Advanced Computers and Microprocessors Quiz

Computers and Microprocessors Quiz – Set 9

Attempt each question, then click “Show answer” to reveal the correct option and a brief explanation.

1. Which of the following is TRUE about “multicore” vs “multiprocessor” systems?

  • A. Multicore uses multiple chips; multiprocessor uses one chip only.
  • B. Multicore has multiple cores on a single chip; multiprocessor has multiple separate CPU chips.
  • C. Both terms mean exactly the same thing.
  • D. Multiprocessor systems cannot run parallel programs.
Correct answer: B. Multicore = many cores on one chip; multiprocessor = multiple physical CPU packages.

2. Which type of scheduler in an OS makes long-term decisions about which jobs/processes are admitted into the system?

  • A. Short-term (CPU) scheduler
  • B. Medium-term scheduler
  • C. Long-term scheduler
  • D. I/O scheduler only
Correct answer: C. Long-term scheduler — It controls the degree of multiprogramming.

3. In a process control block (PCB), which of the following is typically NOT stored?

  • A. Process state
  • B. Program counter
  • C. CPU register contents
  • D. Physical size of the monitor
Correct answer: D. Physical monitor size — PCB stores all info needed to manage and resume a process.

4. Which of the following is a classic example of “deadlock” in operating systems?

  • A. A single process waiting for user input
  • B. Two or more processes each waiting for resources held by the others, so none can proceed
  • C. A process running in an infinite loop by itself
  • D. A process terminated by the user
Correct answer: B. Circular waiting for resources — Deadlock prevents all involved processes from progressing.

5. Which condition is NOT part of Coffman’s four necessary conditions for deadlock?

  • A. Mutual exclusion
  • B. Hold and wait
  • C. No preemption
  • D. Infinite memory
Correct answer: D. Infinite memory — The four are mutual exclusion, hold and wait, no preemption, circular wait.

6. In IPv4 addressing, how many bits are there in an IP address?

  • A. 16 bits
  • B. 32 bits
  • C. 64 bits
  • D. 128 bits
Correct answer: B. 32 bits — Typically written as four decimal octets (e.g., 192.168.0.1).

7. Which of the following correctly matches the protocol with its primary use?

  • A. SMTP – Web browsing
  • B. POP3 – File transfer
  • C. FTP – File transfer
  • D. HTTP – Email delivery between servers
Correct answer: C. FTP – File transfer — SMTP is mail transfer, POP3 retrieves mail, HTTP is for web pages.

8. In CPU design, what does “CPI” capture?

  • A. Cache Performance Index
  • B. Cycles Per Instruction
  • C. Clock Performance Indicator
  • D. Core Parallelism Index
Correct answer: B. Cycles Per Instruction — Average number of cycles needed to execute an instruction.

9. Which of the following helps to reduce context-switch overhead between user mode and kernel mode?

  • A. Larger hard disk size
  • B. Hardware support like fast system call instructions
  • C. Slower clock speed
  • D. Removing all interrupts
Correct answer: B. Fast system call mechanisms — E.g., sysenter/sysexit, syscall/sysret instructions.

10. Which of the following is a typical advantage of static linking (vs dynamic linking) of libraries?

  • A. Smaller executable file size
  • B. No dependency on external libraries at runtime
  • C. Easier to apply security patches to shared code
  • D. Ability to share the same code among many processes in memory
Correct answer: B. No runtime dependency — All needed code is included into the executable.

11. In databases, which of the following best describes “ACID” properties (relevant to transaction processing on computer systems)?

  • A. Atomicity, Consistency, Isolation, Durability
  • B. Accuracy, Concurrency, Integrity, Distribution
  • C. Addressing, Caching, Indexing, Durability
  • D. Access, Control, Isolation, Distribution
Correct answer: A. Atomicity, Consistency, Isolation, Durability — These ensure correct and reliable transactions.

12. Which of the following is a primary goal of normalization in relational databases?

  • A. Increase data redundancy
  • B. Reduce data redundancy and avoid update anomalies
  • C. Remove all foreign keys
  • D. Store all data in a single large table only
Correct answer: B. Reduce redundancy — Normal forms organize data into related tables to avoid anomalies.

13. In microprocessor-based control systems, which of the following is a key characteristic of a “real-time” task?

  • A. Must complete as fast as possible irrespective of timing constraints
  • B. Must produce a correct result within a specified time deadline
  • C. Can be delayed indefinitely without consequences
  • D. Always runs with the lowest priority in the system
Correct answer: B. Correct result within deadline — Timeliness is central to real-time behaviour.

14. Which of the following is an advantage of using interrupts instead of polling for I/O?

  • A. CPU remains busy continuously checking devices
  • B. CPU can perform other tasks and is notified only when I/O is ready
  • C. It increases context switching overhead unnecessarily
  • D. It prevents the OS from multitasking at all
Correct answer: B. More efficient CPU usage — Interrupts avoid constant device checking.

15. Which cache mapping technique restricts each memory block to only one possible cache line?

  • A. Fully associative mapping
  • B. Direct-mapped cache
  • C. Set-associative cache
  • D. Random mapping only
Correct answer: B. Direct-mapped — Each memory block maps to exactly one cache line based on index bits.

16. Which of the following types of malware is specifically designed to spread from one computer to another without attaching itself to a host file?

  • A. Virus
  • B. Worm
  • C. Trojan horse
  • D. Logic bomb
Correct answer: B. Worm — Worms self-replicate across networks without needing a host file.

17. Which of the following is a common method for verifying data integrity during file download?

  • A. Comparing file size only
  • B. Checking MD5/SHA hash values of the downloaded file
  • C. Counting the number of folders on the disk
  • D. Rebooting the computer after each download
Correct answer: B. Checking hash values — Matching published checksums ensures file integrity.

18. In digital communications, which modulation scheme varies the frequency of a carrier signal to represent digital data?

  • A. Amplitude Shift Keying (ASK)
  • B. Frequency Shift Keying (FSK)
  • C. Phase Shift Keying (PSK)
  • D. Pulse Code Modulation (PCM)
Correct answer: B. FSK — Different frequencies represent different binary values.

19. Which of these BEST describes “time slice” in a Round Robin scheduling algorithm?

  • A. Time required to boot the OS
  • B. Maximum time a process is allowed to run before being preempted
  • C. Total execution time of a program
  • D. Time taken for a context switch alone
Correct answer: B. Maximum CPU quantum — After the time slice expires, the process is moved to the back of the ready queue.

20. In IPv6, what is the size of an IP address?

  • A. 32 bits
  • B. 64 bits
  • C. 96 bits
  • D. 128 bits
Correct answer: D. 128 bits — IPv6 greatly expands address space compared to IPv4.

Leave a Reply

Latest News

Geography Quiz – 200 Questions and Answers

Attempt each question, then click “Show answer” to reveal the correct option and a brief explanation..quiz-question {...

More Articles Like This

spot_img