0% found this document useful (0 votes)
109 views

Computer-Science-Solved-MCQs (APSET)

The document contains 45 multiple choice questions related to computer terminology and concepts. The questions cover topics such as storage devices, computer components, email, internet, networking, and security. The questions provide answer options but no explanations or context beyond the question.

Uploaded by

rojamani ganta
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
109 views

Computer-Science-Solved-MCQs (APSET)

The document contains 45 multiple choice questions related to computer terminology and concepts. The questions cover topics such as storage devices, computer components, email, internet, networking, and security. The questions provide answer options but no explanations or context beyond the question.

Uploaded by

rojamani ganta
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 24

1.

When you save to this, your data will remain intact even when the computer is turned off-

(A) RAM

(B) Motherboard

(C) Secondary storage device

(D) Primary storage device

(E) None of these

2. A central computer that holds collections of data and programs for many PCs, workstations,
and other computers is a (n)-

Examrac
(A) supercomputer

(B) minicomputer

(C) laptop

e
(D) server

(E) None of these

3. The folder retains copies of messages that you have started but are not yet ready to send.

(A) Drafts

(B) Outbox

(C) Address Book

(D) Sent Items

(E) Inbox

4. Grouping and processing all of a firm's transactions at one time is called-

(A) a database management system

(B) batch processing

(C) a real-time system

(D) an on-line system

(E) None of these

1
5. The enables you to simultaneously keep multiple Web pages open in one browser window.

(A) tab box

2
(B) pop-up helper

(C) tab row

(D) address bar

(E) Esc key

6. Which ports connect special types of music instruments to sound cards?

(A) BUS

(B) CPU

(C) USB

Examrac
(D) MIDI

(E) MINI

7. You can a search by providing more information the search engine can use to select

e
a smaller, more useful set of results.
(A) refine

(B) expand

(C) load

(D) query

(E) slowdown

8. What is the permanent memory built into your computer called?

(A) RAM

(B) Floppy

(C) CPU

(D) CD-ROM

(E) ROM

9. What displays the contents of the active cell in Excel?

(A) Namebox

3
(B) RowHeadings

(C) Formulabar

4
(D) Taskpane

(E) None of these

10. The piece of hardware that converts your computer's digital signal to an analog signal that
can travel over telephone lines is called a-
(A) red wire

(B) blue cord

(C) tower

(D) modem

Examrac
(E) None of these

11. Computer uses the number system to store data and perform calculations.

(A) binary

e
(B) octal

(C) decimal

(D) hexadecimal

(E) None of these

12. A disk's content that is recorded at the time of manufacture and that cannot be changed
or erased by the user is-
(A) Memory-only

(B) Write-only

(C) Once-only

(D) Run-only

(E) Read-only

13. Which of the following can be used to select the entire document?

(A) CTRL+A

(B) ALT+F5

(C) SHIFT +A

5
(D) CTRL+K

6
(E) CTRL+H

14. are attempts by individuals to obtain confidential information from you by


falsifying their identity.
(A) Phishing

(B) Computer viruses

(C) Spyware scams

(D) Viruses

(E) None of the above

Examrac
15. Part number, part description, and number of parts ordered are examples of-

(A) control

(B) output

e
(C) processing

(D) feedback

(E) input

16. A Web site's main page is called its-

(A) Home Page

(B) Browser Page

(C) Search Page

(D) Bookmark

(E) None of these

17. The simultaneous processing of two or more programs by multiple processors is-

(A) multiprogramming

(B) multitasking

(C) time-sharing

(D) multiprocessing

7
(E) None of these

18. Codes consisting of lines of varying widths or lengths that are computer-readable are known as-

8
(A) an ASCII code

(B) a magnetic tape

(C) an OCR scanner

(D) a bar code

(E) None of these

19. To instruct Word to fit the width of a column to the contents of a table automatically, click the
button and then point to AutoFit Contents.

(A) Fit to Form

Examrac
(B) Format

(C) Autosize

(D) Contents

e
(E) AutoFit

20. Why is it unethical to share copyrighted files with your friends?

(A) It is not unethical, because it is legal.

(B) It is unethical because the files are being given for free.

(C) Sharing copyrighted files without permission breaks copyright laws.

(D) It is not unethical because the files are being given for free.

