TRB CS Syllabus
TRB CS Syllabus
TRB CS Syllabus
1. The part of machine level instruction, which tells the central processor what has to be done, is
A. Operation code
B. Address
C. Locator
D. Flip-Flop
Answer: Option A
Explanation:
Answer: Option C
Explanation:
A. 8
B. 1
C. 16
D. 0
Answer: Option B
Explanation:
4. A system program that combines the separately compiled modules of a program into a form suitable for execution
A. assembler
B. linking loader
C. cross compiler
D. load and go
Answer: Option B
Explanation:
5. Process is
A. program in High level language kept on disk
C. a program in execution
6. Addressing structure
performs indicated operations on two fast registers of the machine and leave the
C.
result in one of the registers.
Answer: Option A
Explanation:
C. contains the address of the memory location that is to be read from or stored into.
contains a copy of the designated memory location specified by the MAR after a
D.
"read" or the new contents of the memory prior to a "write".
Answer: Option D
Explanation:
8. The strategy of allowing processes that are logically runnable to be temporarily suspended
is called
A. preemptive scheduling
Answer: Option A
Explanation:
which perform indicated operations on two fast registers of the machine and have
C.
the result in one of the registers
Answer: Option A
Explanation:
B. Utility program
C. Networking software
D. Documentation system
Answer: Option B
Explanation:
12. Fork is
Answer: Option C
Explanation:
13. Thrashing
A. is a natural consequence of virtual memory systems
Answer: Option D
Explanation:
A. never used
Answer: Option D
Explanation:
15. Which of the following instruction steps, would be written within the diamond-shaped box,
of a flowchart?
A. S=B-C
B. IS A<10
C. PRINT A
D. DATA X,4Z
the technique of storage compaction involves moving all occupied areas of storage
A.
to one end or other of main storage
Answer: Option B
Explanation:
C. is never necessary,
Answer: Option D
Explanation:
allocate space in memory for the programs and resolve symbolic references
A.
between object decks
Answer: Option D
Explanation:
B. easy to develop
Answer: Option D
Explanation:
20. Which of the following addressing modes, facilitates access to an operand whose location
is defined relative to the beginning of the data structure in which it appears?
A. ascending
B. sorting
C. index
D. indirect
B. DISKCOPY
C. CHKDSK
D. TYPE
Answer: Option B
Explanation:
22. Memory
C. is a sequence of instructions
Answer: Option B
Explanation:
B. HIPO-DIAGRAMS
C. Nassi-Shneiderman diagram
Answer: Option C
Explanation:
24. A system program that sets up an executable program in main memory ready for
execution is
A. assembler
B. linker
C. loader
D. compiler
Answer: Option C
Explanation:
25. Which of the following are loaded into main memory when the computer is booted?
A. internal command instructions
C. utility programs
C. execute first the job that has been in the queue the longest
Answer: Option B
Explanation:
27. What is the name given to the organized collection of software that controls the overall
operation of a computer?
A. Working system
B. Peripheral system
C. Operating system
D. Controlling system
Answer: Option C
Explanation:
A. reenterable
B. non reusable
C. virtual memory
D. cache memory
Answer: Option D
Explanation:
29. The register or main memory location which contains the effective address of the operand
is known as
A. pointer
B. indexed register
C. special location
D. scratch pad
Answer: Option A
Explanation:
a permanent table of decision rules in the form of patterns for matching with the
B.
uniform symbol table to discover syntactic structure.
consists of a full or partial list or the token's as they appear in the program.
C.
Created by Lexical analysis and used for syntax analysis and interpretation.
a permanent table which lists all key words and special symbols of the language in
D.
symbolic form.
Answer: Option A
Explanation:
31. Thrashing can be avoided if
A. the pages, belonging to the working set of the programs, are in main memory
Answer: Option A
Explanation:
32. In analyzing the compilation of PL/I program, the term "Lexical analysis" is associated with
Answer: Option B
Explanation:
B. Loader
C. Compiler
D. Assembler
Answer: Option A
Explanation:
Answer: Option C
Explanation:
C. contains the address of the memory location that is to be read from or stored into.
contains a copy of the designated memory location specified by the MAR after a
D.
"read" or the new contents of the memory prior to a "write".
Answer: Option A
Explanation:
Answer: Option C
Explanation:
cannot be made to execute in any area of storage other than the one designated
A.
for it at the time of its coding or translation.
Answer: Option A
Explanation:
B. compilers
C. interpreters
Answer: Option D
Explanation:
40. In which addressing mode the effective address of the operand is the contents of a
register specified in the instruction and after accessing the operand, the contents of this
register is incremented to point to the next item in the list?
