isa module one

17
1. The primary function of CPU is to take care of a. Input, output and Arithmetic and Logical Activities b. Control and Output Activities c. Control and Arithmetic - Logical Activities d. Input and Control Activities Most Appropriate Answer is Control and Arithmetic-logic activities as CPU do not execute Input and output activities. 2. Data in a PC is represented by a. ASCII Code ( Cramming Question) 3. Which of the following device is a random Access Media? a. Magnetic Tape b. DAT c. CD-ROM Most Appropriate Answer is CD-ROM as Magnetic Tape and DAT access the data serially. 4. When the computer is switched on, the system performs some tasks before loading the operating system. Such ROM chips can be classified as a. Hardware b. Software c. Firmware Most Appropriate Answer is Firmware as it contains the features of hardware and software both. 5. One features provided by the OS is to store all the data and program in the auxiliary memory and bring only selective and needed portions into the main memory for processing. The feature is termed as a. Spooling b. Multiplexing c. Caching d. Paging

Upload: jai-prakash-agarwal

Post on 10-Apr-2015

113 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: ISA Module One

1. The primary function of CPU is to take care of

a. Input, output and Arithmetic and Logical Activitiesb. Control and Output Activitiesc. Control and Arithmetic - Logical Activitiesd. Input and Control Activities

Most Appropriate Answer is Control and Arithmetic-logic activities as CPU do not execute Input and output activities.

2. Data in a PC is represented by

a. ASCII Code ( Cramming Question)

3. Which of the following device is a random Access Media?

a. Magnetic Tapeb. DATc. CD-ROM

Most Appropriate Answer is CD-ROM as Magnetic Tape and DAT access the data serially.

4. When the computer is switched on, the system performs some tasks before loading the operating system. Such ROM chips can be classified as

a. Hardwareb. Softwarec. Firmware

Most Appropriate Answer is Firmware as it contains the features of hardware and software both.

5. One features provided by the OS is to store all the data and program in the auxiliary memory and bring only selective and needed portions into the main memory for processing. The feature is termed as

a. Spoolingb. Multiplexingc. Cachingd. Paging

Most Appropriate Answer is paging as when a program is selected for execution, the system brings it into virtual storage, divides it into pages of four kilobytes, and transfers the pages into central storage for execution.

spooling refers to putting jobs in a buffer, a special area in memory or on a disk where a device can access them when it is ready Multiplexing is throwing or catching more than one object at the same time with the same hand.

Page 2: ISA Module One

6. Which of the following is not a function of the kernel of OS?a. To determine which processes are to be executedb. To prepare the access matrix for accessing resourcesc. To allocate quantum of man memory for each and every user.d. To overcome the problem of deadlock.

Most Appropriate Answer is to prepare the access matrix for accessing resources as the main functions of kernel are

Controls and mediates access to HardwareScheduling/allocation of System resources i.e. Memory, CPU, Disk etc.Enforcing Security and ProtectionResponding the user request for services ( system Calls)

A deadlock is a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource

7. In its truest sense, which of the following applications is a real time application?a. Missile Launching systemb. Railway Reservation Systemc. Banking Application.d. Financial Accounting System

Most Appropriate Answer is Missile Launching System as it is the most Instant in all the four.

8. As an IS Auditor, what precautionary method would you suggest to the company when old computers that held confidential data are being disposed offa. Dispose it off to reliable peopleb. Format the diskc. Delete all the files in the diskd. Demagnetize the hard disk

Most Appropriate Answer is (D) Demagnetize the hard disk since this will cause all of the bits to be set to zero thus eliminating any chance of information, which was previously stored on the disk, being retrieved. A mid-level format does not delete information from the hard disk. It only resets the directory pointers. The deletion of data from the disk removes the pointer to the file, but in actual fact leaves the data in place so, with the proper tools, the information can be retrieved. The defragmentation of the disk does not cause information to be deleted, but simply moves it around to make it more efficient to access.

9 Which of the following is not addressed in data and capacity management?

a. Rapid Growth of the volumes of Datab. Rapid Growth in the number of Computer Systems in the organization.c. Effective data backup schemesd. Ensuring 24×7 availability

Most Appropriate Answer is (B) Rapid Growth in the number of Computer Systems in the organization as it has no linkage with the data and capacity management

Page 3: ISA Module One

10. Which is one of the following is the most essential activity for effective capacity planning?

e. Doing the process of liaison with the management and hardware suppliers.f. Talking to the security administrator for incorporating security proceduresg. To perform the process of Disaster Recovery Planning and Business Continuity Planningh. Determine the workload of application.

