The compiler _ translate a program code with any syntax error:

a. Can
b. Cannot
c. Without
d. None of these

1 Answer

Answer :

b. Cannot

Related questions

Description : which type of errors are detected by the assembler: a. syntax error b. logical error 9 run time error a none of these

Last Answer : a. syntax error

Description : What type of errors are not detected by assemblers: a. Syntax error b. Runtime error c. Logical error

Last Answer : c. Logical error

Description : In second pass, assembler creates _ in binary format for every instruction in program and then refers to the symbol table to giving every symbol an_ _ relating the segment. a. Code and program b. Program and instruction c. Code and offset d. All of these

Last Answer : c. Code and offset

Description : A module contains machine code with specification on_ _ a. Relative addresses b. Absolute addresses c. Object program d. None of these

Last Answer : a. Relative addresses

Description : __are used to translate high level language instructions to a machine code. a. Translators b. Interpreters c. Compilers d. None of these

Last Answer : c. Compilers

Description : A mistake in an algorithm that causes incorrect results is called a a) logical error b) syntax error c) procedural error d) compiler error e) None of these

Last Answer : b) syntax error

Description : The errors that can be pointed out by the compiler are 1) Syntax error 2) Symantic error 3) Logical error 4) Internal error

Last Answer : 1) Syntax error

Description : The front panel display provides lights as green LED represent sand red LED represent _ for device programmer who writes input/output basic: a. Busy and Error b. Error and Busy c. Busy and Busy d. Error and Error

Last Answer : a. Busy and Error

Description : Which phase of compiler generates stream of atoms ? (A) Syntax analysis (B) Lexical Analysis (C) Code generation (D) Code optimization 

Last Answer : (A) Syntax analysis

Description : If we define putchar function in putchar :. char -> IO () syntax than character input as an argument andreturns a. Useful value b. Get output c. Getno output d. None of these

Last Answer : c. Getno output

Description : In which code is object file is coded: a. Link code b. Decimal code c. Assembly code d._— Binary code

Last Answer : d._— Binary code

Description : The instruction fetch operation is initiated by loading the contents of program counter into the and sends _ request to memory: a. Memory register and read b. Memory register and write c. Data register and read d. Address register and read

Last Answer : d. Address register and read

Description : function is used to transfer the control to end of a program which uses one argument( ) and takes value is zero for_ __ termination and non-zero for _termination: a. _ Exit( ) normal, abnormal b. Break, normal, abnormal Botha & b None of these

Last Answer : a. _ Exit( ) normal, abnormal

Description : Testing helpstoensure_——_—of the program for use within a system. a. Quality, accuracy and except b. Quality, accuracy and acceptance c. Design, assurance and acceptance d. Quality, accuracy and development

Last Answer : b. Quality, accuracy and acceptance

Description : When subroutine is called contents of program counter is location address of __ instruction following call instruction is stored on _ __and program execution is transferred to __ address. a. Non ... , Stack and Main program Cc. Executable, Queue and Subroutine d. Executable, Stack and Subroutine

Last Answer : d. Executable, Stack and Subroutine

Description : Subroutine is called _ a. In Same program b. Inexternal program co Botha&b d. None of these

Last Answer : co Botha&b

Description : During program execution content of main memory undergo changes and, but control memory has _ microprogram: a. Static b. Dynamic c. Compile time d. Fixed

Last Answer : d. Fixed

Description : has the property that corrupting or garbling a code word will likely produce a bit string that is not a code word: a. Error deleting codes b. Error detecting codes c. Error string codes

Last Answer : b. Error detecting codes

Description : A code that is used to correct error is calledan a. Error detecting code b. Error correcting code c. Both d. None of these

Last Answer : b. Error correcting code

Description : MOVE AX BX in this LINES OF CODE what type of error is declared: a. Undeclared identifier MOVE b. undeclared identifier AX c. Accept as a command d. Not look in symbol table

Last Answer : a. Undeclared identifier MOVE

Description : One of use of microprogramming to implement _ ____ of processor in Intel 80x86 and Motorola 680x0 processors whose instruction set are evolved from 360 original. a. Control structure b. Without control c. Control unit d. Only control

Last Answer : c. Control unit

Description : To design a program it requires __ os a. Program specification b. Code specification c. Instruction specification d. Problem specification

Last Answer : a. Program specification

Description : Before checking the program for errors in translating code into machine language the high level language code is loaded into __ a. Register b. Memory c. Data d. CPU

Last Answer : b. Memory

Description : Consider the following statements related to compiler construction: I. Lexical Analysis is specified by context-free grammars and implemented by pushdown automata. II. Syntax Analysis is specified by regular expressions and implemented by ... Only l (2) Only ll (3) Both I and II (4) Neither I nor Il

Last Answer : Answer: 4

Description : Which analyses and executes the source code in line-by-line manner, without looking at the entire program? A. Compiler B. Interpreter C. Assembler D. None of the above

Last Answer : B. Interpreter

Description : Virtual constructor: Constructors cannot be virtual. Declaring a constructor as a virtual function is a syntax error. Does c++ support multilevel and multiple inheritance?

