In the name of ALLAH, the most beneficient, the most merciful

System Programming (CS609)

Multiple Choice Questions (MCQs)

 

Objective Questions

Question

If we know the cluster number, we can access the blocks within the cluster using BIOS services directly.

  1. True
  2. False

Answer: 2 Chapter No. 41 

Question

If NTFS volume is accessed in DOS then what will happen?

  1. It will fire error of invalid media.
  2. It will fire error of invalid file.
  3. It will fire error of invalid section.
  4. None of the given

Answer: 1 Chapter No. 40 

Question

NTFS volume can be accessed directly in DOS.

  1. True
  2. False

Answer: 2 Chapter No. 40 

Question

In NTFS, FAT and root directory has been replaced by ________.

  1. JFT
  2. MFT
  3. TFT
  4. SFT

Answer: 2 Chapter No. 39 

Question

LSN of FSInfo block is available at _____.

  1. BPB
  2. FAT
  3. Root directory
  4. None of the given

Answer: 2 Chapter No. 38 

Question

In FAT32, lower _______ bits are used.

  1. 48 bits
  2. 36 bits
  3. 28 bits
  4. 32 bits

Answer: 3 Chapter No. 38 

Question

Size of FS Info block is _______.

  1. 64 bytes
  2. 128 bytes
  3. 256 bytes
  4. 512 bytes

Answer: 4 Chapter No. 38 

Question

When we mark a file as deleted by placing 0xE5 then the chain of clusters in FAT is also replaced by ______.

  1. Putting zero in there place

Answer: 1 Chapter No. 36 

Question

In FAT12, to calculate the address or offset from index, we need to multiply it with ________.

  1. 5/3
  2. 3/2
  3. 5/2
  4. 3

Answer: 2 Chapter No. 35 

Question

A cluster is same as block.

  1. True
  2. False

Answer: 2 Chapter No. 33 

Question

Cluster number can also be referred as block number.

  1. True
  2. False

Answer: 2 Chapter No. 33 

Question

Control information about files is maintained using ______.

  1. BPB
  2. DPB
  3. FCB
  4. FPB

Answer: 3 Chapter No. 33 

Question

File can be _______ viewed as organization of data.

  1. Physically
  2. Logically
  3. Both logically and physically
  4. None of the given

Answer: 2 Chapter No. 33 

Question

File is ________ viewed as an organization of data physically it can be collection of clusters or blocks.

  1. logically
  2. physically
  3. conceptually
  4. None of the given

Answer: 1 Chapter No. 33 

Question

File is ________ viewed as an organization of data physically it can be collection of clusters or blocks.

  1. logically
  2. physically

Answer: 1 Chapter No. 33 

Question

______ structure is a tree like structure.

  1. DOS Directory
  2. Disk
  3. Sector
  4. None of the given

Answer: 1 Chapter No. 33 

Question

______ is used to read a block given its LSN.

  1. absread ( ) function
  2. abswrite ( ) function
  3. abs ( ) function
  4. None of the given

Answer: 1 Chapter No. 31 

Question

DOS has practically limit of _________ blocks per cluster.

  1. 32
  2. 64
  3. 128
  4. 256

Answer: 2 Chapter No. 30 

Question

_______ is a collection of contagious blocks.

  1. Cluster
  2. Disk
  3. Track
  4. Platter

Answer: 1 Chapter No. 30 

Question

______ is the first block on disk

  1. LBA=2 block
  2. LBA=0 block
  3. LBA=1 block
  4. None of the given

Answer: 2 Chapter No. 30 

Question

DOS has a built in limit of ________ blocks per cluster.

  1. 32
  2. 64
  3. 128
  4. 256

Answer: 3 Chapter No. 30 

Question

In DOS we have limit of _______ blocks per cluster.

  1. 32
  2. 64
  3. 128
  4. 256

Answer: 3 Chapter No. 30 

Question

When LSN is equal to zero (0), it means ________.

  1. LSN is relative address with respect to the start of Logical

Answer: 1 Chapter No. 30 

Question

Each partition information chunk is 16 bytes long and the last two bytes at the end of the partition table data part is the partition table signature whose value should be_______indicating that the code part contains valid executable code.

  1. AA55
  2. AA66
  3. BB66
  4. CC55

Answer: 1 Chapter No. 27 

Question

The accumulative time that is required to access the selected block is called ________.

  1. Access time

Answer: 1 Chapter No. 25 

Question

DMA may not support memory to memory transfer

  1. True
  2. False

Answer: 2 Chapter No. 23 

Question

_______ is used to program various common parameters of transfer for all the channels.

  1. DMA Command Register
  2. DMA Request Register
  3. DMA Status Register
  4. DMA Mode Register

Answer: 1 Chapter No. 23 

Question

The amount of memory above conventional memory (extended memory) can be determined using the service _______.

