Operating Systems
Operating Systems
SUCCESS
OPERATING SYSTEMS
BOOST YOUR KNOWLEDGE
4 + S
5 O N
S
29 STI ER
E W
QU NS
A
USEFUL FOR
4STUDENTS 4
□ □TEACHERS 4
□PARENTS 4□KIDS 4
□QUIZ TEST
□EXAM 4
4 □TRIVIA TEST 4
□COMPETITIVE EXAM 4
□OTHERS
2
Preface:
This book has undergone rigorous scrutiny to ensure its accuracy. I eagerly invite constructive
feedback on its content. Feel free to reach out to me via Facebook at https://www.facebook.
com/narayanchangder. Additionally, you can access all of my books on Google Play Books at
https://play.google.com/store/books/author?id=Narayan+Changder.
NARAYAN CHANGDER
This E-book is dedicated to the loving memory of my mother:
NARAYAN CHANGDER
may have found their way into this PDF
booklet.
Due care has been taken to ensure that
the information provided in this book
is correct. Author is not responsible
for any errors, omissions or damage
arising out of use of this information.
nt
Importa inter-
s , s e ar ch the de
er to inclu -
i t h t h e answ w a n t
w u au
atisfied . If yo ontact
If not s rrect answers klet, please c t s:
p
net for
co
i n t h is boo F a c e b ook ht
estions on
tact him arayanchangd
er/
new qu a n c o n n
ou c om/
thor. Y acebook.c
. f
//www
CRUCIAL INFORMATION: PLEASE READ BEFORE
CONTINUING:
NARAYAN CHANGDER
7. The money raised from creating the sales of
the book will help to ensure that I’m able to
produce similar books like this at a compara-
ble price.
8. YOU CAN DOWNLOAD 4000+ FREE PRACTICE
SET PDF EBOOK ON VARIOUS SUBJECTS (NURS-
ERY to UNIVERSITY LEVEL) FROM GOOGLE
DRIVE LINK https://drive.google.com/
drive/u/1/folders/19TbUXltOSN5S7FV3sL
PRACTICE BOOK» NOT FOR SALE
Contents
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1 What Operating Systems Do . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 Computer-System Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.3 Computer-System Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
1.4 Operating-System Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
2 Operating-System Structures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
2.1 User and Operating-System Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
2.2 System Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
2.3 Boot Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
2.4 Windows Boot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
3 Processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
3.1 Process Concept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
3.2 Process Scheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
3.3 Interprocess Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
3.4 Client Server Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
4 Threads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
4.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
4.2 Multicore Programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
4.3 high performance computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
4.4 Thread Libraries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
1
7 Deadlocks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
7.1 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
7.2 Deadlock Prevention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
7.3 Deadlock Avoidance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
7.4 Deadlock Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
12 Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
12.1 PROTECTION AND SECURITY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
1. Introduction
NARAYAN CHANGDER
1.1 What Operating Systems Do
1. You just deleted a shortcut to an important 4. How does the OS handle file manage-
work presentation. What happened to the ment?
data in the presentation? A. Deals with movement, editing and
A. Nothing deletion of data
B. It’s in the Recycle Bin/Trash B. Colour codes data
C. It’s deleted C. Translates data into binary
D. It’s in the recovery partition D. none of above
2. A performance monitor is a program that
5. What is the kernel of the operating sys-
assesses and reports information about
tem?
various computer resources and devices
A. Managing memory A. The parts of the OS that interact with
peripherals
B. Monitoring performance
B. Central components of the operating
C. Managing programs system
D. Providing file, disk and system man-
C. The part of the OS that are not loaded
agement tools
into memory
3. What is OS Virtualization? D. The start-up instructions for the com-
A. The use of multiple hard disk to create puter
one logical disk.
6. What do operating systems provide?
B. The use of a software to run multiple
OS on the same hardware. A. A backspace button that you can press.
C. The use of software and hardware to B. Communication from you to the com-
emulate a Network. puter.
D. The use of hard disk to expand the total C. A server that makes the keyboard
memory available to the OS. work.
1. A 2. B 3. B 4. A 5. B 6. B
1.1 What Operating Systems Do 3
D. Communication between your touch- 12. The user interacts with the computer by
screen and the speakers. clicking on the icon to open the program.
State the functions.
17. The ability for different people to use the 23. The operating system is a type of
same computer is made possible through: A. system software
A. Open-source software B. general purpose software
B. Desktop elements C. utility software
C. User accounts D. application software
D. Settings app
24. What are the 3 main operating systems?
18. CPU stands for:
NARAYAN CHANGDER
A. MAC OS
A. Central Processing Unit B. Linux
B. Computer Processing Unit
C. Windows
C. Central Processer User
D. Firefox
D. none of above
25. The purpose of the GUI is to
19. First come, firstF served is an example of
A. hide the complexities of the machine
A. Memory Management from the user
B. Interrupts B. Guide the user
C. Processor Scheduling C. to make the screen look nice
D. I/O Management D. none of above
20. Peter, a friend of yours, has a piece of 26. Which type of OS can run many jobs simul-
software that was written for Mac OS X. taneously
Which of the following OSs will that soft-
A. Multi-tasking
ware run on?
B. Multi User
A. Mac OS X only
C. Distributed
B. Mac OS X and Linux
D. Real-time
C. Mac OS X and Chrome OS
D. Mac OS X, Linux, and Chrome OS 27. What is an operating System
A. A piece of hardware
21. Function of Operating System except
A. Start & shut down a computer B. A set of programs to create documents
18. A 19. C 20. A 21. B 22. A 23. A 24. A 24. B 24. C 25. A 26. A 27. C 28. A
29. B
1.1 What Operating Systems Do 5
30. A 31. B 32. A 33. B 34. B 35. B 36. B 37. C 38. D 39. C 40. A
1.1 What Operating Systems Do 6
40. Function of system software is to serve as 45. which one is not the example of linux OS
the between the user, the application A. FEDORA
software, and the computer’s hardware
B. REDHAT
A. interface
C. UBUNTU
B. program
D. MACOSX
C. application
46. Windows 7 and Windows Vista are exam-
D. server ples of:
NARAYAN CHANGDER
41. A role of the operating system that helps A. IOS Phone
keep storage devices well organized and B. Android
maintained. C. Microsoft Windows
A. Application Management D. none of above
B. Disk Management
47. How big is a page?
C. Service Management A. 1Kb
D. Device Management B. 4Kb
42. What does an operating system do? C. 16Kb
41. B 42. D 43. B 44. B 45. D 46. C 47. B 48. C 49. A 49. B 49. C 49. D
50. D 51. C
1.1 What Operating Systems Do 7
51. ensures that all access to system re- 56. The function of OS to manage and organize
sources is controlled. I/O operations and all I/O devices is done
by
52. C 53. A 54. A 55. C 56. A 57. D 58. B 59. B 60. C 61. A
1.1 What Operating Systems Do 8
61. A role of the operating system that man- A. Paging splits the process to be loaded
ages applications or programs that are in- into equal size blocks
stalled on a system. B. Paging splits the process to be loaded
A. Application/Program Management into variable sized, logical blocks
B. Service Management C. Paging allocates frames to hold the
C. Access Control/Protection data on the hard drive
NARAYAN CHANGDER
segmentation on MacOS
62. One of the capabilities of operating sys-
tems:The computer is capable of operating 67. How can the OS help manage security of
multiple applications at the same time. the system?
62. B 63. D 64. B 65. C 66. A 67. B 68. A 69. B 70. A 70. B 71. D
1.1 What Operating Systems Do 9
72. A 72. B 73. A 74. B 75. A 76. C 77. A 78. A 79. C 80. A 81. A
1.2 Computer-System Organization 10
NARAYAN CHANGDER
B. Blackberry 10 D. controlling and coordinating computer
memory
C. Windows 10 Mobile
D. iOs 86. One that is not a type of user interface of
the OS is
83. Two types of user interface
A. device interface
A. Graphical User Interface (GUI)
B. command line interface
B. Command-line Interface
C. graphical user interface
C. Both answer
D. batch interface
D. none of above
84. A user interface made up of a command 87. Environment for execution of programs is
prompt is called: provided by
A. Graphical User Interface A. inputs
B. Super User Interface B. operating systems
C. Command Line Interface C. outputs
D. Command User Interface D. memory
7. is generally used to increase the appar- 13. Starting from the source code, which of
ent size of physical memory. these will start running the program quick-
est?
A. Secondary memory
A. Interpreter
B. Virtual memory
B. Bytecode on a virtual machine
C. Hard Disks
C. Compiler
D. Disks
D. none of above
8. In addressing mode, the operand value
14. What type of memory is primarily used as
is directly specified.
cache memory?
A. Relative A. SRAM
B. Direct B. DRAM
C. Indexed C. RAM
D. Immediate D. ROM
9. A compiler converts 15. The fastest memory in the computer sys-
A. High level language to machine lan- tem is
guage A. ROM
B. source code to object code B. RAM
C. Both 1) and 2) C. Cache
D. none of above D. None of these
16. Which of these is not a system utility pro- C. a bit, a nibble, a byte, a megabyte, a
gram? kilobyte, a gigabyte, a terabyte
A. Memory and CPU monitor D. a byte, a bit, a nibble, a megabyte, a
B. Defragmentation software kilobyte, a gigabyte, a terabyte
NARAYAN CHANGDER
17. enables the processor to access data B. Stock
quickly whenever they are needed. C. Deadlock
A. CU D. Structural hazard
B. Cache
23. is concerned with the way the h/w compo-
C. Memory nents operate and the way they are con-
D. Register nected together. (b) Co
27. The instructions like MOV and ADD are 32. What is the purpose of Utility Software?
called as Click all that apply
NARAYAN CHANGDER
B. Tunnel diode of the data residing in the memory.
C. Pin diode A. Data bus
D. None B. Address bus
C. Cache
39. Why is it necessary for programs compiled
to bytecode (like Java) to use a virtual ma- D. Control line
chine? 44. The Register used to serve as PC is called
A. The programs are all the same, but A. Instruction Pointer
the machines they run on are different
B. Stack pointer
and the virtual machine acts as the inter-
preter. C. Accumulator
48. In zero address instruction method, the 54. What part of the CPU is being de-
operands are stored in scribed.Carries out arithmetic operations
and performs logical comparisons.
59. which is not a type of OS user interface 65. Breaking logical memory into blocks of the
A. command based same size is called as:
B. touch based A. Frames
C. graphical based B. Pages
D. machine learning C. Segments
60. N bits in operation code imply that there D. Blocks
are possible distinct
NARAYAN CHANGDER
A. 2n 66. is a large multilayered printed circuit
B. 2n board inside a computer that contains CPU,
BIOS, ROM chip and the CMOS setup infor-
C. n mation.
D. n/2
A. Motherboard
61. What does the hardwired control genera-
B. RAM
tor consist of?
A. Decoder/encoder C. ROM
B. Condition codes D. Cache
C. Control step counter
67. The operation stored on data stored in
D. All of the mentioned Register is called
62. Which of the following is NOT a transla- A. Micro operation
tor?
B. Bit Operation
A. Assembler
B. Compiler C. Byte Operation
C. Interpreter D. Macro operation
D. Executable
68. The PC register holds what?
63. Mark all the utility software
A. The data for the next instruction
A. compression software
B. The address for the next instruction
B. anti-virus software
C. operating system C. The accumulated memory location
D. disk cleaner D. The instruction for the next instruction
E. powerpoint
69. The controls the I/O devices and trans-
64. Translates source code from high level lan- fer of data to and from the primary stor-
guages into object code and then into ma- age.
chine code
A. LU
A. Assembler
B. AU
B. Compiler
C. Interpreter C. ALU
D. none of above D. CU
81. The faster, costlier and relatively small 86. The fetch and execution cycles are inter-
from of storage managed by computer sys- leaved with the help of
tem hardware is: A. Modification in processor architecture
A. Main Memory B. Clock
B. Flash Memory C. Special unit
C. Cache memory D. Control unit
D. Virtual Memory 87. In cache memory, the word is written
NARAYAN CHANGDER
into cache and main memory at the same
82. Which register is being described? Holds
time.
the memory address of the instruction for
each cycle A. copy-back
A. MAR B. write-through
C. copy-both
B. MDR
D. write-back
C. Accumulator
D. Program Counter 88. Which of these storage devices are volatile
A. RAM
83. The CPU has two modes privileged and B. Flash Memory
non-privileged. In order to change the
mode from privileged to non-privileged, C. CD-RW
is needed. D. SSD
A. a hardware interrupt 89. What is a flash drive an example of?
B. a software interrupt A. Software
C. either hardware or software interrupt B. Storage Device
D. a non-privileged instruction C. Hardware
D. Input Device
84. Which is not a function of OS
90. In A or B and C what operation occurs
A. process management
first?
B. managing memory
A. A or B
C. logical operation B. B and C
D. allocating resources C. Both simultaneously
85. What part of the CPU is being de- D. none of above
scribed.Very fast memory which stores 91. CISC stands for
regularly used instructions. CPU can ac-
cess instructions held here quicker than A. Complete Instruction Sequential Com-
from RAM pilation
B. Computer Integrated Sequential Com-
A. ALU
piler
B. Control Unit
C. Complex Instruction Set Computer
C. Cache D. Complex Instruction Sequential Compi-
D. none of above lation
92. Interrupts form an important part of 98. The addressing mode/s, which uses the PC
systems. instead of a general purpose register is
A. Indexed Addressing mode
93. What kind of laser does Blu-ray disc use? 99. Which of the following is used to hold
ROM, RAM, CPU and expansion cards?
A. Blue-red laser
A. Computer Bus
B. Blue-green laser
B. Mother Board
C. Blue-violet laser
C. Cache
D. Purple-green laser
D. None
94. Where, data will remain intact even when 100. Built in memory of computer is
the computer is turned of
A. EROM
A. Secondary Storage device
B. ROM
B. Primary Storage device
C. RAM
C. Motherboard
D. PROM
D. RAM
101. To increase the speed of memory access
95. which all are not an input device in pipelining, we make use of
A. web camera A. Special memory locations
B. biometric sensor B. Special purpose registers
C. sound card C. Cache
D. smart card reader D. Buffers
E. plasma display 102. Which of the following medium is used
between CPU & RAM TO speed up the pro-
96. Choose the odd one
cessing power of a CPU?
A. Windows
A. Virtual Memory
B. Solaris B. Flash Memory
C. Linux C. cache memory
D. Outlook D. Main Memory
97. A bus scores over a multistage switching 103. The load instruction is mostly used to des-
network in which one of the following as- ignate a transfer from memory to a proces-
pects sor register known as
A. Reliability A. Accumulator
B. Speed B. Instruction Register
C. Scalability C. Program counter
D. Cost of Performing D. Memory address Register
NARAYAN CHANGDER
then to maintain data with the life of bat- C. Registers
tery, computer BIOS contains the follow-
ing. D. External Memory
NARAYAN CHANGDER
21. The condition flag Z is set to 1 to indicate
stored in the accumulator.
A. CPU
A. The operation has resulted in an error
B. Control Unit
B. The operation requires an interrupt
call C. Arithmetic and Logic Unit
C. The result is zero D. Memory Address Register
D. There is no empty register available 27. A typical processor speed in 2016 was
22. Sends data between the processor, the A. 16-17 Hz
memory unit and the input/output de- B. 100MHz
vices.
C. 4-5GHz
A. Address bus
D. 300GHz
B. Data bus
28. Data and instructions are transferred from
C. Control bus
these devices.
D. none of above
A. CPU
23. Which answer is not a cache type? B. Main Memory
A. half-mapped cache C. Input devices
B. fully associative cache D. Output devices
C. N-way-set-associative cache E. Bus
D. direct-mapped cache 29. Which of these does not affect CPU perfor-
24. One of the dedicated registers in the pro- mance?
cessor that holds the location of where A. Clock Speed
data will be read or written to as the re- B. Number of Cores
sult of an operation is called the
C. Cache Size
A. Memory Address Register
D. Number of Instructions in a Program
B. Memory Buffer Register
C. Current Instruction Register 30. This is not a type of secondary storage
31. How can a bigger cache improve CPU per- 36. What is the program counters job?
formance? A. To count the programs
NARAYAN CHANGDER
C. Printer
A. FDD
D. All of the Above
B. HDD
43. Which one of the following can be called
C. DRAM
as a peripheral?
D. None of these
A. Control unit
B. Arithmetic unit 49. The CU
A. does any maths or logic problems for
C. Speaker
the CPU
D. Logic unit
B. stores data inside the CPU
E. Main memory.
C. manages the cycle and decodes in-
44. Which architecture is followed by general structions
purpose microprocessors? D. holds specific data for the fetch-
A. Harvard architecture decode-execute cycle
C. standard I/O bus 58. This carries address of the next instruction
that will be fetched (4-6)
D. memory bus
63. This would perform an operation such as 69. Which part of the CPU holds the memory
5+8 address of the next instruction in the cy-
A. Control Unit cle?
B. Arithmetic Logic Unit A. Accumulator
NARAYAN CHANGDER
to the memory, ALU and the input/output 70. Where are results of calculations held?
devices? A. Memory Address Register
A. ALU B. Memory Data Register
B. Control Unit C. Program Counter
C. Memory Address Register (MDR) D. Accumulator
D. Memory Data Register (MDR) 71. How many fetch-decode-execute cycles
65. Which of the register/s of the processor would you expect a 2GHz processor to
is/are connected to Memory Bus? complete per second?
75. Which is not an integral part of computer? 80. The main advantage of multiple bus organ-
A. CPU isation over a single bus is
77. If a system is 64 bit machine, then the 82. CMOS sensors are used as well as CCD sen-
length of each word will be sors in cameras. CCD sensors are reported
A. 4 bytes as being more reliable, yet have
NARAYAN CHANGDER
B. Soluble State Drive
D. Size of HDD
C. Solid Static Drive
86. What are registers used for?
D. Static Solid Drive
A. To check that students are in school.
91. *Consider a direct mapped cache with block
B. To temporarily hold bits of data
size 4 KB. The size of main memory is 16
needed by the CPU.
GB and there are 10 bits in the tag. Find
C. To make sure that the CPU runs prop- the number of bits in line number.
erly.
A. 16 bits
D. To make the CPU faster.
B. 8 bits
87. The three steps to processing instructions C. 12 bits
given by a currently running program
D. 32 bits
A. Fetch, decode, execute
B. Fetch, perform, operate 92. The small extremely fast, RAM’s are
called as
C. Collect, decode, operate
A. Cache
D. Collect, analyse, execute
B. Heaps
88. When we use auto increment or auto decre- C. Accumulators
ment, which of the following is/are true?
1) In both, the address is used to retrieve D. Stacks
the operand and then the address gets al-
93. What is this process called:The CPU makes
tered 2) In auto increment, the operand
sense of the instruction it has just fetched.
is retrieved first and then the address al-
tered 3) Both of them can be used on gen- A. Decode
eral purpose registers as well as memory B. Execute
locations
C. Process
A. 1, 2, 3
D. Fetch
B. 2
94. What is a bus?
C. 1, 3
D. 2, 3 A. A circuit that connect one part of CPU
to other components.
89. Consider a direct mapped cache with block B. A type of long term memory
size 4 KB. The size of main memory is 16
GB and there are 10 bits in the tag. Find C. A type of permanent memory
the number of bits in physical address. D. A method of transport
95. The addressing mode/s, which uses the PC 100. During the execution of the instructions,
instead of a general purpose register is a copy of the instructions is placed in the
NARAYAN CHANGDER
D. FSB
111. What are the basic gates in MOS logic
106. While using the iterative construct family?
(Branching) in execution instruction A. NAND and NOR
is used to check the condition.
B. AND and OR
A. TestAndSet
C. NAND and OR
B. Branch
C. TestCondn D. AND and NOR What are the basic gates
in MOS logic family? NAND and NOR
D. None of the mentioned
107. are used to translate high level lan- 112. Select two of many factors that affect
guage programs into machine code processor performance
124. CPU can directly understand this lan- C. Central process unified
guage D. Central processing unit
A. C 130. computer architecture (Choose 2 answers
)
NARAYAN CHANGDER
B. Assembly language
A. Harvard
C. Machine language
B. Instruction Set Architecture
D. JAVA
C. Microarchitecture
125. The addressing mode, where you directly D. Von Neumann
specify the operand value is
131. Which of the following is not part of the
A. Immediate CPU?
B. Direct A. ALU
C. Definite B. CU
D. Relative C. MAR
D. ROM
126. When something is loaded from memory,
where is the memory address stored? 132. A in RAM stands for
A. The CIR A. Access
NARAYAN CHANGDER
B. stores data inside the CPU
A. RAM & ROM
B. Hard Drive & Motherboard C. sends out control signals for the CPU
C. The ALU and Cache D. holds specific data for the fetch-
decode-execute cycle
D. none of above
153. During the execution of a program which
148. Which of these scenarios is NOT the re- gets initialized first?
sult of overclocking?
A. MDR
A. The computer will end up displaying
the incorrect time and date B. IR
B. Processes might not be completed be- C. PC
fore the next instruction is carried out D. MAR
C. The CPU could overheat
154. According to the von Neumann model,
D. none of above are stored in memory.
149. b Which register is being described? A. only data
Stores the results of the calculations done B. only programs
by the ALU
C. data & programs
A. MAR
D. neither data nor programs
B. MDR
C. Accumulator 155. What are the utilities is an OS called that
enable programs such as a screen reader?
D. Program Counter
A. Accessibility options
150. This would send a signal such as “Mem-
ory Read” (5-7) B. Reading options
157. The bus used to connect the monitor to that stores data and program code in sep-
the CPU is arate memories. What is this architecture
called?
160. Size of the memory mainly depends 165. Examples of an embedded systems are
on the size of the address bus. A. Laptops
A. Main B. Washing machine
B. Virtual C. Desktop
C. Secondary D. Lights in a car
D. Cache 166. How does a CPU process instructions?
A. Using the Fetch Decode Execute cycle
161. Windows, Icons, menus and Pointers are
all part of this? (1-4) B. Linearly using parallel processing
A. Graphical User Interface C. Using machine code
B. Command Line Interface D. Through the Control Bus
C. Menu Interface 167. b What are the MDR and MAR?
D. No User Interface A. Cache
B. Registers
162. The von Neumann architecture stores
data and program code in the same inter- C. Accumulator
nal memory. There is another architecture D. Program Counter
NARAYAN CHANGDER
D. Share other people’s pictures as much A. Bitmap objects
as possible B. Graphical objects
169. Data and instructions in use are stored in C. 3D image
the
D. Objects
A. Processor
B. Embedded System 174. What does a direct mapped cache type
C. Hard Disk Drive do?
D. Main Memory A. each main memory address maps to
exactly one cache block
170. This DOESN’T happen during the Fetch
part of the cycle B. each main memory address maps to
A. Address Bus is used exactly 10 cache blocks
B. Program Counter increments by one C. each main memory address maps to
exactly 4 cache blocks
C. Arithmetic operations are performed
D. Main Memory is addressed D. each main memory address maps to
exactly 2 cache blocks
171. This sends signals such as “I/O Read” (5-
7) 175. The main advantage of semiconductor
A. Arithmetic Logic Unit RAM is its ability to:
B. Accumulator A. retain stored data when power is inter-
C. Cache rupted or turned off
D. Control Unit B. be written to and read from rapidly
C. Illuminating the screen. C. sends out control signals for the CPU
C. To select a location within the memory 193. If the number of cores goes up from 2
chip. to 4-what is the exact effect on perfor-
D. To select a read/write cycle. mance? (1-4)
A. Performance decreases
188. it’s job is to perform arithmetic and
logic operations on data and B. The maximum number of instructions
executed per second doubles
A. The Arithmetic/Logic Unit(ALU)
B. Bus C. The maximum number of instructions
NARAYAN CHANGDER
executed per second quadruples
C. Input Device
D. The maximum number of instructions
D. none of above executed per second is halved
189. Data stored in the is permanent and
194. Select a drawback of making a dual core
is rarely changed as it effects how the soft-
or quad core CPU, rather than a single core
ware operates
one.
A. BIOS
A. they are more expensive to design and
B. RAM make, and they also use more power than
C. ROM single or dual core processors.
D. Hard Drive B. they are larger in size, thus requiring
a larger case.
190. In a Von Neumann architecture
C. they produce a lot of heat, so wont re-
A. data and instructions are both stored
quire a heat sink as a result.
in main memory.
D. They are easier to design and make,
B. data and instructions are stored in sep-
and they also use less power than single
arate memory devices.
or dual core CPUs.
C. data is stored in main memory, instruc-
tions in secondary storage. 195. The Control Unit
D. data is stored in secondary storage, in- A. Controls the flow of data around the
structions in main memory. CPU and also decodes instructions
191. Carries signals relating to addresses be- B. Only controls the flow of data around
tween the processors and the memory. the CPU
A. Address bus C. Only decodes instructions
B. Data bus D. Controls how much power is directed
C. Control bus to all components within the computer
D. none of above 196. The format is usually used to store
192. Processor don’t do the following (1-4) data.
197. What is held in cache? 203. The internal components of the processor
A. All of the programming instructions are connected by
A. Processor intra-connectivity circuitry
198. It is a name given to a specific kind of 204. The CPU is called the of the computer.
file. A. arm
A. File Format B. mother
B. Metadata C. brains
C. File Attributes D. leg
D. File Type 205. What doesn’t affect the performance of
199. RAM is memory, meaning that when the computer (1-4)
the system is shutdown, the contents of A. Clock Speed
RAM are erased. B. Number of Cores
A. non-volatile C. Cache Size
B. extra D. The number of instructions in the pro-
C. volatile gram
D. secret 206. The CPU is:(1-4)
200. What is clock speed measured in? A. Control processing unit
A. Cycles per minute B. Centralised process unit
B. Cycles per second C. Central process unified
C. Cycles per hour D. Central processing unit
D. none of above 207. Firmware refers to (5-6)
A. Any hardware that can’t easily break
201. If a bus has 24 lines, it has an address-
able range (or maximum number of ad- B. A combination of hardware and soft-
dressable cells) of ware
A. 16.7M C. A type of software that is updated to
make a computer work better
B. 65.5K
D. Hardware used in kitchens
C. 17.6M
D. 4.3B 208. The processor is connected to the main
memory and other internal computer com-
202. C, C++, Java languages are ponents. They are the
A. High Level Language A. Address, Data and control buses
B. Assembly Language B. Address, input and control buses
C. Machine Language C. Address, Data and output buses
D. none of above D. Input, output and control buses
209. Data and Instructions in use are stored in 214. Solid state drives have no moving parts
the and use what memory cells to store the
data?
A. Processor
B. Embedded System A. NAND
NARAYAN CHANGDER
210. It is responsible for the execution of in-
structions, controls and system coordina- 215. Used to store the results of calculations
tion. while they are in progress
A. CPU A. Arithmetic and Logic Unit
B. Main Memory
B. Program Counter
C. Input devices
C. Current Instruction Register
D. Output devices
D. Accumulator
E. Bus
E. Memory Data Register
211. What is the purpose of the accumulator?
(4-6) 216. Data is transferred through this.
213. Which registers can interact with the sec- 218. Where would the operation “AND” be
ondary storage? performed?
A. MAR A. Arithmetic Logic Unit
B. PC B. Accumulator
C. IR C. Cache
D. R0 D. Control Unit
229. The Accumulator is a type of what? 235. Select the best description of an embed-
A. Register ded system
A. A general purpose computing system,
B. Buffer
traditionally with more ROM than RAM.
C. RAM
B. A computing system with a specific
D. Cache purpose, traditionally with more RAM than
ROM.
230. This sends signals such as “I/O Read
C. A computing system with a specific
NARAYAN CHANGDER
A. Control Unit purpose, traditionally with more ROM
B. Arithmetic Logic Unit than RAM.
C. Cache D. A general purpose computing system,
traditionally with more RAM than ROM.
