____ is the mode we use to execute the instruction from a computer.
a) Sequential b) Parallel c) Both (a) & (b) d) None of the above
Description : ____ is the language that computer can understand and execute. a) Middle Level Language b) Machine Level Language c) High Level Language d) All of the above
Last Answer : the language of a computer is called all
Description : A computer program that converts one by one instruction into a machine language is called ____. a) Interpreter b) Simulator c) Compiler d) None of the above
Last Answer : A computer program that converts one by one instruction into a machine language is called Interpreter.
Description : Virtual Mode Flag bit can be set using ____ instruction or any task switch operation only in the _____ mode a) IRET, Virtual b) POPF, Real c) IRET, protected d) POPF, protected
Last Answer : b) POPF, Real
Description : ……… is a group of words or coded instruction for the NC/CNC system to execute aparticular movement. a.Sequence b.Address c.Code d.Block
Last Answer : d.Block
Description : __is the sequence of operations performed by CPU in processing an instruction: a. Execute cycle b. Fetch cycle c. Decode d. Instruction cycle
Last Answer : d. Instruction cycle
Description : _is the step during which a new instruction is read from the memory: a Decode b. Fetch c. Execute d. None of these
Last Answer : b. Fetch
Description : is the step during which the operations specified by the instruction are executed: a. Execute b. Decode c. Both a& b d. None of these
Last Answer : a. Execute
Description : sis given an instruction in machine language this instruction is fetched from the memory by the CPU to execute: a. ALU b. CPU c. MU d. All of these
Last Answer : b. CPU
Description : Which cycle refers to the time period during which one instruction is fetched and executed by the CPU: a. Fetch cycle b. Instruction cycle c. Decode cycle d. Execute cycle
Last Answer : b. Instruction cycle
Description : Micro-orders generate the_ __ address of operand and execute instruction and prepare for fetching next instruction from the main memory: a. Physical b. Effective c. Logical d. all of above
Last Answer : b. Effective
Description : Which of the following 2 task are performed to execute an instruction by MCU: a. Microinstruction execution b. Microinstruction sequencing c. Botha&b d. None of these
Last Answer : c. Botha&b
Description : Pipeline implement a. fetch instruction b. decode instruction c. fetch operand d. calculate operand e. execute instruction f. all of abve
Last Answer : f. all of abve
Description : _________allows to execute the methods of an object in another machine or JVM? A) Protocol handler B) Streaming C) RMI D) IPC
Last Answer : RMI allows to execute the methods of an object in another machine or JVM.
Description : In Unix, files can be protected by assigning each one a 9-bit mode called rights bits. Now, consider the following two statements: I. A mode of 641 (octal) means that the owner can read and write the file, other ... (B) Only II is correct (C) Both I and II are correct (D) Both I and II are incorrect
Last Answer : (C) Both I and II are correct
Description : A certain SRAM has CS=0, WE=0 and OE=1. In which the following mode, this SRAM is operating: a) Read b) Write c) Stand By d) None of the above
Last Answer : A certain SRAM has CS=0, WE=0 and OE=1. In which the following mode, this SRAM is operating:Write
Description : ____ is known as a computer network in which one centralized, powerful computer is a hub to which many less powerful personal computers or workstations are connected. The clients run programs and access data that ... server. a) Client-Server network b) Extranet c) Internet d) None of the above.
Last Answer : Client-Server network is known as a computer network in which one centralized, powerful computer is a hub to which many less powerful personal computers or workstations are connected. The clients run programs and access data that stored on the server.
Description : Of the following, ____ would be considered as a way through which a computer virus can enter into a computer system. a) E-mail with attachments b) Downloading the data from sites c) Operating the system without antivirus software d) All of the above
Last Answer : Of the following, ____ would be considered as a way through which a computer virus can enter into a computer system. a) E-mail with attachments b) Downloading the data from sites c) Operating the system without antivirus software d) All of the above
Description : Of the following, ____ is not a computer language. a) MS-Word b) C++ c) COBOL d) BASIC
Last Answer : Of the following, ____ is not a computer language. a) MS-Word b) C++ c) COBOL d) BASIC
Description : The computer code for interchange of information between terminals is ____. a) ASCII b) ACSII c) ASICI d) ASIIC
Last Answer : The computer code for interchange of information between terminals is ASCII.
Description : Information that a computer produces and delivers back to the user is known as ____. a) Input b) Output c) Both (a) and (b) d) None of the above
Last Answer : Information that a computer produces and delivers back to the user is known as Output.
Description : Information that is entered into a computer is called as ____. a) Input b) Output c) Both (a) and (b) d) None of the above
Last Answer : Information that is entered into a computer is called as Input.
Description : The building block for all information that flows through a computer ____. a) Bit b) Byte c) Both (a) and (b) d) None of the above
Last Answer : The building block for all information that flows through a computer Byte
Description : ____ is a set of instructions, also called a program that tells a computer how to perform tasks. a) Hardware b) Software c) Both (a) and (b) d) None of the above
Last Answer : a and b because you need a keyboard or something that's hardware to get code flowing which is software
Description : A computer program that converts an entire program into a machine language is called ____. a) Interpreter b) Simulator c) Compiler d) None of the above
Last Answer : A computer program that converts an entire program into a machine language is called Compiler.
Description : What is meant by devoted computer ____. a) Which uses only one kind of software b) Which is used by only one person c) Which is assigned with only one task d) No such type of computers are available
Last Answer : What is meant by devoted computer ____. a) Which uses only one kind of software b) Which is used by only one person c) Which is assigned with only one task d) No such type of computers are available
Description : Content of the program counter is added to the address part of the instruction in order to obtain the effective address is called_______ A. relative address mode. B. index addressing mode. C. register mode. D. implied mode.
