CS609 Midterm Solved MCQs PDF

Summary

This document contains solved multiple-choice questions (MCQs) from a midterm exam in a CS609 course covering system programming. The questions cover topics such as operating systems and programming.

Full Transcript

CS609- SYSTEM PROGRAMMING (SOLVED MCQs) FROM MIDTERM PAPERS (1 to 92 TOPICS) [email protected] For More Visit: vulmshelp.com [email protected]...

CS609- SYSTEM PROGRAMMING (SOLVED MCQs) FROM MIDTERM PAPERS (1 to 92 TOPICS) [email protected] For More Visit: vulmshelp.com [email protected] JUNAID MALIK (0304-1659294) AL-JUNAID TECH INSTITUE ALL MCQS ARE CONFIRMED IF ANY ISSUE THE CORRECT ACCORDINGLY 1. Which of the following tasks is not performed by the operating system? ❖ Multitasking ❖ Memory Management ❖ File Management ❖ Hardware repairing 1. Windows operating system allows us to run a huge process in a small memory space due to ❖ Efficient primary memory management ❖ Flexibility naming scheme for resources ❖ High processing speed of processor ❖ Virtual memory management 2. To provide an interface between the user and computer, a system is required which is called_______ ❖ Application software ❖ Operating system ❖ Customized software ❖ Both application and customized software 3. A process-1 in windows operating system can access the momery space of process-2 if _______ ❖ Process-1 has no privilege to access memory space of other processes ❖ Both processes have same ID ❖ Process-1 loaded in the same space as process-2 ❖ Process-1 has privilege to access memory space of other processes. 4. Windows operating system provides a naming scheme for the resources which allows maximum character only ❖ 255 ❖ 16 ❖ 55 ❖ 155 5. DOS was a _______ operating system. ❖ GUI based ❖ Command line 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ Real time ❖ Multitasking 6. API stands for ______. ❖ Application programming interface ❖ Advance programming interface ❖ Application programming integrity ❖ Application programs interoperability. 7. Which operating system was offered by Microsoft that was used prior to windows ❖ LINUX ❖ UNIX ❖ Solaris ❖ Dos 8. Which of the following theme is not consider while introducing the new version of windows? ❖ Enhanced API ❖ Scalability ❖ Performance ❖ Increasing cost 9. Which version of windows is used for mobile devices ❖ Windows ME ❖ Windows CE ❖ Windows vista ❖ Windows server 10.In 2021, which of the following desktop operating systems was widely used in the world market? ❖ Windows ❖ Fedora ❖ Salaris ❖ Linux 11.Using _____ commands can be issued to the system through icons, buttons, shortcuts, sound etc. ❖ Result- driven interface ❖ Graphical user interface ❖ Menu-driven interface only ❖ Command only 12.One of the major causes of windows dominance in PC’s market is its 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ User-friendly GUI ❖ Best security features ❖ Feature of multitasking ❖ Best marketing strategy 13.Which statement is not correct about the windows operating system ❖ It can only be used in desktop system ❖ It supports both 32&64-bit architecture ❖ It supports voice commands ❖ It supports diverse hardware platforms 14.Which statement is incorrect about open source software? ❖ Paid license is required for it use ❖ Changes can be made by the general public ❖ Source code is freely available ❖ It is publicly available 15.Choose the major drawback of a closed source software ❖ Not affordable by the user ❖ Not customizable ❖ Not freely available to download ❖ Neither affordable, customizable, nor freely available for download 16.Example of a closed source software is _______ ❖ Linux ❖ Windows OS ❖ Chrome browser ❖ Fedora 17.A uniform extension is software components is possible in ___ software. ❖ Vender specific ❖ Open source ❖ Community source ❖ Both open and closed 18.A socket on end-point is required only if ❖ Processor tries to write on internal hard disk ❖ Two processes communication over network ❖ A process needs a resource ❖ Process needs to access main memory 19.DWORD data type represents ______ ❖ 32 bit unsigned integer 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ 32 bit signed integer ❖ 16 bit unsigned integer ❖ 16 bit signed integer 20.A software or application can access any windows object ______ ❖ Directly ❖ Directly and through API as well ❖ Through API only ❖ Not directly nor through API 21.Windows datatype LPTSTR ❖ Long pointer to TSTR ❖ Last pointer to TSTR ❖ Last pointer to string ❖ Long pointer to STR 22.Each windows API has a _____ number of parameters. ❖ Fixed ❖ Two ❖ Variable ❖ Four 23.Which statement is true about a multi- threading process? ❖ A process has one or more threads ❖ A process has only one thread ❖ A thread has only one process ❖ A thread can be created without process 24.Windows supports both the 32 and 64-bit source code by _____ ❖ Keeping separate API’s for 32 and 64-bit code ❖ Converting 32-bit into 64-bit code ❖ Converting 64-bit into 32-bit code ❖ Keeping separate compilers for each hardware 25.Windows operating system keeps _____ version of each API ❖ Two ❖ One ❖ Complied ❖ Interpreted 26.Which statement is incorrect about the 32-bit source code? ❖ It runs on 64-bit hardware and can use its all features ❖ It has its own windows API 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ It does not support large disk space ❖ It runs on 64-bit hardware 27.Choose the appropriate advantage of C source code that uses C standard function ❖ Can access advance windows features ❖ Portable