Most Appropriate Answer is (d) Determine the workload of application.

11 An invitation of Tender does not address which of the following?e. Availability of service personnelf. Application portfolio and Transaction Volumesg. Budget of the projecth. Compatibility of the new system with the existing one

Most Appropriate Answer is (c) Budget of the project

12. Which of the following is the best option with regard to an Information Processing Facility (IPF)?a. High MTBF and Low MTTRb. High MTTR and Low MTBFc. High MTBF and High MTTRd. Low MTBF and Low MTTR

Most Appropriate Answer is (a) High MTBF and Low MTTR as MTBF stands for mean Time before Failure and MTTR stands for Mean Time to repair.

13. Which of the following is not a key concept of object-oriented technology?a. Encapsulationb. Cohesion and couplingc. Polymorphismd. Inheritance

Most Appropriate Answer is (B) Cohesion and coupling as i.e.

Object-oriented technology A general term which describes tools, processes, and programming languages concerned with the development of systems that consist of chunks of data known as objects.

Encapsulation is the process of hiding all of the details of an object that do not contribute to its essential characteristics

Polymorphism is the ability of an object (or reference) to assume (be replaced by) or become many different forms of object.

Inheritance (or delegation) specifies slightly different or additional structure or behavior for an object, and these more specific or additional attributes of an object of a base class (or type) when assuming or becoming an object of a derived class characterizes object-oriented polymorphism. This is a special case of parametric polymorphism, which allows an object (or reference) to assume or become any object (possibly satisfying some implicit or explicit type constraints (parametric type), or a common structure), with this common structure being provided by base classes or types (subclass and subtype polymorphism, respectively).

"Poly" means "many" and "morph" means "form". The homograph polymorphism has many uses in the sciences, all referring to objects that can take on or assume many different forms.

Page 4: ISA Module One

14. Software that translates a program in 2GL to 1GL is:a. Compilerb. Interpreterc. Assemblerd. Editor

Most Appropriate Answer is (C) as it converts Assembly Languages into Machine Language.

- In the computer industry, these abbreviations are widely used to represent major steps or "generations" in the evolution of programming languages.

1GL or first-generation language was (and still is) machine language or the level of instructions and data that the processor is actually given to work on (which in conventional computers is a string of 0s and 1s).

2GL or second-generation language is assembler (sometimes called "assembly") language. A typical 2GL instruction looks like this:

ADD 12,8

An assembler converts the assembler language statements into machine language.

3GL or third-generation language is a "high-level" programming language, such as PL/I, C, or Java. Java language statements look like this:

public boolean handleEvent (Event evt) { switch (evt.id) { case Event.ACTION_EVENT: { if ("Try me" .equald(evt.arg)) {

A compiler converts the statements of a specific high-level programming language into machine language. (In the case of Java, the output is called bytecode, which is converted into appropriate machine language by a Java virtual machine that runs as part of an operating system platform.) A 3GL language requires a considerable amount of programming knowledge.

4GL or fourth-generation language is designed to be closer to natural language than a 3GL language. Languages for accessing databases are often described as 4GLs. A 4GL language statement might look like this:

EXTRACT ALL CUSTOMERS WHERE "PREVIOUS PURCHASES" TOTAL MORE THAN $1000

5GL or fifth-generation language is programming that uses a visual or graphical development interface to create source language that is usually compiled with a 3GL or 4GL language compiler. Microsoft, Borland, IBM, and other companies make 5GL visual programming products for developing applications in Java, for example. Visual programming allows you to easily envision object-oriented programming class hierarchies and drag icons to assemble program components.

15. if a program is written using mnemonics and op-codes then the program is in

Page 5: ISA Module One

a. Machine Languageb. Assembly Level Languagec. Procedural Languaged. Non- Procedural Language

Most Appropriate Answer is (B) assembly language

In an assembly language program the instructions are written using mnemonic codes and symbolic addresses.

16. Which of the following tool would be used when program coding has to be done?

a. Compilerb. Editorc. Loaderd. Linker.

