Home / Computer Science / Operating System :: section-6

Computer Science :: Operating System

  1. Data encryption

  2. A.

     is mostly used by public networks

    B.

     is mostly used by financial networks

    C.

     cannot be used by private installations

    D.

     is not necessary, since data cannot be intercepted

    E.

     None of the above


  3. What is the name given to the process of initializing a microcomputer with its operating system?

  4. A.

     Cold booting

    B.

     Booting

    C.

     Warm booting

    D.

     Boot recording

    E.

     None of the above


  5. The function(s) of the Storage Assignment is (are)

  6. A.

     to assign storage to all variables referenced in the source program.

    B.

     to assign storage to all temporary locations that are necessary for intermediate results.

    C.

     to assign storage to literals, and to ensure that the storage is allocate and appropriate locations are initialized.

    D.

     all of the above

    E.

     None of the above


  7. A Processor

  8. A.

     is a device that performs a sequence of operations specified by instructions in memory.

    B.

     is the device where information is stored

    C.

     is a sequence of instructions

    D.

     is typically characterized by interactive processing and time of the CPU

    E.

     None of the above


  9. With MS-DOS which command will divide the surface of the blank floppy disk into sectors and assign a unique address to each one?

  10. A.

     FORMAT command

    B.

     FAT command

    C.

     VER command

    D.

     CHKDSK command

    E.

     None of the above


  11. Multiprogramming

  12. A.

     is a method of memory allocation by which the program is subdivided into equal portions, or pages and core is subdivided into equal portions or blocks.

    B.

     consists of those addresses that may be generated by a processor during execution of a computation.

    C.

     is a method of allocating processor time.

    D.

     allows multiple programs to reside in separate areas of core at the time.

    E.

     None of the above


  13. A translator which reads an entire programme written in a high level language and converts it into machine language code is:

  14. A.

     assembler

    B.

     translator

    C.

     compiler

    D.

     system software

    E.

     None of the above


  15. The advantage(s) inherent to using high level languages is (are)

  16. A.

     Fewer people, less management and shorter transition in learning time

    B.

     Improved debugging capability, and superior documentation

    C.

     A greater degree of machine independence

    D.

     All of the above

    E.

     None of the above


  17. Addressing modes

  18. A.

     defines the fundamental method of determining effective operand addresses

    B.

     are variations in the use of fundamental addressing structures, or some associated actions which are related to addressing.

    C.

     performs indicated operations on two fast registers of the machine and leave the result in one of the registers.

    D.

     all of the above

    E.

     None of the above


  19. In which way(s) a macro processor for assembly language can be implemented:

  20. A.

     independent two-pass processor

    B.

     independent one-pass processor

    C.

     processor incorporated into pass 1 of a standard two-pass assembler

    D.

     all of the above

    E.

     None of the above