0

System Software - 1 (NCO)

Description: System Software-1
Number of Questions: 15
Created by:
Tags: System Software-1 Computer Aptitude
Attempted 0/15 Correct 0 Score 0

Which of the following operating systems uses write through catches?

  1. UNIX

  2. DOS

  3. ULTRIX

  4. XENIX

  5. _


Correct Option: B
Explanation:

The term DOS is referred to as disk operating system, but it is most often used as a shorthand for MS-DOS. Originally developed by Microsoft for IBM, it is an acronym for several computer operating systems that were operated by using the command line.

Moving a process from main memory to disk is known as

  1. scheduling

  2. caching

  3. swapping

  4. spooling

  5. _


Correct Option: C
Explanation:

Swapping is the process used to access data being stored in a hard disk and to bring it into the RAM, so that it can be used by the application program.

Which of the following is known as sequence of instructions, in a computer language, to get the desired result?

  1. Algorithm

  2. Decision table

  3. Program

  4. Flowchart

  5. _


Correct Option: C
Explanation:

It is a collection or sequence of instructions that performs a specific task when executed by a computer. Without programs, computers are useless.

If special forms are needed for printing the output, the programmer specifies these forms through

  1. JCL

  2. IPL

  3. Utility programs

  4. Load modules

  5. _


Correct Option: A
Explanation:

Job Control Language (JCL) is the command language of Multiple Virtual Storage, which is the commonly used operating system in the IBM Mainframe.

What is the name of the operating system that runs in the laptop computer called MacLite?

  1. Windows

  2. DOS

  3. MS-DOS

  4. OZ

  5. _


Correct Option: D
Explanation:

It was created to facilitate the automatic installation of operating systems. OZ is an operating system for the laptop computer called MacLite.

What is known as information in a memory that is no longer valid?

  1. Non-volatile

  2. Volatile

  3. Surplus

  4. Garbage

  5. _


Correct Option: D
Explanation:

It is a form of automatic memory management. It is the automatic recycling of dynamically allocated memory.

Which of the following terms refers to the degree to which data in a database system are accurate and correct?

  1. Data security

  2. Data validity

  3. Data independence

  4. Data integrity

  5. _


Correct Option: D
Explanation:

It refers to maintaining and assuring the accuracy and consistency of data over its entire life-cycle. It is a fundamental component of information security.

Which of the following softwares is a special software used to create a job queue?

  1. Drive

  2. Spooler

  3. Interpreter

  4. Linkage editor

  5. _


Correct Option: B
Explanation:

A program that controls spooling -- putting jobs on a queue and taking them off one at a time. Most operating systems come with one or more spoolers, such as a print spooler for spooling documents.

Which of the following capabilities is required for a system program to execute more than one program at a time?

  1. Word processing

  2. Compiling

  3. Virtual memory

  4. Multitasking

  5. _


Correct Option: D
Explanation:

It allows the user to perform more than one computer task at a time.

Which of the following softwares measures, monitors, analyses and controls real world events?

  1. System software

  2. Real-time software

  3. Scientific software

  4. Business software

  5. _


Correct Option: B
Explanation:

It is a level of computer responsiveness that a user senses as sufficiently immediate or that enables the computer to keep up with some external process. It controls, analyses and monitors the real world events.

Which of the following is a block device?

  1. Mouse

  2. Printer

  3. Terminals

  4. Disk

  5. _


Correct Option: D
Explanation:

It is a storage medium device where data are recorded by various electronic, magnetic, optical, or mechanical changes to a surface layer of one or more rotating disks.

Which of the following is necessary to work on a computer?

  1. Compiler

  2. Operating system

  3. Assembly

  4. Interpreter

  5. _


Correct Option: B
Explanation:

It is system software that manages computer hardware and software resources and provides common services for computer programs.

Which of the following approaches helps in dividing a project into segments and smaller units in order to simplify the analysis, design and programming efforts?

  1. Modular approach

  2. Top-down approach

  3. Bottom-up approach

  4. Left-right approach

  5. _


Correct Option: A
Explanation:

It is a design approach that subdivides a system into smaller parts called modules, that can be independently created and then used in different systems.

The computational technique used to compute the disk storage address of individual records is called

  1. bubble memory

  2. key fielding

  3. dynamic reallocation

  4. hashing

  5. _


Correct Option: D
Explanation:

It is the transformation of a string of characters into a usually shorter fixed-length value or key that represents the original string.

Which of the following errors can be pointed out by the compiler?

  1. Syntax errors

  2. Semantic errors

  3. Logical errors

  4. Internal errors

  5. _


Correct Option: A
Explanation:

It is an error in the syntax of a sequence of characters that is intended to be written in a particular programming language. Syntax errors occur during the parsing of input code and are caused by grammatically incorrect statements.

- Hide questions