Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

mcq1

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

uestion 1: The Following Features Are Needed to Implement Top down Parsing

a) Source string marker b) Prediction making mechanism


c) Matching and Backtracking mechanism
d) All of the above
Ans: (D)
Question 2: A macro definition consists of
a) A macro prototype statement
b) One or more model statements
c) Macro pre-processor statements
d) All of the above
Ans: (D)
Question 3: The main reason to encrypt a file is to.
a) Reduce its size
b) Secure it for transmission
c) Prepare it for backup
d) Include it in the start-up sequence
Ans: (B)
Question 4: Which of the following is not a key piece of information, stored in
single page table entry, assuming pure paging and virtual memory
a) Frame number
b) A bit indicating whether the page is in physical memory or on the disk
c) A reference for the disk block that stores the page
d) None of the above
Ans: (C)

Question 5: A UNIX device driver is


a) Structured into two halves called top half and bottom half
b) Three equal partitions
c) Unstructured
d) None of the above
Ans: (A)
Question 6: The following is not a layer of IO management module
a) PIOCS (Physical Input Output Control System)
b) LIOCS (Logical Input Output Control System)
c) FS (File System)
d) MCS (Management Control System)
Ans: (D)
Question 7: Which amongst the following is not a valid page replacement policy?
a) LRU policy (Least Recently Used)
b) FIFO policy (First in first out)
c) RU policy (Recurrently used)
d) Optimal page replacement policy
Ans: (C)
Question 8: Consider a program with a linked origin of Let the memory area
allocated to it have the start address of 70000. Which amongst the following will
be the value to be loaded in relocation register?
a) 20000
b) 50000
c) 70000
d) 90000
Ans: (None of the above choice in correct.)
Question 9: An assembly language is a
a) low level programming language
b) Middle level programming language
c) High level programming language
d) Internet based programming language
Ans: (A)
Question 10: TII stands for
a) Table of incomplete instructions
b) table of information instructions
c) Translation of instructions information
d) translation of information instruction
Ans: (A)
Question 11: An analysis, which determines the syntactic structure of the source
statement, is called
a) Semantic analysis
b) process analysis
c) Syntax analysis
d) function analysis
Ans: (C)
Question 12: Action implementing instruction’s meaning are an actually carried
out by
a) Instruction fetch
b) Instruction decode
c) Instruction execution
d) Instruction program
Ans: (C)
Question 13: The field that contains a segment index or an internal index is
called
a) target datum
b) target offset
c) Segment field
d) fix data
Ans: (A)
Question 14: A program in execution is called
a) Process
b) function
c) CPU
d) Memory
Ans: (A)

Question 15: Jobs which are admitted to the system for processing is called
a) long-term scheduling
b) short-term scheduling
c) Medium-term scheduling
d) queuing
Ans: (A)
Question 16: A set of techniques that allow to execute a program which is not
entirely in memory is called
a) demand paging
b) virtual memory
c) Auxiliary memory
d) Secondary memory
Ans: (B)
Question 17: SSTF stands for
a) Shortest-Seek-time-first scheduling
b) Small – small-time-first
c) Simple-seek-time-first
d) Small-simple-time-first scheduling
Ans: (A)
Question 18: Before proceeding with its execution, each process must acquire all
the resources it needs is called
a) hold and wait
b) No pre-emption
c) Circular wait
d) Starvation
Ans: (A)
Question 19: Virtual memory is
a) simple to implement
b) used in all major commercial operating systems
c) Less efficient in utilization of memory
d) Useful when fast I/O devices are not available
Ans: (B)
Question 20: Relocation bits used by relocating loader are specified by
a) Relocating loader itself
b) Assembler or Translator
c) Macro processor
d) Both (A) and (B)
Ans: (B)
Question 21: Resolution of externally defined symbols is performed by
a) Linker
b) Loader
c) Compiler
d) Editor
Ans: (A)
Question 22: Relocatable programs
a) cannot be used with fixed partitions
b) can be loaded almost anywhere in memory
c) Do not need a linker
d) can be loaded only at one specific location
Ans: (B)
Question 23: Page stealing
a) is a sign of efficient system
b) is taking page frames other working sets
c) Should be the tuning goal
d) Is taking larger disk spaces for pages paged out

Ans: (B)
Question 25: The total time to prepare a disk drive mechanism for a block of
data to be read from is its
a) latency
b) latency plus transmission time
c) Latency plus seek time
d) latency plus seek time plus transmission time
Ans: (C)
Question 26: To avoid race condition, the maximum number of processes that
may be simultaneously inside the critical section is
a) Zero
b) one
c) Two
d) more than two
Ans: (B)
Question 27: The memory allocation scheme subject to “external” fragmentation
is
a) Segmentation
b) swapping
c) Pure demand paging
d) multiple fixed contiguous partitions
Ans: (A)
Question 28: Page fault frequency in an operating system is reduced when the
a) processes tend to the I/O-bound
b) size of pages is reduced
c) Processes tend to be CPU-bound
d) locality of reference is applicable to the process
Ans: (D)
Question 29: In which of the following page replacement policies Ballad’s
anomaly occurs?
a) FIFO
b) LRU
c) LFU
d) NRU
Ans: (A)
Question 30: Which of the following are language processors?
a) Assembler
b) Compiler
c) Interpreter
d) All of the above
Ans: (D)
Question 31: Virtual memory can be implemented with
a) Segmentation
b) Paging
c) None
d) all of the above
Ans: (D)
Question 32: Recognition of basic syntactic constructs through reductions, this
task is performed by
a) Lexical analysis
b) Syntax analysis
c) Semantic analysis
d) Structure analysis
Ans: (B)
Question 33: A grammar for a programming language is a formal description of
a) Syntax
b) Semantics
c) Structure
d) Code
Ans: (C)
Question 35: ______ is a technique of temporarily removing inactive programs
from the memory of computer system
a) Swapping
b) Spooling
c) Semaphore
d) Scheduler
Ans: (A)
Question 36: is a technique of improving the priority of process waiting in Queue
for CPU allocation
a) Starvation
b) Ageing
c) Revocation
d) Relocation
Ans: (B)
Question 37: ________is the time required by a sector to reach below read/write
a) Seek Time
b) Latency Time
c) Access time
d) None
Ans: (B)
Question 38: Which of the following is most general phase structured grammar?
a) Context – Sensitive
b) Regular
c) Context – Free
d) None of the above
Ans: (A)
Question 39: File record length
a) Should always be fixed
b) Should always be variable
c) Depends upon the size of file
d) Should be chosen to match the data
Ans: (D)
Question 40: A public key encryption system
a) Allows only the correct receiver to decode the data
b) Allows only one to decode the
c) Allows only the correct sender to decode the
d) Does not encode the data before transmitting
Ans: (A)

You might also like