(E) It is not unethical-anyone can access a computer

21. Hackers

(A) all have the same motive

(B) are people who maintain computers

(C) may legally break into computers as long as they do not do any damage

(D) are people who are allergic to computers

(E) break into other people's computers

22. Unauthorised copying of software to be used for personal gain instead of for personal backups
9
is called

(A) program thievery

10
(B) data snatching

(C) software piracy

(D) program looting

(E) data looting

23. Junk e-mail is also called

(A) spam

(B) spoof

(C) cookie crumb

Examrac
(D) sniffer script

(E) spill

24. What is usually used for displaying information at public places?

e
(A) Monitors

(B) Overhead Projections

(C) Monitors and Overhead Projections

(D) Touch Screen Kiosks

(E) Loud Speakers

25. What is MP3?

(A) A Mouse

(B) A Printer

(C) A Sound format

(D) A Scanner

(E) A Mobile Phone

26. What is the most popular hardware for multimedia creations?

(A) PCs

11
(B) Minicomputers

(C) Mainframe Computers

12
(D) WANs

(E) Super Computers

27. Which of the following is needed for sound recording?

(A) Speaker

(B) Microphone

(C) Talker

(D) Mouse

(E) Telephone

Examrac
28. The life span of a CD-ROM is

(A) approximately one year

(B) approximately two years

e
(C) approximately five years

(D) approximately twenty-five years

(E) almost unlimited

29. The settings are automatic and standard.

(A) default

(B) CPU

(C) peripheral

(D) user-friendly

(E) defaulter

30. What are the two parts of an e-mail address?

(A) User name and street address

(B) Legal name and phone number

(C) User name and domain name

(D) Initials and password

13
(E) User name and recipient name

31. If you wish to extend the length of the network without having the signal degrade, you
would use a

(A) resonance

(B) router

(C) gateway

(D) switch

(E) repeater

32. A repair for a known software bug, usually available at no charge on the internet, is called

Examrac
(A) version

(B) patch

(C) tutorial

e
(D) FAQ

(E) rectifier

33. URL stands for

(A) Universal Research List

(B) Universal Resource List

(C) Uniform Research Lis

(D) Uniform Research Locator

(E) Uniform Resource Locator

34. When data changes in multiple lists and all lists are not updated, this causes

(A) data redundancy

(B) information overload

(C) duplicate data

(D) data inconsistency

(E) data repetition


14
35. What is a backup?

(A) Restoring the information backup

(B) An exact copy of a system's information

(C) The ability to get a . system up and running in the event of a system crash or failure

(D) All of these

(E) None of these

36. The Internet is

(A) a large network of networks

(B) an internal communication system for a business

(C) a communication system for the Indian government

Examrac
(D) a communication system for some states of India

(E) a communication system for some cities of India

37. Computers that are portable and convenient for users who travel are known as

e
(A) supercomputers

(B) planners

(C) minicomputers

(D) file servers

(E) laptops

38. What is the storage area for e-mail messages called?

(A) A folder

(B) A mail box

(C) A directory

(D) The hard disk

(E) None of these

39. One advantage of dial-up Internet access is that


15
(A) it utilises broadband technology

(B) it is Indian

(C) it uses a router for security

(D) modem speeds are very fast

(E) it utilises existing telephone service

40. What is the process of copying software programs from secondary storage media to the
hard disk called?
(A) Configuration

(B) Download

(C) Storage

(D) Upload

Examrac
(E) Installation

41. When the pointer is positioned on a , it is shaped like a hand.

(A) grammar error

e
(B) Formatting error

(C) Screen Tip

(D) Spelling error

(E) hyperlink

42. Personal computers can be connected together to form a-

(A) server

(B) supercomputer

(C) network

(D) enterprise

(E) None of these

43. A is the term used when a search engine returns a Web page that matches the
search criteria.
(A) blog
16
(B) hit

(C) link

(D) view

(E) success

44. are words that a programming language has set aside for its own use.

(A) Control words

(B) Control structures

(C) Reserved words

(D) Reserved keys

(E) None of these

45. Mobile Commerce is best described as-

Examrac
(A) The use of Kiosks in marketing

(B) Transporting products

(C) Buying and selling goods/ services through wireless hand- held devices

e
(D) Using notebook PC's in marketing

(E) None of the above

46 Which of the following controls the manner of interaction between the user and the operating
system?
(A) Language translator

(B) Platform

(C) User interface

(D) Icon

(E) None of these

47 You can keep your personal files/folders in

(A) My Folder

(B) My Documents
17
(C) My Files

(D) My Text

(E) My Collection

48 Three types of compact disks include CD-ROM, CD-R, and

(A) CD-W

(B) CD-RAM

(C) CD-DVD

(D) CD-RW

(E) None of these

49 All computers must have

(A) a word processing software

(B) an operating system

Examrac
(C) an attached printer

(D) a virus checking program

(E) None of these

e
50 Collecting personal information and effectively posing as another individual is known as

(A) spooling

(B) spoofing

(C) hacking

(D) identity theft

(E) None of these

18
ANSWER SHEET
1 (C) 26 (A)
2 (D) 27 (B)
3 (B) 28 (C)
4 (B) 29 (A)
5 (C) 30 (C)
6 (C) 31 (E)
7 (A) 32 (B)
8 (E) 33 (E)
9 (A) 34 (D)
10 (D) 35 (D)

Examrac
11 (A) 36 (A)
12 (E) 37 (E)
13 (A) 38 (B)
14 (A) 39 (E)
15 (E) 40 (E)

e
16 (A) 41 (E)
17 (D) 42 (C)
18 (D) 43 (E)
19 (E) 44 (C)
20 (C) 45 (C)
21 (E) 46 (C)
22 (C) 47 (B)
23 (A) 48 (D)
24 (C) 49 (B)
25 (C) 50 (B)

19
12/19/23, 8:28 AM Operating System Official Questions: Mock Test: Answers, Solutions, & Explanations at Exampyq.Com & Doorsteptutor.Co…

Examrace: Downloaded from examrace.com


[https://www.examrace.com/] For solved question bank visit
doorsteptutor.com [https://www.doorsteptutor.com] and for free video
lectures visit Examrace YouTube Channel
[https://youtube.com/c/Examrace/]
Operating System Official Questions: Mock Test: Answers,
Solutions, & Explanations at ExamPYQ. Com &
DoorstepTutor. Com
Get top class preparation for competitive exams right from your home:
- for all subjects
of your exam.

