The process of assigning load addresses to the various parts of the program and adjusting the code and data in the program to reflect the assigned addresses is called .................. (A) Symbol resolution (B) Parsing (C) Assembly (D) Relocation

1 Answer

Answer :

(D) Relocation

Related questions

Description : Which one from the following is false ? (A) LALR parser is Bottom - Up parser (B) A parsing algorithm which performs a left to right scanning and a right most deviation is RL (1). (C) LR parser is Bottom - Up parser. (D) In LL(1), the 1 indicates that there is a one - symbol look - ahead.

Last Answer : (B) A parsing algorithm which performs a left to right scanning and a right most deviation is RL (1).

Description : Which of the following are the principles tasks of the linker? I. Resolve external references among separately compiled program units. II. Translate assembly language to machine code. III. Relocate code and data relative to the beginning of ... (A) I and II (B) I and III (C) II and III (D) I and IV

Last Answer : (B) I and III

Description : Line caps are used for adjusting the shape of the line ends to give them a better appearance. Various kinds of line caps used are (A) Butt cap and sharp cap (B) Butt cap and round cap (C) Butt cap, sharp cap and round cap (D) Butt cap, round cap and projecting square cap

Last Answer : (D) Butt cap, round cap and projecting square cap

Description : ………………….. is responsible for converting the higher level protocol addresses (IP addresses) to physical network addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)

Last Answer : A) Address Resolution Protocol (ARP)

Description : ........ is responsible for converting the higher level protocol addresses to physical Network Addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)

Last Answer : D) Internet Control Message Protocol (ICMP)

Description : Process is ........................ A) A program in execution B) An instance of a program running on a computer. C) The entity that can be assigned to and executed D) All of the above.

Last Answer : D) All of the above.

Description : Which of the following derivations does a top-down parser use while parsing an input string ? The input is scanned from left to right. (A) Leftmost derivation (B) Leftmost derivation traced out in reverse (C) Rightmost derivation traced out in reverse (D) Rightmost derivation

Last Answer : (A) Leftmost derivation

Description : Which of the following is not a potential effect of an auditor's decision that a lower acceptable audit risk is appropriate? a. More evidence is required. b. Less evidence is required. c. ... experienced staff. d. Review of the working papers by personnel who were not assigned to the engagement

Last Answer : Less evidence is required.

Description : Which form of byte assigning strategy is adopted in class B type of network corresponding to IP addresses? a. Network.Node.Node.Node b. Network.Network.Node.Node c. Network.Network.Network.Node d. Network.Node.Node.Node

Last Answer : b. Network.Network.Node.Node

Description : Which of the following addresses is used to deliver a message to the correct application program running on a host? (A) Port (B) IP (C) Logical (D) Physical

Last Answer : (A) Port 

Description : One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid values can be assigned to each data items. This is referred to as A) Data Security B) Domain access C) Data Control

Last Answer : C) Data Control

Description : Some of the criteria for calculation of priority of a process are: a. Processor utilization by an individual process. b. Weight assigned to a user or group of users. c. Processor utilization by a user or group of processes. In fair share ... (a) and (c) (3) (a), (b) and (c) (4) only (b) and (c)

Last Answer : (3) (a), (b) and (c)

Description : Given the symbols A, B, C, D, E, F, G and H with the probabilities 1/30, 1/30, 1/30, 2/30, 3/30, 5/30, 5/30 and 12/30 respectively. The average Huffman code size in bits per symbol is: (A) 67/30 (B) 70/34 (C) 76/30 (D) 78/30

Last Answer : (C) 76/30

Description : Consider a source with symbols A, B, C, D with probabilities 1/2, 1/4, 1/8, 1/8 respectively. What is the average number of bits per symbol for the Huffman code generated from above information? (A) 2 bits per symbol (B) 1.75 bits per symbol (C) 1.50 bits per symbol (D) 1.25 bits per symbol

Last Answer : (B) 1.75 bits per symbol

Description : A specific editor has 200 K of program text, 15 K of initial stack, 50 K of initialized data, and 70 K of bootstrap code. If five editors are started simultaneously, how much physical memory is needed if shared text is used ? (A) 1135 K (B) 335 K (C) 1065 K (D) 320 K

