The method of accessing the I/O devices by repeatedly checking the status flags is_________ A. Memory-mapped I/O B. Program-controlled I/O C. I/O mapped D. None of the Above

1 Answer

Answer :

B. Program-controlled I/O

Related questions

Description : The method of accessing the I/O devices by repeatedly checking the status flags is ___________ a) Program-controlled I/O b) Memory-mapped I/O c) I/O mapped CSE-R17.BLOGSPOT.COM d) None of the mentioned

Last Answer : Program-controlled I/O

Description : The advantage of I/O mapped devices to memory mapped is ___________ a) The former offers faster transfer of datab) The devices connected using I/O mapping have a bigger buffer space c) The devices have to deal with fewer address lines d) No advantage as such

Last Answer : The devices have to deal with fewer address lines

Description : In memory-mapped I/O ____________ a) The I/O devices and the memory share the same address space b) The I/O devices have a separate address space c) The memory and I/O devices have an associated address space d) A part of the memory is specifically set aside for the I/O operation

Last Answer : The I/O devices and the memory share the same address space

Description : .In an 8085 based system, the maximum number of input output devices can be connectedusing I/0 mapped I/O method isa) 64 b) 512 c) 256 d) 65536

Last Answer : b) 512

Description : The ALU gives the output of the operations and the output is stored in the ________ a) Memory Devices b) Registers c) Flags d) Output Unit

Last Answer : Answer: b Explanation: Any output generated by the ALU gets stored in the registers. The registers are the temporary memory locations within the processor that are connected by signal paths to the CPU

Description : To overcome the lag in the operating speeds of the I/O device and the processor we use ___________ a) BUffer spaces b) Status flags c) Interrupt signals d) Exceptions

Last Answer : Status flags

Description : The method which offers higher speeds of I/O transfers is ___________ a) Interrupts b) Memory mapping c) Program-controlled I/O d) DMA

Last Answer : DMA

Description : The advantage of memory mapped I/O over I/O mapped I/O is, a) Faster b) Many instructions supporting memory mapped I/O c) Require a bigger address decoder d) All the above

Last Answer : d) All the above

Description : In 8085 microprocessor with memory mapped I/O which of the following is true?  (1) I/O devices have 16 bit addresses (2) I/O devices are accessed during IN and OUT instructions (3) There can be a maximum of 256 input and 256 output devices (4) Logic operations can not be performed

Last Answer : I/O devices have 16 bit addresses.

Description : The process where in the processor constantly checks the status flags is called as _________ A. Polling B. Inspection C. Reviewing D. None of the Above

Last Answer : A. Polling

Description : What is the difference between non-volatile memory and storage is that the memory is__________ and storage is_________.A. temporary, permanentB. permanent, temporaryC. slow, fastD. none of the above?

Last Answer : A

Description : The necessary steps carried out to perform the operation of accessing either memory or I/O Device, constitute a ___________________ a) fetch operation b) execute operation c) machine cycle

Last Answer : c) machine cycle

Description : _______ is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses. a) Cybergaming crime b) Memory shaving c) Syn flooding d) Software piracy e) None of these

Last Answer : a) Cybergaming crime

Description : Software that prevents unauthorized persons from accessing certain parts of a program, database or network is: a) Firewall b) Scanner c) Anti - Virus d) None of These

Last Answer : a) Firewall

Description : Registers which are partially visible to users and used to hold conditional codes (bits set by the CPU hardware as the result of operations), are known as A) PC B) Flags C) Memory Address Registers D) General Purpose Registers

Last Answer : Answer : B

Description : Registers, which are partially visible to users and used to hold conditional, are known as A) PC B) Memory address registers C) General purpose register D) Flags

Last Answer : Answer : C

Description : The process wherein the processor constantly checks the status flags is called as ___________ a) Polling b) Inspection c) Reviewing d) Echoing

Last Answer : Polling

Description : Which are the flags of status register: a. Over flow flag b. Carry flag c. Half carry flag d. Zero flag e. Interrupt flag f. Negative flag g. All of these

Last Answer : g. All of these

Description : Digital Forensics entails _____. A. Accessing the system's directories viewing mode and navigating through the various systems files and folders B. Undeleting and recovering lost ... identification, preservation, recovery, restoration and presentation of digital evidence from systems and devices

Last Answer : D. The identification, preservation, recovery, restoration and presentation of digital evidence from systems and devices

Description : Memory —mapped ___is used this is just another memory address. a. Input b. Output c. Both d. None

Last Answer : c. Both

Last Answer : In a 8085 microprocessor system with memory mapped I / 0, arithmetic and logic operations can be directly performed with the I / 0 data.

Description : When necessary, the results are transferred from the CPU to main memory by _______ A. I/O devices. B. CPU. C. Shift registers. D. None of the Above.

Last Answer : C. Shift registers.

