Description : Any method for controlling access to or use of memory is known A) Memory map B) Memory protection C) Memory management D) Memory instruction
Last Answer : Answer : B
Description : Any method for controlling access to or use of memory is known a. Memory map b. Memory protection c. Memory management d. Memory instruction
Last Answer : b. Memory protection
Description : Which of the following is a way to access secondary memory? a. Random access memory b. Action method c. Transfer method d. Density method
Last Answer : Random access memory
Description : The simplest method of controlling sequence of instruction execution is to have each instruction explicitly specify: a. The address of next instruction to be run b. Address of previous instruction c. Both a &b d. None of these
Last Answer : a. The address of next instruction to be run
Description : Which of the following registers is used to keep track of address of the memory location where the next instruction is located? a. Memory address register b. Memory data register c. Instruction register d. Program counter
Last Answer : Program counter
Description : Which of the following registers is loaded with the contents of the memory location pointed by the PC? a. Memory address registers b. Memory data registers c. Instruction register d. Program counter
Last Answer : Instruction register
Description : A method of implementing a memory management system is a. Buddy system b. Bridgeware c. Broadband coaxial system d. All of the above
Last Answer : Buddy system
Description : A type of core store that has a lower access time than the devices used for working store in the same processor is known as a. Core memory b. Buffer c. Fast core d. Address register
Last Answer : Address register
Description : a computer which CPU speed around 100 million instruction per second and with the word length of around 64 bits is known as a. Super computer b. Mini computer c. Micro computer d. Macro computer
Last Answer : Super computer
Description : What is MAC ? A computer made by Apple Memory address corruption Mediocre Apple Computer Media Access Control
Last Answer : Media Access Control
Description : Which of the following memories has the shortest access times? a. Cache memory b. Magnetic bubble memory c. Magnetic core memory d. RAM
Last Answer : Cache memory
Description : Database management systems are intended to: A. eliminatedata redundancy B. establishrelationships among records in different files C. manage file access D. maintaindata integrity E. All of theabove
Last Answer : All of theabove
Description : Which of the following is an application layer service? A) Network virtual terminal B) File transfer, access and management C) Mail service D) All of the above
Last Answer : C) Mail service
Description : In Ethernet CSMA/CD, the special bit sequence transmitted by media access management to handle collision is called a. Preamble b. Postamble c. Jam d. None of the above
Last Answer : c. Jam
Description : Automatic repeat request error management mechanism is provided by ________ a. logical link control sublayer b. media access control sublayer c. network interface control sublayer d. application access control sublayer
Last Answer : a. logical link control sublayer
Description : Automatic repeat request error management mechanism is provided by ________ A. logical link control sublayer B. media access control sublayer C. network interface control sublayer D. application access control sublayer
Last Answer : A. logical link control sublayer
Description : On what method search in cache memory used by the system. a. Cache directing b. Cache mapping c. Cache controlling d. Cache invalidation
Last Answer : b. Cache mapping
Description : The access method in Bluetooth is________. A) FDMA B) TDD-TDMA C) CDMA D) none of the above
Last Answer : TDD-TDMA
Description : In IEEE 802.11, the access method used in the PCF sublayer is ______. A) contention B) controlled C) polling D) none of the above
Last Answer : polling
Description : In IEEE 802.11, the access method used in the DCF sublayer is _________. A) ALOHA B) CSMA/CA C) CSMA/CD D) none of the above
Last Answer : CSMA/CA
Description : ________is a multiple-access method in which the available bandwidthof a link is shared in time, frequency, or through code, between different stations. A) Random access B) Controlledaccess C) Channelization D) none of the above
Last Answer : Channelization
Description : The _____sublayer is responsible for the operation of the CSMA/CD access method and framing. A) LLC B) MII C) MAC D) none of the above
Last Answer : MAC
Description : The IEEE 802.3 Standard defines _________ CSMA/CD as the access method for first-generation 10-Mbps Ethernet. A) 1-persistent B) p-persistent C) non-persistent D) none of the above
Last Answer : 1-persistent
Description : Satellite-Switched Time-Division Multiple Access (SS/TDMA) is A. the method of determining whichdevice has access tothe transmission medium at any time. B. a medium access control technique for ... switching is used to dynamically changethechannel assignments D. All of theabove E. None of the above
Last Answer : a form of TDMA in which circuit switching is used to dynamically changethechannel assignments
Description : What is the name of the softwarepackage that allows peopleto sendelectronic mail along anetworkof computers and workstations? A. Memory residentpackage B. Project management package C. Data communication package D. Electronic mail package E. None of the above