Last Answer : Yes.

Description : What is the output of the following code? a={1:"A",2:"B",3:"C"} print(a.get(5,4)) a) Error, invalid syntax b) A c) 5 d) 4

Last Answer : d) 4

Description : What will be the output of the following Python code? nums = set([1,1,2,3,3,3,4,4])print(len(nums)) a) 7 b) Error, invalid syntax for formation of set c) 4 d) 8

Last Answer : Answer: c Explanation: A set doesn’t have duplicate items.

Description : What will be the output of the following segment of the program? main( ) { char *s = “hello world”; int i = 7; printf(“%, *s”, i, s); } (A) Syntax error (B) hello w (C) hello (D) o world

Last Answer : Answer: Marks given to all

Description : What is the output of the following program ? (Assume that the appropriate pre-processor directives are included and there is no syntax error) main() { char S[ ] = "ABCDEFGH"; printf ("%C",* (& ... Base address of S is 1000 */ } (A) ABCDEFGH1000 (B) CDEFGH1000 (C) DDEFGHH1000 (D) DEFGH1000

Last Answer : (D) DEFGH1000

Description : Binary numbers can also be expressed in this same notation by _——_—srrepresentation. a. Floating point b. Binary point c. Decimal point d. All of these

Last Answer : a. Floating point

Description : As the instruction length increases ————_ of instruction addresses in all the instruction is_ a. Implicit inclusion b. Implicit and disadvantageous c. Explicit and disadvantageous d. Explicit and disadvantageous

Last Answer : c. Explicit and disadvantageous

Description : Hamming codes was developed in _ a 1953 b. 1950 c. 1945 d. 1956

Last Answer : b. 1950

Description : The maximum clock frequency is _ a. 45 MHZ b. 50 MHZ c. 52 MHZ d. 68 MHZ

Last Answer : b. 50 MHZ

Description : Information is handled in the computer by _ __ a. Electrical digit b. Electrical component c. Electronic bit d. None of these

Last Answer : b. Electrical component

Description : The register that includes the address of the memory unit is termed asthe _ a. MAR b PC Cc. IR d. None of these

Last Answer : a. MAR

Description : High level language C supports register transfer technique for _ application. a. Executing b. Compiling c. Both d. None

Last Answer : a. Executing

Description : Register are assumed to use positive-edge-triggered _ a. Flip-flop b. Logics Cc. Circuit d. Operation

Last Answer : a. Flip-flop

Description : The memory bus is also referred as _ a. Databus b. Address bus c. Memory bus d. — Allof these

Last Answer : a. Databus

Description : which of the 2 files are created by the assembler. a. _ List and object file b. Link and object file c. Botha &b d. None of these

Last Answer : a. _ List and object file

Description : IBM-360 type language is example which supporting _—___—sJanguage. a. Micro b. Macro c. Botha &b d. None of these

Last Answer : b. Macro

Description : shave addresses where instructions are stored along with address of working storage: a. _ Relative entities b. Absolute entities c. Botha &b d. None of these

Last Answer : a. _ Relative entities

Description : doesn’t need a linker to load it and is loaded _ a. Indirectly b. Directly c. Extending d. None of these

Last Answer : b. Directly

Description : is the__ _ value of variable which will be added every time: a. Increment b. Decrement c. Expanding d. None of these

Last Answer : a. Increment

Description : subroutines are invoked by using their___ _ ina subroutine call statement and replacing formal parameters with__ __ parameters: a. Identifier and formal b. Identifier and actual c. Expression and arguments d. None of these

Last Answer : b. Identifier and actual

Description : By defining the _ __ register as last in first out stack the sequence can handle nested subroutines: a. S b. J ce. R d. T

Last Answer : ce. R

Description : Compared to hardware, firmware is _ __to design micro programmed organization: a. Difficult b. Easier c. Both a& b d. None of these

Last Answer : b. Easier

Description : The function of these microinstructions is to issue the micro orders to_ _ a. CPU b. Memory c. Register d. Accumulator

Last Answer : a. CPU

Description : Microcodes are stored as firmware in _ a. Memory chips b. Registers c. accumulators d. none of these

Last Answer : a. Memory chips