source code ❖ Runs on windows platform only ❖ Runs without making system calls to windows API’s. 28.Choose the correct option for a source code that uses only windows API instead of C library functions. ❖ Source code can only access some features of windows ❖ Source code will not remain portable ❖ Source code cannot be complied ❖ Source code is portable 29.Which statement is true about fopen () function in C? ❖ It opens the existing file and not exists it creats a new file ❖ It opens the file only writing ❖ It opens the file only reading ❖ It opens the file only existing 30.fopen() function in C returns ____ if the file is not successfully opened ❖ Zero value ❖ Point to a file ❖ NULL value ❖ Neither NULL nor Zero 31.Open file objects using C library functions are identified by _____ ❖ Pointer to a file structure ❖ Buffer ❖ Handle ❖ Both buffer and handle 32. A successfully read using fread() function in C is indicated by a ____ return value. ❖ Non-negative ❖ Zero ❖ Negative ❖ Boolean 33.What the following C statement represents; FILE *ptr; ❖ Pointer to a file structure ❖ Pointer to a character 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ Pointer to a integer ❖ Pointer to a binary number 34. The return type of readfile() and writefile() is___________. ❖ DROWD ❖ BOOL ❖ HANDLE ❖ INT 35.Which statement is true about createfile() function ❖ DWORD ❖ BOOL ❖ HANDLE ❖ INT 36.Which statement is true about createfile() function ❖ It open the existing file or creating a new file ❖ It is not used for opening a file ❖ It opens or create a file only for generic read ❖ It opens or create a file only for generic write 37.LPWSTR stand for ❖ Last pointer to wide string ❖ Long pointer to wind string ❖ Long pointer with string ❖ Last pointer to string 38. The return type of malloc() function in C can be ❖ Pointer to allocate space or NULL ❖ Linked list ❖ NULL only ❖ An array 39.Which statement is correct about the convenience function? ❖ It does not improve overall performance ❖ It takes considerable time in execution ❖ It performs a small task ❖ A big task is performed a single API 40.UDF stands for ❖ Universal driven format ❖ Universal disk file ❖ Universal driven file 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ Universal disk format 41.Which option is not related to the NT file system ❖ Compression ❖ Encryption ❖ File size limitation ❖ Fault tolerance 42.Which feature of NTFS related to data security? ❖ Large file name mechanism ❖ Encryption ❖ File allocation table ❖ Compression 43.Keeping in view the support for huge fole size, which file system is more favorable? ❖ NTFS ❖ FAT16 ❖ FAT32 ❖ FAT8 44.NTFS stand for ______ ❖ New trend file system ❖ New technology file system ❖ New trend for system ❖ New technology for system 45.Which special symbol can be used in windows filename? ❖ Pipe ❖ Forward slash ❖ Backward slash ❖ Underscore 46.The path name of a remote resource of server starts with ____ symbol. ❖ Forward slash ❖ Pipe ❖ Double back slash ❖ Black slash 47.In the windows file system, which symbol can be used as a path separator? ❖ Pipe symbol ❖ Back slash only ❖ Both forward and backward ❖ Forward slash only 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE 48.The file extension usually contains _____ characters. ❖ 5 to 8 ❖ 2 to 4 ❖ 1 to 2 ❖ 1 to 3 49.In windows file system, the extension and file name is separated by _________. ❖ | ❖ Dot(.) ❖ \ ❖ / 50.The name of windows API used for opening and creating a new file is ❖ CreateFile() ❖ OpenFile() ❖ CreateopenFile() ❖ ReopenFile() 51.The return type of create file() function is. ❖ NULL ❖ A handle to an open file or INVALID_HANDLE_VALUE ❖ INVALID_HANDLE_VALUE ❖ Always handle to run open file object 52.In FILE_SHARE_READ mode, the file is shared for ______ ❖ Concurrent read and write by multiple process ❖ Concurrent read and write by a single process ❖ Concurrent read by single process ❖ Concurrent read by multiple process 53.In the createfile() function, if the same name file already exists when the attributes, create, Always is used to ❖ Delete the existing file and create a new file ❖ Delete the existing file ❖ Over write an existing file ❖ Create an existing file 54.In the createFile() function, which statement is true about open_existing attribute if the file does not exist. ❖ It will create an existing file ❖ It will open some other file insteated of specified file ❖ It will fail to open the new file 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ It will create a new file 55.The windows API ______ is used to read data from a file and store it in a buffer. ❖ Create File() ❖ Copy file() ❖ Read file() ❖ Write file() 56.If the file is not opened in concurrent mode, then ReadFile() API. ReadFile()API starts reading from the ______ ❖ Backup file ❖ Start file ❖ End of file ❖ Current file 57.If we want to read 1000 bytes from a file with ReadFile() function but there are actually only 400 bytes in a file then _______ ❖ Read operation will fail ❖ 400 bytes will be read ❖ 1000 bytes will be read ❖ Exception will be thrown 58.The windows API _______ is used to write data from a better and store it in a file ❖ Create file ❖ Copy file ❖ Read file ❖ Write file 59.The return type of writeFile() function is ❖ BOOL ❖ DWORD ❖ LPDWORD ❖ LPOVERLAPPED 60.A Unicode word consists of ______ bits ❖ 24 ❖ 32 ❖ 16 ❖ 8 61.In Unicode formate, _____ number of character can be encoded. ❖ 2 ❖ 2 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ 2 ❖ 2 62.The latest version of windows