You are on page 1of 15

Second Term

1. Revision
2. The Art of Information processing
3. Process of Information Transmission 1
4. Process of Information Transmission 2
5. Medium of Information Transmission
6. Mid Term Break
7. Computer Ethics
8. Safety Measures
9. Operating System 1
10.Operating System 2
11.Revision
12.Examination

WEEK 1 – 4
THE ART OF INFORMATION PROCESSING / PROCESS OF INFORMATION
TRANSMISSION 1/ PROCESS OF INFORMATION TRANSMISSION 2 /
MEDIUM OF INFORMATION TRANSMISSION

1. _______ is the change of information in any manner detectable by an observer


(a) information processing (b) collation (c) chart (d) information analysis
2. Classification is concerned with arranging information into __________ (a) categories
(b) logical categories (c) collations (d) charts
3. A _________ is a type of diagram or graph that organizes and represents a set of
numerical or quantitative data (a) maps (b) data charts (c) graphs (d) histogram
4. ________ is a telecommunication device that transmit and receives sound, most
commonly the human voice (a) telephone (b) radio (c) television (d) satellite
5. Information processing can be parallel only (a) true (b) false (c) true and false (d) none
of these
6. Information represented digitally in two-state form is often referred to as digital
information (a) false (b) true (c) true or false (d) none of these
7. In any collection, physical objects are related by order (a) true (b) false (c) all of these
(d) none of these
8. Cable communication refers to the transmission of data over a IR-based communication
technology (a) true (b) false (c) true or false (d) none of these
9. Intrinsic properties of the objects are (a) size (b) weight (c) colour (d) all
the above
10. Data that presents percentages in different groups (a) line chart (b) bar chart (c) pie
chart (d) OHLC chart
11.Transmission of signals through free space by modulation of electromagnetic waves
with frequencies below those of visible light (a) newspaper (b) radio (c) TV (d) Satellite
12. Microwave communication is a (a) wireless communication (b) long-range line-of-
sight via highly directional antennas (c) Short-range communication (d) all the above
13. The science of evaluating information content and refining information to build
portfolios (a) collation (b) collection (c) information processing (d) information analysis
14. A graphical representation of data is _______ (a) chart (b) newspaper (c) phone
(d) pie chart
15. Information processing may be sequential and ________ (a) organized (b) parallel
(c) collated (d) centralized
16. The transfer of information between two or more points that are physically not
connected is (a) wireless communication (b) cable communication (c) communication
satellite (d) microwave communication
17. _____ is the assembly of written information into standard order (a) collation
(b) categorization (c) classification (d) synchronization
18. ______ supports a wide variety of other services such as text messaging, MMS, email,
Internet access (a) mobile phones (b) television (c) radio (d) camera
19. A _______ is a regularly scheduled publication containing news of current events,
informative articles, diverse features and advertising (a) newsletter (b) newspaper (c)
news publication (d) news casting
20. The following are advantages of satellite communication over terrestrial
communication EXCEPT (a) the coverage area of a satellite greatly exceeds that of a
terrestrial system (b) satellite to satellite communication is very precise (c) Higher
bandwidths are available for use (d) launching satellite into orbit is costly
(Question 1-20: A textbook of Data Processing SSS 1; Adedapo F.O. and Mitchell A.S.
Page 33 – 42)
21. During the __________ portion of the Information Processing Cycle, the computer
acquires data from some source. (A). Processing (B). Output (C). Input (D). Storage
22.. The information processing cycle includes the following processes:
A. Input, processing, output, storage B. Input, output, manipulation, arithmetic
C. Data, processing, printing, editing D. Storage, display, data, information
(Question 21 and 22 https://www.proprofs.com/quiz-school/story.php?