Last Answer : Data communication package
Description : Which operation is not performed by computer a. Inputting b. Processing c. Controlling d. Understanding
Last Answer : Understanding
Description : _______ inthe data link layer separates a message from one source toa destination, or from other messages going from other sources to other destinations. A) Digitizing B) Controlling C) Framing D) none of the above
Last Answer : Framing
Description : Which statement is valid about interpreter? a. It translates one instruction at a time b. Object code is saved for future use c. Repeated interpretation is not necessary d. All of above
Last Answer : It translates one instruction at a time
Description : A compiler is a translating program which a. Translates instruction of a high level language into machine language b. Translates entire source program into machine language program c. It is not involved in program’s execution d. All of above
Last Answer : All of above
Description : Instruction in computer languages consists of a. OPCODE b. OPERAND c. Both of above d. None of above
Last Answer : Both of above
Description : What is the most appropriate function of Memory Management Unit (MMU) ? (A) It is an associative memory to store TLB (B) It is a technique of supporting multiprogramming by creating dynamic partitions ... to physical address (D) It is an algorithm to allocate and deallocate main memory to a process
Last Answer : (C) It is a chip to map virtual address to physical address
Description : The disk drive component used to position read/write heads over a specific track I known as a. Acoustic couples b. Access arm c. Cluster d. All of the above
Last Answer : Access arm
Description : In IEEE 802.11, a___ is made of stationary or mobile wireless stations and anoptional central base station, known as the access point (AP). A) ESS B) BSS C) CSS D) none of the above
Last Answer : BSS
Description : The load instruction is mostly used to designate a transfer from memory to a processor register known as_________ A. Accumulator B. Instruction Register C. Program counter D. Memory address Register
Last Answer : A. Accumulator
Description : The register which holds the address of the location to or from which data are to be transferred is known as_______ A. Instruction Register B. Control register C. Memory Address Register D. None of the Above
Last Answer : C. Memory Address Register
Description : Copy of instruction in cache memory is known as: a Execution cache b. Data cache c. Instruction cache d. Allof these
Last Answer : c. Instruction cache
Description : The register which keeps track of the execution of a program and which contains the memory address of the instruction currently being executed is known as: a) Index Register b) Memory Address Register c) Program Counter d) None of The Above
Last Answer : c) Program Counter
Description : In ________APS, there is only one protection line for many workinglines. When afailure occurs in oneof the working lines, the protectionline takes control until the failedline is repaired. A) one-plus-one B) one-to-one C) one-to-many D) none of the above
Last Answer : one-to-many
Description : . In ______ APS, there is one working line and one protection line. Thedata arenormally senton the working line until it fails. A) one-plus-one B) one-to-one C) one-to-many D) none of the above
Last Answer : one-to-one
Description : In ________ APS, there arenormally two lines: one workingline andone protection line. Bothlines areactive all the time. A) one-plus-one B) one-to-one C) one-to-many D) none of the above
Last Answer : one-plus-one
Description : SSL is not responsible for a. Mutual authentication of client & server b. Secret communication c. Data Integrity protection d. Error detection and correction
Last Answer : d. Error detection and correction
Description : Use of radio for higher education is based on the presumption of: (A) Enriching curriculum based instruction (B) Replacing teacher in the long run (C) Everybody having access to a radio set (D) Other means of instruction getting outdated
Last Answer : Answer: A Intrapersonal communication made some argue that this definition is too narrow but to some extent it is also communication since there is an exchange of message within oneself. Intrapersonal ... mind of the individual in a model which contains a sender, receiver, and feedback loop.
Description : How do I get access to my phone's instruction manual?
Last Answer : Here you go. (I’ve had to look up many manuals I’ve lost over the years. I just google ” manual”, and it usually finds it for me.)
Description : BASIC stands for: a) Basic Access towards Skills in Computer b) Beginner's All Purpose Symbolic Instruction Code c) Binary And Specific Instruction Code d) None of These
Last Answer : b) Beginner's All Purpose Symbolic Instruction Code
Description : The simultaneous execution of two or more instructions is called- 1) Sequential Access 2) Reduced Instruction set computing 3) Multiprocessing 4) None of these
Last Answer : 3) Multiprocessing
Description : Which of the following is a way to access secondary memory? A) Random access memory B) Action method C) Transfer method D) Density method
Last Answer : Answer : A
Last Answer : a. Random access memory
Description : Which of the following is a way to access secondary memory? a. Random access memory b. Action method c. Transfer method