supports _______ standard. ❖ ASCII ❖ Unicode ❖ Scan codes ❖ Both ASCII and Unicode 63.TCHAR is a/ an _______ type variable. ❖ ASCII ❖ Generic ❖ Unicode ❖ Both ASCII and Unicode 64._stprintf() is a/ an ______ c library function. ❖ Both ASCII and Unicode ❖ Generic ❖ Unicode ❖ ASCII 65._tcscmp() is _____ function to compare the string ❖ An ASCII ❖ A Unicode ❖ Not a generic ❖ A generic 66.Which one is the correct definition of generic main() function? ❖ int _tmain(int argc, LPTSTR argv[]) ❖ Int main ❖ Int main ❖ Int_main 67.All generic data types are include ____ header file. ❖ ❖ ❖ ❖ 68.All generic functions are include in _____ header file ❖ ❖ ❖ 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ 69.TextOutW() is _____ bit API and it supports ____ standard. ❖ 32,Generic ❖ 32,ASCII ❖ 32,Unicode ❖ 16,Unicode 70.The standard C library function atio() supports _____ ❖ Generic code ❖ Unicode ❖ 128-bit character code ❖ 8-bit character code 71.To switch between 8-bit character code and standard Unicode ____ functions and data type are required. ❖ Generic ❖ Non-generic ❖ Unicode ❖ 8-bit 72.Developing generic code needs extra effort but provides maximum ____ ❖ Productivity ❖ User-friendly look ❖ Chance of errors ❖ Flexibility 73.What is the return value of GetlastError() function? ❖ It returns error code for last error ❖ It returns a formatted message for last error ❖ It takes input message from user and returns ❖ It returns error message for the last error 74.Which windows API is used to return a system error code? ❖ Geterror() ❖ Format message () ❖ Get last error() ❖ Both geterror() and format Message() 75.Which header file includes all the Unicode macros for setting environment of a program? ❖ ❖ ❖ 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ 76.There are _____number of standard I/O devices in a windows system. ❖ Five ❖ Three ❖ Two ❖ Four 77.In a windows system, input ____ and _____ are three standard I/O devices. ❖ Error, correction ❖ Output, display ❖ Display, error ❖ Output, error 78.On execution, HANDLE_GetstHandle(DWORDnst Handle) will return a valid handle in case of ❖ Passing invalid parameters ❖ Success ❖ Exception ❖ Failure 79.STD_INPUT_HANDLE macro contains a variable, CONIN$,which is a/an ______. ❖ Input variable ❖ Default variable ❖ Environment variable ❖ Console variable 80.STD_OUTPUT_HANDLE contains _____ as an environment variable. ❖ CONIN$ ❖ CONOUT$ ❖ CONPRNT$ ❖ CONDIS$ 81.Option () function takes ______ parameters. ❖ 3 ❖ 4 ❖ 5 ❖ Variable 82.Catfile() function takes ______ parameters. ❖ 3 ❖ 5 ❖ 4 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ 2 83.______ empire is considered to be pioneers of encryption as they used basic encryption algorithms to encrypt secret conversation in a war. ❖ Persian ❖ Chines ❖ Roman ❖ Mughal 84.Roman empire use _____ algorithm to encrypt secret conversation. ❖ CTR ❖ Ceaser cipher ❖ Brute force ❖ Cryto graph 85.The text that we are going to encrypt is called ____ test so it is denoted by ❖ Personal, p ❖ Secret, w ❖ Proposed, p ❖ Plain, p 86.We represent that text by the symbol _____ in the encryption formula. ❖ E ❖ B ❖ A ❖ C 87.The formula of ceaser chopper is ______ ❖ C = (E + W)mod26 ❖ E = (P +n) mod27 ❖ E = (D +n)mod27 ❖ C = (P + n) mod26 88.We use MoveFileEx() to ____ the existing file ❖ Copy ❖ Rename ❖ Over write ❖ Delete 89.Which statement is true about hard copy function? ❖ Both the files must not be on same system volume. ❖ Both the files must be in encrypted form ❖ Creates a hard link for copy file 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ Security attributes will apply on new file name 90.deleteFile() function takes _____ parameter. ❖ 4 ❖ 1 ❖ 2 ❖ 3 91.Which of the following API is used for coping a file? ❖ CopyFile(LPCTSTRIPExistingFileName,LPCTSTR IPNewFileName, bool bfailExists); ❖ Char CopyFile(LPCTSTRIPExistingFileName,LPCTSTR IPNewFileName, bool bfailExists); ❖ Bool CopyFile(LPCTSTRIPExistingFileName,LPCTSTR IPNewFileName, bool bfailExists); ❖ String CopyFile(LPCTSTRIPExistingFileName,LPCTSTR IPNewFileName, bool bfailExists); 92.Correct syntax of MoveFile() function is ______ ❖ Bool Move (LIPCTSTR lpNewName, LPCTSTR lpExistingFileName); ❖ Bool Move (LIPCTSTR lpNewName, LPCTSTR lpNewFileName); ❖ Bool MoveFile (LIPCSTR lpExistingFileName, LPCTSTR lpExistingNewName); ❖ Bool Move (bool lpNewName, LIPCTSTR LPCTSTR lpExistingFileName); 93.RemoveDirectory() function takes ______parameter(s) ❖ 1 ❖ 4 ❖ 3 ❖ 2 94.Set currentDirectory() function takes ______ parameter(s) ❖ 2 ❖ 1 ❖ 4 ❖ 3 95.Return type of GetcurrentDirectory() function is () ❖ Int ❖ Bool ❖ String ❖ DWORD 96.createDirectory() function takes _____ parameter(s) 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ 4 ❖ 3 ❖ 1 ❖ 2 97.deleteFiles() function takes ______ parameter(s) ❖ 1 ❖ 4 ❖ 3 ❖ 2 98.Return type of printMsg() function is ______ ❖ DWORD ❖ CHAR ❖ BOOL ❖ WORD 99.Return type of printString() function is ______ ❖ DWORD ❖ CHAR ❖ BOOL ❖ WORD 100. Correct syntax for create console input file is ❖ hln = createFile(_T(“CONOUT$”), GENERIC_READ&NULL, OPEN_ALWAYS, FILE_ATTRIBURT_NORMALNULL); ❖ hln = createFile(_T(“CONOUT$”), GENERIC_READ,1 GENERIC_WRITE,0&NULL, OPEN_ALWAYS, FILE_ATTRIBURT_NORMALNULL); ❖ hln = createFile(_T(“CONIN$”), GENERIC_READ,1 GENERIC_WRITE,0&NULL, OPEN_ALWAYS, FILE_ATTRIBURT_NORMALNULL); ❖ prohln = createFile(_T(“CONIN$”), GENERIC_READ,1 GENERIC_WRITE,0&NULL, OPEN_ALWAYS, FILE_ATTRIBURT_NORMALNULL); 101. consoleprompt() function takes _____ parameter(s) ❖ 2 ❖ 3 ❖ 5 ❖ 