0

System Software

Description: Test your skills about various system software and programming languages basics like C, C++, PHP, JAVA, HTML and other
Number of Questions: 50
Created by:
Tags: System Software Programming Languages C C++ PHP JAVA HTML Software Engineering Computer Basics Computer Architect Computer Hardware Databases
Attempted 0/50 Correct 0 Score 0

Access time is the highest in case of

  1. floppy disk

  2. cache

  3. swapping device

  4. magnetic disk


Correct Option: A
Explanation:

Option 1 is the correct answer.

The output of lexical analyzer is

  1. a set of regular expressions

  2. syntax tree

  3. a set of tokens

  4. a string of characters


Correct Option: C

Which of the following system softwares always resides in the main memory?

  1. Text editor

  2. Assembler

  3. Linker

  4. Loader


Correct Option: D

A compiler which allows only the modified section of the source code to be recompiled is called

  1. incremental compiler

  2. reconfigurable compiler

  3. dynamic compiler

  4. selective compiler


Correct Option: A

Transfer of information to and from the main memory takes place in terms of

  1. bits

  2. bytes

  3. words

  4. nibbles


Correct Option: C

Efficient use of addressing modes

  1. speeds up the execution

  2. reduces the number of instructions

  3. reduces the size of instructions

  4. none of the above


Correct Option: B

Pick out the machine independent phase of a compiler.

  1. Syntax Analysis

  2. Code Generation

  3. Lexical Analysis

  4. Intermediate Code Generation


Correct Option: A

The delay between job submission & job completion is called

  1. turn around time

  2. in-process time

  3. response time

  4. waiting time


Correct Option: A

With which of the following addressing modes can indexing be done?

  1. Relative

  2. Memory indirect

  3. Immediate

  4. Direct


Correct Option: D

Resolution of externally defined symbols is performed by a/an

  1. linker

  2. loader

  3. compiler

  4. assembler


Correct Option: A

In a two-pass assembler, the object code generation is done during the

  1. second pass

  2. first pass

  3. zeroth pass

  4. none of the above


Correct Option: A

Which of the following techniques is preferable for transferring large data to & from a memory in a short time?

  1. Programmed I/O

  2. Interrupt-driven I/O

  3. DMA

  4. None of the above


Correct Option: C

In a two-pass assembler, adding literals to literal table & address resolution of local symbols are done during

  1. first pass & second pass

  2. both second pass

  3. second pass & first pass

  4. both first pass


Correct Option: D

The details of all external symbols & relocation formation (relocation list or map) is provided to linker by a/an

  1. macro processor

  2. translator

  3. loader

  4. editor


Correct Option: B

What scheduling algorithm allows processes that are logical runnable to be temporarily suspended?

  1. Preemptive scheduling

  2. Non-preemptive scheduling

  3. FIFO

  4. FCFS


Correct Option: A

Page-map table is

  1. a data file

  2. a directory

  3. used for address translation

  4. all of the above


Correct Option: C

An incremental backup

  1. should be done each month

  2. uses more tapes

  3. saves all files

  4. saves only files that have recently changed


Correct Option: D

The initial value of the semaphore that allows only one of the many processes to enter their critical sections, is

  1. 8

  2. 1

  3. 16

  4. 0


Correct Option: A

Which of the following rule/rules out the use of GOTO?

  1. Flowchart

  2. HIPO-DIAGRAMS

  3. Nassi-Shneiderman diagram

  4. All of the above


Correct Option: C

In a magnetic disk, data is recorded in a set of concentric tracks which are subdivided into

  1. periods

  2. sectors

  3. zones

  4. groups


Correct Option: B

Which technique stores program on disk & then transfers it to the main memory as & when required?

  1. Spooling

  2. Swapping

  3. Thrashing

  4. None of the above


Correct Option: B

The data transfer rate of a double density floppy disk system is about

  1. 5 Kbits/sec

  2. 50 Kbits/sec

  3. 500 Kbits/sec

  4. 5, 000 Kbits/sec


Correct Option: B

Which of the following is/are true about pseudocode?

  1. It is a machine language.

  2. It is an assembly language.

  3. It is a high-level language.

  4. All of the above


Correct Option: D

Which of the following is a measure to test how good or bad a modular design is?

