90+ System Software Solved MCQs

1.

Compiler is a program that

A. places programs into memory and prepares them for execution
B. automates the translation of assembly language into machine language
C. accepts a program written in a high level language and produces an object program
D. appears to execute a source program as if it were machine language.
Answer» C. accepts a program written in a high level language and produces an object program
2.

Loader is a program that

A. places programs into memory and prepares them for execution.
B. automates the translation of assembly language into machine language.
C. accepts a program written in a high level language and produces an object program.
D. appers to execute a source program as if it were machine language
Answer» A. places programs into memory and prepares them for execution.
3.

The action of parsing the source program into the proper syntactic classes is called

A. syntax analysis
B. lexical analysis
C. interpretation analysis
D. general syntax analysis
Answer» B. lexical analysis
4.

In analyzing the compilation of PL/I program ,the term “lexical analysis” is associated with

A. recognition of basic syntactic constructs through reductions
B. recognition of basic elements and creation of uniform symbols
C. creation of more optional matrix
D. use of macro processor to produce more optimal assembly code
Answer» B. recognition of basic elements and creation of uniform symbols
5.

In analyzing the compilation of PL/I program,the description creation of more optimal matrix is associated with

A. assembly and output
B. code generation
C. syntax analysis
D. machine independent optimization
Answer» D. machine independent optimization
6.

Task of the lexical analysis phase is

A. to parse the source program into basic elements or tockens of the language
B. to build a literal literal table and an identifier table
C. to build a uniform symbol table
D. all of these
Answer» D. all of these
7.

which is a permanent database in the general model of compiler

A. Literal table
B. Identifier table
C. Terminal table
D. source code
Answer» C. Terminal table
8.

which table is a permanent data bases that has an entry for each terminal symbol

A. Terminal table
B. Literal table
C. Identifier table
D. Reductions
Answer» A. Terminal table
9.

The output of lexical analyser is

A. a set of regular expressions
B. syntax tree
C. set of tokens
D. strings of characters
Answer» C. set of tokens
10.

which of the following system software resides in main memory

A. texteditor
B. assembler
C. linker
D. all of these
Answer» D. all of these
11.

.machine independent phase of the compiler is

A. syntax analysis
B. lexical analysis
C. intermediate code generation
D. all of these
Answer» D. all of these
12.

which of the following statement is true

A. SLR parser is more powerful than LALR
B. LALR parser is more powerful than canonical LR parser
C. canonical LR parser is more powerful than LALR parser
D. parser SLR,canonical CR and LALR have the same power
Answer» D. parser SLR,canonical CR and LALR have the same power
13.

.which of the following is used for grouping of characteristics into tockens

A. parser
B. code optimization
C. code generator
D. lexical analyser
Answer» D. lexical analyser
14.

A bottom up parser generates

A. Right most derivations
B. Right most derivations in reverse
C. Leftmost derivations
D. Leftmost derivations in reverse
Answer» B. Right most derivations in reverse
15.

.A top down parser generates

A. Right most derivations
B. Right most derivations in reverse
C. Leftmost derivations
D. Leftmost derivations in reverse
Answer» C. Leftmost derivations
16.

which of the following grammer is LR(1)

A. A->aAa A->bAb A->a A->b
B. A->aAa A->aAb A->c
C. A->A+A A->a
D. both a and b
Answer» B. A->aAa A->aAb A->c
17.

which of the following parser is the most powerful

A. Operator precedence
B. Canonical LR
C. LALR
D. SLR
Answer» B. Canonical LR
18.

Minimum hamming distance method is used for connection of

A. syntactic errors
B. semantic errors
C. algorithm errors
D. transcription errors
Answer» A. syntactic errors
19.

.Pee hole optimization is a form of

A. loop optimization
B. local optimization
C. constant folding
D. none of these
Answer» A. loop optimization
20.

The optimization which avoids test at every iteration is

A. loop unrolling
B. loop jamming
C. constant folding
D. none of these
Answer» A. loop unrolling
21.

The value of k,in LR(k)cannot be

A. zero
B. 1
C. 2
D. none of these
Answer» D. none of these
22.

The cost of developing a compiler is proportional to

A. complexity of the source language
B. complexity of the architecture of the target machine
C. flexibility of the available instruction set
D. all of these
Answer» D. all of these
23.

