“““.are words that aprogramming language has set asidefor its own use.
(A) Control words
(B) Control structures
(C) Reserved words
(D) Reserved keys
(E) None of these

1 Answer

Answer :

Reserved words

Related questions

Description : ______ are words that a programming language has set aside for its own use: a) Control Words b) Control Structure c) Reserved Words d) Reserved Keys e) None of The Above

Last Answer : c) Reserved Words

Description : State the following statement is true or false. I. In class B addresses a total of more than 1 billion addresses can be formed. II. Class E addresses are reserved for future or experimental use. a. True, False b. True, True c. False, True d. False, False

Last Answer : b. True, True

Description : addresses are reserved for multicasting. a. Class B b. Class C c. Class D d. Class E

Last Answer : c. Class D

Description : As the resources are reserved between two communicating end systems in circuit switching, ___________ is achieved. a) authentication b) guaranteed constant rate c) reliability d) store and forward

Last Answer : b) guaranteed constant rate

Description : The required resources for communication between end systems are reserved for the duration of the session between end systems in ________ method. a) Packet switching b) Circuit switching c) Line switching d) Frequency switching

Last Answer : b) Circuit switching

Description : The required resources for communication between end systems are reserved for theduration of the session between end systems in method. a. Packet switched b. Bit switched c. Line switched d. Circuit switched

Last Answer : d. Circuit switched

Description : The master list of an indexed file A. is sortedin ascending order B. containsonly a list of keys and record numbers C. has a number assigned toeach record D. both (b)and (c) E. None of the above

Last Answer : has a number assigned toeach record

Description : A set of rules for telling the computer what operations to perform is called a a) procedural language b) structures c) natural language d) programming language e) None of these

Last Answer : d) programming language

Description : Not all reserved words are written in lowercase. TRUE or FALSE?

Last Answer : FALSE. All reserved words must be written in lowercase; otherwise, the C compiler would interpret this as unidentified and invalid.

Description : Define what are reserved words?

Last Answer : Reserved words are words that are part of the standard C language library. This means that reserved words have special meaning and therefore cannot be used for purposes other than Define what it is originally intended for. Examples of reserved words are int, void, and return.

Description : What is the difference between keywords and reserved words?

Last Answer : A: Keywords have a special meaning in a language, and are part of the syntax. Reserved words are words that cannot be used as identifiers (variables, functions, etc.), because they are reserved by the ... goto is a reserved word but not a keyword (as a consequence, you cannot use it at all)

Description : Recreational Reading should be Options: A) Reserved For The School Library Period. B) Assigned As Homework. C) A Responsibility Of The Home Not The School D) An Integral Part Of Language Art Curriculum.

Last Answer : D) An Integral Part Of Language Art Curriculum. 

Description : Data integrity control A. is used to set upper and lower limits on numeric data B. requires the use of passwords toprohibit unauthorized access tothe file C. has the data dictionary keep thedate and time ... back-up,and most recent modificationfor all files D. All of theabove E. None of the above

Last Answer : has the data dictionary keep thedate and time of lastaccess last back-up,and most recent modificationfor all files

Description : A stack is a. an 8-bit register in the microprocessor b. a 16-bit register in the microprocessor c. a set of memory locations in R/WM reserved for storing information temporarily during the execution of computer

Last Answer : c. a set of memory locations in R/WM reserved for storing information temporarily during the execution of computer

Description : How many types of loop control structures in C language. a. 4 b 65 c. 2 d. 8

Last Answer : d. 8

Description : Public key encryption method is a system a. which uses a set of public keys one for each participant in e-Commerce b. in which each person who wants to communicate has two keys; a private key known to him ... him. c. which uses the RSA coding system. d. which is a standard for use in e-Commerce.  

Last Answer : b. in which each person who wants to communicate has two keys; a private key known to him only and a public key which is publicized to enable others to send message to him.

Description : How many types of numerical words ? What are the keys ?

Last Answer : 4 types of numeral words- 1. Numeric number 2. Quantity or computational number 3. Order or integer 4. Dated numbers

Description : Can you explain RSA encryption keys in simple enough language for me?