4 102. Current syntax of Get currentDirectort() function is _____ 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ lencurDir =GetcurrentDirectory(DIRNAME_LEN,PwdBuffer); ❖ lencurDir =GetcurrentDirectory(DIRNAME_LEN); ❖ lencurDir =GetcurrentDirectory(DIRNAME_LEN); ❖ lencurDir =GetcurrentDirectory(PwdBuffer); 103. Get currentDirectory() function takes _____ parameter(s) ❖ 2 ❖ 3 ❖ 5 ❖ 4 104. Return type of prontMsg() function is ______ ❖ WORD ❖ BOOL ❖ CHAR ❖ DWORD 105. Get Directory() function takes _____ parameter(s) ❖ 2 ❖ 3 ❖ 5 ❖ 4 106. In NTPS based system ______ is the maximum allowed size for a single file ❖ 2 ❖ 2 ❖ 2 ❖ 2 107. FAT 32 based system ______ is the maximum allowed size for a single file ❖ 2 ❖ 2 ❖ 2 ❖ 2 108. setFilepointer() function takes _____ parameter(s) ❖ 2 ❖ 3 ❖ 5 ❖ 4 109. PLONG is a _____ ❖ Pointer to a long variable 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ String ❖ Variable ❖ Pointer to a string 110. Return type of setFilePointerEx() is _____ ❖ String ❖ Bool ❖ Word ❖ DWORD 111. In setfilepointer() function, lpNewFilePointer parameter is placed is a/an ❖ Handle ❖ PLARGE_INTEGER ❖ DWORD ❖ LARGE_INTEGER 112. In setFilePoiter() function, distance to move parameter is placed in ❖ DWORD ❖ Handle ❖ PLARGE_INTEGER ❖ LARGE_INTEGER 113. There are ______ components of a LARGE integer ❖ 2 ❖ 3 ❖ 4 ❖ 5 114. In the Overlapped structure, ULONG_PTR internal is a _____field. ❖ DWORD ❖ Integer ❖ Pointer ❖ Reserved 115. Overlap structure is a structure which is defined in the _____ header file ❖ Window.h ❖ Stdary.h ❖ Everything.h ❖ Stdio.h 116. In the overlapped structure the data type of ofsetand offsethigh is ❖ DWORD ❖ WORD 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ INT ❖ BOOL 117. EOF is short form of _____ ❖ Erase of file ❖ End of file ❖ End of folder ❖ Erase of folder 118. Return types of getfilesizeEx() is _____ ❖ Bool ❖ Char ❖ Int ❖ DWORD 119. To reduce the filesize we use _____ windows API. ❖ Setfilesize() ❖ Changefilesize() ❖ SetendoffileEx() ❖ setfileEx() 120. File size cn be obtained using the ____ windows API. ❖ GetFileSizwEx() ❖ FileSizeExGet() ❖ GetFileSize() ❖ FileSize() 121. In the RECORD structure, datatype of numRecord is _____ ❖ DWORD omponents of a LARG ❖ BOOL ❖ Double ❖ Int 122. In the RECORD structure, datatype of numNonemptyRecord is _____ ❖ DWORD ❖ BOOL ❖ Double ❖ Int 123. What will be next code statement, if the following if statement id true? If (!setFilePointer Ex(nfilecurrentptr, NULL,FILE_BEGIN)) ❖ RepotError(_T(“RecordAccessError: writeFile header”.)4,TRUE); ❖ RepotError(_T(“RecordAccessError: writeFile header”.)6,TRUE); 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ RepotError(_T(“RecordAccessError: setpointer”.)4,TRUE); ❖ RepotError(_T(“RecordAccessError: set End of File”.)5,TRUE); 124. What will be next code statement, if the following if statement is true? If (!readFile(hFile& header, size of(Header),&nXfer,&ovzero)) ❖ ReportError (_T(“RecordAccessError:set End of File.”),5,TRUE); ❖ ReportError (_T(“RecordAccessError:set pointer.”),4,TRUE); ❖ ReportError (_T(“RecordAccessError:write File header.”),4,TRUE); ❖ ReportError (_T(“RecordAccessError:readFile header.”),6,TRUE); 125. During searching files/folders, a data structure ______ is used to store the information about a found file or directory ❖ Directory -64 ❖ Attribute ❖ Directory -32 ❖ WIN32_FIND DATA 126. What will be next code statement, if the following if statement is true? If (!writeFile(hFile& header, size of(Header),&nXfer,&ovzero)) ❖ ReportError (_T(“RecordAccessError:set End of header.”),6,TRUE); ❖ ReportError (_T(“RecordAccessError:set pointer.”),4,TRUE); ❖ ReportError (_T(“RecordAccessError:write File header.”),5,TRUE); ❖ ReportError (_T(“RecordAccessError:readFile header.”),4,TRUE); 127. The number of arguments required for Findclose()API is ____ ❖ 3 ❖ 1 ❖ 2 ❖ 0 128. The field flastAccessTime in a WIN32-FIND-DATA structure is used to represent a time when a file was ______ time accessed ❖ Closing ❖ Last ❖ First ❖ Second ;last 129. Using GetFileTime() API argument(s) is/are provided. ❖ Both creation and last access time ❖ Only last access time ❖ Creation, last access and last write time 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ Only creation time 130. GetFileAttribute() API need ____ argument(s) to return the attributes of a file or directory ❖ 1 ❖ 2 ❖ 3 ❖ 0 131. compareFileTime() API returns _____ if both the file time are equal ❖ 0 ❖ 2 ❖ 1 ❖ -1 132. The ____________ exceptions are enabled with the help of controlfp function.  Floating point 133. To start the mapping from the start of a file, set both dwFileOffsetHigh and dwFileOf  0  1  Nill  -1 134. Which option is incorrect when the traverseDirectory() API is required to be use? ❖ It allow non-recursive traversal ❖ Recursive and non-recursive traversal option is irrelevant ❖ It allows recursive traversal ❖ It allows both non- recursive and recursive traversal 135. Which of the following is not an argument of the traverse Directory() API ❖ Option for simple listing or recursive processing ❖ Search pattern ❖ Parent path ❖ File creation time 136. In order to deallocate a block of heap,_______is used.  HeapDelete()  HeapFree()  HeapTruncate()  HeapDestroy() 137. For sequential files, file mapping may reduce the processing time by________folds as compared to conventional file operations. 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE  Nine  Three  Six  Ten 138. Serialization is necessary when concurrent threads use____resource(s).  