Computer Science Fundamentals Test Preparation - 646 Verified Questions

Page 1


Computer Science Fundamentals

Test Preparation

Course Introduction

Computer Science Fundamentals provides an introduction to the core concepts of computer science, including problem-solving techniques, algorithms, data structures, and basic programming principles. This course covers the foundational theories underpinning computer operations, logical reasoning, and computational thinking. Students will explore concepts such as abstraction, recursion, and modularity, gaining practical experience through hands-on programming exercises. By the end of the course, students will have a solid understanding of how computers process and store information, and will be prepared for more advanced study in the computer science field.

Recommended Textbook

Understanding Operating Systems 7th Edition by Ann McHoes

Available Study Resources on Quizplus

16 Chapters

646 Verified Questions

646 Flashcards

Source URL: https://quizplus.com/study-set/1969

Page 2

Chapter 1: Introducing Operating Systems

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/39155

Sample Questions

Q1) When executing a job,the File Manager determines whether a user request requires that a file be retrieved from storage or whether it is already in memory.

A)True

B)False

Answer: False

Q2) The most common mechanism for implementing multiprogramming was the introduction of the ____ concept,whereby the CPU was notified of events needing operating systems services.

A) paging

B) sharing

C) messaging

D) interrupt

Answer: D

Q3) General-purpose operating systems such as Linux or Windows are used in embedded systems.

A)True

B)False

Answer: False

To view all questions and flashcards with answers, click on the resource link above.

3

Chapter 2: Memory Management: Simple Systems

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/39156

Sample Questions

Q1) Single-user systems in a non-networked environment allocate,to each user,access to all available main memory for each job,and jobs are processed sequentially,one after the other.

A)True

B)False

Answer: True

Q2) Single-user contiguous allocation schemes have the problem of partition intrusion..

A)True

B)False

Answer: False

Q3) In a relocatable dynamic partition scheme,the ____ contains a value that must be added to each address referenced in a program so that the system will be able to access the correct memory addresses after relocation.

A) bounds register

B) load register

C) relocation register

D) compaction register

Answer: C

To view all questions and flashcards with answers, click on the resource link above.

4

Chapter 3: Memory Management: Virtual Memory Systems

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/39157

Sample Questions

Q1) The primary advantage of storing programs in noncontiguous locations is that

A) multiple programs can run at the same time

B) every program will be able to run

C) secondary storage is accessed more quickly

D) main memory is used more efficiently

Answer: D

Q2) A variation of the LRU page replacement algorithm known as the ____ replacement policy is implemented with a circular queue.

A) clock page

B) round robin

C) performance page

D) bit shifting

Answer: A

Q3) In demand paging,pages are ____ between main memory and secondary storage.

A) swapped

B) traded

C) allocated

D) faulted

Answer: A

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Processor Management

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/39158

Sample Questions

Q1) As a process moves through the system,its status changes.Possible process statuses include FINISHED,HOLD,READY,RUNNING,and WAITING.

A)True

B)False

Q2) Each thread in a process is represented by a data structure called a ____ that contains basic information such as the thread's unique identification,state,and priority.

A) Thread Control Block

B) Thread State Block

C) Thread Pointer

D) Thread Queue

Q3) It is possible to minimize response time by running only interactive jobs and letting batch jobs wait until the interactive load ceases.

A)True

B)False

Q4) A job's state moves from HOLD to WAITING when it's ready to run but is waiting for the CPU.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above.

Chapter 5: Process Management

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/39159

Sample Questions

Q1) Database locking should be done only at the level of the entire database.

A)True

B)False

Q2) A race introduces the element of chance,which is a highly desirable attribute,in database management.

A)True

B)False

Q3) ____ is the policy of allowing only one process to have access to a dedicated resource.

A) No preemption

B) Circular wait

C) Resource holding

D) Mutual exclusion

Q4) According to the Banker's Algorithm,an unsafe state always leads to deadlock.

A)True

B)False

Q5) In general,operating systems must either choose avoidance or recovery as a strategy for dealing with deadlocks.

A)True

B)False

Page 7

To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Concurrent Processes

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/39160

Sample Questions

Q1) In general,parallel systems can be put into two broad categories: ____ level parallelism and instruction level parallelism.

A) resource

B) register

C) data

D) task

Q2) Java uses both a compiler and an interpreter.

A)True

B)False

Q3) The primary disadvantage of the WAIT and SIGNAL operation set is that it does not address busy waiting.

A)True

B)False

Q4) The only tangible benefit of parallel processing systems is faster processing.

A)True

B)False

Q5) The master/slave configuration is a symmetric multiprocessing system.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Device Management

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/39161

Sample Questions

Q1) Nested RAID levels,also called hybrid levels,are complex RAID configurations created by combining multiple standard levels.

A)True

B)False

Q2) The USB controller assigns bandwidth to each device depending on its priority.The ____ priority is assigned to real-time exchanges where no interruption in the data flow is allowed,such as video or sound data.

A) highest

B) medium

C) lowest

D) standard

Q3) ____ is a way to optimize search times on hard disk drives by ordering the requests once the read/write heads have been positioned.

A) Rotational ordering

B) SSTF

C) C-SCAN

D) LOOK and SCAN

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: File Management

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/39162

Sample Questions

Q1) Within a file,variable-length records are easier to access directly than fixed-length records.

A)True

B)False

Q2) ____ text compression builds on the previous data element.The first data element in a list is not compressed but each entry after that takes a given number of characters from the previous entry that they have in common and then adds the characters that make it unique.

A) Repeated-terms

B) Front-end

C) Repeated-characters

D) Lossy

Q3) A UNIX or Linux system might identify a file as: /usr/imfst/flynn/inventory.doc.The first entry is a forward slash ( / )representing the master directory,called the ____ directory.