A. index addressing
B. indirect addressing
C. auto increment
D. auto decrement
Answer: Option C
Explanation:
41. The memory allocation scheme subject to "external" fragmentation is
A. segmentation
B. swapping
Answer: Option A
Explanation:
42. While working with MS-DOS, which command will you use to transfer a specific file from
one disk to another?
A. DISKCOPY
B. COPY
C. RENAME
D. FORMAT
Answer: Option B
Explanation:
43. What is the name of the operating system for the laptop computer called MacLite?
A. Windows
B. DOS
C. MS-DOS
D. OZ
Answer: Option D
Explanation:
44. In which addressing mode the contents of a register specified in the instruction are first
decremented, and then these contents are used as the effective address of the operands?
A. index addressing
B. indirect addressing
C. auto increment
D. auto decrement
Answer: Option D
Explanation:
45. What is the name given to the values that are automatically provided by software to
reduce keystrokes and improve a computer user's productivity?
A. Defined values
B. Fixed values
C. Default values
D. Special values
Answer: Option C
Explanation:
46. Page stealing
Answer: Option B
Explanation:
47. In MS-DOS 5.0, which is the number that acts as a code to uniquely identify the software
product?
A. MS
B. DOS
C. MS DOS
D. 5.0
Answer: Option D
Explanation:
Answer: Option A
Explanation:
Answer: Option D
Explanation:
A. 8
B. 1
C. 16
D. 0
Answer: Option B
Explanation:
which perform indicated operations on two fast registers of the machine and leave
C.
the result in one of the registers.
Answer: Option C
Explanation:
3. A page fault
Answer: Option C
Explanation:
C. A branch of mathematics
Answer: Option B
Explanation:
5. The process of transferring data intended for a peripheral device into a disk (or
intermediate store) so that it can be transferred to peripheral at a more convenient time
or in bulk, is known as
A. multiprogramming
B. spooling
C. caching
D. virtual programming
Answer: Option B
Explanation:
6. Block caches or buffer caches are used
A. to improve disk performance
B. to handle interrupts
Answer: Option A
Explanation:
a large page size causes instructions and data that will not be referenced brought
C.
into primary storage
Answer: Option B
Explanation:
8. The action of parsing the source program into the proper syntactic classes is known as
A. syntax analysis
B. lexical analysis
C. interpretation analysis
Answer: Option B
Explanation:
9. Which, of the following is not true about the description of a decision table?
Answer: Option B
Explanation:
Answer: Option A
Explanation:
11. When did IBM release the first version of disk operating system DOS version 1.0?
A. 1981
B. 1982
C. 1983
D. 1984
Answer: Option A
Explanation:
12. Which of the following is false about disk when compared to main memory?
A. non-volatile
D. faster
Answer: Option D
Explanation:
A. semaphores
B. event counters
C. monitors
Answer: Option D
Explanation:
14. Most of the microcomputer's operating systems like Apple DOS, MS DOS and PC DOS etc.
are called disk operating systems because
A. they are memory resident
Answer: Option B
Explanation:
B. hands over control of address bus and data bus to the interrupting device
branches off to the interrupt service routine after completion of the current
D.
instruction
Answer: Option D
Explanation:
6. Seeks analysis
A. is used for analyzing paging problems
Answer: Option B
Explanation:
A. Literal Table
B. Identifier Table
C. Terminal Table
D. Source code
Answer: Option C
Explanation:
18. What is the name of the technique in which the operating system of a computer executes
several programs concurrently by switching back and forth between them?
A. Partitioning
B. Multitasking
C. Windowing
D. Paging
Answer: Option B
Explanation:
Answer: Option B
Explanation:
20. Software that measures, monitors, analyzes, and controls real-world events is called:
A. system software
B. real-time software
C. scientific software
D. business software
Answer: Option B
Explanation:
21. The details of all external symbols and relocation formation (relocation list or map) is
provided to linker by
A. Macro processor
B. Translator
C. Loader
D. Editor
Answer: Option B
Explanation:
Answer: Option D
Explanation:
23. A development strategy whereby the executive control modules of a system are coded and
tested first, is known as
A. Bottom-up development
B. Top-down development
C. Left-Right development
Answer: Option B
Explanation:
24. Which of the following is helpful in evaluating applications software what will best suit your
needs?
A. recommendations by other users
B. computer magazines
Answer: Option D
Explanation:
A. mutual exclusion
B. deadlock recovery
C. deadlock avoidance
D. cache coherence
Answer: Option C
Explanation:
The Banker's algorithm is a resource allocation & deadlock avoidance algorithm developed
by Edsger Dijkstra that tests for safety by simulating the allocation of pre-determined
maximum possible amounts of all resources, and then makes a "safe-state" check to test
for possible deadlock conditions for all other pending activities, before deciding whether
allocation should be allowed to continue.