which of the following is the most general phase structured grammar

A. Regular
B. Context free
C. Context sensitive
D. none of these
Answer» C. Context sensitive
24.

Type checking is normally done during

A. lexical analysis
B. syntax analysis
C. syntax directed translation
D. code optimization
Answer» C. syntax directed translation
25.

which of the following grammars are not phase structured

A. Regular
B. Context free
C. Context sensitive
D. None of these
Answer» D. None of these
26.

csg can be recognized by

A. push down automata
B. 2-way linear bounded automata
C. finite state automata
D. None of these
Answer» B. 2-way linear bounded automata
27.

which of the following is not a source error

A. faulty design specification
B. faulty algorithm
C. Compilers themselves
D. none of these
Answer» D. none of these
28.

A parser with valid prefix property is advantageous because it

A. detects error as soon as possible
B. detects errors as and when they occur
C. limits the amount of erroneous output passed to the next phase
D. all of these
Answer» C. limits the amount of erroneous output passed to the next phase
29.

ud-chaining is useful for

A. determining whether a particular definition is used anywhere or not
B. constant folding
C. checking whether a variable is used,without prior assignment
D. all of these
Answer» D. all of these
30.

Back-patching is useful for handling

A. conditional jumps
B. unconditional jumps
C. backward reference
D. forward references
Answer» D. forward references
31.

Ir stands for

A. left to right
B. left to right reduction
C. right to left
D. left to right and right most derivations in reverse
Answer» D. left to right and right most derivations in reverse
32.

An ideal compiler should

A. be small in size
B. produce object code that is smaller in size and execute faster
C. takes less time for compiling
D. all of these
Answer» D. all of these
33.

which of the following is used for grouping of characters into tockens

A. parser
B. code optimizer
C. code generator
D. scanner
Answer» D. scanner
34.

which of the following class of statements usually produces no executable code when compiled

A. Declaration statements
B. Assignment statements
C. Input and output statements
D. structural statements
Answer» D. structural statements
35.

Access time of the symbol table will be logarithmic,if it is implemented by

A. linear list
B. search tree
C. hash table
D. self-organizing list
Answer» B. search tree
36.

A shift reduce parser carries out the actions specified within braces immediately after reducing,with the corresponding rule of the grammar
s->xxW{print “1”}
s->y{print “2”}
w->sz{print “3”}
what is the translation of “xxxxyzz”

A. 11231
B. 11233
C. 23131
D. 233321
Answer» C. 23131
37.

The output of a lexical analyzer is

A. machine code
B. intermediate code
C. a stream of tockens
D. a parse tree
Answer» C. a stream of tockens
38.

Synthesized attribute can be easily simulated by a

A. LL grammar
B. ambiguous grammar
C. LR grammar
D. none of these
Answer» C. LR grammar
39.

which of the following cannot be used an an intermediate code form

A. post fix notation
B. Three address codes
C. Syntax trees
D. Quadraples
Answer» D. Quadraples
40.

A Language L is defined by L={xn yn |n>1} which of the following definitions generates the same language as L

A. E->xEy | xy
B. (xy)|(xxyy)
C. x-y
D. All of these
Answer» A. E->xEy | xy
41.

pass1

A. assign address to all statements in the program
B. save the values assigned to all labels for use in pass2
C. perform some processing of assembler directives
D. all of these
Answer» D. all of these
42.

pass2

A. assemble instruction and generate data
B. perform processing of assembler directions not done during pass1
C. write the object program and the assembly listing
D. all of these
Answer» D. all of these
43.

A compiler which allows only the modified section of the source code to be re-compiled is called

A. incremental compiler
B. re-configurable compiler
C. dynamic compiler
D. subjective compiler
Answer» A. incremental compiler
44.