D. Accumulator
236. The main virtue for using single Bus struc-
231. The computer uses the to start the
ture is
computer and launch the operating system
A. Fast data transfers
A. RAM
B. Cost effective connectivity and speed
B. BIOS
C. Cost effective connectivity and ease of
C. HDD attaching peripheral devices
D. DVD D. None of the mentioned
232. When something is loaded from memory 237. BCD stands for
where to you store the memory address?
A. Binary Coded Decimal
A. The CIR
B. Binary Coded Decoder
B. The MAR C. Bit coded data
C. The MDR D. None of these
D. The ALU
238. is the brain of the computer and af-
233. Which is not a register of the Von Neu- fects the overall performance fo the com-
mann architecture? puter
A. Control Unit A. CPU
B. Program counter B. Hard Disk
C. Accumulator C. RAM
241. Firmware in which software and hard- A. It is not directly connected to the CPU
ware are integrated on a circuit board is B. It is connected via the primary RAM
often used in what type of system? (5-6) C. It has an additional secondary data
A. Desktop System bus
B. Embedded System D. it makes a copy of the primary storage
C. Operating System 247. Quad CPU
D. Point of Sales System A. Four cores inside a double CPU
242. How many cycles per second would a 3 B. Four cores inside a single CPU
GHz processor do? C. Two cores inside a single CPU
A. 3 million D. one core inside a single CPU
B. 3000
248. What is Cache memory?
C. 3 thousand million (3 billion)
A. memory that is stored on Hard Disk.
D. none of above
B. very fast memory inside the CPU.
243. What happens if you increase the number C. Random Access Memory
of cores
D. none of above
A. CPU can process instructions quicker
B. CPU can process more instructions at 249. The second stage of the Fetch-Decode-
the same time Execute cycle is:
NARAYAN CHANGDER
A. MAR (Memory Address Register) core to quad-core, what effect does this
B. MDR (Memory Data Register) have on performance?
C. CIR (Current Instruction Register) A. Performance decreases
D. PC (Program Counter) B. The maximum number of instructions
E. ALU (Arithmetic and Logic Unit) executed per second doubles
C. The maximum number of instructions
252. The mathematical calculation component
executed per second quadruples
internal to the processor is called the
D. The maximum number of instructions
A. Arithmetic Logic Unit
executed per second halves
B. Calculator
C. Arithmetic Calculus Module 258. With which of the following file systems
can you not rename a file when it’s open?
D. Mathematical Logic System
A. ext3
253. Why are active RFID tags larger than pas- B. ext4
sive tags?
C. XFS
A. They contain a battery
D. NTFS
B. THey are a better design
C. They requrie a larger ariel 259. Add #45, when this instruction is exe-
cuted the following happen/s
D. They are older technology
A. The processor raises an error and re-
254. Which of the following is NOT an operat- quests for one more operand
ing system?
B. The value stored in memory location
A. Windows 45 is retrieved and one more operand is
B. IOS requested
C. Android C. The value 45 gets added to the value
D. Adobe Photoshop on the stack and is pushed onto the stack
D. None of the mentioned
255. The ultimate goal of a compiler is to
A. Reduce the clock cycles for a program- 260. These are images made up of graphical
ming task shapes that can be defined geometrically.
B. Reduce the size of the object code A. Bitmap objects
C. Be versatile B. Graphical objects
D. Be able to detect even the smallest of C. 3D objects
errors D. Objects
262. Information used by the CPU is loaded 267. The two phases of executing an instruc-
first in tion are
A. ROM A. Instruction decoding and storage
B. RAM B. Instruction fetch and instruction exe-
cution
C. CMOS
C. Instruction execution and storage
D. Register
D. Instruction fetch and Instruction pro-
263. Dual-Core processors: cessing
A. Manage twice the instructions every 268. The registers
second
A. do any maths or logic problems for the
B. Manage four times the instructions ev- CPU
ery second
B. store data inside the CPU
C. Manage half the instructions every
second C. send out control signals for the CPU
D. Manage the same amount of instruc- D. hold specific data for the fetch-decode-
tions as a quad-core processor. execute cycle
NARAYAN CHANGDER
A. A bi-directional path between internal
B. data bus
components
C. address bus
B. A uni-directional path between inter-
nal components D. system bus
C. A tri-directional path between internal 277. When the CPU fetches data it makes use
components of a vital path called?
D. A bi-directional buffer between inter- A. The Address walk
nal components
B. The Address Bus
272. Your friend Michel just purchased a C. The bus
Chromebook and wants to know where his
files are stored. What do you tell him? D. The address plane
A. On the hard drive 278. This is a secondary storage:(1-4)
B. In the system RAM A. CPU
C. In the cloud B. GPU
D. Chromebooks do not store files C. USB
273. The combination of Linux-based files that D. RAM
gets released as a product is called what?
279. The first stage of the Fetch-Decode-
A. Distribution Execute cycle is:
B. Version A. The next instruction is fetched from
C. Kernel the memory
D. Source B. The instruction is decoded so that it
can be done
274. What chips are you to implement Cache
memory? C. Any processing is done using the ALU
A. SRAM D. The PC is incremented
B. DRAM 280. The instruction, Add R1, R2, R3 in RTN is
C. ARAM
D. LRAM A. R3=R1+R2+R3
C. Memory Data Register (MDR) 288. Which storage device stores data using
magnetic technology?
D. Accumulator
A. Solid state
E. Memory Address Register (MAR)
B. Internal Hard disk
284. Cache C. USB
A. A small piece of memory within the D. External hard disk
CPU that remembers the most recent in-
structions. 289. Read the statement below and select the
B. A small piece of memory in the RAM correct response.This is used as extra stor-
(Random Access memory that keeps the age when the main memory ( RAM ) is full.
most recent instructions at the front of the A. Level 1 Cache
queue for processing. B. ROM
C. A small piece of memory that remem- C. Level 2 Cache
bers lots of different instructions from all
D. Virtual Memory
of the programs you run. This means the
startup time for your computer will pro- 290. What is ‘cache’?
gressively get quicker.
A. It stores program operations and data
D. A small piece of memory in the Hard while a program is being executed
Disk Drive that supports the fast action of
B. It executes programs using the fetch-
the CPU.
decode-execute cycle
285. Which of these ARE NOT parts of the C. It is a small amount of memory which
CPU? (select as many as appropriate) is a part of the CPU
A. Accumulator D. none of above
NARAYAN CHANGDER
facts and observations. D. Stores the result of arithmetic calcula-
tions
A. Information
297. How many gates would be required to
B. Data implement the following Boolean expres-
C. Software sion before simplification? XY + X(X + Z)
+ Y(X + Z)
D. Hardware
A. 1
293. Which register which holds the actual B. 2
data or instruction fetched from memory
C. 4
or waiting to be written to memory?
D. 5
A. Program counter
B. Accumulator 298. When Performing a looping operation,
the instruction gets stored in the
C. Memory address register (MAR)
A. Registers
D. Memory data register (MDR)
B. Cache
294. This register contains the address (loca- C. System Heap
tion) of the instruction being executed at D. System stack
the current time
299. Shields computer from harm
A. MAR (Memory Address Register)
A. email virus
B. MDR (Memory Data Register)
B. Software virus
C. CIR (Current Instruction Register)
C. Trojan horse
D. PC (Program Counter)
D. Anti-virus software
E. ALU (Arithmetic and Logic Unit)
300. Processors can’t
295. This holds the instruction/data temporar- A. Process data
ily after it is brought to the processor from
B. Execute instructions
the main memory
C. Execute data
A. Memory Address Register
D. Operate in Hz
B. Memory Data Register
301. addressing mode is most suitable to
C. Accumulator
change the normal sequence of execution
D. Program Counter of instructions.
313. Which part of the CPU controls the flow 319. What is an embedded system?
of data and instructions.
A. A system that has many processors
A. Arithmetic Logic Unit
B. A computer designed to perform more
B. Control Unit than one task
C. Cache
C. A small computer that forms part of a
D. Registers larger system
314. This would perform an operation includ- D. none of above
NARAYAN CHANGDER
ing the word “And” (5-7)
320. It operates on the assumption that the
A. Arithmetic Logic Unit
user can accept a certain amount of data
B. Accumulator degradation as a trade-off for the savings
C. Cache in a critical resource, such as storage re-
D. Control Unit quirements or data transmission time.
A. Data Comression
315. Name one factor affecting CPU perfor-
mance B. Lossless algorithm
A. cache size C. Lossy algorithm
B. size of the CPU D. Compression algorithm
C. Your name
321. The CPU is attached to the inside the
D. whether or not you have good wifi
computer
316. What is a motherboard? A. RAM
A. the main printed circuit board in
B. Motherboard
general-purpose computers
B. the mother of the board C. Hard Drive
C. another word for CPU D. Secondary Storage Device
D. the keyboard
322. If a processor clock is rated as 1250 mil-
317. Select an example of an embedded sys- lion cycles per second, then its clock period
tem is
A. Smartphone A. 1.9 * 10-10 sec
B. Cruise Control B. 1.6 * 10-9 sec
C. Laptop C. 1.25 * 10-10 sec
D. Computer
D. 8 * 10-10 sec
318. Which registers could hold data?
323. What does MAR stand for?
A. Program Counter
A. Main Address Register
B. Arithmetic Logic Unit
C. Memory Data Register (MDR) B. Memory Address Register
D. Accumulator C. Massive Address Register
E. Memory Address Register (MAR) D. Minimal Age Readable
324. Linux us defined as a , which is also 329. What is the name given to the memory
the core of an operating system. which works on time sharing principle in
order to create an illusion of infinite mem-
NARAYAN CHANGDER
D. Accumulator
D. Tablets
341. The stages required for processing are
336. What is a mnemonic?
known as the
A. A binary machine code instruction
A. Fetch-Execute-decode
B. A memory address
B. Process-decode-fetch
C. A meaningful abbreviation used in as-
sembly language C. Fetch-Decode-Execute
D. none of above D. Process
337. Memory Data Register (MDR) 342. If the instruction, Add R1, R2, R3 is ex-
A. Stores the address of the next instruc- ecuted in a system that is pipe-lined, then
tion in memory the value of S is (Where S is a term of the
Basic performance equation)?
B. Stores the address of where the next
item will be fetched from A. 3
C. Stores data fetched from memory, or B. 2
waiting to be stored in memory C. 1
D. Stores the result of arithmetic calcula-
D. 6
tions
338. Which of the following are examples of 343. are numbers and encoded characters,
volatile storage? generally used as operands.
A. CPU cache and RAM A. Input
B. Hard drive and ROM B. Data
C. Hard drive C. Information
D. RAM D. Stored Values
339. What does the CU do? 344. Hard drives use what substance for mag-
A. controls the flow of data within the netising the bits for the storage of binary
CPU 1 or 0?
B. It controls the input and output of data A. Ferrous particles
so that the signals go to the right place at
B. Nitrous particle
the right time
C. Iodised particles
C. It controls and monitors the hardware
attached to the system D. Silicon particles
345. One of the dedicated registers in the pro- 350. Which of the following expressions is in
cessor that contains bits that are set and the sum-of-products (SOP) form?
cleared depending on the result of an oper-
C. Accumulator 361. You just copied a file from the Work di-
D. Program Counter rectory to the Projects directory on your
Windows PC. What happened to the file
356. This doesn’t happen during the Decode / on the hard drive?
Execute part of the cycle:(7-9) A. Nothing
A. Current Instruction is held in the CIR B. The file was removed from the Work
B. Results are held in the Accumulator directory and placed in the Projects direc-
tory
NARAYAN CHANGDER
C. Status Register updated
C. The file was not moved, but a new
D. Instructions are transferred from pointer record was created associating
Main Memory the file with the Project’s directory
357. The processor D. The file was copied to a new location
on the hard drive and was associated with
A. Fetches and decodes instructions
the Project’s directory
B. Is main memory
362. Carries signals relating to the control and
C. Is secondary storage
coordination of all activities within the
D. Is an input device computer.
358. Where is the instruction being followed A. Address bus
by the CPU stored? B. Data bus
A. MAR C. Control bus
B. MDR D. none of above
C. CIR 363. It layers the discrete signal in the analog
D. PC signal with less margin of error.
A. Sampliing
359. Results of calculations are held in this
register:(7-9) B. Quantization
A. Memory Address Register C. Encoding
NARAYAN CHANGDER
D. None of the above
C. MOS transistors connected in series
D. All of the above 382. What is the purpose of the Memory Data
Register (MDR)?
378. The main circuit board in a computer is A. Holds the location of where the data is
called the to be stored / read from
A. RAM B. Holds memory
B. dongle C. Holds instructions
C. motherboard D. It does nothing
D. power supply unit 383. Which bus is unidirectional?
379. What is the purpose of an ‘operating sys- A. Address bus
tem’? B. Data bus
A. The user has to type in specific com- C. Control bus
mands to do things like moving and copy- D. None of the above
ing files.
B. The user communicates with the oper- 384. What does LRU stand for?
ating system using windows, icons, menu A. Least recently used
and pointers (WIMP) e.g. Windows. B. Last RAM used
C. A set of programs that controls how C. Low required usage
the user interacts with the hardware and
D. not a thing
software of a computer.
D. Allows a user to interact with the com- 385. When a computer is first powered up, the
puter. initiating programs are loaded into mem-
ory from the chip.
380. Memory Address Register (MAR) A. RAM
A. Stores the address of the next instruc- B. ROM
tion in memory
C. Cache
B. Stores the address of where the next
D. none of above
item will be fetched from
C. Stores data fetched from memory, or 386. the names of the 2 computer architecture
waiting to be stored in memory (Choose 2 answers )
NARAYAN CHANGDER
C. Boot files
403. Processors have a speed measured in (1-
D. Driver files
4)
399. What is the purpose of the CPU A. Hertz
A. To output data on the screen B. Bits
B. To process data and perform calcula- C. Bytes
tion by fetching, decoding and executing D. Seconds
instructions
C. To store data for later use 404. is a technique used to make a proces-
sor work at a faster speed than its original
D. To plug Input and Output devices specification.
400. Where would a signal such as ‘Memory A. overclocking
Read’ be sent from? B. throttling
A. Arithmetic Logic Unit C. super clock
B. Accumulator D. multicore
C. Cache
405. This component will store the data cur-
D. Control Unit rently being used by the computer system.
For example, parts of the operating sys-
401. What is the purpose of the I/O controller tem, opened programs and files.
in the computer?
A. CPU
A. provides the connection between ex-
ternal devices to the processor (via the B. RAM
data bus) C. Hard drive
B. provides the connection between inter- D. ROM
nal devices to the processor (via the data
bus) 406. Which register holds the address of the
C. provides the barrier between external current instruction being worked on?
devices to the processor (via the control A. Memory Address Register
bus)
B. Memory Data Register
D. provides the connection between the
C. Program Counter
internal memory and the processor (via
the address bus) D. Accumulator
NARAYAN CHANGDER
to the CPU C. More data can be saved on your com-
C. A device that is directly connected to puter system.
the CPU D. Programs loading faster
D. A device that is plugged in
424. Machine code was the fitst coding lan-
419. How many instructions per second can a guage used, this next progressed to using
CPU with a clock speed of 2.5 GHZ pro-
A. mnemonics
cess?
B. pseudocode
A. 2.5 million
C. high-level languages
B. 2.5 billion
C. 3 billion D. flowcharts
422. AMD processors use to enhance CPU 427. Which of the following is the correct or-
performance. der for clock speed measurements?
A. Front Side Bus A. Hz, KHz, MHz, GHz
B. Bit B. Hz, KHz, GHz, MHz
C. None of the above C. Hz, GHz, MHz, KHz
D. HyperTransport D. GHz, Hz, KHz, MHz
439. How can BlueRay disks hold more data C. 145 microseconds
than CD or DVD disks? D. 158.4 microseconds
A. the frequency of light used is higher,
444. What is a system bus?
hence smaller pits are created
A. A circuit that connect one part of CPU
B. the frequency of light used is lower,
to other components.
hence smaller pits are created
B. A type of long term memory
C. the frequency of light used is lower,
C. A type of permanent memory
NARAYAN CHANGDER
hence largr pits are created
D. The disks are larger and contain more D. A type of public transport that’s always
material late
440. You need to prepare a brand-new replace- 445. The correct order is
ment hard drive for storage. What is the A. Fetch, Decode, Execute
first step needed to get it ready? B. Decode, Execute, Fetch
A. Format the drive C. Execute, Decode, Fetch
B. Install an OS D. Decode, Fetch, Execute
C. Install a file system
446. Computer use addressing mode tech-
D. Create a partition niques for
441. It pertains to the placement of data from A. Giving programming versatility to the
one memory location to the other. user by providing facilities as pointers to
memory control for loop control
A. Data transformation or translation
B. to reduce the number of bits in the field
B. Data sorting
of instruction
C. Data storage and retrieval
C. specifying rules for interpreting ad-
D. Data movement dress field of the instruction
442. The memory implemented using the semi- D. all the above mentioned
conductor chips is 447. Select the registers which hold memory
A. Cache addresses . [2]
B. Main A. RAM
C. Secondary B. MDR
D. Registers C. ACC
D. PC
443. A four stage pipeline has the stage de-
lays as 150, 120, 160 and 140 ns re- E. MAR
spectively. Registers are used between
448. What is the part of the CPU called that
the stages and have a delay of 5 ns each.
performs calculations?
Assuming constant clocking rate, the total
time taken to process 1000 data items on A. ALU
the pipeline will be- B. Control Unit
A. 130.4 microseconds C. Program Counter
B. 165.5 microseconds D. Memory
449. Inside the CPU, you will find: D. CPU/Main memory/Secondary stor-
A. ALU, CU, registers, cache memory age
451. Which memory device is generally made C. Its a card that shows pixels on a mon-
of semiconductors? itor
A. RAM D. A piece a junk
B. HARD DISK
457. What does “Secure” means?
C. FLOPPY DISK
A. Protected from danger or harm
D. CD DISK
B. Protested by danger or harm
452. What register do you store the data in? C. Presented with danger or harm
A. CPU
D. Provide information about computer
B. The MAR data
C. The MDR
458. An optimizing Compiler does
D. ALU
A. Better compilation of the given piece
453. Which of the following can affect the per- of code
formance of a CPU?
B. Takes advantage of the type of proces-
A. Cache size sor and reduces its process time
B. Number of cores C. Does better memory management
C. Clock Speed D. None of the mentioned
D. All of the above
459. Which component is the Von Neumann De-
454. The main computer components are:(1-4) sign concerned with?
A. Input/Output/CPU/Main memory A. The CPU and RAM
B. CPU/Main memory/Secondary stor-
B. The CPU
age
C. The RAM
C. Input/Output/CPU/Main mem-
ory/Secondary storage D. Secondary storage
460. The standard SRAM chips are costly as A. Controls the flow of data around the
CPU and also decodes instructions
A. They use highly advanced micro- B. Only controls the flow of data around
electronic devices the CPU
B. They house 6 transistor per chip C. Only decodes instructions
C. They require specially designed PCB’s D. Controls how much power is directed
to all components within the computer
D. None of the mentioned
NARAYAN CHANGDER
464. The instruction → Add LOCA, R0 does
461. I am the long-term storage part of the
computer. Software, documents and other
files are saved here. A. Adds the value of LOCA to R0 and
stores in the temp register
A. random access memory (RAM)
B. Adds the value of R0 to the address of
B. hard drive LOCA
C. motherboard C. Adds the values of both LOCA and R0
D. expansion slot and stores it in R0
D. Adds the value of LOCA with a value in
462. Which of the following would not be con- accumulator and stores it in R0
sidered metadata for a spreadsheet file?
A. Read-only attribute 465. Which of the following is the fastest clock
speed?
B. Calculation inside the file
A. 900MHz
C. Name of the file
B. 2.4GHz
D. Full size
C. 5000KHz
463. The control unit D. 1, 000, 000, 000Hz
15. Which one of the following is one the ben- C. System Seek Time First
efits of a Microkernel Organizaton? D. System Shortest Time First
A. Portability
21. Which of the following is a condition that
B. Safety
causes deadlock?
C. Privacy
A. Mutual exclusion
D. Productivity
B. Hold and wait
16. What is “Layered Approach”?
NARAYAN CHANGDER
C. Circular wait
A. A number of layers D. No preemption
B. The interaction of the layers E. All of these
C. A small operating system core
22. Which method is considered one of the gen-
D. A networked computer system. eral methods to pass parameters?
17. In which of the storage placement strate- A. Exchange information on the same
gies a program is placed in the largest computer
available hole in the main memory?
B. Pass the parameters in registers
A. best fit
C. Allocating resources to multiple jobs
B. first fit running at the same time.
C. worst fit D. Interrupts computer after specified
D. buddy period
18. Which two of the followings are consid- 23. What is the Advantage and Disadvantages
ered as types of System Calls? of “Layered Approach”?
A. Information maintenance A. Simplicity of construction and debug-
B. File-system manipulation ging and less efficient
C. Taskbar C. Menu
D. Icons
D. None of these
5. This moves around the screen and helps
2. What type of user interfaces are com- you select text on the screen:
monly used in many self-service kiosks?
A. Pointers
A. GUI
B. Windows
B. Command Line C. Menu
C. Menu-Based D. Icons
D. Turn-Based
6. What type of images are often used on
the web for complex images that require
3. This is a compressed format that has a 24-
transparency?
bit colour depth, it uses lossy compression
to reduce the number of colours being used, A. SVG
thus reducing the file size. Excellent image B. PNG
quality and suitable for use on the web.
C. JPG
A. BMP D. GIF
B. JPG
7. A disadvantage of a Graphical User Inter-
C. GIF face is
D. Vector A. That it is hard to learn
B. There are no accessibility options. 13. What is the maximum length of a filename
C. It takes longer to load than other inter- in DOS?
faces A. 4
D. It can not be modified by the user B. 8
8. Which user interface makes use of WIMP? C. 5
A. Command Line Interface D. 12
NARAYAN CHANGDER
B. Graphical User Interface
C. Menu Interface 14. What does F12 do?
18. This is an uncompressed format that has a 23. We see real-time operating systems
24-bit colour depth. Because file sizes are mostly used in
so large they are rarely used in internet
NARAYAN CHANGDER
C. real-time operating systems
C. Android OS
D. All the above D. multi-user operating system
30. A GUI uses all of the following except 35. GUI stands for
A. pointers A. Grafical user intrface
B. icons B. Graphics united interface
C. Windows C. Graphical User Interface
D. complex instructions D. none of above
31. Which term is used to describe software 36. Single-User, Multi-Tasking Operating Sys-
that does not crash easily with unexpected tems. We commonly see this type of oper-
input? ating system used ?
A. Fit for purpose A. In smartphones
B. Reliable B. In embedded devices
C. Robust C. personal computers
D. Efficient D. traffic lights
32. Where the operating system is having
37. is the most important system soft-
to constantly switch data between main
ware that runs on a computer.
memory and virtual memory, it is called
? A. Operating System
A. Thrashing B. GUI
B. Threshing C. CLI
C. Spinning D. none of above
D. Booting
38. Which of the following tells the disadvan-
33. Which type of users would benefit from a tages of GUI
braille keyboard? A. Takes up more memory
A. Novice B. Requires an operating system to oper-
B. Blind ate
C. Expert C. User need to learn commands
D. Old D. The interface is easier to use
39. When was there first operation systems 44. What is responsible for assigning memory
developed? to each of your applications running in or-
der to allow them to run.
B. The programs that run on our comput- 48. Which of the following is not an operating
ers; like Chrome, Microsoft word and Spo- system?
tify
A. Linux
C. The name given to explain differ-
B. Window
ent types of computer; Desktop, Laptop,
Smartphone, Etc. C. Oracle
D. none of above D. Dos
49. The part of a screen that holds its own doc- C. Takes up a lot of processing power and
ument or message. memory
A. Pointers D. none of above
B. Windows 55. Your operating system is responsible for
C. Menu allowing peripheral devices to input and
D. Icons output data to the computer system. In
order to do this, it uses ?
50. A poorly performing operating system can
NARAYAN CHANGDER
A. Drivers
be extremely frustrating because ?
B. Devices
A. Slow boot-up times
C. Drivers Device
B. Poor application & file loading
D. Device Drivers
C. Crashing or freezing
D. Delay in saving files 56. Windows 10 is able to alter its look
and options for running on smartphone,
51. TCP/IP are the protocols that are funda- tablet or personal computer because it is
mental in allowing us to ? a what?
A. connect to the internet A. Adapted Interface
B. run anti-virus software B. Adaptable Interface
C. send email C. User-Interface
D. transmit data over a network D. Multi-Tasking Interface
52. What is the full name of the IDL? 57. This interface requires you to type in a
A. Interface definition language command.
B. Interface direct language A. Command line
C. Interface data library B. Graphical User Interface
D. None of these C. Menu
D. Icons
53. Microsoft Windows and Mac OSX are very
familiar to us. But what type of O/S are 58. is a commonly used operating system.
they?
A. Windows
A. Real-time Operating System
B. MS Word
B. Single-user, multi-tasking
C. Paint
C. Single-user, single-task
D. none of above
D. Multi-user operating system Microsoft
Windows and Mac OSX are very familiar 59. When were MS Windows operating sys-
to us. But what type of O/S are they? tem proposed?
5. Segmentation: A. System
NARAYAN CHANGDER
vice to begin reading data B. File Explorer allows you to search for a
A. access time file based on certain criteria:file size, type
of file, partial file name, date accessed
B. write time
and even text in file
C. random time
C. Saving data om a format that can be
D. wait time read by different version of same applica-
tion or new application. Menu option ‘Ex-
12. A user is the combination of hardware
port’ or ‘Save As’.
and software that helps people and com-
puters communicate with each other. D. Opening or ‘reading’ data created in
A. panel different version of the same application
or new application.
B. system
C. surface 17. What software would be used to create a
logo
D. interface
A. Image editing software
13. The of the operating system enables B. Word processor
users to communicate with the computer
system. C. Presentation software
A. window D. Web authoring software
B. modem 18. Which best describes a full backup? An-
C. network adapter card swers:2
D. user interface A. A copy of all data and software on the
hard disk drive / server is copied to a
14. What type of software am I? Email soft- backup medium (e.g. an external hard
ware e.g. Microsoft Outlook disk drive / DVD-R) and the medium is
A. Operating System kept at a different location
B. Application software B. Take a long time to complete (usually
overnight)
C. Utility software
D. none of above C. A full backup is made initially before
the smaller daily backups
15. Which of the following are examples of D. Each night only the files which have
utility system software (hint:not security) been changed since the last incremental
A. encryption software back-up are copied
B. defragmentation E. Fast to backup.
19. Microsoft excel is an example of Soft- 25. Which of the following is NOT a function
ware. of Operating System?
21. What type of software am I? Presentation B. *Software is a set of programs that in-
software, e.g. Microsoft PowerPoint structs the computer about the tasks to be
performed.
A. Operating System
C. *Software is a set of hardware por-
B. Application software tions that the control about the memory
C. Utility software and the hard disk to carryout results.
D. none of above D. None of the above.
22. It is a type of program that protects com- 27. The predominate personal operating sys-
puter systems from viruses and other dam- tem developed by Microsoft Corporation
aging programs.
A. Windows
A. Antivirus
B. Utility software B. MAC OS
23. Which is not in the category of software 28. A restaurant has a computer-based order-
market? ing system which is running slowly. A
A. *OEM Software stands technician has said that the hard disc drive
is fragmented.Explain how defragmenta-
B. *Open-Source Software tion software could overcome the issue of
C. *Retail Software the slow computer system.
D. Embedded software A. Files on the hard disc drive are moved
(1)
24. Most desktop and laptop computers today
use this type of operating system. B. Empty spaces collected together (1)
A. real-time C. Files are moved to be stored together
B. single-user/single-task (1)
C. single-user/multitasking D. Fewer disc accesses are needed (1)
D. multi-user E. More disc access are needed (1)
NARAYAN CHANGDER
30. what does RAM stand for B. Systems Design
A. Running A Marathon C. User Management
B. Random Access Memory
D. Memory Management
C. Ruining A Memory
36. It is an environment in which a piece of
D. Random Asset Memory
software is executed.
