Description : which type of errors are detected by the assembler: a. syntax error b. logical error 9 run time error a none of these
Last Answer : a. syntax error
Description : What type of errors are not detected by assemblers: a. Syntax error b. Runtime error c. Logical error
Last Answer : c. Logical error
Description : In second pass, assembler creates _ in binary format for every instruction in program and then refers to the symbol table to giving every symbol an_ _ relating the segment. a. Code and program b. Program and instruction c. Code and offset d. All of these
Last Answer : c. Code and offset
Description : A module contains machine code with specification on_ _ a. Relative addresses b. Absolute addresses c. Object program d. None of these
Last Answer : a. Relative addresses
Description : __are used to translate high level language instructions to a machine code. a. Translators b. Interpreters c. Compilers d. None of these
Last Answer : c. Compilers
Description : A mistake in an algorithm that causes incorrect results is called a a) logical error b) syntax error c) procedural error d) compiler error e) None of these
Last Answer : b) syntax error
Description : The errors that can be pointed out by the compiler are 1) Syntax error 2) Symantic error 3) Logical error 4) Internal error
Last Answer : 1) Syntax error
Description : The front panel display provides lights as green LED represent sand red LED represent _ for device programmer who writes input/output basic: a. Busy and Error b. Error and Busy c. Busy and Busy d. Error and Error
Last Answer : a. Busy and Error
Description : Which phase of compiler generates stream of atoms ? (A) Syntax analysis (B) Lexical Analysis (C) Code generation (D) Code optimization
Last Answer : (A) Syntax analysis
Description : If we define putchar function in putchar :. char -> IO () syntax than character input as an argument andreturns a. Useful value b. Get output c. Getno output d. None of these
Last Answer : c. Getno output
Description : In which code is object file is coded: a. Link code b. Decimal code c. Assembly code d._— Binary code
Last Answer : d._— Binary code
Description : The instruction fetch operation is initiated by loading the contents of program counter into the and sends _ request to memory: a. Memory register and read b. Memory register and write c. Data register and read d. Address register and read
Last Answer : d. Address register and read
Description : function is used to transfer the control to end of a program which uses one argument( ) and takes value is zero for_ __ termination and non-zero for _termination: a. _ Exit( ) normal, abnormal b. Break, normal, abnormal Botha & b None of these
Last Answer : a. _ Exit( ) normal, abnormal
Description : Testing helpstoensure_——_—of the program for use within a system. a. Quality, accuracy and except b. Quality, accuracy and acceptance c. Design, assurance and acceptance d. Quality, accuracy and development
Last Answer : b. Quality, accuracy and acceptance
Description : When subroutine is called contents of program counter is location address of __ instruction following call instruction is stored on _ __and program execution is transferred to __ address. a. Non ... , Stack and Main program Cc. Executable, Queue and Subroutine d. Executable, Stack and Subroutine
Last Answer : d. Executable, Stack and Subroutine
Description : Subroutine is called _ a. In Same program b. Inexternal program co Botha&b d. None of these
Last Answer : co Botha&b
Description : During program execution content of main memory undergo changes and, but control memory has _ microprogram: a. Static b. Dynamic c. Compile time d. Fixed
Last Answer : d. Fixed
Description : has the property that corrupting or garbling a code word will likely produce a bit string that is not a code word: a. Error deleting codes b. Error detecting codes c. Error string codes
Last Answer : b. Error detecting codes
Description : A code that is used to correct error is calledan a. Error detecting code b. Error correcting code c. Both d. None of these
Last Answer : b. Error correcting code
Description : Areceived sith a bit error will be closer to the originally transmitted code word than to any other code word: a. Code word b. Noncode word c. Decoding d. All of these
Last Answer : b. Noncode word
Description : MOVE AX BX in this LINES OF CODE what type of error is declared: a. Undeclared identifier MOVE b. undeclared identifier AX c. Accept as a command d. Not look in symbol table
Last Answer : a. Undeclared identifier MOVE
Description : One of use of microprogramming to implement _ ____ of processor in Intel 80x86 and Motorola 680x0 processors whose instruction set are evolved from 360 original. a. Control structure b. Without control c. Control unit d. Only control
Last Answer : c. Control unit
Description : To design a program it requires __ os a. Program specification b. Code specification c. Instruction specification d. Problem specification
Last Answer : a. Program specification
Description : Before checking the program for errors in translating code into machine language the high level language code is loaded into __ a. Register b. Memory c. Data d. CPU
Last Answer : b. Memory
Description : Consider the following statements related to compiler construction: I. Lexical Analysis is specified by context-free grammars and implemented by pushdown automata. II. Syntax Analysis is specified by regular expressions and implemented by ... Only l (2) Only ll (3) Both I and II (4) Neither I nor Il
Last Answer : Answer: 4
Description : Which analyses and executes the source code in line-by-line manner, without looking at the entire program? A. Compiler B. Interpreter C. Assembler D. None of the above
Last Answer : B. Interpreter
Description : Virtual constructor: Constructors cannot be virtual. Declaring a constructor as a virtual function is a syntax error. Does c++ support multilevel and multiple inheritance?