Different  A common  The remaining  Extra 139. SEH is Not supporting through__________________  Windows Registry  Run-time Support  Windows function  Compiler supported languages extensions 140. Which of the following are the number of parameters taken by OPENFILEMAPPING ()?  1  2  3  4 141. Console control handlers are similar to__________  Exception handlers  Parameters  Interrupts  Functions 142. In comparison DLL executable library files are linked at____times.  Compile  Load  Link  Run 143. Temporary files are assigned an extension ____ and they are used to store ____ ❖.temp,final result ❖.tmpe,intermediate result ❖.tmp,intermediate result ❖.com,intermediate result 144. ______ is not a value argument for setFiletime() function ❖ pModifyTime ❖ NULL 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ _T(ame) ❖ _P(accesstime) 145. SetFileTime() function takes a total of________arguments. ❖ 3 ❖ 5 ❖ 4 ❖ 2 146. GetsystemTimeAsFiletime() function receive _____ as an argument. ❖ File array ❖ File pointer ❖ File handle ❖ File objects 147. Which of the following is not a correct argument of options() function ❖ Argc ❖ Argv ❖ _T(amg) ❖ _T(amc) 148. The fseek() C library function uses _____ bit file position ❖ 8 ❖ 16 ❖ 32 ❖ 64 149. For file processing windows provides a propriating function called______ ❖ Pseek64() ❖ Fseek() ❖ Fseek64() ❖ Pseek() 150. In MicrosoftUNIX library, all I/O function are named with _____ prefix. ❖ Semicolon ❖ Dot ❖ Underscore ❖ Colon 151. In lockFileEx() function, the OVERLAPPED data structure contains ______ data members. ❖ 3 ❖ 5 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ 2 ❖ 4 152. File lock can be _____ or ____ ❖ Read-only, write-only ❖ Read-only, write-only ❖ Read-locked, write only ❖ Read-only, read-write 153. The read operation does not conflict with the _____ ❖ Existing shared lock ❖ Remove operation ❖ Write operation ❖ Existing exclusive lock 154. Before encountering a/an _____ lock, the read or write operation can complete its request partially ❖ Exclusive lock ❖ Shared lock ❖ Mutually exclusive lock ❖ Conflicting lock 155. If process-A has a shared lock on a file, and process-B tries to read without a shared lock then the read attempt will _____ ❖ Return exception ❖ Succeed ❖ Return a shared lock ❖ Fail 156. UNIX system stores information in _____ directory similar to the registry entry ❖ /etc ❖ /reg ❖ /key ❖ /root 157. Programmers usually access windows build number through _____ ❖ Web sockets ❖ Web API ❖ RESI API ❖ Windows API 158. Information about _____ is not present in the registry file. ❖ Power supply 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ Chipset ❖ Memory ❖ Processor 159. ______information is present in the registry HKEY_CURRENT_CINFIG. ❖ Display resolution ❖ Process make ❖ Display size ❖ Memory amount 160. The registry HKEY_CURRENT_USER does not contain ____ information. ❖ System fonts ❖ Printers ❖ Environment variable ❖ Application preferences 161. The registry HKEY_LOCAL_MACHNE stores _____ information about the machine ❖ Physical ❖ Private ❖ Protected ❖ Logical 162. ______function enumerates subkey names of an open registry key. ❖ RegEnumKey() ❖ RegOpenKey() ❖ RegOpenKeyEx() ❖ RegENUMKeyEx() 163. The RegOpenKeyEx() function opens a named____ ❖ Instance ❖ Sub key ❖ Key ❖ List 164. The function RegCreateKeyEx() ha ____ parameters. ❖ 8 ❖ 7 ❖ 9 ❖ 6 165. Is Reg() function processes registry keys rather than ____ and ____ ❖ Key-value pairs, files 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ Key-value pairs, properties ❖ Directories, key-value pairs ❖ Directories, files 166. RegSetvalueEx() function is used to set the data of a ____ value. ❖ Final ❖ Fixed ❖ Named ❖ Static 167. The exception could occur within a _____ embedded in the try block. ❖ List ❖ Function ❖ Constructor ❖ Block 168. If filter_expression returns _____ then windows ignores the exception handler and searches for an exception handler in the enclosing block. ❖ EXCEPTION_SKIP_EXECUTION ❖ EXCEPTION_CONTINUE_SEARCH ❖ EXCEPTION_CONTINUE_EXECUTION ❖ EXCEPTION_SKIP_SEARCH 169. If the filter-expression was set to continue the execution but it is not possible to continue, then ______ exception code will be returned. ❖ EXECUTION-NONCONTINUABLE-EXCEPTION ❖ EXECUTION-NONCONTINUABLE-EXECUTION ❖ EXECPTION-NONCONTINUABLE-EXCEPTION ❖ EXECPTION-NONCONTINUABLE-EXCUTION 170. _____ exception code is returned if the process attempts to read or write a virtual address for which it has no access rights ❖ EXCEPTION-INTEGERS-VOILATION ❖ EXCEPTION-INTEGERS-BREACH ❖ EXCEPTION-ACCESS-VOILATION ❖ EXCEPTION-INTEGERS-BREACH 171. SHE is not supported through_______ ❖ Run time support ❖ Windows function ❖ Compiler supported language extensions ❖ Windows registry 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE 172. The filter-expression in the _____ clause is evaluated immediately after the exception occurs. ❖ -try ❖ -catch ❖ -except ❖ -finaly 173. The value of the ____ determine actions that follow ❖ Filter-except ❖ Filter-expression ❖ Filter-try ❖ Filter-search 174. ______ function is used to clear clearfp(). ❖ _clear() ❖ _clearfp() ❖ _clean() ❖ _cls() 175. Programs can raise their own exception using the____ function ❖ BuildException ❖ RaiseException ❖ Createexception ❖ GenException 176. RaiseException has _____ parameters. ❖ 4 ❖ 2 ❖ 5 ❖ 3 177. The exception handler is actually a code portion associated with _____ block. ❖ -finally ❖ -try ❖ -except ❖ -catch 178. The new value of floating