- G3 is a computer CHIP
- If instruction RST-5 is written in a program, the program control will jump to location 0028H.
- TOP-DOWN is a tree PREORDER traversing.
- An Operand STACK is essential for conversion to INFIX Expression.
- Header of IP is FIXED part of 20 Bytes.
- FENCE register is used for MEMORY PROTECTION.
- YACC semantic action is sequence of C Statements.
- s Symbol represents SYMMETRIC DIFFERENCE. E.g. AsB
- 5th NF is related to JOIN DEPENDENCY.
- 8086 Microprocessor is a 16 bit Processor.
- A total of about 1 million bytes can be directly addressed by the 8086 microprocessor
- 8086 has 8 flags
- Compare to 8086, the 80286 provides a higher degree of memory operation
- The address space of 8086 Microprocessor is 216 = 1MB.
- The action of parsing the source program into the proper syntactic classes is known as LEXICAL ANALYSIS.
- Printf() in C used to print “character, string, float, integer, octal and hexadecimal values” onto the output screen.
- Fprint() in C used to sends formatted output to a stream.
- Sprint() in C used to send formatted output to a string pointed to, by str.
- Maximum data rate to transmit binary signal from NYQUIST Theorem is 2H.
- TTL (Transistor to transistor logic) have HIGHEST FANOUT.
- FIFO is a behavior of BELADY’S ANOMALY.
- MESH TOPOLOGY is mostly reliable.
- I-node number is an index to the array of opening files maintained by the Kernel.
- Business uptime should be monitored to prevent the loss of revenue.
- STATIC KEYS makes WEB insecure.
- TRUNKS are the components of fibre optic network.
- BOOT MONITORS are Memory Resident Antivirus.
- DISK SCANNERS are Antivirus protection system.
- An INFORMATION is a processed data.
- A FILE is a collection of Related Records.
- The dBASE III+ is mostly used in Database.
- ASSEMBLER, COMPILER & INTERPRETER are types of translators.
- The OS is also Administration Division.
- COMPILER is fastest translator.
- Project Management are addressed first and approach to development in WATERFALL Model or SDLC Model,
- ROLL FORWARD facility should be done after taking DB IMAGE.
- ROLL BACK facility should be done before COMMIT/ DB IMAGE.
- SONET uses FIBRE OPTIC cable
- ‘What the user has & what the user knows’ is the best means of user Authentication.
- DRY PIPE can not be used for extinguishing fire.
- DATA ACCURACY is NOT done by MODEM.
- TRANSMISSION SPEED, ERROR DETECTION & CORRECTION and COMPRESSION is done by MODEM.
- In two-tier client server architecture, the client usually FAT CLIENT.
- SMPS converts RAW input power to power.
- Appropriate signs of emergency exits are takes care of physical & environmental security.
- CASE tool can’t help Understanding Requirements.
- The Senior Management provides the Go-ahead approval for development of projects.
- DOS identifies the way a disk has been formatted by Media Descriptor.
import java.io.*; class test { public static void main(String args[]) { DataInputStream in=new DataInputStream(System.in); try { String text; System.out.println("\nEnter The Text"); text=in.readLine(); System.out.println("\nIn Reverse Order::\n"); for(int i=text.length()-1;i>=0;i--) { System.out.print(text.charAt(i)); } ...
Comments
Post a Comment