31. Which are embedded operating systems A. File Management
A. Desktop OS B. Disk Management
B. Virtualization C. User interface
C. Mobile OS D. Digital Platform
D. Network OS
37. Which of the following is easy to remem-
32. Define cold boot. ber and makes Graphical User Interfaces
A. Turning on a computer that has been user-friendly?
powered off completely. A. Icons
B. Using the operating system to restart B. Menu
a computer.
C. Mouse
C. Always restart the computer.
D. Window
D. Turning on computer without connect-
ing the plug. 38. Software that allows or help user to per-
form related specific tasks
33. What is the purpose of a device driver?
A. Operating System
A. used to keep your computer files well-
organized B. Utility Program
B. used to write documents and create C. Word Processing
spreadsheets D. Application Software
C. make your hardware peripherals avail-
able to your applications 39. What are the two types of User Inter-
faces?
D. deliver packages to your door
A. Text-Based and Graphics-Based
34. is a multitasking operating system de-
B. Graphics-Based and Audio-Based
veloped in the early 1970s by scientists at
Bell Laboratories. C. Audio-Based and Text-Based
A. Linux D. None of the above
40. With a command-line interface, 44. What are examples of Operating Sys-
A. user can give command by lining up the tems?
NARAYAN CHANGDER
C. Windows with the movement, editing and deletion
of data?
D. Windows 10
A. Memory management
51. Protect computers and users B. File and disk management
A. File Compression Programs C. User management
B. Backup and recovery utilities D. User interface
C. Clean Up Utilities 57. It is the outermost layer of the operating
system that provides a way for you to
D. Security programs
communicate with the operating system.
52. The on-screen tools you use to interact A. Kernel
with a computer are called the Lesson B. Shell
7-1
C. File system
A. operating system
D. none of above
B. interface
58. Software is;
C. applications
A. instructions that control processing
D. controls
B. programs or sets of instructions
53. What type of software am I? I am the com- C. the meeting point between parts of a
municator between applications software system
and hardware. D. the general term of components
A. Operating System needed to perform a task
C. Only needed if you connect to the In- B. It connects all of the components with
ternet cables.
71. Reduce the size of a file(s).Which utility 76. components in a processor are:
program refers to this description?
A. Control processing unit and Mathemat-
A. File Manager ical Unit
B. Disk Cleanup B. Logical unit and mathematical unit
C. File Compression Tools C. Control unit, arithmetic and logical unit
D. Spyware Remover D. System unit and processing cycle
NARAYAN CHANGDER
E. Antivirus Program 77. RAM is what kind of memory?
72. Choose the best answer. It is an interface A. Permanant
that displays text, and its commands are B. Forever
usually typed on a command line using a
keyboard. C. Slow
B. Graphical User Interface 78. Which one of the following best describes
C. Text-based User Interface utility software?
81. The process of carrying out a command is 87. There are two types of backup.Answers:2
called: A. Full
83. , , and are types of Application 89. Version (flavor) of UNIX available without
Software charge over the Internet
A. Windows
A. PowerPoint
B. MAC OS
B. Video editing software
C. UNIX
C. Word processing software
D. LINUX
D. Spreadsheet software
90. Designed for consumer and industrial de-
84. All memory is measured in what? vices that are not personal computers
A. Meters (m) A. Windows Mobile
B. Volume (v) B. Windows Embedded
C. Giga Bytes (GB) C. Android
D. Inches (in) D. none of above
85. Which utility is used to exit from a non- 91. Julian buys a new laptop with a system
responsive program? information utility and a diagnosis util-
A. Task Manager ity.Describe, using examples, the purpose
of the system information and diagnosis
B. Disk Cleanup
utilities.Select the description and exam-
C. System Refresh ple of System information utilities.
D. File Explorer A. displays important data about the cur-
rent state of the computer
86. Which Operating System function enables
access levels to be given? (1-3) B. -e.g. temperature, free memory, net-
work speed, % processor used
A. User Interface
C. attempts to detect / resolve items that
B. Memory Management are not working correctly
C. User Management D. e.g. missing drivers, network connec-
D. File Management tion
NARAYAN CHANGDER
utility program refers to this description? C. It is expensive.
A. File Manager D. none of above
B. Disk Cleanup 99. It is intended to serve real time application
C. File Compression Tools that process data as it comes in.
D. Spyware Remover A. Network OS
E. Antivirus Program B. Real-time OS
A. Shortest job first 107. Allows the user to compress the size of
large files for easier storage sending data.
B. First come first served
112. Which of these are false 117. What rearranges parts of the file on the
A. the cloud is easy to use disk drive to move them all to the same
area for quicker access?
B. the cloud can be accessed on any de-
vice A. Firewall
C. you need internet to use the cloud B. Disk Defragmentation
D. data can be added to the cloud on any C. File Compression
device
D. Encryption
NARAYAN CHANGDER
E. you need a wired connection to use the
cloud 118. A type of operating system which allows
more than one program to run at the same
113. What kind of problems are solved by al- time.
gorithms?
A. Multi-tasking operating system
A. Compression algorithms
B. Route-finding algorithms B. Multi-user operating system
114. Lossless compression is ? 119. Windows, icons, menus and pointers are
A. Usually performed on video files all part of what?
B. When some original data is lost and A. Graphical user interface
the original file cannot be re-created B. Command line interface
C. The original file can be re-created from
C. Menu interface
the compressed file
D. Objects interface
D. Turning the text into a format that only
a reader with a key can decrypt it
120. A user interface
115. A web browser is an example of? A. Provides a method to communicate
A. Operating system software with the system
B. Application software B. Is a graphical layout
C. The Internet software C. Is user management
D. A touch screen interface D. Allows users to have different ac-
116. A is a flash device with a storage ca- counts
pacity similar to a small hard drive. They
121. Why we need computer software?
are faster than hard drives, they have no
moving parts, and they have lower power A. *Software is required for the function-
consumption than hard drives. ing of computer.
A. Solid State Drive B. Instruct computer about the actions to
B. Hard Disk Drive be performed
C. Optical Drive C. To get perform a task or set of tasks
D. none of above D. Non of these
122. State two examples of File Manager Util- 127. What is Hardware?
ity program. A. Microsoft Word
NARAYAN CHANGDER
C. Android 138. State three (3) examples of Server OS.
D. Linux A. BlackBerry OS
B. Android OS
133. Windows XP, Windows 7, and iOS 12
are examples of: C. UNIX
D. Operating system intermediates be- 157. and are examples of Utility Soft-
tween the hardware and the user ware.
E. Run for specific tasks. A. File Manager & Operating System
152. Which of the following is/are Online B. File Manager & IOS
Storage? C. File Manager and Backup Software
A. One Drive D. none of above
B. Icloud
NARAYAN CHANGDER
158. A software repository is ?
C. Google Drive
A. Software already available for pur-
D. All of them
chase
153. Operating system utilities is B. An online collection of software
A. Computers that perform system main- C. combination of hardware and systems
tenance and administrative tasks software that supports the running of ap-
B. Programs that perform system mainte- plications
nance and administrative tasks D. none of above
C. Hardware that perform system main-
tenance and administrative tasks 159. A collection of instruction that performs
a specific tadka when executed by a com-
D. Disks that perform system mainte-
puter
nance and administrative tasks
A. Application Software
154. Utility Programs that:Detect and correct
logical errors on hard disk B. System Software
D. In Instruction Registry A. bb
B. G
166. A type of system software that allows a
C. gg
user to perform maintenance-type tasks.
D. 0
A. System software
B. Utility software 172. A is a thick magnetic disk encased in
a thicker protective shell. It consists of
C. Operating system
several aluminum platters, each of which
D. Desktop stand-alone requires a read/write head for each side.
167. Compared to open source software, retail A. Hard Disk Drive
software are generally: B. Solid State Drive
A. Less safe C. Optical drive
B. Safer D. Flash drive
173. I am running out of space on my hard 178. What are the advantages of using a mag-
drive, I should use the tool. netic hard disk? (select all that apply)
A. disk cleanup A. Store large amounts of data
B. email B. Low cost
C. disk defragment C. Fastest speed
NARAYAN CHANGDER
179. What is the function of Process Manage-
174. Which is faster to back up and why?
ment in an operating system?
A. Full Backup A. Ensuring that antivirus software is al-
B. Incremental Backup ways up-to-date
C. More files will need to be backed up B. Managing the execution of programs
on a computer
D. Less files need to backed up as only
those that have changed since last time C. Communicating with the firewall to
need to be backed up. check network traffic
D. Offering the ability for data recovery
175. Uses data structures consisting of data and system restore
fields and methods together with their in-
teractions (objects) to design programs 180. It refers to the manipulation of docu-
ments and data in files on a computer.
A. Procedural programming
A. File Management
B. Object-oriented programming
B. Data Management
C. Declarative programming
C. Information Management
D. Functional programming
D. Disk Management
176. What are the reasons for compressing 181. What is not a purpose of system soft-
video files for sharing on the internet. ware?
A. To use less capacity on the storage A. A set of programs that are written for
medium. a specific purpose
B. To enable a faster transfer of data. B. control computer hardware
C. For security. C. provide basic functionality to com-
D. To allow streaming. puter
D. act as an interface between user, ap-
177. Data Compression plication software and computer hard-
A. Maintain a computer ware
B. Provides options to manage your files 182. At the start of the process the require-
and folders ments are defined and the developers
work towards an initial prototype. Each
C. Allows the os to manage the hardware
successive loop around the spiral gener-
devices
ates a refined prototype until the product
D. Reduces the size of a file is finished.
A. Waterfall life cycle model 188. A local football club wants to use a com-
B. Agile modelling puter to store all its members’ records. It
wants to keep the club accounts as well
193. How many of the following statements 197. Which one of these best describes open
are FALSE? ( choose as many as are appro- source software?
priate) A. A type of operating system.
A. An incremental backup is more B. Free software downloaded from the in-
straightforward to restore than a FULL ternet.
backup
C. Software bought from a shop.
NARAYAN CHANGDER
B. A Command Line Interface Operating
system is more intuitive to a user than a D. none of above
GUI 198. An assembler translates assembly code
C. Full backups take longer to complete language into
and require more disk space A. High Level Language
D. Menus are easy for users to under- B. Machine Code
stand but can be restrictive in terms of
C. Processor Code
choices
D. Mnemonics
194. A fragmented hard drive is one in which
? 199. Which type of operating system is used
to control large equipment and to regulate
A. Program instructions and data are
factory operations? Lesson 7-1
spread across tracks and sectors on the
hard disk drive A. real-time
B. Programs and instructions are B. single-user/single-task
grouped together to occupy a continuous C. single-user/multitasking
section of the harddisk drive
D. multi-user
C. A hard disk drive that has been
dropped and broken into lots of pieces 200. Disk Cleanup, Task Manager and File Re-
covery are considered to be
D. The hard disk drive is split into por-
tions each representing a different logical A. root directories
drive. B. file management systems
195. Which one of the following is a compres- C. Windows utility programs
sion software? D. Accessibility Utilities
A. OptimFROG 201. An application programming interface
B. MacOS (API) is
C. Steam A. the code the CPU recognizes to per-
D. none of above form a procedure in an application
B. the code to interface between an appli-
196. The following are the types of system cation and a peripheral like a printer
software, except
C. the currently active part of an applica-
A. Utility programs tion
B. Operating systems D. the code to interface between an appli-
C. Application programs cation and RAM
202. The BIOS (Basic Input Output System) is 207. What does OS stand for?
stored in A. Operating System
NARAYAN CHANGDER
214. Designed for Apple Mobile phones and and thus are
mobile devices. A. single user
A. iPhone OS B. single processing
B. BlackBerry Operating System C. multiuser
C. Palm OS and Palm webOS D. multiprocessing
D. Symbian OS 220. holds many components of the sys-
215. What does the user interface do? tem and provides connectors for other pe-
ripherals.
A. Allows users to communicate with the
computer A. USB
NARAYAN CHANGDER
B. Spyware Doctor
235. Open Source Software is ? C. Spyware Terminator
A. NOT safe D. Windows Explorer
B. Safe E. MyDefrag
C. KIND OF safe 241. An integrated software package:
D. The safest A. Can transfer data from one component
to another very easily
236. Example of system software are:-Choose
ALL that apply. B. Costs less than individual applications
A. Microsoft Word C. Takes up less disk space than individ-
ual applications
B. Linux
D. All of the above
C. Unix
D. Windows 8 242. Choose the correct THREE reasons why
we need to make Backup.
E. Mozilla firefox
A. files can be purposely overwritten or
237. The type of software that the users run deleted
to do various tasks on a computer is
B. hardware failures-disk drive crashes
A. System Software
C. devices can be stolen (with data and
B. Application Software files stored on them)
C. Utility Software D. disasters-fires, earthquakes and
D. Operative Software floods can destroy hardware
238. is software which allows a computer 243. Files can be grouped together into these
to run and to be maintained. A. folders
A. Application software B. utilities
B. System software C. programs
C. MS Word D. operating systems
D. none of above 244. Which one of these best describes appli-
239. A type of software used to create and cation software?
manipulate documents that contain text A. Antivirus software.
and graphics. B. Software that allows you to make
A. Database slideshows and type letters.
C. Software that keeps your computer 250. Clock speed is measured in cycles per sec-
system healthy. ond. 3GHz means
249. Which of the following is the function for 254. Select the software below that is APPLI-
compression tool? CATION software.
A. To shrink the size of the file A. Spreadsheet
B. To manage the files in folder B. Google Chrome
255. Process of splitting memory and/or pro- C. It should execute efficiently, in as few
grams up into blocks of the same physical steps as possible
size.
D. It should be designed in such a way
A. Segmentation that other people will be able to under-
B. Paging stand it and modify it if necessary.
NARAYAN CHANGDER
of valid inputs.
256. Remove programs from your hard drive
without leaving bits and pieces behind 260. Which utility temporarily removes redun-
dancies in a file to reduce the file size?
A. Search Tools
A. Disk Cleanup
B. Diagnostic Programs
B. File Compression
C. Disk Management Programs
D. Uninstall utilities C. Error-checking
D. Defragment and Optimize Drives
257. An OS manages multiple programs
and processes while you use the com- 261. Programs written in low-level languages
puter.Which function of OS related to this (select all that apply)
description?
A. are less memory intensive
A. Providing user interface
B. allow the programmer to directly con-
B. Controlling a network
trol hardware (in embedded systems)
C. Managing programs
C. easy to write and test
D. Managing memory
D. easy to run on any machine
E. Starting and shutting the computer
262. This following is an example of a periph-
258. Reorganizes files and unused space on a
eral (7-9)
hard disk so that operating system access
data menu quickly and program run faster. A. Processor
Which utility program refers to this de-
B. Main Memory (RAM)
scription?
A. Restore Utility C. Hard Disk Drive
274. Unencrypted messages are called which? D. Used to temporarily store data that is
(1-3) read from/written to memory
A. Plaintext 279. A utility software is used to
B. Ciphertext A. Maintain a computer
C. Keytext B. Provides options to manage your files
D. Originaltext and folders
C. Allows the os to manage the hardware
NARAYAN CHANGDER
275. The on-screen tools you use to interact devices
with a computer are called the
D. Allows each user to have different ac-
A. interface counts on the system
B. applications
280. An incremental backup..
C. controls
A. Makes copies only of the new files
D. operating system
B. Saves your backup to secondary stor-
276. To share one processor’s power between age
multiple people, you would use a OS: C. Makes copies of all files
A. Embedded D. Makes a copy of the entire drive
B. Real Time 281. File property is:
C. Distributed A. Additional data stored about a file
D. Multi-Tasking B. Property of file that can be set
E. Multi-User C. Basic information about files, name,
size and date modified
277. The application software used to arrange
and store large amount of information in D. Process of reducing the size of a file
organised manner 282. Simple applications that can be down-
A. Graphics software loaded cheaply; do not have capabilities of
full version.
B. Multimedia software
A. App
C. Database management software
(DBMS) B. Application
D. Presentation software C. Operating System
D. Software Program
278. The role of the Memory Data Register is
to 283. Some software programs develop
rapidly, gaining new features and adapt-
A. Hold the current instruction being exe-
ing to new uses, very often very spe-
cuted
cialised and experimental. The best soft-
B. Hold the address of the next instruc- ware in this case would be:
tion to be executed dividing it into an op-
A. open source
code/operand
B. proprietory
C. Hold the address of the memory loca-
tion where data is fetched to be fetched C. bespoke
from or written to D. none of above
284. What is Encryption software used to do? 289. What are the disadvantages of using op-
A. Permanently change data tical disks? (select all that apply)
NARAYAN CHANGDER
A. Command B. BLU-RAY
B. Process C. CD
C. Task D. none of above
D. Instruction 300. Select the true statements about memory
paging:
295. Which of the following Windows utility
programs arranges pieces of files on your A. Processes are split into equal sized
hard drive to allow for faster access? frames
A. Disk Cleanup B. A page table is used to record all the
pages
B. Defragment and Optimize Drives
C. Unused pages are swapped out of
C. Error-checking
main memory and into virtual memory
D. Task Manager
D. Processes are split into variable sized
296. This testing is carried out by the software frames
developer’s in-house testing team.It is es-
301. A(n) operating system enables two
sential because it often reveals both errors
or more users to run programs simultane-
and omissions in the system requirements
ously.
definition.
A. multiplied
A. Beta testing
B. multiuser
B. Alpha testing
C. engaged
C. Black box testing
D. rasterized
D. White box testing
302. What does the systems software include
297. Two MAJOR category of software are:
from the following?
A. system software and utility programs
A. Utility software
B. operating system and system soft-
ware B. Drivers
D. Change the user’s login details 319. Which is not a type of System software?
NARAYAN CHANGDER
of an operating system
C. command-based
A. Managing resources
D. throttle
B. Providing user interface
315. This is also known as a photo editor, this C. Perform specific operations
specialized graphics program edits or mod-
ifies digital photographs. D. Running applcations
325. Which of the following is NOT a system 331. Two examples of software
utility? A. Mouse and word
330. RAM stores (select all that apply) 335. This was one of the first operating sys-
tems ever written.Lesson 7-2
A. Operating System
B. Files/Programs you are currently us- A. Linux
ing B. UNIX
C. BIOS C. Microsoft Windows
D. Backup data D. Macintosh OS
336. Something having no permission to per- 342. Which of these is an example of a periph-
form an action is: eral device?
A. inauthorised A. Processor
B. disauthorised B. Main Memory (RAM)
C. unauthorised C. Hard Disk Drive
D. misauthorised D. Monitor
NARAYAN CHANGDER
337. These are general-purpose programs that 343. Software applications are most likely to
creates text-based documents. list what kind of operating system require-
A. Word Processors ment?
347. Three functions of the operating system 352. Which of the following is not an example
A. User Interface, multitasking, commu- of system software?
350. Performs tasks at the same time. 355. The instructions that tell the computer
what to do is called:
A. Simultaneous Processing
A. Hardware
B. Multiprocessing
B. Input
C. Parallel processing
C. Software
D. none of above
D. Output
351. Define multitasking.
356. What do we call groups of online servers
A. Allows a single user to work on two or
that allow you to easily share and store
more programs at the same time.
documents outside of your local com-
B. Allows only one user to run one pro- puter?
gram at a time.
A. Desktops
C. Supports two or more processors run-
B. Cloud computers
ning programs at the same time.
D. Enables two or more users to run pro- C. Mainframes
gram simultaneously. D. Laptops
NARAYAN CHANGDER
without turning off the power. 364. Embedded systems can be found in (select
all that apply)
A. Warm boot
A. Washing Machines
B. Soft boot
B. Alarm Systems
C. None of the above
C. Computers
D. none of above
D. Laptops
359. An example of the computer’s hardware
would be 365. Which type of interface uses ‘WIMP’
B. MS Publisher B. Graphical
C. Menu
C. Keyboard
D. Natural language
D. none of above
366. Which is the fastest type of cache mem-
360. It acts as an intermediary between the
ory?
user and the computer.
A. Level 1
A. Operating System
B. Level 2
B. Information System
C. Level 3
C. Disk Management System
D. Level 4
D. none of above
367. Designed to search for files on the user’s
361. Designed for BlackBerry devices. hard drive
A. iPhone OS A. Search Tools
B. BlackBerry Operating System B. Diagnostic Programs
C. Palm OS and Palm webOS C. Disk Management Programs
D. Symbian OS D. Uninstall utilities
362. A rectangular area that can contain a doc- 368. Amin buys a new computer with an op-
ument, program, or message. erating system and some utilities.Some of
A. Window the software in Amin’s computer is open
source.Describe what is meant by open
B. Textbox source software.Answers:3
C. Title Bar A. The source code is distributed with the
D. None of the above software
NARAYAN CHANGDER
B. User interface
C. Utility Suite
C. Virtual connection
D. Office Suite
D. Remote access
384. Select all the types of secondary storage
379. Which sort of user is suited to using a A. RAM
command-line interface?
B. ROM
A. Software Tester
C. Hard Disk Drive
B. Network Technician
D. Cloud Storage
C. Programmer
E. Solid State Drive
D. Web Developer
385. Keeps track of stored files on com-
380. Which one of the following statements puter so they can be retrieved when
about OS is NOT true? needed.Which utility program refers to
A. Operating Systems are the interface this description?
between computer hardware and the user A. File Manager
B. The CPU can run multiple processes at B. Disk Cleanup
the same time C. File Compression Tools
C. A computer can support several appli- D. Spyware Remover
cations being open at the same time
E. Antivirus Program
D. Peripherals require software called
“drivers” in order for the OS to control 386. Most desktop and laptop computers to-
them day use this type of operating sys-
tem.Lesson 7-1
381. When two programs try to occupy the
same space in RAM, one or both may do A. real-time
this.Lesson 7-1 B. single-user/single-task
A. resolve C. single-user/multi-task
B. load D. multi-user
C. run 387. It is an online diary or commentary
D. crash A. Article
382. Which is NOT considered an operating B. Channel
system? C. Site
A. Windows D. Blog
388. User interfaces can be:Command Line In- 393. An example of software would be
terfaceGraphical User InterfaceSelect the
A. MS Power Point
description and examples for Graphical
C. Contains Windows, Icons, Menus, 394. Which of the software below is best
PointersVisual suited for typing letters?
D. E.g. Windows 10, Windows 8, Android, A. Control program
Mac OS
B. Database
389. This is used in creating layout for a mag- C. Measuring program
azine.
D. Search engine
A. Word Processor
E. Word processor
B. Spreadsheet
395. Operating Systems will allocate sections
C. Desktop Publishing Program
of RAM to the processes as part of:(4-6)
D. None of the above A. Processor Management
390. High Level Languages (Python, VB, C#) B. File Management
need to be translated into before it can C. Peripheral Management
be executed by the microprocessor.
D. Memory Management
A. Machine Code
B. Mnemonics 396. What is Application Software?
391. What happens when RAM is full? B. Specific purpose software used for
specific tasks
A. The computer crashes
C. Software that runs in the background
B. Virtual Memory is used of a computer system
C. An interrupt is raised D. None of the above
D. The computer explodes
397. Which of the following is not a “Manage-
392. Memory-management technique that ment” role of an operating system?
uses hard drive space as additional RAM A. Memory Management
A. Virtual Machine B. Peripheral Management
B. Virtualization C. File Management
C. Virtual Memory D. Audio Management
D. Virtualbox E. Process Management
398. Designed for mobile phones 403. Which of the following is not mobile op-
erating system?
A. Windows Mobile
A. Blackberry
B. Windows Embedded
B. Android
C. Android
C. Windows Phone
D. none of above
D. a-phone
399. What are the causes of data loss?
NARAYAN CHANGDER
404. Which of these are types of storage
A. Head crash
A. RAM
B. Malfunctions B. ROOM
C. Controller failure C. RUMMING
D. Virus attack D. ROM
400. System software is software which al- 405. What is the function of antivirus? (There
lows a computer to run and to be main- are two answers)
tained.The two main types of system soft- A. Protect computer against virus.
ware are and
B. Protect computer from bacteria.
A. PowerPoint
C. Damaging the computer program.
B. Utility software
D. Remove computer form viruses.
C. Operating system software
406. How much storage space do you need on
D. Application Software
your hard drive in order to install and use
an application successfully?
401. A hierarchy;
A. Just enough space to hold the program
A. is the means of carrying out opera-
files
tions or instructions
B. Applications never use any hard drive
B. are users of a system space
C. is software not fully understood by C. Enough space to hold the program files
most users and any data files you might produce
D. is a diagram where the most important D. Just enough space to hold your data
level of a system is at the top files
402. I plug my pendrive into the USB port. Au- 407. What is the function of the operating sys-
tomatically, the window popup with the tem that provides the user interface?
content inside of my pendrive. This pro-
A. A symbol that appears on the display
cess called
screen and that you move to select objects
A. coordinate tasks. and commands
B. driver. B. A program that controls a display for
the user (usually on a computer monitor)
C. plug and play.
and that allows the user to interact with
D. configure device. the system)
C. A type of user interface which allows 412. Select a device which contains an embed-
people to interact with computer with im- ded system
ages rather than text commands
409. Which is NOT considered application soft- 414. This model is an iterative approach to
ware? software delivery that builds software in-
crementally from the start of the project,
A. Word instead of trying to deliver it all at once
B. Photoshop near the end.
C. Android A. the waterfall lifecycle model
D. Audacity B. Spiral model
411. The software that runs on a computer 416. Question 3:A Virtual Machine is said to
that is responsible for the management of (7-9)
the computer. Provides user interface, file A. Allow the user to play games with Vir-
management, memory management, con- tual Reality Glasses
trols hardware, etc
B. Allow the user to virtually use an Oper-
A. Application software ating System
B. Operating system C. Allow a MAC to run on Windows
C. system software D. Hide the complexities of the hardware
D. control unit from the user
417. A small program that allows a specific pe- 422. Sorting, Formulas and Charts are all fea-
ripheral device to communicate with a com- tures of which type of software?
puter system A. Spreadsheet Software
A. Driver Programs B. Desktop Publishing Software (DTP)
B. Firmware C. Database Software
C. Operating System D. Presentation Software
D. none of above E. Word Processing Software
NARAYAN CHANGDER
418. An operating system that organizes and 423. This is the program that helps to boot
coordinates how multiple user access and up the computer. Usually stored on flash
share resources on a network. This de- memory so that it can be updated. Also al-
scription refers to lows settings such as boot order of disks
A. Mobile OS to be changed and saved by the user
B. Desktop OS A. Loader
B. BIOS
C. Server OS
C. Basic input output system
D. none of above
D. none of above
419. which of these is the fastest
424. to optimize the use of RAMWhich func-
A. magnetic tape tion of OS related to this description?
B. optical disk A. Providing user interface
C. HDD B. Controlling a network
D. memory card C. Managing programs
E. SSD D. Managing memory
420. protects your system from Trojans E. Starting and shutting the computer
and viruses
425. Booting is the process of starting or
A. Virus Scanner restarting a computer. What the process
B. System monitor involve?
437. Each device attached to your computer 442. This was one of the first operating sys-
has a special program called a(n) that tems ever written
enables the device and operating system A. Linux
to communicate with each other.
B. UNIX
A. device driver
C. Microsoft Windows
B. translator
D. Macintosh OS
C. interpreter
NARAYAN CHANGDER
D. device configurator 443. A type of utility program used to reduce
the size of a program is
438. It is the essential center of a computer A. a file compression program
operating system that serves as the core
that provides basic services for all other B. a troubleshooting program
parts of the OS. C. an anti-virus program
A. Shell D. an un-install program
B. File system 444. Windows is a scaled-down Windows
C. Kernel operating system designed for use on com-
D. none of above munications, entertainment, and comput-
ing devices with limited functionality.
