MCQOPTIONS
Saved Bookmarks
This section includes 391 Mcqs, each offering curated multiple-choice questions to sharpen your C Programming knowledge and support exam preparation. Choose a topic below to get started.
| 251. |
In daisy chaining device 0 will pass the signal only if it has.. |
| A. | Interrupt request |
| B. | No interrupt request |
| C. | Both a and b |
| D. | None of the above |
| Answer» C. Both a and b | |
| 252. |
The average time required to reach a storage location in memory and obtain its contents is called the |
| A. | seek time |
| B. | turnaround time |
| C. | access time |
| D. | transfer time |
| Answer» D. transfer time | |
| 253. |
Which interrupt is unmaskable…?? |
| A. | RST 5.5 |
| B. | RST 7.5 |
| C. | TRAP |
| D. | Both a and b |
| Answer» D. Both a and b | |
| 254. |
The average time for reading/writing the 512-byte sector for the disk rotating at 10,000 RPM when its time is 6 ms, its transfer rate is 50 MB/sec, and its controller overhead is 0.2 ms |
| A. | 2ms |
| B. | 3.3ms |
| C. | 4.7ms |
| D. | 5ms |
| Answer» D. 5ms | |
| 255. |
The peak rate which transfer data between the I/O device and the main-memory, is known as |
| A. | Bit rate |
| B. | Data rate |
| C. | Hit time |
| D. | Hit miss |
| Answer» C. Hit time | |
| 256. |
A scheme in which portions of the I/O address space are given to I/O devices, is called |
| A. | Data mapped |
| B. | Memory-mapped I/O |
| C. | Backplane |
| D. | both a and b |
| Answer» C. Backplane | |
| 257. |
The data transfer rate is given by the formula |
| A. | Transfer size- transfer time |
| B. | Transfer size transfer time |
| C. | Transfer size+transfer time |
| D. | Transfer size*transfer time |
| Answer» C. Transfer size+transfer time | |
| 258. |
The higher availability cost is reduced to 1/N, where N is the |
| A. | No of disks |
| B. | Reliability |
| C. | Seek |
| D. | Bit rate |
| Answer» B. Reliability | |
| 259. |
DMA interface unit eliminates the need to use CPU registers to transfer data from |
| A. | MAR to MBR |
| B. | MBR to MAR |
| C. | I/O units to memory |
| D. | Memory to I/O units |
| Answer» E. | |
| 260. |
_________ method is used to establish priority by serially connecting all devices that request an interrupt. |
| A. | Vectored-interrupting |
| B. | Daisy chain |
| C. | Priority |
| D. | Polling |
| Answer» C. Priority | |
| 261. |
The resistor which is attached to the service line is called _____. |
| A. | Push-down resistor |
| B. | Pull-up resistor |
| C. | Break down resistor |
| D. | Line resistor |
| Answer» C. Break down resistor | |
| 262. |
______ type circuits are generally used for interrupt service linesi) open-collectorii) open-drainiii) XORiv) XNOR |
| A. | i,ii |
| B. | ii |
| C. | ii,iii |
| D. | ii,iv |
| Answer» B. ii | |
| 263. |
Which table handle stores the addresses of the interrupt handling sub-routines |
| A. | Interrupt-vector table |
| B. | Vector table |
| C. | Symbol link table |
| D. | None of these |
| Answer» B. Vector table | |
| 264. |
For accessing data, the operating system must direct the disk using three-stage process called |
| A. | Seek |
| B. | Peek |
| C. | Geek |
| D. | Leek |
| Answer» B. Peek | |
| 265. |
The hardware component replacing while the system is being run, is known as |
| A. | Cold swapping |
| B. | Blocking cache |
| C. | Hit time |
| D. | Hot swapping |
| Answer» E. | |
| 266. |
The processor indicates to the devices that it is ready to recieve interrupts |
| A. | By enabling the interrupt request line |
| B. | By enabling the IRQ bits |
| C. | By activating the interrupt acknowledge line |
| D. | Either a or b |
| Answer» D. Either a or b | |
| 267. |
