Description : Machine language is A) Machine dependent B) Difficult to program C) Error prone D) All of above
Last Answer : Answer : D
Description : Machine language is a. Machine dependent b. Difficult to program c. Error prone d. All of above
Last Answer : d. All of above
Description : A computer program that translates one program instructions at a time into machine language is called a/an a. Interpreter b. CPU c. Compiler d. Simulator
Last Answer : Interpreter
Description : A computer program that converts an entire program into machine language is called a/an a. Interpreter b. Simulator c. Compiler d. Commander
Last Answer : Compiler
Description : The language that the computer can understand and execute is called a. Machine language b. Application software c. System program d. All of above
Last Answer : Machine language
Description : Which of the following is machine independence program? a. High level language b. Low level language c. Assembly language d. Machine language
Last Answer : High level language
Description : A compiler is a translating program which a. Translates instruction of a high level language into machine language b. Translates entire source program into machine language program c. It is not involved in program’s execution d. All of above
Last Answer : All of above
Description : Which language is directly understood by the computer without translation program? a. Machine language b. Assembly language c. High level language d. None of above
Description : Which statement is valid about computer program? A) High level languages must be converted into machine language to execute B) High level language programs are more efficient and faster to execute C) It ... to identify errors in high level language program than in low level programs D) All of above
Last Answer : Answer : A
Description : In Low Level Language, the term low level means: a) The quality is so low that large program can not be write b) To learn and even more difficult to write program c) Closeness to the way in which machine understand d) None of These
Last Answer : c) Closeness to the way in which machine understand
Description : What is the output of print 0.1 + 0.2 == 0.3? a) True b) False c) Machine dependent d) Error
Last Answer : Answer: b Explanation: Neither of 0.1, 0.2 and 0.3 can be represented accurately in binary. The round off errors from 0.1 and 0.2 accumulate and hence there is a difference of 5.5511e-17 between (0.1 + 0.2) and 0.3.
Description : HMP (Host Monitoring Protocol) is: A. a TCP/IP protocol used todynamically bind ahigh level IP Address to alow-level physical hardware address B. a TCP/IP high level protocol for transferring ... used to monitor computers D. a protocol that handles error andcontrol messages E. None of the above
Last Answer : a protocol used to monitor computers
Description : ICMP (Internet Control Message Protocol) is A. a TCP/IP protocol used todynamically bind ahigh level IP Address to alow-level physical hardware address B. a TCP/IP high level protocol for transferring ... to monitor computers D. a protocol that handles error andcontrol messages E. None of the above
Last Answer : a protocol that handles error andcontrol messages
Description : The Internet Control Message Protocol (ICMP) A. allows gateways to send error acontrol messages toother gateways or hosts B. provides communication between the Internet Protocol Software on one machine ... and takeaction to correct theproblem D. All of theabove E. None of the above
Last Answer : All of theabove
Description : Oils are partially hydrogenated (not fully) to manufacture Vanaspati, because fully saturated solidified oils (A) Cause cholesterol build up and blood clotting (B) Are prone to rancid oxidation (C ... (as their complete removal is very difficult) (D) Have affinity to retain harmful sulphur compounds
Last Answer : (A) Cause cholesterol build up and blood clotting
Description : Which object recognition process is an error-prone process? a) Bottom-up segmentation b) Top-down segmentation c) Both Bottom-up & Top-down segmentation d) None of the mentioned
Last Answer : a) Bottom-up segmentation
Description : Which of the following TCP/IP protocolallows an application program on one machine to senda datagram to anapplicationprogram onanother machine? A. UDP B. VMTP C. X.25 D. SMTP E. None of the above
Last Answer : UDP
Description : Which is the limitation of high level language? a. Lower efficiency b. Machine dependence c. machine level coding d. None of above
Last Answer : None of above
Description : which of the following is problem oriented language? a. High level language b. Machine language c. Assembly language d. Low level language
Description : Which of the following is called low level languages? a. Machine language b. Assembly language c. Both of the above d. None of above
Last Answer : Both of the above
Description : Easily reloctable language is a. Machine language b. Assembly language c. High level language d. Medium level language
Last Answer : Assembly language
Description : Mnemonic a memory trick is used in which of the following language? a. Machine language b. Assembly language c. High level language d. None of above
