Itis the task of the __to locate externally defined symbols in programs, load them in to memory by
placing their __ of symbols in calling program:
a. Loader and name
b. Linker and values
c. Linker and name
d. Loader and values

1 Answer

Answer :

d. Loader and values

Related questions

Description : A program that links several programs is called: a. Linker b. Loader c. Translator d. None of these

Last Answer : a. Linker

Description : contain library program have to be indicated to the loader. a. Externally defined b. Internally defined c. Executable file d. All of these

Last Answer : a. Externally defined

Description : If internal subroutine is called global data is used to pass values defining parameters between __ program and defined | a. Main and subroutine b. Local and subroutine c. Global and subroutine d. Global and main

Last Answer : a. Main and subroutine

Description : By whom address of external function in the assembly source file supplied by __ when activated: a. Assembler b. Linker c. Machine d. Code

Last Answer : b. Linker

Description : ___uses various symbols to represent function within program and is __ _representation: a. Flowchart, pictorial b. Algorithm, pictorial c. Pictorial, flowchart d. None of these

Last Answer : a. Flowchart, pictorial

Description : After actual locations for main storage are known, a __ adjusts relative addresses to these actual locations: a. Relocating loader b. Locating loader c. Default loader d. None of these

Last Answer : a. Relocating loader

Description : The ............... transfers the executable image of a C++ program from hard disk to main memory. (A) Compiler (B) Linker (C) Debugger (D) Loader

Last Answer : (D) Loader

Description : Compared to hardware, firmware is _ __to design micro programmed organization: a. Difficult b. Easier c. Both a& b d. None of these

Last Answer : b. Easier

Description : _are made with some part of body, usually the hands. a. Number words b. Number symbols c. Number gestures d. __ Allof these

Last Answer : c. Number gestures

Description : doesn’t need a linker to load it and is loaded _ a. Indirectly b. Directly c. Extending d. None of these

Last Answer : b. Directly

Description : The instruction read from memory is then placed in the ___and contents of program counter is __ so that it contains the address of_ __ instruction in the program. a. Program counter, ... incremented and previous c. Instruction register, incremented and next d. Address register, decremented and next

Last Answer : c. Instruction register, incremented and next

Description : Before checking the program for errors in translating code into machine language the high level language code is loaded into __ a. Register b. Memory c. Data d. CPU

Last Answer : b. Memory

Description : Which are the not causes of the interrupt: a. In any single device b. In processor poll devices c. Itis an external analogy to exception d. None of these

Last Answer : c. Itis an external analogy to exception

Description :  ________ is a program that places programs into memory and prepares them for execution. (1) Assembler (2) Compiler (3) Loader (4) Macro processor

Last Answer : Loader

Description : emaphore provides mutual exclusion for accesses to the buffer pool and is initialized to the value: a. Mutex b. Mutual Cc. Memory d. __ Allof these

Last Answer : Mutex

Description : A flag isa __ __that keep track of a changing condition during computer run: a. Memory b. Register c. Controller d. None of these

Last Answer : d. None of these

Description : Micro-orders generate the_ __ address of operand and execute instruction and prepare for fetching next instruction from the main memory: a. Physical b. Effective c. Logical d. all of above

Last Answer : b. Effective

Description : Control memory is part of __ that has addressable storage registers and used as temporary storage for data. a. ROM b. RAM c. CPU d. Memory

Last Answer : b. RAM

Description : NUMA stands for. a. Number Uniform memory access b. Not Uniform memory access Cc. Non Uniform memory access d. __ Allof these

Last Answer : a. Number Uniform memory access

Description : Which types of jump keeps a 2_byte instruction that holds the range from- 128to127 bytes in the memory location: a. Far jump b. Near jump ce. Short jump d. __ Allof these

Last Answer : ce. Short jump

Description : address is not assigned by linker. a. Absolute b. Relative c. Botha &b a None of these

Last Answer : a. Absolute

Description : address is provided by linker to modules linked together that starting from. | a. Absolute and 0 b. Relative and 0 c. Relative and 1 d. Relative and 3

Last Answer : b. Relative and 0

Description : A linker is also known as: a. Binder b. Linkage editor c. Botha&b d. None of these

Last Answer : c. Botha&b

Description : The contents of the program counter isthe __——__—oof the instruction to be run. a. Data b. Address c. Counter d. None of these

Last Answer : b. Address

Description : The control unit and arithmetic logic unit are know as the __ a. Central program unit b. Central processing unit

