COMPUTER-PROGRAMMER---TECHNICAL-EDUCATION--ENGINEERING-COLLEGES Related Question Answers

26. The program that brings the object code into memory for execution is :





27. The order in which the return addresses are generated and used is :





28. The classification of BUSes into synchronous and asynchronous is based on :





29. In a digital representation of voltages using an8-bit binary code,how many values can be defined?binary code, how many values can be defined?





30. The memory used to hold the address of data stored inthe cache is:





31. — is a black box testing method.





32. The strategy of temporarily suspending the running process is called :





33. Resolution of externally defined symbol is done by :





34. In_________________topology, whole network goes down, if a computer’s network cable is broken.





35. Baudot code uses ------bits per symbol.





36. Which of the following problem js undecidable?





37. Image compression is :





38. Basic steps for filtering in the frequency domain :





39. Type checking is normally done by :





40. Producer consumer problem can be solved using :





41. Time To Live field in the ip header is used :





42. AGING is a technique used in :





43. The term used to refer to a row in database is :





44. In a microprocessor the register that keeps the results of arithmetic or logic operation





45. Thrashing occurs when a :





46. A systemprogram that sets up a program in main memory ready for execution is :





47. For largenetworks,_________topology is used.





48. ARPANET stands for :





49. Every context sensitive language is :





50. The permitted values of each attributes of a relation is called its :





Terms And Service:We do not guarantee the accuracy of available data ..We Provide Information On Public Data.. Please consult an expert before using this data for commercial or personal use
DMCA.com Protection Status Powered By:Omega Web Solutions
© 2002-2017 Omega Education PVT LTD...Privacy | Terms And Conditions