Description : Which of the following is the process of assembling program components, data, and libraries, and then compiling and linking these to create an executable system? a) System building b) Release management c) Change management d) Version management
Last Answer : a) System building
Description : When subroutine is called contents of program counter is location address of __ instruction following call instruction is stored on _ __and program execution is transferred to __ address. a. Non ... , Stack and Main program Cc. Executable, Queue and Subroutine d. Executable, Stack and Subroutine
Last Answer : d. Executable, Stack and Subroutine
Description : A(n) _____ program is one that is ready to run and does not need to be altered in any way. a) Interpreter b) High level c) Compiler d) Executable e) None of these
Last Answer : d) Executable
Description : What is correcting errors in a program called? 1) Debugging 2) Compiling 3) Interpreting 4) None of these
Last Answer : 1) Debugging
Description : _______viruses infect executable program files: a) File Infector Viruses b) Macro Viruses c) Multi Partite Viruses d) None of These
Last Answer : a) File Infector Viruses
Description : _____is the process of finding errors in software code. 1) Compiling 2) Testing 3) Running 4) Debugging 6 5) None of these
Last Answer : Answer :4
Description : The Process of writing out computer instructions is known as- 1) Assembling 2) Compiling 3) Executing 4) coding
Last Answer : 1) Assembling
Description : ..... is the process finding errors in software code. 1) compiling 2) Assembling 3) Interpreting 4) Debugging
Last Answer : 4) Debugging
Description : The process of combining strings is known as (1) compiling (2) Combining (3) Attaching (4) Concatenation
Last Answer : Concatenation
Description : In programming, repeating some statements is usually called (1) Compiling (2) Structure (3) Looping (4) Control structure
Last Answer : Looping
Description : contain library program have to be indicated to the loader. a. Externally defined b. Internally defined c. Executable file d. All of these
Last Answer : a. Externally defined
Description : A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect. A) Stealth virus B) Polymorphic Virus C) Parasitic Virus
Last Answer : C) Parasitic Virus
Description : The ............... transfers the executable image of a C++ program from hard disk to main memory. (A) Compiler (B) Linker (C) Debugger (D) Loader
Last Answer : (D) Loader
Description : In CNC Program M98 is refer to…… a.CANCEL Subroutine b.Call Sub-Program c.Call Subroutine d.CANCEL Sub-Program
Last Answer : b.Call Sub-Program
Description : Return instruction is written in_ to written to main program: a. Subroutine b. Main program c. Botha &b d. None of these
Last Answer : a. Subroutine
Description : Subroutine is called _ a. In Same program b. Inexternal program co Botha&b d. None of these
Last Answer : co Botha&b
Description : If internal subroutine is called global data is used to pass values defining parameters between __ program and defined | a. Main and subroutine b. Local and subroutine c. Global and subroutine d. Global and main
Last Answer : a. Main and subroutine
Description : Which is the common program control instructions are. a Branch b. Jump c Call a subroutine d. Return e. Allof these f None of these
Last Answer : e. Allof these
Description : When the RET instruction at the end of subroutine is executed, a. the information where the stack is iniatialized is transferred to the stack pointer b. the memory address of the RET instruction is ... two data bytes stored in the top two locations of the stack are transferred to the stack pointer
Last Answer : c. two data bytes stored in the top two locations of the stack are transferred to the program counter
Description : When a subroutine is called, the address of the instruction following the CALL instructions stored in/on the a. stack pointer b. accumulator c. program counter d. stack
Last Answer : d. stack
Description : ACALL instruction allows specifying ______address in the instruction and calling subroutine within ______ program memory block. a) 2byte, 3K b) 11bit, 2K c) 9bit, 2K d) 1byte, 3K
Last Answer : c) 9bit, 2K
Description : In 8085, whenever a signal is received at TRAP terminal, its program execution is transferred to a subroutine on address A) 0000 H B) 002C H C) 0024 H D) 0004 H
Last Answer : In 8085, whenever a signal is received at TRAP terminal, its program execution is transferred to a subroutine on address 0024 H
Description : What the historical method of compiling a dictionary was first used by Dr. Samuel Johnson. True?