____ register is used for the purpose of controlling the status of each interrupt request in parallel priority interrupt. |
| A. | Mass |
| B. | Mark |
| C. | Make |
| D. | Mask |
| Answer» E. | |
| 268. |
Spread of data in the multiple disks, is refered to as |
| A. | SCSI |
| B. | RAID |
| C. | Striping |
| D. | Hit rate |
| Answer» D. Hit rate | |
| 269. |
When dealing with multiple device interrupts , which mechanism is easy to implement |
| A. | Polling method |
| B. | Vectored interrupts |
| C. | Interrupt nesting |
| D. | None of the above |
| Answer» B. Vectored interrupts | |
| 270. |
A bus connecting processor and memory, is known as |
| A. | Processor-memory bus |
| B. | Bus transaction |
| C. | Backplane bus |
| D. | Synchronous bus |
| Answer» B. Bus transaction | |
| 271. |
The interrupt servicing mechanism in which the reqesting device identifies itself to the processor to be serviced is |
| A. | Polling |
| B. | Vectored interrupts |
| C. | Interrupt nesting |
| D. | Simultaneous requesting |
| Answer» C. Interrupt nesting | |
| 272. |
A bus which is designed for allowing processors, I/O devices and memory, is called a |
| A. | Processor-memory bus |
| B. | Bus transaction |
| C. | Synchronous bus |
| D. | Backplane bus |
| Answer» E. | |
| 273. |
1GB of data is referred in bytes as |
| A. | 1,000,000,000 bytes |
| B. | 1,000,000,0 bytes |
| C. | 1,000,000 bytes |
| D. | 1,00,000,000 bytes |
| Answer» B. 1,000,000,0 bytes | |
| 274. |
Request, which is used for indicating a read request for memory, is known as |
| A. | ReadReq |
| B. | WriteReq |
| C. | DataReq |
| D. | Hot swapping |
| Answer» B. WriteReq | |
| 275. |
A unit on the bus that initiates bus requests is called |
| A. | Slave |
| B. | Controller master |
| C. | Striping |
| D. | Bus master |
| Answer» E. | |
| 276. |
To improve the availability of storage of disk, leveraging redundancy is captured in the |
| A. | SCSI |
| B. | RAID |
| C. | SRAM |
| D. | DRAM |
| Answer» C. SRAM | |
| 277. |
1000 disks having 1,200,000-hour MTTF and disks being used 24 hours a day, and failed disks are being replaced with a new ones, then no that will fail over five years (43,800 hours) is, |
| A. | 25 |
| B. | 30 |
| C. | 36 |
| D. | 40 |
| Answer» D. 40 | |
| 278. |
Reads/writes requests to I/O devices, are called |
| A. | Input request |
| B. | Output request |
| C. | I/O requests |
| D. | Peripheral requests |
| Answer» D. Peripheral requests | |
| 279. |
Measuring the continuous service accomplishment and equivalently of the time to failure from a reference point is called |
| A. | Reference |
| B. | Reliability |
| C. | Hit time |
| D. | Hit rate |
| Answer» C. Hit time | |
| 280. |
______ interrupt method uses register whose bits are set separately by interrupt signal for each device: |
| A. | Parallel priority interrupt |
| B. | Serial priority interrupt |
| C. | Daisy chaining |
| D. | None of the above |
| Answer» B. Serial priority interrupt | |
| 281. |
The process that periodically checks the status of an I/O devices, is known as |
| A. | Cold swapping |
| B. | I/O instructions |
| C. | Polling |
| D. | Dealing |
| Answer» D. Dealing | |
| 282. |
When the process is returned after an interrupt service ______ should be loaded againi) Register contentsii) Condition codesiii) Stack contentsiv) Return addresses |
| A. | i,iv |
| B. | ii,iii and iv |
| C. | iii,iv |
| D. | i,ii |
| Answer» E. | |
| 283. |
The starting address sent by the device in vectored interrupt is called as |
| A. | Location id |
| B. | Interrupt vector |
| C. | Service location |
| D. | Service id |
| Answer» C. Service location | |
| 284. |
The 32-bit, 33MHz PCI bus will have peak bandwidth of about |
| A. | 111 MB/sec |
| B. | 123 MB/sec |
| C. | 143 MB/sec |
| D. | 133 MB/sec |
| Answer» E. | |
