Description : Itis the task of the __to locate externally defined symbols in programs, load them in to memory by placing their __ of symbols in calling program: a. Loader and name b. Linker and values c. Linker and name d. Loader and values
Last Answer : d. Loader and values
Description : What do you call the translator which takes assembly language program as input & produce machine language code as output? A) Compiler B) Interpreter C) Debugger D) Assembler
Last Answer : Answer : D
Description : ________ is a program that places programs into memory and prepares them for execution. (1) Assembler (2) Compiler (3) Loader (4) Macro processor
Last Answer : Loader
Description : A program that links several programs is called: a. Linker b. Loader c. Translator d. None of these
Last Answer : a. Linker
Description : contain library program have to be indicated to the loader. a. Externally defined b. Internally defined c. Executable file d. All of these
Last Answer : a. Externally defined
Description : Debugger is a program that (A) allows to examine and modify the contents of registers (B) does not allow execution of a segment of program (C) allows to set breakpoints, execute a segment of program and display contents of register (D) All of the above
Last Answer : (C) allows to set breakpoints, execute a segment of program and display contents of register
Description : A(n) _____ program is one that is ready to run and does not need to be altered in any way. a) Interpreter b) High level c) Compiler d) Executable e) None of these
Last Answer : d) Executable
Description : The translator program that converts source code in high level language into machine code line by line is called - 1) Assembler 2) Compiler 3) Loader 4) Interpreter
Last Answer : 4) Interpreter
Description : Which of the following are the principles tasks of the linker? I. Resolve external references among separately compiled program units. II. Translate assembly language to machine code. III. Relocate code and data relative to the beginning of ... (A) I and II (B) I and III (C) II and III (D) I and IV
Last Answer : (B) I and III
Description : A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect. A) Stealth virus B) Polymorphic Virus C) Parasitic Virus
Last Answer : C) Parasitic Virus
Description : ________ error will show if we try to send text string instead of bytes. a) TypeError b) Error c) Linker error d) Compiler error
Last Answer : TypeError
Description : A translator for the assembly language to machine language is (1) assembler (2) compiler (3) interpreter (4) linker
Last Answer : assembler
Description : State and explain the need of the following development tools microcontroller board: (i) Editor (ii) Assembler (iii) Compiler (iv) Linker
Last Answer : 1) Editor: An editor is a program which helps you to construct your assembly language program in right format so that the assembler will translate it correctly to machine language. So, you can type your ... . Some examples of linker are ASEM-51 BL51, Keil u Vision Debugger, LX 51 Enhanced Linker etc
Description : A DMA controller transfers 32-bit words to memory using cycle Stealing. The words are assembled from a device that transmits characters at a rate of 4800 characters per second. The CPU is fetching and executing instructions at an average ... of the DMA transfer? (A) 0.06% (B) 0.12% (C) 1.2% (D) 2.5%
Last Answer : Answer: B
Description : Which of the following is not typically a benefit of dynamic linking? I. Reduction in overall program execution time. II. Reduction in overall space consumption in memory. III. Reduction in overall space consumption on disk. IV. ... updates. (A) I and IV (B) I only (C) II and III (D) IV only
Last Answer : (B) I only
Description : _____ is required to boot a computer. (1) Loader (2) Operating system (3) Assembler (4) Compiler
Last Answer : Operating system
Description : The translator which performs macro calls expansion is called : (A) Macro processor (B) Micro pre-processor (C) Macro pre-processor (D) Dynamic linker
Last Answer : (C) Macro pre-processor
Description : Which of the following statement(s) regarding a linker software is/are true? I. A function of a linker is to combine several object modules into a single load module. II. A function of a linker is to replace absolute ... modules. (1) Only I (2) Only II (3) Both I and II (4) Neither I nor Il
Last Answer : Answer: 1
Description : A process that execute only in main memory is referred to as ……………… and that allocated in disk is referred to a ……………. A) virtual memory, true memory B) virtual memory, real memory C) real memory, virtual memory D) imaginary memory, real memory
Last Answer : C) real memory, virtual memory
Description : ………. Involves treating main memory as a resource to be allocated to and shared among a number of active processes. A) Partition management B) Memory management C) Disk management D) All of the above
Last Answer : B) Memory management
Description : Which of the following statements is not true about disk-arm scheduling algorithms ? (A) SSTF (shortest seek time first) algorithm increases performance of FCFS. (B) The number of requests for disk ... arm movements. (D) SCAN and C-SCAN algorithms are less likely to have a starvation problem.
Last Answer : (B) The number of requests for disk service are not influenced by file allocation method.
Description : The Octal number to be given alogn with chmod command to make a file readable, writable and executable to the owner, readable and executable to group and others is: A. 000 B. 755 C. 744 D. 555 E. None of the above
Last Answer : B. 755
Description : Preparedstatement Object in JDBC is used to execute ........................... queries. A) executable B) simple C) high level D) parameterized
Last Answer : D) parameterized
Description : Prepared Statement object in JDBC used to execute........... queries. A) Executable B) Simple C) High level D) Parameterized
Last Answer : D) Parameterized
Description : State whether the following statement is true. i) A macro virus is platform independent. ii) Macro viruses infect documents, not executable portions of code. A) i-only B) ii-only C) Both i and ii D) Non i and ii
Last Answer : D) Non i and ii
Description : ……………….. level is where the model becomes compatible executable code A) Abstract level B) Application level C) Implementation level D) All of the above
Last Answer : C) Implementation level
Description : When subroutine is called contents of program counter is location address of __ instruction following call instruction is stored on _ __and program execution is transferred to __ address. a. Non ... , Stack and Main program Cc. Executable, Queue and Subroutine d. Executable, Stack and Subroutine
Last Answer : d. Executable, Stack and Subroutine
Description : When a mobile telephone physically moves from one to another cell, the base station transfers ownership to the cell getting strongest signal. This process is known as................. (A) handoff (B) mobile switching (C) mobile routing (D) cell switching
Last Answer : (A) handoff
Description : State true of false. i) With paging, each process is divided into relatively small, fixed-size pages. ii) Segmentation provides for the use of pieces of varying size. A) Partition management B) Memory management C) Disk management D) All of the above
Description : The distributed system is a collection of (P) and communication is achieved in distributed system by (Q) , where (P) and (Q) are : (A) Loosely coupled hardware on tightly ... message passing ,respectively. (D) Loosely coupled software on tightly coupled hardware and file sharing, respectively.
