources to prevent contention
56.

The command interpreter

A. is usually the primary user interface
B. requires fixed format commands
C. is menu drive
D. is quite different from the SCL interpreter
Answer» B. requires fixed format commands
57.

The most common security failure is

A. carelessness by users
B. depending on passwords
C. too much emphasis on preventing physical access
D. insufficient technology used to prevent breaches
Answer» B. depending on passwords
58.

The principles of structured programming forbid the use of

A. WHILE-DO
B. GOTO
C. IF-THEN-ELSE
D. DO-WHILE
Answer» C. IF-THEN-ELSE
59.

A compiler for a high-level language that runs on one machine and produces code for a different machine is called is

A. optimizing compiler
B. one pass compiler
C. cross compiler
D. multipass compiler
Answer» D. multipass compiler
60.

The function(s) of the Storage Assignment is (are)

A. to assign storage to all variables referenced in the source program.
B. to assign storage to all temporary locations that are necessary for intermediate results.
C. to assign storage to literals, and to ensure that the storage is allocate and appropriate locations are initialized.
D. all of the above
Answer» E.
61.

A task in a blocked state

A. is executable
B. is running
C. must still be placed in the run queues
D. is waiting for same temporarily unavailable resources
Answer» E.
62.

Paging

A. is a method of memory allocation by which the program is subdivided into equal portions, or pages and core is subdivided into equal portions or blocks.
B. consists of those addresses that may be generated by a processor during execution of a computation.
C. is a method of allocating processor time.
D. allows multiple programs to reside in separate areas of core at the time.
Answer» B. consists of those addresses that may be generated by a processor during execution of a computation.
63.

System programs such as Compilers are designed so that they are

A. reenterable
B. non reusable
C. serially usable
D. recursive
Answer» B. non reusable
64.

Multiprogramming systems:

A. are easier to develop than single programming system
B. execute each job faster
C. execute more jobs in the same time period
D. are used only on large mainframe computers
Answer» D. are used only on large mainframe computers
65.

What problem is solved by Dijkstra's banker's algorithm?

A. mutual exclusion
B. deadlock recovery
C. deadlock avoidance
D. cache coherence
Answer» D. cache coherence
66.

Which, of the following, is true for testing and debugging?

A. Testing checks for logical errors in the programs, while debugging is a process of correcting those errors in the program
B. Testing detects the syntax errors in the program while debugging corrects those errors in the program
C. Testing and debugging indicate the same thing
D. All of the above
Answer» B. Testing detects the syntax errors in the program while debugging corrects those errors in the program
67.

Daisy chain is a device for

A. connecting a number of controllers to a device
B. connecting a number of devices to a controller
C. interconnecting a number of devices to a number of controllers
D. all of the above
Answer» C. interconnecting a number of devices to a number of controllers
68.

The function(s) of file system is (are):

A. to provide complete file naming freedom to the users and to permit controlled sharing of files
B. to provide for long and short term storage of files with appropriate economic tradeoffs.
C. to provide security against loss of information due to system failure
D. all of the above
Answer» E.
69.

Operating system is

A. A collection of hardware components
B. A collection of input-output devices
C. A collection of software routines
D. All of the above
Answer» D. All of the above
70.

The total time to prepare a disk drive mechanism for a block of data to be read from it is

A. latency
B. latency plus transmission time
C. latency plus seek time
D. latency plus seek time plus transmission time
Answer» D. latency plus seek time plus transmission time
71.

Addressing modes

A. defines the fundamental method of determining effective operand addresses
B. are variations in the use of fundamental addressing structures, or some associated actions which are related to addressing.
C. performs indicated operations on two fast registers of the machine and leave the result in one of the registers.
D. all of the above
Answer» C. performs indicated operations on two fast registers of the machine and leave the result in one of the registers.
72.

With MS-DOS which command will divide the surface of the blank floppy disk into sectors and assign a unique address to each one?

A. FORMAT command
B. FAT command
C. VER command
D. CHKDSK command
Answer» B. FAT command
73.

Object modules generated by assemblers that contain unresolved external references are resolved for two or more object modules by a/an

A. operating system
B. loader
C. linker
D. compiler
Answer» D. compiler
74.

Data encryption

A. is mostly used by public networks
B. is mostly used by financial networks
C. cannot be used by private installations
D. is not necessary, since data cannot be intercepted
Answer» C. cannot be used by private installations
75.

Which of the following is characteristic of an operating system?

A. resource management
B. error recovery
C. memory management
D. All the above
Answer» E.
76.

A relocate program form is one which

A. cannot be made to execute in any area of storage other than the one designated for it at the time of its coding or translation.
B. consists of a program and relevant information for its relocation.
C. can itself performs the relocation of its address-sensitive portions.
D. all of the above
Answer» C. can itself performs the relocation of its address-sensitive portions.
77.

