GAT Subject :: All Aptitude Test ::

Hassan
1.The statement int num[2][3]={ {1,2}, {3,4}, {5, 6} };
A. assigns a value 2 to num[1][2]
B. assigns a value 4 to num[1][2]
C. gives an error message
D. assigns a value 2 to num[1][2]

2.The standard input stream, which refers to the keyboard, is called
A. cin
B. cout
C. stin
D. cin

3.If the code and fee arrays are parallel, the fee that corresponds to the code stored in the code[3] element is located in the _____ element
A. code[2]
B. code[3]
C. fee[2]
D. code[2]

4.Access specifiers are followed by
A. a comma
B. a semicolon
C. a colon
D. a comma

5.Elements in an array are identified by a unique _____
A. data type
B. order
C. subscript
D. data type

6.To include the double quotes as part of the control string we use the symbol
A. %"
B. ""
C. "",#,C D,A C++ statement must end in a,: (column),
D. %"

7.Student senior(); is a(n)_________
A. constructor call with no arguments
B. object instantiation
C. constructor call with all default arguments
D. constructor call with no arguments

8.The statement int n[4] = {11, -13, 17, 105};
A. assigns the value -13 to [2]
B. assigns the value 17 to n[2]
C. is wrong; it gives an error message
D. assigns the value -13 to [2]

9.The part of machine level instruction, which tells the central processor what has to be done, is
A. Operation code
B. Address
C. Locator
D. Operation code

10.Which of the following refers to the associative memory?
A. the address of the data is generated by the CPU
B. the address of the data is supplied by the users
C. there is no need for an address i.e. the data is used as an address
D. the address of the data is generated by the CPU

11.To avoid the race condition, the number of processes that may be simultaneously inside their critical section is
A. 8
B. 1
C. 16
D. 8

12.A system program that combines the separately compiled modules of a program into a form suitable for execution
A. assembler
B. linking loader
C. cross compiler
D. assembler

13.Process is
A. program in High level language kept on disk
B. contents of main memory
C. a program in execution
D. program in High level language kept on disk

14.Addressing structure
A. defines the fundamental method of determining effective operand addresses
B. are variations in the use of fundamental addressing structures, or some associated actions which are related to addressing.
C. performs indicated operations on two fast registers of the machine and leave the result in one of the registers.
D. defines the fundamental method of determining effective operand addresses

15.The Memory Buffer Register (MBR)
A. is a hardware memory device which denotes the location of the current instruction being executed.
B. is a group of electrical circuits (hardware), that performs the intent of instructions fetched from memory.
C. contains the address of the memory location that is to be read from or stored into.
D. is a hardware memory device which denotes the location of the current instruction being executed.

16.The strategy of allowing processes that are logically runnable to be temporarily suspended is called
A. preemptive scheduling
B. non preemptive scheduling
C. shortest job first
D. preemptive scheduling

17.The Storage-to-Storage instructions
A. have both their operands in the main store.
B. which perform an operation on a register operand and an operand which is located in the main store, generally leaving the result in the register, expect in the case of store operation when it is also written into the specified storage location.
C. which perform indicated operations on two fast registers of the machine and have the result in one of the registers
D. have both their operands in the main store.

18.The LRU algorithm
A. pages out pages that have been used recently
B. pages out pages that have not been used recently
C. pages out pages that have been least used recently
D. pages out pages that have been used recently

19.Which of the following systems software does the job of merging the records from two files into one?
A. Security software
B. Utility program
C. Networking software
D. Security software

20.Fork is
A. the dispatching of a task
B. the creation of a new job
C. the creation of a new process
D. the dispatching of a task

21.Thrashing
A. is a natural consequence of virtual memory systems
B. can always be avoided by swapping
C. always occurs on large computers
D. is a natural consequence of virtual memory systems

22.Supervisor state is
A. never used
B. entered by programs when they enter the processor
C. required to perform any I/O
D. never used

23.Which of the following instruction steps, would be written within the diamond-shaped box, of a flowchart?
A. S = B - C
B. IS A<10
C. PRINT A
D. S = B - C

24.Which of the following statements is false?
A. the technique of storage compaction involves moving all occupied areas of storage to one end or other of main storage
B. compaction does not involve relocation of programs
C. compaction is also know as garbage collection
D. the technique of storage compaction involves moving all occupied areas of storage to one end or other of main storage

25.Interprocess communication
A. is required for all processes
B. is usually done via disk drives
C. is never necessary,
D. is required for all processes

26.Which of the following functions is(are) performed by the loader
A. allocate space in memory for the programs and resolve symbolic references between object decks
B. adjust all address dependent locations, such as address constants, to correspond to the allocated space.
C. physically place the machine instructions and data into memory.
D. allocate space in memory for the programs and resolve symbolic references between object decks

27.User-Friendly Systems are:
A. required for object-oriented programming
B. easy to develop
C. common among traditional mainframe operating systems
D. required for object-oriented programming

28.Which of the following addressing modes, facilitates access to an operand whose location is defined relative to the beginning of the data structure in which it appears?
A. ascending
B. sorting
C. index
D. ascending

29.While running DOS on a PC, which command would be used to duplicate the entire diskette?
A. COPY
B. DISKCOPY
C. CHKDSK
D. COPY

30.Which of the following rules out the use of GO TO?
A. Flowchart
B. HIPO-DIAGRAMS
C. Nassi-Shneiderman diagram
D. Flowchart


Date to Date Current Affairs 2022

PakMCQs.net

Quick Links

GAT Subject



   Computer Science    English Mcqs    Agriculture    

Engineering



   Computer Science    Civil Engineering    

Technical



   Networking    Electronics    Database    

Past Papers



   Model Papers    FPSC Papers