In a two pass assembler pseudo code,equ is to be evaluated during

A. pass1
B. pass2
C. not evaluated by the assembler
D. none of these
Answer» A. pass1
45.

In a syntax directed translation scheme,if values of an attribute of a node is a function of the attributes of its children,then attribute is called

A. canonical attribute
B. synthesized attribute
C. inherited attribute
D. none of these
Answer» B. synthesized attribute
46.

Software that allows your computer to interact with the user, applications, and hardware is called

A. application software
B. word processor
C. system software
D. database software
Answer» C. system software
47.

Programs that coordinate computer resources, provide an interface between users and the computer, and run applications are called

A. utilities
B. operating systems
C. device drivers
D. language translators
Answer» B. operating systems
48.

Specialized programs that allow particular input or output devices to communicate with the rest of the computer system are called

A. operating systems
B. utilities
C. device drivers
D. language translators
Answer» C. device drivers
49.

Also known as a service program, this type of program performs specific tasks related to managing computer resources.

A. utility
B. operating system
C. language translator
D. device driver
Answer» A. utility
50.

In order for a computer to understand a program, it must be converted into machine language by a(n)__________.

A. operating system
B. utility
C. device driver
D. language translator
Answer» D. language translator
51.

Which of the following is not a function of the operating system?

A. manage resources
B. Internet access
C. provide a user interface
D. load and run applications
Answer» B. Internet access
52.

The items that a computer can use in its functioning are collectively called its

A. resources
B. stuff
C. capital
D. properties
Answer» A. resources
53.

Programs that coordinate all of the computer’s resources including memory, processing, storage, and devices such as printers are collectively referred to as

A. language translators
B. resources
C. applications
D. interfaces
Answer» B. resources
54.

__________ refers to a computer’s ability to run more than one application at the same time.

A. serial computing
B. operating system
C. parallel computing
D. multitasking
Answer» D. multitasking
55.

“GUI” stands for

A. Gnutella Universal Interface
B. Graphic Uninstall/Install
C. Graphical User Interface
D. General Utility Interface
Answer» C. Graphical User Interface
56.

Starting or restarting a computer is called

A. booting the system
B. firing the system
C. tasking the system
D. restoring the system
Answer» A. booting the system
57.

This type of boot occurs when the computer is already on, and you restart it without turning off the power.

A. generic boot
B. live boot
C. warm boot
D. cold boot
Answer» C. warm boot
58.

In a computer system, data and programs are stored as

A. files
B. records
C. archives
D. annals
Answer» A. files
59.

In a computer system, related files are generally stored in the same

A. track
B. table
C. folder
D. wallet
Answer» C. folder
60.

An embedded operating system would most likely be found in a

A. desktop computer
B. server
C. Web site
D. PDA
Answer» D. PDA
61.

Which of the following is an operating system that would most likely be found on a handheld computer?

A. Windows XP
B. Windows NT
C. Windows 2000
D. Windows CE
Answer» D. Windows CE
62.

To connect several computers together, one generally needs to be running a(n) __________ operating system.

A. network
B. Internet
C. stand-alone
D. embedded
Answer» A. network
63.

Popular network operating systems include all of the following except

A. NetWare
B. Windows NT Server
C. Windows XP Server
D. Microsoft DOS
Answer» D. Microsoft DOS
64.

Windows and Macintosh are generally considered to be __________ operating systems.

A. network
B. stand-alone
C. embedded
D. DOS
Answer» B. stand-alone
65.

Operating systems that are owned and licensed by a corporation are called

A. proprietary operating systems
B. server operating systems
C. client operating systems
D. stand-alone operating systems
Answer» A. proprietary operating systems
66.

The objective of these operating systems is to encourage individuals to use, improve, and modify the programs.

A. proprietary
B. freeware
C. shareware
D. non-proprietary
Answer» D. non-proprietary
67.

This operating system is an example of an open source program.

