Compiling creates a(n)-
1) Program Specification
2) Algorithm
3) Executable Program
4) Subroutine

1 Answer

Answer :

3) Executable Program

Related questions

Description : Which of the following is the process of assembling program  components, data, and libraries, and then compiling and linking these to  create an executable system? a) System building b) Release management c) Change management d) Version management

Last Answer : a) System building

Description : When subroutine is called contents of program counter is location address of __ instruction following call instruction is stored on _ __and program execution is transferred to __ address. a. Non ... , Stack and Main program Cc. Executable, Queue and Subroutine d. Executable, Stack and Subroutine

Last Answer : d. Executable, Stack and Subroutine

Description : A(n) _____ program is one that is ready to run and does not need to be altered in any way. a) Interpreter b) High level c) Compiler d) Executable e) None of these

Last Answer : d) Executable

Description : What is correcting errors in a program called? 1) Debugging 2) Compiling 3) Interpreting 4) None of these

Last Answer : 1) Debugging

Description : _______viruses infect executable program files: a) File Infector Viruses b) Macro Viruses c) Multi Partite Viruses d) None of These

Last Answer : a) File Infector Viruses

Description : _____is the process of finding errors in software code. 1) Compiling 2) Testing 3) Running 4) Debugging 6 5) None of these

Last Answer : Answer :4

Description : The Process of writing out computer instructions is known as- 1) Assembling 2) Compiling 3) Executing 4) coding

Last Answer : 1) Assembling

Description : ..... is the process finding errors in software code. 1) compiling 2) Assembling 3) Interpreting 4) Debugging

Last Answer : 4) Debugging

Description : The process of combining strings is known as (1) compiling (2) Combining (3) Attaching (4) Concatenation

Last Answer : Concatenation

Description : In programming, repeating some statements is usually called (1) Compiling (2) Structure (3) Looping (4) Control structure

Last Answer : Looping

Description : contain library program have to be indicated to the loader. a. Externally defined b. Internally defined c. Executable file d. All of these

Last Answer : a. Externally defined

Description : A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect. A) Stealth virus B) Polymorphic Virus C) Parasitic Virus

Last Answer : C) Parasitic Virus

Description : The ............... transfers the executable image of a C++ program from hard disk to main memory. (A) Compiler (B) Linker (C) Debugger (D) Loader

Last Answer : (D) Loader

Description : In CNC Program M98 is refer to…… a.CANCEL Subroutine b.Call Sub-Program c.Call Subroutine d.CANCEL Sub-Program

Last Answer : b.Call Sub-Program

Description : Return instruction is written in_ to written to main program: a. Subroutine b. Main program c. Botha &b d. None of these

Last Answer : a. Subroutine

Description : Subroutine is called _ a. In Same program b. Inexternal program co Botha&b d. None of these

Last Answer : co Botha&b

Description : If internal subroutine is called global data is used to pass values defining parameters between __ program and defined | a. Main and subroutine b. Local and subroutine c. Global and subroutine d. Global and main

Last Answer : a. Main and subroutine

Description : Which is the common program control instructions are. a Branch b. Jump c Call a subroutine d. Return e. Allof these f None of these

Last Answer : e. Allof these

Description : When the RET instruction at the end of subroutine is executed, a. the information where the stack is iniatialized is transferred to the stack pointer b. the memory address of the RET instruction is ... two data bytes stored in the top two locations of the stack are transferred to the stack pointer

Last Answer : c. two data bytes stored in the top two locations of the stack are transferred to the program counter

Description : When a subroutine is called, the address of the instruction following the CALL instructions stored in/on the a. stack pointer b. accumulator c. program counter d. stack

Last Answer : d. stack

Description : ACALL instruction allows specifying ______address in the instruction and calling subroutine within ______ program memory block. a) 2byte, 3K b) 11bit, 2K c) 9bit, 2K d) 1byte, 3K

Last Answer : c) 9bit, 2K

Description : In 8085, whenever a signal is received at TRAP terminal, its program execution is transferred to a subroutine on address A) 0000 H B) 002C H C) 0024 H D) 0004 H

Last Answer : In 8085, whenever a signal is received at TRAP terminal, its program execution is transferred to a subroutine on address 0024 H

Description : What the historical method of compiling a dictionary was first used by Dr. Samuel Johnson. True?

