Home / Computer Science / Operating System :: section-6

Computer Science :: Operating System

  1. The process of transferring data intended for a peripheral device into a disk (or intermediate store) so that it can be transferred to peripheral at a more convenient time or in bulk, is known as

  2. A.

     multiprogramming

    B.

     spooling

    C.

     caching

    D.

     virtual programming

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  3. Block caches or buffer caches are used

  4. A.

     to improve disk performance

    B.

     to handle interrupts

    C.

     to increase the capacity of the main memory

    D.

     to speed up main memory read operation

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  5. Which of the following statements is false?

  6. A.

     a small page size causes large page tables

    B.

     internal fragmentation is increased with small pages

    C.

     a large page size causes instructions and data that will not be referenced brought into primary storage

    D.

     I/O transfers are more efficient with large pages

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  7. The action of parsing the source program into the proper syntactic classes is known as

  8. A.

     syntax analysis

    B.

     lexical analysis

    C.

     interpretation analysis

    D.

     general syntax analysis

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  9. Which, of the following is not true about the description of a decision table?

  10. A.

     A decision table is easy to modify

    B.

     A decision table is directly understood by the computer

    C.

     A decision table is easy to understand

    D.

     All of the above

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  11. Trojan-Horse programs

  12. A.

     are legitimate programs that allow unauthorized access

    B.

     do not usually work

    C.

     are hidden programs that do not show up on the system

    D.

     usually are immediately discovered

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  13. When did IBM release the first version of disk operating system DOS version 1.0?

  14. A.

     1981

    B.

     1982

    C.

     1983

    D.

     1984

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  15. Which of the following is false about disk when compared to main memory?

  16. A.

     non-volatile

    B.

     longer storage capacity

    C.

     lower price per bit

    D.

     faster

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  17. Producer consumer problem can be solved using

  18. A.

     semaphores

    B.

     event counters

    C.

     monitors

    D.

     all of the above

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  19. Most of the microcomputer's operating systems like Apple DOS, MS DOS and PC DOS etc. are called disk operating systems because

  20. A.

     they are memory resident

    B.

     they are initially stored on disk

    C.

     they are available on magnetic tapes

    D.

     they are partly in primary memory and partly on disk

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum