The hardware that does this isan ___
a. Error detecting decoder
b. Error correcting decoder
c. Both
d. None of these

1 Answer

Answer :

b. Error correcting decoder

Related questions

Description : A code that is used to correct error is calledan a. Error detecting code b. Error correcting code c. Both d. None of these

Last Answer : b. Error correcting code

Description : has the property that corrupting or garbling a code word will likely produce a bit string that is not a code word: a. Error deleting codes b. Error detecting codes c. Error string codes

Last Answer : b. Error detecting codes

Description : Which microinstruction provide next instruction from control memory: a. Microinstruction execution b. Microinstruction Buffer c. Microinstruction decoder d. Microinstraction Sequencing

Last Answer : d. Microinstraction Sequencing

Description : In RISC architecture access to registers is made as a block and register file in a particular register can be selected by using: a. Multiplexer b. Decoder c. Subtractor d. Adder

Last Answer : b. Decoder

Description : How is selects the register that receives the information from the output bus. Decoder Encoder MUX

Last Answer : Decoder

Description : The number of bit required to express and ___ are determined by the accuracy desired from the computing system . a. Exponent b. Mantissa ce. Both d. None f these

Last Answer : ce. Both

Description : Which of the following summation operations is performed onthe bits to checkanerror-detecting code? A. Codec B. Coder-decoder C. Checksum D. Attenuation

Last Answer : Checksum

Description : is an external hardware event which causes the CPU to interrupt the current instruction sequence: a. Input interrupt b. Output interrupt c. Both d. None of these

Last Answer : c. Both

Description : Compared to hardware, firmware is _ __to design micro programmed organization: a. Difficult b. Easier c. Both a& b d. None of these

Last Answer : b. Easier

Description : The processing speed of a computer depends on the ___ _of the system: a. Clock speed b. Motorola c. Cyrix d. None of these

Last Answer : a. Clock speed

Description : ASM-H widely used ___ assembler: a. 8§/370 b $/380 c. $/390 d. S/360

Last Answer : a. 8§/370

Description : IBM-360 type language is example which supporting _—___—sJanguage. a. Micro b. Macro c. Botha &b d. None of these

Last Answer : b. Macro

Description : The continue statement is used to transfer the control to the_ ___ of astatement block in a loop. a. End b. Beginning c. Middle d. None of these

Last Answer : b. Beginning

Description : ___ mode of addressing is a form of implied addressing: a. Stack b. Array Cc. Queue d. ‘Binary

Last Answer : a. Stack

Description : It contains the stack for PC storage during subroutine calls and input/output interrupt services: a. Seven- level hardware b. Eight- level hardware

Last Answer : b. Eight- level hardware

Description : The variable of __ correspond to hardware register: a. RAM b. RIL c. ALU d. MAR

Last Answer : b. RIL

Description : Which are of the following instructions of hardware subroutines: a. SCAL b. SXIT co Botha&b d. None of these

Last Answer : co Botha&b

Description : Sequence of microinstructions is termed as micro program or a. Hardware b. Software c. Firmware d. None of these

Last Answer : c. Firmware

Description : Which control unit is implemented as combinational circuit in the hardware. a. Microprogrammed control unit b. Hardwired control unit c Blockprogrammed control unit d. Macroprogrammed control unit

Last Answer : b. Hardwired control unit

Description : which type of errors are detected by the assembler: a. syntax error b. logical error 9 run time error a none of these

Last Answer : a. syntax error

Description : MOVE AX BX in this LINES OF CODE what type of error is declared: a. Undeclared identifier MOVE b. undeclared identifier AX c. Accept as a command d. Not look in symbol table

Last Answer : a. Undeclared identifier MOVE

Description : What type of errors are not detected by assemblers: a. Syntax error b. Runtime error c. Logical error

Last Answer : c. Logical error

Description : The compiler _ translate a program code with any syntax error: a. Can b. Cannot c. Without d. None of these

Last Answer : b. Cannot

Description : The front panel display provides lights as green LED represent sand red LED represent _ for device programmer who writes input/output basic: a. Busy and Error b. Error and Busy c. Busy and Busy d. Error and Error

Last Answer : a. Busy and Error

Description : Using which method in transport layer data integrity can be ensured? a. Checksum b. Repetition codes c. Cyclic redundancy checks d. Error correcting codes

Last Answer : a. Checksum

Description : Correcting entries are made a. at the beginning of an accounting period. b. at the end of an accounting period. c. whenever an error is discovered. d. after closing entries.

Last Answer : c. whenever an error is discovered.

