What are the requirements for the solution to critical section problem?


Options: Mutual Exclusion B. Progress C. Bounded Waiting D. All of Above

Ans:– D ,


Description: mcqquestions

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 9414 | Level: Moderate




Got some suggestion about this question or to make this site better? Please leave your comments below.


Want to see where do you stand among other aspirants in "Computer" Category?

Click Here to take quick 5 mins MCQ test to find out.

More Operating System Related questions:


. Which program would you use to create copies of important information stored on your fixed disk drive?
Options: a. Scan disk b. Copy disk c. Back up d. None of above

Ans:3 – c ,3 – c


Which technique enables the designer to mold and shape, rather than construct on object using a series of lines?
Options: Solid modeling,    Wire-frame modeling,    Surface modeling,    FEM (Finite Element Modeling)

Ans:A ,A


. Portrait and Landscape are
Options: a. Page Orientation b. Paper Size c. Page Layout d. All of above

Ans:– A,– A


Metadata enables database designers and users to do all of the following except:
Options: sample data.,    understand what data exist.,    what the fine distinctions are between similar data items.,    what the data mean.

Ans:A ,A


Which of the following data constraints would be used to specify that the value of a cell in one column must be less than the value of a cell in another column in the same row of the same table?
Options: A domain constraint,    A range constraint,    An intrarelation constraint,    An interrelation constraint

Ans:C ,C


In which way(s) can a macro processor for assembly language be implemented?
Options: independent two-pass processor,    independent one-pass processor,    processor incorporated into pass of a standard two-pass assembler,    All of the above

Ans:D ,D


DOS uses letters of the alphabet to designate disk drives. How many disk drives can DOS address (recognize)?
Options: 4,    26,    1,    16

Ans:B ,B


Data security threats include
Options: hardware failure,    privacy invasion,    fraudulent manipulation of data,    All of the above

Ans:B ,B


To add a header or footer to your handout, you can use
Options: a. The title master b. The slide master c. The handout master d. All of above

Ans: – C , – C


The software used to drive microprocessor-based systems is called:
Options: assembly language programs,    firmware,    BASIC interpreter instructions,    flowchart instructions

Ans:A ,A


Which of the following memories needs refresh?
Options: DRAM B. SRAM C. ROM D. All of above

Ans:– A ,


. Which command will you use to display the system date?
Options: a. Date b. Ver c. Dir d. Format

Ans:4 – a ,4 – a


In MS Word, Ctrl+S is for …..
Options: a. Scenarios b. Size c. Save d. Spelling Check

Ans:–  C,–  C


. Which of the following can be use as slide background?
Options: a. Gradient b. Texture c. Picture d. All of the Above

Ans:7 – D ,7 – D


To set up a bulletin board system you need
Options: a smart modem with auto-answer capabilities,    a telephone line,    a personal computer,    All of the above

Ans:D ,D


In which addressing mode the contents of a register specified in the instruction are first decremented, and then these contents are used as the effective address of the operands?
Options: index addressing,    indirect addressing,    auto increment,    auto decrement

Ans:D ,D


Which command is used with vi editor scroll half page backward?
Options: [Control-d],    [Control - u],    [Control-c],    [Control -P]

Ans:B ,B


In LISP, the function (endp <list>)
Options: returns a new list that is equal to <list> by copying the top-level element of <list>,    returns the length of <list>,    returns t if <list> is empty.,    All of the above

Ans:C ,C


. When a picture or other graphic image is placed in the report header section it will appear____
Options: a. Once in the bugging of the report b. At the top of every page c. Every after record break d. On the 1st and last pages of the report

Ans:2 – a ,2 – a


The first mechanical calculator was invented in
Options: 1958,    1647,    1658,    1972

Ans:B ,B


A number which is stored and processed but not in the standard exponential form is called
Options: Floating point number,    Fixed point number,    Octal number,    Decimal number

Ans:B ,B


Which one of the following statements is true for the voltage in a parallel RC circuit?
Options: The voltage always has the same amplitude and phase for every part of the circuit,    The total voltage is equal to the sum of the voltages across the resistance and capacitance,    The total voltage leads the total current by less than 90 degree,    The total voltage is less than the sum of the voltages across the resistance and capacitance

Ans:A ,A


Which of the following keys is used to replace a single character with new text?
Options: S,    s,    r,    C

Ans:B ,B


Which command will show you the IOS version running on your router?
Options: sh IOS,    sh flash,    sh version,    sh running-config

Ans:C ,C


. What was the nick name of the computer used by the Americans in 1952 for their H-bomb project?

