Thursday 24 November 2011

Operating System

Q.1  The Operating System is responsible for 
A.Controlling peripheral devices such as monitor, printers, disk drives
B.Detecting errors in users' programs
C.Make the coffee
D.Provide an interface that allows users to choose programs to run and to manipulate files
E.Manage users' files on disk

Q.2  Which of the following does an operating system do in a stand-alone computer system? 
A. Manages the user's files.
B. Provides the system facilities.
C. Provides the interface to allow the user to communicate with the computer.
D. Controls the various peripherals

Q.3  Which is the following is TRUE about a terminal on a Time-sharing computer system? 
A. Has its own CPU and some memory.
B. Has no memory or CPU of its own.

Q.4  Which is the following is TRUE about a terminal on a Distributed computer system? 
A. Has its own CPU and some memory.
B. Has no memory or CPU of its own.

5.  When a computer is first turned on or restarted, a special type of absolute loader called ____ is executed
A. Compile and Go loader
B. Boot loader
C. Bootstrap loader
D. Relating loader


6.  Which of the following Operating systems is better for implementing a Client-Server network
A. MS DOS
B. Windows 95
C. Windows 98
D. Windows 2000


7. The operating system manages
A. Memory
B. Processes
C. Disks and I/O devices
D. all of the above

8. Usually, in MSDOS, the primary hard disk drives has the drive letter ____
A. A
B. B
C. C
D. D

9. What is the function of an operating system?
A. Manages computer’s resources very efficiently
B. Takes care of scheduling jobs for execution
C. Manages the flow of data and instructions
D. All of the above

10. Which is not the function of the Operating System?
A. Memory management
B. Disk management
C. Application management
D. Virus Protection

11. Which Operating System doesn’t support networking between computers?
A. Windows 3.1
B. Windows 95
C. Windows 2000
D. Windows NT

12. Which Operating System doesn’t support long file names?
A. OS/2
B. Windows 95
C. MS-DOS
D. Windows NT

13.  Which file keeps commands to execute automatically when OS is started?
A. command.com
B. any batch file
C. autoexec.bat
D. config.sys

14. What should be the extension to execute files?
A. EXE
B. BAT
C. COM
D. All of the above


15. ______ is used in operating system to separate mechanism from policy
A. Single level implementation
B. Two level implementation
C. Multi level implementation
D. None

16. The operating system creates _____ from the physical computer
A. Virtual space
B. Virtual computers
C. Virtual device
D. None

17. ______ shares characteristics with both hardware and software
A. Operating system
B. Software
C. Data
D. None

18. Multiprogramming systems:
A. Are easier to develop than single programming systems
B. Execute each job faster
C. Execute more jobs in the same time period
D. Are used only one large mainframe computers.

19. Which is the first program run on a computer when the computer boots up?
A. System software
B. Operating system
C. System operations
D. None

20. Which is built directly on the hardware?
A. Computer Environment
B. Application Software
C. Operating System
D. Database System

21. Which of the following Operating System does not implement multitasking truly?
A. Windows 98
B. Windows NT
C. Windows XP
D. MS DOS

22. Which runs on computer hardware and serve as platform for other software to run on?
A. Operating System
B. Application Software
C. System Software
D. All

23. Which is the layer of a computer system between the hardware and the user program
A. Operating environment
B. Operating system
C. System environment
D. None

24. The primary purpose of an operating system is:
A. To make the most efficient use of the computer hardware
B. To allow people to use the computer,
C. To keep systems programmers employed
D. To make computers easier to use

25.  MICR stands for
A.  Magnetic Ink Character Reader
B.  Magnetic Ink Code Reader
C.  Magnetic Ink Case Reader
D.  None of the above

26.  Which access method is used to access cassette tape?
A.  Direct
B.  Sequential        
C.  Both of the above
D.  None of the above

27.  EEPROM stands for
A.  Electrically Erasable Programmable Read Only Memory
B.  Electronic Erasable Programmable Read Only Memory
C.  Easily Erasable Programmable Read Only Memory
D.  Easily Erasable Programmable Read Only Memory

28.  Which of the following memories need refresh?
A.  SRAM
B.  DRAM
C.  ROM
D.  All of the above

29.  ASCII stands for
A.  American Standard Code for International Interchange
B.  American Scientific Code for International Interchange
C.  American Standard Code for Intelligence Interchange
D.  American Scientific Code for Information Interchange

30.  The output quality of a printer is measured by
A.  Dot per sq. inch
B.  Dot per inch
C.  Dots printed per unit time
D.  All of the above

