Subscribe this Blog

Enter your email address:

Delivered by FeedBurner

Followers

Saturday, August 11, 2012

Question Bank for HSST Computer Science 2012 Exam



Q.Interface provided by an Operating System

(A) GUI
(B) CUI
(C) MUI
(D) Both CUI and GUI

Q. One can interface with operating system by meansof-
(A) Operating system call in a program
(B) Operating system commands
(C) Operating system process
(D) Both by operating system call and operating system commands

Q.Which of the following is not a type of processing?
(A)Serial 
(B) Network
(C) Batch 
(D) Multiprogramming

Q.A method, which transfers the entire block of data from its own buffer to main memory
takes place without intervention by CPU.
Programmed input/output
Interrupt driven input/output
Direct Memory Access (DMA)
Resident monitor

Q. Which of the following is not a multi-programming operating system ?
Multitasking operating system
Multi user operating system
Time sharing system
Network operating system


Q. The operating system is the most common type of____________ software.
A. communication
B. application
C. 
system
D. word-processing software



Q. The two broad categories of software are:
A. word processing and spreadsheet.
B. transaction and application.
C. Windows and Mac OS.
D. 
system and application

Q. Which level of security is implemented in Windows NT?
(A) Al 
(B) Cl
(C) B2 
(D) C2 

Q. The UNIX shell : 
(A) does not come with the rest of the system
(B) forms the interface between the user and the kernal 
(C) does not give any scope for programming
(D) does not allow calling one program from with in another


Q. YACC is a program in UNIX used for:
(A) automatic scanner generation
(B) automatic parser generation
(C) automatic code generation
(D) none of these 

Q. The invalid file in UNIX from among the ones given below is: 
(A) /bin/unix 
(B) fete/passwd
(C) fete/group 
(D) fusr/bin/vi


Q. The very first process created by the Kernal in UNIX is : 
(A) init 
(B) getty
(C) fork
(D) none among these 

Q.    Which command divides the surface of the blank disk into sectors and assign a unique address to each one
a.    Ver
b.    Format
c.    Fat
d.    Chkdsk

Q. Each time you turn on your computer, it will check on the control filea. Command.com, io.sys
b. Command.com, date.com, dir.com
c. Command.com, io.sys, msdos.sys
d. Chkdsk.exe


Q. If you need to duplicate the entire disk, which command will you use?
a. Copy
b. Diskcopy
c. Chkdsk
d. Format

Q. Which of the following extensions suggest that the file is a backup copy
a. Bak
b. Bas
c. Com
d. Txt

Q. Round robin scheduling is essentially the preemptive version of ________. 
FIFO 
2 Shortest job first 
3 Shortes remaining 
4 Longest time first 


Q. A page fault occurs 
1 when the page is not in the memory 
2 when the page is in the memory 
3 when the process enters the blocked state 
4 when the process is in the ready state 


Q. Which of the following will determine your choice of systems software for your computer ? 
1 Is the applications software you want to use compatible with it ? 
2 Is it expensive ? 
3 Is it compatible with your hardware ? 
4 Both 1 and 3 


Q. Let S and Q be two semaphores initialized to 1, where P0 and P1 processes the following statements wait(S);wait(Q); ---; signal(S);signal(Q) and wait(Q); wait(S);---;signal(Q);signal(S); respectively. The above situation depicts a: 

1 Semaphore 
2 Deadlock 
3 Signal 
4 Interrupt 


Q.What is a shell ? 
1 It is a hardware component 
2 It is a command interpreter 
3 It is a part in compiler 
4 It is a tool in CPU scheduling 


Q. Routine is not loaded until it is called. All routines are kept on disk in a relocatable load format. The main program is loaded into memory & is executed. This type of loading is called:
1 Static loading 
2 Dynamic loading 
3 Dynamic linking 
4 Overlays 

View More Questions >>

No comments:

Total Pageviews

Disclaimer : Blog Policies

This blog publishes various general knowledge. errors and omissions expected. The Knowledge documents in this blog meant only to increase the general awareness of the readers. If any of the information available on this blog violates or infringes any of your copyright protection, leave a comment . This blog makes no representations as to accuracy, completeness, correctness or validity of any information on this site and will not be liable for any errors, or delays in this information. The information contained in this blog is subject to change without notice. You may use contents in this blog only for personal use. Reproduction and republishing of any contents from here to any other websites or blogs is strictly prohibited.