point mask is determined by its value _____ and its two arguments. ❖ Current-value ❖ C-value ❖ Current-mask 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ Current-val 179. The ______ function terminates the process if the program indicates that the error is fatal. ❖ Report handle() ❖ Terminate handle() ❖ Terminate process() ❖ Report error() 180. SIGSEGV error can only be generated bt ____ but not by ____ ❖ Windows, Raise ❖ Linux, macos ❖ Windows, linux ❖ Raise windows 181. A single try block must have a single ____ or _____ block ❖ Terminate, Except ❖ Finally, Except ❖ Finally, continue ❖ Terminate, finally 182. ____ function is used within the termination handle to check how the try block is terminated ❖ Check termination() ❖ Check handle() ❖ Check termination ❖ Abnormal termination 183. ReportException() function have _____ arguments. ❖ 3 ❖ 4 ❖ 2 ❖ 5 184. Second arguments of ReportException()function is _____ ❖ Exception code ❖ Exception handle ❖ Exception address ❖ Exception name 185. The process or thread can terminate itself using ____ or ___ functions. ❖ Terminate process(), Exist thread() ❖ Terminate process(), Terminate thread() 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ Exist process(), Exist thread() ❖ Exist thread(), Terminate thread() 186. The termination handler cannot axecute the____ statement ❖ Break ❖ Report ❖ Continue ❖ Retur 187. C ++ execution handling is implemented using____ ❖ SCH ❖ ECH ❖ ESH ❖ SEH 188. A filter function ____ the type of n exception. ❖ Restrick ❖ Evaluates ❖ Exclude ❖ Identifies 189. The _____ exception are enabled with the help of controlfp() function ❖ Floating point ❖ String ❖ Mutex ❖ Integer 190. ecategory is a/an _____ ❖ Reference variable ❖ Simple variable ❖ Class ❖ Pointer 191. Which of the following in the number of parameters takes by controlpf() function ❖ 3 ❖ 4 ❖ 1 ❖ 2 192. Which of the following in the number of parameters takes by filter function ❖ 1 ❖ 2 ❖ 3 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ 4 193. Which of the following instruction is used to suspend the execution of a program for 5 milliseconds? ❖ Sleep(500) ❖ Sleep(5000) ❖ Sleep(5) ❖ Sleep(0.5) 194. Which of the following functions is used to generate a sound beep for 0.7 seconds with the frequency if 750? ❖ Beep (750,800) ❖ Beep(700,750) ❖ Beep(750,700) ❖ Beep(750,0.7) 195. A program can be terminated by passing____ from keyboard ❖ Ctrl +p ❖ Ctrl +N ❖ Ctrl +C ❖ Ctrl +Z 196. The return type of WINAPI Handler() function if _____ ❖ Void ❖ Static integer ❖ Static bool ❖ Static float 197. #include is used for ______ ❖ Input output operation ❖ Working in CLI ❖ Memory allocation ❖ Multitasking 198. Windows OS keeps____ version of each API. ❖ One ❖ Interpreted ❖ Two ❖ Complier 199. The options function have ______ arguments ❖ 5 ❖ 4 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ 7 ❖ 6 200. If invalid file handle is passed as a parameter to the closeFile API, then it will return_______ ❖ Empty string ❖ 1 ❖ File handle ❖ False value 201. _tcscmp() is ______ function to compare the strings. ❖ A generic ❖ An ASCII ❖ Not a generic ❖ A Unicode 202. There are ______ number of standard input out devices. ❖ 3 ❖ 5 ❖ 4 ❖ 2 203. Every lockfileEx() function that is successful must be followed by a call to ______ ❖ DeletelockEx() ❖ RemovelockEx() ❖ UnlatchlockEx() ❖ UnclockfileEx() 204. Try and catch keywords _____ required for vectored exception handlers. ❖ Are not ❖ Are ❖ Must be ❖ Are accasionally 205. In the context of vectored exception handling the zero value of firsthandler parameters shows that the handler being used wil be the _____ one to execute. ❖ Third ❖ Last ❖ Second ❖ First 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE 206. In the vectored exception handler, the value of firsthandler parameter specific the _____ in which the handler will execute. ❖ Order ❖ Speed ❖ Allocation of stack ❖ Accuracy 207. Windows checks for a vectored exception handler at the _____ place when a vectored is set up followed by unwinding the stack. ❖ Second ❖ Third ❖ First ❖ Fourth 208. In the context of vectored exception handling the non-zero value of firsthandler parameters shows that the handler being used wil be the _____ one to execute. ❖ Third ❖ Last ❖ Second ❖ First 209. Which of the following is a Static data structure? ❖ Circular array ❖ Array ❖ Tree ❖ Union 210. Identify the advantages provided by memory mapped files. ❖ Convenience, collision, octection and memory sharing ❖ Exception handling, speed and memory sharing ❖ Convenience, speed and usability ❖ Convenience, speed and memory sharing 211. Windows mainly uses _____ API. ❖ 4 ❖ 2 ❖ 3 ❖ 1 212. In win32_____ of the virtual space is accessible to a process and the remaining space is utilize by the system for other tasks ❖ One quarter 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ Half ❖ Two third ❖ Three quarter 213. The virtual space of process ____ be larger than the physical memory space. ❖ Should always ❖ Cannot ❖ Must ❖ May 214. Which of the following occurs as a result of excessive page fault in ❖ Decreased system performance ❖ Increased utilization of I/O ports ❖ Decreased utilization of I/O ports ❖ Increased system performance 215. When the required page is not in the memory then a _______ occurs. ❖ Page fault ❖ Dirty frame ❖ Page error ❖ Frame fault 216. The translation of a virtual address int physical address is managed by the ______ ❖ Offset addressing ❖ Operating system ❖ Device driver ❖ Transport layers 217. Pages