26. The dispatcher
A. actually schedules the tasks into the processor
Answer: Option A
Explanation:
27. System programs such as Compilers are designed so that they are
A. reenterable
B. non reusable
C. serially usable
D. recursive
Answer: Option A
Explanation:
28. IBM released its first PC in 1981. Can you name the operating system which was most
popular at that time?
A. MS-DOS
B. PC-DOS
C. OS/360
D. CP/M
Answer: Option D
Explanation:
29. If the number of bits in a virtual address of a program is 12 and the page size is 0.5 K
bytes, the number of pages in the virtual address space is
A. 16
B. 32
C. 64
D. 128
Answer: Option D
Explanation:
30. Which table is a permanent database that has an entry for each terminal symbol.
A. Terminal table
B. Literal table
C. Identifier table
D. Reductions
to recognize the major constructs of the language and to call the appropriate
A. action routines that will generate the intermediate form or matrix for these
constructs.
D. to parse the source program into the basic elements or tokens of the language.
Answer: Option A
Explanation:
32. Swapping
A. works best with many small partitions
Answer: Option C
Explanation:
33. A disk scheduling algorithm in an operating system causes the disk arm to move back and
forth across the disk surface in order to service all requests in its path. This is a
C. Scan
D. FIFO
Answer: Option C
Explanation:
B. a system software
C. a hardware component
Answer: Option B
Explanation:
Answer: Option B
Explanation:
36. What is the name given to the process of initializing a microcomputer with its operating
system?
A. Cold booting
B. Booting
C. Warm booting
D. Boot recording
Answer: Option B
Explanation:
to assign storage to all temporary locations that are necessary for intermediate
B.
results.
to assign storage to literals, and to ensure that the storage is allocate and
C.
appropriate locations are initialized.
Answer: Option D
Explanation:
38. A Processor
is a device that performs a sequence of operations specified by instructions in
A.
memory.
C. is a sequence of instructions
Answer: Option A
Explanation:
39. With MS-DOS which command will divide the surface of the blank floppy disk into sectors
and assign a unique address to each one?
A. FORMAT command
B. FAT command
C. VER command
D. CHKDSK command
Answer: Option A
Explanation:
40. Multiprogramming
is a method of memory allocation by which the program is subdivided into equal
A.
portions, or pages and core is subdivided into equal portions or blocks.
Answer: Option D
Explanation:
41. A translator which reads an entire programme written in a high level language and
converts it into machine language code is:
A. assembler
B. translator
C. compiler
D. system software
Answer: Option C
Explanation:
Answer: Option D
Explanation:
performs indicated operations on two fast registers of the machine and leave the
C.
result in one of the registers.
Answer: Option B
Explanation:
44. In which way(s) a macro processor for assembly language can be implemented:
A. independent two-pass processor
Answer: Option D
Explanation:
A. MS-DOS
B. PC-DOS
C. Unix
Answer: Option D
Explanation:
« Prev 12345678910Next »
46. The working set theory of programming behaviour of processes running within an
operating system involves
A. the collection of pages that a process accesses
Answer: Option A
Explanation:
Answer: Option C
Explanation:
Answer: Option D
Explanation:
49. What is the name given to the software which can be legally compiled and often used for
free?
A. Shareware program
C. Firmware program
D. Mindware
Answer: Option B
Explanation:
Answer: Option D
Explanation:
1. In which of the storage placement strategies a program is placed in the largest available
hole in the main memory?
A. best fit
B. first fit
C. worst fit
D. buddy
Answer: Option C
Explanation:
B. printer
C. terminals
D. disk
Answer: Option D
Explanation:
A. program structure
B. program size
C. primary-storage size
Answer: Option A
Explanation:
4. Which of the following software types is used to simplify using systems software?
A. spreadsheet
B. operating environment
C. timesharing
D. multitasking
Answer: Option C
Explanation:
Answer: Option D
Explanation:
6. Which of the following is not true about the memory management?
A. virtual memory is used only in multi-user systems
Answer: Option A
Explanation:
A. Read the input from the slow-speed card reader to the high-speed magnetic disk
B. Specify, to the operating system, the beginning and end of a job in a batch
Answer: Option B
Explanation:
8. Paging
is a method of memory allocation by which the program is subdivided into equal
A.
portions, or pages and core is subdivided into equal portions or blocks.
