logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Operating Systems Concepts Comments

  • Question
  • A development strategy whereby the executive control modules of a system are coded and tested first, is known as


  • Options
  • A. Bottom-up development
  • B. Top-down development
  • C. Left-Right development
  • D. All of the above
  • E. None of the above

  • Correct Answer
  • Top-down development 


  • Operating Systems Concepts problems


    Search Results


    • 1. When did IBM release the first version of disk operating system DOS version 1.0?

    • Options
    • A. 1981
    • B. 1982
    • C. 1983
    • D. 1984
    • E. None of the above
    • Discuss
    • 2. The process of transferring data intended for a peripheral device into a disk (or intermediate store) so that it can be transferred to peripheral at a more convenient time or in bulk, is known as

    • Options
    • A. multiprogramming
    • B. spooling
    • C. caching
    • D. virtual programming
    • E. None of the above
    • Discuss
    • 3. The action of parsing the source program into the proper syntactic classes is known as

    • Options
    • A. syntax analysis
    • B. lexical analysis
    • C. interpretation analysis
    • D. general syntax analysis
    • E. None of the above
    • Discuss
    • 4. Which table is a permanent database that has an entry for each terminal symbol.

    • Options
    • A. Terminal table
    • B. Literal table
    • C. Identifier table
    • D. Reductions
    • E. None of the above
    • Discuss
    • 5. A disk scheduling algorithm in an operating system causes the disk arm to move back and forth across the disk surface in order to service all requests in its path. This is a

    • Options
    • A. First come first served
    • B. Shortest Seek Time First (SSTE)
    • C. Scan
    • D. FIFO
    • E. None of the above
    • Discuss
    • 6. System programs such as Compilers are designed so that they are

    • Options
    • A. reenterable
    • B. non reusable
    • C. serially usable
    • D. recursive
    • E. None of the above
    • Discuss
    • 7. Trojan-Horse programs

    • Options
    • A. are legitimate programs that allow unauthorized access
    • B. do not usually work
    • C. are hidden programs that do not show up on the system
    • D. usually are immediately discovered
    • E. None of the above
    • Discuss
    • 8. What is the name of the technique in which the operating system of a computer executes several programs concurrently by switching back and forth between them?

    • Options
    • A. Partitioning
    • B. Multitasking
    • C. Windowing
    • D. Paging
    • E. None of the above
    • Discuss
    • 9. In which way(s) a macro processor for assembly language can be implemented:

    • Options
    • A. independent two-pass processor
    • B. independent one-pass processor
    • C. processor incorporated into pass 1 of a standard two-pass assembler
    • D. all of the above
    • E. None of the above
    • Discuss
    • 10. Block caches or buffer caches are used

    • Options
    • A. to improve disk performance
    • B. to handle interrupts
    • C. to increase the capacity of the main memory
    • D. to speed up main memory read operation
    • E. None of the above
    • Discuss


    Comments

    There are no comments.

Enter a new Comment