Most Appropriate Answer is (B) Editor

17. Which of the following is false with respect to system software’s?a. Provides Facilities for debugging systemsb. Provides facilities to optimally use the resources of the systemc. Provides software for cryptographic purposed. Provides facilities to manage users connected to the system

Most Appropriate Answer is (C) Provides software for cryptographic purpose

Functions of System Software

All operating systems must handle the same basic tasks. These functions can be divided into three groups:

Page 6: ISA Module One

Allocating System Resources

The operating system directs the traffic inside the computer, deciding what resources will be used and for how long.

Time Time in the CPU is divided into time slices which are measured in milliseconds. Each task the CPU does is assigned a certain number of time slices. When time expires, another task gets a turn. The first task must wait until it has another turn. Since

time slices are so small, you usually can't tell that any sharing is going on. Tasks can be assigned priorities so that high priority (foreground) tasks get more time slices than low priority (background) tasks.

Memory Memory must be managed also by the operating system. All those rotating turns of CPU use leave data waiting around in buffers. Care must be taken not to lose data!! One way to help out the traffic jam is to use virtual memory. This includes disk space as part of main memory. While it is slower to put data on a hard disk, it increases the

amount of data that can be held in memory at one time. When the memory chips get full, some of the data is paged out to the hard disk. This is called swapping. Windows uses a swap file for this purpose.

Input and output

Flow control is also part of the operating system's responsibilities. The operating system must manage all requests to read data from disks or tape and all writes to these and to printers. 

To speed up the output to printers, most operating systems now allow for print spooling, where the data to be

printed is first put in a file. This frees up the processor for other work in between the times data is going to the printer. A printer can only handle so much data at a time. Without print spooling you'd have to wait for a print job to finish before you can do anything else. With it you can request several print jobs and go on working. The print spool will hold all the orders and process them in turn.

Monitoring System Activities

System performance

A user or administrator can check to see whether the computer or network is getting overloaded. Changes could be made to the way tasks are allocated or maybe a shopping trip is in order! System performance would include response time ( how long it takes for the computer to respond

when data is entered) and CPU utilization (comparing the time the

Page 7: ISA Module One

CPU is working to the time it is idle.)

System security

Some system security is part of the operating system, though additional software can add more security functions. For multiple users who are not all allowed access to everything, there must be a logon or login procedure where the user supplies a user name or ID and a secret password. An administrator must set up the permissions

list of who can have access to what programs and what data.

File and Disk Management

Keeping track of what files are where is a major job. If you can't find a file, it doesn't help to know that it is safe and secure somewhere. So an operating system comes with basic file management commands. A user needs to be able to create directories for storing files. (Dumping everything in one pile soon becomes the needle-in-the-haystack story.) A user needs to copy, move, delete, and rename files. This is the category of operating system functions that the user actually sees the most.

A more technical task is that of disk management. Under some operating systems your hard disk can be divided up, or partitioned into several virtual disks. The operating system treats each virtual disk as though it were a physically separate disk. Managing several physical and/or virtual disks can get pretty complex, especially if some of the disks are set up with different operating systems. (Some folks are never satisfied with just one of anything!)

18. Which of the following is not a job scheduling algorithm?

a. Round Robinb. Demand Pagingc. Shortest Set Up Timed. Jobs with a Red Tag.

The Most Appropriate answer is (B) Demand Paging

A job scheduler is a program that enables an enterprise to schedule and, in some cases, monitor computer "batch" jobs (units of work, such as the running of a payroll program). A job scheduler can initiate and manage jobs automatically by processing prepared job control language statements or through equivalent interaction with a human operator. Today's job schedulers typically provide a graphical user interface and a single point of control for all the work in a distributed network of computers.

Some features that may be found in a job scheduler include:

Continuously automatic monitoring of jobs and completion notification Event-driven job scheduling

Page 8: ISA Module One

Performance monitoring Report scheduling

Scheduling disciplines

Scheduling disciplines are algorithms used for distributing resources among parties which simultaneously and asynchronously request them. Scheduling disciplines are used in routers (to handle packet traffic) as well as in operating systems (to share CPU time among threads and processes).

The main purposes of scheduling algorithms are to minimize resource starvation and to ensure fairness amongst the parties utilizing the resources.