439. Diving processor time between processes A. UNIX
so that they appear to multitask is known
as:(1-3) B. NetWare
A. Time Slicing C. Server 2008
B. Fish Slicing D. Embedded CE
C. Time waiting 445. A acts as a barrier between your com-
D. Idle Time puter and the internet. Checks which pro-
grams are trying to access your computer
440. Linux based OS developed by Open Hand- via the internet, or internet via your com-
set Alliance (including Google). puter.
A. Windows Mobile A. Anti-Virus
B. Windows Embedded B. Switch
C. Android C. Firewall
D. none of above D. Blockwall
441. What are the two broad categories of 446. This type of OS can be found on devices
computer software? such as printers, ATM’s and Cars. Usually
A. System Software ANDUtility Software. only has one job and is often designed for
specific hardware in mind.
B. Utility Software ANDApplication Soft-
ware. A. Real-time operating system
447. Fill in the blank the whole program 452. Which type of software would a game
one statement at a time. be?
448. With a , users interact with menus 453. Allows the user to compress the size of
and visual images such as icons, buttons, large files for easier storage.
and other objects to issue commands. A. Compression Software
A. command-line interface B. Antivirus Software
B. menu-driven interface C. Computer games
C. performance-monitor interface D. Presentation applications
D. graphical user interface (GUI) 454. Question 2:The following is not a type of
Systems Software (4-6)
449. Which of the below is a definition of ‘Ap-
plication’ A. Device Drivers
A. General term for computer programs B. Utility Programs
B. Software designed to carry out a use- C. Applications
ful real-world task D. Operating Systems
C. A set of commands that a processor 455. State three types of Utility Program.
can recognise and act upon
A. Desktop OS
D. A combination of hardware and operat-
B. File Manager
ing system
C. Backup and restore Utility
450. Peripheral Management
D. Disk Defragmenters
A. Provides a method to communicate
E. Subject Directory
with the system
B. Manages your programs 456. Which one of the following is not a Utility
Program?
C. allows the os to manage the hardware
devices A. Disk defragmentation tool
458. What is the first thing that happens when 463. Which is NOT a utility program?
a computer is switched on A. Word processor
A. Try and find and load the operating sys-
B. Compression software
tem
C. Back-up
B. Instructions perform some basic hard-
ware tests D. Disk organisation
C. Process of loading the operating sys-
464. Which file extension is correct for a Word
NARAYAN CHANGDER
tem is called booting the computer
document?
D. Computer looks for instructions to fol-
A. .xlsx
low (on ROM)
B. , doc
459. What lets you do many things, like write
book reports and stories? C. .pptx
460. This interface requires the user to type in A. To prevent the execution of unautho-
codes or words rized programs on a computer
468. UNIX is an example of this type of oper- 474. Which type of utility program that works
ating system.Lesson 7-1 as a tool to reorganise files & unused
space on computer’s hard disk?
NARAYAN CHANGDER
480. These are programs that organize, ana- enables the user to interact with the sys-
lyze and graph numerical data such as bud- tem
gets and financial reports C. The part of the Operating System that
A. Database manages hardware devices
B. New users can be given network ac- C. The OS is loaded into RAM
counts D. Configuration and customization set-
B. The BIOS checks that all devices are C. shut down the computer
operational D. launch applications
498. Which of the following is NOT a software 503. This following is an example of a periph-
interface? eral?
A. Command-driven A. Processor
B. Touch screen B. Main Memory (RAM)
C. Menu-driven C. Hard Disk Drive
D. Graphical User Interface (GUI) D. ROM
NARAYAN CHANGDER
499. What does the scheduling management 504. [Select all appropriate answer]Example
system in Process Management ensure? of Application software
A. That each process has exclusive ac- A. Photoshop
cess to all computer resources B. Excel
B. That the computer is always running C. Word
the latest version of its operating system
D. Windows
C. That all processes have a fair use of
resources and that processes with higher E. All of these
priority are executed first
505. Certain computing projects in education
D. That all data on the computer is secure and science are free and maintained by a
and protected from unauthorized access diverse community of people. Their soft-
ware is usually distributed as:
500. Which of the following is not a text edi-
tor? A. open source
A. Tuxpaint B. charity
508. Search for and removes unneces- 513. Reverses the backup process and returns
sary/temporary files on computers and backed up files to their original form.
mobile.Which utility program refers to this Which utility program refers to this de-
509. What type of software am I? Spread- 514. Which of the following is a type of soft-
sheet software, e.g. Microsoft Excel ware?
A. Application programs
A. Operating System
B. Replicate programs
B. Application software
C. Logical programs
C. Utility software
D. Relative programs
D. none of above
515. Which of the following best describes a
510. Assembler is used as a translator for? command line interface?
A. Low level language A. It is made up of colourful icons to click
B. High Level Language on.
C. COBOL B. It is operated using special com-
mands.
D. C
C. It is operated by touching the screen
511. State two examples of Disk Defrag- with your finger.
menters program. D. none of above
A. Finder
516. in SIC One byte equals to how many
B. Spyware Doctor bits?
C. MyDefrag A. 4 bits
D. Windows Explorer B. 8 bits
E. Contig C. 12 bits
D. 16 bits
512. A(n) operating system is a complete
operating system that works on a desktop 517. software is privately owned soft-
computer, notebook computer, or mobile ware and limited to a specific vendor or
computing device. computer model.
A. multitasking A. Stand-alone
B. media-based B. Freeware
C. single-user C. Proprietary
D. stand-alone D. Shareware
518. is computer software that causes a 523. What are the two main categories of soft-
computer to perform useful tasks beyond ware?
the running of the computer itself. A. Operating Systems and Application
A. System software Software
B. Utility software B. System Software and Word Process-
ing Software
C. Application software
C. Application Software and Productivity
D. none of above Software
NARAYAN CHANGDER
519. Key job of the operating system. Al- D. None of the above
lows programs to be stored safely and ef- 524. A person who designs the programs in a
ficiently. Restricts each program to access- software package is called:
ing and amending its own area of data.
A. User
A. Processor scheduling
B. Software Manager
B. Interrupt service routines
C. System Developer
C. Memory management D. Software Programmer
D. Backing store management
525. What is Security Management in an oper-
520. A set of programs containing instructions ating system responsible for?
that work together to coordinate all the A. Managing the execution of programs
activities among computer hardware re- on a computer
sources. B. Controlling the amount of time a pro-
A. System Software cess has access to a computer’s re-
sources
B. Utility Software
C. Ensuring that antivirus software is up-
C. Operating System to-date and scanning regularly
D. Translator D. Creating and managing user accounts
on a computer
521. These enables users to collaborate on doc-
uments with other online. 526. Operating system developed in the late
A. Cloud Storage 1960s for midrange servers
A. Windows
B. Email
B. MAC OS
C. Cloud Computing
C. UNIX
D. All of the above
D. LINUX
522. Which of the following best describes li-
527. This programs organizes, analyzes, and
censing?
graphs numerical data
A. Official rules of rights to a program A. Presentation
B. A way to identify a program B. Word Processors
C. Car license plate attachment C. Image Editor
D. A form of coding D. Spreadsheet
528. Enables users to interact with a computer C. Saving data om a format that can be
system through windows, icons, menus read by different version of same applica-
and pointers. tion or new application. Menu option ‘Ex-
NARAYAN CHANGDER
C. Apple macOS desktop computer
D. Office 365 A. Stand-alone operating system
556. A type of software that lets you calculate 561. Compression is:
and organize numeric information. A. Additional data stored about a file
A. Database B. Property of file that can be set
B. Spreadsheet C. Basic information about files, name,
C. Presentation Software size and date modified
D. Process of reducing the size of a file
D. Graphics and Multimedia Software
562. Fill in the blank translate the whole
NARAYAN CHANGDER
557. Which of the following is NOT The role of program as an object code at once.
the operating system:
A. Compilers
A. Providing the user interface
B. Interpreters
B. Managing programs
C. Translator
C. Preventing basic security D. none of above
D. Managing hardware
563. When two programs try to occupy the
558. Solid state drives contain floating gates same space in RAM, one or both may do
to represent 1’s and 0’s. What are the ad- this
vantages to SSDs? (select all that apply) A. resolve
A. Fast access speeds B. load
B. Small, light and portable C. run
C. Quiet D. crash
570. Which one is not a computer management C. Operating systems and utility pro-
software? grams
A. Operating system software. D. Operating system and application soft-
B. Device drivers. ware
C. System Utilities
575. Controls how users enter data and in-
D. Translator software structions and how information is dis-
played on the screen. Which function of
571. Which one is true about Open source soft-
OS related to this description?
ware from the following?
A. It is very expensive. A. Providing user interface
B. It is made to make profit. B. Controlling a network
C. It made for the betterment of other C. Managing programs
people.
D. Managing memory
D. Well tested and reliable and updates
will be regularly be issued. E. Starting and shutting the computer
NARAYAN CHANGDER
577. The two major types of system software B. malware
programs are utility programs and the
C. mobile app
A. supervisor programs
D. Instagram
B. application software
C. user interface 583. Non-modifiable procedures are called?
D. operating system . A. concurrent procedures
587. Amin buys a new computer with an op- C. The original file can be re-created from
erating system and some utilities.State the compressed file
two functions of the operating sys-
588. A(n) interface controls how users en- 593. Linux is software, which means its
ter data and instructions into a computer code is provided for use, modification, and
and how information is displayed on the redistribution.
screen. A. open source
A. control B. client/server
B. utility C. upgradable
C. user D. multitasking
D. management
594. Each platter on a magnetic hard drive is
589. What is an Operating System? broken down into tracks. What part of the
track is data stored into?
A. Physical parts of a computer
A. Section
B. A keyboard
B. Sector
C. A videogame
C. Track Segment
D. Software that let a user work with a
computer D. Quadrant
590. These are programs that perform specific 595. Choose the Microsoft operating system
tasks related to managing computer re- A. Windows
sources
B. Android
A. Application Software
C. Linux
B. Antivirus
D. Mac OS X
C. Virtualization
D. Utility Software 596. A complete operating system that works
on a personal computer (such as desktop
591. Lossy compression is ? and notebook computers)This description
A. Usually performed on text refers to
NARAYAN CHANGDER
C. Desktop Publishing (DTP) software D. Program
D. Web authoring software
603. Which of the following is designed to con-
598. C:denotes a(n) directory that is at the trol the operations of a computer?
top of the filing structure of a computer. A. Application Software
A. sub B. System Software
B. cluster
C. Utility Software
C. root
D. User
D. domain
604. is designed to solve a specific prob-
599. Define multiprocessing. lem or to do a specific task.
A. Allows a single user to work on two or A. Application Software
more programs at the same time.
B. b) System Software
B. Allows only one user to run one pro-
C. c) Utility Software
gram at a time.
D. d) User program
C. Supports two or more processors run-
ning programs at the same time. 605. Assess and report information about vari-
D. Enables two or more users to run pro- ous computer resources and devices.Which
gram simultaneously. function of OS related to this description?
A. Monitoring Performance
600. A(n) utility allows users to copy se-
lected files or an entire hard disk to an- B. Providing file, disk and system man-
other storage medium. agement tools
A. copy C. Establishing an Internet Connection
B. restore D. Managing memory
C. safeguard E. Starting and shutting the computer
D. backup 606. State two examples of Backup and Re-
601. Software that controls all of the comput- store utility program.
ers hardware is A. Finder
A. Program Software B. Spyware Doctor
B. Application Software C. Time Machine
C. Instructional Software D. Backup and Restore
D. System Software E. Contig
607. A full-featured software that can run C. Can be very confusing to a beginner
complex software like a word processor D. none of above
or spreadsheet.
NARAYAN CHANGDER
618. Question 7:To allow a user to interact B. To keep people safe from other people
with an Operating System-it must have a
C. To keep the computer safe from de-
? (1-3)
fragmantation
A. User Connection
D. To keep data safe
B. User Interface
624. These allows the devices to communicate
C. Virtual Connection with the operating system of the computer
D. Remote Access A. Operating system
619. Which of these is an example of an oper- B. Utilities
ating system? C. Device Drivers
A. Window D. Translators
B. Word 625. For a simple system with very limited
C. Excel processing power, you would use a
OS:
D. PS3
A. Embedded
620. Software written to meet the need spe- B. Real Time
cific need of a company is
C. Distributed
A. special purpose software
D. Multi-Tasking
B. integrated software
E. Multi-User
C. general purpose software
626. Metadata is:
D. custom written software
A. Additional data stored about a file
621. An example of multitasking is B. Property of file that can be set
A. doing a background save while typing C. Basic information about files, name,
a document size and date modified
B. allowing many users to use the same D. Process of reducing the size of a file
program
627. I use what application to go to web-
C. allowing one user to use one program pages?
D. opening one program by many users A. Wifi
622. Which of these are examples of Operat- B. Internet Explorer / Firefox
ing system? C. Google Chrome/Safari
A. WinZip D. Ethernet Cable
NARAYAN CHANGDER
640. The physical objects that make up the C. Illustration Programs
computer system:
D. Web Authoring Programs
A. Software
B. Storage 645. Below are 2 advantages and 1 disadvan-
tage for Graphical User Interface.Choose
C. Input
the disadvantage
D. Hardware
A. The user doesn’t need to memorise the
641. Which of the software below is best commands
suited for an automatic washing ma- B. Simple to use for beginners
chine?
C. Takes up a lot of processing power and
A. Control program memory
B. Database D. none of above
C. Measuring program
646. what does OS stand for
D. Search engine
A. One Second
E. Word processor
B. Operating System
642. What are the TWO things the Task Man-
C. One Stand
ager does?
A. Provides some information about the D. Only Segment
computer’s performance and the applica-
647. What type of Software is needed to con-
tions and processes running.
trol the computer’s hardware? (1-3)
B. Helps you find the missing documents
A. Programming Software
scattered all over the hard-drive of the
computer. B. Systems Software
C. Gathers information on the processing C. Application Software
and compiling of modern documents and D. Bespoke Software
related aspects.
D. Most often used to terminate a pro- 648. Optical disks use and to represent
cess or program that is not responding. the digits 0 and 1.
A. pits and lands
643. These are used to control and coordinate
computer that are linked together. B. flats and dips
A. Desktop OS C. ups and downs
B. Virtualization D. ants and decs
649. is an electronic component that store 654. State three (3) examples of Mobile OS.
instructions waiting to be executed by the
A. BlackBerry OS
processor
653. Utility Programs that:Recover corrupted 658. A statement declare the name of
/ accidentally deleted data macro.
A. Program Uninstaller A. macro prototype
B. Disk Scanning Program B. macro definition
C. Backup Utility C. macro identification
D. Data Recovery Utility D. None of the above
NARAYAN CHANGDER
2.3 Boot Process
1. Where is the MBR located on the HDD 5. Operating systems is also known as
A. On the first sector in the HDD A. Database
B. Anywhere on the HDD B. System software
C. Runs after you log in 18. You get a CMOS checksum error during
D. Runs before Windows loads bootup. What is most likely the cause this
error?
13. POST stands for A. power supply is bad
A. point of service test B. b.BIOS needs updating
B. power on self test C. CMOS battery is nearing end of life
C. power off self test D. hard drive types are incorrectly de-
D. none of above fined
NARAYAN CHANGDER
20. What does the MBR contain? and assigning system resources, the
startup BIOS program will check for infor-
A. Boot Loader
mation about secondary storage devices
B. BIOS that might contain the OS. This list of de-
C. Device Setting vices and the order in which they should
be checked are found and arranged in the
D. OS
CMOS setup utility, and are commonly re-
21. Select Multiple:What is the Runlevel usu- ferred to as:
ally set as? A. The Boot Record
A. 2 B. The Boot sequence
B. 3 C. The MBR (Master Boot Record)
C. 4 D. The Disk Partition table
D. 5 26. Check all Hardware in the following op-
22. What are the different phases of the boot tions
process? A. HDD
A. BIOS → GRUB → Kernel → MBR → B. ROM
Init C. RAM
B. BIOS → MBR → GRUB → Kernel → D. Boot Loader
Init
E. BIOS
C. BIOS → GRUB → MBR → Init → Ker-
nel 27. When launching Windows Virtual PC appli-
cation a technician receives an error mes-
D. BIOS → Kernel → Init
sage that the Hardware-Assisted Virtual-
23. Which of the following is not a multitask- ization (HAV) feature is not enabled on the
ing operating system? computer. Which steps might help to fix
the problem?
A. Windows
A. Safe mode troubleshooting
B. Linux
B. Re-install the Windows Virtual PC ap-
C. Win NT plication
D. DOS C. Get into the CMOS setup utility and en-
24. What is the correct boot process or- able the virtualization technology setting
der? 1.OS Initializing itself2.Loading D. Increase the amount of physical RAM
the OS3.BIOS checking hardware on the system
C. Mater Booting Read 34. Where do modern PCs store CMOS set-
D. Master Boot Read tings?
A. .BIOS
29. BIOS stands for
B. Flash ROM
A. Basic Input Output System
C. NVRAM
B. Basic Input Out-process System
D. Southbridge
C. Basic Inside Outside system
D. Both A and B 35. POST(power on self Test) checks all of the
following except:
30. Where is BIOS stored?
A. modem
A. On the RAM
B. memory
B. On the Motherboard ROM
C. CPU
C. On the GPU
D. video
D. in the CPU
36. What is Firmware?
31. the cold boot means
A. Software that is generally stored on a
A. slow booting of the computer when Flash ROM part of the hardware.
turned on
B. Software that is used specifically for
B. begginng the boot process by turning the device it is part of.
off the computer system
C. Software that is part of the hardware.
C. beggining the boot process by turning
D. All of the above.
on the computer.
D. none of above 37. The Correct Boot Sequence is
A. Power on-BIOS-POST-Boot Strap
32. During boot-up, the memory test:
Loader-MBR-kernel (OS)-Login screen
A. Is a superfluous step that should be ig-
B. Power on-BIOS-POST-MBR-kernel
nored
(OS)-Boot Strap Loader-Login screen
B. Checks and verifies that contiguous
memory is installed C. Power on-POST-MBR-BIOS kernel
(OS)-Boot Strap Loader-Login screen
C. Is an operational error
D. Power on-BIOS kernel (OS)-POST-
D. Displays what memory is installed, but MBR-Boot Strap Loader-Login screen
nothing else
38. Noise cannot be created due to
33. The boot device priority is
A. Monitor
A. the order in which the devices are lo-
cated B. HDD
NARAYAN CHANGDER
it is called a
A. Cold Boot C. RAM
50. Select the two places specific parameters D. Load the Shell/GUI (DOS Prompt)
of a new device are stored after replac-
ing a modular hardware component inside 52. From what location are the 1st computer
B. CMOS B. boot.ini
51. What is the first Step when cold booting a 53. Fault can be
machine? A. An error
A. OS initializing itself B. Corrupted disk
B. Loading the OS C. Failure to function
C. BIOS checking hardware (POST) D. Enact disk
NARAYAN CHANGDER
3.1 Process Concept
1. is not a multi user operating system. B. memory management
A. UNIX C. file management
B. WINDOWS D. disk management
C. LINUX 4. ) Which of the following is an appropriate
D. DOS description concerning the OS for PCs?
A. Each PC allows only one (1) type of OS
2. ) Which of the following is an appropriate to be installed and run on it.
description concerning a CPU?
B. Each PC allows only one (1) type of OS
A. The cache memory that is integrated to be installed and run on it.
into a CPU is used to virtually extend the
C. When an OS is upgraded to a new ver-
B. A CPU is equipped with the arithmetic sion, all of the software operating with the
and logical function that serves as part of old
C. A CPU is categorized as a 16-bit, 32- D. There exist some OSs for PCs that can
bit, or 64-bit CPU depending on the data be started up by using an external storage
volume
5. ) When the types of programs that are ex-
D. For CPUs that have the same architec-
ecuted when a PC is started are broadly
ture, the higher the clock frequency, the
classified into three categories, namely
faster
BIOS (Basic Input Output System), OS, and
3. Dynamically allocating portions of primary resident application program, which of the
storage to programs at their request, and following is the order of execution of the
freeing it for reuse when no longer needed programs?
including dynamically moving programs A. BIOS, OS, resident application pro-
between secondary and primary storage gram
when needed B. OS, BIOS, resident application pro-
A. processor management gram
D. XOXO D. Pipe
7. Left, Center, Right, and Justify are options 12. I am writing a new operating system and
for which tool located on the toolbar or rib- begin implementing some processor man-
bon? agement. Which of the three below under-
pins the others and so should be the one I
A. Zoom
start work on first?
B. Line Spacing
A. multi-programming
C. Bulleted Lists
B. multi-tasking
D. Text Alignment
C. multi-processing
8. ) The strategy of making processes that
D. none of above
are logically runnable to be temporarily
suspended is called
13. ) A memory connected to a microproces-
A. Non preemptive scheduling sor has 20 address lines and 16 data lines.
B. Preemptive scheduling What will be the memory capacity?
C. Shortest job first A. 8 KB
D. First come First served B. 2 MB
NARAYAN CHANGDER
D. multi-plying
D. iOS
16. Which of the following is the most recent
version of Windows? 22. ) Which of the following is a special-
purpose register of microprocessor?
A. Windows 8
A. Program counter
B. Windows 7
B. Instruction register
C. Windows 10
C. Accumulator
D. none of above D. Temporary register
17. This is not a operating system 23. What is the degree of multiprogramming?
A. Batch A. the number of processes executed per
B. Online unit time
C. Time sharing B. the number of processes in the main
memory at any point
D. Random
C. the number of processes in the I/O
18. This is not called equvalent of a process.. queue
A. Job D. none of above
B. Program 24. ) The portion of the process scheduler in
C. Task an operating system that dispatches pro-
cesses is concerned with
D. Archive
A. assigning ready processes to CPU
19. ) Which is the most optimal scheduling al-
B. assigning ready processes to waiting
gorithm?
queue
A. FCFS-First come First served C. assigning running processes to
B. SJF-Shortest Job First blocked queue
C. RR-Round Robin D. all of the mentioned
D. None of the mentioned 25. Which of the following is NOT a desktop
operating system?
20. What is one reason there is a greater per-
centage of Windows users than Mac OS A. OS X
X? B. Windows
A. Not as good C. Chrome OS
B. Do not meet the individual needs D. Google Android
NARAYAN CHANGDER
C. First come first serve C. on the Internet
47. Which of the following is not one of the C. When the CPU reads data, it first ac-
most common operating systems for per- cesses the primary cache memory, and
sonal computers? then it
56. Which of the following commands appears 61. ) Orders are processed in the sequence
in the Insert menu or tab? they arrive if rule sequences the jobs.
A. Table A. earliest due date
B. Undo/Redo B. slack time remaining
C. Bold C. first come, first served
D. Line Spacing D. critical ratio
NARAYAN CHANGDER
57. The memory returned by a call to malloc
62. A Process Control Block(PCB) does not con-
comes from the
tain which of the following?
A. data segment
A. Code
B. heap segment
B. Stack
C. text segment
C. Bootstrap program
D. stack segment
D. Data
58. ) Which of the following is an OS func-
tion that executes several application pro- 63. In operating system, each process has its
grams progressively in turn on a single PC, own
such as when a file is downloaded from A. a) address space and global variables
a web site while data is processed with
spreadsheet software? B. b) open files
A. a.) Virtual reality C. c) pending alarms, signals and signal
handlers
B. b) Dual core
D. all of the mentioned
C. c) Dual system
D. d) Multitasking 64. The ability for an operating system to give
the appearance to the user of simultane-
59. Part of the operating system will loaded ous process execution by rapidly changing
in part of memory. between processes in short scheduled time
A. Upper slices
B. Lower A. multi-programming
C. Both B. multi-tasking
D. None of these C. multi-processing
60. In a operating system, the purpose of the D. multi-plying
stack is
65. ) Round robin scheduling falls under the
A. To store the return addresses of called category of
functions
A. Non-preemptive scheduling
B. To keep the parameters of called func-
tions B. Preemptive scheduling
C. To store local variables C. All of the mentioned
D. All of the above D. None of the mentioned
66. ) Which of the following is the appropri- 70. ) The microprocessor of a computer can op-
ate explanation of a master schedule in erate on any information if it is present in
a system development project where pro- only.
74. The LXSS manager is a component of 75. Which of these is NOT a key function of an
A. Linux OS to support the virtualization operating system
of Windows A. user interface
B. Windows OS to support Linux’s system
calls B. file management
C. macOS X to support Windows’ system C. processor management
calls
D. memory management
NARAYAN CHANGDER
D. Android to support the virtualization of
Windows Phone E. word processing
C. Once a processor starts a task, it will 4. allows the superuser to set a global
complete it without interruption. kernel variable to a value that gives the
current time.
D. Any processor can execute any task
A. time
2. Consider the following set of processes, B. times
with the arrival times and the CPU-burst
C. stime
times given in millisecondsProcess Arrival
Time Burst Time P1 0 5 P2 1 3 P3 2 3 P4 D. none of above
4 1What is the average turnaround time
5. In the time sharing operating system,
for these processes with the preemptive
when the time slot given to the process
shortest remaining processing time first
completed, the process goes from the Run-
(SRPT) algorithm?
ning state to the
A. 5.8
A. Blocked State
B. 7.75 B. Ready State
C. 6.5 C. Suspended State
D. 5.50 D. Terminated State
3. With round robin scheduling algorithm in a 6. The strategy of making processes that are
time shared system logically runnable to be temporarily sus-
pended is called:
A. Using very large time slices converts
it into First come first served scheduling A. Non preemptive scheduling
algorithm B. Shortest job first
NARAYAN CHANGDER
sified ready queue D. none of the mentioned
C. Processes are not classified into 23. The FIFO algorithm:
groups A. First executes the job that came in last
D. None of the mentioned in the queue
18. In priority scheduling algorithm, when a B. First executes the job that came in first
process arrives at the ready queue, its pri- in the queue
ority is compared with the priority of C. First executes the job that needs mini-
A. all process mal processor
B. currently running process D. First executes the job that has maxi-
mum processor needs
C. parent process
D. init process 24. What is the minimum time required to com-
plete eight independent tasks with a total
19. Module gives control of the CPU to the pro- task time of 160 minutes on four proces-
cess selected by the CPU scheduler sors?
A. Dispatcher A. 10 minutes
B. CPU Scheduler B. 20 minutes
C. Non preemptive Scheduler C. 40 minutes
D. Preemptive Scheduler D. 60 minutes
20. Which Scheduling algorithm allocates the 25. the amount of time without interruption
CPU first to the process that requests CPU required by one processor to execute that
first? task is called the
A. First Come First serve scheduling A. task time
B. shortest job scheduling B. work time
C. priority scheduling C. processing time
D. none of the mentioned D. nap time
21. Time required by a process for CPU execu- 26. Which of these is a benefit of FCFS
tion A. Simple to implement
A. Arrival time B. It considers priority
B. Completion time C. Long jobs will get completed eventu-
C. Burst time ally
D. Turn around time D. none of above
27. is the only process that swaps process B. Any size job
into memory from swap device.
C. Large jobs
D. 10 A. All process
B. Currently running process
31. The SJF algorithm is not fair for which type
of job? C. Parent process
A. Small jobs D. Init process
36. Amount of time to execute a particular pro- 41. Correct scheduling techniques depend on
cess volume orders, nature of the operation and
overall complexity of job with FOUR (4)
A. Waiting time
criteria. Which of the following is NOT one
B. Turnaround time of the scheduling criteria?
C. Response time A. Minimize completion time
D. CPU utilization B. Minimize utilization of facilities
NARAYAN CHANGDER
C. Minimize work in process (WIP) inven-
37. The processes that are residing in main
tory
memory and are ready and waiting to ex-
ecute are kept on a list called: D. Minimize customer waiting time
A. job queue 42. Use the decreasing-time-list algorithm to
B. ready queue schedule these independent tasks on three
machines:8 minutes, 9 minutes, 11 min-
C. execution queue utes, 3 minutes, 4 minutes, 12 min-
D. process queue utesHow much time does the resulting
schedule require?
