Subject Code: BC0051
Subject Name: System Software
Credits: 4 Marks: 140
Part A (One mark questions)
1. ________ is a program that converts one programming to another programming in other
language.
A) Language builder
B) Language translator
C) Language processor
D) Language Activity
2. ______ will govern the formation of valid statements in the source language.
A) Lexical rules:
B) Syntax rules:
C) Semantic rules
D) Source rules
3._________is the gap between the semantics of programs written in different programming
languages
A) Specification gap
B) Implementation gap
C) Execution gap
D) Design gap
4. Which of the following step does not belong to interpretation cycle.
A) Fetch the statement.
B) Translate the statement
C) Analyze the statement and determine its meaning,
D) Execute the meaning of the statement.
5. ________ is a program which accepts assembly language program as input and produces
its equivalent machine language program as output.
A) Data base
B) Assembler
C) Assembly
D) Directives
6. How many kinds of statements are there in assembly program?
A) 4
B) 1
C) 2
D) 3
7. An assembly language statement has the following format
A)
B)
C) [Label]
D) [Label]
8. Which of the following is a not a assembly Program statement
A. imperative
B. Declaration
C. assembler Directive
D) Data structure
9. ________ is a translator which translates the program written in a high level language
object language, which is a low level language.
A) Interpreter
B) Assembler
C) Analyzer
D) Compiler
10. YACC, abbreviated from "Yet Another Compiler Compiler", is a __________ system tool
program for generating C or C++ code for a parser.
A) Linux
B) Unix
C) Windows
D) DOS
11. Choose the WRONG statement
A) Fortran is a high level language
B) Machine language program is a sequence of 1s and 0s
C) Programming in Machine language is simpler than high Level language
D) High level programming language makes the programming task simple
12. Choose the WRONG statement
A) An interpreter produces a result from a program, while a compiler produces a program
Written in assembly language.
B) A compiled program is not human readable.
C) Assembly language is independent of architecture.
D) Compiled programs can only run on computers that have the same architecture as the
Computer on which they were compiled.
13. ________ is a unit of specification for program generation through expansion.
A) Interpreter
B) Macro
C) Source code
D) Compiler
14. During __________ the macro statement is replaced by sequence of assembly statements.
A) Expansion
B) Macro expansion
C) Parameter passing
D) Execution
15.__________ is the Lowest-level of Preprocessors
A) Lexical Preprocessors
B) Analytical Preprocessors
C) Semantic Preprocessors
D) None of the above
16. Which of the following is NOT a intelx86 register
A) SI
B) DI
C) BP
D) DP
17. _______ is used to combine multiple functions into a single executable module
A) Static linking
B) Library
C) Relocating
D) Loading
18. _______ is a collection of subprograms used to develop software.
A) Static linking
B) Library
C) Relocating
D) Loading
19.________ brings the object program into the memory for execution.
A) Static linking
B) Library
C) Relocating
D) Loading
20. Which of the following is not a vital step in execution of a program
A) Translation
B) Linking
C) Relocation
D) Compiling
21. _______is a computer program that transfers data from offline memory into internal
Storage
A) Debugger
B) Assembler
C) Loader
D) Compiler
22. _________is a very small program (usually residing in ROM) which reads a fixed location on
a disk and passes control over to it.
A) Absolute Loader
B) Boot strap Loader
C) Program Loader
D) Retargetable loader
23. Loader can replace virtual addresses with _______ addresses.
A) local
B) Permanent
C) Physical
D) Object
24. The object code or executable code is generated by ________.
A) Assembler
B) Compiler
C) Assembler or compiler
D) Assembler and compiler
25. In ________ memory allocation, memory is allotted to a variable before the execution of a
program begins.
A) stack
B) automatic
C) dynamic
D) static
26. Reference counting is a form of ________ memory management where each object has a
count of the number of references to it.
A) dynamic
B) automatic
C) stack
D) static
27. In dynamic memory allocation,________ are established and destroyed during the
execution of a program.