title=information-processing-cycle_1)
23. The information process that is carried out by a scanner is:
(a) Analyzing (b) collecting (c) storing and retrieving (d) displaying
24. An “annual report” is an example of which process in an information system?
(a) Analyzing (b) transmitting and receiving (c) storing and retrieving (d) displaying
25. What information process would be involved in saving information to a floppy disk?
(a) organizing (b) displaying (c) transmitting and receiving (d) storing and retrieving
26. Which conversion method involves the most work for participants, as they have to
operate both systems at the same time? (a) pilot (b) parallel (c) direct (d) phased
27. In which stage of the system development cycle are data flow diagrams used?
(a) Making decisions (b) designing solutions (c) implementing (d) testing, evaluating and
maintaining
28. An information system peripheral device commonly used at a supermarket checkout
terminal to input the prices of goods is called a:
(a) Paper tape printer (b) bar code reader (c) laser disk (d) punched card reader
29. Information is valuable if it is:
(a) Checked every 6 months to see if it is up to date (b) collected regularly
(c) Entered into the computer on time (d) organized in a way to meet the needs of an
information system
30. The best computer application to use to draw a chart showing the relationship between
numerical data would be a: (a) desktop publisher (b) spreadsheet (c) word processor (d)
database
(Question 23 -30 https://www.google.com/url?client=internal-element-
cse&cx=partner-pub-8961906305385187:9609974552&q=https://study.sagepub.com/
banyard3e/student-resources/chapter-5/multiple-choice-
questions&sa=U&ved=2ahUKEwib3a3h9c_uAhWIERQKHWY5AF0QFjADegQIBx
AB&usg=AOvVaw2LPxeKUHod88DD0Ew7aavw)
31. Transmission media are directly controlled by the
A. physical layer
B. data link layer
C. network layer
D. session layer
32. Guided media provides a conduit from one device to another, includes
A. twisted pair cable
B. fiber optic cable
C. coaxial cable
D. all of above
33. In telecommunications, transmission media can be divided into
A. four broad categories
B. three broad categories
C. two broad categories
D. five broad catagories
34. Which one of the following is Unguided medium?
A. twisted pair cable
B. coaxial cable
C. fiber optic cable
D. free space
35. Radio waves are
A. unidirectional
B. omnidirectional
C. bidirectional
D. directional
36. Unguided signals can travel from the source to destination in
A. one way
B. two ways
C. three ways
D. four ways
(https://mcqslearn.com/cs/computer-networks/mcq/transmission-media-multiple-
choice-questions-answers.php)
37. Which transmission media has the highest transmission speed in a network?
a. coaxial cable
b. twisted pair cable
c. optical fiber
d. electrical cable
38. Which data communication method is used to transmit the data over a serial
communication link?
a. Simplex
b. Half-duplex
c. Full duplex
d. All of above
39. The method of communication in which transaction takes place in both directions,but
only in one direction at a time, is called ?
a. Simplex
b. Four wire circuit
c. Full duplex
d. Half-duplex
40. Which of the following devices modulates digital signals into analog signals that can be
sent over traditional telephone lines?
a. Router
b. Gateway
c. Switch
d. Modem
41. Which of the following performs modulation and demodulation?
a. fiber optics
b. switch
c. modulator
d. modem
42. The process of converting analog signals into digital signals so they can be processed
by a receiving computer is referred to as
a. modulation
b. demodulation
c. synchronizing
d. digitising
43. Which of the following communication modes support two-way traffic but in only one
direction at a time?
a. simplex
b. half duplex
c. three-quarters duplex
d. none of the above
44. Which of the following is considered a broadband communication channel?
a. coaxial cable
b. fiber optics cable
c. microwave circuits
d. all of above
45.Which of the following is not a transmission medium?
a. telephone lines
b. coaxial cables
c. modem
d. microwave systems
46. Which of the following is an advantage to using fiber optics data transmission?
a. resistance to data theft
b. fast data transmission rate
c. low noise level
d. all of above
47. Which of the following communications lines is best suited to interactive processing
applications?