Last Answer : b. Central processing unit

Description : function is used to transfer the control to end of a program which uses one argument( ) and takes value is zero for_ __ termination and non-zero for _termination: a. _ Exit( ) normal, abnormal b. Break, normal, abnormal Botha & b None of these

Last Answer : a. _ Exit( ) normal, abnormal

Description : To design a program it requires __ os a. Program specification b. Code specification c. Instruction specification d. Problem specification

Last Answer : a. Program specification

Description : When subroutine is called contents of program counter is location address of __ instruction following call instruction is stored on _ __and program execution is transferred to __ address. a. Non ... , Stack and Main program Cc. Executable, Queue and Subroutine d. Executable, Stack and Subroutine

Last Answer : d. Executable, Stack and Subroutine

Description : Who change the address in the program counter and cause the flow of control to be altered: a Shift manipulation b. Circular manipulation c. Program control instruction d. __ Allof these

Last Answer : c. Program control instruction

Description : Which instruction are arranged as per the protocols of memory reference format of the input file in a simple ASCII sequence of integers between the range O to 99 separated by spaces without formatted text ... : a. Memory reference instruction b. Memory reference format c. Both d. None of these

Last Answer : a. Memory reference instruction

Description : Mode of addresses in control memory are: a. Executive mode b. Task mode c. Botha&b d. None of these

Last Answer : c. Botha&b

Description : Conflict between financial statement users and auditors often arises because of the a. High cost of performing an audit. b. Expectation gap c. Technical vocabulary which the auditor uses in the report. d. ... auditor's report in the back of the client's annual report where it is hard to locate

Last Answer : Expectation gap

Description : YAMLLoadWarning: calling yaml.load() without Loader=... is deprecated -Web-Development

Last Answer : answer:

Description : Full form of PLA in CU: a. Progrmmable Logic Array b. Programs Load Array c. Programmable Logic Accumulator d. all of these

Last Answer : a. Progrmmable Logic Array

Description : A binary number with 8 bits is called asa___ a. Bytes b. Bits c. Nibble d. __ Allof these

Last Answer : a. Bytes

Description : Which are the types of binary codes number: a. Sign magnitude b. —_1’s complement code c. 2’s complement code d. __ Allof these

Last Answer : c. 2’s complement code

Description : Which are the types of important ideas to notice about these odometer readings: a. The MSB is the sign bit .O for a +sign and 1 for a— sign b. The negative number represent the 2’s complement of the positive number c. Both d. __ Allof these

Last Answer : c. Both

Description : Which is an algorithm or techniques used to multiply two numbers. a. Addition algorithm b. Subtraction algorithm c. Multiplication algorithm d. __ Allof these

Last Answer : c. Multiplication algorithm

Description : The simple procedure istouse a. Binary-triplet method b. Decimal-triplet method c. Octal-triplet method d. __ Allof these

Last Answer : a. Binary-triplet method

Description : One way to convert from decimal to hexadecimalisthe a. Double dabble method b. Hex dabble method c. Binary dabble method d. __ Allof these

Last Answer : b. Hex dabble method

Description : Information is handled in the computer by _ __ a. Electrical digit b. Electrical component c. Electronic bit d. None of these

Last Answer : b. Electrical component

Description : Which language is termed as the symbolic depiction used for indicating the series: a. Random transfer language b. Register transfer language c. Arithmetic transfer language d. __ Allof these

Last Answer : b. Register transfer language

Description : Which operation are implemented using a binary counter or combinational circuit: a Register transfer b. Arithmetic c. Logical d. __ Allof these

Last Answer : b. Arithmetic

Description : Which control transfer passes the function viacontrol_ a Logic b. Operation ce. Circuit d. __ Allof these

Last Answer : ce. Circuit

Description : Arithmetic left shift is used to multiply a signed number by____ a. One b. Two c Three d. __ Allof these

Last Answer : b. Two

Description : The variable of __ correspond to hardware register: a. RAM b. RIL c. ALU d. MAR

Last Answer : b. RIL

Description : An __ -0 option is used for. a. Input file b. External file c. Output file d. None of these

Last Answer : c. Output file

Description : Modern assemblers for RISC based architectures make optimization of instruction scheduling to make use of CPU __ efficiently: a. Pipeline b. Without pipeline c. Botha &b d. None of these

Last Answer : a. Pipeline

Description : Preparing the pseudocode requires __ _time than drawing flowchart: a. Less b. More c. Optimum d. None of these

Last Answer : a. Less

Description : Subroutines are placed in identical section to caller so that SCAL and SXIT __ overpass divison limits: a. Don’t b. Does c. Cross d. By

Last Answer : a. Don’t