  1. 15H/88H
  2. 16H/88H
  3. 17H/88H
  4. 21H/88H

Answer: 1 Chapter No. 19 

Question

_______ is a device incorporated into the PC to update time even if the computer is off.

  1. Clock counter
  2. ROM
  3. Clock
  4. Real time clock

Answer: 4 Chapter No. 17 

Question

XON whenever received indicates the start of communication and XOFF whenever received indicates a temporary pause in the communication.

  1. True
  2. False

Answer: 1 Chapter No. 17 

Question

________ is used to read time from RTC.

  1. 1A/02H
  2. 1A/03H
  3. 1A/04H
  4. 1A/05H

Answer: 1 Chapter No. 17 

Question

Only _______ ports are important from programming point of view.

  1. 70 and 71H
  2. 71 and 72H
  3. 70 and 72H
  4. 72 and 73H

Answer: 1 Chapter No. 17 

Question

______whenever received indicates the start of communication and ______ whenever received indicates a temporary pause in the communication.

  1. XON & XOFF
  2. XOFF & XON
  3. XON & YOFF
  4. YON & XOFF

Answer: 1 Chapter No. 17 

Question

The BIOS interrupt ________ can be used to configure RTC.

  1. 1AH
  2. 2AH
  3. 3AH
  4. 4AH

Answer: 1 Chapter No. 17 

Question

The __________ function simply enables the self test facility within the modem control register.

  1. STOn()
  2. SelfTest()
  3. SelfTestOn()
  4. None of the given

Answer: 3 Chapter No. 16 

Question

The _________ function uses the COM port number to receive a byte from the COM port using BIOS services.

  1. initialize()
  2. recievebyte()
  3. recieve()
  4. recievechar()

Answer: 4 Chapter No. 16 

Question

The _________ function initializes COM port whose number is passed as a parameter using BIOS services.

  1. initializecom()
  2. initialize()
  3. recievechar()
  4. None of the given

Answer: 2 Chapter No. 16 

Question

Int _________ service 0 can be used to set the line parameter of the URT or COM port.

  1. 14H
  2. 15H
  3. 13H
  4. None of the given

Answer: 1 Chapter No. 15 

Question

Int 14H __________ can be used to set the line parameter of the UART or COM port.

  1. Service # 0
  2. Service # 1
  3. Service # 2
  4. None of the given

Answer: 1 Chapter No. 15 

Question

Int 14H __________ can be used to send a byte.

  1. Service # 0
  2. Service # 1
  3. Service # 2
  4. None of the given

Answer: 2 Chapter No. 15 

Question

The baud rate is set in accordance with the divisor value loaded within the UART internal registers base +0 and base +1.

  1. True
  2. False

Answer: 1 Chapter No. 14 

Question

The memory addresses of COM ports remain same for all computers.

  1. True
  2. False

Answer: 2 Chapter No. 14 

Question

DSR stands for _________.

  1. Data set ready
  2. Data service ready
  3. Data stock ready
  4. None of the given

Answer: 1 Chapter No. 14 

Question

BIOS support _________UARTS as COM ports.

  1. 6
  2. 4
  3. 3
  4. 2

Answer: 2 Chapter No. 14 

Question

_______ is used to identify the cause of interrupt.

  1. Interrupt Enable Register
  2. Interrupt ID register
  3. Interrupt Status register
  4. None of the given

Answer: 2 Chapter No. 14 

Question

DTE is _________.

  1. Data terminal equipment
  2. Data transmitting equipment
  3. Dual terminal equipment
  4. None of the given

Answer: 1 Chapter No. 13 

Question

In _______ each byte is needed to be encapsulated in start and end.

  1. Synchronous communication
  2. Asynchronous communication
  3. Both of Synchronous & Asynchronous Communication
  4. None of the given

Answer: 2 Chapter No. 13 

Question

In case of synchronous communication a timing signal is required to identify the start and end of a bit.

  1. True
  2. False

Answer: 1 Chapter No. 13 

Question

There are two types of communication; synchronous and anti synchronous

  1. True
  2. False

Answer: 2 Chapter No. 13 

Question

DCE is ___________.

  1. Data communication equipment
  2. Dual communication equipment
  3. Data clearing equipment
  4. None of the given

Answer: 1 Chapter No. 13 

Question

There are ________ kinds of serial communication.

  1. 2
  2. 3
  3. 4
  4. 5

Answer: 1 Chapter No. 13 

Question

At IRQ7 Interrupt # __________ is used.

  1. 0x0A
  2. 0x0B
  3. 0x0C
  4. x0F

Answer: 4 Chapter No. 12 

Question

_______ store the base address for LPT1.

  1. 40:00H
  2. 40:02H
  3. 40:08H
  4. 40:1AH

Answer: 3 Chapter No. 11 

Question

Int ________ is used to control the printer via the BIOS.

  1. 17H
  2. 18H
  3. 20H
  4. 21H

Answer: 1 Chapter No. 11 

Question

If we want to send printing on the printer then we have to perform following steps.

  1. Initialize printer
  2. Read Status
  3. Check Error
  4. All of the given

Answer: 4 Chapter No. 11 

Question

If printer is __________ then printer sends back the ACK signal to the printer interface.