a. narrow band channel
b. simplex lines
c. full duplex lines
d. mixed band channels
48. In _______ transmission, bits are transmitted simultaneously, each across its own wire.
a. Asynchronous serial
b. Synchronous serial
c. Parallel
d. (a) and (b)
49. In _______ transmission, bits are transmitted over a single wire, one at a time.
a. asynchronous serial
b. synchronous serial
c. parallel
d. (a) and (b)
50. The copper wire is the example of
a. Unguided media
b. Guided media
c. Group media
d. None
51. cable consists of two insulated copper wires twisted together.
a. Coaxial
b. Fiber-optic
c. Twisted-pair
d. none of the above
(https://compsciedu.com/mcq-questions/Networking/Transmission-Media/2)
52. Which transmission media has the highest transmission speed in a network?
A. coaxial cable
B. twisted pair cable
C. optical fiber
D. electrical cable
53. Bits can be sent over guided and unguided media as analog signal by
A. digital modulation
B. amplitude modulation
C. frequency modulation
D. phase modulation
54. Which data communication method is used to transmit the data over a serial
communication link?
A. Simplex
B. Half-duplex
C. Full duplex
D. All of above
55. Which of the following performs modulation and demodulation?
A. fiber optics
B. switch
C. modulator
D. modem
56. In fiber optics, the signal is _______ waves.
A. light
B. radio
C. infrared
D. very low frequency
57. Which of the following is not a guided medium?
A. twisted-pair cable
B. coaxial cable
C. fiber-optic cable
D. atmosphere
58. Transmission media lie below the _______ layer.
A. physical
B. network
C. transport
D. application
59. Twisting in a twisted-pair help reduce the __________.
A. length
B. cost
C. noise
D. None of the choices are correct
60. In electromagnetic spectrum for wireless communication, reserved range for Radio
waves and microwaves is known as
A. ground propagation
B. sky propagation
C. line-of-sight propagation
D. None
61. Radio waves, micro- waves and infrared waves are types of
A. wireless transmission
B. guided transmission
C. both a and b
D. None
62. In fiber optics, the signal is _______ waves.
A. light
B. radio
C. infrared
D. very low frequency
(https://quizizz.com/admin/quiz/5c6a054ed44cd6001a463205/transmission-media)
63. Organization, distribution and manipulation of information is classified as
A. data manipulating
B. process selection
C. information extraction
D. information processing
64. Set of operations carried on to process gathered data is called
A. information technology
B. information cycle
C. data processing cycle
D. information
65. Process of converting data or information into the form which is readily available for
processing is called
A. encoding
B. decoding
C. translating
D. data organization
66. Various operations that are carried on the data while processing includes
A. calculation
B. analysis
C. manipulation
D. all of above
67. Application which is used to transmit data between a computer and user or between
more than two computers is called
A. data transmission
B. data communication
C. standardized input
D. standardized output
68. Process of converting data into a form that can be easily understand by people
A translating
B. data organization
C. encoding
D. decoding
69. Equipment and programs used to process raw data into the information are termed as
A. information
B. information technology
C. information processes
D. raw data
70. Process of gathering data for an application and make it ready for processing is called
A. data collection
B. data capture
C. source documents
D. primary documents
71. Computer peripheral which automatically inputs the data is an example of
A. data capture
B. data sourcing
C. data scoring
D. data determining
72. Process of arranging the data into a new order is called
A manipulation
B. standardization
C. documentation
D. analyzation
73. Original document or piece of paper which is written to record data for first time is
called
A. source data
B. primary document
C. secondary document
D. none of the above
74. Document which is considered output after processing and by adding more data to this
output it can be used as input is termed as
A. source data
B. capturing data
C processing data
D. turnaround documents
75. Documents or files that are especially prepared for operating systems are classified as
A. input card
B. source documents
C. index card
D. output card
76. Arranging the customers names in ascending order is an example of
A. process
