A directory of Objective Type Questions covering all the Computer Science subjects. Here you can access and discuss Multiple choice questions and answers for various compitative exams and interviews.

81. The less privileged mode is often referred as
a. User Mode
b. Control Mode
c. Kernel Mode
d. System Mode
View Answer Report Discuss Too Difficult!
Answer: (a).User Mode

82. File tables provide information about the existence of
a. Registers
b. Tables
c. Files
d. Memory
View Answer Report Discuss Too Difficult!
Answer: (c).Files

83. When a new process is created to execute a program this event is called?
a. Full
b. Null
c. Empty
d. Over
View Answer Report Discuss Too Difficult!
Answer: (b).Null

84. Process control block (PCB) is the most important
a. Data Access
b. Data Algorithm
c. Data Structure
d. Data Block
View Answer Report Discuss Too Difficult!
Answer: (c).Data Structure

85. Dispatcher program switches the processor from one
a. Device to anther
b. Process to another
c. Program to another
d. Register to another
View Answer Report Discuss Too Difficult!
Answer: (b).Process to another

86. The information in the proceeding list is stored in a data structure called?
a. Process Control Block
b. Data Blocks
c. Process Flow Block
d. Process Access Block
View Answer Report Discuss Too Difficult!
Answer: (a).Process Control Block

87. I/O tables are used to manage
a. Memory
b. I/O Modules
c. Programmed I/O
d. I/O Devices
View Answer Report Discuss Too Difficult!
Answer: (d).I/O Devices

88. Process Control block (PCB) is also known as
a. Task Controlling Block
b. Control block
c. Memory Block
d. Data Block
View Answer Report Discuss Too Difficult!
Answer: (a).Task Controlling Block

89. Data collection created by a user is called?
a. Process Location Block
b. Process Creation
c. Memory
d. Files
View Answer Report Discuss Too Difficult!
Answer: (d).Files

90. In processes, access control implements a
a. Security Policy
b. Access Policy
c. Control Policy
d. Check Policy
View Answer Report Discuss Too Difficult!
Answer: (a).Security Policy