38. Which algorithm is complicated to imple-
A. P1:15; P2:15, P3:17
ment and might not look at small jobs
B. P1:17; P2:15, P3:15
A. Multi-level feedback
C. P1:20; P2:16, P3:12
B. Round robin
D. P1:11; P2:13, P3:23
C. FCFS
43. Program counter holds the address of
D. none of above
A. Instruction that is currently in execu-
39. Consider the following table of arrival tion
time and burst time for three processes B. Next instruction to be executed
P0, P1 and P2. (GATE-CS-2011)Process
Arrival time Burst TimeP0 0 ms 9 msP1 1 C. Data set
ms 4 msP2 2 ms 9 ms D. Memory
A. 4.33 ms 44. Which one is not one of the Scheduling al-
B. 6.33 gorithms mentioned earlier.
C. 5.0 ms A. First-Come First-Serve
D. 7.33 B. Round Bear
C. Shortest Job First
40. What is the minimum time required to per-
form six independent tasks with a total D. none of above
task time of 48 minutes on 3 machines? 45. Time quantum is defined in
A. 2 A. Shortest job scheduling algorithm
B. 8 B. Round robin scheduling algorithm
C. 16 C. Priority scheduling algorithm
D. 18 D. Multilevel queue scheduling algorithm
46. Head sweeps back and forth across the 51. Throughput is
disk, servicing requests according to SSTF
A. Total number of instructions executed
in a preferred direction
55. The problem with round robin, SJF and STR B. Shortest Job First
is what? C. Shortest Remaining Time First
A. They don’t take into account priority D. Priority Based scheduling
B. They all take too long
61. Priority scheduling where priority is the in-
C. Short jobs will not be completed verse of predicted next CPU burst time.
D. none of above A. Non preemptive Scheduling
56. Total amount of time a process has been B. Completion time
NARAYAN CHANGDER
waiting in the ready queue C. Shortest Job First
A. Throughput D. Turnaround time
B. Turnaround time 62. A company produces digital photo frames
C. Response time (i.e. photo frames that display digital pho-
D. Waiting time tographs). Identify the type of operating
system that the photo frame is most likely
57. Free space in swap device is maintained in to use.
A. Distributed
A. Linked list B. Embedded
B. map C. Multi-user
C. incore table D. none of above
D. none of above
63. Process which have the shortest burst
58. What is the name of the scheduler in Unix time are scheduled first.
system A. Shortest Remaining Time First
A. round robin B. Priority Based scheduling
B. circular queue C. First Come First Serve
C. round robin with multilevel feedback D. Shortest Job First
D. circular linked list 64. Which of these is NOT an aim of the CPU
59. In this, the process that comes first will be scheduler
executed first and next process starts only A. To maximise CPU time
after the previous gets fully executed. B. Process as many jobs as possible
A. First-come, first-serve C. To complete jobs in at least 30 seconds
B. Shortest-job-first scheduling
C. Round-robin scheduling D. none of above
D. Priority scheduling 65. Process are classified into different groups
E. Multilevel Queue scheduling in
A. Shortest job scheduling algorithm
60. It is preemptive mode of SJF algorithm in
which jobs are schedule according to short- B. Round robin scheduling algorithm
est remaining time. C. Priority scheduling algorithm
A. First Come First Serve D. Multilevel queue scheduling algorithm
A. Z3 A. 6
B. 14
B. Z3
C. 24
C. Zx3
D. 42
D. Z(3)
75. Process are classified into different groups
70. Each process is assigned a fixed time in
in
cyclic way.
A. shortest job scheduling algorithm
A. First Come First Serve
B. shortest job scheduling algorithm
B. Round Robin Scheduling
C. priority scheduling algorithm
C. Shortest Job First
D. multilevel queue scheduling algorithm
D. Shortest Remaining Time First
76. Simplest scheduling algorithm that sched-
71. Mid term scheduler is responsible of ules according to arrival times of pro-
A. Degree of multi-programming cesses.
B. Swat out-swap in A. First Come First Serve
B. Shortest Job First 81. How to compute or get the Turn Around
Time in round-robin scheduling?
C. Round Robin Scheduling
A. Time difference between waiting time
D. Priority Based scheduling
and arrival time
77. Consider an arbitrary set of CPU-bound B. Time difference between completion
processes with unequal CPU burst lengths time and burst time
submitted at the same time to a computer C. Time difference between completion
system. Which one of the following pro-
NARAYAN CHANGDER
time and arrival time.
cess scheduling algorithms would minimize
the average waiting time in the ready D. Time difference between waiting time
queue? and burst time
A. Shortest remaining time first 82. Consider three CPU intensive processes
B. Round-robin with time quantum less P1, P2, P3 which require 20, 10 and 30
than the shortest CPU burst units of time, arrive at times 1, 3 and
7 respectively. Suppose operating sys-
C. Uniform random tem is implementing Shortest Remaining
D. Highest priority first with priority pro- Time first (pre-emptive scheduling) algo-
portional to CPU burst length rithm, then context switches are re-
quired (suppose context switch at the be-
78. Degree of multi-programming is controlled ginning of Ready queue and at the end of
by Ready queue are not counted).
A. Short term scheduler A. 3
B. Mid term scheduler B. 2
D. Dispatcher D. 5
NARAYAN CHANGDER
100. Consider the following statements about
C. Round-robin scheduling process state transitions for a system us-
D. Priority scheduling ing preemptive scheduling.I. A running pro-
cess can move to ready state. II. A ready
E. Multilevel queue scheduling process can move to ready state. III. A
96. Which of the following decisions covers blocked process can move to running state.
the longest and shortest time period? IV. A blocked process can move to ready
state. Which of the above statements are
A. Aggregate Planning and Short Term TRUE?
Scheduling
A. I, II, III ONLY
B. Capacity Planning and Short Term
Scheduling B. II, III ONLY
C. Aggregate Planning and Master Sched- C. I, II, IV ONLY
ule D. I, II, III AND IV
D. Master Schedule and Short Term
101. Which of the following process schedul-
Scheduling
ing algorithm may lead to starvation
97. P5 implies there are A. FIFO
A. at most five processors B. RR
B. at least five processors C. Shortest Job Next
C. exactly five processors D. NONE
D. one processor named P5
102. Which algorithm is being described..
98. Use the decreasing-time-list algorithm to “Long jobs might never get completed as
schedule these tasks on two processors:3 short processes will always ‘jump the
minutes, 5 minutes, 8 minutes, 4 minutes, queue”
6 minutes, 2 minutesHow much time does A. Round robin
the resulting schedule require?
B. FCFS
A. 14
C. STR
B. 15
D. none of above
C. 16
D. 18 103. Which of the following scheduling algo-
rithms may cause starvation? a. First-
99. In the algorithm, the disk arm starts at come-first-served b. Round Robin c. Pri-
one end of the disk and moves toward the ority d. Shortest process next e. Shortest
other end, servicing requests till the other remaining time first
A. a, c and e B. schedule
B. c, d and e C. priority
NARAYAN CHANGDER
D. 10 Use, for the minimum achievable av-
A. shortest job scheduling algorithm erage waiting time
B. round robin scheduling algorithm
116. The scheduling in which a running process
C. priority scheduling algorithm
cannot be interrupted by any other process
D. multilevel queue scheduling algorithm
A. Dispatcher
115. Three processes arrive at time zero with B. Preemptive Scheduling
CPU bursts of 16, 20 and 10 milliseconds.
If the scheduler has prior knowledge about C. Non preemptive Scheduling
the length of the CPU bursts, the minimum D. CPU Scheduler
18. Message passing system allows processes B. the sender blocks until the receiver re-
to ceives the message
A. share data C. the sender keeps sending and the mes-
B. name the recipient or sender of the sages don’t wait in the queue
message D. none of the mentioned
C. communicate with each other without
23. How many methods are in IPC?
sharing the same address space
NARAYAN CHANGDER
A. SIX
D. communicate with one another by re-
sorting to shared data B. FIVE
C. SEVEN
19. The objective of multi programming is to:
D. EIGHT
A. Have some process running at all
times 24. Message Passing is accomplished using
B. Have multiple programs waiting in a
queue ready to run A. communication Link
C. To minimize CPU utilization B. Message Passing Link
D. None of the mentioned C. System Calls
20. In indirect communication between pro- D. Interrupt
cesses P and Q:
25. Which of the following do not belong to
A. there is another process R to handle queues for processes?
and pass on the messages between P and
Q A. Job Queue
A. the queue can store at least one mes- C. None of the above
sage D. Both a & b
28. The address of the next instruction to be C. the sending process keeps sending un-
executed by the current process is pro- til it receives a message
vided by the
NARAYAN CHANGDER
D. Transmission media A. Obtain information by posing as a
trustworthy entity.
6. Which of the following is an example
of what is usually done using client-side B. Limit access to e-mail systems by au-
scripting? thorized users.
A. Accessing web databases C. Steal data through the use of network
intrusion.
B. Simple validation of user input
D. Corrupt e-mail databases through the
C. Create stylesheet files using PHP use of viruses.
D. Complex calculations
12. Evaluate the statement pick the correct an-
7. What is the primary advantage of using swer for the underlined phrase.A mail sys-
Active Directory Integrated Zones? tem administrator scans for viruses in in-
coming emails to increase the speed of mail
A. Zone encryption
processing.
B. Password protection
A. Decrease the chances of a virus get-
C. Non-repudiation ting to a client machine
D. Secure replication B. Verify that the senders of the mes-
sages are legitimate
8. Each statement in PHP and Javascript ends
with C. Ensure that all links in the messages
are trustworthy
A. A new line
D. No change is needed.
B. A colon
C. A semi-colon 13. Which of the following is not a type of
server?
D. A curly bracket
A. File Server
9. Which is NOT an advantage of a thin- B. Email Server
client?
C. Webpage Server
A. Easy and cheap to set up new clients
D. PowerPoint Server
B. Hardware and software changes only
need to be implemented on the server 14. Which best describes a server?
C. Greater security as clients have fewer A. A computer that stores data
rights B. A computer that stores software
D. May require greater bandwidth to C. Central computer-provides clients
cope with client requests with functionality
24. Which of these is an advantage of cloud 29. Which two security settings can be con-
storage? trolled by using group policy? (Choose
A. The user has no control over their data two.)
NARAYAN CHANGDER
connection
D. Portability 30. You want to make your computer resistant
to online hackers and malicious software.
25. What is the process of using third party What should you do?
servers to store data and run online appli-
cations? A. Configure a forward proxy
34. HTML can be used to create ‘static’ web C. Download email attachments
pages. For a client-server application, the D. None of these
web page is ‘dynamic’ thanks to
A. The amount of time data takes to travel 41. A tool(s) to detect and protect against ma-
from the source to the destination licious email is/are
B. The maximum rate that data can be A. Bayesian filter
transferred at B. Sender Policy Framework
C. The number of errors that are found in C. UAC
a data packet after transmission D. MBSA
D. The route a packet takes when it is be-
42. Which is NOT true of the websocket pro-
ing transmitted
tocol?
37. Which of the following is BAD advice for A. Provides a persistent, bi-directional
protecting your computer against infec- real-time communication channel be-
tion? tween client and server
A. Open email attachments if they look in- B. Is an example of a modern API used
teresting for communication
B. Use up-to-date anti-virus software and C. Typical uses are online gaming and in-
always download the latest definitions stant messaging
C. Only download files from reputable in- D. Increases data usage
ternet sites
43. The CRUD operation ‘Retrieve’ would map
D. None of these to which SQL database function?
38. What is the most common way people’s A. SELECT
computers get infected by a virus? B. INSERT
A. Receive a call C. UPDATE
B. Install a new hardware D. DELETE
44. Which best describes a peer to peer net- B. Computers are connected together us-
work? ing a leased line or a satellite
A. To peers connected together C. Users can share files and peripherals
B. Devices connected together-without a D. Data can only be transmitted at a very
server slow rate
C. To piers connected together 49. Most web applications nowadays are ex-
D. Two devices connected together- ample of client-server application that in-
NARAYAN CHANGDER
without a client corporates a database such as MySQL.
This database is usually stored in
45. How does the sender policy framework A. Client computer
(SPF) aim to reduce spoofed email?
B. Server computer
A. It provides a list of IP address ranges C. Third party computer between Client
for particular domains so senders can be and Server
verified.
D. Parts in client, parts in server
B. It includes an XML policy file with each
email that confirms the validity of the mes- 50. Which is not true in a client-server net-
sage. work?
C. It lists servers that may legitimately A. A server manages access to the inter-
forward mail for a particular domain. net
D. It provides an encryption key so that B. A client makes requests to the server
authenticity of an email message can be for data and connections
validated C. A server runs a backup of data
D. Each peer is responsible for its own
46. Which technology enables you to filter
backup
communications between a program and
the Internet? 51. Which of these is an example of a modern
A. RADIUS server API used for communication?
53. The purpose of Microsoft Baseline Security 58. Which is a disadvantage of a peer to peer
Analyzer is to: network?
A. A computer connected to a client- 62. Evaluate the statement pick the correct an-
server network swer for the underlined phrase.The Win-
B. Something that serves the server dows Firewall protects computers from
unauthorized network connections.
C. A client belongs to the server
A. Email viruses
D. Something that is connected to the
B. Phishing scams
main computer
C. Unencrypted network access
57. what does p2p stand for
D. No change is needed
A. peer two peer
63. Which is an advantage of client-server net-
B. point 2 point
works?
C. pear too pear A. Files/Internet connection/hardware
D. peer to peer can be shared
NARAYAN CHANGDER
B. So the client can access the database A. Make sure all systems are Windows 7
or later
C. It allows some of the processing to be
done by the user’s machine B. Install Applocker
D. The client computer is more powerful C. Set a security baseline
than the server
D. Install Windows Defender
65. Bob needs to restrict the websites the em-
ployee can go to. What are some of her 70. Question 4:Which of these statements is
options? true?
C. Disconnect the computer from the net- 71. What is an advantage of a LAN?
work in connected to business network
A. You can save money by sharing periph-
D. Run an on demand antivirus scan of all erals like printers.
files
B. It is limited to a small area.
67. Which of the following languages is used
C. Can cover near infinite geographical
for server side scripting on the web?
distance.
A. HTML
D. Expensive to setup.
B. Javascript
C. PHP 72. What does a server store?
D. VBA A. Client data
68. How can a trojan infect your pc? B. Software and client data
A. On memory sticks. C. Back up files
B. Through email attachments. D. Software
73. Which is not an advantage of the client- 78. which refers to a p2p
server model? A. all clients are equal but some are more
83. What is Representational State Transfer 89. What is meant by a data packet?
(REST) used for? A. A unit of data that travels along a net-
A. AN API that enables CRUD to be work
mapped to SQL functions B. The number of errors found in data
B. A protocol for addressing data packets when it has been transmitted
C. A protocol that allows files to be up- C. The data a computer needs to connect
loaded to a server to a network
NARAYAN CHANGDER
D. A security method D. A connection point in a network that al-
lows data to be shared
84. What are the advantages of a peer to peer
network? 90. choose 2:on a client server it is easier to
A. More stylish
B. Relatively cheap, low maintenance A. manage backups
C. Faster B. manage security files
D. More effective C. to set up
D. use as it does not need specialist staff
85. LAN stands for
A. Local Area Network 91. Which of the following is an advantage of
a peer to peer network?
B. Large Area Network
A. Files and folders cannot be centrally
C. Little Area Network
backed up.
D. Local Analogue Network
B. Does not need an expensive server
86. Which is NOT true of JSON? as individual workstations are used to ac-
cess files.
A. More complicated for a human to read
C. The server is expensive to purchase
B. More compact code
D. Network security can be carried out
C. Easier for computers to parse
centrally.
D. Easier to create
92. Which Internet Explorer zone is the least
87. What is an example of non-propagating secure?
malicious code?
A. Internet zone
A. A back door
B. local intranet zone
B. A hoax
C. trusted sites zone
C. A Trojan horse
D. restricted sites zone
D. A worm
93. What is cloud storage?
88. Where are you most likely to find a peer-
to-per network? A. Storing data on the server of another
company, accessible through the Internet
A. In a large organisation
B. Storage accessible anywhere with an
B. In a home internet connection
C. In a large office C. Running programs on a remote server,
D. Across several offices in a company accessible with an Internet connection
D. All of the above 97. How does a computer virus infect a pc?
A. Email attachments
94. In PHP assigning value to a variable may
NARAYAN CHANGDER
4.1 Overview
1. Uses BLOCKS = commands C. privacy
A. Linux D. responsiveness
B. Windows 5. What is multithreaded programming?
C. Android
A. It’s a process in which two different
D. Mac OS X processes run simultaneously
2. Which method is used to wait for child B. It’s a process in which two or more
threads to finish in Java? parts of same process run simultaneously
A. wait () C. Its a process in which many different
process are able to access same informa-
B. sleep ()
tion
C. join ()
D. Its a process in which a single pro-
D. isAlive() cess can access information from many
sources
3. One system call, if executed, can disrupt
threads in execution, blocking all possibili- 6. Which of this method can be used to make
ties the main thread to be executed last among
A. OS Dependent all the threads?
B. Kernel-Level Threads(KLT) A. stop
C. System Call Blocking B. sleep
D. User-Level Threads (ULT) C. join
19. What method in thread class do you call 25. It is defined resources in the process, i.e.,
to make the current thread cease execut- allocation of I/O devices.
ing for a specified amount of time?
A. Resource Ownership
A. sleep()
B. Threads
B. pause()
C. stop() C. Process Execution
D. wait() D. Process
NARAYAN CHANGDER
20. Which method must be defined by a class 26. Which thread will be executed first if two
implementing the java.lang.Runnable in- threads have same priority
terface?
A. They will fall in starvation and none will
A. public void start()
be executed.
B. public void run()
B. Both will be executed simultaneously
C. void run()
C. It depends upon operating system
D. None of these
D. They will be executed on first come
21. Daemon thread runs in
first serve basis
A. Background
B. Foreground 27. wait(), notify() and notifyAll() belongs to
which class?
C. Both
D. none A. Thread
B. 1 C. start()
C. 5 D. None
D. 3
29. Which method is called internally by
24. What are the approaches under mutual ex- Thread start() method?
clusion?
A. execute()
A. Synchronized method
B. run()
B. Synchronized block
C. Static synchronization C. launch()
D. All the above D. main()
30. Which of this method is used to begin the 36. What will happen if two thread of the
execution of a thread? same priority are called to be processed
simultaneously?
NARAYAN CHANGDER
C. task parallelism
42. Default value of a java thread is D. identifying task
A. 0
48. Select method that must be defined by a
B. 1 class implementing the java.lang.Runnable
C. 5 interface.
D. 10 A. public void runs()
B. public void run()
43. Which method is used to get current run-
ning thread object? C. public void start()
A. low D. sleep()
B. high 61. Which method is used to make main thread
C. Normal to wait for all child threads
D. None A. join ()
B. sleep ()
56. Which of this interface is implemented by
Thread class? C. wait ()
A. Runnable D. stop ()
B. Connections 62. It is the presence of cores in a single or
C. Set more processors in a given system.
D. MapConnections A. Multicore
B. Thread
57. To create a daemon thread
A. First thread setDaemon() is called C. Multithreading
then start() D. Core
63. It is a threads that rely heavily on the C. It’s a process by which a method is
Operating System through dispatched pro- able to access many different threads si-
cesses in the processing queue. multaneously
A. OS Dependent D. It’s a method that allow too many
threads to access any information require
B. Kernel-Level Threads(KLT)
C. System Call Blocking 68. Process synchronization can be done on
D. User-Level Threads (ULT) A. hardware level
NARAYAN CHANGDER
B. software level
64. What is the priority of the thread in
the following Java Program? class C. both hardware and software level
multithreaded programing { pub- D. none of the mentioned
lic static void main(String args[]){
Thread t = Thread.currentThread(); Sys- 69. How many Types of synchronization ap-
tem.out.println(t); } } proaches are there under mutual exclu-
sion?
A. 4
A. 3
B. 5
B. 4
C. 0
C. 2
D. 1 D. 0
65. Thread is process that can run indepen- 70. The capability to control the access of mul-
dently tiple threads to any shared resource is
A. heavyweight called
B. lightweight A. Synchronization
C. compaction B. Multitasking
D. compression C. multithreading
D. None
66. Which of these are types of multitasking?
71. Which method we implement from
A. Process based
Runnable interface?
B. Thread based A. run ()
C. Both a & b B. start ()
D. None of the mentioned C. execute ()
67. What is synchronization in reference to a D. call ()
thread?
72. Execution of a java thread begins on which
A. It’s a process of handling situations method call?
when two or more threads need access to A. start ()
a shared resource
B. run ()
B. It’s a process by which many thread
are able to access same shared resource C. execute ()
simultaneously D. launch ()
73. Default priority value of a java thread is 78. synchronized instance methods acquire
A. 0 lock on
A. Thread A. 1, 10
B. Process B. 0, 10
C. JVM C. 0, 255
D. none of above D. 1, 256
77. is a mechanism in which a thread is 82. and are the types of synchroniza-
paused running in its critical section and an- tion.
other thread is allowed to enter (or lock) in A. Process synchronization and thread
the same critical section to be executed.It synchronization
A. Inter thread communication B. multitasking and multithreading
B. Co-operation C. Interthread communication and mu-
C. option 1 or option 2 tual exclusion
D. None D. None
NARAYAN CHANGDER
D. both a & b A. Resource Ownership
B. Threads
84. An application begins with a single thread
and begins running in that thread. C. Process Execution
A. OS Dependent D. Process
D. the POSIX defining an API for thread C. MPI Bcast( & abc[4], 1, MPI
creation and synchronization INT, 0, comm)
13. The difference of using threadSafeMalloc() 17. Tour and stack are
instead of malloc() is A. Linear data structure
A. Serialize the program B. Non linear data structure
B. multithreaded program to have only a C. Both a) and b)
single executing thread
D. None of the above
C. Parallelize the program
18. Interconnection networks are also called
D. Both a) and b)
NARAYAN CHANGDER
A. Communication subnets
14. occurs when two or more processes
B. Communication subsystems
continuallyrepeat the same interaction in
response to changes in the otherprocesses C. Cellular telecommunication
without doing any useful work D. Both a and b
A. Deadlock
19. Invoking periodically to test for deadlock
B. Livelock is one of the way for deadlock
C. Mutex Lock A. Prevention
D. Spin Lock B. Avoidance
C. Detection
15. MPI THREAD MULTIPLE
D. Deletion
A. Only one thread will execute
B. The process may be multi-threaded, 20. In only one process at a time is allowed
but only the main thread will make MPI into its critical section, among all processes
calls-all MPI calls are funneled to the main that have critical sections for the same re-
thread. source.
C. The process may be multi-threaded, A. Mutual Exclusion
and multiple threads may make MPI calls, B. Synchronization
but only one at a time. That is, calls are
C. Deadlock
not made concurrently from two distinct
threads as all MPI calls are serialized. D. Starvation
D. Multiple threads may call MPI with no 21. Which of the following statement is true
restrictions. about wrapper script?
16. The reason for the implementation of the A. Compiles the program
cache memory is B. Simplifies the running of compiler by
A. To increase the internal memory of the telling it where to find the necessary head-
system erfiles and which libraries to link with ob-
ject file
B. The difference in speeds of operation
of the processor and memory C. Execute the program
parallely update the variable a, Whether 27. Which of the following is the most appro-
data race occur or not. priate definition for a ‘GPU’?
31. In MPI global communication functions processor speed and efficiency in all situa-
that can involve more than two pro- tions?
cesses.These functions are called A. Multi-core processors are rarely used
A. Synchronous communication B. Many problems are not fully parallelis-
B. Asynchronous communication able
C. Collective communication C. Writing programs to take advantage of
multiple cores can be complex
D. None of the above
NARAYAN CHANGDER
D. There are overheads in terms of com-
32. Message queue is a form of munication between multiple cores
A. Synchronous service 37. Computer system of a parallel computer is
B. Asynchronous service capable of
C. Support both a) and b) A. Decentralized computing
D. None of these B. Parallel computing
C. Centralized computing
33. OpenMP assigns piece of computations to
D. Decentralized computing
A. Process 38. Paths that have an unbounded number
B. Thread of allowed nonminimal hops from packet
sources, this situation is referred to as
C. Program
A. Unblocking
D. All the above
B. Blocking
34. The difference between Pthreads and C. Livelock
OpenMP implementation is in
D. Deadlock
A. Parallelizing the inner loop
39. Writing parallel programs is referred to as
B. Parallelizing the outer loop
A. Parallel computation
C. Parallelizing both inner and outer loop
B. Parallel processes
D. None of the above
C. Parallel development
35. Synchronization is necessary D. Parallel programming
A. to ensure that shared resources are
40. Which of the following is suitable for
not accessed by multiple threads simulta-
‘thread’?
neously
A. Heavyweight process
B. All work on those resources is com-
plete before new work starts B. Lightweight process
C. Both a) and b) C. Process
D. None of these D. A task
36. Which of the following is NOT a reason 41. A semaphore is a shared integer variable
why doubling the number of processor
cores does not lead to a direct doubling of A. that can not drop below zero
B. that can not be more than zero 47. The time to complete a single task is Z
C. that can not drop below one A. Response time
53. What locality does the following code 58. Which of the following statements is/are
havefor(i=0; i < N; i++) sum += x[i];? true about performance of reduced solver
and basic solver?
A. Temporal
A. The reduced MPI solver makes much
B. Iterative
more efficient use of memory than the ba-
C. Spatial sic MPI solver
D. Temporal and Spatial B. The basic solver must provide storage
for all n positions on each process, while
NARAYAN CHANGDER
54. The average time required to reach a stor- the reduced solver only needs extra stor-
age location in memory and obtain its con- age for n=comm sz positions and
tents is called n=comm sz forces
A. Latency time. C. Both a) and b)
B. Turnaround time. D. None of the above
C. Access time. 59. used to coordinate the activity of mul-
D. Response time. tiple threads.
A. Asynchronization
55. An operation being done in a way that in-
B. Synchronization
tervening operation can be occurred, this
operation is called a C. Concurrence
A. Atomic D. None of these
B. Molecular 60. The data type used for storing the thread
id is
C. Multitasking
A. pthread t
D. Serial processing
B. p thread t
56. What is the output of the following C. pthread id
code when run with OMP NUM
D. pthread
THREADS=4? main(..) { static int arr[4]
= {1, 2, 3, 4} ; int x=1, j ; #pragma omp 61. Domain and functional decomposition
parallel for reduction(*:x) for(j=0 ; j<4 ; are considered in the following parallel
j++) x *= arr[j] ; printf( “%d”, x ) ; } methodological design elements, EXCE PT:
A. 24 A. Partitioning
B. 10 B. Communication
C. 0 C. Agglomeration
D. 4 D. Mapping
62. Which of the following is/are type of col-
57. Named pipe is
lective communication?
A. File like objects A. Broadcast
B. Tree like objects B. Reduction
C. Graph like objec C. Gather
D. All the above D. All the above
NARAYAN CHANGDER
79. By default local variables in Pthreads are
B. Write broadcast protocol , so all shared variables are global in
the Pthreads version.=
C. Read protocol
A. Public
D. both a and b
B. Private
74. Efficiency is C. Protected
A. E= S D. Static
B. E= S/P 80. Data centers and centralized computing
C. E= P covers many and
D. E= P/S A. Microcomputers
B. Minicomputers
75. Named pipe is called
C. Mainframe computers
A. LIFO
D. Supercomputers
B. FIFO
81. is a closed chain of processes exists,
C. FCFS such that each process holds at least one
D. None of these resource needed by the next process in the
chain.
