Description : An unstructured program uses a approach to solve problems: a. Linear b. Top down co Botha&b d. None of these
Last Answer : co Botha&b
Description : Which are of the following instructions of hardware subroutines: a. SCAL b. SXIT co Botha&b d. None of these
Description : Subroutine is called _ a. In Same program b. Inexternal program co Botha&b d. None of these
Description : What type of errors are not detected by assemblers: a. Syntax error b. Runtime error c. Logical error
Last Answer : c. Logical error
Description : Modern assemblers for RISC based architectures make optimization of instruction scheduling to make use of CPU __ efficiently: a. Pipeline b. Without pipeline c. Botha &b d. None of these
Last Answer : a. Pipeline
Description : which are of the following modern assemblers: a. MIPS b. Sun SPARC c. HP PA-RISC d, x86(x64) e. all of these
Last Answer : e. all of these
Description : Two important fields of an instruction are. a. Opcode b. Operand c. Only a d. Botha&b
Last Answer : d. Botha&b
Description : In 3 state gate two states act as signals equal to. a. Logic O b. Logic 1 c. None of these d. Botha&b
Description : A linker is also known as: a. Binder b. Linkage editor c. Botha&b d. None of these
Last Answer : c. Botha&b
Description : isa__ expression which will have value true or false. a. Relational b. Logical ce. Botha&b d. None of these
Last Answer : ce. Botha&b
Description : _is sequence of instructions is executed and repeated any no. of times in loop until logical condition is true: a. Iteration b. Repetition c Botha&b d. None of these
Last Answer : c Botha&b
Description : program converts machine instructions into control signals. a. Control memory program b. Control store program c Botha&b d. Only memory
Description : Which of the following 2 task are performed to execute an instruction by MCU: a. Microinstruction execution b. Microinstruction sequencing c. Botha&b d. None of these
Description : Mode of addresses in control memory are: a. Executive mode b. Task mode c. Botha&b d. None of these
Description : What are 2 advantages of cache memory: a. Reduction of average access time for CPU memory b. Reduction of bandwidth of available memory of CPU c. Botha&b d. None of these
Description : In second pass, assembler creates _ in binary format for every instruction in program and then refers to the symbol table to giving every symbol an_ _ relating the segment. a. Code and program b. Program and instruction c. Code and offset d. All of these
Last Answer : c. Code and offset
Description : If internal subroutine is called global data is used to pass values defining parameters between __ program and defined | a. Main and subroutine b. Local and subroutine c. Global and subroutine d. Global and main
Last Answer : a. Main and subroutine
Description : Abinary number canbeconvertedinto a. Binary number b. Octal number co. Decimal number d. Hexadecimal number
Last Answer : co. Decimal number
Description : The fixed point mantissamaybe or a. Fraction b. Integer co. Both d. None of these
Last Answer : co. Both
Description : ___arrow represents the value obtained by evaluating right side expression/variable to the left side variable. a. Forth b. Inbetween co. Back d. None of these
Last Answer : co. Back
Description : Which of the following are examples of software development tools? a) debuggers b) editors c) assemblers, compilers and interpreters d) all of the mentioned
Last Answer : d) all of the mentioned
Description : What term is used for programs such as assemblers, compilers, and operating systems?
Last Answer : Software.
Description : The attributes of a file are. a. Name b. Identifier c. Types d. Location e. Size f. Protection g. Time, date and user identification h. Allof these
Last Answer : h. Allof these
Description : Which are the types of binary codes number: a. Sign magnitude b. —_1’s complement code c. 2’s complement code d. __ Allof these
Last Answer : c. 2’s complement code
Description : How many types of addition in the 2’s complement system. a. 3 b 4 c. 5 d. 6
Last Answer : b 4
Description : Which are the types of addition in the 2’s complement system: a. Both number positive b. A Positive number and a smaller negative number c. Anegative number and a smaller positive number
Last Answer : b. A Positive number and a smaller negative number
Description : Which are the types of important ideas to notice about these odometer readings: a. The MSB is the sign bit .O for a +sign and 1 for a— sign b. The negative number represent the 2’s complement of the positive number c. Both d. __ Allof these
Last Answer : c. Both
Description : which of the following are types of assembler entities: a. Absolute entities b. Relative entities c. Object program d. Allof these
Last Answer : d. Allof these
Description : How many types of loop control structures in C language. a. 4 b 65 c. 2 d. 8
Last Answer : d. 8
Description : Types of loop control statements are. a. For loop b. While loop c. Do-while loop d. All of these
Last Answer : d. All of these
Description : How many types of basically Data manipulation: 1 2 3 ap 4
Last Answer : 3
Description : Which is data manipulation types are. a. Arithmetic instruction b. Shift instruction c. Logical and bit manipulation instructions d. All of these
Description : Which are the types of array processor: a. Attached array processor b. SIMD array processor c. Both d. None
Description : Which types of jump keeps a 2_byte instruction that holds the range from- 128to127 bytes in the memory location: a. Far jump b. Near jump ce. Short jump d. __ Allof these
Last Answer : ce. Short jump
Description : Which types of register holds a single vector containing at least two read ports and one write ports: a. Data system b. Data base Cc. Memory d. Vector register
Last Answer : d. Vector register
Description : emaphore provides mutual exclusion for accesses to the buffer pool and is initialized to the value: a. Mutex b. Mutual Cc. Memory d. __ Allof these
Last Answer : Mutex
Description : Which section is basically a sequence of instruction with a clear indication of beginning and end for updating shared variables. a. Racing section b. Critical section c. d. Both None of thes
Last Answer : . Critical sectio
Description : In which section only one process is allowed to access the shared variable and all other have to wait. a. Critical section b. Racing section Cc. Entry section d. Remainder section
Last Answer : . Critical section
Description : hich section is the remaining part of a process’s code: a. Racing section b. Critical section Cc. Entry section d. Reminder secti
Last Answer : b. Entry section
Description : Which are the characteristics of deadlocks. a. Mutual exclusion b. Hold and wait Cc. No pre-emption d. = Circular wait e. Allof these
Last Answer : e. Allof these
Description : How many events concerning RAG can occur in a system: a. 1 b 2 c. 3 d 4
Last Answer : c. 3
Description : Which are the events concerning RAG can occur in a system: a. Request for a resource b. Allocation of a resource c. Release of resource d. Allof these
Description : How many methods for handling deadlocks: a. 1 b 2 c. 3 d 4
Description : Which are the method for handling deadlocks. a. Deadlock prevention b. Deadlock avoidance c. Deadlock detection d. Allof these
Description : How many condition that should be met in order to produce a deadlock. a. 2 b 4 Cc. 6 d 8
Description : Which are the condition that should be met in order to produce a deadlock. a. Mutual exclusion b. Hold and Wait Cc. No preemption d. Circular wait e. Allofthese
Last Answer : e. Allofthese
Description : In protocol each process can make a request onlyinan a. Increasing order b. Decreasing order c. Botha &b d. None of these
Last Answer : a. Increasing order
Description : Which state refers to a state that is not safe not necessarily a deadlocked state. a. Safe state b. Unsafe state c. Botha &b d. None of these
Last Answer : b. Unsafe state
Description : a direct arrow is drawn from the process to the resource rectangle to represent each pending resource request: a. TS b. SP Cc. CCR d. RAG
Last Answer : d. RAG
Description : The various file operation are: a. Crating a file b. Writing a file c. Reading a file d. Repositioning within a file e. Deleting a file truncating a file f. All of these
Last Answer : f. All of these