B. information processing
C. process
D. information
77. Data which is encoded on to a specific medium and computer can accept that data
through input devices is called
A. data preparation
B. organizing data
C. sorting data
D. manipulating data
78. Process of sending data from one place to another is called
A. collecting information
B. preparing data
C. data transmission
D. standardized output
79. Cards that can be stored in any filling cabinet to get an easy access to data are called
A. index card
B. source card
C. input card
D. output card
80. Any knowledge item that can be expressed in numbers or words is called
A processing
B. information
C. fact
D. organization
(https://mcqslearn.com/intro/computers/mcq/information-processing-multiple-choice-
questions-answers.php?page=3)

THEORY
1. Explain the following terms
i. Information Transmission
ii. Information analysis
iii. Information processing
iv. Digital information (8 Marks)
2. Compare wireless and cable communication (6 Marks)
3. List and explain 5 ancient methods of transmitting information (10 Marks)
4. State and explain 5 modern methods of transmitting information (10 Marks)
5. List and explain 2 means of transmitting information with 2 examples each (10
Marks)
6. Explain the 3 modes of receiving information (6 Marks)
(WABP Information and Communications Technology for JSS 1 by Olatunde Akano
et al, Page 88)
7. What is chart (5 Marks)
8. How does a radio carry information (10 Marks)
9. What is the use of a cell phone (10 Marks)
10.How are maps and charts related (10 Marks)
11.What does collation refer to? (10 Marks)
12.What is the use of a TV? (10 Marks)
13.What is COMMSAT? (10 Marks)
14.What all can you find in a newspaper (10 Marks)
(Data Processing textbook for SS1 by Adedapo F.O Page 124)
15.Define printing as a means of information transmission (10 Marks)
16.Describe the use of a computer in information transmission (10 Marks)
17.What is an electronic device? give 5 examples (10 Marks)
18.What are non-electronic devices? List 5 examples (10 Marks)
(Questions 14 – 17 is from Basic Science & Technology, Information Technology:
Textbook JSS1 by A.S. Omotuyole Page 32)

WEEK 5
COMPUTER ETHICS
1. All of the followings are ways of taking care of computer except…………
(a) Making use of a stabilizer (b) Ensure that the computer is covered when not is use
(c) An engineer should be called to repair the fault (d) The computer should be moved up
and down
2. Stabilizer should be used in order to prevent high current voltage when using computer
(a) True (b) False (c) True & false (d) None of the above
3. Computer room management ethics include the following except
(a) Maintaining dust free environment (b) Appropriate ventilation (c) Appropriate lighting
system (d) Appropriate darkness system
4. The following must not be brought into the computer room except
(a) Water and Food (b) Appropriate ventilation (c) Appropriate lighting system
(d) Appropriate darkness system
(Basic Science & Technology; Information Technology Workbook Page 21 Q1-4)
5. Computers are very sensitive to the following except ________ (a) Dust (b) Humidity
(c) Noise making (d) Power supply
6. Among computer ethics is the use of rug, this is done in order to (a) Reduce ventilation
(b) Increase coolness (c) Prevent theft (d) Suppress dust
7. A set of moral principles that regulates the use of computer is called ________ (a) Use
of computer (b) Computer ethics (c) Computer problem (d) Computer core
8. The following are computer ethics except ________ (a) Avoid liquid dropping unto the
system (b) Using dust cover (c) Checking email regularly (d) Invasion of privacy
9. Another name for computer room is __________ (a) Computer laboratory (b) Computer
library (c) Computer store (d) Computer house
10. Computer room must not be used for _________ (a) Teaching (b) Learning (c)
Researching (d) Resting
11. Computer system comprises of the following except ________ (a) Hardware (b) People
ware (c) Software (d) Share ware
12. Rules in the computer room are the following except ________ (a) Arranging chairs in
a comfortable way (b) Use dust cover to cover the system (c) Do not put computer on the
floor (d) Use wet towel to clean the computer
13. The ethical issues that concerns the collection and the use of data about individuals is
called ________ (a) Behavior (b) Identification (c) Information (d) Privacy
14. __________ is a program used to prevent virus or remove virus from a computer