A) Memory bin
B) Stack
C) Global variable
D) Local variable
28. Call-by-value parameter variable belongs to ___________ type of memory allocation.
A) Static
B) Stack
C) Dynamic
D) Automatic
29. Symbol table is a __________ which is used by compiler to keep track of scope and binding
information about names.
A) Stack
B) Data structure
C) Pointer
D) Organization
30.The actions required for the maintenance of a symbol table are: search, enter and ______
A) Store
B) Return
C) Delete
D) List
31. Which of the following statement(s) are true?
1. Symbol table is a compile time data structure
2. Convenient data structure for symbol tables is a hash table.
A) 1 only
B) 2 only
C) Both 1 and 2
D) None of the above.
32. Fixed entry elementary symbol table organization contains symbol and ________.
A) Length
B) Symbol
C) Associated information
D) Tree
33. What is error handling?
A) It is the process of identifying errors in the program
B) it is the process of recovering from errors.
C) It is the process of identifying error and also to recover from them.
D) None of the above
34. Which of the following is NOT a property of good error diagnostics?
A. The messages should pinpoint the errors in terms of the original source program.
B. The error messages should be tasteful and understandable by the user .
C. The messages should be specific and should localize the problem
D. The messages should be redundant.
35. Which of the following is a true statement with respect to Dynamic error?
1. Dynamic error are detected at run time
2. Dynamic errors can be detected in all languages
A) 1 only
B) 2 only
C) Both 1 and 2
D) None of them
36. Which of the following is a true statement with respect to Semantic errors?
1. Semantic errors can be detected both at compile time and run time
2. Declaration and scope are common examples for semantic errors
A) 1 only
B) 2 only
C) Both 1 and 2
D) None of them
37. Which of the following is a Function/s of operating system?
A) Provides basic computing resourses (CPU, Memory, I/O devices).
B) Controls and coordinates the use of the hardware.
C) Define the ways in which the system resources are used to solve the computing problems
D) All the above
38. Which of the following is NOT a member of UNIX family?
A. Linux
B. Solaris
C. Irix
D. MacOS
39. Which of the following is a NOT a Function/s of operating system?
A) OS Contains interrupt service routines
B) OS deals with Process Management
C) OS helps in exchanging information between Processes
D) OS alone is responsible for compiling and executing C Program
40. Which of the following Statement is TRUE with respect to Multi threading?
A) An operating system that allow different parts of a software program to run
Concurrently.
B) An operating system that is capable of allowing multiple software processes to run at
Same time
C) An operating allows multiple users to use same computer at the same time or different
Time.
D) None of the above
Part B (Two mark questions)
41. Program translation model bridges the execution gap by translating a program written in a
PL, called _______ into an equivalent program in the machine or assembly language of the
computer system, called ______
A) Source program (SP), target program (TP).
B) Syntax program, Analysis program
C) Source program (SP), Syntax program,
D) Analysis program, target program (TP).
42. Two fundamental language processing activities are _______and______
A) Program Processor Activities, Program Execution Activities
B) Program Generation Activities, Program Source Activities
C) Program Processor Activities, Program Source Activities
D) Program Generation Activities, Program Execution Activities
43._______ and ________are the two tasks performed by assembler.
