89. The most common addressing techiniques employed by a CPU is |
immediate |
direct |
indirect |
all of the above |
90. The following command set is correct according to their function |
RD can MD |
DEL and ERASE |
CD and RD |
COPY and RENAME |
91. A computer generated output that lets programmer follow the execution of their programs line by line is a |
core dump |
trace routine |
detail listing |
source listing |
92. When the RET instruction at the end of subroutine is executed, |
the information where the stack is iniatialized is transferred to the stack pointer |
the memory address of the RET instruction is transferred to the program counter |
two data bytes stored in the top two locations of the stack are transferred to the program counter |
two data bytes stored in the top two locations of the stack are transferred to the stack pointer |
93. When a subroutine is called, the address of the instruction following the CALL instructions stored in/on the |
stack pointer |
accumulator |
program counter |
stack |
94. A time sharing system imply |
more than one processor in the system |
more than one program in memory |
more than one memory in the system |
None of above |
95. The x.25 standard specifies a |
technique for start-stop data |
technique for dial access |
DTE/DCE interface |
data bit rate |
96. How many address lines are needed to address each memory locations in a 2048 x 4 memory chip? |
10 |
11 |
8 |
12 |
No comments:
Post a Comment