A) root

B) main

C) branch

D) working

To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Network Organization Concepts

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/39163

Sample Questions

Q1) Bridging between two homogeneous networks occurs at Layer 2 of the OSI transport protocol model,the data link layer.

A)True

B)False

Q2) The tree topology is a collection of rings.

A)True

B)False

Q3) In the routing information protocol (RIP),the entire routing table is updated only when changes have occurred; this decreases internetwork traffic and positively affects the delivery of messages.

A)True

B)False

Q4) Which characteristic is true of packet switching?

A) Preferred in low volume networks

B) Easily overloaded

C) Preferred for voice communications

D) Transmits in batches

Q5) Ethernet is the most widely known CSMA/CD protocol.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Management of Network Functions

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/39164

Sample Questions

Q1) The find-and-copy technique isn't considered true file sharing because all users wanting access to the data file must copy the file onto their own systems,thereby duplicating the code and wasting space.

A)True

B)False

Q2) In process-based DO/S,resources are controlled by servers called ____ that are responsible for accepting requests for service on the individual devices they control,processing each request fairly,providing service to the requestor,and returning to serve others.

A) kernels

B) guardians

C) spoolers

D) nodes

Q3) The biggest limitation of a network operating system (NOS)is ____ in terms of memory,process,device,and file management.

A) lack of scalability

B) lack of global control

C) lack of security

D) prohibitive cost

To view all questions and flashcards with answers, click on the resource link above.

Page 12

Chapter 11: Security and Ethics

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/39165

Sample Questions

Q1) A gap in system security in always indicative of malicious activity.

A)True

B)False

Q2) A firewall typically sits between a network and its individual computers.

A)True

B)False

Q3) A ____ combines into one program the characteristics of other attacks.

A) Trojan Horse

B) worm

C) multi-thread virus

D) blended threat

Q4) A virus is defined as a small program written to alter the way a computer operates,without the permission or knowledge of the user.

A)True

B)False

Q5) As an alternative to passwords,some systems have integrated use of a ____.

A) smart card

B) fingerprint scanner

C) biometric scanner

D) retina scanner

Page 13

To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: System Management

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/39166

Sample Questions

Q1) Blocking I/O requests to optimize access times increases the number of physical I/O requests.

A)True

B)False

Q2) System efficiency is affected primarily by two major components: user programs and operating system programs.

A)True

B)False

Q3) The first thing to do upon notification of a new software patch is to____.

A) identify the criticality of the patch

B) deploy the patch

C) test the patch

D) run automatic updating

Q4) As memory management algorithms grow more complex,____.

A) CPU use decreases

B) CPU overhead increases

C) buffers are required

D) system performance improves

To view all questions and flashcards with answers, click on the resource link above.

Page 14

Chapter 13: Unix Operating Systems

Available Study Resources on Quizplus for this Chatper

46 Verified Questions

46 Flashcards

Source URL: https://quizplus.com/quiz/39167

Sample Questions

Q1) In UNIX,a ____ table is allocated to each active process that includes information such as the user and group identification numbers to determine file access privileges.

A) process

B) subtext

C) user

D) database

Q2) The command,____ ,will copy the contents of chapt1 and chapt2 into a file named section_a.

A) section_a = chapt1 + chapt2

B) cp chapt1 section_a, cp chapt2 section_a

C) cat chapt1 chapt2 > section_a

D) ls chapt1, chapt2, section_a

Q3) A ____ may occur if an event happens during the process's transition between deciding to wait for the event and entering the WAIT state.

A) race

B) deadlock

C) starvation event

D) synchronization problem

To view all questions and flashcards with answers, click on the resource link above.

15

Chapter 14: Windows Operating Systems

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/39168

Sample Questions

Q1) In a Windows device driver,the ____ is used by the I/O Manager to communicate with the driver when it generates an IRP after an I/O request.

A) initialization routine

B) dispatch routine

C) start I/O routine

D) unload routine

Q2) Windows is a non-preemptive multitasking,multithreaded operating system.

A)True

B)False

Q3) To accommodate the various needs of its user community,and to optimize resources,the Windows team identified the following design goals:____.

A) extensibility, portability, reliability, compatibility, and performance

B) security, portability, reliability, and performance

C) security, expandability, compatibility, and cost-effectiveness

D) portability, interoperability, and performance

Q4) Much of Windows is written in assembly language,a programming language that's standardized and readily available.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 16

Chapter 15: Linux Operating Systems

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/39169

Sample Questions

Q1) The name Linux is a contraction of Linus and UNIX.

A)True

B)False

Q2) A page's middle directory contains a pointer to the actual page frame.

A)True

B)False

Q3) In Linux,the three levels of file access are ____,____,and ____.

A) owner; domain; group

B) owner; group; administrator

C) administrator; owner others

D) owner; group; others

Q4) ____ management is designed to replace or change parts of the operating system that need to be enhanced or replaced.

A) OS

B) Patch

C) VFS

D) Kernel

Q5) Filenames are not case sensitive in Linux.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 17

Chapter 16: Android Operating Systems

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/39170

Sample Questions

Q1) Android is designed to run ____.

A) desktop computers

B) telephones

C) mobile devices

D) laptop computers

Q2) Android divides screen sizes into five size categories.

A)True

B)False

Q3) The ____ state is a formal indication that an activity is terminated and will be removed completely from system memory.

A) Destroyed

B) Stopped

C) Terminated

D) Removed

Q4) An alternative to password protection is Android's pattern recognition tool.

A)True

B)False

Q5) Google purchased Android in 2011.

A)True

B)False

Page 18

To view all questions and flashcards with answers, click on the resource link above.

Turn static files into dynamic content formats.

Create a flipbook