Description : It contains the stack for PC storage during subroutine calls and input/output interrupt services: a. Seven- level hardware b. Eight- level hardware
Last Answer : b. Eight- level hardware
Description : is an external hardware event which causes the CPU to interrupt the current instruction sequence: a. Input interrupt b. Output interrupt c. Both d. None of these
Last Answer : c. Both
Description : Which interrupt services save all the register and flags. a. Save interrupt b. Input/output interrupt c. Service interrupt d. All of these
Last Answer : b. Input/output interrupt
Description : Which are benefit of input/output interrupt: a. It is an external analogy to exceptions b. The processor initiates and perform all I/O operation c. The data is transferred into the memory through interrupt handler d. = Alllof these
Last Answer : d. = Alllof these
Description : Which are the not causes of the interrupt: a. In any single device b. In processor poll devices c. Itis an external analogy to exception d. None of these
Last Answer : c. Itis an external analogy to exception
Description : Which are the causes of the interrupt: a. In any single device b. In processor poll devices c. In a device whose ID number is stored on the address bus d. Allof these
Last Answer : d. Allof these
Description : Which are the functioning of I/O interrupt: a. The processor organizes all the I/O operation for smooth functioning b. After completing the I/O operation the device interrupt the processor c. Both d. None of these
Last Answer : b. After completing the I/O operation the device interrupt the processor
Description : which of the following is interrupt mode. a. Task mode b. Executive mode c. Botha &b d. None of these
Last Answer : b. Executive mode
Description : Which operations are to be performed on a directory are: a. Search for a file b. Create a file c. Delete a file d. List a directory e. Rename a file f. Traverse the file system g. Allof these
Last Answer : g. Allof these
Description : ___uses the stack to store return address of subroutine: a. CPU b. Microprocessor c. register d. memory
Last Answer : b. Microprocessor
Description : Return instruction is written in_ to written to main program: a. Subroutine b. Main program c. Botha &b d. None of these
Last Answer : a. Subroutine
Description : Which is the common program control instructions are. a Branch b. Jump c Call a subroutine d. Return e. Allof these f None of these
Last Answer : e. Allof these
Description : abbreviation EBCDIC stand for: a. Extended binary coded decimal interchange code b. External binary coded decimal interchange code c. Extra binary coded decimal interchange code d. None of these
Last Answer : a. Extended binary coded decimal interchange code
Description : GIGO stand for. a. Garbage-in-garbage-out b. Garbage-in garbage-occur c. Both d. None of these
Last Answer : a. Garbage-in-garbage-out
Description : Virtual Mode Flag bit can be set using ____ instruction or any task switch operation only in the _____ mode a) IRET, Virtual b) POPF, Real c) IRET, protected d) POPF, protected
Last Answer : b) POPF, Real
Description : Which of the following commands is called as three-finger salute in computers ? (1) Ctrl + Alt + Delete (2) Ctrl + Shift + Escape (3) Ctrl + Shift + Enter (4) Ctrl + Alt + Arrow key
Last Answer : Ctrl + Alt + Delete
Description : emaphore provides mutual exclusion for accesses to the buffer pool and is initialized to the value: a. Mutex b. Mutual Cc. Memory d. __ Allof these
Last Answer : Mutex
Description : Which section is basically a sequence of instruction with a clear indication of beginning and end for updating shared variables. a. Racing section b. Critical section c. d. Both None of thes
Last Answer : . Critical sectio
Description : In which section only one process is allowed to access the shared variable and all other have to wait. a. Critical section b. Racing section Cc. Entry section d. Remainder section
Last Answer : . Critical section
Description : hich section is the remaining part of a process’s code: a. Racing section b. Critical section Cc. Entry section d. Reminder secti
Last Answer : b. Entry section
Description : Which are the characteristics of deadlocks. a. Mutual exclusion b. Hold and wait Cc. No pre-emption d. = Circular wait e. Allof these
Description : How many events concerning RAG can occur in a system: a. 1 b 2 c. 3 d 4
Last Answer : c. 3
Description : Which are the events concerning RAG can occur in a system: a. Request for a resource b. Allocation of a resource c. Release of resource d. Allof these