Last Answer : answer:As I understand it (general disclaimer) The public key serves two purposes 1) Hey, I'm using encryption, so we'll have to converse using that, ok? 2) Here's the decoder ring I'm going to ... 't want your key to work anymore, I just change the lock, since I can't necessarily take your key.

Description : DBMS is a collection of ………….. that enables user to create and maintain a database. A) Keys B) Translators C) Program D) Language Activity

Last Answer : C) Program

Description : An output device that uses words or messages recorded on a magnetic medium to produce audio response is b. Magnetic tape c. Voice response unit d. Voice recognition unit e. Voice band

Last Answer : Voice response unit

Description : ________located on the right corner of the keyboard, is a separate set of number keys for quick input of numbers: a) Numeric Keypad b) Arrow Pad c) Symbolic Key Pad d) None of These

Last Answer : a) Numeric Keypad

Description : The bank has to have the public keys of all customers in SET protocol as it has to a. check the digital signature of customers b. communicate with merchants c. communicate with merchants credit card company d. certify their keys 

Last Answer : a. check the digital signature of customers 

Description : One of the problems with using SET protocol is a. the merchant's risk is high as he accepts encrypted credit card b. the credit card company should check digital signature c. the bank has to ... of all customers d. the bank has to keep a database of digital signatures of all customers 

Last Answer : c. the bank has to keep a database of the public keys of all customers

Description : Which of the following statements is FALSE about weak entity set ? (A) Weak entities can be deleted automatically when their strong entity is deleted. (B) Weak entity set avoids the data ... weak entity set are not partitioned according to their relationship with tuples in a strong entity set.

Last Answer : (D) Tuples in a weak entity set are not partitioned according to their relationship with tuples in a strong entity set.

Description : State the following statement is true or false. i) In class B addresses a total of more than 1 billion addresses can be formed. ii) Class E addresses are reserved for future or experimental use. A) True, False B) True, True C) False, True D) False, False

Last Answer : B) True, True

Description : State the following statement is true or false. i) In class B addresses a total of more than 1 billion addresses can be formed. ii) Class E addresses are reserved for future or experimental use. A) True, False B) True, True C) False, True D) False, False

Last Answer : B) True, True

Description : Three gods, A, B, and C, are called, in some order, True, False, and Random. True always speaks truly, False always speaks falsely, but whether Random speaks truly or falsely is completely random. ... a trick question. As a matter of fact, there are multiple ways to get the correct answer. -Riddles

Last Answer : 1. To god A: Does da' mean yes' if and only if you are True and if and only if B is Random? (We supposed A said, ja, making B True or False). 2. To god B: Does da mean yes' if and ... only if A is Random? Since B's True, he must say da, which means A is Random, leaving C to be False.

Description : .......... addresses are reserved for multicasting. A) Class B B) Class C C) Class D D) Class E

Last Answer : C) Class D

Description : addresses are reserved for multicasting. A) Class B B) Class C C) Class D D) Class E

Last Answer : D) Class E

Description : In______, each station is allocated a band to send its data. In other words, each band is reservedfor a specific station,and it belongs to the station all the time. A) FDMA B) TDMA C) CDMA D) none of the above

Last Answer : FDMA

Description : How many control keys are there on the key board ?

Last Answer : Usually there are 2 o'clock. In some cases it is 1 o'clock.

Description : Users can control which keys (and hence records) go to which Reducer by implementing a custom? a) Partitioner b) OutputSplit c) Reporter d) All of the mentioned

Last Answer : Partitioner

Description : What are Cursor Control Keys on Keyboard?

Last Answer : Ans. These four keys are used for moving the cursor from its current position to right, left, up or down.

