26. | The FIFO algorithm | |||||||||
Answer: Option B
. |
27. | What is the name given to the organized collection of software that controls the overall operation of a computer? | |||||||||
Answer: Option C
|
28. | The principal of locality of reference justifies the use of | |||||||||
Answer: Option D
|
29. | The register or main memory location which contains the effective address of the operand is known as | |||||||||
Answer: Option A |
30. | Assembly code data base is associated with | |||||||||
Answer: Option A |
||||||||||
31. | Thrashing can be avoided if | |||||||||
Answer: Option A
|
32. | In analyzing the compilation of PL/I program, the term “Lexical analysis” is associated with | |||||||||
Answer: Option B
. |
33. | Resolution of externally defined symbols is performed by | |||||||||
Answer: Option A |
34. | System generation: | |||||||||
Answer: Option C |
35. | The Memory Address Register | |||||||||
Answer: Option C |
||||||||||
36. | In virtual memory systems, Dynamic address translation | |||||||||
Answer: Option A
|
37. | Fragmentation of the file system | |||||||||
Answer: Option C
. |
38. | A non-relocatable program is one which | |||||||||
Answer: Option A
. |
39. | Which of the following are(is) Language Processor(s) | |||||||||
Answer: Option D
. |
40. | In which addressing mode the effective address of the operand is the contents of a register specified in the instruction and after accessing the operand, the contents of this register is incremented to point to the next item in the list? | |||||||||
Answer: Option C |
||||||||||
41. | The memory allocation scheme subject to “external” fragmentation is | |||||||||
Answer: Option A
. |
42. | While working with MS-DOS, which command will you use to transfer a specific file from one disk to another? | |||||||||
Answer: Option B
|
43. | What is the name of the operating system for the laptop computer called MacLite? | |||||||||
Answer: Option D
. |
44. | In which addressing mode the contents of a register specified in the instruction are first decremented, and then these contents are used as the effective address of the operands? | |||||||||
Answer: Option D |
45. | What is the name given to the values that are automatically provided by software to reduce keystrokes and improve a computer user’s productivity? | |||||||||
Answer: Option C |
||||||||||
46. | Page stealing | |||||||||
Answer: Option B
. |
47. | In MS-DOS 5.0, which is the number that acts as a code to uniquely identify the software product? | |||||||||
Answer: Option D |
48. | Bug means | |||||||||
Answer: Option A
|
49. | Memory management is : | |||||||||
Answer: Option D |
||||||||||
46. | Page stealing | |||||||||
Answer: Option B |
47. | In MS-DOS 5.0, which is the number that acts as a code to uniquely identify the software product? | |||||||||
Answer: Option D
. |
48. | Bug means | |||||||||
Answer: Option A
|
49. | Memory management is : | |||||||||
Answer: Option D |