File record length

A. should always be fixed
B. Should always be variable
C. depends upon the size of the file
D. should be chosen to match the data characteristics
Answer» E.
78.

A translator is best described as

A. an application software
B. a system software
C. a hardware component
D. all of the above
Answer» C. a hardware component
79.

A disk scheduling algorithm in an operating system causes the disk arm to move back and forth across the disk surface in order to service all requests in its path. This is a

A. First come first served
B. Shortest Seek Time First (SSTE)
C. Scan
D. FIFO
Answer» D. FIFO
80.

The computational technique used to compute the disk storage address of individual records is called:

A. bubble memory
B. key fielding
C. dynamic reallocation
D. hashing
Answer» E.
81.

In a magnetic disk, data is recorded in a set of concentric tracks which are subdivided into

A. periods
B. sectors
C. zones
D. groups
Answer» C. zones
82.

Two basic types of operating systems are:

A. sequential and direct
B. batch and timesharing
C. sequential and realtime
D. batch and interactive.
Answer» E.
83.

Indicate which, of the following, is not true about Nassi-Shneiderman charts

A. These charts are type of graphical design tool
B. These charts cannot represent CASE constructs
C. These charts can represent three fundamental control structures
D. All of the above
Answer» C. These charts can represent three fundamental control structures
84.

Round-robin scheduling

A. allows interactive tasks quicker access to the processor
B. is quite complex to implement
C. gives each task the same chance at the processor
D. allows processor-bound tasks more time in the processor
Answer» D. allows processor-bound tasks more time in the processor
85.

The operating system of a computer serves as a software interface between the user and

A. hardware
B. peripheral
C. memory
D. screen
Answer» B. peripheral
86.

A file organization component of a VSAM file is:

A. relative record data set
B. keyed sequential data set
C. entry sequential data set
D. all of the above
Answer» E.
87.

Multiprogramming

A. is a method of memory allocation by which the program is subdivided into equal portions, or pages and core is subdivided into equal portions or blocks.
B. consists of those addresses that may be generated by a processor during execution of a computation.
C. is a method of allocating processor time.
D. allows multiple programs to reside in separate areas of core at the time.
Answer» E.
88.

All the time a computer is switched on, its operating system software has to stay in

A. main storage
B. primary storage
C. floppy disk
D. disk drive
Answer» C. floppy disk
89.

Information in a memory that is no longer valid or wanted is known as

A. non-volatile
B. volatile
C. surplus
D. garbage
Answer» E.
90.

Which policy replace a page if it is not in the favoured subset of a process's pages?

A. FIFO
B. LRU
C. LFU
D. Working set
Answer» E.
91.

A partitioned data set is most used for

A. a program or source library
B. storing program data
C. storing backup information
D. storing ISAM files
Answer» B. storing program data
92.

Which of the following is true for machine language.

A. Repeated execution of program segments
B. Depicting flow of data in a system
C. A sequence of instructions which, when followed properly, solves a problem
D. the language which communicates with the computer using only the binary digits 1 and 0.
Answer» E.
93.

The technique, for sharing the time of a computer among several jobs. Which switches jobs so rapidly such that each job appears to have the computer to itself:

A. time sharing
B. time out
C. time domain
D. FIFO
Answer» B. time out
94.

Which of the following can be accesses by transfer vector approach of linking?

A. External data segments
B. External subroutines
C. Data located in other procedures
D. All of the above
Answer» C. Data located in other procedures
95.

Which of the following scheduling objectives should be applied to the following: the system should admit jobs to create a mix that will keep most devices busy

A. to be fair
B. to balance resource utilization
C. to obey priorities
D. to be predictable
Answer» C. to obey priorities
96.

Most of the microcomputer's operating systems like Apple DOS, MS DOS and PC DOS etc. are called disk operating systems because

A. they are memory resident
B. they are initially stored on disk
C. they are available on magnetic tapes
D. they are partly in primary memory and partly on disk
Answer» C. they are available on magnetic tapes
97.

Which is a permanent database in the general model of compiler?

A. Literal Table
B. Identifier Table
C. Terminal Table
D. Source code
Answer» D. Source code
98.

Which of the following is not a characteristic of a daisy chaining priority control scheme?

A. priority is programmable
B. it is relatively easy to add more devices to the chain
C. the failure of one device may affect other devices on the chain
D. the number of control lines is independent of the number of devices on the chain
Answer» B. it is relatively easy to add more devices to the chain
99.

Software that measures, monitors, analyzes, and controls real-world events is called:

A. system software
B. real-time software
C. scientific software
D. business software
Answer» C. scientific software
100.

In which of the storage placement strategies a program is placed in the smallest available hole in the main memory?

A. best fit
B. first fit
C. worst fit
D. buddy
Answer» B. first fit