Question21:-The expansion of nested macro calls follows _________ rule
A:-LILO
B:-LIFO
C:-FIFO
D:-priority
Correct Answer:- Option-B
Question22:-Von Neumann architecture is
A:-SISD
B:-SIMD
C:-MIMD
D:-MISD
Correct Answer:- Option-A
Question23:-The device that is used to forward data packets from one network to another is called a _________
A:-Bridge
B:-Hub
C:-Switch
D:-Gateway
Correct Answer:- Option-C
Question24:-Which among the following is the most general phrase structured grammar ?
A:-Context - Sensitive
B:-Context - Free
C:-Regular
D:-None of the above
Correct Answer:- Option-A
Question25:-When the following instructions have been executed, what will be the contents of register AL ?
MOV BL, 8C
MOV AL, 7E
ADD AL, BL
A:-0A and carry flag is reset
B:-0A and carry flag is set
C:-6A and carry flag is reset
D:-6A and carry flag is set
Correct Answer:- Option-B
Question26:-The first modern computer was called __________
A:-UNIVAC-I
B:-FLOW-MATIC
C:-ENIAC
D:-INTEL
Correct Answer:- Option-C
Question27:-In which of the language paradigms is the addition of two values expressed as (+ 10 20)?
A:-procedural
B:-functional
C:-logic
D:-object-oriented
Correct Answer:- Option-C
Question28:-What is the purpose of this bit of code
void init()
{
...
}
A:-A place to declare variables
B:-A required method in an applet
C:-A class that initializes the applet
D:-Interacting with the user
Correct Answer:- Option-B
Question29:-In Relational Algebra the query that finds customers who have a balance of over 800 is
A:-∏customer_name(σ balance >800(Deposit))
B:-σcustomer_name(∏balance>800(Deposit))
C:-∏customer_name(σbalance>800(Borrow))
D:-σcustomer_name(∏balance>500(Borrow))
Correct Answer:- Option-A
Question30:-Secret-key encryption is also known as
A:-Secret-encryption
B:-Asymmetric encryption
C:-Symmetric encryption
D:-Private encryption
Correct Answer:- Option-D
A:-LILO
B:-LIFO
C:-FIFO
D:-priority
Correct Answer:- Option-B
Question22:-Von Neumann architecture is
A:-SISD
B:-SIMD
C:-MIMD
D:-MISD
Correct Answer:- Option-A
Question23:-The device that is used to forward data packets from one network to another is called a _________
A:-Bridge
B:-Hub
C:-Switch
D:-Gateway
Correct Answer:- Option-C
Question24:-Which among the following is the most general phrase structured grammar ?
A:-Context - Sensitive
B:-Context - Free
C:-Regular
D:-None of the above
Correct Answer:- Option-A
Question25:-When the following instructions have been executed, what will be the contents of register AL ?
MOV BL, 8C
MOV AL, 7E
ADD AL, BL
A:-0A and carry flag is reset
B:-0A and carry flag is set
C:-6A and carry flag is reset
D:-6A and carry flag is set
Correct Answer:- Option-B
Question26:-The first modern computer was called __________
A:-UNIVAC-I
B:-FLOW-MATIC
C:-ENIAC
D:-INTEL
Correct Answer:- Option-C
Question27:-In which of the language paradigms is the addition of two values expressed as (+ 10 20)?
A:-procedural
B:-functional
C:-logic
D:-object-oriented
Correct Answer:- Option-C
Question28:-What is the purpose of this bit of code
void init()
{
...
}
A:-A place to declare variables
B:-A required method in an applet
C:-A class that initializes the applet
D:-Interacting with the user
Correct Answer:- Option-B
Question29:-In Relational Algebra the query that finds customers who have a balance of over 800 is
A:-∏customer_name(σ balance >800(Deposit))
B:-σcustomer_name(∏balance>800(Deposit))
C:-∏customer_name(σbalance>800(Borrow))
D:-σcustomer_name(∏balance>500(Borrow))
Correct Answer:- Option-A
Question30:-Secret-key encryption is also known as
A:-Secret-encryption
B:-Asymmetric encryption
C:-Symmetric encryption
D:-Private encryption
Correct Answer:- Option-D
No comments:
Post a Comment