system (a) Microsoft word (b) Anti- virus (c) Virus (d) Operating system
15. Which of the following would be considered as an ethical access to computer?
(a) Changing your grades from the schools main office (b) Using the computer catalogue to
search for book (c) Reading confidential information from a government database
(d) Changing misspelt words on the schools website
16. An honest moral code that should be followed while using the computer is _________
(a) Safety measures (b) Computer ethics (c) Moral laws (d) Computer roles
17. For the Safety of computer operators, you must do the following except _________
(a) Illuminating the computer room (b) Maintaining dust free environment (c) Keep liquid
in the computer room (d) Sit in a correct posture while using the system
18. The use of _________ will protect the computer against power problems (a) Network
(b) UPS (c) ICT (d) Internet
19. __________ refers to the necessary precautions taken when using the system
(a) Morals (b) Safety measures (c) Computer ethics (d) Network
20. All the following are examples of real security and privacy except________
(a) Hackers (b) Identity theft (c) Virus (d) spam
(Basic Science & Technology; Information Technology Textbook Page17 Q5-20)
(THEORY)
1. List 5 ways of taking good care of computers (10 Marks)
2. State 5 rules and regulations in the computer room (10 Marks)
3. Mention 4 reasons for appropriate use of the computer (8 Marks)
4. What is computer ethics (2 Marks)
(WABP Information and Communications Technology for JSS 1 by Olatunde Akano
et al, Page 88)
5. What is spam and phishing
6. What is the importance of dust free environment
(Data Processing textbook for SS1 by Adedapo F.O Page 124)

WEEK 6
SAFETY MEASURES
1. How can you keep your computer and other devices safe from harm? (a) Eat snacks and
have drinks beside your computer (b) Use your laptop as a table for food and drink (c) Use
your computer in a workspace away from food and drink (d) Grab your device with one
hand to move it around. 
2. What should you do if someone other than a parent asks for your computer password?
(a) Give it to them if they seem trustworthy. (b) Do not give them your password.
(c) Give it to them, but then change your password the next day.
(d) Give them someone else's password instead.
3. Where should you go to control the types of websites you can go to online?
(a) Bookmarks (b) Settings (c) Browser history (d) Tools
(Question 1-3; https://study.com/academy/practice/computer-safety-quiz-worksheet-
for-kids.html)
4. A small piece of computer code that can repeat itself and spreads from one computer to
another by attaching itself to another computer file. (a) Virus (b) Worms (c) Spyware (d)
Ransom ware
5. Self- repeating and do not require a computer program to attach themselves
(a) virus (b) Worms (c) Spyware (d) Ransomware
6. _______ can be installed on the computer automatically when the attachments are open,
by clicking on links or by downloading infected software (a) virus (b) Worms (c) Spyware
(d) Ransom ware
7. A type of malicious program that demands payment after launching a cyber-attack on a
computer system (a) virus (b) Worms (c) Spyware (d) Ransomware
8. Trojan is one of most common (a) virus (b) Worms (c) Spyware (d) Ransom ware
9. A type of computer crime used to attack, steal user data, including login name, password
and credit card numbers (a) Phishing (b) Pharming (c) Man-in-the-middle attack
(d) Cookies
10. A scamming practice in which malicious code is installed on a personal computer or
server, misdirecting users to fraudulent web sites without their knowledge or permission.
(a) Phishing (b) Pharming (c) Man-in-the-middle attack (d) Cookies
11. An attack where the attacker secretly relays and possibly alters the communication
between two parties who believe they are directly communicating with each other (a)
Phishing (b) Pharming (c) Man-in-the-middle attack (d) Cookies
12. Which of the following deals with procedures, practices and values? (a) Piracy (b)
programs (c) virus (d) computer ethics
13. Commercial programs made available to the public legally are known as (a) freeware
(b) wares (c) free soft (d) software
(Question 4-13; http://aptitude.brainkart.com/topic/chapter-17--computer-ethics-and-
cyber-security-314/)
14. Which one is not a social media website? (a). Facebook (b) Pinterest
(c) Google (d) Twitter
15. Which one is not an act of software piracy?
(a). Buy your own licensed copy of software.