Description : _________ is a data area shared by hardware devices or program processes that operate at different speeds or with different sets of priorities. A. Flash memory B. Virtual memory C. Buffer D. None of the Above

Last Answer : C. Buffer

Description : Before checking the program for errors in translating code into machine language the high level language code is loaded into __ a. Register b. Memory c. Data d. CPU

Last Answer : b. Memory

Description : In the illustration, the tan and white wires are connected to the solenoid valve. The solinoid valve is_________. EL-0043 A. in the liquid line before the TXV B. energized and open whenever the unit ... so the unit must be modified before using aboard ship D. the water inlet for the ice maker

Last Answer : Answer: D

Description : In the illustration, the tan and white wires are connected to the solenoid valve. The solenoid valve is_________. EL-0042 A. in the liquid line before the TXV B. energized and open whenever the unit ... so the unit must be modified before using aboard ship D. the water inlet for the ice maker

Last Answer : Answer: D

Description : The checksum of1111 and1111 is_________. A) 1111 B) 0000 C) 1110 D) 0111

Last Answer : 1110

Last Answer : In an induction motor, if the rotor resistance is equal to stand-still reactance then the maximum torque is equal to starting torque.

Last Answer : The purpose of skewing of rotor slots in induction motor is to reduce the locking tendency of rotor.

Description : What is the size of memory which can be accessed by direct accessing in 8085 microprocessor? A) 64 kB B) 4 kB C) 128 kB D) 128 MB 

Last Answer : What is the size of memory which can be accessed by direct accessing in 8085 microprocessor? A) 64 kB B) 4 kB C) 128 kB D) 128 MB 

Description : Explain The Differences Between “direct Mapped”, “fully Associative”, And “set Associative” Caches

Last Answer : If each block has only one place it can appear in the cache, the cache is said to be direct mapped. The mapping is usually (block-frame address) modulo (number of blocks in cache). If a block can be ... in cache). If there are n blocks in a set, the cache placement is called n-way set associative.

Description : Which of the following characters is correct regarding network topologies: a) Network Topologies describe the ways in which the elements of a network are mapped. b) Network Topologies describe the physical and logical arrangement of the network nodes. c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : What type of control pins are needed in a microprocessor to regulate traffic on the bus, in order to prevent two devices from trying to use it at the same time? A) Bus control B) Interrupts C) Bus arbitration D) Status

Last Answer : Answer : C

Description : In this method, the decimal number is a. Repeatedly divided by 4 b. Repeatedly divided by 2 c. Repeatedly divided by 1 d. None of these

Last Answer : b. Repeatedly divided by 2

Description : A hardened firewall host on an intranet (i) has a proxy application gateway program running on it (ii)Allows specified internet users to access specified services in the intranet (iii) Initiates all internet activities requested by clients ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : c. i, ii, iii, iv 

Description : If you needed to execute some code repeatedly based on a certain condition, which of the following would you use: a) Compiler b) Loop c) Variable d) None of These

Last Answer : b) Loop

Description : Registers, which are partially visible to users and used to hold conditional, are known as a. PC b. Memory address registers c. General purpose register d. Flags

Last Answer : c. General purpose register

Description : Registers, which are partially visible to users and used to hold conditional, are known as a. PC b. Memory address registers c. General purpose register d. Flags

Last Answer : c. General purpose register

Description : A method of multiple accessing where a given RF channel bandwidth is divided inot smaller frequency band. A. CDMA B. ANIK-D C. TDMA D. FDMA

Last Answer : D. FDMA

Description : True or False? Once connected to the home gateway, smart devices can be controlled from a smartphone, tablet, or PC. a.true b.false

Last Answer : a.true

Description : What is backup? 1) Adding more components to your network 2) Protecting data by copying it from the original source to a different destination 3) Filtering old data from the new data 4) Accessing data on tape 5) None of these

Last Answer : Answer :2

Description : Firewalls are frequently used to prevent unauthorized internet users from accessing private networks connected to the internet especially ____: a) Intranets b) Extranets c) Both of Above d) None of These

Last Answer : a) Intranets

Description : A modem is not needed when accessing the internet through: a) LAN b) Cable c) Wi - Fi d) None of These

Last Answer : a) LAN

Description : ______ a document means the file is transferred from another computer to your computer a) Uploading b) Really Simple Syndication c) Accessing d) Downloading e) None of these

Last Answer : b) Really Simple Syndication

Description : Which application is used for accessing the information on internet ? (1) operating system (2) web browzer (3) microsoft word (4) system software

Last Answer : the answer is web browser

Description : 1. Which of the following is not the categorization of Robot? o 1. Robot is a manipulator which controlled by computer program. o 2. Robot is an automatic machine that has no use of humans. o 3. Robots is a self controlled machine. o 4. Semi automated machine called robot.

Last Answer : 1

Description : Environmental pollution can be controlled by: (1) Checking atomic blasts (2) Manufacturing electric vehicles (3) Sewage treatment (4) All of the above

Last Answer : All of the above

Description : An operating system manages (a) memory (b) processor (c) disk and I/O devices (d) All of these -Technology

Last Answer : (d) An operating system manages disk and I/O devices as it is responsible for input from keyboard, mouse etc. It also manages the computer memory, so that each process can run most effectively.

Description : Interface electronic circuit is used to interconnect I/O devices to a computer’s CPU or a. ALU b. Memory c. Buffer d. Register

Last Answer : Memory

Description : Interface electronic circuit is used to interconnect I/O devices to a computer’s CPU or a. ALU b. Memory c. Buffer d. Register

Last Answer : b. Memory