Description : Itis the task of the __to locate externally defined symbols in programs, load them in to memory by placing their __ of symbols in calling program: a. Loader and name b. Linker and values c. Linker and name d. Loader and values
Last Answer : d. Loader and values
Description : When subroutine is called contents of program counter is location address of __ instruction following call instruction is stored on _ __and program execution is transferred to __ address. a. Non ... , Stack and Main program Cc. Executable, Queue and Subroutine d. Executable, Stack and Subroutine
Last Answer : d. Executable, Stack and Subroutine
Description : The ............... transfers the executable image of a C++ program from hard disk to main memory. (A) Compiler (B) Linker (C) Debugger (D) Loader
Last Answer : (D) Loader
Description : A program that links several programs is called: a. Linker b. Loader c. Translator d. None of these
Last Answer : a. Linker
Description : Which are the operation of versatility: a. exchange of information with the outside world via I/O device b. Transfer of data internally with in the central processing unit c. Performs of the basic arithmetic operations d. = Allof these
Last Answer : d. = Allof these
Description : After actual locations for main storage are known, a __ adjusts relative addresses to these actual locations: a. Relocating loader b. Locating loader c. Default loader d. None of these
Last Answer : a. Relocating loader
Description : What matters more externally or internally?
Last Answer : I think the inside is because the outside is fleeting anyway
Description : Covered smut of barley is a disease of— (A) Externally seed-borne (B) Internally seed-borne (C) Air-borne (D) None of these
Last Answer : (B) Internally seed-borne
Description : Loose smut is (a) Internally seed borne (b) Externally seed borne (c) Air borne (d) Water borne
Last Answer : (a) Internally seed borne
Description : Loose smut of wheat is — borne a. Internally seed borne b. Soil borne c. Air borne d. Externally seed borne
Last Answer : a. Internally seed borne
Description : A pipe of length more than double the diameter of orifice fitted externally or internally to the orifice is called a (A) Notch (B) Weir (C) Mouthpiece (D) Nozzle
Last Answer : Answer: Option C
Description : The term “isentropic process” used in thermodynamics implies what? A. Reversible adiabatic process B. Externally reversible, adiabatic process C. Internally reversible, adiabatic process D. Irreversible adiabatic process
Last Answer : Internally reversible, adiabatic process
Description : Company images and brand equity is factor affecting business A. Externally B. Internally C. Government Policy D. None of these
Last Answer : A. Externally
Description : Name the outer portion of a stem or root, bounded externally by the epidermis, and internally by the cells of the pericycle.
Last Answer : ANSWER: Cortex
Description : If internal subroutine is called global data is used to pass values defining parameters between __ program and defined | a. Main and subroutine b. Local and subroutine c. Global and subroutine d. Global and main
Last Answer : a. Main and subroutine
Description : _______viruses infect executable program files: a) File Infector Viruses b) Macro Viruses c) Multi Partite Viruses d) None of These
Last Answer : a) File Infector Viruses
Description : Which part is not physically indicated in the register. a. Binary b. Decimal c. Octal d. None of these
Last Answer : b. Decimal
Description : In which transfer the computer register are indicated in capital letters for depicting its function. a. Memory transfer b. Register transfer c. Bus transfer d. None of these
Last Answer : b. Register transfer
Description : getchar :: IO char in this given function what is indicated by IO char: a. when getchar is invoked it returns a character b. when getchar is executed it returns a character c. botha & b d. none of these
Last Answer : a. when getchar is invoked it returns a character
Description : The Octal number to be given alogn with chmod command to make a file readable, writable and executable to the owner, readable and executable to group and others is: A. 000 B. 755 C. 744 D. 555 E. None of the above
Last Answer : B. 755
Description : The attributes of a file are. a. Name b. Identifier c. Types d. Location e. Size f. Protection g. Time, date and user identification h. Allof these
Last Answer : h. Allof these
Description : The various file operation are: a. Crating a file b. Writing a file c. Reading a file d. Repositioning within a file e. Deleting a file truncating a file f. All of these
Last Answer : f. All of these
Description : Which operations are to be performed on a directory are: a. Search for a file b. Create a file c. Delete a file d. List a directory e. Rename a file f. Traverse the file system g. Allof these
Last Answer : g. Allof these
Description : Which instruction are arranged as per the protocols of memory reference format of the input file in a simple ASCII sequence of integers between the range O to 99 separated by spaces without formatted text ... : a. Memory reference instruction b. Memory reference format c. Both d. None of these
Last Answer : a. Memory reference instruction