are swapped in and out when a_____ occurs. ❖ Page fault ❖ Frame fault ❖ Page error ❖ Dirty frame 218. Which of the following is a dynamic data structure. ❖ Circular array ❖ Tree ❖ Union ❖ Array 219. A process can have _____ heap(s). ❖ Only once ❖ Only two 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ Many ❖ At the most two 220. When a fixed size data structure is allocated from a single heap, it reduces_____ ❖ Fragmentation ❖ Errors ❖ Memory density ❖ Throughput 221. The heapReAlloc() API has _____ parameter(s). ❖ 4 ❖ 1 ❖ 3 ❖ 2 222. The heapAlloc() API has _____ parameter(s). ❖ 3 ❖ 4 ❖ 2 ❖ 1 223. When a heap (logical structure) is created the memory is _____ allocated at the program. ❖ Partially ❖ Completely ❖ Not directly ❖ Directly 224. ______ are the APIs for heap memory allocation. ❖ Heapcreate ()and HeapRealloc() ❖ Allocheap () and HeapRealloc() ❖ HeapAlloc() and HeapRealloc() ❖ HeapAlloc() and HeapRealloc() 225. For a non growable heap, the value of dwbytes in heap memory alloction is _______ ❖ 0*7FEE8 ❖ 0*7FDD8 ❖ 0*AAAA8 ❖ 0*7FFF8 226. _____ is the first step to allocate heap in a program. ❖ HeapDestroy() 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ HeapFree() ❖ Release and handle ❖ Get heap handle 227. The function heapSize() returns the size of a block, or ______ in case failure. ❖ NULL ❖ 1 ❖ -1 ❖ 0 228. _____ is used to deallocate the entire heap. ❖ HeapDestroy() ❖ HeapFree() ❖ HeapTruncate() ❖ HeapDelete() 229. Sorting is performed in the _____ ❖ RootHeap ❖ RecHeap ❖ ProcHeap ❖ NodeHeap 230. _______ stores the root address. ❖ RootHeap ❖ RecHeap ❖ ProcHeap ❖ NodHeap 231. The NodeHeap maintains a ______ ❖ Data ❖ Data structure ❖ Record ❖ Root 232. There are _____ parameters taken by the HeapCreate() API. ❖ 3 ❖ 4 ❖ 2 ❖ 1 233. Which of the following is the correct windows API for accessing heap? ❖ INT GetProcessHeap(VOID) ❖ VOID GetProcessHeap(HANDLE) 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ HANDLE GetProcessHeap(VOID) ❖ INT*GetProcessHeap(VOID) 234. When a fixed size data structure is allocated from a single heap, it reduces ______ ❖ Memory density ❖ Errors ❖ Throughput ❖ Fragmentation 235. The parameters “flOption” in the HeapCreate() API is a combination of ______ flafs. ❖ 1 ❖ 2 ❖ 4 ❖ 3 236. While using CreateFileMapping(), ______ allow the mapping object to be secured. ❖ INVALID_VALUES ❖ PSECURITY_ATTRIBUTES ❖ LPSECURITY_ATTRIBUTES ❖ INVALID_HANDLE_VALUES 237. While using CreateFileMapping(),setting lpMapName to _____ disables the map sharing. ❖ -1 ❖ NULL ❖ 0 ❖ 1 238. ______ is the API for file mapping objects. ❖ Create_File_Mapping() ❖ CreateFileMapping() ❖ FileCreateMapping() ❖ MakeFileMapping() 239. Which of the following are the number of parameters taken by CreateFileMapping()? ❖ 7 ❖ 6 ❖ 5 ❖ 4 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE 240. The _______-- flag is set to be______ in the CreateProcess() function, which will determine whether child process will inherit copies of parent open handles. ❖ blanheritFlag, TRUE ❖ blnheritHandles, FALSE ❖ blanheritFlag,FALSE ❖ bInheritHandles, TRUE 241. IPC stands for__________. ❖ Information and privacy communication ❖ Inter privacy communication ❖ Information process communication ❖ Inter Process Communication 242. Inherited handles are ________ copies that a parent and child might be accessing. ❖ Connected ❖ Similar ❖ related ❖ Distinct 243. Process IDs are always _______. ❖ Frequent ❖ Repeated ❖ Constant ❖ Unique 244. The process obtains environment and other information from_______ call. ❖ CreateThread() ❖ GetEnvironmentinfo() ❖ Getinfo() ❖ CreateProcess() 245. lpApplicationName handle’s value_____ be NULL. ❖ May not ❖ May ❖ should ❖ Should not 246. In windows there are __________ ways to get command line parameters for a process. ❖ Five ❖ Four ❖ Two 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ Three 247. Windows OS does not have structure that keeps track record of the ______ processes. ❖ Child ❖ Grand –child ❖ Parent ❖ Parent_Child 248. The most fundamental process management function in windows is CreateProcess() that has_____--- parameters. ❖ 12 ❖ 6 ❖ 4 ❖ 10 249. The process can share memory and files but the process itself lie an individual ____________ memory space. ❖ Non_volatile ❖ Physical ❖ permanent ❖ Virtual 250. Thread Local Storage (TLS) is an array of collection of pointers enabling a thread to _____ storage to create its unique data environment. ❖ De-allocate ❖ Clear ❖ Re-allocate ❖ Allocate 251. Each thread has its own__________. ❖ TLS ❖ Environment Block ❖ Stack ❖ TLS and Stack 252. The process of DLL detachment in explicit linking is invoke by___________ function call. ❖ Free() ❖ freeLib() ❖ Flibra ❖ FreeLibrary() 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE 253. Information regarding DLLs is placed in the _________data structure. ❖ dwBuilderNumber ❖ dwPlatform ❖ MAJORVERSION ❖ DLLVERSION 254. LoadLibrary() and LoadLibraryEx() should never be called from_____ as it will create more DLL entry Points. ❖ ThreadLibrarycalls() ❖ DllMinFunc() ❖ DisableThreadLibraryCalls() ❖ DllMain() 255. LoadLibraryEx() can suppress the execution of entry point, in _____-- linking of DLL. ❖ Implicit ❖ Static ❖ Dynamic ❖ Explicit 256. “Application that require newer updated functionality may sometime link with older DLL version”. This statement refers to ______ of DLL versioning ❖ Strength ❖ Advantages ❖ Caution ❖ Problem 257. If entry point of DLL is not specified, then it is an example of ______-- linking.