Answer: Option A
Explanation:
Answer: Option B
Explanation:
C. allows multiple programs to reside in separate areas of core at the same time.
Answer: Option A
Explanation:
11. Scheduling is
Answer: Option A
Explanation:
Answer: Option C
Explanation:
13. What scheduling algorithm allows processes that are logical runnable to be temporarily
suspended?
A. preemptive scheduling
B. non-preemptive scheduling
C. FIFO
D. FCFS
Answer: Option A
Explanation:
B. Allocation
C. Linking
D. Loading
Answer: Option D
Explanation:
15. The computational technique used to compute the disk storage address of individual
records is called:
A. bubble memory
B. key fielding
C. dynamic reallocation
D. hashing
Answer: Option D
Explanation:
16. For how many processes which are sharing common data, the Dekker's algorithm
implements mutual exclusion?
A. 1
B. 2
C. 3
D. 4
Answer: Option C
Explanation:
17. The file structure that redefines its first record at a base of zero uses the term:
A. relative organization
B. key fielding
C. dynamic reallocation
D. hashing
Answer: Option A
Explanation:
18. What is the name given to all the programs inside the computer with makes it usable?
A. Application software
B. System software
C. Firm ware
D. Shareware
Answer: Option B
Explanation:
19. Semaphores
Answer: Option A
Explanation:
20. The advantage(s) of incorporating the macro processor into pass 1 is(are):
A. many functions do not have to be implemented twice.
more flexibility is available to the programmer in that he may use all the features
C.
of the assembler in conjunction with macros.
Answer: Option D
Explanation:
21. In analyzing the compilation of PL/I program, the description "creation of more optimal
matrix" is associated with
B. Code generation
C. Syntax analysis
Answer: Option D
Explanation:
Answer: Option D
Explanation:
the language which communicates with the computer using only the binary digits
D.
1 and 0.
Answer: Option D
Explanation:
B. Spreadsheet
C. UNIX
D. Desktop publishing
Answer: Option C
Explanation:
D. no data to be displayed
Answer: Option A
Explanation:
26. A relocate program form is one which
cannot be made to execute in any area of storage other than the one designated
A.
for it at the time of its coding or translation.
Answer: Option B
Explanation:
27. If you want to execute more than one program at a time, the systems software you are
using must be capable of:
A. word processing
B. virtual memory
C. compiling
D. multitasking
Answer: Option D
Explanation:
28. In analyzing the compilation of PL/I program, the description "resolving symbolic address
(labels) and generating machine language" is associated with
A. Assembly and output
B. Code generation
C. Storage assignment
D. Syntax analysis
Answer: Option A
Explanation:
Answer: Option C
Explanation:
30. What is the name of the system which deals with the running of the actual computer and
not with the programming problems?
A. Operating system
B. Systems program
C. Object program
D. Source program
Answer: Option B
Explanation:
A. 8
B. 1
C. 16
D. 0
Answer: Option B
Explanation:
32. Four necessary conditions for deadlock to exist are: mutual exclusion, no-preemption,
circular wait and
A. hold and wait
B. deadlock avoidance
D. buffer overflow
Answer: Option A
Explanation:
33. If you do not know which version of MS-DOS you are working with, which command will
you use after having booted your operating system?
A. FORMAT command
B. DIR command
C. VER command
D. DISK command
Answer: Option C
Explanation:
Answer: Option A
Explanation:
A. A data file
B. A directory
Answer: Option C
Explanation:
36. The main function of the dispatcher (the portion of the process scheduler) is
A. swapping a process to the disk
Answer: Option B
Explanation:
37. The errors that can be pointed out by the compiler are
A. Syntax errors
B. Semantic errors
C. Logical errors
D. Internal errors
Answer: Option A
Explanation:
38. When a computer is first turned on or restarted, a special type of absolute loader is
executed, called a
A. "Compile and Go" loader
B. Boot loader
C. Bootstrap loader
D. Relating loader
Answer: Option C
Explanation:
39. Which, of the following checks, cannot be carried out on the input data to a system?
A. consistency check
B. Syntax check
C. Range check
Answer: Option B
Explanation:
40. A program that converts a high-level language program to a set of instructions that can
run on a computer is called a
A. Compiler
B. Debugger
C. Editor
Answer: Option A
Explanation:
41. Which of the following is characteristic of an operating system?
A. resource management
B. error recovery
C. memory management
Answer: Option D
Explanation:
42. In MS-DOS, relocatable object files and load modules have extensions
A. .OBJ and .COM or .EXE, respectively
Answer: Option A
Explanation:
43. The state transition initiated by the user process itself in an operating system is
A. block
B. dispatch
C. wake up
Answer: Option A
Explanation:
B. Editor
C. Spooler
Answer: Option C
Explanation:
to provide complete file naming freedom to the users and to permit controlled
A.
sharing of files
to provide for long and short term storage of files with appropriate economic
B.
tradeoffs.
