Computer Science :: All Aptitude Test ::

1.In MS-DOS, relocatable object files and load modules have extensions
A. .OBJ and .COM or .EXE, respectively
B. .COM and .OBJ, respectively
C. .EXE and .OBJ, respectively
D. .OBJ and .COM or .EXE, respectively

2.The state transition initiated by the user process itself in an operating system is
A. block
B. dispatch
C. wake up
D. block

3.Which of the following program is not a utility?
A. Debugger
B. Editor
C. Spooler
D. Debugger

4.The function(s) of file system is (are):
A. to provide complete file naming freedom to the users and to permit controlled sharing of files
B. to provide for long and short term storage of files with appropriate economic tradeoffs.
C. to provide security against loss of information due to system failure
D. to provide complete file naming freedom to the users and to permit controlled sharing of files

5.A public key encryption system
A. allows anyone to decode the transmission
B. allows only the correct sender to decode the data
C. allows only the correct receiver to decode the data
D. allows anyone to decode the transmission

6.Feed back queue
A. are very easy to implement
B. dispatch tasks according to execution characteristics
C. are used to favor real-time tasks
D. are very easy to implement

7.In which addressing mode the operand is given explicitly in the instruction?
A. absolute mode
B. immediate mode
C. indirect mode
D. absolute mode

8.The technique, for sharing the time of a computer among several jobs. Which switches jobs so rapidly such that each job appears to have the computer to itself:
A. time sharing
B. time out
C. time domain
D. time sharing

9.Capacity planning
A. requires detailed system performance information
B. is independent of the operating system
C. does not depend on the monitoring tools available
D. requires detailed system performance information

10.Poor response times are caused by
A. Processor busy
B. High I/O rate
C. High paging rates
D. Processor busy

11.Link encryption
A. is more secure than end-to-end encryption
B. is less secure than end-to-end encryption
C. can not be used in a public network
D. is more secure than end-to-end encryption

12.A form of code that uses more than one process and processor, possibly of different type, and that may on occasions have more than one process or processor active at the same time, is known as
A. multiprogramming
B. multi threading
C. broadcasting
D. multiprogramming

13.The table created by lexical analysis to describe all literals used in the source program, is
A. Terminal table
B. Literal table
C. Identifier table
D. Terminal table

14.In which addressing mode, the address of the location of the operand is given explicitly as a part of the instruction.
A. absolute mode
B. immediate mode
C. index mode
D. absolute mode

15.Under virtual storage,
A. a single program is processed by two or more CPUs
B. two or more programs are stored concurrently in primary storage
C. only the active pages of a program are stored in primary storage
D. a single program is processed by two or more CPUs

16.A base register table
A. allows the programmer to write base registers and displacements explicitly in the source program.
B. is used to remember which of the general-purpose registers are currently available as base registers, and what base addresses they contain.
C. allows multiple programs to reside in separate areas of core at the same time.
D. allows the programmer to write base registers and displacements explicitly in the source program.

17.File record length
A. should always be fixed
B. Should always be variable
C. depends upon the size of the file
D. should always be fixed

18.A relationship between processes such that each has some part (critical section) which must not be executed while the critical section of another is being executed, is known as
A. semaphore
B. mutual exclusion
C. multiprogramming
D. semaphore

19.What is the name of the operating system which was originally designed by scientists and engineers for use by scientists and engineers?
A. XENIX
B. UNIX
C. OS/2
D. XENIX

20.The most common security failure is
A. carelessness by users
B. depending on passwords
C. too much emphasis on preventing physical access
D. carelessness by users

21.Block or buffer caches are used
A. to improve disk performance
B. to handle interrupts
C. to increase the capacity of main memory
D. to improve disk performance

22.The practice of "bundling" refers to
A. selling computers alone
B. selling peripheral devices with computer
C. selling software to run on computers
D. selling computers alone

23.Special software to create a job queue is called a
A. Drive
B. Spooler
C. Interpreter
D. Drive

24.All the time a computer is switched on, its operating system software has to stay in
A. main storage
B. primary storage
C. floppy disk
D. main storage

25.Can you name of the major Operating System used in computers?
A. MS DOS
B. OS/2
C. UNIX
D. MS DOS

26.Which of the following is not an advantage of multiprogramming?
A. increased throughput
B. shorter response time
C. decreased operating-system overhead
D. increased throughput

27.Virtual Memory
A. is a method of memory allocation by which the program is subdivided into equal portions, or pages and core is subdivided into equal portions or blocks.
B. consists of those addresses that may be generated by a processor during execution of a computation.
C. is a method of allocating processor time.
D. is a method of memory allocation by which the program is subdivided into equal portions, or pages and core is subdivided into equal portions or blocks.

28.In a magnetic disk, data is recorded in a set of concentric tracks which are subdivided into
A. periods
B. sectors
C. zones
D. periods

29.The total time to prepare a disk drive mechanism for a block of data to be read from it is
A. latency
B. latency plus transmission time
C. latency plus seek time
D. latency

30.Part of a program where the shared memory is accessed and which should be executed invisibly, is called
A. semaphores
B. directory
C. critical section
D. semaphores


Date to Date Current Affairs 2022

PakMCQs.net

Quick Links

GAT Subject



   Computer Science    English Mcqs    Agriculture    

Engineering



   Computer Science    Civil Engineering    

Technical



   Networking    Electronics    Database    

Past Papers



   Model Papers    FPSC Papers