Description : A t-error correcting q-nary linear code must satisfy:  Where M is the number of code words and X is (1) qn (2) qt (3) q-n (4) q-t

Last Answer : (1) qn 

Description : Which of the following is error correcting code? (A) EBCDIC (B) GRAY (C) Hamming (D) ASCII

Last Answer : Which of the following is error correcting code? (A) EBCDIC (B) GRAY (C) Hamming (D) ASCII

Description : In discovering material management fraud and an equally material error, the audit plan a. Cannot be expected to provide the same degree of assurance. b. Provide no assurance of detecting either ... be expected to provide the same degree of assurance. d. Should provide complete assurance of detection

Last Answer : Should be expected to provide the same degree of assurance.

Description : Which of the following statements is correct relating to the auditor's consideration of fraud? a. The auditor's interest in fraud consideration relates to fraudulent acts that cause a material ... d. Fraud always involves a pressure or incentive to commit fraud, and a misappropriation of assets

Last Answer : The auditor’s interest in fraud consideration relates to fraudulent acts that cause a material misstatement of financial statements.

Description : Which of the following statements about fraud or error is incorrect? a. The responsibility for the prevention and detection of fraud and error rests with management. b. The auditor should plan and perform ... . The auditor is not and can not be held responsible for the prevention of fraud and error

Last Answer : The likelihood of detecting fraud is ordinarily higher than that of detecting error.

Description : Which of the following statements reflects an auditor's responsibility for detecting fraud and error? a. An auditor is responsible for detecting employee errors and simple fraud, but not for ... detecting errors and fraud unless the application of PSAs and PAPs would result in such detection

Last Answer : An auditor should design the audit to provide reasonable assurance of detecting errors and fraud that are material to the financial statements.

Description : Article marked By parcel post' found in letter box a) The official detecting the irregularity should be make a not of it in his error book. b) In POs the article should be transferred to ... article should be marked found in letter box' transferred to Parcel Sorting Assistant d) All the above

Last Answer : d) All the above

Description : An error-detectingcode inserted asa field in a blockof data tobe transmitted is known as A. Frame check sequence B. Error detecting code C. Checksum D. flow control E. None of the above

Last Answer : Frame check sequence

Description : The error detecting element in a control system gives: - a) the sum of the reference signal and feedback signal b) the sum of the reference signal and error signal c) the difference of the reference signal and feedback signal d) the difference of the reference signal and output signal

Last Answer : The error detecting element in a control system gives: - the difference of the reference signal and feedback signal

Description : In IEEE 802.11, _______ isan optionalaccess method that can be implemented inan infrastructure network (not in an ad hocnetwork). A) DCF B) PCF C) either (a) or (b) D) neither (a) nor (b)

Last Answer : PCF

Description : HDLC isan acronym for _______. A) High-duplex line communication B) High-leveldata link control C) Half-duplex digital link combination D) Hostdouble-level circuit

Last Answer : High-leveldata link control

Description : A local telephone network isan example of a_______ network. A) packet-switched B) circuit-switched C) message-switched D) none of the above

Last Answer : circuit-switched

Description : _____ isan analog multiplexing technique to combine optical signals. A) FDM B) TDM C) WDM D) None of the above

Last Answer : WDM

Description : FSM isan _________technique. A) analog B) digital C) either (a)or (b) D) none of the above

Last Answer : analog

Description : Which isan animated character that gives help in MSOffice? A. Office Worker B. Office Assistant C. Comic Assistant D. None of these

Last Answer : Office Assistant

Description :  ___ is an open source electronic platform based on easy to used hardware and software. A. Arduino B. Uno C. Raspberry Pi D. Node

Last Answer : A. Arduino 

Description : Which section is basically a sequence of instruction with a clear indication of beginning and end for updating shared variables. a. Racing section b. Critical section c. d. Both None of thes

Last Answer : . Critical sectio

Description : Which system is a typical example of the readers and writers problem: a. Airline reservation system b. Airport reservation system c. Both d. None of these

Last Answer : a. Airline reservation system

Description : Which lock can arise when two processes wait for phone calls from one another. a. Spine lock b. Dead lock c. Both d. None of these

Last Answer : b. Dead lock

Description : Which lock is more serious than indefinite postponement or starvation because it affect more than one job: a. Deadlock b. Spinelock c. Both d. None of these

Last Answer : a. Deadlock

Description : Anumber symboliscalleda_ a. Arabic numerals b. Numerals c. Both d. None of these

Last Answer : b. Numerals

Description : Which addition is performed in the same manner as decimal addition: a. Binary b. Decimal c. Both d. None of these

Last Answer : a. Binary