2 votes
4 answers
1
Acceptance testing is done byA. DevelopersB. CustomersC. TestersD. All of the above
0 votes
2 answers
2
How many full adder are needed to construct m-bit parallel adder ?A. m/2B. mC. m-1D. m+1
1 votes
1 answer
3
The two methods how LRU page replacement policy can be implemented in hardware are :1) Counters2) RAM & Registers3) Stack & Counters4) Registers
0 votes
1 answer
4
The primary job of the operating system of a computer is to1) command resources2) manage resources3) provide utilities4) provide connection
0 votes
0 answers
5
The _______ has the responsibility to start up the processing of operating system.1) ROM BIOS2) Bootstrap program3) Boost sector4) All options are correct
0 votes
0 answers
6
The program in the operating system that dose processor management is called _________.1) traffic controller2) dispatcher3) processor scheduler4) job scheduler
0 votes
1 answer
7
Which of the following is not a function of pass1 of an assembler?1) Generate data 2) Keep track of LC 3) Remember literals 4) Remember values of symbols until pass 2
0 votes
1 answer
8
Authentication refers to:1) methods of restricting user access to system2) controlling access to portions of database3) controlling the operation on the data4) All option...
0 votes
0 answers
9
In order to use a DBMS, it is important to understandA.the physical schemaB.all sub-schemas that the system supportsC.one subschemaD.both (a) and (b)E.None of the above
0 votes
1 answer
10
You have an interface on a router with the IP address of 192.168.192.10/29. Including the router interface, how many hosts can have IP addresses on the LAN attached to th...
0 votes
0 answers
11
Self-contained sequence of instructions that performs a given computational task is called?1) Function2) Procedure3) Subroutine4) Routine
0 votes
1 answer
12
If the main memory is of 8K bytes and the cache memory is of 2K words. It uses associative mapping. Then each word of cache memory shall be1) 11 bits2) 21 bits3) 16 bits4...
0 votes
1 answer
13
Program threats areA. Trojan Horse B. Trap Door C. Both D. None of them
0 votes
1 answer
14
In C language, bitwise operation can be applied to which of the following operandsA. char B. int C. short, long ...
0 votes
1 answer
15
In which of the following usually a front end processor is used ?A. Virtual storageB. TimesharingC. MultiprogammingD. Multithreading
1 votes
1 answer
16
Semantic error can be detected at:A. compile timeB. RuntimeC. BothD. None of these
2 votes
1 answer
17
A system which has lot of crashes, data should be written to the disk usingA. Write-throughB. Wtite-backC. Both
0 votes
0 answers
18
0 votes
0 answers
19
Overlaying is used to run a program, which is longer than the address space of the computer. TRUE/FALSE... plzz justify ??
0 votes
0 answers
20
For secondary key processing which of the following file organizations is preferred? Give a one line justification:Indexed sequential file organization.Two-way linked lis...