  1. Module strength

  2. Module coupling

  3. Static analysis

  4. None of the above


Correct Option: A

The principal of locality of reference justifies the use of

  1. re-enterable memory

  2. non-reusable memory

  3. virtual memory

  4. cache memory


Correct Option: D

In which addressing mode is the address of location of the operand given explicitly as a part of the instruction?

  1. Absolute mode

  2. Immediate mode

  3. Index mode

  4. Modulus mode


Correct Option: A

The errors that can be pointed out by the compiler are

  1. syntax errors

  2. semantic errors

  3. logical errors

  4. internal errors


Correct Option: A

The part of machine level instruction, which tells the central processor what has to be done, is

  1. operation code

  2. address

  3. locator

  4. flip-flop


Correct Option: A

The part of a program where the shared memory is accessed & which should be executed indivisibly, is called

  1. semaphores

  2. directory

  3. critical section

  4. mutual exclusion


Correct Option: C

Dividing a project into segments & smaller units to simplify the analysis, design and programming is called

  1. modular approach

  2. top-down approach

  3. bottom-up approach

  4. left-right approach


Correct Option: A

Which of the following capabilities is required for a system program to execute more than one program at a time?

  1. Word processing

  2. Compiling

  3. Virtual memory

  4. Multitasking


Correct Option: D

Which of the following terms refers to the degree to which data in a database system are accurate & correct?

  1. Data security

  2. Data validity

  3. Data independence

  4. Data integrity


Correct Option: D

In which of the following storage placement strategies, a program is placed in the largest available hole in the main memory?

  1. Best fit

  2. First fit

  3. Worst fit

  4. Buddy


Correct Option: C

The special software to create a job queue is called

  1. drive

  2. spooler

  3. interpreter

  4. linkage editor


Correct Option: B

Which of the following is false about disk when compared to main memory?

  1. Non-volatile

  2. Longer storage capacity

  3. Lower price per bit

  4. Faster


Correct Option: C

Information in a memory that is no longer valid or wanted is known as

  1. non-volatile

  2. volatile

  3. surplus

  4. garbage


Correct Option: D

Relocation bits used by relocating loader are specified by

  1. relocating loader itself

  2. linker

  3. assembler or translator

  4. macro processor


Correct Option: B

The state transition initiated by the user process itself in an operating system is

  1. block

  2. dispatch

  3. wake up

  4. timer run out


Correct Option: A

Software that measures, monitors, analyzes and controls real world events is called

  1. system software

  2. real time software

  3. scientific software

  4. business software


Correct Option: B

Which of the following companies developed the Operating System/2 (OS/2) for running IBM' s new PS/2 family of microcomputers?

  1. IBM

  2. Microsoft Inc.

  3. Bell Laboratories

  4. Digital Research Corporation


Correct Option: B

If special forms are needed for printing the output, the programmer specifies these forms through

  1. JCL

  2. IPL

  3. Utility Programs

  4. Load Modules


Correct Option: A

Which of the following is a pre-emptive scheduling algorithm?

  1. Round Robin

  2. Shortest-Job-First

  3. Priority-Based

  4. None of the above


Correct Option: A

Which of the following is/are characteristic(s) of an on-line real-time system?

  1. More than 1 CPU

  2. No delay in processing

  3. Off line batch processing

  4. All of the above


Correct Option: B

A development strategy, whereby the executive control modules of a system are coded and tested first, is called

  1. bottom-up development

  2. top-down development

  3. left-right development

  4. right-left development


Correct Option: B

Which of the following programs is not a utility?

  1. Debugger

  2. Editor

  3. Spooler

  4. Bugger


Correct Option: C

Which of the following operating systems use write-through caches?

  1. UNIX

  2. DOS

  3. ULTRIX

  4. XENIX


Correct Option: B

What problem is solved by Dijkstra's Banker's algorithm?

  1. Mutual Exclusion

  2. Deadlock Recovery

  3. Deadlock Avoidance

  4. Cache Coherence


Correct Option: B

Which policy replaces a page if it is not in the favoured subset of a process' pages?

  1. FIFO

  2. LRU

  3. LFU

  4. Working set


Correct Option: D

The problem of thrashing is affected significantly by

  1. program structure

  2. program size

  3. primary-storage size

  4. all of the above


Correct Option: A

The powerful text editor called PC-write can be used by anybody by paying a small fee. Such programs are

  1. software

  2. shareware

  3. firmware

  4. mindware


Correct Option: B
- Hide questions