(b). Make a copy of the licensed software and distribute it to others.
(c). Buy only one copy of software but install it in more than one computer.
(d). Give your friend a copy of the music CD you bought online.
16. Which one is the safety measure for children to be taken while working online?
(a). Don’t buy anything online without your parent’s permission.
(b). Don’t respond to any message that makes you feel uncomfortable.
(c). Acknowledge the online information used in your school assignments/projects.
(d). All of these.
17. Which one is not a cybercrime?
(a). Peep into someone else’s computer when he is entering e-mail password
(b). Unauthorized access to information (c). Steal a brand new computer
(d). Send hate messages to your friend
18. You should take parents’ permission: (a) to share your password (b) to
post personal videos or photos. (c) to buy anything online (d) All of these.
(Question 14-18; https://www.happycompiler.com/ethics-safety/)
19. Is the illegal access to the network or computer system.
(a) Security (b) Cracking (c) Virus (d) Piracy
20. Running other software on idle computer without the knowledge of the organization is
called theft of ____ (a) Software (b) Computer (c) Computer time (d) Use
(Question 19-20; https://meritnotes.com/computer-quiz/computer-ethics-quiz/2-6894/)
THEORY
1. State 5 safety measures that needs to be taken when using the computer (5 Marks)
2. What are the security measures you can take to protect the computer room and gadgets?
(10 Marks)
3. Mention some precautions you can take to maintain order and safety in the computer
room (10 Marks)
Comprehensive Computer Studies for Junior Secondary Schools 2 UBE 8. Page 72
(by A. S. Omotuyole)
4. Discuss 5 security measures that should be provided in a computer room (10 Marks)
WABP Information and Communications Technology Textbook for JSS 1 by
Olatunde Akano et al, Page 24.
5. What are the point to be kept in mind while using a computer

(Data Processing textbook for SS1 by Adedapo F.O Page 124)

WEEK 7 & 8
OPERATING SYSTEM
1. Which of the following is not an operating system? (a) Windows (b) Linux (c) Oracle
(d) DOS
2. What is the maximum length of the filename in DOS? (a) 4 (b) 5 (c) 8 (d) 12
3. When was the first operating system developed? (a) 1948(b) 1949 (c) 1950 (d) 1951
4) When were MS windows operating systems proposed? (a) 1994 (b) 1990 (c) 1992
(d) 1985
5) Which of the following is the extension of Notepad? (a) .txt (b) .xls (c) .ppt (d) .bmp
6) What else is a command interpreter called? (a) Prompt (b) kernel (c) shell
(d) command
7) What is the full name of FAT? (a) File attribute table (b) File allocation table (c) Font
attribute table (d) Format allocation table
8) BIOS is used______ (a) By operating system (b) By compiler (c) By interpreter (d) By
application software
9) What is the meaning of Booting in the operating system? (a) Restarting computer
(b) Install the program (c) To scan (d) To turn off
10) When does page fault occur? (a) The page is present in memory. (b) The deadlock
occurs. (c) The page does not present in memory. (d) The buffering occurs.
11) Banker's algorithm is used _________ (a) To prevent deadlock (b) To deadlock
recovery (c) To solve the deadlock (d) none of these
12) When you delete a file in your computer, where does it go? (a) Recycle bin (b) Hard
disk (c) Taskbar (d) none of these
13) Which is the Linux operating system? (a) Private operating system (b) Windows
operating system (c) Open-source operating system (d) None of these
14) What is the full name of the DSM? (a) Direct system module (b) Direct system
memory(c) Demoralized system memory (d) Distributed shared memory
15) What is the full name of the IDL? (a) Interface definition language (b) Interface direct
language (c) Interface data library (d) None of these
16) What is bootstrapping called? (a) Cold boot (b) Cold hot boot (c) Cold hot strap
(d) Hot boot
17) What is the fence register used for? (a) To disk protection (b) To CPU protection
(c) To memory protection (d) None of these
18) If the page size increases, the internal fragmentation also ________ (a) Decreases (b)
Increases (c) Remains constant (d) None of these
19) Which of the following is a single-user operating system? (a) Windows (b) MAC
(c) MS-DOS (d) None of these
20) The size of virtual memory is based on which of the following? (a) CPU (b) RAM
(c) Address bus (d) Data bus
21) If a page number is not found in the translation look aside buffer, then it is known as a?