Last Answer : (B) 335 K

Description : The content of the accumulator after the execution of the following 8085 assembly language program, is: MVI A, 42H  MVI B, 05H UGC: ADD B DCR B JNZ UGC ADI 25H HLT (A) 82 H (B) 78 H (C) 76 H (D) 47 H

Last Answer : (C) 76 H

Description : The content of the accumulator after the execution of the following 8085 assembly language program, is MVI A, 35H MOV B, A STC CMC RAR XRA B (A) 00H (B) 35H (C) EFH (D) 2FH

Last Answer : (D) 2FH

Description : To avoid ambiguity, the names assigned to machines must be carefully selected from a ______ with complete control over the binding between the names and IP addresses A. Table B. look up table C. name space D. name table

Last Answer : C. name space

Description : Which among the following is correct: a) An IP address can be private - for use on Local Area Network (LAN). b) It can be use on the internet or other wide area network (WAN). c) IP addresses ... dynamically (assigned by another device on the network on demand). d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : Which among the following is correct: a) An IP address can be private - for use on Local Area Network (LAN). b) It can be use on the internet or other wide area network (WAN). c) IP addresses ... dynamically (assigned by another device on the network on demand). d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned

Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses

Description : If we convert ∃u ∀v ∀x ∃y (P(f(u),v, x, y) → Q(u,v,y)) to ∀v ∀x (P(f(a),v, x, g(v,x)) → Q(a,v,g(v,x))) This process is known as (A) Simplification (B) Unification (C) Skolemization (D) Resolution

Last Answer : (C) Skolemization

Description : State true of false. i) Public can only be assigned to class ii) Protected protects a statement iii) Protected method is never accessible outside the package iv) Friendly variable may be accessible outside class A) i- ... -false, ii-true, iii-false, iv-false D) i-true, ii-false, iii-false, iv-true

Last Answer : C) i-false, ii-true, iii-false, iv-false

Description : Which of the following statements is not true for Multi Level Feedback Queue processor scheduling algorithm? (A) Queues have different priorities. (B) Each queue may have different scheduling algorithm (C) ... to a queue (D) This algorithm can be configured to match a specific system under design

Last Answer : (C) Processes are permanently assigned to a queue

Description : Which of the following is false for the programming language PROLOG? (A) A PROLOG variable can only be assigned to a value once (B) PROLOG is a Strongly Typed Language. (C) The scope of a variable in PROLOG is a single clause or rule. (D) the scope of a variable in PROLOG is a Single Query

Last Answer : (B) PROLOG is a Strongly Typed Language.

Description : When one object reference variable is assigned to another object reference variable then (A) a copy of the object is created. (B) a copy of the reference is created. (C) a copy of the ... not created. (D) it is illegal to assign one object reference variable to another object reference variable.

Last Answer : (B) a copy of the reference is created.

Description : A software project was estimated at 352 Function Points (FP). A four person team will be assigned to this project consisting of an architect, two programmers, and a tester. The salary of the architect is Rs.80,000 per month, the ... ) Rs.28,16,000 (2) Rs.20,90,000 (3) Rs.26,95,000 (4) Rs.27,50,000

Last Answer : (4) Rs.27,50,000 

Description : A pointer can hold A) Single address at a time B) Two addresses at a time C) Number of addresses at a time D) No address

Last Answer : A) Single address at a time

Description : State whether true or false. i) A connection oriented protocol can only use unicast addresses. ii) The anycast service is included in IPV6. A) True, True B) True, False

Last Answer : i) A connection oriented protocol can only use unicast addresses.

Description : State the following statement is true or false. i) In class B addresses a total of more than 1 billion addresses can be formed. ii) Class E addresses are reserved for future or experimental use. A) True, False B) True, True C) False, True D) False, False

Last Answer : B) True, True

Description : .......... addresses are reserved for multicasting. A) Class B B) Class C C) Class D D) Class E

Last Answer : C) Class D

Description : IPv4 and IPv6 are addresses used to identify computers on the internet. Find the correct statement out of the following: (A) Number of bits required for IPv4 address is more than number of bits required for ... of bits required for IPv6 address. (D) Number of bits required for IPv4 address is 64. 

Last Answer : (C) Number of bits required for IPv4 address is less than number of bits required for IPv6 address.