31.  Main storage is also called
A.  Accumulator
B.  Control Unit
C.  Register Unit
D.  Memory

32.  Which is valid statement
A.  1 KB = 1024 Bytes
B.  1 MB = 1024 Bytes
C.  1 KB = 1000 Bytes
D.  1 MB = 1000 Bytes

33.  After copying the content how many times can you paste?
A.  1
B.  16
C.  32
D.  Many

34.  1 nibble equals to
A.  1 bits
B.  2 bits
C.  4 bits
D.  8 bits





COMPUTER SCIENCE FEDERAL PUBLIC SERVICE COMMISSION COMPETITIVE EXAMINATION FOR RECRUITMENT TO POSTS IN BPS-17 UNDER THE FEDERAL GOVERNMENT, 2009
(PART-I) 30 MINUTES, (PART-II) 2 HOURS & 30 MINUTES

(i) AX register is also known as:
(a) Accumulator
(b) Collector
(c) Distributor
(d) Counter
(e) None of these

(ii) In the Base + Offset addressing, Offset address is also known as:
(a) Physical Address
(b) Logical Address
(c) Actual Address
(d) Instruction Address
(e) None of these

(iii) The technique for allowing a unit to check the status of another independently function unit is
known as?
(a) Interrupt
(b) System call
(c) Polling
(d) Trape
(e) None of these

(iv) The method for storing data temporarily such that the input-output of the same job is overlapped with its own processing, is known as:
(a) Spooling
(b) Contention
(c) I/O wait
(d) Buffering
(e) None of these

(v) The DMA that uses Busses when CPU is not using them is termed as:
(a) Shared DMA
(b) Cycle Stealing
(c) Channel
(d) Transparent DMA
(e) None of these

(vi)_________ Scheduler deals with the decision as to whether to admit another new job to the system.
(a) High Level
(b) Medium Level
(c) Low Level
(d) Short term
(e) None of these

(vii) When the process is in the states of Blocked Suspended or Ready Suspended, its relevant data is stored in:
(a) Main Memory
(b) Hard Disk
(c) Magnetic Tape
(d) Buffer
(e) None of these

(viii) Priority, P = (Time Waiting + Run Time) / Run Time is used to calculate priority in __________ scheduling algorithm:
(a) Shortest Job First
(b) Priority Scheduling
(c) Longest Wait First
(d) Highest Response Ratio Next (e) None of these

(ix) HDLC Protocol stands for:
(b) High Level Development Protocol
(a) High-Level Data Link Control
(c) Huge Level Data Link Control
(d) High Development Level Control
(e) None of these

(x) _________ is the generic name for a set of standards issued by the International Communications Standards Body CCITT, designed to support Message Handling Systems; i.e. Electronic Mail.
(a) TCP/IP
(b) ISDN
(c) X.400
(d) X.25
(e) None of these

(xi) ________ layer is responsible for the transfer of a packet of data along one link in the network. It organizes data into frames and detects errors in transmission.
(a) Physical Layer
(b) Data Link Layer
(c) Network Layer
(d) Transport Layer
(e) None of these

(xii) Encryption is the conversion of data in some intelligible format into an unintelligible format
called _________ to prevent the data from being understood if read by an unauthorized party.
(a) Clear Text
(b) Encrypted Text
(c) Cipher Text
(d) Coded Text
(e) None of these

(xiii) Binary search requires about ______ comparisons with an initial list of 1,000,000 elements.
(a) 10
(b) 20
(c) 35
(d) 100
(e) None of these

(xiv) A _________ header list is a header list where the last node contains the null pointer.
(a) Grounded
(b) Circular
(c) One way
(d) Rooted
(e) None of these

(xv) ________ are small applications that are accessed on an internet server, transported over the
internet, automatically installed and run as part of a web document.
(a) Applets
(b) Java Bean
(c) Sockets
(d) Java Component
(e) None of these

(xvi) AWT stands for:
(a) Abstract Window Technique (b) Abstract Window Toolkit (c) Actual Window Technique
(d) Added Window Toolkit
(e) None of these

(xvii) GIF images can have only upto _______ colors.
(a) 128
(b) 256
(c) 512
(d) 1024
(e) None of these

(xviii) ________ is stored on a client and contains state information of the website visited.
(a) Cookies
(b) Servelet (c) History
(d) Resident Page
(e) None of these

(xix) In software Engineering KPA denotes.
(a) Key Process Audit
(b) Key Process Area
(c) Key Process Analysis
(d) Key Problem Area
(e) None of these

(xx) The ________ Process Model defines a series of events that will trigger transitions from state to state for each of software engineering activities.
(a) Spiral
(b) Operational
(c) RAD
(d) Concurrent Development
(e) None of these