\ ❖ Explicit ❖ Dynamic ❖ Hard ❖ Implicit 258. In case of____________ linking the DLL attaches at the time of process start and detaches when process ends ❖ Explicit ❖ Dynamic ❖ Hard ❖ Implicit 259. Explicit linking requires the program to explicitly specify the DLL to be ________________. 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ Freed ❖ Loaded ❖ Loaded and freed ❖ Ans: Loaded or freed 260. In a pointer function declaration for DLL explicit linking, HMODULE is NULL in case of_________. ❖ Execution ❖ Waiting ❖ success ❖ Failure 261. Once the DLL is loaded, the programmer needs to obtain _________ into the DLL for an entry point. ❖ Dynamic address ❖ Physical address ❖ Bus address ❖ Procedure Address 262. We write and ____________ function in DLL and invoke them explicitly ❖ Compile ❖ Encrypt ❖ decrypt ❖ Encapsulate 263. In DLLs the executable library files are linked at___________ time ❖. Ans: Compile 264. Each DLL program will have its own copy of _______ variables. ❖ Ans: Globle 265. In________ operating system DLLs are used to invoke all kernel services. ❖ Ans: Windows 266. Dynamic memory is allocated from the ❖ Cache ❖ Paging file ❖ Stack ❖ Static memory 267. Which of the following is recommended to use while dealing with memory mapped file to look for EXCEPTION_IN_PAGE_ERROR exception? ❖ ESH exception handling ❖ SHE exception handling 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ HE exception handling ❖ HES exception handling 268. To create a file mapping object, we have to declare _________ maximum parameters> ❖ 4 ❖ 2 ❖ 6 ❖ 8 269. It is not possible for a system to map a file greater than __________ Into virtual memory space, while using Win32 OS. ❖ 2GB ❖ 3MB ❖ 3GB ❖ 2MB 270. It is much_______- to sort large data available in memory rather than in files. ❖ Harder ❖ Costly ❖ Unyielding ❖ Easier 271. qsort() is a _________ function. ❖ Standard library ❖ EXE ❖ Windows DLL ❖ User defined 272. When we create a file mapped object for sorting 1000 numbers in a file recorder will be saved in a/an______________-. ❖ Heap ❖ Stack ❖ Queue ❖ Array 273. Which of the following are the number of parameters taken by MapViewFile()? ❖ 2 ❖ 4 ❖ 3 ❖ 5 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE 274. While using MapViewOfFile(), which of the following are the three commonly used flags? ❖ FILE_WRITE, FILE_READ, AND FILE_ALL_ACCESS ❖ FILE_MAP_WRITE, FILE_MAP_READ,AND FILE_MAP_ALL_ACCESS ❖ MAP_WRITE,MAP_READ, AND MAP_AL_ACCESS ❖ WRITE, READ, AND ALL_ACCESS 275. _______ and _____ specify the starting address of the file from where the mapping starts. ❖ High, low ❖ dwFileHigh,dwFileLow ❖ dwFileOffsetHigh, dwFileOffsetLow ❖ dbFileOffsetHigh, dbFileOffsetLow 276. unmapViewOfFile() takes _______argument(s) ❖ 2 ❖ 0 ❖ 4 ❖ 3 277. ______ Is the API for file mapping objects. ❖ MakeFileMapping() ❖ CreateFileMapping() ❖ FilecreateMapping() ❖ Create_file_Mapping() 278. While using CreateFileMapping(),_________ refers to the paging file. ❖ LPSECURITY_ATTRIBUTES ❖ PSECURITY_ATTRIBUTES ❖ INVALID_HANDLE_VALUES ❖ INVALID_VALUES 279. While using CreatFileMapping(),________ allows the mapping object to be secured. ❖ LPSECURITY_ATTRIBUTES ❖ PSECURITY_ATTRIBUTES ❖ INVALID_HANDLE_VALUES ❖ INVALID_VALUES 280. While using CreateFileMapping(), setting IpMapName to________ disables the map sharing. ❖ 0 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ 1 ❖ -1 ❖ NULL 281. DLL stand for ❖ Direct layout library ❖ Dynamic link library ❖ Dynamic layout library ❖ Direct link library 282. The approach to gather all the source code and library functions after encapsulation into a single executable file, is called as _____ ❖ Process linking ❖ Static linking ❖ Dynamic linking ❖ Thread linking 283. Each DLL program will have its own copy of ____ variables. ❖ Global ❖ Local ❖ Dynamic ❖ Static 284. In _____ operating system DLLs are used to invoke all kernel services. ❖ Windows ❖ Unix ❖ Linux ❖ Solaris 285. In DDLs the executable library files are linked at ____ time. ❖ Link ❖ Run ❖ Compile ❖ Load 286. The entry point in DLL defined structure (DWORD) ____ values. ❖ 8 ❖ 4 ❖ 2 ❖ 16 287. ReadFile() and writeFile() functions perform much _____ than memory mapped file processing 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE ❖ Slower ❖ Faster ❖ Convenient ❖ Nimble 288. Which of the following controls the paging file? ❖ The pager ❖ Direct memory access ❖ Memory mapped I/o ❖ Virtual memory management system 289. While using memory mapped I/O there is/are ______ to manage buffers for repetitive operation on the file operations. ❖ Needed ❖ Not needed ❖ Useful ❖ Mandatory 290. In order to make a program more efficient, _____ heap(s) may be required. ❖ partial ❖ only one ❖ several ❖ Minimum number of 291. There are ______ parameters taken by the HeapCreate() API. ❖ 3 ❖ 2 ❖ 1 ❖ 4 292. The parameter “flOptions” in the HeapCreate() API is a combination of ______ flags. ❖ 2 ❖ 4 ❖ 3 ❖ 1 293. A process can have _____ heap(s). ❖ Only two ❖ At the most one ❖ only one ❖ Many 0304-1659294 JUNAID MALIK AL-JUNAID TECH INSTITUE 294. _____ API is used to create a new heap. ❖ createHeap() ❖ HeapCreate() ❖ BuildHeap() ❖ NewHeap() 295. If threads have separate memory space, then it will reduce_____ ❖ Memory contention ❖ Access speed ❖ Direct memory access ❖ Memory density 296. _____ is an appropriate API to dispose-off a heap handle. ❖ shudderHandle() ❖ DestroyHandle() ❖ DeleteHeap() ❖ HeapDestroy() 0304-1659294 JUNAID MALIK

Use Quizgecko on...
Browser
Browser