Description : How many methods for handling deadlocks: a. 1 b 2 c. 3 d 4
Description : Which are the method for handling deadlocks. a. Deadlock prevention b. Deadlock avoidance c. Deadlock detection d. Allof these
Description : How many condition that should be met in order to produce a deadlock. a. 2 b 4 Cc. 6 d 8
Last Answer : b 4
Description : Which are the condition that should be met in order to produce a deadlock. a. Mutual exclusion b. Hold and Wait Cc. No preemption d. Circular wait e. Allofthese
Last Answer : e. Allofthese
Description : In protocol each process can make a request onlyinan a. Increasing order b. Decreasing order c. Botha &b d. None of these
Last Answer : a. Increasing order
Description : Which state refers to a state that is not safe not necessarily a deadlocked state. a. Safe state b. Unsafe state c. Botha &b d. None of these
Last Answer : b. Unsafe state
Description : a direct arrow is drawn from the process to the resource rectangle to represent each pending resource request: a. TS b. SP Cc. CCR d. RAG
Last Answer : d. RAG
Description : The attributes of a file are. a. Name b. Identifier c. Types d. Location e. Size f. Protection g. Time, date and user identification h. Allof these
Last Answer : h. Allof these
Description : The various file operation are: a. Crating a file b. Writing a file c. Reading a file d. Repositioning within a file e. Deleting a file truncating a file f. All of these
Last Answer : f. All of these
Description : Which memory is assembled between main memory and CPU: a. Primary memory b. Cache memory Cc. Botha & b d. None of these
Last Answer : b. Cache memory
Description : Which is one of the important I/O devices and is most commonly used as permanent storage device in any processor: a. Soft disk b. Hard disk c. Botha &b d. None of these
Last Answer : b. Hard disk
Description : can read any printed character by comparing the pattern that is stored in the computer: a. SP b. CCR Cc. RAG d. OCR
Last Answer : d. OCR
Description : Which system is a typical example of the readers and writers problem: a. Airline reservation system b. Airport reservation system c. Both d. None of these
Last Answer : a. Airline reservation system
Description : Which lock can arise when two processes wait for phone calls from one another. a. Spine lock b. Dead lock c. Both d. None of these
Last Answer : b. Dead lock
Description : Which lock is more serious than indefinite postponement or starvation because it affect more than one job: a. Deadlock b. Spinelock c. Both d. None of these
Last Answer : a. Deadlock
Description : Anumber system that uses only two digits, O and 1 is calledthe_ a. Octal number system b. Binary number system c. Decimal number system d. Hexadecimal number system
Last Answer : b. Binary number system
Description : In which computers, the binary number are represented by a set of binary storage device such as flip flop: a. Microcomputer b. Personal computer c. Digital computer
Last Answer : c. Digital computer
Description : Abinary number canbeconvertedinto a. Binary number b. Octal number co. Decimal number d. Hexadecimal number
Last Answer : co. Decimal number
Description : Which system is used to refer amount of things. a. Number system b. Number words c. Number symbols d. — Allof these
Last Answer : a. Number system
Description : _are made with some part of body, usually the hands. a. Number words b. Number symbols c. Number gestures d. __ Allof these
Last Answer : c. Number gestures
Description : ____are marked or written down: a. Number system b. Number words © Number symbols d. Number gestures
Last Answer : © Number symbols
Description : Anumber symboliscalleda_ a. Arabic numerals b. Numerals c. Both d. None of these
Last Answer : b. Numerals
Description : 0,1,2 ,3 ,4,5,6 ,7,8 and 9 numerals are called: a. Arabic numerals b. String numerals c. Digit numerals d. None of these
Last Answer : a. Arabic numerals
Description : How many system of arithmetic, which are often used in digital system. a. 5 b. 6 Cc. 3 d 4
Last Answer : d 4
Description : Which are the system of arithmetic, which are often used in digital system: a. Binary digit b. Decimal digit c. Hexadecimal digit d. Octal digit e. Allof these
Description : In which numeral every position has a value 2 times the value f the position to its right: a. Decimal b. Octal c. Hexadecimal d. Binary
Last Answer : d. Binary
Description : Abinary number with 4 bitsiscalleda_ a. Bit b. Bytes ce. Nibble d. None of these
Last Answer : ce. Nibble