76. Which of the following is the type of A. Mutual Exclusion
semaphore?
B. Hold and Wait
A. Binary semaphore
C. Preemption
B. Counting semaphore
D. Circular Wait
C. Both a) and b)
82. The time required to create a new thread
D. None of these in an existing process is
77. Binary Search works best on A. greater than the time required to cre-
ate a new process
A. Equally effective on sorted and un-
sorted lists B. less than the time required to create a
new process
B. Unsorted lists
C. equal to the time required to create a
C. Sorted lists new process
D. None of the above D. none of the mentioned
94. Which of the following would not be a rec- 100. when a process leaves a critical sec-
ommended use for a GPU? tion and more than one process is waiting,
A. Handling Operating System requests the selection of a waiting process is arbi-
trary
B. Password cracking
A. Busy waiting is employed
C. Weather modelling
B. Starvation is possible
D. Graphics rendering
C. Deadlock is possible
NARAYAN CHANGDER
95. Choose the tools to detect data race?
D. All of the above
A. Helgrind tool
B. Thread Analyzer 101. In which application system Distributed
C. Both a) and b) systems can run well?
B. handshaking B. Multithreading
C. token passing C. Multiprocessing
D. none of the mentioned D. None of the above
116. Microprocessors which are directly con- B. Efficiency is the ratio of the serial run
nected memory to a single-chip, that is time of the best sequential algorithm for
sometimes called as solving a problem to the time taken by the
A. Backside parallel algorithm to solve the same prob-
lem on p processors
B. Memory bus
C. Run time is the time that elapses from
C. Kernel the moment a parallel computation starts
D. both a and b to the moment the last processor finishes.
NARAYAN CHANGDER
117. A type of parallelism that uses micro ar- D. Superlinear is the fraction of time for
chitectural techniques. which a processor is usefully employed
126. To update the cached copies of the data 131. Which of the following statement is/are
item; is the alternative protocol which is true about critical metrics and their expec-
known as tation early inthe design?
NARAYAN CHANGDER
D. no thread within the process A. Many-to-Many
B. Many-to-One
138. Cache not able of containing the entire
C. Kernel
blocks needed while execution of a pro-
gram, is known as D. User
A. Cache full 143. Type of network that is used for interpro-
B. Cache hit cessor and processor-memory interconnec-
tions within multiprocessor, are
C. Hit rate
A. System/storage area networks
D. Cache misses
B. Local area networks
139. Private data that is used by a single- C. Wide area networks
processor, then shared data are used by
D. None of above
A. Single processor
144. A parallelism based on increasing proces-
B. Multi processor
sor word size.
C. Single tasking
A. Increasing
D. Multi tasking
B. Count based
140. Which header file needs to be used for C. Bit based
pthread programming? D. Bit level
A. pthread.h
145. Which one of the following is not shared
B. pthreads.h by threads?
C. p thread.h A. program counter
D. posix.h B. stack
141. MPI THREAD SERIALIZED C. both program counter and stack
A. Only one thread will execute. D. none of the mentioned
B. The process may be multi-threaded, 146. What data structures used for serial im-
but only the main thread will make MPI plementation?
calls-all MPI calls are funneled to the main A. Tour
thread.
B. Digraph
C. The process may be multi-threaded,
and multiple threads may make MPI calls, C. Stack
but only one at a time. That is, calls are D. All the above
147. Particular block’s statuses of physical 152. A term for simultaneous access to a re-
memory are normally kept in one location, source, physical or logical.
called
150. To enforce two functions are provided A. A space is visible to all execution
enter-critical and exit-critical, where each threads.
function takes as an argument the name of B. A multi address space is visible to all
the resource that is the subject of competi- execution threads.
tion. C. A address space is visible to all execu-
A. Mutual Exclusion tion threads.
B. Synchronization D. A single address space is visible to all
execution threads.
C. Deadlock
D. Starvation 155. is duplex pipe that provides communi-
cation between the pipe server and some
151. cannot be done arbitrary and espe- pipe clients.
cially when data resources are involved,
A. Message queue
must be supported by a rollback recovery
mechanism. B. Named pipes
A. Mutual Exclusion C. Unnamed pipes
B. Hold and Wait D. None of these
NARAYAN CHANGDER
but only the main thread will make MPI
calls-all MPI calls are funneled to the main C. Multi tasking
thread.
D. OpenMP = Open Multi-processing
C. The process may be multi-threaded,
and multiple threads may make MPI calls, 163. Tightly coupled set of threads’ execution
but only one at a time. That is, calls are working on a single task, that is called
not made concurrently from two distinct A. Multithreading
threads as all MPI calls are serialized.
B. Recurrence
D. Multiple threads may call MPI with no
restrictions. C. Parallel processing
158. The amount of time that the system is un- D. Serial processing
available, typically called
164. A process can be
A. Reliability
A. single threaded
B. Latency
B. multithreaded
C. Availabilty
C. both single threaded and multi-
D. Bandwidth
threaded
159. Uniprocessor computing devices is called D. none of the mentioned
3. What job and resource managers are 8. In the threads model of parallel program-
there? ming
A. Slurm A. A single process can have multiple,
B. PBS Pro concurrent execution paths
C. LSF B. A single process can have single, con-
D. Torque current execution paths.
C. A multiple process can have single con-
4. What does Moore’s law propose?
current execution paths.
A. The number of transistors on a mi-
crochip will double every year. D. None of these
B. The cost of manufacturing will de- 9. What is the function of the iperf com-
crease each year mand?
C. The performance of a processor will A. Measure CPU performance
double every 2 years
B. Measure RAM performance
D. The number of cores in a processor
will double every 3 years. C. Measure GPU performance
11. In a TIG monitoring system: what role 17. What is the performance issue that affects
does Telegraf play? MPI the most?
A. Get the metrics A. Memory
B. Store the metrics B. CPU
C. Process the Metrics C. communications
D. Display Metrics D. O/O
NARAYAN CHANGDER
12. If the execution time of a basic instruction
in a core takes 1 second: How long does mance, what tool can I use to detect the
it take to access the L3 cache? problem?
A. 1 second A. Debugger GDB
B. 3 seconds B. HTOP
C. 9 seconds C. Compiler
D. 43 seconds D. IO Top
13. LMOD configuration scripts are written in 19. Why has the speed of processors remained
the language? relatively constant in the last 5 years?
A. Lua A. Manufacturing Cost
B. HTML B. Energy consumption
C. JS C. Heat Generation
D. Python D. Number of Cores
14. What BMC systems are the most used? 20. Parallel programming:
A. Integrated Lights-Out (iLO) A. The execution speed increases propor-
tionally to the number of processors.
B. Dell Remote Access Controller (idRAC)
B. Requires extra programming effort for
C. RPI Remote Controller
inter-thread communication
D. ARM64 Connection
C. Makes sequential programming easier
15. which of the following is a an example of D. Allows the execution of a sequential
data decomposition process more quickly
A. matrix multiplication
21. What types of parallelism exist?
B. merge sort A. Level of instruction
C. quick sort B. Data Level
D. 5 puzzal C. Task Level
16. Parallel Programming models are: D. Communications Level
A. Shared Memory Systems 22. In the TOP 500 of June 2022, to which
B. Distributed Memory Systems country did the 1◦ place belong?
C. Shared Communications Systems A. Frontier and the United States
D. Distributed Storage Systems B. Fugaku in Japan
NARAYAN CHANGDER
8. What the two different types of thread? 13. class A implements Runnable{public void
A. Kernel thread run(){try{for(int i=0;i<4;i++){Thread.sleep(100);System.out.p
e){}}}public class Test{public static void
B. Device thread main(String argv[]) throws Excep-
C. User thread tion{A a = new A();Thread t = new
Thread(a, “A”);Thread t1 = new Thread(a,
D. Network thread
“B”);t.start();t.join();t1.start();}}
9. Q) True statement about process and A. Compilation succeed but Runtime Ex-
thread is/areMore than one answer ception
A. If a child process crashes all main pro- B. A B A B A B A B
cess will also be crashed
C. Output order is not guaranteed
B. If a child thread is crash entire pro-
D. A A A A B B B B
cess will crash
C. Threads have their own memory stack 14. A single sequential flow of control within
a program is
D. Each process has different virtual
space A. Process
B. Task
10. How does run() method is invoked?
C. Thread
A. By Thread.run()
D. Structure
B. By Thread.start()
C. By Thread.create() 15. class multithreaded programing {
public static void main(String args[]) {
D. None
Thread t = Thread.currentThread(); Sys-
11. public class Test extends Thread{2. pub- tem.out.println(t); } } output of this code
lic static void main(String argv[]){3. is
Test t = new Test();4. t.run();5. A. Thread[5, main]
t.start();6. }7. public void run(){8.
System.out.println(”run-test”);9. }10. } B. Thread[main, 5]
C. Compilation fails due to an error on 16. Q) Which statements is/are correct (More
line 4 than one is correct) .
D. Compilation fails due to an error on A. On calling Thread start () method a
line 7 new thread get created.
B. Thread start () method call run () 20. Which thread method is used to wait until
method internally it terminates?
NARAYAN CHANGDER
D. run() method C. enumerate()
D. threads()
26. Which of these is valid about threads in
java 31. What are the libraries in Python that sup-
A. Thread behaviour is unpredictable port threads?
B. execution of Threads depends on A. threading
Thread scheduler B. th
C. Same threading program may produce C. None
different output in subsequent executions
D. thread
even on same platform
D. All of these 32. Which method returns the count of active
threads in the caller’s thread control?
27. A method used to force one thread to wait
A. threading.activeCount()
for another thread to finish.
B. threading.currentThread()
A. join()
C. threading.enumerate()
B. connect()
D. All the above
C. combine()
D. concat() 33. What are valid points about thread
35. What state does Thread enter in when it 40. A thread can acquire a lock by using which
has been created and started? reserved keyword?
NARAYAN CHANGDER
5.1 Overview
1. Choose TWO(2) ways of critical section 4. Provide TWO(2) issue in implementing
problem can be resolved based on hard- semaphore in Symmetric Multiprocessor
ware solution (SMP)
A. lock A. spinlocks
B. bounded buffer B. deadlock
C. mutex locks C. mutex locks
D. semaphore D. starvation
2. The value of can range over an unre- 5. A monitor is a module that encapsulates
stricted domain a) b) c) d)
A. binary semaphore
A. shared data structures
B. counting semaphore
B. procedures that operate on shared
C. semaphore mutex data structure
D. semaphore spinlocks C. synchronization between concurrent
procedure invocation
3. is situation occurs when a device or
system attempts to perform two or more D. all of the mentioned
operations at the same time, but because
of the nature of the device or system, the 6. Choose TWO(2) way of critical section
operations must be done in the proper se- problem can be resolved based on soft-
quence to be done correctly. ware solution
A. critical value A. locks
B. race condition B. Interrupt based solution
C. bounded buffer C. mutex locks
D. multiracing condition D. Peterson’s solution
7. Bounded waiting implies that there exists 12. Buffer works as a shared memory, and
a bound on the number of times a process counter keeps track of the number of full
is allowed to enter its critical section: buffers. Counter is by the after it
A. mutual exclusion and progress 13. A situation where several processes ac-
B. mutual exclusion and bounded waiting cess and manipulate the same data concur-
rently and the outcome of the execution
C. progress and bounded waiting
depends on the particular order in which
D. mutual exclusion, progress and access takes place is called:
bounded waiting
A. data consistency
9. The following is not an algorithm used to B. race condition
prevent race conditions from occurring in
process synchronization C. aging
NARAYAN CHANGDER
C. disable interrupts, enable interrupts
D. progress interrupts, enable interrupts D. The process of coordinating the activ-
ities of two or more processes is called
18. For cooperating process, process pro- process coordination
duces information that is consumed by a
process. 22. Semaphore is suitable implement in which
environment?
A. consumer, producer
A. single processor
B. producer, consumer
B. random access processor
C. independent, consumer
C. multiprocessor
D. cooperating, consumer
D. sequential access processor
19. Modern machines provide special atomic
hardware instructions to implement locks. 23. In Peterson’s algorithm, two processes
What does it mean by atomic? share two variables which are turn and
flag. What does variable turn do?
A. non-interruptible
A. to indicate if a process is ready to en-
B. preemption ter the cs
C. concurrent B. to indicate if a process is doing busy
D. preserved waiting
20. To enable producer and consumer to exe- C. to indicate whose turn is it to wait
cute concurrently, a buffer must be used. D. to indicate whose turn it is to enter the
What is the buffer for? cs
A. For producer to put data while con- 24. to protect critical regions and thus pre-
sumer access it vent race conditions among the processess
B. For consumer to put data while pro- A. race condition
ducer access it
B. critical section
C. For producer to run data while con-
sumer retrieve it C. mutex locks
NARAYAN CHANGDER
A. 0, 1, there is no process in cs
sionb) critical exclusionc) synchronous ex-
B. 1, 0, there is no process in cs clusiond) asynchronous exclusion
C. 1, 0, there is a process in cs
A. a
D. 0, 1, there is a process in cs
B. b
35. The readers-writers problem and its so- C. c
lutions have been generalized to pro-
vide reader-writer locks on some sys- D. d
tems. When a process wishes only to read
shared data, it requests the reader-writer 40. To enable a process to wait within the mon-
lock in itor
43. Which one of the cs requirement that Pe- 48. Indefinite blocking or starvation is prob-
terson’s algorithm are met? lem related to
47. which is not a limitation of Peterson Solu- B. web server, HTML files
tions, namely C. web browser, web server
A. Can be used on modern architecture D. web server, web browser
CPUs
52. In Spinlocks
B. Cannot be used on CPUs with modern
A. no context switch is required when a
architectures
process must wait on a clock
C. using only 2 processes
B. locks are expected to be held for short
D. there is no right answer time
53. Which process can be affected by other 55. When two process executing and try-
processes executing in the system? a) co- ing to access the global variable, this
operating processb) child processc) parent is a
processd) init process A. simultaneously, same, race condition
A. a B. simultaneously, different, race condi-
NARAYAN CHANGDER
B. b tion
8. Out of the given problem, how many pro- 13. CPU scheduling decisions may take place
cesses are there in total? when a process:
A. 4 Process A. Switches from running to waiting state
B. 5 Process B. Switches from running to ready state
C. 3 Process C. Switches from running to terminated
D. 6 Process D. Switches from waiting to ready
E. Terminated
NARAYAN CHANGDER
9. Amount of time it takes from when a re-
quest was submitted until the first re-
14. Associate with each process the length of
sponse is produced, not output (for time-
its next CPU burst.
sharing environment)
A. First-Come, First-Served Scheduling
A. CPU Utilization
B. Shortest-Job-First Scheduling
B. Throughput
C. Shortest-Remaining-Time-First
C. Turnaround time
Scheduling
D. Waiting Time
D. Priority Scheduling
E. Response Time
E. Round Robin
10. What is the mean value of waiting using
15. What are the 5 scheduling criteria?
the preemptive SJF method?
A. CPU Utilization
A. 5.5 seconds
B. Throughput
B. 6.25 seconds
C. Turnaround time
C. 5 seconds
D. Waiting Time
D. 4.75 seconds
E. Response Time
11. A priority number (integer) is associated
with each process. 16. Each process gets a small unit of CPU
time, usually 10-100 milliseconds.After
A. First-Come, First-Served Scheduling
this time has elapsed, the process is pre-
B. Shortest-Job-First Scheduling empted and added to the end of the ready
C. Shortest-Remaining-Time-First queue.
Scheduling A. First-Come, First-Served Scheduling
D. Priority Scheduling B. Shortest-Job-First Scheduling
E. Round Robin C. Shortest-Remaining-Time-First
12. # of processes that complete their execu- Scheduling
tion per time unit. D. Priority Scheduling
A. CPU Utilization E. Round Robin
B. Throughput 17. What is the mean value of non-preemptive
C. Turnaround time SJF waiting?
D. Waiting Time A. 8 seconds
E. Response Time B. 7.25 seconds
NARAYAN CHANGDER
7.1 System Model
1. Which of the following technique is used in by 3 processes A, B, C which have peak
Deadlock Recovery? time demands of 3, 4, 6 respectively. The
A. Process Termination minimum value of m that ensures deadlock
will never occur is
B. Resource Preemption
A. 11
C. Both
B. 12
D. None of the options
C. 13
2. Is defined by the number of available and D. 14
allocated resources, and the maximum de-
mands of the processes. 5. Each process utilizes a resource as follows:
A. No deadlocked state A. request
B. deadlocked state B. use
C. Resource-allocation state C. release
D. None of the above D. terminate
3. The system is said to be in unsafe state if 6. The purpose of Hold and Wait namely
A. A process is indefinitely postponed A. The situation prevents other pro-
cesses from having to wait
B. The system is deadlocked
B. Situation where a process is holding a
C. The operating system cannot guaran- resource exclusively and waiting to get an-
tee that all current processes can com- other resource
plete their work
C. A situation where there is mutual wait-
D. None of the above ing between several processes
4. Consider a system having m resources of D. Situation requesting service of an-
the same type. These resources are shared other device
7. Threads are divided based on their con- 12. If a system is in safe state
trollers ie A. Deadlock
NARAYAN CHANGDER
D. remove
B. Hold and Wait
E. idle
C. No Preemption
19. If graph contains a cycle and several in-
stances per resource type D. Circular Wait
C. Semaphore A. Multithread
NARAYAN CHANGDER
38. This algorithm dynamically examines the A. There are both many CPU and many PC
resource-allocation state to ensure that B. All process is executed in concurrency
there can never be a circular-wait condi-
tion. C. No concurrency inside a process; ev-
erything happens sequentially
A. Deadlock-avoidance algorithm
D. None of the other choices
B. No deadlock-avoidance algorithm
44. The deadlock model consists of
C. Banker’s Algorithm
A. request, use, release
D. Resource-Allocation algorithm
B. new, request, use
39. Thread execution is done concurrently on:
C. request, run, use
A. Singlecore
D. request, use, exit
B. Singlethread
45. These are the currently allocated re-
C. Multicore
sources.
D. Singlesystem
A. Available
40. The running state has 3 possibilities ex- B. Max
cept
C. Allocation
A. Terminated
D. Need
B. Waiting
46. Suspend state occurs when
C. Ready
A. New process request
D. New
B. IO requests
41. The permanent blocking of a set of pro- C. PCB request
cesses that compete for system resources
is called D. PCB storage
A. Starvation 47. There exists a set {P0, P1, , Pn} of
B. Prioritization waiting processes such that P0 is waiting
for a resource that is held by P1, P1 is
C. All of the above waiting for a resource that is held by P2,
D. Deadlock , Pn-1 is waiting for a resource that
is held by Pn, and Pn is waiting for a re-
42. Is a situation where a set of processes are source that is held by P0.
blocked because each process is holding a
resource and waiting for another resource A. Mutual exclusion
acquired by some other process. B. Hold and wait
A. 6 A. a
B. 7 B. b
C. 8 C. c
D. 9 D. d
57. Process instructs code that is executed au- C. An unsafe state is always a deadlock
tomatically state.
A. Sequence D. none of above
B. random
63. The circular wait condition can be pre-
C. Parallel vented by
D. Active A. defining a linear ordering of resource
58. In a directed graph used to model deadlock, types
NARAYAN CHANGDER
resources are represented using B. using thread
A. Eclipse C. using pipes
B. Rectangle D. all of the mentioned
C. Circular
64. Which of the following Algorithm in
D. Squares
Bankers Algorithm determine whether or
59. Which of the following is not a necessary not a request forwarded by a process for
condition for deadlock? acquiring a resource would lead the sys-
tem to an unsafe state?
A. Mutual Exclusion
B. Reentrancy A. Both Safety Algorithm, Resource re-
quest Algorithm
C. Hold and wait
B. Resource Request Algorithm
D. No pre-emption
C. Safety Algorithm
60. One thread waiting will not affect other
D. none of above
threads is a model overload?
A. Many to many 65. A computer system has 6 tape drives, with
B. Many to one ‘n’ processes competing for them. Each
process may need 3 tape drives. The max-
C. Two level imum value of ‘n’ for which the system is
D. One to one guaranteed to be deadlock free is
61. Algorithm requires an order of O(m x n2) A. 4
operations to detect whether the system B. 3
is in what state?
C. 2
A. No deadlocked state
D. 1
B. Deadlocked state
C. Resource-allocation state 66. A claim edge is represented by line and
D. None of the above request edge is represented by in Re-
source Allocation Graph.
62. Which of the following statement is incor- A. Dashed, Solid
rect?
B. Solid, Dashed
A. A safe state is not a deadlock state.
C. Dashed, Dashed
B. A deadlock state is always an unsafe
state. D. Solid, Solid
67. These are the most instances of resource 72. In a directed graph used to model deadlock,
type that the process can request. represents deadlock
77. A process holding at least one resource 82. What are the data structures needed for
is waiting to acquire additional resources Banker’s algorithm?
held by other processes.
A. Available
A. Circular wait
B. Max
B. Mutual exclusion
C. Allocation
C. Hold and wait
D. Mutual inclusion D. Need
NARAYAN CHANGDER
78. How many percent of the CPU time is E. Processes
wasted, when a computer system has
enough room to hold two program and 83. If no cycle exists in the resource allocation
these programs are idle waiting for I/O graph
half the time? A. then the system will not be in a safe
A. 50% state
B. 25% B. then the system will be in a safe state
C. 75% C. all of the mentioned
D. None of the other choices
D. none of the mentioned
79. A possibility of deadlock can occur
84. A set of vertices V and a set of edges E.
A. If a system is in safe state
B. If a system is in instable state A. Resource-allocation graph
C. If a system is in unsafe state B. Wait-for graph
D. None of the above C. Process-allocation graph
80. Return to some safe state, restart process D. none of above
for that state
A. Selecting a victim 85. These are the instances of resource type
available.
B. Rollback
A. Available
C. Starvation
D. None of the above B. Max
87. If this algorithm is invoked arbitrarily, 92. System call fork works except
there may be many cycles in the resource A. Kill process
graph and so we would not be able to tell
NARAYAN CHANGDER
D. none of above tion for each process, including
98. At a particular time of computation, the A. A count of the system’s total resources
value of a counting semaphore is 10. Then
12 P operations and “x” V operations B. The number of resources currently ac-
were performed on this semaphore. If the quired by the process
final value of semaphore is 7, x will be: C. The maximum resources that can be
A. 8 requested by the process
B. 9 D. Both b and c
C. 10
103. This converts to request edge when a pro-
D. 11 cess requests a resource.
99. A deadlock avoidance algorithm dynami- A. Request edge
cally examines the to ensure that a
circular wait condition can never exist.a) B. Allocate edge
resource allocation stateb) system storage C. Claim edge
statec) operating systemd) resources
D. Receive edge
A. a
B. b 104. In which of the following four necessary
C. c conditions for deadlock processes claim ex-
clusive control of the resources they re-
D. d
quire?
100. This is converted to an assignment edge A. no preemption
when the resource is allocated to the pro-
cess. B. mutual exclusion
A. Request edge C. circular wait
B. Allocate edge D. hold and wait
C. Claim edge
D. Receive edge 105. Which of the following is not a condition
necessary for deadlock to exist?
101. A state is safe, if a) the system does
A. Circular-wait condition
not crash due to deadlock occurrenceb) the
system can allocate resources to each pro- B. Preemption condition
cess in some order and still avoid a dead-
C. Mutual-exclusion condition
lockc) the state keeps the system pro-
tected and safed) all of the mentioned D. Hold and wait condition
NARAYAN CHANGDER
A. non-preemption condition A. processor and disk
B. circular wait condition B. software and disk
C. hold and wait C. hardware and disks
D. mutual exclusion conditional D. subari dan Hannel O/O
4. cause of deadlock
8. deadlock repair and recovery
A. one process waits for a resource that
A. techniques for determining whether a
is being held by another process without
deadlock has occurred and identifying the
waiting for the resource held by that pro-
processes and resources involved in the
cess.
deadlock
B. one process is waiting for a resource
that is being held by another process that B. The usual period is to monitor re-
is waiting for a resource that is being held source requests and releases.
by that process. C. Temporarily retrieves resources from
C. process without waiting for a resource the processes that use them
that is being held by another process that D. When there is a deadlock in the sys-
is waiting for a resource held by that pro- tem, the deadlock must be resolved.
cess.
D. all answers are wrong 9. deadlock Linux
A. deadlock detection in the form of
5. Criteria for Selection of Processes to be BSOD(Blue Screen Of Death), recovery is
Eliminated in Deadlock except: a simple reboot
A. The most rarely use the processor B. running from sleep, the process that
B. The least results of the program i accesses the USB device will experience
C. The most resource consuming to date a deadlock
NARAYAN CHANGDER
8.1 Background
1. Primary Memory (RAM) is needed because B. Less throughput
(tick all correct) C. Page faults
A. It can directly (or randomly) address- D. Memory Fragmentation
able storage for the CPU
B. it is the memory for all programs and 4. Can the contents in ROM be changed?
data needed by the CPU A. Not normally but can be changed
C. Virtual Memory is much faster than Pri- through a process called ‘flashing’
mary Memory B. Yes
D. ROM is non-volatile C. The content are always changing as
E. Secondary storage is further away they are used by the CPU
from the CPU D. none of above
2. The operating system and the other pro- 5. dIf the RAM is low, the computer can use
cesses are protected from being modified extra memory from the
by an already running process because A. ROM
A. they are in different memory spaces B. CPU
B. every address generated by the CPU is C. CACHE
being checked against the relocation and
limit registers D. HARD DRIVE
NARAYAN CHANGDER
C. ROM 24. continguous memory allocation are divided
into
D. Hard Drive
A. paged memory management
19. when is used, the linker combines all
other modules needed by a program into B. single memory management
a single executable program to avoid any C. segmented memory management
runtime dependency.
D. partitioned memory management
A. Static Linking
B. Dynamic Loading 25. Parts of the computer that is tangible or
the physical components of the computer.
C. Static loading
A. Software
D. Dynamic Linking
B. Hardware
20. What does the RAM store?
C. Peopleware
A. Operating system, programs and data
D. Tupperware
which are currently being used
B. A program used to start the computer 26. Which transfer is faster
called the boot program or BIOS A. data between the cache and the CPU
C. All programs and documents stored on B. data between the RAM and cache
the computer
C. data between the RAM and CPU
D. none of above
D. data between the hard drive and CPU
21. Typical cache sizes range from about
A. 512 MB to 8 GB 27. Found in the computer’s BIOS, what actu-
ally is the ‘bootstrap’?
B. 2000 kB to 2000 GB
A. The program which takes the com-
C. 1 GB to 2 TB puter through steps that lead up to the
D. 512 KB to 8 MB loading of the operating system (OS)
22. The devices that are used to enter data B. The program responsible for loading
into the computer are known as the drives for peripheral devices like the
keyboard and mouse
A. Output devices
C. T he computer’s initial start-up pro-
B. Storage devices cess
C. Input devices D. The device used to attach the ROM to
D. none of above the computer’s motherboard
28. Transient operating system code is code 33. dWhen the hard drive is used as extra
that RAM, this is known as
A. Virtual Reality
29. Memory allocation and deallocation can be 34. For which of the below allocation is man-
managed by aged by kernel and use of the allocated
memory is managed by run time library?