Description : By whom address of external function in the assembly source file supplied by __ when activated: a. Assembler b. Linker c. Machine d. Code
Last Answer : b. Linker
Description : An __ -0 option is used for. a. Input file b. External file c. Output file d. None of these
Last Answer : c. Output file
Description : which of the 2 files are created by the assembler. a. _ List and object file b. Link and object file c. Botha &b d. None of these
Last Answer : a. _ List and object file
Description : In which code is object file is coded: a. Link code b. Decimal code c. Assembly code d._— Binary code
Last Answer : d._— Binary code
Description : In RISC architecture access to registers is made as a block and register file in a particular register can be selected by using: a. Multiplexer b. Decoder c. Subtractor d. Adder
Last Answer : b. Decoder
Description : Which of the following is the process of assembling program components, data, and libraries, and then compiling and linking these to create an executable system? a) System building b) Release management c) Change management d) Version management
Last Answer : a) System building
Description : A(n) _____ program is one that is ready to run and does not need to be altered in any way. a) Interpreter b) High level c) Compiler d) Executable e) None of these
Last Answer : d) Executable
Description : Compiling creates a(n)- 1) Program Specification 2) Algorithm 3) Executable Program 4) Subroutine
Last Answer : 3) Executable Program
Description : A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect. A) Stealth virus B) Polymorphic Virus C) Parasitic Virus
Last Answer : C) Parasitic Virus
Description : The instruction fetch operation is initiated by loading the contents of program counter into the and sends _ request to memory: a. Memory register and read b. Memory register and write c. Data register and read d. Address register and read
Last Answer : d. Address register and read
Description : The contents of the program counter isthe __——__—oof the instruction to be run. a. Data b. Address c. Counter d. None of these
Last Answer : b. Address
Description : The instruction read from memory is then placed in the ___and contents of program counter is __ so that it contains the address of_ __ instruction in the program. a. Program counter, ... incremented and previous c. Instruction register, incremented and next d. Address register, decremented and next
Last Answer : c. Instruction register, incremented and next
Description : The control unit and arithmetic logic unit are know as the __ a. Central program unit b. Central processing unit
Last Answer : b. Central processing unit
Description : Which register holds the current instruction to be executed. a. Instruction register b. Program register 9 Control register a None of these
Last Answer : a. Instruction register
Description : Assembler works to convert assembly language program into machine language : a. Before the computer can execute it b. After the computer can execute it c. In between execution d. All of these
Last Answer : a. Before the computer can execute it
Description : Assembly language program is called. a. Object program b. Source program c. Oriented program
Last Answer : b. Source program
Description : In second pass, assembler creates _ in binary format for every instruction in program and then refers to the symbol table to giving every symbol an_ _ relating the segment. a. Code and program b. Program and instruction c. Code and offset d. All of these
Last Answer : c. Code and offset
Description : An assembler is a utility program that performs: a. Isometric translation b. Isomorphic translation c. Isochoric translation d. None of these
Last Answer : b. Isomorphic translation
Description : which of the following are types of assembler entities: a. Absolute entities b. Relative entities c. Object program d. Allof these
Last Answer : d. Allof these
Description : A module contains machine code with specification on_ _ a. Relative addresses b. Absolute addresses c. Object program d. None of these
Last Answer : a. Relative addresses
Description : function is used to transfer the control to end of a program which uses one argument( ) and takes value is zero for_ __ termination and non-zero for _termination: a. _ Exit( ) normal, abnormal b. Break, normal, abnormal Botha & b None of these
Last Answer : a. _ Exit( ) normal, abnormal
Description : To design a program it requires __ os a. Program specification b. Code specification c. Instruction specification d. Problem specification
Last Answer : a. Program specification
Description : Testing helpstoensure_——_—of the program for use within a system. a. Quality, accuracy and except b. Quality, accuracy and acceptance c. Design, assurance and acceptance d. Quality, accuracy and development
Last Answer : b. Quality, accuracy and acceptance
Description : An unstructured program uses a approach to solve problems: a. Linear b. Top down co Botha&b d. None of these
Last Answer : co Botha&b
Description : Ina complex program, the overlaps: a. Branching b. Condition c. Botha &b d. None of these
Last Answer : a. Branching
Description : In_ instructions are followed one after the other in the preset order in which they appear within program: a. Sequence b Selection c. Break d. Iteration
Last Answer : a. Sequence