Last Answer : (C) Tightly coupled software on loosely coupled hardware and message passing ,respectively.
Description : The method which offers higher speeds of I/O transfers is ___________ a) Interrupts b) Memory mapping c) Program-controlled I/O d) DMA
Last Answer : DMA
Description : ............... package is used by compiler itself. So it does not need to be imported for use. A) java.math B) java.awt C) java.applet D) java.lang
Last Answer : D) java.lang
Description : Ingres is a ........................ A) Socket B) Compiler C) Database D) Web server
Last Answer : C) Database
Description : In the second type the information written in java after // is ignored by the ....................... A) Interpreter B) Compiler C) Programmer D) All of the above
Last Answer : B) Compiler
Description : When the operators are having the same priority, they are evaluated from ................. ............. in the order they appear in the expression. A) right to left B) left to right C) any of the order D) depends on compiler
Last Answer : B) left to right
Description : The compiler converts all operands upto the type of the largest operand is called (A) Type Promotion (B) Type Evaluation (C) Type Conversion (D) Type Declaration
Last Answer : (A) Type Promotion
Description : Which phase of compiler generates stream of atoms ? (A) Syntax analysis (B) Lexical Analysis (C) Code generation (D) Code optimization
Last Answer : (A) Syntax analysis
Description : compiler optimization, operator strength reduction uses mathematical identities to replace slow math operations with faster operations. Which of the following code replacements is an illustration of operator strength reduction? (A) Replace P + ... * P or Replace 3 + 4 by 7. (B) Replace P * 32 by P
Last Answer : (B) Replace P * 32 by P
Description : Consider the following statements related to compiler construction: I. Lexical Analysis is specified by context-free grammars and implemented by pushdown automata. II. Syntax Analysis is specified by regular expressions and implemented by ... Only l (2) Only ll (3) Both I and II (4) Neither I nor Il
Last Answer : Answer: 4
Description : Which one of the following is correct for overloaded functions in C++? (1) Compiler sets up a separate function for every definition of function. (2) Compiler does not set up a ... functions cannot handle different types of objects. (4) Overloaded functions cannot have same number of arguments.
Description : State True or False. i) In spooling high speed device like a disk is interposed between running program and low-speed device in Input/output. ii) By using spooling for example instead of writing directly to a printer, ... ii-False B) i-True, ii-True C) i-False, ii-True D) i-False, ii-False
Last Answer : B) i-True, ii-True
Description : Secondary memory can store____: a. Program store code b. Compiler c. Operating system d. All of these
Last Answer : d. All of these
Description : Images tend to be very large collection of data. The size of memory required for a 1024 by 1024 image in which the colour of each pixel is represented by a n-bit number, (in an 8 bit machines) is (A) n × 8 MB (B) n / 8 MB (C) (1024 × 1024) / 8 MB (D) 1024 MB
Last Answer : (B) n / 8 MB
Description : A virtual memory has a page size of 1K words. There are eight pages and four blocks. The associative memory page table contains the following entries: Which of the following list of virtual addresses (in ... 1234, 4012, 5000, 6200 (C) 1020, 3012, 6120, 8100 (D) 2021, 4050, 5112, 7100
Last Answer : Answer: C Explanation: The pages which are not in main memory are: 1020 will not cause page fault (1024-2047) 3012 will not cause page fault (3072-4095) 6120 will not cause page fault (4096-5119) 8100 will not cause page fault (6144-7167)
Description : ____________ refer to renewing or changing components like increasing the main memory, or hard disk capacities, or adding speakers, or modems, etc. a) Grades b) Prosody c) Synthesis d) Upgrades
Last Answer : Answer: d Explanation: Upgrades is the right term to be used. Upgrades are installed to renew or implement a new feature. Except for upgrades, hardware is normally one-time expense
Description : Which of the following is the storage area whit in the computer itself which Holds data only Temporarily as the computer processes instructions? 1) The Hard Disk 2) Main Memory 3) The Control unit 4) Read Only Memory
Last Answer : 4) Read Only Memory
Description : The typical elements of process image are ..................... i) User data ii) System Data iii) User program iv) System stack A) i, iii and iv only B) i, ii, and iv only C) ii, iii, and iv only D) All i, ii, iii, and iv
Last Answer : A) i, iii and iv only
Description : Which of the following is the process of assembling program components, data, and libraries, and then compiling and linking these to create an executable system? a) System building b) Release management c) Change management d) Version management
Last Answer : a) System building
Description : _______viruses infect executable program files: a) File Infector Viruses b) Macro Viruses c) Multi Partite Viruses d) None of These
Last Answer : a) File Infector Viruses
Description : Compiling creates a(n)- 1) Program Specification 2) Algorithm 3) Executable Program 4) Subroutine
Last Answer : 3) Executable Program