0

Computer Basics

Description: Helps to understand better about an operating system of a computer.
Number of Questions: 15
Created by:
Tags: computer science operating systems engineering entrance exam computer basics OS CS information technology Computer Basics
Attempted 0/15 Correct 0 Score 0

In external fragmentation which will be the best memory allocation method?

  1. Segmentation

  2. Debbuging

  3. Pagging

  4. Non-preemptive scheduling

  5. Preemptive scheduling


Correct Option: A
Explanation:

Memory segmentation is the division of a computer's primary memory into segments or sections. In a computer system using segmentation, a reference to a memory location includes a value that identifies a segment and an offset within that segment.

The software collection that controls the complete computer operations is known as __________.

  1. linear control system

  2. peripheral equipment

  3. multiprocessing

  4. controlling system

  5. operating system


Correct Option: E
Explanation:

An operating system (OS) is a collection of software that manages computer hardware resources and provides common services for computer programs.

The existing disk compression and new compressed volume creation are allowed by which DOS command?

  1. DEFRAG

  2. DBLSPACE

  3. CHKDSK

  4. MSAV

  5. SCANDISK


Correct Option: B
Explanation:

DBLSPACE is a disk compression utility that is included with DOS, beginning with Version 6. It provides a way to increase disk capacity by compressing the data on all or part of a disk.

In which addressing mode decrementation of instruction specified contents of a register will be done initially and then those contents are used as operand's effective address?

  1. Direct addressing

  2. Indirect addressing

  3. Auto increment

  4. Immediate addressing

  5. Auto decrement


Correct Option: E
Explanation:

A special case of indirect register mode. The register whose number is included in the instruction code, contains the address of the operand. Decrement Mode = before operand addressing, the contents of the register is decrement.

In which addressing mode the operand's effective address is instruction specified contents of a register and after operand's access, to point the next item in the list this register's content will be incremented?

  1. Direct addressing

  2. Indirect addressing

  3. Auto increment

  4. Immediate Addressing

  5. Auto decrement


Correct Option: C
Explanation:

The auto increment attribute can be used to generate a unique identity for new rows.

Which one takes part in the resolution of symbols that were defined externally?

  1. Linker

  2. Assembler

  3. Compiler

  4. Loader

  5. Interpreter


Correct Option: A
Explanation:

In computer science, a linker or link editor is a computer program that takes one or more object files generated by a compiler and combines them into a single executable program.

On which operating system does MacLite run?

  1. Windows

  2. Oz

  3. DOS

  4. Unix

  5. Linux


Correct Option: B
Explanation:

WOzOS is a Java-based platform for multimodal Wizard of Oz user interaction studies. It allows researchers and user interface designers to test computer interfaces that do not yet exist.

During the booting of a computer which one gets loaded into main memory?

  1. Internal command instructions

  2. External command instructions

  3. Diagnostic program

  4. Utility programs

  5. Word processor


Correct Option: A
Explanation:

An internal command is a command embedded into the command.com file.

In MS-DOS an empty directory can be deleted by using which command?

  1. DEL

  2. MD

  3. ERASE

  4. RD

  5. MOVE


Correct Option: D
Explanation:

Removes an empty directory in MS-DOS. To delete directories with files or directories within them the user must use the deltree command, or if you are running Microsoft Windows 2000 or Windows XP use the /S option.

Where can you find upper memory blocks?

  1. Reserved memory

  2. Expanded memory

  3. Extended memory

  4. Conventional memory

  5. Virtual memory


Correct Option: A
Explanation:

Setting aside a portion of main memory for some purpose. All system and application programs reserve memory either at startup or during the course of operation. Memory is reserved for inputting data, additional software instructions or for the creation of control structures such as a stack. See dynamic memory allocation, memory allocation, buffer and stack.

Using which DOS program can detected serial ports be seen?

  1. CHKDSK

  2. MSD

  3. COMMAND.COM

  4. SET

  5. SCANDISK


Correct Option: B
Explanation:

MSD is a diagnostic utility to view diagnostic information relating to your computer's hardware setup. See the MSD definition for further information about Microsoft diagnostics.

Which of the following rules out the use of GO TO?

  1. Flow chart

  2. HIPO-DIAGRAMS

  3. Nassi-Shneiderman diagram

  4. Flip- Flop

  5. Algorithm


Correct Option: C
Explanation:

A Nassi–Shneiderman diagram (NSD) in computer programming is a graphical design representation for structured programming and N-S). Diagrams are structured flow charts drawn as boxes-within-boxes. N-S diagrams.

In DOS which command helps to duplicate the entire diskette?

  1. DISKCOPY

  2. COPY

  3. FORMAT

  4. TYPE

  5. CHKDSK


Correct Option: A
Explanation:

Copies the contents of one floppy disk to another.

Within the shoplist structure, the usage of wardrobe structure can be seen in which programming principle?

  1. Redundancy

  2. Reusability

  3. Polymorphism

  4. Recursion

  5. Memorization


Correct Option: B
Explanation:

Reusability is the likelihood that a segment of source code can be used again to add new functionalities with slight or no modification

Which switch cannot be used with the DIR command?

  1. /P

  2. /W

  3. /S

  4. /T

  5. /A


Correct Option: D
Explanation:

Backs up only files changed at or after the specified time.

- Hide questions