A directory of Objective Type Questions covering all the Computer Science subjects. Here you can access and discuss Multiple choice questions and answers for various compitative exams and interviews.

61. The Memory Buffer Register (MBR)
a. is a hardware memory device which denotes the location of the current instruction being executed.
b. is a group of electrical circuits (hardware), that performs the intent of instructions fetched from memory.
c. contains the address of the memory location that is to be read from or stored into.
d. contains a copy of the designated memory location specified by the MAR after a "read" or the new contents of the memory prior to a "write".
View Answer Report Discuss Too Difficult!
Answer: (d).contains a copy of the designated memory location specified by the MAR after a "read" or the new contents of the memory prior to a "write".

62. Fork is
a. the dispatching of a task
b. the creation of a new job
c. the creation of a new process
d. increasing the priority of a task
View Answer Report Discuss Too Difficult!
Answer: (c).the creation of a new process

63. A form of code that uses more than one process and processor, possibly of different type, and that may on occasions have more than one process or processor active at the same time, is known as
a. multiprogramming
b. multi threading
c. broadcasting
d. time sharing
View Answer Report Discuss Too Difficult!
Answer: (b).multi threading

64. A program
a. is a device that performs a sequence of operations specified by instructions in memory.
b. is the device where information is stored
c. is a sequence of instructions
d. is typically characterized by interactive processing and time of the CPU's time to allow quick response to each user.
View Answer Report Discuss Too Difficult!
Answer: (c).is a sequence of instructions

65. Memory tables are used to keep the track of
a. Real and Virtual Memory
b. I/O Devices
c. Resources
d. I/O Modules+J77
View Answer Report Discuss Too Difficult!
Answer: (a).Real and Virtual Memory

66. The user level context contains the basic elements of
a. User's Program
b. System
c. Application Program
d. None
View Answer Report Discuss Too Difficult!
Answer: (a).User's Program

67. In Computer systems authentication is the fundamental building block in
a. Security Context
b. Control Context
c. Execution Context
d. Performance Context
View Answer Report Discuss Too Difficult!
Answer: (a).Security Context

68. Intruders is a most common security threat which referred as?
a. Account Access
b. Data Access
c. Hacker or Cracker
d. Computer Access
View Answer Report Discuss Too Difficult!
Answer: (c).Hacker or Cracker

69. If the process is running currently executing, it is in the running
a. Mode
b. Process
c. State
d. Program
View Answer Report Discuss Too Difficult!
Answer: (c).State

70. Communication in client server systems may uses Sockets and
a. Process Control Block (PCB)
b. Remote Procedure Calls (RPCs)
c. Kernel mode
d. Registers
View Answer Report Discuss Too Difficult!
Answer: (b).Remote Procedure Calls (RPCs)