Common scheduling disciplines

The following is a list of common scheduling practices and disciplines:

Borrowed-Virtual-Time Scheduling (BVT) Completely Fair Scheduler (CFS) Critical Path Method of Scheduling Deadline-monotonic scheduling (DMS) Deficit round robin (DRR) Dominant Sequence Clustering (DSC) Earliest deadline first scheduling (EDF) Elastic Round Robin Fair-share scheduling First In, First Out (FIFO), also known as First Come First Served (FCFS) Gang scheduling Genetic Anticipatory Highest response ratio next (HRRN) Interval scheduling Last In, First Out (LIFO) Job Shop Scheduling (see Job shops) Least-connection scheduling Least slack time scheduling (LST) List scheduling Lottery Scheduling Multilevel queue Multilevel Feedback Queue Never queue scheduling O(1) scheduler Proportional Share Scheduling Rate-monotonic scheduling (RMS) Round-robin scheduling (RR) Shortest expected delay scheduling Shortest job next (SJN) Shortest time remaining (STR) Staircase Deadline scheduler (SD) [1] "Take" Scheduling Two-level scheduling Weighted fair queuing (WFQ) Weighted least-connection scheduling

Page 9: ISA Module One

Weighted round robin (WRR) Group Ratio Round-Robin : O(1) [2]

19. Which of the following provide complete information about a database?a. Database Modelb. The Internal Schema of Databasec. Data Dictionaryd. Database Views

The Most Appropriate answer is (C) Data Dictionary

In database management systems, a file that defines the basic organization of a database. A data dictionary contains a list of all files in the database, the number of records in each file, and the names and types of each field. Most database management systems keep the data dictionary hidden from users to prevent them from accidentally destroying its contents.

Data dictionaries do not contain any actual data from the database, only bookkeeping information for managing it. Without a data dictionary, however, a database management system cannot access data from the database.

20. Which of the following is not considered as a method for data representation in DBMS?a. Hierarchical Modelb. Indexed Sequential Modelc. Network Modeld. Relational Modele.

The Most Appropriate answer is (B) Indexed Sequential Model

A Computer Database is a structured collection of records or data that is stored in a computer system. The structure is achieved by organizing the data according to a database model. The model in most common use today is the relational model. Other models such as the hierarchical model and the network model use a more explicit representation of relationships.

21. Which of the following statement about a DBMS is Incorrecta. Data Redundancy is minimizedb. Application Share Datac. Provides the logic to solve a problem in an applicationd. Provides facilities to access & store data which is accessed by users.

The Most Appropriate answer is (C) Provides the logic to solve a problem in an application

Functions of a DBMS

The functions performed by a typical DBMS are the following:

Data Definition

The DBMS provides functions to define the structure of the data in the application. These include defining and modifying the record structure, the type and size of fields and the various constraints/conditions to be satisfied by the data in each field.

Data Manipulation

Page 10: ISA Module One

Once the data structure is defined, data needs to be inserted, modified or deleted. The functions which perform these operations are also part of the DBMS. These function can handle planned and unplanned data manipulation needs. Planned queries are those which form part of the application. Unplanned queries are ad-hoc queries which are performed on a need basis.

Data Security & Integrity

The DBMS contains functions which handle the security and integrity of data in the application. These can be easily invoked by the application and hence the application programmer need not code these functions in his/her programs.

Data Recovery & Concurrency

Recovery of data after a system failure and concurrent access of records by multiple users are also handled by the DBMS.

Data Dictionary Maintenance

Maintaining the Data Dictionary which contains the data definition of the application is also one of the functions of a DBMS.

Performance

Optimizing the performance of the queries is one of the important functions of a DBMS. Hence the DBMS has a set of programs forming the Query Optimizer which evaluates the different implementations of a query and chooses the best among them.

Thus the DBMS provides an environment that is both convenient and efficient to use when there is a large volume of data and many transactions to be processed.

22. The data base administrator is not responsible for which one of the following functions?a. Physical design of a databaseb. Security of a databasec. Coordinate and resolve conflicting needs and desires of users in their diverse

application areasd. Logical design of a database.

The Most Appropriate answer is (D) Logical design of a database

23. SQL is an example fora. 1GLb. 2GLc. 3GLd. 4GL

The Most Appropriate answer is (D) 4GL

24. The process of Database tuning is carried out bya. Data administratorb. Database Administratorc. Application Programmerd. System Programmer

Page 11: ISA Module One

The Most Appropriate answer is ( B) Database Administrator

25. Which of the following is not within the scope of DBA?a. Defining the conceptual schemab. Performing the task of data Tuningc. Determine the storage capacity for applicationsd. Granting and revoking the rights of Users

The Most Appropriate answer is (A) Defining the conceptual schema

Database administrator (DBA) is a person who is responsible for the environmental aspects of a database. In general, these include:

Recoverability - Creating and testing Backups Integrity - Verifying or helping to verify data integrity Security - Defining and/or implementing access controls to the data Availability - Ensuring maximum uptime Performance - Ensuring maximum performance Development and testing support - Helping programmers and engineers to efficiently utilize the

database.