Description : A UNIX file system has 1 KB block size and 4-byte disk addresses. What is the maximum file size if the inode contains ten direct block entries, one single indirect block entry, one double indirect block entry and one triple indirect block entry? (A) 30 GB (B) 64 GB (C) 16 GB (D) 1 GB

Last Answer : (C) 16 GB

Description : STRIPS addresses the problem of efficiently representing and implementation of a planner. It is not related to which one of the following ? (A) SHAKEY (B) SRI (C) NLP (D) None of these

Last Answer : (C) NLP

Description : Which of the following is/are restriction(s) in classless addressing ? (A) The number of addresses needs to be a power of 2. (B) The mask needs to be included in the address to define the block. (C) The starting address must be divisible by the number of addresses in the block. (D) All of the above

Last Answer : (D) All of the above

Description : In a classful addressing, the IP addresses with 0 (zero) as network number: (A) refers to the current network (B) refers to broadcast on the local network (C) refers to broadcast on a distant network (D) refers to loopback testing

Last Answer : (A) refers to the current network

Description : The three outputs x1x2x3 from the 8x3 priority encoder are used to provide a vector address of the form 101x1x2x300. What is the second highest priority vector address in hexadecimal if the vector addresses are starting from the one with the highest priority? (A) BC (B) A4 (C) BD (D) AC

Last Answer : Answer: B

Description : A unix file system has 1-KB blocks and 4-byte disk addresses. What is the maximum file size if i-nodes contain 10 direct entries and one single, double and triple indirect entry each? (A) 32 GB (B) 64 GB (C) 16 GB (D) 1 GB

Last Answer : (C) 16 GB

Description : A virtual memory has a page size of 1K words. There are eight pages and four blocks. The associative memory page table contains the following entries:  Which of the following list of virtual addresses (in ... 1234, 4012, 5000, 6200 (C) 1020, 3012, 6120, 8100 (D) 2021, 4050, 5112, 7100

Last Answer : Answer: C Explanation: The pages which are not in main memory are: 1020 will not cause page fault (1024-2047) 3012 will not cause page fault (3072-4095) 6120 will not cause page fault (4096-5119) 8100 will not cause page fault (6144-7167)

Description : The typical elements of process image are ..................... i) User data ii) System Data iii) User program iv) System stack A) i, iii and iv only B) i, ii, and iv only C) ii, iii, and iv only D) All i, ii, iii, and iv

Last Answer : A) i, iii and iv only

Description : In Unix operating system, special files are used to : (A) buffer data received in its input from where a process reads (B) provide a mechanism to map physical device to file names (C ... pointers associated with i-nodes (D) store information entered by a user application program or utility program

Last Answer : (B) provide a mechanism to map physical device to file names 

Description : A module contains machine code with specification on_ _ a. Relative addresses b. Absolute addresses c. Object program d. None of these

Last Answer : a. Relative addresses

Description : A definition that has a meaning that is deliberately assigned to some symbol is called: (A) Lexical (B) Precising (C) Stipulative (D) Persuasive

Last Answer : (C) Stipulative

Description : Which is the protocol that maps varying IP addresses to the Physical MAC Address of a machine in a LAN network? a. ARQ (Automatic Repeat Request) b. ARP (Address Resolution Protocol) c. SLIP (Serial Line Internet Protocol) d. PLIP (Parallel Line Internet Protocol)

Last Answer : b. ARP (Address Resolution Protocol)

Description : Which is the protocol that maps varying IP addresses to the Physical MAC Address of a machine in a LAN network? A. ARQ Automatic Repeat Request B. ARP Address Resolution Protocol C. SLIP Serial Line Internet Protocol D. PLIP Parallel Line Internet Protocol

Last Answer : B. ARP Address Resolution Protocol

Description : ........... is responsible for converting the higher level protocol addresses to physical Network Addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)

Last Answer : A) Address Resolution Protocol (ARP)

Description : Match the following. a) Java 1) is a tool for debugging java program b) Javah 2) is a tool for creating C-like header files c) Javap 3) runs java bytecode d) jdb 4) prints java code representation A) a-3, b-2,c-1 B) a-3, b-1, c-4, d-2 C) a-1, b-2, c-3, d-4 D) a-2, b-1, c-3, d-4

Last Answer : B) a-3, b-1, c-4, d-2