Last Answer : Need answer
Description : High level language C supports register transfer technique for _ application. a. Executing b. Compiling c. Both d. None
Last Answer : a. Executing
Description : In Excel“““.allows users to bring together copiesof work-books that otherusers have worked on independently. (A) Copying (B) Merging (C) Pasting (D) Compiling (E) None of these
Last Answer : Merging
Description : A ______________ is diagram that depicts the flow of a program. a) Algorithm b) Hash Table c) Graph d) Flowchart
Last Answer : Answer: d Explanation: A flowchart is a diagram that helps us determine the flow of the program. Other options are irrelevant
Description : Any algorithm is a program. a) True b) False
Last Answer : Answer: b Explanation: The statement is false. An algorithm when represented in the form of a programming language is called a program. Any program is an algorithm but the reverse is not true
Description : When an algorithm is written in the form of a programming language, it becomes a _________ a) Flowchart b) Program c) Pseudo code d) Syntax
Last Answer : Answer: b Explanation: An algorithm becomes a program when it is written in the form of a programming language. Thus, any program is an algorithm
Description : A compiler translates a program written in a high-level language into a) Machine language b) An algorithm c) A debugged program d) Java e) None of these
Last Answer : a) Machine language
Description : A compiler translates a program written in a high level language into 1) Machine Language 2) An algorithm 3) A debugged program 4) None of these
Last Answer : 1) Machine Language
Description : A module contains machine code with specification on_ _ a. Relative addresses b. Absolute addresses c. Object program d. None of these
Last Answer : a. Relative addresses
Description : To design a program it requires __ os a. Program specification b. Code specification c. Instruction specification d. Problem specification
Last Answer : a. Program specification
Description : We use the output of the requirement analysis, the requirement specification as the input for writing :- a) User Acceptance Test Cases b) Integration Level Test Cases c) Unit Level Test Cases d) Program specifications
Last Answer : a) User Acceptance Test Cases
Description : How do I unblock non-executable packages in Ubuntu?
Last Answer : answer:Well, you’ve already installed the Zune software haven’t you?, so running the installer again won’t accomplish much of use. Browse through your C_Drive folder and locate the .exe of the Zune software itself. Also, try Gnomad – it might work.
Description : Which of the following buttons do you click to pre-configure the fields in an executable transaction screen?
Last Answer : Variant
Description : Problems with using Lines of Code to measure the size of a product include(s) a) The creation of source code is only part of the development effort b) The Lines of Code (LOC) will differ between ... The final size (kLOC) can only be determined once the product is delivered e) All of the above.
Last Answer : e) All of the above.
Description : When the Captain cannot comply with an ATC clearance: a. The Captain must accept the ATC clearance, because it is based on a filed flight plan b. He/she may request an amended clearance and, if ... appropriate ATC must grant him/her that clearance d. He/she may suggest a new clearance to ATC
Last Answer : b. He/she may request an amended clearance and, if executable, he/she will accept that clearance
Last Answer : Size of the final executable can be reduced using dynamic linking for libraries.
Description : The Octal number to be given alogn with chmod command to make a file readable, writable and executable to the owner, readable and executable to group and others is: A. 000 B. 755 C. 744 D. 555 E. None of the above
Last Answer : B. 755
Description : Use of an executable model to represent the behavior of an object is called A. Simulation B. Software item C. Software feature D. None of the above
Last Answer : A. Simulation
Description : Verification performed without any executable code is referred to as A. Review B. Static testing C. Validation D. Sanity testing
Last Answer : B. Static testing
Description : Preparedstatement Object in JDBC is used to execute ........................... queries. A) executable B) simple C) high level D) parameterized
Last Answer : D) parameterized
Description : Prepared Statement object in JDBC used to execute........... queries. A) Executable B) Simple C) High level D) Parameterized
Last Answer : D) Parameterized
Description : State whether the following statement is true. i) A macro virus is platform independent. ii) Macro viruses infect documents, not executable portions of code. A) i-only B) ii-only C) Both i and ii D) Non i and ii
Last Answer : D) Non i and ii
Description : ……………….. level is where the model becomes compatible executable code A) Abstract level B) Application level C) Implementation level D) All of the above
Last Answer : C) Implementation level
Description : It contains the stack for PC storage during subroutine calls and input/output interrupt services: a. Seven- level hardware b. Eight- level hardware
Last Answer : b. Eight- level hardware
Description : A is written as separate unit, apart from main and called whenever necessary: a. Subroutine b. Code c. Block d. None of these
Description : ___uses the stack to store return address of subroutine: a. CPU b. Microprocessor c. register d. memory
Last Answer : b. Microprocessor
Description : A subroutine called by another subroutine is called: a. Nested b. For loop c. Break d. Continue
Last Answer : a. Nested