The role of a database administrator has changed according to the technology of database management systems (DBMSs) as well as the needs of the owners of the databases. For example, although logical and physical database design are traditionally the duties of a database analyst or database designer, a DBA may be tasked to perform those duties.

Duties

The duties of a database administrator vary and depend on the job description, corporate and Information Technology (IT) policies and the technical features and capabilities of the DBMS being administered. They nearly always include disaster recovery (backups and testing of backups), performance analysis and tuning, data dictionary maintenance, and some database design.

Some of the roles of the DBA may include

Installation of new software — It is primarily the job of the DBA to install new versions of DBMS software, application software, and other software related to DBMS administration. It is important that the DBA or other IS staff members test this new software before it is moved into a production environment.

Configuration of hardware and software with the system administrator — In many cases the system software can only be accessed by the system administrator. In this case, the DBA must work closely with the system administrator to perform software installations, and to configure hardware and software so that it functions optimally with the DBMS.

Security administration — Ones of the main duties of the DBA is to monitor and administer DBMS security. This involves adding and removing users, administering quotas, auditing, and checking for security problems.

Page 12: ISA Module One

Data analysis — The DBA will frequently be called on to analyze the data stored in the database and to make recommendations relating to performance and efficiency of that data storage. This might relate to the more effective use of indexes, enabling "Parallel Query" execution, or other DBMS specific features.

Database design (preliminary) — The DBA is often involved at the preliminary database-design stages. Through the involvement of the DBA, many problems that might occur can be eliminated. The DBA knows the DBMS and system, can point out potential problems, and can help the development team with special performance considerations.

Data modeling and optimization — By modeling the data, it is possible to optimize the system layouts to take the most advantage of the I/O subsystem.

Responsible for the administration of existing enterprise databases and the analysis, design, and creation of new databases.

→ Data modeling, database optimization, understanding and implementation of schemas, and the ability to interpret and write complex SQL queries→ proactively monitor systems for optimum performance and capacity constraints→ Establish standards and best practices for SQL→ Interact with and coach developers in Structured mark up language scripting

26. An organization decides to migrate from conventional file system to a DBMS. Which of the following function will increase on account of such migrationa. Programming Errorsb. Data Entry Errorsc. Improper File Accessd. Loss of Parity

The Most Appropriate answer is (B) Improper File Access as in conventional file system access is somehow restricted but in DBMS environment it is not there.

27. DBMS is a software package used to create access and maintain a database. The sub language of a DBMS that define a database is:a. Data description Languageb. Data Manipulation languagec. Data control languaged. Data access language

The Most Appropriate answer is ( B) Database Administrator

28. Decision support system (DSS) supports which of the following?a. Structured Problemsb. Semi-Structured Problemsc. Un-Structured Problemsd. Problems that focuses on exceptional reporting

The Most Appropriate answer is (B) Semi-Structured Problems

Page 13: ISA Module One

Decision Support Systems – DSS (definition)

Decision Support Systems (DSS) are a specific class of computerized information system that supports business and organizational decision-making activities. A properly designed DSS is an interactive software-based system intended to help decision makers compile useful information from raw data, documents, personal knowledge, and/or business models to identify and solve problems and make decisions.

Typical information that a decision support application might gather and present would be:

Accessing all of your current information assets, including legacy and relational data sources, cubes, data warehouses, and data marts

Comparative sales figures between one week and the next Projected revenue figures based on new product sales assumptions The consequences of different decision alternatives, given past experience in a context that is

described

29. With regard to a DSS, which of the following statements are true?a. It deals with semi-structured problemsb. It tackles problems with uncertaintyc. Permits “what-if” analysis

i. A and Bii. B and Ciii. A and Civ. A,B and C

The Most Appropriate answer is (iii) A and C

30. Middleware is implemented by:a. Server Monitorb. Transaction processing monitorc. CPU Utilization Monitord. Network connectivity monitor

The Most Appropriate answer is (B) Transaction processing Monitor