Description : If 99% of the program is written in FORTRAN and the remaining 1% in assembly language the percentage increase in the execution time, compared to writing the 1% in assembly language is ? 0.9 0.1 1 0
Last Answer : 0
Description : If the entire program is written in FORTRAN, the percentage increase in the execution time, compared to writing the entire program in FORTRAN and rewriting the 1% in assembly language is ? 0.9 0.8 8 9
Last Answer : 0.8
Description : If 99% of the program is written in FORTRAN and the remaining 1% in assembly language, the percentage increase in the programming time compared to writing the entire program in FORTRAN and rewriting the 1% in assembly language is ? 10 5 13 8
Last Answer : 5
Description : To completely write the program in FORTRAN and rewrite the 1% code in assembly language, if the project needs 13 days, theteam consists of ? 13 programmers 10 programmers 8 programmers 100/13 programmers
Last Answer : 10 programmers
Description : The translator program used in assembly language is called a. Compiler b. Interpreter c. Assembler d. Translator
Last Answer : Assembler
Description : Management of software development is dependent upon ? People Product Process All of above
Description : The target hardware address on an Ethernet is _______ in an ARP request. A) 0x000000000000 B) 0.0.0.0 C) variable D) class dependent
Last Answer : 0x000000000000
Description : . The _____of errors is more difficult than the ______. A) correction; detection B) detection; correction C) creation; correction D) creation;detection
Last Answer : correction; detection
Description : This modem standard has a speed of 28.8k and has error-correction features. A. V.42 B. V.32bis C. V.90 D. V.34
Last Answer : V.42
Description : An error in computer data is called a. Chip b. Bug c. CPU d. Storage device
Last Answer : Bug
Description : An error in software or hardware is called a bug. What is the alternative computer jargon for it? a. Leech b. Squid c. Slug d. Glitch
Last Answer : Glitch
Description : Which of the following is associated with error detector? a. Odd parity bit b. Even parity bit c. Both of the above d. None of above
Description : In Bluetooth, the_____ link is used when avoiding latency (delay in data delivery) is more important than integrity (error-free delivery). A) SCO B) ACL C) ACO D) SCL
Last Answer : SCO
Description : In the Ethernet frame, the_______field contains error detection information. A) CRC B) preamble C) address D) none of the above
Last Answer : CRC
Description : The purpose of the _______is to provide flow and error control for the upper-layer protocols that actually demand theseservices A) MAC B) LLC C) LLU D) none of the above
Last Answer : LLC
Description : _________control inthe datalink layer is based on automatic repeat request, which is the retransmission of data. A) Flow B) Error C) Transmission D) none of the above
Last Answer : Transmission
Description : _______ control refers to aset of proceduresused torestrict the amount ofdata that the sender can send before waiting foracknowledgment. A) Flow B) Error C) Transmission D) none of the above
Last Answer : Flow
Description : The _________Protocol, addsa simple error control mechanism to the _______Protocol. A) Stop-and-Wait ARQ; Stop-and-Wait B) Go-Back-N ARQ; Stop-and-Wait C) Selective Repeat ARQ; Go-Back-N ARQ D) none of the above
Last Answer : Go-Back-N ARQ; Stop-and-Wait
Description : If the Hammingdistancebetweena dataword and the corresponding codewordis three, thereare _____bits in error. A) 3 B) 4 C) 5 D) none of the above
Last Answer : 3
Description : In ________ error correction, the receiver asks thesender tosend thedata again. A) backward B) retransmission C) forward D) none of the above
Last Answer : retransmission
Description : In ________ error correction, the receiver correctserrors without requestingretransmission. A) backward B) onward C) forward D) none of the above
Last Answer : forward
Description : A burst error means that two or more bits in the dataunit havechanged. A) double-bit B) burst C) single-bit D) none of the above
Last Answer : burst
Description : Which error detection method consists of just one redundant bit per data unit? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum
Last Answer : Simple parity check
Description : Which error detection method usesone's complement arithmetic? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum
Last Answer : Checksum
Description : Block coding can help in _______at the receiver. A) Synchronization B) Error detection C) Attenuation D) (a) and (b)
Last Answer : (a) and (b)
Description : At the data link layer, Frame Relayusesa protocol that supports _____control. A) flow B) error C) either (a) or (b D) neither (a) nor (b)
Last Answer : neither (a) nor (b)
Description : The term ________ means that IP provides no error checking or tracking. IP assumes the unreliabilityof the underlying layers and does its best to get a transmission throughto its destination,but with ... ) reliable delivery B) connection-oriented delivery C) best-effort delivery D) noneof the above
Last Answer : best-effort delivery
Description : A best-effort delivery service suchas IPv4 includes _______. A) error checking B) error correction C) datagram acknowledgment D) noneof the above
Last Answer : noneof the above