A) Generate instructions, Process pseudo-operations
B) Define symbols, Generate object
C) Process pseudo-operations, Define symbols
D) Generate object, Generate instructions
44. Which of the following statement is NOT a purpose of pass-1 for assembler?
A) Determine length of machine instructions
B) Generate Instructions
C) Remember values of symbols until pass 2
D) Process some pseudo-operation
45._______ and ________are the two types of optimization
A) Local Optimization, Loop Optimization
B) Quick Optimization, Loop Optimization
C) Local Optimization, symbolic Optimization
D) Quick Optimization, symbolic Optimization
46. Which of the following statement is NOT a phase in compilation?
1. Lexical analysis
2. Syntax analysis
3. intermediate code generation
4. identifier
5. code optimization
6. logical builder
7. code generation
A) 1,2
B) 4,6
C) 3,5
D) 2,7
47. If macros are calling themselves, they are called as _______
A) nested macro calls
B) recursive macro calls
C) nesting
D) macro expansion
48. Which of the following statement does NOT holds good for Macros?
1. Macros simplify coding
2. Macros reduce the amount of repetitive coding
3. Macros reduce errors caused by repetitive coding
4. Macros can have only two parameters
5. Macros cannot be used in C++ programming language
6. Macros make an assembly program more readable.
A) 1,2
B) 3,6
C) 4,5
D) 2,7
49. State true or false
1. A static library is a collection of object files which contain library routines and data.
2. A shared library is a shared object file that contains functions and data.
A) 1-F, 2-T
B) 1-T, 2-F
C) 1-T, 2-T
D) 1-F, 2-F
50. In dynamic linking the subroutines of a library are loaded into an application program at
_____ rather than being linked in at ______ and remain as separate files on disk.
A) runtime, compile time
B) compile time, runtime
C) compile time, executing time
D) executing time, compile time
51. In computer science, relocation is the process of replacing symbolic references or names
of _______ with actual usable addresses in ________ before running a program.
A) Memory, libraries,
B) Loader, memory
C) Memory, Loader
D) Libraries, memory
52. State true or false.
1. In addition to copying a program into main memory, the loader can also replace virtual
addresses with physical addresses.
2. A binary object file is either an executable file that runs on a particular machine or a file
containing object code that needs to be linked
A) 1-T,2-F
B) 1-T,2-T
C) 1-F,2-F
D) 1-F,2-F
53. Two types of Dynamic memory allocation are ________ and _________
A) Process control allocation, Stack allocation
B) Automatic allocation, process controlled allocation
C) Automatic allocation, program controlled allocation
D) Stack allocation, program controlled allocation
54. State True or False
1. Dynamic memory allocation is implemented using stacks and heaps
2. Memory allocation is the procedure used to perform memory binding.
A) 1-T,2-T
B) 1-F,2-T
C) 1-T,2-F
D) 1-F,2-F
55. In Liner array of record there are two ways to represent names in the symbol table they are
__________and_________
A) Automatic Length representation, Pointer to Pointer table entry
B) Automatic Length representation, pointer to symbol table entry
C) Fixed Length representation, Pointer to Pointer table entry
D) Fixed Length representation, pointer to symbol table entry
56. State TRUE or FALSE
1. Hash tables are good in situations where you have enormous amounts of data
2. Compilers use a searching technique called as hashing, where a variant called as “Close
hashing” is considered.
A) 1-T,2-F
B) 1-F, 2-T
C) 1-T,2-T
D) 1-F,2-F
57. State TRUE or FALSE
1. The design specifications for the program may be inconsistent or faulty: is a source of
error
2. If the algorithms does not meet the design or incorrect results in error
A) 1-T, 2-T
B) 1-F, 2-T
C) 1-T, 2-F
D) 1-F, 2-F
58. State TRUE or FALSE
1. Dynamic errors can be detected only at run time.
2. A compiler can insert errors as it translates the source program into an object program
A) 1-T, 2-T
B) 1-F, 2-T
C) 1-T, 2-F
D) 1-F, 2-F
59. State TRUE or FALSE
1. RTOS is an operating System that guarantees a certain capability within a specified time
Constraint
2. Windows 3.1 is a example for RTOS
A) 1-T, 2-T
B) 1-F, 2-T
C) 1-T, 2-F
D) 1-F, 2-F
60. State TRUE or FALSE
1. Dynamic errors can be detected only at run time.
2. A compiler can insert errors as it translates the source program into an object program
A) 1-T, 2-T
B) 1-F, 2-T
C) 1-T, 2-F
D) 1-F, 2-F
Part C (Four mark questions)
61. Match the following
a) Type – 0 Grammars ---- i. , Production has the form Aß::= ß
b) Type – 1 Grammars ----- II. Productions of the form ::=ß
c) Type – 2 Grammars ---- iii. Productions of the form A::= tB | t \
d) Type – 3 Grammars ----- iv., Production is of the form A:: =
A) a-iv, b-ii, c-iii, d-i
B) a-ii, b-i, c-iv, d-iii
C) a-iii, b-i, c-ii ,d-iv
D) a-i, b-iii, c-iv, d-ii
62. State True or False
1. Language Processing = Analysis of Source Program + Synthesis of Target Program.
2. Lexical analysis identifies the lexical units in a source statement
3. Semantic analysis processes the string of tokens built by lexical analysis to determine the
statement class.
