Home
Exercise
16.
The technique for sharing the time of a computer among several jobs, which switches jobs so rapidly, so that each job appears to have the computer to itself is
  • A.
    time sharing
  • C.
    time domain
  • B.
    time out
  • D.
    FIFO
  • Answer
  • Report
Answer : [A]
Report
Name Email  
17.
The most common security failure is
  • A.
    carelessness by users
  • B.
    depending on passwords
  • C.
    too much emphasis on preventing physical access
  • D.
    insufficient technology used to prevent breaches
  • Answer
  • Report
Answer : [A]
Report
Name Email  
18.
Situations where two or more processes are reading or writing some shared data and the final result depends on who runs precisely and when, are called
  • A.
    race conditions
  • C.
    mutual exclusions
  • B.
    critical sections
  • D.
    message passing
  • Answer
  • Report
Answer : [A]
Report
Name Email  
19.
In which addressing mode the contents of a register specified in the instruction are first decremented. and then these contents are used as the effective address of the operands?
  • A.
    Index addressing
  • C.
    Auto increment
  • B.
    Indirect addressing
  • D.
    Auto decrement
  • Answer
  • Report
Answer : [D]
Report
Name Email  
20.
Which of the following capabilities is required for a system program to execute more than one program at a time?
  • A.
    Word processing
  • C.
    Virtual memory
  • B.
    Compiling
  • D.
    Multitasking
  • Answer
  • Report
Answer : [D]
Report
Name Email