A. CPU
A. Caches
B. GPR
B. Disk
C. MMU
C. RAM
D. None of the above D. All of the above
30. When the processor fetches data from the 35. Increasing the RAM of a computer typically
RAM, it is first copied onto the improves performance because:
A. cache memory, and then from the A. Virtual memory increases
cache memory into the main processor
B. Larger RAMs are faster
B. RAM, and then from the RAM into the
C. Fewer page faults occur
main processor
D. Fewer segmentation faults occur
C. CPU, and then from the CPU into the
RAM 36. Which is the main circuit board of the com-
D. cache memory, and then from the puter?
cache memory into the RAM A. Processor
B. Motherboard
31. If M denotes the number of memory loca-
tions and N denotes the word size, then an C. Hard Disk
expression that denotes the storage capac- D. ROM
ity is
37. The devices are used to store data are
A. M*N know as the
B. M+N A. Input devices
C. 2M+N B. Output devices
D. 2M-N C. Storage devices
32. In contiguous memory allocation D. none of above
A. all processes are contained in a single 38. Cache memory acts as a buffer between
contiguous section of memory the processor and
B. the memory space is contiguous A. the RAM
C. each process is contained in a single B. the harddrive
contiguous section of memory C. the motherboard
D. none of the mentioned D. the user
NARAYAN CHANGDER
A. Symbolic addresses
A. 2, 000, 000 instructions per second
B. 2, 000, 000, 000 instructions per sec- B. Physical addresses
ond C. Relative addresses
C. 20, 000, 000 instructions per second D. None of the above
D. 200, 000 instructions per second
44. What is Dynamic loading?
41. A computer has 1024 megabytes of RAM.
That is the same as A. loading multiple routines dynamically
8.3 Segmentation
1. As you open or run something the OS allo- 4. The segment limit contains the
cates to it.
A. starting logical address of the process
A. The Kernel
B. starting physical address of the seg-
B. Memory ment in memory
C. Storage C. segment length
D. Disk Space D. none of above
2. If memory runs out, then 5. The address of a page table in memory is
A. The computer will continue as normal pointed by
B. The computer decreases in processing A. page register
speed
B. page table base register
C. The computer will not handle any more
C. stack pointer
applications being run
D. The computer will start new processes D. program counter
7. The segmentation unit allows 13. Your RAM is controlled and allocated by
A. maximum size of 4GB segments the
NARAYAN CHANGDER
A. Store items not currently in use into 14. eliminate internal fragmentation but,
secondary storage as VM like dynamic partitioning, it suffers from
external fragmentation.
B. Split programs into the same size
across memory A. Segmentation
C. Moves the data around 23. What is not true about advantage of logi-
D. Allows data to be non-contiguously cal?
A. paging is compulsory and segmenta- A. Does not store items not currently in
tion is optional use into secondary storage
B. both segmentation and paging are op- B. Splits programs into different sizes
tional across memory
NARAYAN CHANGDER
B. Supplement
29. In paging physical memory is divided into
partitions called C. Adhere to
A. pages D. Open
8.4 Paging
1. Associative memory working under 5. When did Auggie’s parents take a tour of
A. Serial Search the school?
B. Seqential search A. Last month
C. Parellel Search B. Last year
D. Sorted search C. Last week
D. none of above
2. with demand paging a page of a process is
brought into the main memory 6. Which algorithm suffers from Belady’s
A. when the execution of a process starts anomaly?
B. when the process comes to the ready A. FIFO
queue B. Optimal
C. when the page is required during exe- C. LRU
cution
D. All of these
D. never bring a page to main memory
7. Sound information is sent to all audio out-
3. An inverted page table has for each puts (speakers) and cannot be random.
real page (or frame) of memory. This is Paging System Type audio
A. Two entry A. parallel
B. one entry B. serial
C. both C. multi
D. None D. standard
4. For every process there is a E. high class
A. page table 8. What is the definition of a paging service?
B. copy of page table A. To send or contact someone through a
C. pointer to page table public announcement or by using a pager
D. all B. Proficiency in using the paging tool
C. Knowledge of paging service 14. In hashed page tables, the virtual page
D. Ability to convey information number in the is hashed into the hash
table
20. In inverted page table, the number of en- 25. In a room where 6 ceiling speakers are in-
tries is equal to the number of in the stalled, each power is 6 watts, then the
main memory amplifier power needed is
A. frames A. 12 watt
B. pages B. 24 watt
C. memory elements C. 36 watt
D. none D. 48 watt
NARAYAN CHANGDER
E. 60 watt
21. What is Auggie’s favorite class?
26. Access problem of Page table is solved by
A. Gym
A. Processor
B. English
B. RAM
C. Science
C. TLB
D. none of above
D. Segmentation
22. A speaker is given an input power of 3 27. Here are the tools/components used in au-
watts, the speaker has an SPL specifica- dio paging as an impedance adapter so
tion of 90 dB. (Log 3 = 0.48). Then how that the voltage and power received by all
big is the SPL speakers are the same and not affected by
A. 90 dB long distances/cables.
B. 90, 3 dB A. switch
C. 90, 48 dB B. attenuator
D. Dulcet C. transformer OT
E. 89, 52 dB D. speaker
E. cable
23. Types of PAGING in Operating System
28. Page table is stored in
A. Demand paging.
A. HDD
B. Loader Paging.
B. SSD
C. Both
C. RAM
D. none
D. Processor
24. What is our attitude when we realize 29. In a optimal page replacement algorithm,
there is an error reading the text when do- when a page is to be replaced, which of
ing paging? the following pages is chosen?
A. Stop and repeat the correct text A. oldest
B. Laugh and repeat back the correct text B. newest
C. Continue even knowing there is a text C. Frequently occurred page in the future
error
D. Not Frequently occurred page in the fu-
D. Stop and tell others to do the paging ture
30. A common approach for handling address 35. What kind of lie did Auggie’s mom tell him
spaces larger than 32 bits is to use a about the test?
NARAYAN CHANGDER
D. none
C. High School
42. plays an important role in implement- D. none of above
ing virtual memory.
A. Paging 48. a logical address is as follows:
B. Virtual memory A. page no
C. Demand memory B. Page offset
D. none C. both
43. In a hashed page table, with the hash D. none
value being the
49. The is used as an index into the page
A. virtual page number table.
B. Page number
A. frame bit
C. Both
B. page number
D. None
C. page offset
44. A page fault occurs D. frame offset
A. when the process enters the ready
state 50. Operating system supports different page
replacement algorithms. From the given
B. when the process enters the blocked
below option which is not a valid one?
state
C. when the page is in the memory A. Optimal
D. none A. LRU
B. FIFO
46. The breathing technique used to perform
paging is C. MFU
A. Diaphragmatic breathing D. LFU
9.1 Background
1. What does the bootstrap loader do? B. Reducing the number of users that can
A. Loads files from the hard drive into be served
RAM C. Reducing Response
B. Loads the operating system from the D. Reduced I/O processing
hard drive into RAM
5. It is the average time taken to access a
C. Loads my shoelaces from the hard byte or word from our computer.
drive into RAM
A. Average Memory Access Time
D. none of above
B. RAM Access Time
2. The set of addresses (parts of process) C. Hard disk Access Time
which are inside the RAM is called
D. Mode Memory Access Time
A. Principle of Locality
6. Which of the following are the advantages
B. Virtual Memory
of virtual memory? (Select two.)
C. Virtual Address Space
A. Degree of multiprogramming is higher.
D. Translation Lookaside Buffer
B. Decrease the average memory access
3. Which one is secondary storage? time.
A. RAM C. Decrease the effective memory ac-
cess time.
B. Hard Disk
D. Execute even processes whose larger
C. ROM than the size of RAM.
D. BIOS
7. Why is Virtual Memory needed or used by
4. Mention one advantage of virtual mem- a computer?
ory? A. When RAM becomes full because of
A. Space becomes smaller too many programs running at once
B. When ROM is too small and struggles 12. Where are the BIOS instructions stored
to store the Operating System A. In a RAM stick
C. When users wish to store data on an B. In a chip on the motherboard
external server such as ‘the cloud’
C. In the hard drive
D. When chosen by the user or computer
administrator D. none of above
NARAYAN CHANGDER
ory
A. Hard disk size will be increased A. When you want to save to the cloud
B. Cache memory size will be increased B. When the hard drive is full
C. Increase the logical address space C. When RAM is full
D. Increase RAM size D. When ROM is full
9. What can you expect to find in RAM? 14. The form of implementing page replace-
ment on the counter and stack algorithm,
A. Programs currently in use
namely?
B. Closed programs
A. RUL
C. The CPU B. LRU
D. The Hard Drive C. LUR
10. In Windows Work processes there is a min- D. URL
imum set and a maximum set what it is
15. Virtual memory typically uses two storage
used for.
devices, RAM and
A. minimum set is the minimum number
A. the hard drive
of pages a process has in memory
B. ROM
B. minimum set is the maximum number
of pages a process has in memory C. a secondary piece of RAM
21. Using virtual memory is not as efficient as 27. What is the most durable?
using RAM, why?
A. Magnetic Tape
A. it slows down the processing of the
B. Solid State Drive
computer system
C. Hard Drive
B. it takes up storage space on your USB
C. it is expensive D. CD
23. It is a type of cache where few pages of 29. What type of memory is accessed the
the pagetable are being maintain. quickest?
A. Translation Lookaside Buffer A. Solid State Memory
B. Random Access Memory B. Magnetic Storage
C. Hard disk C. Blu-Ray
D. Register D. CD/DVD
30. Why do computers use binary to read data 35. The frame-allocation algorithm serves to
from memory? determine
A. It’s all they understand A. lowest error rate
B. It’s quicker B. How many frames will each process
C. Computers are made up of electronic give
switches C. result number of frames
D. Computers only read 1’s and 0’s be- D. Which frame to replace
NARAYAN CHANGDER
cause it’s all they can do
36. You can write data more than once to this
31. The LRU (Least Recently Used) Algorithm
device
is a combination of the
A. TCP/IP
A. FIFO algorithm and maximal algorithm
B. RAM
B. FIFO algorithm and maximal algorithm
C. FOFI algorithm and optimal algorithm C. ROM
33. It says that at anytime a process will re- A. RAM is part of the hard disk
quire only few pages in the memory. B. ROM is volatile
A. Principle of Locality C. RAM stores programs / data used by
B. Virtual Memory the CPU
C. Virtual Address Space D. ROM contains the operating system
D. Translation Lookaside Buffer 39. Access to files is done with pointers, not di-
34. There are 2 major allocation schemes rectly with system calls read() and write()
namely which is one of the advantages of?
A. Local Allocation A. Copy-on-Write
B. Global Allocation B. Memory-Mapped File
C. Arround Allocation C. Thrashing
D. Area Allocation D. Page Replacement
40. This is volatile storage 45. what type of storage is rom? (2 answers)
A. ROM A. secondary
51. A small piece of memory, located inside 55. Where would virtual memory normally
the CPU is called the be?
A. virtual memory A. RAM
B. ROM B. Hard drive
C. cache C. Cache
D. none of above D. The cloud
52. Virtual is a technique of separating 2 mem-
NARAYAN CHANGDER
56. Copy-on-Write itself functions for
ories viz
A. Logic memory and user memory A. Page invite
53. One of the most commonly used imple- 57. What are the advantages of On Demand
mentations of virtual memory and hard- Paging Method
ware assistance to know the location of
A. Little Memory, Little IO, Concurrent
the page when needed is?
A. SIngle Paging B. Less Memory, Less I/O, Paging
D. All of the above answers 11. Which one is a Character User Interface
6. Consider the following sequence of page (CUI) Operating System
references:7 0 1 2 0 3 0 4 2 3 0Deter- A. DOS
mine how many page faults will occur for
the “FIFO” algorithms, assuming there are B. Fedora
only “3 frames”. C. Unix
A. 12 page faults
D. Oracle
B. 10 page faults
C. 8 page faults 12. Users that their processes are running
D. 6 page faults on a paged system.
A. are aware
7. occurs when a process spends more
time paging than executing. B. are not aware
A. Thrashing C. maybe aware
B. b. Memory-mapping
D. None of the above answers
C. c. Demand paging
D. none of above 13. Which algorithm requires future knowl-
edge of reference strings
8. What is the Full form of FIFO
A. FIFO
A. Fast Input Fast Output
B. First In First Out B. Least recently used
14. What is the Optimal page-replacement al- 19. Which one is not an Operating System
gorithm? A. DOS
A. Replace the page that has not been B. Fedora
used for a long time
C. Unix
B. Replace the page that has been used
for a long time D. Oracle
C. Replace the page that will not be used 20. Reference bit is used for
NARAYAN CHANGDER
for a long time A. Implementing LRU page replacement
D. None of the above answers algorithm
C. LRU C. Optimal
27. LRU page-replacement algorithm asso- 31. Which Algorithm is the fastest algorithm?
ciates with each page the A. LRU
A. time it was brought into memory B. FIFO
B. the time of that page’s last use C. Optimal
C. page after and before it D. None of these
D. all of the mentioned
32. What are the two methods of the LRU
28. A process refers to 5 pages, A, B, C, D, E in page replacement policy that can be imple-
the order:A B C D A B E A B C D EIf the page mented in hardware?
replacement algorithm is FIFO, the number
A. Counters
of page transfers with an empty internal
store of 3 frames is? B. RAM & Registers
A. 10 page faults C. Stack & Counters
B. 9 page faults D. Registers
NARAYAN CHANGDER
10.1 Overview of Mass-Storage Structure
1. If the counter value on the swap map is 0, A. SSD
then B. Platter
A. Page slots are filled by other pro- C. Diskette
cesses
D. Disk
B. Page slots available
E. Head
C. The slot is in the ready queue
D. All true 5. The time required by the arm to move to
the cylinder is called
2. The following is an example of a magnetic A. Average Access Time
disc.
B. Average Seek Time
A. SSD
C. Average Latency
B. Hard drive
D. Transfer Rate
C. Floppydisk
6. In Constant Linear Velocity (CLV) when the
D. Head
track position is farther from the center of
E. Magnetic Disk the disc then?
3. What disk algorithm is called the Elevator A. the fewer sectors there are
algorithm? B. there is no change in the sector
A. FCFS C. the more sectors there are
B. SSTF D. all true
C. C-SCAN 7. Below is an example of host attached stor-
D. SCAN age except
C. ATA C. RAID 6
D. RAID D. RAID 1
10. Below are not the limitations of magnetic C. 60-250 times per second
tape D. 70-260 times per second
A. I/O access is very slow
E. 80-270 times per second
B. Less environmentally friendly
C. Requires machine interpretation 15. The time needed to find the sector where
D. High data transfer speed the data is stored is the meaning of
E. The process must be sequential A. Average Latency
11. (1) Each track on a different cylinder has B. Average Access Time
a different diameter (2) The outer, the
larger the diameter (3) The data rate is C. Average Seek Time
made uniform by the Constant Linear Ve- D. Average Time
locity method. The characteristics above
are from the understanding E. Average Transfer Time
A. Disk Structure
16. A technology in data storage that is used
B. Non-Uniform Sector/Track to minimize errors when storing and read-
C. Host Attached Storage ing data by using redundancy is called
D. Magnetic Tape A. Driver
E. Solid-State Disk
B. Drive
12. Preferred for storing data in large volumes
C. Logic
is the RAID level type
A. RAID 0 D. RAID
B. RAID 5 E. Hard drive
NARAYAN CHANGDER
other end without doing anything C. 3
D. run the algorithm according to the D. 5
queue
23. The magnetic disk component that rotates
18. There is a disk contains 200 tracks (0- the platter is
199) note the request queue (93, 176, 42, A. Spindle
148, 27, 14, 180) and the head is at 55 B. Head
what is the total head movement when us-
ing the Disk Scheduling SCAN algorithm? C. Arm
A. 329 D. Cylinder
31. Computers can access disk storage in 2 C. reduce access response time is great
ways, namely D. improve I/O access to be very fast
B. 119ms A. FCFS
C. 122ms
B. SCAN
D. 120ms
C. LOOK
2. disk scheduling may cause starvation
of some requests. D. SSTF
NARAYAN CHANGDER
1. A set of tools that allow users to trou- B. Last Known Good
bleshoot, recover, or restore an operating C. BIOS
system when it cannot boot.
D. Boot device priority
A. Advanced Startup Options
5. Use this menu to select the device to boot.
B. PXE
A. Safe Mode
C. Refresh your PC
B. Last Known Good
D. RIS
C. BIOS
2. Used to boot the computer and contains D. Boot device priority
the boot and system files. There can be
only on of these per disk. 6. Which of the following is the maximum
number of primary partitions that can be
A. Primary Partition
created on a single hard disk drive?
B. Active Partition
A. 4
C. Extended Partition B. 8
D. Logical Drive C. 6
3. Marco recently made some partition D. unlimited
changes, and the kernel is not recogniz-
7. Before store Data in HDD the following
ing the partitions. Which of the following
must be done
commands should Marco use to resolve the
problem? A. Branding
A. The partprobe command makes a re- B. Covering
quest to the operating system to re-read C. Low-level formatting
the partition table D. Test it with mobile
B. cat /etc/partitions displays the cur-
rently recognized partitions, but does not 8. A software package used to communicate
perform an update with a client and provide the necessary in-
structions for the client to download OS
C. df displays partition information setup files and begin installation.
D. fdisk-l displays partition information A. Advanced Startup Options
4. Locates and reads the configuration set- B. PXE
tings that are stored in the CMOS memory. C. Refresh your PC
A. Safe Mode D. RIS
9. Which of the following is the maximum 14. All are ways to open disk management in
number logical partitions allowed on an ex- your PC EXCEPT
tended partition?
19. Which of the following hexadecimal codes 22. A special environment used to boot the
represents an extended partition? computer, connect to the network, and
A. 0x85 represents a Linux extended par- communicate with the server to begin OS
tition installation.
B. 0x82 represents a Linux swap partition A. Advanced Startup Options
C. 0x83 represents a Linux partition B. PXE
D. 0x88 represents a Linux logical parti- C. Refresh your PC
NARAYAN CHANGDER
tion D. RIS
20. There can be only one per hard drive, but 23. This contains the operating system files.
it can be subdivided into smaller sections. There can be up to four per hard drive and
A. Primary Partition cannot be subdivided into smaller sections.
B. Active Partition A. Primary Partition
C. Extended Partition B. Active Partition
D. Logical Drive C. Extended Partition
21. What is the process of consolidating frag- D. Logical Drive
mented files on the user’s hard drive by
which it breaks the data apart so that it 24. All are operating systems that support
will fit into available space? disk management EXCEPT
A. disk defragmentation A. Windows 8.1
B. disk cleanup B. Windows Server 2012
C. disk management C. Windows 10
D. disk RAID system D. Windows XP
5. Which term from the following list can be C. Local reach only
considered a benefit of using cloud ser- D. none of above
NARAYAN CHANGDER
11.1 File Concept
1. Command to create a new sub directory A. File
A. mkdir <dir-name> B. Method
B. mkdirec <dir-name> C. Director
C. mdir <dir-name> D. Protection
D. rm <dir-name> 5. A Standard UNIX client-server file sharing
protocol
2. It is a file attribute that controls who can
do reading, writing and executing A. Client-Server
A. Type B. NFS
B. Privacy C. CIFS
C. Protection D. NIS
D. Policy 6. Each file is given a path name, can have
the same file name for different users, has
3. Recovery Comparing the data in the direc-
search capabilities, but grouping has not
tory structure with the data blocks on the
been done. Is a feature of?
disk is data recovery in a way
A. One-level directory
A. Consistency Checking
B. Two Level Directory
B. Log-Structured File Systems
C. Tree Structured Directory
C. Sun’s ZFS dan Network Appliance
WAFL file system D. Direktori Acyclic Graph
B. Tree Structured Directory 13. Multimedia file type has a usual extension
of
C. Two Level Directory
A. PDF, JPG, PS
D. One-level directory
B. ZIP, ARC, TAR
9. The Wafl File System The protocols that C. TXT, DOC
help WAFL provide files to clients are?
D. MPEG, MOV, MP3, AVI
A. SSH
14. What file type does exe, com and bin ex-
B. FTP tensions belong?
C. NFS A. Object
D. NFC B. Computer
C. Executable
10. What is meant by sequential access?
D. Library
A. A collection of dots containing informa-
tion about all files 15. It implements complex remote file sharing
B. An access method that can be con- semantics
structed is guided by the direct access A. Andrew File System
method and usually involves constructing B. Unix File System
an index for the file
C. Network File System
C. The direct access method is based on
the disk model of a file, allowing random D. Distributed Information System
access to any block of the file, allowing 16. File ConceptWhat is the function of a file
that random block to be read or written type ending in .o?
D. The access method is carried out with A. Ready-to-run program
one direction of reading and if you want to
go backwards, you need to rewind B. ASCII format for printing
C. Libraries for program routines
11. It move the content of entry Fi in memory D. Compiled code
to directory structure on disk
E. The source code of the programming
A. Close language
B. Open(Fi)
17. A file attribute that is a unique tags (num-
C. Close (Fi) ber) identifies file within file system
D. Open A. Type
NARAYAN CHANGDER
tions are supported? D. copy n
A. Search for files in a directory 23. Any attributes found in the file
B. Manipulate links and directories A. name, type, time
C. Move files B. location, directors, size
D. Hide files C. size, information stored, floor plan
19. Implementation In implementing the file D. date, name, group
system, which is NOT included in the pro-
cess of the file system system? 24. Free Space Management Which is not a
type of free space listing?
A. File allocation
A. Vektor Bit
B. Disc jolly recording
B. Linked List
C. File System Splitting
C. Grouping
D. File system reliability
D. Blocking
E. Kinerja system file
E. Counting
20. File Sharing Use of the network to allow
25. It is an another name or pointer to an ex-
a file to be accessed by the system. Files
isting file
can be accessed semi-automatically using
the WWW. WWW stands for? A. Unlink
A. Web Wide World B. Hyperlink
B. World Web Wide C. Dictionary
C. World Wide Web D. Link
D. World Wide Web 26. Protection In UNIX systems file protection
E. Wide Web World is divided into 3 parts. Each section repre-
sents a user classification (yi.owner, group
21. There are several ways to access the infor- and universe). Each part is then subdi-
mation in the file, namely vided into 3 bit access types
A. sequential access A. -rwx
B. direct access B. rxw
C. another access method C. -rxw
D. all true D. -wxr
B. the system’s master file directory is user name or account number, and each
not searched entry points to the UFD for that user
C. the master file directory is indexed by D. all of the mentioned
NARAYAN CHANGDER
C. mount /dev/sdc /mnt/newdisk
A. Lock Screen
D. none of above
B. Screen Saver
6. u are preparing to mount a device local to
C. Active Program
your system. Which directory holds the
D. Guest Account device files?
2. One byte is composed of A. the files for devices are always stored
in /dev according to the FHS.
A. 1 bit
B. /devices
B. 8 bits
C. /local/dev
C. 10 bits
D. 255 bits D. none of above
3. Which two of these are part of the key op- 7. You suspect your /dev/sda3 partition is
erating system functionality? in need of repair.Which of the following
e2fsck options will repair the errors with-
A. anti-spyware software out any interaction from you?
B. web browser A. Use e2fsck-p to automatically repairs
C. file management the ext2 file system without any interac-
D. user interface tion from you
B. -f forces a file system check, even
4. To open a file, all you need to do is on when the file system appears clean
the file icon.
C. -n opens the file system as read-only
A. Right-Click and automatically answers all questions
B. Double-click no
C. Click on the file name D. -y automatically answers all questions
D. Type name in search Bar yes
5. You have partitioned and formatted a new 8. f you want to move a file from its current
hard drive, sdc. You want to mount location to a folder, you can select the file
the first partition on sdc to directory and then it into the folder.
/mnt/newdisk. Which command will per- A. Cut
form the mount correctly?
B. Copy
A. The correct format for mount is mount
item and mount point.mount /dev/sdc1 C. Drag
/mnt/newdisk D. Paste
18. A folder within a folder is known as which 23. Where are all the processes kept on the
of the following? server in flat files? (select 1)
A. Nesting Folder A. /etc
B. Path B. /proc
C. Sub-Folder C. /usr
D. Linked Folder D. /var
NARAYAN CHANGDER
19. Partition details such as information about 24. A picture or design on the desktop.
blocks, block and file pointers A. Screen Saver
A. Partition Control B. Desktop Background/Wallpaper
B. Boot Control Block C. Icon
C. Partition Control Block D. User Account
D. Partition 25. Which of the following is the MOST com-
mon Linux file system?
20. Testing your backups ensure that
A. Ext4 is the most common Linux file sys-
A. the backup will actually restore tem
B. the backup with continue writing files B. JFS
C. the backup with stop working C. ReiserFS
D. none of above D. none of above
21. File System means that each department 26. What factors should be considered when
in an organization has their own sets of deciding on a backup procedure
files concerning the same subjects or items.
A. When to backup
This will lead to
B. Why backup
A. Increase Data Security
C. What to backup
B. Increase data Redundancy
D. Where to backup
C. Increase cost of managing the system
E. Who to backup
D. Increase the integrity of the data.
27. Where is user data stored when a user is
22. Which of the following Linux file systems created on the server? (select 1)
support journaling?
A. /root
A. The ext4 file systems support journal-
B. /home
ing
C. /lib
B. VFAT is a FAT32 file system for Linux
and does not support journaling D. /usr
C. The swap file system is a pseudo file 28. Businesses can often suffer data loss, ei-
system and is used as virtual memory ther accidentally or maliciously if they do
D. The ext2 file system does not support not have what in place?
journaling A. IT Staff
B. Backup & Recovery procedures 34. A file has (tick four from below)
C. Word processing software A. A filename (inc. extension)
NARAYAN CHANGDER
lem caused is
tion of the same data drive.
A. Data redundancy C. Back up your data to the same parti-
B. Data Isolation tion that contains the Windows operating
C. None of these system.
D. There is no need to back up data.
D. Data Atomicity
44. Manage I/O devices at the I/O layerGive
40. What command would you enter at the
command like “read drive 1”
command prompt to list all files and direc-
tories in the badams home directory along A. Device Drivers
with a file size and a total amount of space B. Basic File System
taken up by the directory? C. Logical Devices
A. Use du /home/badams to lists all files D. Devices
and directories in the badams home di-
rectory along with a file size and a total 45. Which directory is used to store Kernel
amount of space taken up by the directory information needed to start the OS on
startup? (select 1)
B. The du command displays files and file
sizes in and below a specified directory A. /dev
C. -a evaluates all files, not just B. /proc
directories.-c lists a total amount of space C. /etc
used in the directory D. /boot
D. none of above
46. What is the name of the top level folder in
41. Using locally attached storage is usually a folder structure called?
for a home/small business A. The top
A. cost effective B. The leaf
B. safer C. The root
C. more reliable D. The shrub
D. none of these 47. Each file has its own index block(s) of
pointers to its data blocks.
42. It is the collective term for all the docu-
ments, photos, videos and others in com- A. Linked Allocation
puter. B. Indexed Allocation
A. File C. Contiguous Allocation
B. File folder D. none of above
49. Provides a set of remote procedure calls B. File History files should be saved on a
for remote file operations separate drive from the drives containing
the files.
A. CIFS
C. File History allows the user to choose
B. NFS how long copies should be saved.
C. HTTP D. File History allows the user to exclude
D. FTP designated user profile files or folders
from backing up.
50. Software which manages a device’s mem-
ory, processes and hardware. 55. What is the parent directory for system
crash files?
A. Hard Drive
A. /tmp
B. Universal Serial Bus
B. /var
C. Operating Systems
C. /usr
D. Desk Top
D. /proc
51. storage attached directly to a workstation
is known as 56. What directory contains all the devices and
their references in the file system? (select
A. local storage
1)
B. network storage
A. /mnt
C. cloud storage
B. /lib
D. none of above
C. /dev
52. Security is a major issue with this type of D. /home
storage
57. Which directory contains commands that
A. cloud storage can be used by all accounts? (select 1)
B. network storage A. /bin
C. local storage B. /tmp
D. none of above C. /proc
53. Within which hierarchy is cached data D. /lib
stored for both yum-and apt-style Sys-
tems? (select 1) 58. You can rename a folder by right-clicking
on the folder and choosing from the
A. /var/cache shortcut menu and then typing in the new
B. /etc name.
NARAYAN CHANGDER
location by maintaining file control blocks
A. Logical File System 64. What is a significant advantage of cloud-
based backups?