Q 1. measure is the time from the submission of a request until the first output is produced.
a. Response time
b. Throughput
c. Waiting time
d. Turnaround time
Q 2. Which of the following is not a valid process state?
a. Ready
b. Hold
c. New
d. Running

Q 3. A state is known as , if the system allocates resources to each process and still avoids a
deadlock.
a. Safe
b. Protected
c. Unsafe
d. Locked

Q 4. is a situation in which processes wait indefinitely within the semaphore.


a. Locking
b. Critical section
c. Starvation
d. Definite waiting

Q 5. A process is a program that performs of execution.


a. At least four threads
b. Single thread

1 of 5
12/19/23, 8:28 AM Operating System Official Questions: Mock Test: Answers, Solutions, & Explanations at Exampyq.Com & Doorsteptutor.Co…

c. Parallel threads
d. Multiple threads

Q 6. In a file system, a (n) defines a path from the current directory.


a. Root directory
b. Relative path name
c. Virtual path name
d. Absolute path name
Q 7.
Consider the following set of processes and the length of the CPU burst given in ms. What is the average
waiting time using priority scheduling?

Process Burst-time Priority

P1 10 3

P2 1 1

P3 2 4

P4 1 5

P5 5 2
Table Supporting: Operating System Official Questions: Mock Test: Answers, Solutions, & Explanations at ExamPYQ. Com
&
DoorstepTutor. Com
a. 7.2 ms
b. 8.2 ms
c. 5.2 ms
d. 10 ms

Q 8. Details about each process is stored in a data structure called:


a. Process Control Block
b. Stack
c. Program counter
d. Heap

Q 9. Which of the following is a technique of gradually increasing the priority of processes that wait in
the system for a long time?
a. Scheduling
b. Aging
c. Dispatch latency

2 of 5
d. Starvati
on

Q 10.
How many page faults will occur if FIFO Page replacement algorithm is used for the following
reference string with three-page frames?
7, 0, 1, 2, 0, 3, 0, 4, 2, 3, 0, 3, 2, 1, 2, 0, 1,7, 0,1
a. 17
b. 14
c. 16
d. 15

Q 11. Which of the following conditions need to be held simultaneously for deadlock occurrences
a. Mutual Exclusion, Hold and Wait, No Preemption, and Circular Wait
b. Hold and Wait, No Preemption, and Circular Wait
c. Mutual Exclusion, No Preemption, and Circular Wait
d. Mutual Exclusion, Hold and Wait, and No Preemption

Q 12. One of the Scheduling method is also known as Shortest-next-CPU-burst algorithm, because
scheduling through this method depends on the length of the next CPU burst of a process rather than
its total length. Which of the following scheduling method is being discussed here?
a. SJF Scheduling
b. FCFS Scheduling
c. Round Robin Scheduling
d. Multilevel-queue
Scheduling

Q 13.
How many page faults will occur if Optimal Page replacement algorithm is used for the following
reference string with three page frames?
7, 0, 1, 2, 0, 3, 0, 4, 2, 3, 0, 3, 2, 1, 2, 0, 1,7, 0,1
a. 10
b. 7
c. 9
d. 8

Q
14.
Which of the following process of an operating system is shown in this figure?
a. Fundamental state transition
b. Scheduling of kernel level threads
c. Event handling action of kernel
d. Scheduling of user level threads

Q 15. An address generated by the CPU is known as address, and an address seen by
the memory unit is referred as address,
a. Physical, Logical
b. Logical, Virtual
c. Virtual, Logical
d. Logical, hysical

Q 16.
Consider the following statements regarding interrupts.
(I) If a process is interrupted during system call handling then the OS will crash.
(II) If a process is interrupted during system call handling then the process is moved to the
READY queue.
(III) If an interrupt handler is interrupted, the OS will crash.
While of the above statements are true?
a. None of the above
b. I and II
c. III only
d. II and III

Q 17. A is a program in execution.


a. Process
b. Stack
c. Program counter
d. Heap

Q 18. is generated when it is known at compile time that where the process resides in
memory.
a. Virtual code
b. Locatable code
c. Absolute code
d. Relocatable code

Q 19. semaphores are also known as locks, as they are locks that provide
mutual exclusion.
a. Counting, Shared
b. Counting, Mutex
c. Binary, Mutex
d. Binary, Shared

Q 20. The number of processes that are completed by a system per time unit, is called
.
a. Process output
b. Turnaround time
c. Throughput
d. Response time

You might also like