Computer GK Questions And Answers :: Computer Fundamentals










Computer GK QUESTIONS AND ANSWERS 89 to 96

89. The most common addressing techiniques employed by a CPU is

immediate
direct
indirect
all of the above

90. The following command set is correct according to their function

RD can MD
DEL and ERASE
CD and RD
COPY and RENAME

91. A computer generated output that lets programmer follow the execution of their programs line by line is a

core dump
trace routine
detail listing
source listing

92. When the RET instruction at the end of subroutine is executed,

the information where the stack is iniatialized is transferred to the stack pointer
the memory address of the RET instruction is transferred to the program counter
two data bytes stored in the top two locations of the stack are transferred to the program counter
two data bytes stored in the top two locations of the stack are transferred to the stack pointer

93. When a subroutine is called, the address of the instruction following the CALL instructions stored in/on the

stack pointer
accumulator
program counter
stack

94. A time sharing system imply

more than one processor in the system
more than one program in memory
more than one memory in the system
None of above

95. The x.25 standard specifies a

technique for start-stop data
technique for dial access
DTE/DCE interface
data bit rate

96. How many address lines are needed to address each memory locations in a 2048 x 4 memory chip?

10
11
8
12

More Computer Basics GENERAL KNOWLEDGE QUESTIONS AND ANSWERS available in next pages

    Health is the greatest gift, contentment is the greatest wealth -Buddha
Identify your problems but give your power and energy to solutions- Tony Robbins