Options: A) ENIAC B) EDSAC C) MANIAC D) UNIVAC

Ans:C,C


A Database Management System (DBMS) is
Options: Collection of interrelated data B. Collection of programs to access data C. Collection of data describing one particular enterprise D. All of the above

Ans:– D ,


The type of information most restricted by a poor interface between generalized data base management systems and special computing system languages is
Options: supervisory,    planning,    priority setting,    limitation

Ans:B ,B


The question "what?" can be answered by
Options: survey,    observation,    controlled experiment,    All of the above

Ans:D ,D


A 25-pin female connector on the back of your computer will typically be:
Options: Serial port 1,    A parallel port,    Docking,    COM2 port

Ans:B ,B


A global network of millions of business, government, educational, and research networks; computer systems; database; and end users. Select the best fit for answer:
Options: Internet works,    The Internet,    Internet revolution,    Internet technologies

Ans:B ,B


Which of the following are(is) Language Processor(s)
Options: assembles,    compilers,    interpreters,    All of the above

Ans:D ,D


Point out the error in the program #include<stdio.h> int main() { int i; #if A printf("Enter any number:"); scanf("%d", &i); #elif B printf("The number is odd"); return 0; }
Options: Error: unexpected end of file because there is no matching #endif,    The number is odd,    Garbage values,    None of above

Ans:A ,A


Which of the following is not one of the qualitative characteristics that information must have?
Options: relevance,    retrievability,    timeliness,    accuracy

Ans:E ,E


. Which of the following is not true about Find and Replace in Excel
Options: a.  You can search for bold and replace with italics b.  You can decide whether to look for the whole word or not c.  You can search in formula too d.  You can search by rows or columns or sheets

Ans:– d,– d


Distinguishing between the different levels of management can be accomplished by analyzing,
Options: types of decision made,    frequency with which decisions are made,    time frame considered in making decisions,    types of report information needed to make decisions

Ans:E ,E


The arranging of data in a logical sequence is called:
Options: sorting,    classifying,    reproducing,    summarizing

Ans:A ,A


. Which is true when you insert an excel worksheet into a word document?
Options: a. word is the destination document b. excel is the destination document c. the worksheet is the destination document d. the document is the source document

Ans: –  A , –  A


Which of the following statement is true
Options: a. Reports can be used to retrieve data from tables and calculate b. Queries can be printed in well formatted manner and presented as the information c. Queries can include calculated fields that do not exist in table d. Reports and forms are similar but forms are use to print but reports to display on screen only

Ans:ndash; c,ndash; c


. Which of the following file pattern encompasses the filenames having second character b ?
Options: a. *b??????.txt b. ?b******.txt c. 2b*.txt d. ?b*.txt

Ans:2 – d ,2 – d


To get the Thevenin voltage, you have to
Options: Short the load resistor,    Open the load resister,    Short the voltage source,    Open the voltage source

Ans:A ,A


When connecting a ribbon cable to a connector, how do you know which direction to plug it in?
Options: The red line in the cable goes to the highest pin number,    The colored line in the cable goes to pin #1,    It does not matter,    The blue or red line in the cable goes away from the power connector

Ans:B ,B


Announcement of MIS implementation is made by
Options: operational level managers,    tactical level managers,    the president,    All of the above

Ans:D ,D


. In table design view, which key can be used to switch between the field names and properties panels?
Options: a. F3 b. F4 c. F5 d. F6

Ans:8 – d ,8 – d


Carrier is
Options: One or more conductors that serve as a common connection for a related group of devices,    a continuous frequency capable of being modulated or impressed with a second signal,    the condition when two or more sections attempt to use the same channel at the same time,    a collection of interconnected functional units that provides a data communications service among stations attached to the network

Ans:B ,B


Which of the following is a correct order of precedence in formula calculation?
Options: a. Multiplication and division exponentiation positive and negative values b. Multiplication and division, positive and negative values addition and subtraction c. Addition and subtraction positive and negative values exponentiation d. All of above

Ans:D,All of above


A front-end processor is
Options: a user computer system,    a processor in a large-scale computer that executes operating system instructions,    a minicomputer that relieves main-frame computers at a computer centre of communications control functions,    preliminary processor of batch jobs.

Ans:C ,C


What does protocol defines?
Options: Protocol defines what data is communicated. B. Protocol defines how data is communicated. C. Protocol defines when data is communicated. D. All of above

Ans:– D ,


. When you see a cell with a red triangle in the top right corner, what does this signify?
Options: a. There is an error in the cell b. There is a comment associated with the cell c. The font color for text in the cell is red d. A formula cannot be entered into the cell

Ans:– b,– b


What digits are representative of all binary numbers?
Options: 0,    1,    Both (a) and (b),    3

Ans:C ,C


When new data are to be inserted into a data structure, but there is no available space; this situation is usually called
Options: a. underflow b. overflow c. housefull d. saturated

Ans:- b,- b

www.000webhost.com