| 285. |
In vectored interrupts, how does the device identify itself to the processor..? |
| A. | By sending its device id |
| B. | By sending the machine code for the interrupt service routine |
| C. | By sending the starting address of the service routine |
| D. | Either a or c |
| Answer» D. Either a or c | |
| 286. |
What does the following command line signify? prog1|prog2 |
| A. | It runs prog1 first, prog2 second |
| B. | It runs prog2 first, prog1 second |
| C. | It runs both the programs, pipes output of prog1 to input of prog2 |
| D. | It runs both the programs, pipes output of prog2 to input of prog1 |
| Answer» D. It runs both the programs, pipes output of prog2 to input of prog1 | |
| 287. |
Which among the following is odd one out? |
| A. | printf |
| B. | fprintf |
| C. | putchar |
| D. | scanf |
| Answer» E. | |
| 288. |
For a typical program, the input is taken using |
| A. | scanf |
| B. | Files |
| C. | Command-line |
| D. | All of the mentioned |
| Answer» E. | |
| 289. |
The value of EOF is_____ |
| A. | -1 |
| B. | 0 |
| C. | 1 |
| D. | 10 |
| Answer» B. 0 | |
| 290. |
In memory-mapped I/O… |
| A. | The I/O devices and the memory share the same address space |
| B. | The I/O devices have a seperate address space |
| C. | The memory and I/O devices have an associated address space |
| D. | A part of the memory is specifically set aside for the I/O operation |
| Answer» B. The I/O devices have a seperate address space | |
| 291. |
What is the function of the mode ' w+'? |
| A. | create text file for writing, discard previous contents if any |
| B. | create text file for update, discard previous contents if any |
| C. | create text file for writing, do not discard previous contents if any |
| D. | create text file for update, do not discard previous contents if any |
| Answer» C. create text file for writing, do not discard previous contents if any | |
| 292. |
Which of the following will return a non-zero value when checked with isspace(c)? |
| A. | blank |
| B. | newline |
| C. | return |
| D. | all of the mentioned |
| Answer» E. | |
| 293. |
What type of return-type used in String operations? |
| A. | void only |
| B. | void and (char *) only |
| C. | void and int only |
| D. | void, int and (char *) only |
| Answer» E. | |
| 294. |
What is the purpose of sprintf? |
| A. | It prints the data into stdout |
| B. | It writes the formatted data into a string |
| C. | It writes the formatted data into a file |
| D. | None of the mentioned |
| Answer» C. It writes the formatted data into a file | |
| 295. |
Which among the following mathematical function do not have a 'double' return-type? |
| A. | srand(x); |
| B. | ceil(x); |
| C. | floor(x); |
| D. | both ceil(x); and floor(x); |
| Answer» B. ceil(x); | |
| 296. |
Which of the following fopen() statements are illegal? |
| A. | fp = fopen(“abc.txt”, “r”); |
| B. | fp = fopen(“/home/user1/abc.txt”, “w”); |
| C. | fp = fopen(“abc”, “w”); |
| D. | none of the mentioned |
| Answer» E. | |
| 297. |
fwrite() can be used only with files that are opened in binary mode. |
| A. | true |
| B. | false |
| Answer» B. false | |
| 298. |
Which is true about function tolower? |
| A. | The function tolower is defined in <ctype.h> |
| B. | Converts an uppercase letter to lowercase |
| C. | returns other characters untouched |
| D. | None of the mentioned |
| Answer» E. | |
| 299. |
Which mathematical function among the following does NOT require int parameters? |
| A. | div(x, y); |
| B. | srand(x); |
| C. | sqrt(x); |
| D. | all of the mentioned |
| Answer» D. all of the mentioned | |
| 300. |
Escape sequences are prefixed with ________ |
| A. | % |
| B. | / |
| C. | ” |
| D. | None of the mentioned |
| Answer» E. | |