Last Answer : Yes.
Description : What is the output of the following code? a={1:"A",2:"B",3:"C"} print(a.get(5,4)) a) Error, invalid syntax b) A c) 5 d) 4
Last Answer : d) 4
Description : What will be the output of the following Python code? nums = set([1,1,2,3,3,3,4,4])print(len(nums)) a) 7 b) Error, invalid syntax for formation of set c) 4 d) 8
Last Answer : Answer: c Explanation: A set doesn’t have duplicate items.
Description : What will be the output of the following segment of the program? main( ) { char *s = “hello world”; int i = 7; printf(“%, *s”, i, s); } (A) Syntax error (B) hello w (C) hello (D) o world
Last Answer : Answer: Marks given to all
Description : What is the output of the following program ? (Assume that the appropriate pre-processor directives are included and there is no syntax error) main() { char S[ ] = "ABCDEFGH"; printf ("%C",* (& ... Base address of S is 1000 */ } (A) ABCDEFGH1000 (B) CDEFGH1000 (C) DDEFGHH1000 (D) DEFGH1000
Last Answer : (D) DEFGH1000
Description : Binary numbers can also be expressed in this same notation by _——_—srrepresentation. a. Floating point b. Binary point c. Decimal point d. All of these
Last Answer : a. Floating point
Description : As the instruction length increases ————_ of instruction addresses in all the instruction is_ a. Implicit inclusion b. Implicit and disadvantageous c. Explicit and disadvantageous d. Explicit and disadvantageous
Last Answer : c. Explicit and disadvantageous
Description : Hamming codes was developed in _ a 1953 b. 1950 c. 1945 d. 1956
Last Answer : b. 1950
Description : The maximum clock frequency is _ a. 45 MHZ b. 50 MHZ c. 52 MHZ d. 68 MHZ
Last Answer : b. 50 MHZ
Description : Information is handled in the computer by _ __ a. Electrical digit b. Electrical component c. Electronic bit d. None of these
Last Answer : b. Electrical component
Description : The register that includes the address of the memory unit is termed asthe _ a. MAR b PC Cc. IR d. None of these
Last Answer : a. MAR
Description : High level language C supports register transfer technique for _ application. a. Executing b. Compiling c. Both d. None
Last Answer : a. Executing
Description : Register are assumed to use positive-edge-triggered _ a. Flip-flop b. Logics Cc. Circuit d. Operation
Last Answer : a. Flip-flop
Description : The memory bus is also referred as _ a. Databus b. Address bus c. Memory bus d. — Allof these
Last Answer : a. Databus
Description : which of the 2 files are created by the assembler. a. _ List and object file b. Link and object file c. Botha &b d. None of these
Last Answer : a. _ List and object file
Description : IBM-360 type language is example which supporting _—___—sJanguage. a. Micro b. Macro c. Botha &b d. None of these
Last Answer : b. Macro
Description : shave addresses where instructions are stored along with address of working storage: a. _ Relative entities b. Absolute entities c. Botha &b d. None of these
Last Answer : a. _ Relative entities
Description : doesn’t need a linker to load it and is loaded _ a. Indirectly b. Directly c. Extending d. None of these
Last Answer : b. Directly
Description : is the__ _ value of variable which will be added every time: a. Increment b. Decrement c. Expanding d. None of these
Last Answer : a. Increment
Description : subroutines are invoked by using their___ _ ina subroutine call statement and replacing formal parameters with__ __ parameters: a. Identifier and formal b. Identifier and actual c. Expression and arguments d. None of these
Last Answer : b. Identifier and actual
Description : By defining the _ __ register as last in first out stack the sequence can handle nested subroutines: a. S b. J ce. R d. T
Last Answer : ce. R
Description : Compared to hardware, firmware is _ __to design micro programmed organization: a. Difficult b. Easier c. Both a& b d. None of these
Last Answer : b. Easier
Description : The function of these microinstructions is to issue the micro orders to_ _ a. CPU b. Memory c. Register d. Accumulator
Last Answer : a. CPU
Description : Microcodes are stored as firmware in _ a. Memory chips b. Registers c. accumulators d. none of these
Last Answer : a. Memory chips