Answer: Option D
Explanation:
46. A public key encryption system
A. allows anyone to decode the transmission
Answer: Option C
Explanation:
Answer: Option B
Explanation:
48. In which addressing mode the operand is given explicitly in the instruction?
A. absolute mode
B. immediate mode
C. indirect mode
D. index mode
Answer: Option B
Explanation:
49. The technique, for sharing the time of a computer among several jobs. Which switches
jobs so rapidly such that each job appears to have the computer to itself:
A. time sharing
B. time out
C. time domain
D. FIFO
Answer: Option A
Explanation:
1. Capacity planning
A. requires detailed system performance information
Answer: Option B
Explanation:
A. Processor busy
Answer: Option D
Explanation:
3. Link encryption
A. is more secure than end-to-end encryption
Answer: Option B
Explanation:
4. A form of code that uses more than one process and processor, possibly of different type,
and that may on occasions have more than one process or processor active at the same
time, is known as
A. multiprogramming
B. multi threading
C. broadcasting
D. time sharing
Answer: Option B
Explanation:
5. The table created by lexical analysis to describe all literals used in the source program, is
A. Terminal table
B. Literal table
C. Identifier table
D. Reductions
Answer: Option B
Explanation:
6. The term 'polling' in a computer means a process by which a computer system
A. detects/corrects errors
Answer: Option D
Explanation:
7. In which addressing mode, the address of the location of the operand is given explicitly as
a part of the instruction.
A. absolute mode
B. immediate mode
C. index mode
D. modulus mode
Answer: Option A
Explanation:
Answer: Option C
Explanation:
C. allows multiple programs to reside in separate areas of core at the same time.
Answer: Option B
Explanation:
Answer: Option D
Explanation:
11. A relationship between processes such that each has some part (critical section) which
must not be executed while the critical section of another is being executed, is known as
A. semaphore
B. mutual exclusion
C. multiprogramming
D. multitasking
Answer: Option B
Explanation:
12. What is the name of the operating system which was originally designed by scientists and
engineers for use by scientists and engineers?
A. XENIX
B. UNIX
C. OS/2
D. MS DOS
Answer: Option B
Explanation:
B. depending on passwords
Answer: Option A
Explanation:
a permanent table of decision rules in the form of patterns for matching with the
B.
uniform symbol table to discover syntactic structure.
consists of a full or partial list of the token's as they appear in the program.
C.
Created by Lexical analysis and used for syntax analysis and interpretation
a permanent table which lists all key words and special symbols of the language in
D.
symbolic form.
Answer: Option D
Explanation:
B. to handle interrupts
Answer: Option A
Explanation:
16. The practice of "bundling" refers to
Answer: Option D
Explanation:
B. Spooler
C. Interpreter
D. Linkage editor
Answer: Option B
Explanation:
18. All the time a computer is switched on, its operating system software has to stay in
A. main storage
B. primary storage
C. floppy disk
D. disk drive
Answer: Option B
Explanation:
19. Can you name of the major Operating System used in computers?
A. MS DOS
B. OS/2
C. UNIX
Answer: Option D
Explanation:
A. increased throughput
Answer: Option C
Explanation:
Answer: Option B
Explanation:
22. In a magnetic disk, data is recorded in a set of concentric tracks which are subdivided into
A. periods
B. sectors
C. zones
D. groups
Answer: Option B
Explanation:
23. The total time to prepare a disk drive mechanism for a block of data to be read from it is
A. latency
Answer: Option C
Explanation:
24. Part of a program where the shared memory is accessed and which should be executed
invisibly, is called
A. semaphores
B. directory
C. critical section
D. mutual exclusion
Answer: Option C
Explanation:
25. Indicate which, of the following, is not true about Nassi-Shneiderman charts
A. These charts are type of graphical design tool
Answer: Option B
Explanation:
26. What is the name of the operating system that reads and reacts in terms of actual time.
A. Batch system
Answer: Option C
Explanation:
Answer: Option D
Explanation:
28. The powerful text editor called PC-Write can be used by anybody by paying a small fee.
Such programs are called
A. Software
B. Shareware
C. Firmware
D. Mindware
Answer: Option B
Explanation:
Answer: Option D
Explanation:
30. The operating system of a computer serves as a software interface between the user and
A. hardware
B. peripheral
C. memory
D. screen
Answer: Option A
Explanation: