Structured programming codes includes ?
sequencing
alteration
iteration
multiple exit from loops
only A, B and C

1 Answer

Answer :

only A, B and C

Related questions

Description : Loop unrolling is a code optimization technique: (A) that avoids tests at every iteration of the loop (B) that improves performance by decreasing the number of instructions in a basic block. ... loops with outer loops (D) that reorders operations to allow multiple computations to happen in parallel.

Last Answer : (A) that avoids tests at every iteration of the loop

Description : A subset of a network that includes all the routers but contains no loops is called ________ a. spanning tree b. spider structure c. spider tree d. special tree

Last Answer : a. spanning tree

Description : The subset of a network that includes all the routers but contains no loops is called ________ A. spanning tree B. spider structure C. spider tree D. special tree

Last Answer : A. spanning tree

Description : One subset of a network that includes all the routers but contains no loops is called ________ A. spanning tree B. spider structure C. spider tree D. special tree

Last Answer : A. spanning tree

Description : following are structured programs written in simple structures. a Sequence b. Selection c. Iteration d. All of these

Last Answer : d. All of these

Description : The spiral model of software development (A) Ends with the delivery of the software product (B) Is more chaotic than the incremental model (C) Includes project risks evaluation during each iteration (D) All of the above

Last Answer : (C) Includes project risks evaluation during each iteration

Description : The database administration function includes A. application programming B. computer operations management C. databaseaccessplanning D. All of theabove E. None of the above

Last Answer : databaseaccessplanning

Description : In ATM,______ is for packets requiring no sequencing and noerror control mechanism. A) AAL1 B) AAL2 C) AAL3/4 D) AAL5

Last Answer : AAL5

Description : Basic C programming question about while loops.

Last Answer : The logic falls out of the loop and continues on…

Description : Which of the following statements can be associated with OSI model? a. A structured way to discuss and easier update system components b. One layer may duplicate lower layer functionality c. ... no way requires information from another layer d. It is an application specific network model

Last Answer : b. One layer may duplicate lower layer functionality

Description : Which one of the following is a version of UDP with congestion control? a. datagram congestion control protocol b. stream control transmission protocol c. structured stream transport d. user congestion control protocol

Last Answer : a. datagram congestion control protocol

Description : Which one of the following is a version of UDP with congestion control? a. datagram congestion control protocol b. stream control transmission protocol c. structured stream transport d. user congestion control protocol

Last Answer : a. datagram congestion control protocol

Description : .Which of the following statements can be associated with OSI model? a. A structured way to discuss and easier update system components b. One layer may duplicate lower layer functionality c. ... no way requires information from another layer d. It is an application specific network model

Last Answer : Functionality at one layer no way requires information from another layer

Description : What are the types of structures in structured programming ?

Last Answer : There are 4 types of structure in structured programming.

Description : What is Structured Programming ?

Last Answer : Structured programming Structured programming is a subset of procedural programming that uses logical structures to facilitate programming. This is a top-down design model so that developers can split the entire ... statement is discouraged. Examples: Basic , Fortran , Koble , Pascal , C, etc.

Description : In Visual Basic .NET or Visual C# programming, when would you use Structured Query Language (SQL)? How are they executed? 

Last Answer : ADO.NET handles most of the database communication for you behind-thescenes. You would only use SQL statements when generating ad-hoc queries for the database. You execute SQL statements by ... returning statements, such as DELETE, INSERT INTO, or UPDATE statements, use the ExecuteNonQuery method.

Description : _______is a structured programming language used for all purposes such as scientific application, commercial application, developing games etc. a) C b) C++ c) FORTRAN d) None of These

Last Answer : a) C

Description : Which of the following are not programming paradigms types: a) Object Oriented Programming b) Aspect Oriented Programming c) Session Oriented Programming d) Structured Programming e) None of These

Last Answer : c) Session Oriented Programming

Description : What is structured programming and why is it important?

Last Answer : Ans. Structured programming is a term which was coined in the late 1960's to mean programming without using go to statements, programming using only while loops and if statements as ... Structured programming means programs can be read sequentially and are therefore easier to understand and inspect.

Description : Design phase includes? data, architectural and procedural design only architectural, procedural and interface design only data, architectural and interface design only data, architectural, interface and procedural design

Last Answer : data, architectural, interface and procedural design

Description : Will the next iPhone be an iteration (5s) or evolution (6)?

Last Answer : Yup

Description : What is an indefinite iteration?

Last Answer : Need answer

Description : Traditional Work Breakdown Structures tend to  a. focus on the design of the system as oppose to the needs of the current phase and  iteration  b. force too many levels of detail early on for large ... project and difficult to compare across projects  d. all of the above  e. none of the above

Last Answer : d. all of the above

Description : From where did the new fact inferred on new iteration is derived? a) Old fact b) Narrow fact c) New fact d) All of the mentioned

Last Answer : c) New fact

Description : Iteration also called: a. Repetition b. Straight c. Selection d. Sequence

Last Answer : a. Repetition

Description : In_ instructions are followed one after the other in the preset order in which they appear within program: a. Sequence b Selection c. Break d. Iteration

Last Answer : a. Sequence

Description : _is sequence of instructions is executed and repeated any no. of times in loop until logical condition is true: a. Iteration b. Repetition c Botha&b d. None of these

Last Answer : c Botha&b

Description : What is the difference between recursion and iteration?

Last Answer : A: Recursion is usually slower than iteration due to overhead of maintaining stack, whereas, Iteration does not use stack so it's faster than recursion. Recursion uses more memory than ... whereas, Iteration consume less memory. Recursion makes code smaller, whereas, Iteration makes code longer.

Description : Advantage of Gauss-Seidel method is a) applicable for large power system network b) calculation time for each iteration is less c) number of iterations are less d) all of the above

Last Answer : b) calculation time for each iteration is less

Description : At any iteration of simplex method, if Δj (Zj – Cj) corresponding to any nonbasic variable Xj is obtained as zero, the solution under the test is (A) Degenerate solution (B) Unbounded solution (C) Alternative solution (D) Optimal solution

Last Answer : (C) Alternative solution

Description : Does the word "triage" have a "damage control" meaning, or is it really only about sequencing by severity?

Last Answer : I see triage as relevant in an emergency context - we have to triage the wounded soldiers to take care of the critically injured ones first . In other words, it is immediate and critical. Damage control ... . As in we have to do damage control after the CEO was arrested for raping his secretary .

Description : Instructions and memory address are represented by a. Character code b. Binary codes c. Binary word d. Parity bit

Last Answer : Binary codes

Description : In_______, the sequences aregenerated using orthogonal codes such the Walsh tables. A) FDMA B) TDMA C) CDMA D) none of the above

Last Answer : CDMA

Description : In ______, the stations usedifferent codes toachieve multipleaccess. A) FDMA B) TDMA C) CDMA D) none of the above

Last Answer : CDMA

Description : _____codes arespecial linear block codes with one extraproperty. If a codeword is rotated, the result is another codeword. A) Non-linear B) Convolution C) Cyclic D) none of the above

Last Answer : Cyclic

Description : Codes consisting of lines of varying widths or lengths that arecomputer-readable are known as– (A) an ASCII code (B) a magnetic tape (C) an OCR scanner (D) a bar code (E) None of these

Last Answer : a bar code

Description : Error detection ata data link level is achieved by A. bit stuffing B. cyclic redundancy codes C. Hamming codes D. equalization

Last Answer : cyclic redundancy codes

Description : Using which method in transport layer data integrity can be ensured? a. Checksum b. Repetition codes c. Cyclic redundancy checks d. Error correcting codes

Last Answer : a. Checksum

Description : If 99% of the program is written in FORTRAN and the remaining 1% in assembly language, the percentage increase in the programming time compared to writing the entire program in FORTRAN and rewriting the 1% in assembly language is ? 10 5 13 8

Last Answer : 5

Description : DTP computer abbreviation usually means ? DeskTop Publishing Data Type Programming Digital Transmission Protocol None Of above

Last Answer : Data Type Programming

Description : The term IPv4 stands for? a. Internet Protocol Version 4 b. Internet Programming Version 4 c. International Programming Version 4 d. None of these

Last Answer : a. Internet Protocol Version 4

Description : Given a source code with 10 operators includes 6 unique operators, and 6 operand including 2 unique operands. The program volume is ? 48 120 720 insufficient data

Last Answer : 48

Description : A _________ digital signal includes timing informationin the data beingtransmitted. A) self-synchronizing B) self-modulated C) self-transmitted D) none of the above

Last Answer : self-synchronizing

Description : To make SONET backward-compatible with the current hierarchy, its framedesign includes asystem of. A) OCs B) STMs C) STSs D) VTs

Last Answer : VTs

Description : A best-effort delivery service suchas IPv4 includes _______. A) error checking B) error correction C) datagram acknowledgment D) noneof the above

Last Answer : noneof the above

Description : Which of the following statements is TRUE? a. Both Ethernet frame and IP packet include checksum fields b. Ethernet frame includes a checksum field and IP packet includes a CRC field c. Ethernet ... and IP packet includes a checksum field d. Both Ethernet frame and IP packet include CRC fields

Last Answer : Ethernet frame includes a CRC field and IP packet includes a checksum field

Description : In the TCP/IP protocol architecture, the Network Access Layer includes ………………………………...layers of the OSI Reference Model. A. presentation, session, application B. physical, data link, network C. data link, network D. physical, data link

Last Answer : B. physical, data link, network

Description : Match the following types of variables with the corresponding programming languages: (a) Static variables (i) Local variables in Pascal (b) Stack dynamic (ii) All variables in APL (c) Explicit heap dynamic (iii) Fortran 77 (d) Implicit ... (ii) (C) (iii) (i) (iv) (ii) (D) (ii) (i) (iii) (iv)

Last Answer : (C) (iii) (i) (iv) (ii) 

Description : Which among the following includes the areas of Artificial Intelligence specialization: a) Games (Programming computers to play games against human opponents) b) Natural Languages (Programming computers to understand natural ... that occur in animal brains) d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way

Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way