  1. idle
  2. busy
  3. out of paper
  4. None of the given

Answer: 1 Chapter No. 11 

Question

If we want to produce the shrill voice from the speaker phone then we have to load the _________ divisor value at Port _________.

  1. high, 0x42
  2. low, 0x42
  3. high, 0x22
  4. low, 0x22

Answer: 1 Chapter No. 10 

Question

In order to produce the sound from PC internal Speaker we have to load the _________ bit divisor value at the _________ port.

  1. 8, 0x21
  2. 16, 0x42
  3. 32, 0x22
  4. 64, 0x32

Answer: 2 Chapter No. 10 

Question

Counter register can be used to divide clock signal.

  1. True
  2. False

Answer: 1 Chapter No. 9 

Question

________ No. of bytes are used to store the character in the key board buffer.

  1. 1
  2. 2
  3. 4
  4. 8

Answer: 2 Chapter No. 8 

Question

Total No. of bytes that can be stored in Keyboard Buffer is_________.

  1. 16
  2. 32
  3. 64
  4. 128

Answer: 2 Chapter No. 8 

Question

In keyboard status byte bit no. 2 and 3 are used for ctrl and alt keys respectively. which of the following condition is used to check that Ctrl + Alt keys are pressed. Where: unsigned char far * scr = (unsigned char far *)(0x00400017);

  1. if (((*scr)&12)==12)
  2. if (((*scr)&8)==8)
  3. if (((*scr)&4)==4)
  4. if (((*scr)&2)==2)

Answer: 1 Chapter No. 7 

Question

Which of the following register is used, if you want to block access of any Hardware.

  1. ISR
  2. IMR
  3. IRR
  4. None of the given

Answer: 1 Chapter No. 7 

Question

______ is Disk interrupt.

  1. 10H
  2. 11H
  3. 13H
  4. 14H

Answer: 3 Chapter No. 6 

Question

The service _________ is called the keyboard hook service.

  1. 15H/2FH
  2. 15H/4FH
  3. 15H/FFH
  4. None of the given

Answer: 3 Chapter No. 6 

Question

The keyboard makes use of interrupt number ________ for its input operations.

  1. 9
  2. 10
  3. 11
  4. 12

Answer: 1 Chapter No. 5 

Question

The service number is usually placed in the ________ register.

  1. AL
  2. CL
  3. AH
  4. AX

Answer: 3 Chapter No. 4 

Question

The output on the monitor is controlled by a controller called __________ within the PC.

  1. Video controller
  2. Bus controller
  3. Ram controller
  4. None of the given

Answer: 1 Chapter No. 4 

Question

To set the interrupt vector means is to change the double word sized interrupt vector within the IVT.

  1. True
  2. False

Answer: 1 Chapter No. 3 

Question

If the following function, keep(1, 1000); is called in the TSR program, it means that ________ No. of bytes are reserved in the memory.

  1. 8000
  2. 16000
  3. 32000
  4. 64000

Answer: 2 Chapter No. 3 

Question

The ______ service # is not used in any interrupt.

  1. 01
  2. 02
  3. 03
  4. FF

Answer: 4 Chapter No. 2 

Question

There are two main types of interrupts, namely

  1. PC based and Window based
  2. Hardware based and Kernal based
  3. Hardware interrupts and Software interrupts
  4. None of the given

Answer: 3 Chapter No. 1 

Question

Standard PC operates in two modes in terms of memory which are

  1. Real mode and Extended Mode
  2. Base mode and Memory Mode
  3. Real mode and protected mode
  4. None of the given

Answer: 3 Chapter No. 1 

Question

BPB stands for ________.

  1. BIOS parameter block
  2. BIOS processing block
  3. Base processing block
  4. BIOS partition block

Answer: 1 Chapter No. 1 

Question

The Function of I/O controller is to provide ________.

  1. I/O control signals
  2. Buffering
  3. Error Correction and Detection
  4. All of given

Answer: 4 Chapter No. 1 

Question

IVT is a table containing ______ byte entries each of which is a far address of an interrupt service routine.

  1. 2
  2. 4
  3. 8
  4. 16

Answer: 2 Chapter No. 1 

Question

We can access the contents of File by using the root directory entry and ________.

  1. Reserved Blocks
  2. Number of FAT copies
  3. File Allocation Table (FAT)
  4. None of the given

Answer: Chapter No.  

Question

What will happen if NTFS volume is accessed in DOS?

  1. Convert it to FAT volume
  2. Nothing will happen
  3. Error of invalid media
  4. None of the given

Answer: Chapter No.  

Question

Software based flow control make use of _________control characters

  1. XON
  2. XOFF
  3. XON and XOFF
  4. None of the given

Answer: Chapter No.  

Question

When LSN is equal to zero (0), it means ________.

  1. First block of the disk
  2. First block of the logical drive
  3. First block of hidden blocks
  4. None of the given

Answer: Chapter No.