Last Answer : Need answer

Description : High level language C supports register transfer technique for _ application. a. Executing b. Compiling c. Both d. None

Last Answer : a. Executing

Description : In Excel“““.allows users to bring together copiesof work-books that otherusers have worked on independently. (A) Copying (B) Merging (C) Pasting (D) Compiling (E) None of these

Last Answer : Merging

Description : A ______________ is diagram that depicts the flow of a program. a) Algorithm b) Hash Table c) Graph d) Flowchart

Last Answer : Answer: d Explanation: A flowchart is a diagram that helps us determine the flow of the program. Other options are irrelevant

Description : Any algorithm is a program. a) True b) False

Last Answer : Answer: b Explanation: The statement is false. An algorithm when represented in the form of a programming language is called a program. Any program is an algorithm but the reverse is not true

Description : When an algorithm is written in the form of a programming language, it becomes a _________ a) Flowchart b) Program c) Pseudo code d) Syntax

Last Answer : Answer: b Explanation: An algorithm becomes a program when it is written in the form of a programming language. Thus, any program is an algorithm

Description : A compiler translates a program written in a high-level language into a) Machine language b) An algorithm c) A debugged program d) Java e) None of these

Last Answer : a) Machine language

Description : A compiler translates a program written in a high level language into 1) Machine Language 2) An algorithm 3) A debugged program 4) None of these

Last Answer : 1) Machine Language

Description : A module contains machine code with specification on_ _ a. Relative addresses b. Absolute addresses c. Object program d. None of these

Last Answer : a. Relative addresses

Description : To design a program it requires __ os a. Program specification b. Code specification c. Instruction specification d. Problem specification

Last Answer : a. Program specification

Description : We use the output of the requirement analysis, the requirement specification as the input for writing :- a) User Acceptance Test Cases b) Integration Level Test Cases c) Unit Level Test Cases d) Program specifications

Last Answer : a) User Acceptance Test Cases

Description : How do I unblock non-executable packages in Ubuntu?

Last Answer : answer:Well, you’ve already installed the Zune software haven’t you?, so running the installer again won’t accomplish much of use. Browse through your C_Drive folder and locate the .exe of the Zune software itself. Also, try Gnomad – it might work.

Description : Which of the following buttons do you click to pre-configure the fields in an executable transaction screen?

Last Answer : Variant

Description : Problems with using Lines of Code to measure the size of a product include(s) a) The creation of source code is only part of the development effort b) The Lines of Code (LOC) will differ between ... The final size (kLOC) can only be determined once the product is delivered e) All of the above.

Last Answer : e) All of the above.

Description : When the Captain cannot comply with an ATC clearance: a. The Captain must accept the ATC clearance, because it is based on a filed flight plan b. He/she may request an amended clearance and, if ... appropriate ATC must grant him/her that clearance d. He/she may suggest a new clearance to ATC

Last Answer : b. He/she may request an amended clearance and, if executable, he/she will accept that clearance

Last Answer : Size of the final executable can be reduced using dynamic linking for libraries.

Description : The Octal number to be given alogn with chmod command to make a file readable, writable and executable to the owner, readable and executable to group and others is: A. 000 B. 755 C. 744 D. 555 E. None of the above

Last Answer : B. 755

Description : When the Captain cannot comply with an ATC clearance: a. The Captain must accept the ATC clearance, because it is based on a filed flight plan b. He/she may request an amended clearance and, if ... appropriate ATC must grant him/her that clearance d. He/she may suggest a new clearance to ATC

Last Answer : b. He/she may request an amended clearance and, if executable, he/she will accept that clearance

Description : Use of an executable model to represent the behavior of an object is called A. Simulation B. Software item C. Software feature D. None of the above

Last Answer : A. Simulation

Description : Verification performed without any executable code is referred to as A. Review B. Static testing C. Validation D. Sanity testing

Last Answer : B. Static testing

Description : Preparedstatement Object in JDBC is used to execute ........................... queries. A) executable B) simple C) high level D) parameterized

Last Answer : D) parameterized

Description : Prepared Statement object in JDBC used to execute........... queries. A) Executable B) Simple C) High level D) Parameterized

Last Answer : D) Parameterized

Description : State whether the following statement is true. i) A macro virus is platform independent. ii) Macro viruses infect documents, not executable portions of code. A) i-only B) ii-only C) Both i and ii D) Non i and ii

Last Answer : D) Non i and ii

Description : ……………….. level is where the model becomes compatible executable code A) Abstract level B) Application level C) Implementation level D) All of the above

Last Answer : C) Implementation level

Description : It contains the stack for PC storage during subroutine calls and input/output interrupt services: a. Seven- level hardware b. Eight- level hardware

Last Answer : b. Eight- level hardware

Description : A is written as separate unit, apart from main and called whenever necessary: a. Subroutine b. Code c. Block d. None of these

Last Answer : a. Subroutine

Description : ___uses the stack to store return address of subroutine: a. CPU b. Microprocessor c. register d. memory

Last Answer : b. Microprocessor

Description : A subroutine called by another subroutine is called: a. Nested b. For loop c. Break d. Continue

Last Answer : a. Nested