ULSI stands for______ (A) Ultra Large Scale Integration (B) Ultimate Large Scale Integration (C) Upper Large Scale Integration (D) Ultra Large Script Integration

1 Answer

Answer :

(A) Ultra Large Scale Integration

Related questions

Description : ISP stands for______ (A) Instruction Standard Processing (B) Instruction Standard Processor (C) Information Set Processing (D) Instruction Set Processor

Last Answer : (D) Instruction Set Processor

Description : FLOPS stands for______ (A) Floating Point Operation Per Second (B) File Processing Operation Per Second (C) Floating Processing Operation Per Second (D) File Loading Operation Per Second

Last Answer : (A) Floating Point Operation Per Second

Description : GIGO stands for______ (A) Garbage In Garbage Out (B) Gateway In Gateway Out (C) Gopher In Gopher Out (D) Geographic In Geographic Out

Last Answer : (A) Garbage In Garbage Out

Description : Which of the following is related to fifth generation computers? A) Knowledge information processing system B) Very large scale integration (VLSI) C) Both of above D) Only b

Last Answer : Answer : A

Description : Fifth generation computer is also known as A) Knowledge information processing system B) Very large scale integration C) Both of above D) None of above

Last Answer : Answer : A

Description : Fifth generation computer is also known as A) Knowledge information processing system B) Very large scale integration (VLSI) C) Both of above D) None of above

Last Answer : Answer : A

Description : Fifth generation computers do not have : (1) Speech recognition (2) Artificial intelligence (3) Very large scale integration (4) Vacuum tubes 

Last Answer : Vacuum tubes

Description : LSI, VLSI & ULSI chips were used in which generation? A) First B) Second C) Third D) Fourth

Last Answer : Answer : D

Description : What was the expected feature of fifth generation computers when Japan started FGCS? A) Operating Systems B) Parallel Processing C) ULSI D) None of above

Last Answer : Answer : B

Description : Fifth generation computer is also known as a. Knowledge information processing system b. Very large scale integration (VLSI) c. Both of above d. None of above

Last Answer : Knowledge information processing system

Description : It is a large scale integration chip designed for use in telecommunication industry for private branch exchanges, central office switches, digital handsets and digital echo suppressors.

Last Answer : Codec

Description : Fifth generation computer is also known as a. Knowledge information processing system b. Very large scale integration (VLSI) c. Both of above d. None of above

Last Answer : a. Knowledge information processing system

Description : Large scale integration chips have between (A) Less than 10 components. (B) 10 and 100 components. (C) 100 and 1000 components. (D) More than 1000 components.

Last Answer : (C) 100 and 1000 components.

Description : Lasers are not a part of any of these processes except for______?

Last Answer : Inertial confinement fusion Apex

Description : The ultra violet radiations of the Sun do not reach the Earth because the upper layers of the atmosphere contain (a) oxygen (b) helium (c) ozone (d) hydrogen

Last Answer : Ans:(c)

Description : VLIC (Very Large Integration Circuit) technology was used in which generation ? 1) First generation 2) Second generation 3) Third generation 4) Fourth generation

Last Answer : 4) Fourth generation

Description : VLIC (Very Large Integration Circuit) technology was used in which generation ? 1 First generation 2 Second generation 3 Third generation 4 Fourth generation

Last Answer : 4 Fourth generation

Description : What is the full form UTS of rails a. Ultimate technical Strength b. Ultimate tensile Strength* c. Upper Top surface d. None of above

Last Answer : b. Ultimate tensile Strength*

Description : IDIP stands for ______ a. Investigated digital Integration process b. Integrated digital investigation process c. Inherited digital investigation process

Last Answer : b. Integrated digital investigation process

Description : The growth of medium scale integration in______: a. Till 1971 b. Till 1970 c. Till 1972 d. Till 1969

Last Answer : a. Till 1971

Last Answer : In medium-scale integration (MSI), a chip contains Less than 100 gates.

Description : MSI stands for A) Medium Scale Integrated Circuits B) Medium System Integrated Circuits C) Medium Scale Intelligent Circuit D) Medium System Intelligent Circuit

Last Answer : Answer : A

Description : To change selected text to all capital letters, click the change case button and then click: a) UPPERCASE b) UPPER ALL c) CAPS LOCK d) Lock Upper e) Large Size

Last Answer : a) UPPERCASE

Description : Manual order processing A)allows the integration of order processing and production planning. B)is flexible in special situations. C)is practical for a large volume of orders. D)is the most widely used form of order processing.

Last Answer : D)is the most widely used form of order processing.

Description : The upper limit of investment in plant and machinery for small-scale industries has been fixed currently at - (1) Rs. 35 lakhs (2) Rs. 45 lakhs (3) Rs. 60 lakhs (4) Rs. 1 crore

Last Answer : (4) Rs. 1 crore Explanation: The upper limit of investment in plant and machinery for small-scale industries has been fixed at Rs. one crore.