Description : An ASCII is a character-encoding scheme that is employed by personal computers in order to represent various characters, numbers and control keys that the computer user selects on the ... C) American Standard Code for Information Integrity (D) American Standard Code for Isolated Information

Last Answer : (A) American Standard Code for Information Interchange

Description : . In SQL, which command(s) is(are) usedto recompilea storedfunction? A. SET FUNCTION B. SET STORED FUNCTION C. ALTER FUNCTION D. All of theabove E. None of the above

Last Answer : ALTER FUNCTION

Description : In SQL, the command(s) is (are)used tocreate an index for atable or cluster A. CREATE INDEX B. MODIFY INDEX C. SET INDEX TO FILE D. All of theabove E. None of the above

Last Answer : CREATE INDEX

Description : With anIP address set starting with 150, you currently havesix offices that you are treating as subnets. Plans are in place toopen 10 more officesbefore the end of theyear. What subnet mask should you useto ... maximize thenumberof hosts available at eachsite? A. 192 B. 224 C. 240 D. 248 E. 252

Last Answer : 248

Description : Three gods, A, B, and C, are called, in some order, True, False, and Random. True always speaks truly, False always speaks falsely, but whether Random speaks truly or falsely is completely random. You must ... are da and ja, in some order. You do not know which word means which. -Riddles

Last Answer : We're willing to bet that your brain feels pretty busted at this point. If you're ready to throw in the towel and hear the solution, we won't tell! Here are the three questions you ... start sorting out the solution with this 2008 paper, which claims to have the easiest answer to the brainteaser.

Description : In the IBM PC-At, what do the words AT stand for a. Additional Terminals b. Advance technology c. Applied technology d. Advanced terminology

Last Answer : Advance technology

Description : The proper definition of a modern digital computer is a. An electronic automated machine that can solve problems involving words and numbers b. A more sophistic and modified electronic pocket calculator c. Any machine that can perform mathematical operations d. A machine that works on binary code

Last Answer : A machine that works on binary code

Description : The ________ between two words is the number ofdifferences between corresponding bits. A) Hamming code B) Hamming distance C) Hamming rule D) none of the above

Last Answer : Hamming distance

Description : The ________ modeprovides synchronizationfor the entire stream of bits must. In other words, it guarantees that the data arrive ata fixed rate. A) synchronous B) asynchronous C) isochronous D) none of the above

Last Answer : isochronous

Description : The ________ between two words is the number of differences between corresponding bits A. Hamming code B. Hamming distance C. Hamming rule D. none of the above

Last Answer : B. Hamming distance

Description : If mandarin is a tonal language, how can people parse meaning when the words are set to music?

Last Answer : answer:Two guesses (having learned a little mandarin, but not being a scholar of the language): 1. Context: I'd imagine it's similar to when listening to punk rock or heavy metal, it takes a ... lyrics without affecting the sound too much. Like rolling your r's or enunciating your t's while singing

Description : An area legally reserved for wild life in its natural surroundings is – (1) Biosphere Reserve (2) Sanctuary (3) Social Forests (4) National Park

Last Answer : (2) Sanctuary Explanation: A wildlife sanctuary is an protected area that is reserved for the conservation only of wildlife, animals and plant species. Human activities like harvesting of timber, collection of minor forest products are allowed.

Description : An area legally reserved for wild life in its natural surroundings is?

Last Answer : Biosphere Reserve

Description : In_______transmission, bits aretransmittedsimultaneously,each across its own wire. A) Asynchronous serial B) Synchronous serial C) Parallel D) (a) and (b)

Last Answer : Parallel

Description : Find out the components of DHCP: 1) A protocol that delivers host-specific configuration parameters from a server to a host. 2) The client determines its own hardware address; this is normally in a ROM on the hardware. 3) ... or permanent network addresses to hosts. A. 1,2 B. 1,3 C. 2,3 D. 1,2,3

Last Answer : B. 1,3

Description : If 99% of the program is written in FORTRAN and the remaining 1% in assembly language the percentage increase in the execution time, compared to writing the 1% in assembly language is ? 0.9 0.1 1 0

Last Answer : 0

Description : If the entire program is written in FORTRAN, the percentage increase in the execution time, compared to writing the entire program in FORTRAN and rewriting the 1% in assembly language is ? 0.9 0.8 8 9

Last Answer : 0.8