B. File System
A. The backups are available anywhere
C. File Block System
with internet connection.
D. Basic File System
B. The cost is lower for cloud-based back-
ups than for local backups.
60. Which of the following is a method for
opening a file? C. Restore time is lower than for local
backup and restore scenarios.
A. Dragging the file to the Start button
D. Cloud-based backups are far more se-
B. Dragging the file to the taskbar
cure than local backups.
C. Double-clicking on the file name
65. A network-based data backup is stored
D. Left-clicking mouse on the file name
68. “This problem arises due to the scatter- 72. Which of the following is not a file format
ing of data in various files with various extension?
formats. Due to the above disadvantages
77. It is a folder in a computer which consist D. uname shows information about the
of different files. system
A. file 82. Which of the following file types is associ-
B. file folder ated with Microsoft®Word?
C. file system A. .xlsx
D. web browser B. .docx
78. What kind of storage can put increased C. .pptx
NARAYAN CHANGDER
pressure on connection D. .pub
A. Full backup
83. Which folder contains the Kernel,
B. Email firmware, and other related system files?
C. Data (select 1)
D. Remote A. /proc
79. What would you typically use to save a B. /boot
image? C. /root
A. .png D. /sys
B. .jpg
84. A LOCAL data backup is stored
C. .gif
A. on site
D. .wav
B. off site
80. Which of the following items in the folder C. in the cloud
window allows users to view locations
which have been visited before? D. in file servers
A. Previous locations arrow 85. You can also create a folder within a folder.
B. Refresh button These folders are often called
C. Navigation pane A. Files
D. Search box B. Icons
C. Folder Short cuts
81. Anna is attempting to unmount the mount
point /mnt/data. The umount command D. Sub-folders
failed and displayed error message stat-
86. Which Windows utility should be used if a
ing that the device is busy. Anna suspects
user wants to restore a Windows system
there my be an open file causing the is-
with an exact copy of the drive, all applica-
sue. Which of the following commands
tions, files, and configurations at the time
will show Anna a list of open files?
of the backup?
A. lsof displays open files in the file sys-
A. System Protection using Restore
tem
Points
B. awk is an interpreter for the AWK text
processing language B. System Recovery
87. Data stored at the front of the file ahead 92. You have a Linux system with two
of any content is called the activated swap partitions, sda3 and
sdb2.Which of the following commands
88. A linear list with a hash data struc- B. The swapoff-a command will de-
ture.*decreased search time*good if en- activate all swap partitions listed in
tries are of a fixed size*collisions can occur /etc/fstab
when two file names hash to the same lo- C. The pvcreate command is used to cre-
cation ate LVM physical volumes
A. Hash Table D. none of above
B. Linear List 93. To save a file in a folder, in the program
C. Hash Data Structure you are working in, click on the File tab
D. Linear Data and choose the Save As option and then
When the Save As window opens, lo-
89. You can change how items appear in a cate the folder in which you would like to
folder by clicking on the tab in the save the file.
folder window and then in the Layout A. Browse
group choosing an option from the group.
B. Open
A. View
C. New
B. Copy
D. Save As
C. Browse
D. New Folder 94. What important danger must be consid-
ered when using cloud storage?
90. Which of the following files is the location A. Data security
used to gather information about load av-
erage for use in the uptime command? (se- B. Data transfer speed
lect 1) C. Data integrity
A. /proc/uptime D. Data recovery
B. /proc/loadavg 95. “Database management System allows
C. /proc/load specific users to access specific part of the
D. /proc/utime database. This capability is not available
if you are using File System”The above
91. Which storage type is encoded as a single statement refers to the database ability to
enormous list of ones and zeroes.
A. File systems A. Limit Access Cntrol
B. Files B. Create Backup
C. File formats C. Recover damage or lost data
D. Compression & Encryption D. Allows multiple access to the database
96. Storage Structure consisting of informa- 101. Which of the following command al-
tion about a file-inode #-file dates-file lows you to use an alternative superblock
owner-file size-file data blocks or pointers when the primary superblock has been cor-
to file data blocks rupted?
A. File System A. Use the e2fsck-b 16385 /dev/sda1
command to use the alternative su-
B. Basic File System
perblock at block 16385
C. File Organization Module
B. The mke2fs-n /dev/sda1 command
NARAYAN CHANGDER
D. File Control Block tells you the locations of the superblocks
on the disk
97. Hardware Abstraction means that we can
C. /dev/sd1 command starts the fsck util-
ity on the device
A. Treat different storage devices identi-
D. none of above
cally
B. Write different programs for different 102. Files and directories are kept both in main
storage devices memory or disk
C. Control where on a device the data is A. Backup
stored B. Logical File System
D. Erase magnetic tapes and re-use them C. Recovery
98. What does the / directory signify? (select D. WAFL File System
1) 103. if block[I] is free0 if block[I] is occu-
A. Root directory piedEasy to locate the first free block
B. An empty directory A. Bit Vector or Bit Map
C. A new directory B. Grouping
D. none of above C. Counting
D. Space Maps
99. Identify the advantages of Database man-
agement system? 104. Which utility can be created that makes a
bootable usb drive that contains the Win-
A. Data Ingrity
dows system files to conduct a complete
B. All of these Windows restore?
C. Ruduction in Data Rudendency A. File History
D. Centralize Management B. Recovery Drive
C. System Image
100. Data Isolation caused due to in tradi-
tional file system. D. System Recovery
A. Scatter of Data 105. You have added several new hard disks
B. Duplicate Data to your system. After partitioning and for-
matting, you have modified a configura-
C. Complex Data
tion file to mount these new file systems
D. Atomic Data automatically. You want to document the
change you made.Which of the following 109. What does Compression mean?
configuration files would you document? A. Reencoding a file to consume less stor-
113. Which of the following backup options 118. A unique name which identifies users to
are considered removable media? Windows
A. USB flash drives A. Password
B. NAS devices B. Identifier
C. Cloud storage C. Administrative Code
NARAYAN CHANGDER
119. A separate section of main memory for
114. You can view the properties of a file by
frequently used blocks.
right-clicking on the file’s icon and then
choosing from the shortcut menu. A. Unified Buffer Cache
A. File B. Page Cache
B. Folders C. Buffer Cache
B. System Protection using Restore A. The Ext4 file system is more efficient at
Points storing small files than most file systems
B. ext2
128. The system requirements for a new Linux A. manually move each file to a destina-
computer show that the system will pri- tion
marily be used to store documents of small
B. run a backup program
size.Which of the following file systems
would be the MOST efficient at storing C. copy and paste using the keyboard
these documents on a Linux system? D. none of these
133. A backup of the data that has changed is debugfs utility.Which of the following de-
known as bugfs options should you use to examine
A. Incremental backup the file system?
A. Use debugfs-c to specify the file sys-
B. Full backup
tem should open in catastrophic mode
C. Differential backup
B. -w specifies the filesystem should
D. Data backup open in read-write mode
C. -f executes commands in a text file
NARAYAN CHANGDER
134. Defragmentation is no longer necessary
on Solid State drives. On older drives, it D. -Z prints the version number of de-
was needed to bugfs and exits
A. Put fragments of files together to 138. Text files contain a string of numbers
speed up access stored in binary. These numbers are
B. Break files into smaller fragments to translated into letters through a standard
fit files in small spaces called:
A. ASCII
C. Delete fragments of unused data
B. ANSI
D. Copy files to another drive
C. IANA
135. tar archives command description: D. IEEE
A. -c create archive
139. Which of the following describes the ef-
B. -r update (append files or replace ex- fects of the tune2fs-j /dev/sdb1 com-
isting files with newerversions) mand?
C. -t extract files A. tune2fs-j /dev/sdb1 converts the
/dev/sdb1 device file system from ext2
D. -u append
to ext3 without affecting the data on the
E. -x list drive
136. You are inspecting the superblocks and B. -c adjusts the number of mounts after
block information on your file system. You which the file system will be checked
need dumpe2fs to display only the blocks C. -e remount-ro remounts the file sys-
that are reserved as bad in the file sys- tem as read-only
tem.Which of the following options should D. -l lists the contents of the file system
you use? super block
A. Use dumpe2fs-b to print the blocks
140. To properly access stored data, we need
that are reserved as bad in the file system
to use a Directory File at the start of the
B. -h prints only super block information storage device. This directory file contains
C. -x prints group information block num-
bers in hexadecimal format A. An index of where each file is
D. none of above B. Identification of each file’s type
C. Metadata about each file
137. Your ext3 file system has experienced a
significant amount of corruption. To exam- D. The contents of each file
ine the file system, you want to use the E. a system of folders and subfolders
141. Another method of deleting files is to se- 146. What hardware does the file manage-
lect the file and then pressing the key ment functionality provide a level of ab-
on the keyboard. straction on?
D. Delete D. processor
NARAYAN CHANGDER
applications to request permission C. Hue, Shade, and Tint
C. looking at the file extension & its list of D. Length, Width, and Height
2. Which of the following is true? 5. When data has been processed and is
meaningful, which of these has it be-
A. Which of the following is true? come?
B. Viruses cannot be spread via email
A. Information
C. Viruses can completely destroy all the
data on your computer B. Processed data
B. Virus B. firewall
C. Spim C. cache memory
D. Spam D. encryption
NARAYAN CHANGDER
A. To use multiple computers to flood a C. Security Algorithm
network or server with internet traffic in D. Security service
order to disrupt service
13. Apart from our usernames and password,
B. To use a single computer to flood a net-
what is extra layer of security that can be
work or server with internet traffic in or-
used to protect our online accounts?
der to disrupt service
A. PIN
C. To use multiple computers to infiltrate
a network in order to steal data or to plant B. Strong passwords
a virus C. 2 Factor Authentication (2FA)
D. To use a single computer to infiltrate a D. Pattern
network in order to steal data or to plant
14. This is any illegal act involving a computer.
a virus
A. cybercrime
9. How many aspects of protection of the se- B. Trojan Horse
curity of computers are they?
C. hacking
A. 3
D. identity theft
B. 4
15. If you receive an email from a well-known
C. 5 company, but its name is misspelt in the
D. 6 sender’s address, you should:
A. click on the link in the email to check if
10. A computer virus may:
it’s genuine
A. overwrite your files and corrupt your B. reply, pointing out the error
data
C. report it as a possible phishing scam
B. steal important information from your
D. forward the email to a friend to check
computer
C. use a lot of memory and slow down 16. Identify two qualities of a good password.
your computer A. It should be more than 10 characters
D. all of these long
B. It should be written down on a piece
11. An organisation such as a school holds per- of paper
sonal data about you. The organisation:
C. It should be attached to you.
A. has to ask your permission to keep D. It should be a mixture of upper, lower
your data on their computer case letters, numbers and special charac-
B. must delete the data when you leave ters
17. ‘Revolving backups’ refer to: 21. A loss of is the unauthorized disclosure
A. the last several backups are kept. of information.
B. Bringing a system to an operable con- 24. In cybersecurity, what does CIA stand
dition after a disaster so that it can again for?
accept and process data. A. Confidentiality, Integrity, Availability
C. An organized approach to addressing B. Central Intelligence Agency
and managing the aftermath of a security
breach or cyberattack C. Cybersecurity Investigation Agency
D. Cybersecurity, Internet, Accessibility
D. It is the ability to ensure recovery with-
out compromise after a system failure. 25. Which of the following devices is not con-
nected to the Internet of Things?
20. The act of extracting personal information,
such as passwords and credit card details, A. An AM/FM radio without any bluetooth
from computer users and then use the in- or Internet connection capabilities
formation for malicious purposes. B. A wearable device that measures your
A. phishing physical activity and allows you to track
your activity through a mobile app
B. intellectual property
C. A smart thermostat that allows you
C. computer security to remotely control your home’s temper-
D. online predator ature through a mobile app
NARAYAN CHANGDER
B. 14 A. only allowing your friends and family
C. 16 to know your passwords
D. 18 B. making frequent backups
C. choosing a strong password and
27. A computer program that is designed to
changing it regularly
cause malfunctioning of a computer or
damage the data stored on the computer. D. never using computers in a public
place such as a library
A. worm
B. virus 32. A destructive computer program disguised
C. Trojan horse as a game, utility, or software. When run,
a Trojan horse does something harmful to
D. online predator the computer system while appearing to
do something useful.
28. This is identified as threats or harassment
made via email, text, IM. A. Trojan horse
A. cybercrime B. spyware
B. salami shaving C. software piracy
C. identity theft D. spam
D. cyberbullying
33. In 2016, online fraud cases in the United
29. An Internet security protocol that ensures States resulted in victim losses totaling:
secure data communication by encrypting A. Nothing-online fraud doesn’t result in
the information transmitted. The SSL pro- victim losses
tocol certifies that a Web site is genuine
and ensures that the data provided to the B. $100, 000
site is not misused. C. $2 million
A. decrypt D. Over $1.2 billion
B. encryption
34. Message means that the sender and
C. Secure Sockets Layer (SSL) the receiver expect privacy.
D. hacker
A. confidentiality
30. A unique string of characters that a user B. integrity
types in as an identification code. It is a
C. authentication
security measure used to restrict access to
computer systems and sensitive files. D. none of the above
35. When upgrading computers, what is the 40. The Act which specifies the rules about col-
term given to old electrical equipment to lecting and holding personal data is called:
be disposed of?
B. The web address starts with https:// A. communicating and passing the infor-
mation to the outsider.
C. You found the address on a search en-
B. identifying and removing any computer
gine or as a link in an email
viruses found on storage media, in the
D. Company contact details computer memory or incoming email files.
39. This is when someone acts as someone C. installing a new virus through the data
else to by items or get credit. received.
D. reading the operating system and mod-
A. hacking
ifies it.
B. identity theft
44. Which of the following is true about the In-
C. cybercrime
ternet of Things? I. The Internet of Things
D. software piracy is the network of devices with the ability
to connect and exchange data.II. The Inter- C. Someone monitors data travelling on
net of Things increases our vulnerability to the network to steal information.
cyber attacks.III. The Internet of Things is D. none of above
purely positive-there are no negative con-
sequences to increased connectivity 49. Which of the following is not true about
A. I only cyber security?
NARAYAN CHANGDER
C. I and III lions of people.
D. None of the above B. Cyber security is the protection of com-
puter systems, networks, and data from
45. The law regarding holding personal data
digital attacks.
states that if a company holds personal
data it must: C. As we rely more on computing devices
to store and send data, we increase our
A. keep the data secure
vulnerability to cyber attacks.
B. keep the data accurate and up to date
D. Cyber attacks can devastate large or-
C. allow people to see what data is held ganizations, but individuals are largely un-
about them affected.
D. all of the above
50. You accidentally delete a program file from
46. Which of the following is a sign of a possi- your computer. Now it will not boot up.
ble malware attack? What kind of computer threat is this?
A. A new toolbar appears on your A. Spoofing
browser B. Phishing
B. You see a lot of pop-up adverts even C. Human error
when you’re offline
D. Software piracy
C. Your hard disk is working overtime but
you’re not doing anything 51. Which of the following Computer Science
Fields are covered by Cyber Security?
D. Any of these
A. Machine Learning
47. What does patent protect?
B. Computer Networking
A. Inventions
C. Cryptography
B. Buildings
D. Data Science
C. Computer
E. Web Development
D. Groceries
52. Under the Computer Misuse Act, it is ille-
48. Which of these best describes an active at- gal to:
tack? A. look at someone else’s computer files
A. Someone attacks a network with mal- without permission
ware. B. look at someone else’s computer files
B. Someone from inside an organisation without permission with intent to commit
uses the network to steal information. further criminal offences
C. change data on someone else’s com- 57. If someone asks for your account informa-
puter files without permission tion, what should you do?
62. Which of these is a sign of malware on 67. If someone suspects that a company holds
your computer? inaccurate information about them:
A. You receive a fraudulent email A. they have a right to see what data the
B. Your browser alerts you it has blocked company holds about them
a pop-up window B. they can log on any time to find out
C. Your homepage has changed unexpect- what data is held about them
edly C. they can correct the data themselves
NARAYAN CHANGDER
D. Your browser alerts you to update to a D. they will be unable to get the data cor-
newer version rected
63. You are using google chrome and you want 68. Identify the method and example to over-
to browse a website but not have the web- come the following security risk.Dharma
site stored in your browsing history.what wants to save his documents file in sev-
should you do? eral place to avoid data loss.
A. log in to someone else to browse the A. Turn on firewall, Avira
site
B. Use data backup, Acronis Trueimage
B. configure independent browsing backup 2
C. use inprivate C. Install antivirus, Zone Alarm Profire-
D. Use incognito wall
D. Install antispyware, SuperAntiSpy-
64. Which of the following is a “strong” pass-
ware
word for someone named Justin Smith?
A. JustinSmith 69. Which of the following passwords would
B. Justin123456 be the best defence against a brute force
attack?
C. softcatsears
A. peter1£@!
D. SmithJ1
B. Petertherabbit
65. ‘Gaining unauthorised access to or control C. P3tertherabb1t
of a computer system’ is a definition of
which type of cybercrime? D. P$tertherabb1t
A. Hacking 70. an instant message can have attachments
B. Viruses that
C. Social engineering A. are meant for malicious purposes
D. Phishing B. are cute pictures
C. that install software updates
66. This means to gain access without permis-
sion, unauthorized access. D. that have all the answers to life
A. hacking 71. Which UK law gives you the right to access
B. cybercrime the data an organisation stores on you?
C. identity theft A. The Freedom of Information Act
D. virus B. The Computer Misuse Act
72. Name the elements or goals of information 77. You receive an email from an unknown
security. (CLO1, C1) sender asking for money. The sender
A. Vulnerability, integrity and availability wants you to respond to the email. There
are no hyperlinks in the email, but it in-
B. Confidentiality, integrity and availabil- cludes unusual use of English and there are
ity a number of spelling mistakes. What type
C. Confidentiality, usability and integrity of social engineering attempt is this?
D. Reliability, integrity and accountability A. Shouldering
73. An individual who develops contact with B. Phishing
Internet users, through chat rooms, online C. Spam
forums, or e-mail, to exploit them finan-
D. Blagging
cially or involve them in dangerous rela-
tionships. 78. Some aspects of protection of the security
A. encryptor of computers are
B. online predator A. Protecting your family
C. firewall B. Protecting users of programs
D. computer security C. Protecting code and data
D. Protecting your belongings
74. Which works are protected by copyright?
A. ideas 79. Theft, unauthorized access and sabotage
are examples of this.
B. all works
A. software piracy
C. literary, musical, dramatic, pictorial
works B. cyberstalking
D. titles, names, slogans C. online auction fraud
D. computer crimes
75. Keeping a user’s data, including personal
files and e-mail messages, such that the 80. This is unauthorized copying of a soft-
data is not accessible by anyone without ware.
appropriate permission
A. biometric protected
A. encryption
B. worm
B. copyright
C. hacking
C. computer privacy
D. software piracy
D. hacker
81. A processing or communication service
76. A computer virus is a small program which: that enhances the security of the data pro-
A. will destroy your computer hardware cessing systems and the information trans-
B. you may unintentionally transmit to fers of an organization.
other computers and infect them A. Security Attack
NARAYAN CHANGDER
B. Someone from inside an organisation 87. Which of these passwords is the most se-
uses the network to steal information. cure?
C. Someone monitors data travelling on A. MyFav0ur1t3P3t1saC@t
the network to steal information.
B. ABCD1234
D. none of above
C. Password
83. Health and Safety regulations require an
D. 123456789
employer to:
A. provide cup holders 88. There are several reasons why a company
B. provide flat screens would develop and implement a business
continuity plan. Which of the following
C. provide tiltable screens to change the
properly describes the best reason?
angle and height of view
D. all of the above A. To increase liability
B. The continuation of a company
84. The process of converting data into an un-
readable and unusable form. Encryption C. Compliancy with regulations
is done to prevent unauthorized access of
D. Properly react to disasters
data, especially during data transmission
over the Internet.
89. Computer security incidents are catego-
A. encryption rized into levels.
B. decryption A. two
C. cookie
B. three
D. backup
C. four
85. You receive an e-mail message. The sender D. five
of the message claims to be a bank execu-
tive and wants your personal information 90. When disposing of an old computer:
to open an account for you. Which one
of the following terms describes this activ- A. It should be incinerated to ensure that
ity? sensitive data is destroyed
A. Phishing B. It should be taken to a recycling center
B. Pirating C. It should be taken to a landfill site
C. Spyware D. It should be taken apart and the outer
D. Hacking casing recycled, the rest put in the bin
91. A small file on a computer that is created B. Someone tries to get information by
when a user visits a Web site. A Web site cracking password through trial and er-
uses cookies to identify users who visit ror.
NARAYAN CHANGDER
B. To give your password to strangers B. user name
C. To know how to make a lockscreen C. password
D. To hack other people’s accounts D. spam
102. Which of the following is not a computer
107. A computer program that is installed on
security incident?
your computer without your knowledge.
A. web site defacement Spyware can secretly send out informa-
B. social engineering incidents tion about your Web browsing habits or
other personal details to another computer
C. car theft
through the network.
D. virus attacks
A. phishing
103. A company that provides Internet connec- B. slander
tivity to individuals, businesses, and orga-
nizations. C. spyware
A. cookie D. software piracy
B. hacker
108. You receive a desperate plea for help
C. Internet Service Provider (ISP)
from a friend who says they are stuck
D. world wide web overseas and all their money has been
stolen. You should:
104. Which of the following is considered a
low-level incident? A. reply to the email
A. Unfriendly employment termination B. delete the email
B. Illegal access to buildings C. send some money
C. denial of service attacks D. forward the email to a mutual friend
D. Unsuccessful scans and probes
109. A loss of is the disruption of access
105. what additional measures can be taken to to or use of information or an information
protect your computer from physical dam- system.
age?
A. Availability
A. put computer in your car
B. keep it in your bookbag B. Integrity
111. You can tell whether a link in email will 116. type of malicious software program (mal-
take you to a genuine website, for exam- ware) that, when executed, replicates by
ple belonging to a bank, without risk, by: reproducing itself (copying its own source
code) or infecting other computer pro-
A. pointing to the link or hovering over it
grams by modifying them.
without clicking
A. Computer Virus
B. deleting the email
B. Computer Worm
C. replying to the email
C. MyDoom
D. clicking on the link
D. Malicious Code
112. Identify the method and example to over-
come the following security risk.Teng Looi 117. A loss of is the unauthorized modifi-
wants to protect her assignment that she cation or destruction of information.
keeps in her computer folder. A. confidentiality
A. Install firewall, Bull Guard Anti Virus B. Integrity
B. Using data backup, Acronis Trueimage C. Authentication
backup 2 D. Non repudiation
C. Install Antivirus, Kaspersky antivirus
118. Phishing is a way of attempting to ac-
D. Using cryptography, Securstore quire information. What information does
it try to acquire? Select two
113. Message means that the receiver is
ensured that the message is coming from A. User names and passwords
the intended sender, not an imposter. B. Level of education
A. confidentiality C. Credit card details
B. integrity D. Marital status
C. authentication
119. The practice of taking someone else’s
D. none of the above work or ideas and passing them off as
one’s own.
114. Confidentiality, Integrity, and Availabil-
ity are the three main things used to eval- A. Citation
uate information security. B. Bibliography
A. CIA Triad C. Plagiarism
B. Baiting D. Newton’s Law
NARAYAN CHANGDER
D. buy a new computer 126. The act or instance of making a duplicate
copy of a program, a disk, or data. The
121. A method of protecting the rights of an duplicate copy is called a backup.
originator of a creative work, such as text, A. cache memory
piece of music, painting, or computer pro-
B. backup
gram, through law.
C. copyright
A. copyright
D. encryption
B. encryption
C. computer privacy 127. Select all the bad examples of practicing
Digital Safety and Security.
D. decryption
A. Sharing an account with your boyfriend
122. Which of the following is a method of ver- / girlfriend.
ifying that a login attempt has been made
B. Keeping all your devices secured with
by the account owner?
a password.
A. CAPTCHA
C. Adding your location to a public post in
B. Two-factor authentication Facebook.
C. Installing a firewall D. Talking to someone you’ve never met
D. Setting user permission personally about your day.
123. Why security of computers need to be 128. Which of the following functions is not
protected? part of incident handling?
A. design
A. To protect computer system against
criminals B. report
B. To expose individual private data C. analysis
C. To protect individual private data D. response
D. To allow virus to attack computer 129. When choosing a password you should:
124. If you find someone trying to hack into a A. use something easy to remember like
secure system, what should you do? your pet’s name
A. Join in. B. use a combination of special char-
acters, letters and numbers that mean
B. Blackmail him/her. something to you but no one else
C. Tell them the better way of doing it. C. save all your passwords in a file on
D. Report it. your computer in case you forget one
D. use a foreign word that will not be in 135. You want a new computer. What can you
an English dictionary do to prevent others from accessing your
confidential data in this computer?
139. Which of the following are types of mal- 143. Most programs also protects against
ware? Tick all that apply. worms and Trojan horses.
A. Trojans A. firewall
B. Worms B. antivirus
C. Anti-virus C. antispyware
D. Firewall D. data backup
E. Ransomware
144. Verbal defamation. This is a punishable
NARAYAN CHANGDER
140. Which of the following data is considered offense.
to be “personal data” when held by a A. firewall
school:
B. encrypt
A. the school’s email address the number
of pupils in the school C. slander
B. the year that a particular pupil joined D. libel
the school 145. Alice is buying books from an online re-
C. the average percentage a*-c grades tail site, and she finds that she is able to
at gcse gained by pupils last year change the price of a book from $19.99
D. none of above to $1.99.Which part of the CIA triad has
been broken?
141. What is digital security?
A. Confidentiality
A. Is something that exploits a weakness
in an asset. B. Integrity
158. A computer program that propagates it- C. Their loyalty card number
self across computers, usually by creating
D. All of these
copies of itself in each computer’s memory.
A worm might duplicate itself in one com-
puter so often that it causes the computer 163. Which of the following describes a name
to crash. generator attack?
NARAYAN CHANGDER
C. Trojan horse B. Attackers create an online quiz to pro-
duce a name; the answers to the quiz
D. virus find out key pieces of information that can
159. Is an attempt to make a computer or net- help them to answer the security ques-
work resource unavailable to its intended tions protecting people’s accounts
users. C. An attack that makes multiple at-
A. Masquerading tempts to guess a username and pass-
B. Replay word
160. Which one of the following UK laws 164. A log book is useful in:
would a DDoS attack violate?
A. preventing an incident.
A. The Freedom of Information Act
B. handling an incident.
B. The Computer Misuse Act
C. developing a contingency plan.
C. The Data Protection Act
D. The Copyright, Designs, and Patents D. All of the answers are correct.
Act
165. Hacking is illegal under:
161. Organisations holding personal data are
allowed to: A. The Data Protection Act
A. sell the data to other organisations B. The Computer Misuse Act
B. keep the data for ever C. Copyright Law
C. sell the data for research purposes af- D. Health and Safety Law
ter removing data from which individuals
can be identified
166. The act of copying someone’s work and
D. none of the above using it as if it is your own work, without
mentioning the source.
162. Which of the following is “personal data”
which may be held about someone on the A. plagiarism
computer system of a supermarket?
B. computer safety
A. Their address
C. phishing
B. The amount they spent last year at the
supermarket D. hacking
NARAYAN CHANGDER
D. all of these
the lower back
177. You have just landed at the airport and B. has the screen above eye level
have an unexpected six-hour layover. you
want to use your smartphone to get some C. has at least 10m of space per person
work done.what should you disable as a D. all of the above
precautionary device hardening measure
to help prevent potential attacks? 180. Software that checks incoming and outgo-
A. autofill ing traffic on a network to check for mali-
cious code is known as what?
B. Bluetooth
A. Anti-virus
C. polo
D. FFC B. Anti-malware
C. Firewall
178. How often should you back up your
data? D. Two-factor authentication