4. Syntax analysis of declaration statements differs from the Lexical analysis of imperative
statements.
A) 1-T, 2-T, 3-T, 4-F
B) 1-F, 2-T, 3-T, 4-F
C) 1-F, 2-T, 3-F, 4-F
D) 1-T, 2-T, 3-F, 4-T
63. Match the following
a) Mnemonic operation codes i. instruct the assembler to perform certain
actions
b) Assembly language ii. Microsoft Macro Assembler
c) Assembler directives iii. eliminates the need to memorize numeric
operation codes
d) MASM iv. Low level language,
A) a-iv, b-ii, c-iii, d-i
B) a-ii, b-i, c-iv, d-iii
C) a-iii, b-i, c-ii ,d-iv
D) a-iii, b-iv, c-i, d-ii
64. State True or False
1. SPARC stands for Sun Microsystems Processor Architecture
2. SPARC is not an open set of technical specifications that any person or company can
License and use to develop microprocessors.
3. SPARC was invented in the labs of Sun Microsystems Inc. based upon pioneering research
Into Reduced Instruction Set Computing (RISC) at the University of California at Berkeley.
4. SPARC is a modern, fast, pipelined architecture. Its features found in assembly languages
for the variety of computer architectures.
A) 1-T, 2-T, 3-T, 4-T
B) 1-F, 2-T, 3-F, 4-T
C) 1-F, 2-F, 3-T, 4-T
D) 1-F, 2-T, 3-T, 4-F
65. Match the following
a) Lexical analysis i.Carving source program into sequence tokens
b) Syntax analysis ii. Checks the tokens for patterns permitted
C) Code generation iii. Converts intermediate code into machine instructions
D) Code optimization iv. Improve the target program by a factor of two in
overall speed
A) a-iv, b-ii, c-iii, d-i
B) a-i, b-ii, c-iii, d-iv
C) a-iii, b-i, c-ii ,d-iv
D) a-iii, b-iv, c-i, d-ii
66. The JVM verifies all byte code before it is executed. This verification consists primarily of
Three types of checks. PICK the statements which belong to this check
1. Branches are always to valid locations
2. Check the execution of .class or .jar files
3. Data is always initialized and references are always type-safe
4. Check syntax analyzer to stream of simple instructions
5. Access to "private" or "package" data and methods is rigidly controlled.
6. Check for common programmer errors that often lead to data corruption.
A) 1,2,3
B) 1,3,5
C) 2,4,6
D) 4,5,6
67. The Flow chart represents: Design for simple macro assembler
Choose the correct statements for the flow chart
A) 1=assembler, 2=Get next line, 3= Macro expander
B) 1=compiler, 2=find macro, 3= Macro expander
C) 1=compiler, 2=Get next line, 3= go to Macro call
D) 1=assembler, 2=find macro, 3= go to Macro call
68. Match the Following
a. BX i. All major calculations take place in EAX, making it similar to a
dedicated accumulator register.
b. CX ii. This register is most useful for storing data related to the
accumulator's current calculation.
c. DX iii. Like the variable i in high-level languages, the count register is the
Universal loop counter.
d. AX iv. This register was useful as a pointer. it is completely free
for extra storage space.
A) a-i,b-ii,c-iii,d-iv
B) a-iv,b-iii,c-ii,d-i
C) a-iv,b-ii,c-i,d-iii
D) a-i,b-iii,c-ii,d-iv
69. The Diagram represents: Conversion from source program to binary program
Fill the empty space in the diagram
A) 1= Linker, 2=translator, 3= Loader
B) 1=Loader, 2=Translator, 3= Linker
C) 1=Loader, 2= Linker, 3= Translator
D) 1=Translator, 2=Linker, 3= Loader
70. State True or False
1. Bootstrapping refers to a process where a simple system activates another more
Complicated system that serves the same purpose.