A. Linux
B. Windows XP
C. Macintosh
D. UNIX
Answer» A. Linux
68.

The most popular microcomputer operating system in use today is

A. Microsoft Windows
B. Linux
C. UNIX
D. Macintosh
Answer» A. Microsoft Windows
69.

The latest version of Microsoft’s popular operating system is called

A. Windows ME
B. Windows 2000 Professional
C. Windows XP
D. Windows NT Workstation
Answer» C. Windows XP
70.

The first operating system developed that used GUI’s was by

A. Microsoft
B. Linux
C. Macintosh
D. Bell labs
Answer» C. Macintosh
71.

The latest version of the Macintosh operating system is

A. Mac OS IX
B. Mac OS IXX
C. Mac OS V
D. Mac OS X
Answer» D. Mac OS X
72.

Apple computers use which operating system?

A. Windows
B. Be O/S
C. Linux
D. Macintosh
Answer» D. Macintosh
73.

The Macintosh tool for organizing files is called

A. Dock
B. Sherlock
C. Aqua
D. Sandbox
Answer» A. Dock
74.

If you were trying to locate a lost file on your Macintosh, which application would you use?

A. Dock
B. Sherlock
C. Aqua
D. DiskCheck
Answer» B. Sherlock
75.

This operating system was originally designed to run on minicomputers used in a network environment.

A. Linux
B. UNIX
C. Windows
D. Mac OS
Answer» B. UNIX
76.

Which of the following is the latest “flavor” of the UNIX operating system?

A. Penguix
B. Manimal
C. Torvalix
D. Linux
Answer» D. Linux
77.

Which of the following is an example of non-proprietary software?

A. Windows
B. Macintosh
C. Linux
D. MS Office 2000
Answer» C. Linux
78.

This open source software is free and available from many sources.

A. Windows
B. Macintosh
C. Linux
D. NetWare
Answer» C. Linux
79.

Which of the following is NOT one of the alternatives to the Windows operating system?

A. UNIX
B. Macintosh
C. NetWare
D. Linux
Answer» C. NetWare
80.

What is the name of a utility that protects your computer against downloading malicious code?

A. file compression program
B. antivirus program
C. backup program
D. troubleshooting program
Answer» B. antivirus program
81.

To safely remove a program from your computer, you might want to use what type of utility?

A. backup program
B. file compression program
C. troubleshooting program
D. uninstall program
Answer» D. uninstall program
82.

Which of the following is a type of utility used to reduce the size of files to increase the amount of available disk space?

A. file compression program
B. troubleshooting program
C. antivirus program
D. uninstall program
Answer» A. file compression program
83.

A utility that makes copies of files in case the originals are lost or destroyed is called a(n)

A. troubleshooting program
B. uninstall program
C. backup program
D. antivirus program
Answer» C. backup program
84.

Which of the following Windows utilities will erase unneeded files?

A. Backup or Restore Wizard
B. Disk Cleanup
C. Disk Defragmenter
D. All of the above
Answer» B. Disk Cleanup
85.

A concentric ring on a disk is referred to as a

A. track
B. sector
C. table
D. segment
Answer» A. track
86.

When files are broken up into small parts on a disk they are said to be

A. fragmented
B. contiguous
C. sectored
D. disbursed
Answer» A. fragmented
87.

A collection of utility programs bundled and sold together is called a(n)

A. application suite
B. operating system
C. utility suite
D. system file
Answer» C. utility suite
88.

In order for a peripheral to operate correctly, its __________ must be installed.

A. device driver
B. user interface
C. Internet connection
D. none of the above
Answer» A. device driver
89.

Which one of the following would not be considered as a well-known utility suite?

A. Windows XP
B. eSafe Desktop
C. McAfee Office
D. Norton SystemWorks
Answer» A. Windows XP
90.

You can use what utility to update all of your device drivers at the same time?

A. Driver Update
B. Device Manager
C. Driver Verification Service (DVS)
D. Windows Update
Answer» D. Windows Update
Tags
Question and answers in System Software, System Software multiple choice questions and answers, System Software Important MCQs, Solved MCQs for System Software, System Software MCQs with answers PDF download