Description : In second pass, assembler creates _ in binary format for every instruction in program and then refers to the symbol table to giving every symbol an_ _ relating the segment. a. Code and program b. Program and instruction c. Code and offset d. All of these
Last Answer : c. Code and offset
Description : A program that reads each of the instructions in mnemonic form and translates it into the machine-language equivalent. a) Machine language b) Assembler c) Interpreter d) C program
Last Answer : Answer: b Explanation: Assembler does this job. A language that uses mnemonic codes for the representation of machine-language instructions is called assembly language
Description : The assembler translates ismorphically_ instructions: a. 1.1 b 2:1 c. 3:3 d. 4.1
Last Answer : a. 1.1
Description : When were mnemonic instruction codes and symbolic addresses developed?
Last Answer : . In the early 1950's.
Description : Computer instructions written with the use of English words instead of binary machine code is called A) Mnemonics B) Symbolic code C) Gray codes D) Opcode
Last Answer : Answer : B
Description : Computer instructions written with the use of English words instead of binary machine code is called a. Mnemonics b. Symbolic code c. Gray codes d. Opcode
Last Answer : b. Symbolic code
Description : By whom address of external function in the assembly source file supplied by __ when activated: a. Assembler b. Linker c. Machine d. Code
Last Answer : b. Linker
Description : Ingiven lines of code MOV AX,BL have different type of operands according to assembler for 8086 architecture these identifiers must be of. a. Different type only in byte b. Same type either in word or byte c. Botha &b d. None of these
Last Answer : b. Same type either in word or byte
Description : is a symbolic representation of discrete elements of information: a. Data b. Code c. Address d. Control
Last Answer : b. Code
Description : Which control refers to the track of the address of instructions. a. Data control b. Register control c. Program control d. None of these
Last Answer : c. Program control
Description : __are used to translate high level language instructions to a machine code. a. Translators b. Interpreters c. Compilers d. None of these
Last Answer : c. Compilers
Description : Assembler works to convert assembly language program into machine language : a. Before the computer can execute it b. After the computer can execute it c. In between execution d. All of these
Last Answer : a. Before the computer can execute it
Description : To invoke assembler following command are given at command line: a. $ hello.s -o hello.o b. — $as hello.s -o 0 c. $ as hello —-o hello.o d. $ashello.s—o hello.o
Last Answer : d. $ashello.s—o hello.o
Description : Assembler worksin____ phases. a. 1 b 3 a. 2 d 4
Last Answer : a. 2
Description : which of the 2 files are created by the assembler. a. _ List and object file b. Link and object file c. Botha &b d. None of these
Last Answer : a. _ List and object file
Description : which type of errors are detected by the assembler: a. syntax error b. logical error 9 run time error a none of these
Last Answer : a. syntax error
Description : An assembler is a utility program that performs: a. Isometric translation b. Isomorphic translation c. Isochoric translation d. None of these
Last Answer : b. Isomorphic translation
Description : ASM-H widely used ___ assembler: a. 8§/370 b $/380 c. $/390 d. S/360
Last Answer : a. 8§/370
Description : Assembler is a___ a. Interpreter b. Translator c. Exchanger d. None of these
Last Answer : b. Translator
Description : which of the following are types of assembler entities: a. Absolute entities b. Relative entities c. Object program d. Allof these
Last Answer : d. Allof these
Description : Full form of MIPS assembler is: a. Microprocessor without interlocked pipeline stage b. Microprocessor with interlocked pipeline stage c. Botha &b d. None of these
Last Answer : a. Microprocessor without interlocked pipeline stage
Description : Which are the types of binary codes number: a. Sign magnitude b. —_1’s complement code c. 2’s complement code d. __ Allof these
Last Answer : c. 2’s complement code
Description : The complete set of op-codes for a particular microprocessor defines the_ set for that processor: a. Code b. Function c. Module d. Instruction
Last Answer : d. Instruction
Description : has the property that corrupting or garbling a code word will likely produce a bit string that is not a code word: a. Error deleting codes b. Error detecting codes c. Error string codes
Last Answer : b. Error detecting codes