(a) Translation Look aside Buffer miss (b) Buffer miss (c) Translation Look aside Buffer
hit (d) All of the mentioned
22) Which of the following is not an application software? (a) Windows 7 (b) Word Pad
(c) Photoshop (d) MS-excel
23) Which of the following supports Windows 64 bit? (a) Window XP (b) Window 2000
(c) Window 1998 (d) None of these
24) Which of the following windows does not have a start button? (a) Windows 7
(b) Windows 8 (c) Windows XP (d) None of these
25) Which of the following operating systems does not support more than one program at a
time? (a) Linux (b) Windows (c) MAC (d) DOS
26) Which of the following is a condition that causes deadlock? (a) Mutual exclusion
(b) Hold and wait (c) Circular wait (d) No preemption
27) Who provides the interface to access the services of the operating system?
(a) API (b) System call (c) Library (d) Assembly instruction
28) Where are placed the list of processes that are prepared to be executed and waiting?
(a) Job queue (b) Ready queue (c) Execution queue (d) Process queue
29) Who among the following can block the running process? (a) Fork (b) Read (c) Down
(d) All of these
30) Which of the following does not interrupt the running process? (a) Timer interrupts (b)
Device (c) Power failure (d) Scheduler process
31) What is Microsoft window? (a) Operating system (b) Graphics program (c) Word
Processing (d) Database program
32) Which of the following is group of programs? (a) Accessories (b) Paint (c) Word (d)
All of above
33) Which of the following is an example of a Real Time Operating System?
(a) MAC (b) MS-DOS (c) Windows 10 (d) Process Control
34) Which of the following operating systems do you use for a client-server network?
(a) MAC (b) Linux (c) Windows XP (d) Windows 2000
35) Which windows was introduced to My Computer?
(a) Windows 10 (b) Windows XP (c) Windows 95 (d) Windows 98
36) What type of commands are required to perform various tasks in DOS?
(a) Internal commands (b) External commands (c) Valuable commands (d) Primary
commands
37) What is the number of characters contained in the primary name of the file of MS-
DOS? (a) Up to 8 characters (b) 3 characters (c) Up to 10 characters (d) None of the above
38) Which command is used to fetch a group (.doc) of files that have just been deleted?
(a) Undelete (b) Undelete/all (c) Undelete *.doc (d) All of above
39) Which of the following is system software? (a) Operating system (b) Compiler
(c) Utilities (d) All of the above
40) Which program runs first after booting the computer and loading the GUI?
(a) Desktop Manager (b) File Manager (c) Windows Explorer (d) Authentication
(https://www.javatpoint.com/operating-system-mcq)
THEORY
1. Explain the main purpose of an operating system?
2. What is multitasking?
3. Differentiate internal commands from external commands.
4. What are the advantages of a multiprocessor system?
( https://career.guru99.com/top-50-operating-system-interview-questions/amp/)
5. What is the relationship between operating systems and computer hardware?
6. What is the difference between Job and Process
7. What are the advantages of multiprogramming?
(https://www.tutorialspoint.com/operating_system/os_exams_questions_answers.htm)
8. What is meant by GUI? Name a popular GUI.
9. What purpose does the operating system serve to the computer and the user?
10. What is the difference between copying and moving files and folders?
(https://amitabhsirkiclasses.org.in/operating-system-theory-questions/)

You might also like