- G3 is a computer CHIP
- If instruction RST-5 is written in a program, the program control will jump to location 0028H.
- TOP-DOWN is a tree PREORDER traversing.
- An Operand STACK is essential for conversion to INFIX Expression.
- Header of IP is FIXED part of 20 Bytes.
- FENCE register is used for MEMORY PROTECTION.
- YACC semantic action is sequence of C Statements.
- s Symbol represents SYMMETRIC DIFFERENCE. E.g. AsB
- 5th NF is related to JOIN DEPENDENCY.
- 8086 Microprocessor is a 16 bit Processor.
- A total of about 1 million bytes can be directly addressed by the 8086 microprocessor
- 8086 has 8 flags
- Compare to 8086, the 80286 provides a higher degree of memory operation
- The address space of 8086 Microprocessor is 216 = 1MB.
- The action of parsing the source program into the proper syntactic classes is known as LEXICAL ANALYSIS.
- Printf() in C used to print “character, string, float, integer, octal and hexadecimal values” onto the output screen.
- Fprint() in C used to sends formatted output to a stream.
- Sprint() in C used to send formatted output to a string pointed to, by str.
- Maximum data rate to transmit binary signal from NYQUIST Theorem is 2H.
- TTL (Transistor to transistor logic) have HIGHEST FANOUT.
- FIFO is a behavior of BELADY’S ANOMALY.
- MESH TOPOLOGY is mostly reliable.
- I-node number is an index to the array of opening files maintained by the Kernel.
- Business uptime should be monitored to prevent the loss of revenue.
- STATIC KEYS makes WEB insecure.
- TRUNKS are the components of fibre optic network.
- BOOT MONITORS are Memory Resident Antivirus.
- DISK SCANNERS are Antivirus protection system.
- An INFORMATION is a processed data.
- A FILE is a collection of Related Records.
- The dBASE III+ is mostly used in Database.
- ASSEMBLER, COMPILER & INTERPRETER are types of translators.
- The OS is also Administration Division.
- COMPILER is fastest translator.
- Project Management are addressed first and approach to development in WATERFALL Model or SDLC Model,
- ROLL FORWARD facility should be done after taking DB IMAGE.
- ROLL BACK facility should be done before COMMIT/ DB IMAGE.
- SONET uses FIBRE OPTIC cable
- ‘What the user has & what the user knows’ is the best means of user Authentication.
- DRY PIPE can not be used for extinguishing fire.
- DATA ACCURACY is NOT done by MODEM.
- TRANSMISSION SPEED, ERROR DETECTION & CORRECTION and COMPRESSION is done by MODEM.
- In two-tier client server architecture, the client usually FAT CLIENT.
- SMPS converts RAW input power to power.
- Appropriate signs of emergency exits are takes care of physical & environmental security.
- CASE tool can’t help Understanding Requirements.
- The Senior Management provides the Go-ahead approval for development of projects.
- DOS identifies the way a disk has been formatted by Media Descriptor.
Java is a computer programming language. It enables programmers to write computer instructions using English based commands, instead of having to write in numeric codes. It’s known as a “high-level” language because it can be read and written easily by humans. Like English, Java has a set of rules that determine how the instructions are written. These rules are known as its “syntax”. Once a program has been written, the high-level instructions are translated into numeric codes that computers can understand and execute. Who Created Java? In the early nineties, Java was created by a team led by James Gosling for Sun Microsystems. It was originally designed for use on digital mobile devices, such as cell phones. However, when Java 1.0 was released to the public in 1996, its main focus had shifted to use on the Internet. It provided more interactivity with users by giving developers a way to produce animated webpages . Over the years it has evolved as a successful language for
Comments
Post a Comment