Practice Test: Question Set - 02
1. A partitioned data set is most used for
- (A) A
program or source library
- (B) Storing
program data
- (C) Storing
backup information
- (D) Storing
ISAM files
2. The disadvantages of "Compile and Go" loading scheme is (are):
- (A) A
portion of memory is wasted because the core occupied by the assembler is
unavailable to the object program
- (B) It
is necessary to retranslate the user's program deck every time it is run
- (C) It
is very difficult to handle multiple segments, especially if the source
programs are in different languages, and to produce orderly modular programs
- (D) All
of the above
3. System generation:
- (A) Is
always quite simple
- (B) Is
always very difficult
- (C) Varies
in difficulty between systems
- (D) Requires
extensive tools to be understandable
4. The errors that can be pointed out by the compiler are
- (A) Syntax
errors
- (B) Semantic
errors
- (C) Logical
errors
- (D) Internal
errors
5. Which of the following system program forgoes the production of object code to generate absolute machine code and load it into the physical main storage location from which it will be executed immediately upon completion of the assembly?
- (A) Two
pass assembler
- (B) Load-and-go
assembler
- (C) Macroprocessor
- (D) Compiler
6. The memory allocation scheme subject to "external" fragmentation is
- (A) Segmentation
- (B) Swapping
- (C) Pure
demand paging
- (D) Multiple
contiguous fixed partitions
7. In MS-DOS, relocatable object files and load modules have extensions
- (A) .OBJ and
.COM or .EXE, respectively
- (B) .COM and
.OBJ, respectively
- (C) .EXE and
.OBJ, respectively
- (D) .DAS and
.EXE, respectively
8. Indicate which is a pre-emptive scheduling algorithm
- (A) Round-robin
- (B) Shortest-job-next
- (C) Priority-based
- (D) All
of the above
9. In MS-DOS 5.0, which is the number that acts as a code to uniquely identify the software product?
- (A) MS
- (B) DOS
- (C) MS DOS
- (D) 5.0
10. A public key encryption system
- (A) Allows
anyone to decode the transmission
- (B) Allows only
the correct sender to decode the data
- (C) Allows only
the correct receiver to decode the data
- (D) Does not
encode the data before transmitting it
11. Indicate which, of the following, in not true about an interpreter
- (A) Interpreter
generates an object program from the source program
- (B) Interpreter
is a kind of translator
- (C) Interpreter
analyses each source statement every time it is to be executed
- (D) All of the
above
12. Memory management is:
- (A) Not used in
modern operating system
- (B) Replaced
with virtual memory on current systems
- (C) Not used on
multiprogramming systems
- (D) Critical for
even the simplest operating systems
13. Which of the following is characteristic of an operating system?
- (A) Resource
management
- (B) Error
recovery
- (C) Memory
management
- (D) All
the above
14. The most common systems security method is
- (A) Passwords
- (B) Encryption
- (C) Firewall
- (D) All
of the above
15. The part of machine level instruction, which tells the central processor what has to be done, is
- (A) Operation
code
- (B) Address
- (C) Locator
- (D) Flip-Flop
Next Tests: