89. The most common addressing techiniques employed by a CPU is |
| immediate |
| direct |
| indirect |
| all of the above |
90. The following command set is correct according to their function |
| RD can MD |
| DEL and ERASE |
| CD and RD |
| COPY and RENAME |
91. A computer generated output that lets programmer follow the execution of their programs line by line is a |
| core dump |
| trace routine |
| detail listing |
| source listing |
92. When the RET instruction at the end of subroutine is executed, |
| the information where the stack is iniatialized is transferred to the stack pointer |
| the memory address of the RET instruction is transferred to the program counter |
| two data bytes stored in the top two locations of the stack are transferred to the program counter |
| two data bytes stored in the top two locations of the stack are transferred to the stack pointer |
93. When a subroutine is called, the address of the instruction following the CALL instructions stored in/on the |
| stack pointer |
| accumulator |
| program counter |
| stack |
94. A time sharing system imply |
| more than one processor in the system |
| more than one program in memory |
| more than one memory in the system |
| None of above |
95. The x.25 standard specifies a |
| technique for start-stop data |
| technique for dial access |
| DTE/DCE interface |
| data bit rate |
96. How many address lines are needed to address each memory locations in a 2048 x 4 memory chip? |
| 10 |
| 11 |
| 8 |
| 12 |
No comments:
Post a Comment