of PC (program counter)in a microprocessor is ----
To store address of TOS(top of stack)
To store address of next instructions to be executed
count the number of instructions
to store the base address of the stack.
results after execution of an instruction in a microprocess is stored in
register b) accumulator c) flag register d) flag register part of PSW (program
OR gate can be converted to the NAND function by adding----gate(s)to the input
of the OR gate.
NOT b) AND c) NOR d) XOR
8051microcontroller ,------has a dual function.
port 3 b) port 2 c) port 1 d) port 0
8085 based microprocessor with 2MHz clock frequency,will execute the following
chunk of code with how much delay?
MVI C, FFH
102.3 b)114.5 c)100.5 d)120
8085 MPU what will be the status of the flag after the execution of the
following chunk of code.
= 1, Z = 0, CY = 1 b)S = 0, Z = 1, CY = 0
S = 1, Z = 0, CY = 0 d)S = 1, Z = 1 ,CY = 1
positive going pulse which is always generated when 8085 MPU begins the machine
RD b) ALE c) WR d) HOLD
a ----- instruction of 8085 MPU is fetched , its second and third bytes are
placed in the W and Z registers.
JMP b) STA c) CALL d) XCHG
is defined as one subdivision of the operation performed in one clock period.
T- State b) Instruction Cycle c) Machine Cycle d) All of the above
the end of the following code, what is the status of the flags.
S = 1, CY = 0, P = 0 , AC = 1 b) S =0 , CY = 1, P = 0,AC = 1
S = 0, CY = 1, P = 0 , AC = 1 d) S = 0, CY = 1, P = 1 , AC = 1
46.The repeated execution of a loop of code while waiting for an event to
occur is called ---------.The cpu is not engaged in any real productive activity
during this period,and the process doesn?t progress towards completion.
a) dead lock b) busy waiting c) trap door d) none.
47. Transparent DBMS is defined as
a) A DBMS in which there are no program or user access languages. b) A DBMS
which has no cross file capabilities but is user friendly and provides user
interface management. c) A DBMS which keeps its physical structure hidden from
user d) none.
48.Either all actions are carried out or none are.users should not have to
worry about the effect of incomplete transctions.DBMS ensures this by undoing
the actions of incomplete transctions.this property is known as
a) Aggregation b) atomicity c) association d) data integrity.
49.------ algorithms determines where in available to load a program. common
methods are first fit,next fit,best fit.--------- algorithm are used when memory
is full , and one process (or part of a process) needs to be swaped out to
accommodate a new program.The ------------- algorithm determines which are the
partions to be swaped out.
a) placement, placement, replacement
b) replacement, placement, placement
c) replacement, placement, replacement
d) placement, replacement, replacement
50.Trap door is a secret undocumented entry point into a program used to
grant access without normal methods of access authentication.A trap is a
software interrupt,usually the result of an error condition.
one of the following is the recursive travel technique.
first search b)preorder c)breadth first search d)none.
recursive implementations which of the following is true for saving the state of
full state on the stack
as reversible action on the stack
a and b
of the following involves context switch
backing is a technique for
a functional dependency XY is ___________dependency if removal of any attribute
A from X means that the dependency does not hold any more
relation schema R is in BCNF if it is in ___________and satisfies an additional
constraints that for every functional dependency XY,X must be a candidate key
a _________sub query can be easily identified if it contains any references to
the parent sub query columns in the _________ clause
hybrid devise that combines the features of both bridge and router is known as
b)bridge c)hub d)brouter
which of the following is the most crucial phase of SDLC
b)code generation c) analysys and design d)implementation
send a data packet using datagram ,connection will be established
connection is required
connection is not established before data transmission
software that allows a personal computer to pretend as as computer terminal is
super key is
same as primary key
primary key and attribute
same as foreign key
foreign key and attribute
binary search tree which traversal is used for ascending order values
Inorder b)preorder c)post order d)none
are creating an index on ROLLNO colume in the STUDENT table.which statement will
CREATE INDEX roll_idx ON student, rollno;
CREATE INDEX roll_idx FOR student, rollno;
CREATE INDEX roll_idx ON student( rollno);
CREATE INDEX roll_idx INDEX ON student (rollno);
is a class that represents a data structure that stores a number of data objects
container b.component c.base d.derived
one of the following phases belongs to the compiler Back-end.
Lexical Analysis b.Syntax Analysis c. Optimization d.Intermediate
context _sensitive language is context_free
is non-empty list of numbers L
each item in the list L,do
A and B be nodes of a heap,such that B is a child of A. the heap must then
satisfy the following conditions
,List,Stack,queue are examples of___________
a)primitive data type
of the following is not true for LinkedLists?
simplest kind of linked list is a single linked list ,which has one link per
node .this link points to the next node in the list,or to a null value or
emptylist if it is the last node.
more sophisticated kind of linked list is a double linkedlist or two way
linkedlist .Each node has two links ,one to the previous node and one to the
in a circleLinkedList ,the first and last nodes are linked together.this can be
done only for double linked list.
to traverse a circular linkedlist ,u begin at any node and follow the list in
either direction until u return to the original node.
node at the beginning and /or at the end of the linkedlist is not used to store