Last Answer : A. relative address mode.
Description : In which addressing mode the operand is given explicitly in the instruction? A. Absolute B. Immediate C. Indirect D. Direct
Last Answer : B. Immediate
Description : The ............... addressing mode is similar to register indirect addressing mode, except that an offset is added to the contents of the register. The offset and register are specified in the instruction. (A) Base indexed (B) Base indexed plus displacement (C) Indexed (D) Displacement
Last Answer : (D) Displacement
Description : What addressing mode is used in the instruction RET? (a) Direct (b) Immediate (c) Implicit (d) Register-indirect
Last Answer : What addressing mode is used in the instruction RET? (a) Direct (b) Immediate (c) Implicit (d) Register-indirect
Description : One of use of microprogramming to implement _ ____ of processor in Intel 80x86 and Motorola 680x0 processors whose instruction set are evolved from 360 original. a. Control structure b. Without control c. Control unit d. Only control
Last Answer : c. Control unit
Description : 8096 write-protected mode, no code can write to memory address between __. a) 2020 to 3FFFH b) 8000 to FFFFH c) 2000 to 3FFFH d) 2020 to 202FH 17. If the __ pin is ___ , then we have the option ... b) EA, low, internal, external c) EA, high, external, internal d) EA, low, external, internal
Last Answer : c) EA, high, external, internal
Description : Nano Second is the ____. a) Millionths of a second b) Billionths of a second c) Trillionth of a second d) Thousands of a second
Last Answer : Nano Second is the Billionths of a second
Description : The device that is used to read bar codes is ____. a) OMR b) Barcode c) MICR d) OCR
Last Answer : The device that is used to read bar codes is Barcode
Description : ____ are the examples of pointing devices. a) Electronic Mouse b) Pointing Stick c)Track ball d) All of the above
Last Answer : ____ are the examples of pointing devices. a) Electronic Mouse b) Pointing Stick c)Track ball d) All of the above
Description : ____ is known as unauthorized access to the system. a) Decryption b) Encryption c) Hacking d) None of the above
Last Answer : Hacking is known as unauthorized access to the system.
Description : ____ is known as allowing the authorized access to information. a) Decryption b) Encryption c) Hacking d) None of the above
Last Answer : Decryption is known as allowing the authorized access to information.
Description : ____ is known as restricting the access to information. a) Decryption b) Encryption c) Hacking d) None of the above
Last Answer : Encryption is known as restricting the access to information.
Description : A collection of related records in a database ____. a) Field b) File c) Both (a) and (b) d) None of the above
Last Answer : A collection of related records in a database File
Description : Of the following, ____ is different from the group. a) Windows b) MS-Word c) MS-Excel d) MS-PowerPoint
Last Answer : Of the following, ____ is different from the group. a) Windows b) MS-Word c) MS-Excel d) MS-PowerPoint
Description : Web address is a unique address to identify ____ on web. a) Browser b) Website c) Link d) All of the above
Last Answer : Web address is a unique address to identify Website on web.
Description : False () function ____. a) Returns the logical value of false b) Returns the logical value of true c) Returns the actual value d) None of the above
Last Answer : False () function ____. a) Returns the logical value of false b) Returns the logical value of true c) Returns the actual value d) None of the above
Description : Without the symbol '=' excel will treat the data as ____. a) Number b) Formula c) Text d) None of the above
Last Answer : Without the symbol '=' excel will treat the data as Text.
Description : Which of the following is correct ____. a) Frequency (data-array, bins array) b) Frequency (data, bins) c) Frequency (data, bins array) d) Frequency (array, bins array)
Last Answer : Which of the following is correct ____. a) Frequency (data-array, bins array) b) Frequency (data, bins) c) Frequency (data, bins array) d) Frequency (array, bins array)
Description : Of the following is correct syntax in excel ____? a) REPLACE (old-text, num-chars, Start-num, New-text) b) REPLACE (old-text, Start-num, num-chars, New-text) c) REPLACE (old-text, New-text, num-chars, Start-num) d) REPLACE (num-chars, Start-num, old-text, New-text)
Last Answer : Of the following is correct syntax in excel REPLACE (old-text, Start-num, num-chars, New-text)
Description : Among the following ____ is a logical function. a) Average b) Count c) ABS d) AND
Last Answer : Among the following AND is a logical function.
Description : What is the shortcut key to display the 'save as' dialog box ____. a) F8 b) F12 c) F11 d) F9
Last Answer : What is the shortcut key to display the 'save as' dialog box F12.
Description : To find text, formatting and special items ____ is the keyboard short key. a) Ctrl+g b) Ctrl+h c) Ctrl+f d) Ctrl+a
Last Answer : To find text, formatting and special items Ctrl+f is the keyboard short key.
Description : In a table to move to the first cell in a row, ____ is the keyboard shortcut key. a) Alt+Tab b) Alt+Shift c) Alt+Ctrl d) Alt+Home
Last Answer : In a table to move to the first cell in a row, Alt+Home is the keyboard shortcut key.
Description : What is the keyboard shortcut key to merge a document ____. a) Alt+Shift+N b) Alt+Shift+O c) Alt+Shift+P d) Alt+Shift+Q
Last Answer : What is the keyboard shortcut key to merge a document Alt+Shift+N.
Description : After copying the content, how many times can you paste ____. a) Only one time b) Two times c) Three times d) Many times
Last Answer : After copying the content, how many times can you paste Many times.