Go To Top Reset
COMPUTER-PROGRAMMER---TECHNICAL-EDUCATION--ENGINEERING-COLLEGES Related Question Answers
26. The program that brings the object code into memory for execution is :
Loader Fetcher Extractor Linker
Disscuss This Question & Answer Add Tags Report Error Show Marks
27. The order in which the return addresses are generated and used is :
LIFO FIFO Random Highest priority
Disscuss This Question & Answer Add Tags Report Error Show Marks
28. The classification of BUSes into synchronous and asynchronous is based on :
the devices connected to them the type of data transfer the timing of data transfers none of the above
Disscuss This Question & Answer Add Tags Report Error Show Marks
29. In a digital representation of voltages using an8-bit binary code,how many values can be defined?binary code, how many values can be defined?
128 256 64 16
Disscuss This Question & Answer Add Tags Report Error Show Marks
30. The memory used to hold the address of data stored inthe cache is:
Associative memory Primary memory Secondary memory Register
Disscuss This Question & Answer Add Tags Report Error Show Marks
31. — is a black box testing method.
Basic path testing Code path analysis Boundary value analysis Recovery testing
Disscuss This Question & Answer Add Tags Report Error Show Marks
32. The strategy of temporarily suspending the running process is called :
First come first serve Shortest job first Preemptive scheduling Non-preemptive scheduling
Disscuss This Question & Answer Add Tags Report Error Show Marks
34. In_________________topology, whole network goes down, if a computer’s network cable is broken.
Ring Star Bus Token ring
Disscuss This Question & Answer Add Tags Report Error Show Marks
36. Which of the following problem js undecidable?
Membership problem for CFL Fitness problem for FSAs Membership problem for regular sets Ambiguity problem of CFGs
Disscuss This Question & Answer Add Tags Report Error Show Marks
37. Image compression is :
reducing the size of image to fit to screen making image look better reducing the redundancy of image data reducing degradation over imagek
Disscuss This Question & Answer Add Tags Report Error Show Marks
38. Basic steps for filtering in the frequency domain :
Fourier transform' Filter function Inverse Fourier transform All of the above
Disscuss This Question & Answer Add Tags Report Error Show Marks
39. Type checking is normally done by :
Lexical analyzer Code optimizer Syntax analyzer Linear analyzer
Disscuss This Question & Answer Add Tags Report Error Show Marks
40. Producer consumer problem can be solved using :
monitors semaphores event counters all the above
Disscuss This Question & Answer Add Tags Report Error Show Marks
41. Time To Live field in the ip header is used :
to find the shortest path to find alternate path to aviod infinite loopsto avoid infinite loops to reduce the size of packetto reduce the size of packet
Disscuss This Question & Answer Add Tags Report Error Show Marks
42. AGING is a technique used in :
FCFS Round Robin Priority scheduling Pre-emptive scheduling
Disscuss This Question & Answer Add Tags Report Error Show Marks
44. In a microprocessor the register that keeps the results of arithmetic or logic operation
Program counter Flag register AccumulatorAccumulator Stack register
Disscuss This Question & Answer Add Tags Report Error Show Marks
45. Thrashing occurs when a :
Computer's virtual memory subsystem is in a constant state of paging Computer’s virtual memory subsystem is in a constant state of paging Computer’s main memory got exhausted Computer's processes are in indefinite dead lock None of the above
Disscuss This Question & Answer Add Tags Report Error Show Marks
46. A systemprogram that sets up a program in main memory ready for execution is :
Assembler Linker EditorEditor Loader
Disscuss This Question & Answer Add Tags Report Error Show Marks
48. ARPANET stands for :
American Research Project Agency Network Asian Research Project Agency Network Ad-hoc Research Project Agency Network Advanced Research Project Agency Network
Disscuss This Question & Answer Add Tags Report Error Show Marks
49. Every context sensitive language is :
Recursive enumerable language Recursive language Context free language Context sensitive language
Disscuss This Question & Answer Add Tags Report Error Show Marks
50. The permitted values of each attributes of a relation is called its :
Set .‘ Tuple Schema Domain
Disscuss This Question & Answer Add Tags Report Error Show Marks
Terms And Service:We do not guarantee the accuracy of available data ..We Provide Information On Public Data.. Please consult an expert before using this data for commercial or personal use
Powered By:Omega Web Solutions © 2002-2017 Omega Education PVT LTD...Privacy | Terms And Conditions