Description : A system is A) an integration of different units so as to achieve an objective B) input unit C) input and output unit D) input, output and storage units

Last Answer : Answer : A

Description : ______ is used by public and private enterprises to publish and share financial information with each other and industry analysis across all computer platforms and the Internet. a) Extensible ... Language c) Enterprise Application Integration d) Sales Force Automation Software e) None of these

Last Answer : b) Extensible Business Reporting Language

Description : For expanding access to banking services, the RBI has advised banks to open branches with minimum infrastructure support of 8 to 10BC units at a reasonable 3-4km. Such branches are known as _______ A. White Label ATMs B. Ultra Small Branches C. Banking Kiosks D. CBS Terminals E. ICT Hubs

Last Answer : B. Ultra Small Branches Explanation: Ultra Small Branches may be set up between the base branch and BC locations so as to provide support to about 8-10 BC Units at a reasonable distance ... for operating large customer transaction and would have to be managed full time by bank officers/ employees.

Description : Fifth Generation computer types include: a) Notebook b) Ultra book c) Chrome Book d) All of Above e) None of These

Last Answer : d) All of Above

Description : Junk e-mail is also called _____: a) Spam b) Spoof c) Cookie Crumbs d) Sniffer Script e) Spill

Last Answer : a) Spam

Description : The first page of a website is called the _____: a) Homepage b) Index c) Java Script d) Bookmark e) Intro Page

Last Answer : a) Homepage

Description : The first page of a Web site is called the....... 1) Homepage 2) Index 3) java Script 4) Book Mark

Last Answer : 1) Homepage

Description : The amateur or newbie in the field of hacking who don’t have many skills about coding and in-depth working of security and hacking tools are called ________ a) Sponsored Hackers b) Hactivists c) Script Kiddies d) Whistle Blowers

Last Answer : d) Whistle Blowers

Description : Which type of hacker represents the highest risk to your network? A. Disgruntled employees B. Black-hat hackers C. Grey-hat hackers D. Script kiddies

Last Answer : A. Disgruntled employees

Description : Who are use their skill to identify security problem with computer network A)Black Hat Hacker B)Ethical Hacker C)Grey Hat hacker D)Script Kiddies

Last Answer : B)Ethical Hacker

Description : 0 White hat Hacker is known as the A)Cracker B)Ethical C)Grey Hat D)Script Kiddies

Last Answer : B)Ethical

Description : Banner grabbing is often used for……. a. White hat hacking b. Black hat hacking c. Gray hat hacking d. Script kiddies

Last Answer : a. White hat hacking

Description : Which type of hacker represents the highest risk to your network? A. Disgruntled employees B. Black-hat hackers C. Grey-hat hackers D. Script kiddies

Last Answer : D. Script kiddies

Description : hich is not the commonly used programming language for AI? ⮚ PROLOG ⮚ LISP ⮚ Perl ⮚ Java script

Last Answer : ⮚ Perl

Description : A non-skilled person who gains access to computer system using already made tools are known as? a. Grey hat hackers b. Hacktivist c. Script kiddies d. Phreakers

Last Answer : c. Script kiddies

Description : ) which type of hackers represent the highest risk to your network (a) black hat hackers (b) grey hat hackers (c) disgruntled employees (d) script kiddies

Last Answer : (c) disgruntled employees

Description : banner grabbing is often use for (a) white hat hacking (b) black hat hacking (c) gray hat hacking (d) script kiddies

Last Answer : (a) white hat hacking

Description : Banner grabbing is used for A. White Hat Hacking B. Black Hat Hacking C. Grey Hat Hacking D. Script Kiddies

Last Answer : A. White Hat Hacking

Description : Which type of hacker represents the highest risk to your network? A. Disgruntled employees B. Black-hat hackers C. Grey-hat hackers D. Script kiddies

Last Answer : A. Disgruntled employees

Description : The amateur or newbie in the field of hacking who don’t have many skills about coding and in-depth working of security and hacking tools are called ________ a) Sponsored Hackers b) Hactivists c) Script Kiddies d) Whistle Blowers

Last Answer : c) Script Kiddies

Description : Which type of hacker represents the highest risk to your network? ∙ A. Disgruntled employees ∙ B. Black-hat hackers ∙ C. Grey-hat hackers ∙ D. Script kiddies

Last Answer : A. Disgruntled employees

Description : Who are use their skill to identify security problem with computer network A)Black Hat Hacker B)Ethical Hacker C)Grey Hat hacker D)Script Kiddies

Last Answer : B)Ethical Hacker

Description : White hat Hacker is known as the A)Cracker B)Ethical C)Grey Hat D)Script Kiddies

Last Answer : B)Ethical

Description : Write a shell script to accept length and breadth of rectangle from user. Calculate and display area, perimeter, of entered values using choice entered by user.

Last Answer : #!/bin/bash # GNU bash, version 4.3.46 echo "Enter Length of Rectangle: " read length echo "Enter Breadth of Rectangle: " read breadth echo "Which operation you want to perform? 1: area 2: perimeter" read ... ) res=` echo 2 \* $length \* $breadth | bc` ;; esac echo "Result is $res" exit 0

Description : Write a shell script to accept a number from user check whether number is even or odd.

Last Answer : 2 8