2. Bootstrapping is a solution to the Chicken-and-egg problem of starting a certain system
Without the system already functioning.
3. In x86 systems the bootstrap ROM occupies the top 64K of the address space and ROM
Code then starts up the computer.
4. In compiler design a boostrap or bootstrap compiler is a compiler that is written in the target
Language.
A) 1= F, 2=F, 3=F, 4- F
B) 1= T, 2=F, 3=T, 4- T
C) 1= T, 2=F, 3=F, 4- T
D) 1= T, 2=T, 3=T, 4- T
71. State true or false
1. Compilers or assemblers typically generate the executable code with zero as Lower
most starting addresses.
2. The most fundamental functions of a loader are to bring an object program into memory
and starting its execution.
3. Traditionally, when developing a machine code manipulation tool, we need to read a
decoder for every BFF we want to manipulate
4. When a program needs to be executed, the OS first executes all relevant file information
and carries out any necessary actions before putting it into memory
A) 1=T, 2=T, 3=T 4=F
B) 1=T, 2=T, 3=F 4=F
C) 1=T, 2= F 3= T 4=F
D) 1=T, 2= F 3= F 4=F
72. State True or False
1. Fortran is an example for dynamic memory allocation
2. Java is Object oriented programming Language
3. Pascal is an example for static memory allocation
4. malloc () function is available only in c programming
A) 1-F, 2-T, 3-F, 4-F
B) 1-F, 2-T, 3-T, 4-F
C) 1-T, 2-T, 3-F, 4-F
D) 1-F, 2-T, 3-F, 4-T
73. State True or False.
1. In the variable length entry, the number of storage units used for the symbol depends on the
number of symbols in it.
2. A length fields in variable length entry is added to the entry in order to indicate how many
storage units are required by the symbol.
3. An organization using variable length entries would require more storage than fixed length
entries.
A) 1-T, 2-F, 3-F
B) 1-F, 2-F, 3-T
C) 1-T, 2-F, 3-T
D) 1-F, 2-T, 3-F
74. Find the True statements with respect to garbage collection.
1. Garbage collection (GC) is a form of automatic memory management.
2. The garbage collector or collector attempts to reclaim garbage, or memory used by
Objects that will never be accessed or mutated again by the application.
3. Garbage collection was invented by John McCarthy around 1959 to solve the problems of
manual memory management in his Lisp programming language.
4. Garbage collection is often portrayed as the opposite of manual memory management,
which requires the programmer to specify which objects to deallocate and return to the
memory system.
5. Garbage collection is an internal memory pool created at start-up that tasks use to
dynamically allocate memory as needed.
6. Garbage collector is used by tasks that require a lot of memory from the stack, such as
tasks that use wide columns.
A) 1,2,3
B) 1,2,3,4
C) 1,2,3,4,5
D) 1,2,3,4,5,6
75.
Fill in the blanks
A) 1-Syntatactic Corrector, 2-Symbol Table
B) 1- Symbol Table, 2- Syntatactic Corrector
C) 1-parcer analyzer, 2-Symbol Table
D) 1-Syntatactic Corrector, 2- parcer analyzer
Answer Keys
Part – A Part - B Part - C
Q. No. Ans. Key Q. No. Ans. Key Q. No. Ans. Key Q. No. Ans. Key
1 B 21 C 41 A 61 B
2 B 22 B 42 D 62 C
3 C 23 C 43 A 63 D
4 B 24 C 44 B 64 C
5 B 25 D 45 A 65 B
6 D 26 B 46 B 66 B
7 D 27 A 47 B 67 A
8 D 28 B 48 C 68 B
9 D 29 B 49 C 69 D
10 B 30 C 50 A 70 D
11 C 31 C 51 D 71 B
12 C 32 C 52 B 72 A
13 B 33 C 53 C 73 D
14 B 34 D 54 A 74 B
15 A 35 A 55 D 75 A
16 D 36 C 56 A
17 A 37 B 57 A
18 B 38 D 58 A
19 D 39 D 59 C
20 D 40 A 60 A