Computer Science :: All Aptitude Test ::

1.If we want to recolor an area that is not defined within a single color boundary is known as ?
A. Boundary-fill algorithm
B. Parallel curve algorithm
C. Flood-fill algorithm
D. Boundary-fill algorithm

2.A parent process calling which system call will be suspended until children processes terminate?
A. Wait
B. Fork
C. Exit
D. Wait

3.Cascading termination refers to termination of all child processes before the parent terminates?
A. Normally
B. Normally
C. Normally or abnormally
D. Normally

4.In UNIX, each process is identified by its?
A. Process Control Block
B. Device Queue
C. Process Identifier
D. Process Control Block

5.In UNIX, the return value for the fork system call is _____ for the child process and _____ for the parent process.?
A. A Negative integer, Zero
B. Zero, A Negative integer
C. Zero, A nonzero integer
D. A Negative integer, Zero

6.The child process can ?
A. Be a duplicate of the parent process
B. Never be a duplicate of the parent process
C. Cannot have another program loaded into it
D. Be a duplicate of the parent process

7.The child process completes execution, but the parent keeps executing, then the child process is known as?
A. Orphan
B. Zombie
C. Body
D. Orphan

8.Which of the following two operations are provided by the IPC facility?
A. Write & delete message
B. Delete & receive message
C. Send & delete message
D. Write & delete message

9.Messages sent by a process?
A. Have to be of a fixed size
B. Have to be a variable size
C. Can be fixed or variable sized
D. Have to be of a fixed size

10.The link between two processes P and Q to send and receive messages is called?
A. Communication link
B. Message-passing link
C. Synchronization link
D. Communication link

11.Bounded capacity and Unbounded capacity queues are referred to as?
A. Programmed buffering
B. Automatic buffering
C. User defined buffering
D. Programmed buffering

12.In the case of, Zero-address instruction method the operands are stored in?
A. Cache
B. Push down stack
C. Accumulators
D. Cache

13.Add #45, when this instruction is executed the following happen/s?
A. The processor raises an error and requests for one more operand
B. The value stored in memory location 45 is retrieved and one more operand is requested
C. The value 45 gets added to the value on the stack and is pushed onto the stack
D. The processor raises an error and requests for one more operand

14.The addressing mode which makes use of in-direction pointers is?
A. Offset addressing mode
B. Relative addressing mode
C. Index addressing mode
D. Offset addressing mode

15.In the following indexed addressing mode instruction, MOV 5(R1), LOC the effective address is?
A. EA = 5+[R1]
B. EA = [R1]
C. EA = R1
D. EA = 5+[R1]

16.The addressing mode/s, which uses the PC instead of a general purpose register is?
A. Indexed with offset
B. Direct
C. Relative
D. Indexed with offset

17.The addressing mode, where you directly specify the operand value is?
A. Relative
B. Definite
C. Direct
D. Relative

18.The effective address of the following instruction is MUL 5(R1,R2)?
A. 5*([R1]+[R2])
B. 5+[R1]+[R2]
C. 5+(R1*R2)
D. 5*([R1]+[R2])

19.Which addressing mode is most suitable to change the normal sequence of execution of instructions?
A. Immediate
B. Index with Offset
C. Indirect
D. Immediate

20.Which method/s of representation of numbers occupies a large amount of memory than others?
A. 1’s & 2’s compliment
B. 2’s complement
C. 1’s complement
D. 1’s & 2’s compliment

21.Which representation is most efficient to perform arithmetic operations on the numbers?
A. Sign-magnitude
B. 2’S complement
C. 1’s complement
D. Sign-magnitude

22.Which method of representation has two representations for ‘0’?
A. 1’s complement
B. 2’s complement
C. Sign-magnitude
D. 1’s complement

23.When we perform subtraction on -7 and 1 the answer in 2’s complement form is?
A. 1000
B. 0110
C. 1110
D. 1000

24.When we perform subtraction on -7 and -5 the answer in 2’s complement form is?
A. 0010
B. 1010
C. 1110
D. 0010

25.When we subtract -3 from 2 , the answer in 2’s complement form is?
A. 1001
B. 0101
C. 1101
D. 1001

26.The processor keeps track of the results of its operations using flags called?
A. Test output flags
B. Type flags
C. Conditional code flags
D. Test output flags

27.The register used to store the flags is called as?
A. Log register
B. Test register
C. Flag register
D. Log register

28.The Flag ‘V’ is set to 1 indicates that?
A. The operation is valid
B. The operation has resulted in an overflow
C. The operation is validated
D. The operation is valid

29.In some pipelined systems, a different instruction is used to add to numbers which can affect the flags upon execution. That instruction is?
A. SumSetCC
B. Add++
C. AddCC
D. SumSetCC

30.The most efficient method followed by computers to multiply two unsigned numbers is?
A. Bit pair recording of multipliers
B. Restoring algorithm
C. Booth algorithm
D. Bit pair recording of multipliers


Date to Date Current Affairs 2022

PakMCQs.net

Quick Links

GAT Subject



   Computer Science    English Mcqs    Agriculture    

Engineering



   Computer Science    Civil Engineering    

Technical



   Networking    Electronics    Database    

Past Papers



   Model Papers    FPSC Papers