Description : Absolute entitiesare_ Ss whom value signify storage locations that are independent of resulting machine code: a. Numeric constants b. String constants c. Fixed addresses d. Operation codes e. Allofthese
Last Answer : e. Allofthese
Description : Which language is termed as the symbolic depiction used for indicating the series: a. Random transfer language b. Register transfer language c. Arithmetic transfer language d. __ Allof these
Last Answer : b. Register transfer language
Description : Which is the method by which instructions are selected for execution: a. Instruction selection b. — Selection control c. Instraction sequencing d. All of these
Last Answer : c. Instraction sequencing
Description : shave addresses where instructions are stored along with address of working storage: a. _ Relative entities b. Absolute entities c. Botha &b d. None of these
Last Answer : a. _ Relative entities
Description : In_ instructions are followed one after the other in the preset order in which they appear within program: a. Sequence b Selection c. Break d. Iteration
Last Answer : a. Sequence
Description : _is sequence of instructions is executed and repeated any no. of times in loop until logical condition is true: a. Iteration b. Repetition c Botha&b d. None of these
Last Answer : c Botha&b
Description : Thereis___ standard for preparing pseudocode instructions: a. No b 64 c. 2 d 6
Last Answer : a. No
Description : Which are of the following instructions of hardware subroutines: a. SCAL b. SXIT co Botha&b d. None of these
Last Answer : co Botha&b
Description : Each instruction is executed by set of micro operations termed as. a. Micro instructions b. Mini instructions c. Botha &b d. None of these
Last Answer : a. Micro instructions
Description : program converts machine instructions into control signals. a. Control memory program b. Control store program c Botha&b d. Only memory
Description : Which memory is used to copy instructions or data currently used by CPU: a. Main memory b. Secondary memory c. Cache memory d. None of these
Last Answer : c. Cache memory
Description : Decoding of an instruction in RISC architecture means decision on working of control unit for: a. Remainder of instructions b. _ Divisor of instructions c. Dividend of instructions d. None of these
Last Answer : a. Remainder
Description : Which is data manipulation types are. a. Arithmetic instruction b. Shift instruction c. Logical and bit manipulation instructions d. All of these
Last Answer : d. All of these
Description : Which is the common program control instructions are. a Branch b. Jump c Call a subroutine d. Return e. Allof these f None of these
Last Answer : e. Allof these
Description : Which is a type of microprocessor that is designed with limited number of instructions: a. CISC b. RISC ce. Both d. None
Last Answer : ce. Both
Description : Assembly language uses mnemonic codes. -Technology
Last Answer : TrueAssembly language uses mnemonic codes to represent each low level machine operation or code.
Description : How many main sign number binary codes are used: a. 4 b 65 ce. 3 d. 6
Last Answer : ce. 3
Description : sare the codes that represent alphabetic characters, punctuation marks and other special characters: a. Alphanumeric codes b. ASCII codes c. EBCDIC codes d. All of these
Last Answer : a. Alphanumeric codes
Description : Hamming codes was developed in _ a 1953 b. 1950 c. 1945 d. 1956
Last Answer : b. 1950
Description : It is actually a method for constructing codes with a minimum distance of a. 2 b 64 c. 3 d 5
Last Answer : c. 3
Description : Process of replacing the sequence of lines of codes is known as: a. Expanding die macro b. Expanding tri macro c. Tetra macro d. None of these
Last Answer : a. Expanding die macro
Description : ..... is a set of Keywords, s symbols, and a system of rules for constructing statements by which humans can communicate the instructions to be executed by a computer... 1) A Computer Program 2) A Programming Language 3) An Assembler 4) Syntax
Last Answer : 2) A Programming Language
Description : Which state refers to a state that is not safe not necessarily a deadlocked state. a. Safe state b. Unsafe state c. Botha &b d. None of these
Last Answer : b. Unsafe state
Description : Which cycle refers to the time period during which one instruction is fetched and executed by the CPU: a. Fetch cycle b. Instruction cycle c. Decode cycle d. Execute cycle
Last Answer : b. Instruction cycle
Description : Instructions and memory address are represented by A) Character code B) Binary codes C) Binary word D) Parity bit