Correct : C. accepts a program written in a high level language and produces an object program
2. Loader is a program that
Correct : A. places programs into memory and prepares them for execution.
3. The action of parsing the source program into the proper syntactic classes is called
Correct : B. lexical analysis
4. In analyzing the compilation of PL/I program ,the term “lexical analysis” is associated with
Correct : B. recognition of basic elements and creation of uniform symbols
5. In analyzing the compilation of PL/I program,the description creation
of more optimal matrix is associated with
Correct : D. machine independent optimization
6. Task of the lexical analysis phase is
Correct : D. all of these
7. which is a permanent database in the general model of compiler
Correct : C. Terminal table
8. which table is a permanent data bases that has an entry for each terminal symbol
Correct : A. Terminal table
9. The output of lexical analyser is
Correct : C. set of tokens
10. which of the following system software resides in main memory
Correct : D. all of these
11. .machine independent phase of the compiler is
Correct : D. all of these
12. which of the following statement is true
Correct : D. parser SLR,canonical CR and LALR have the same power
13. .which of the following is used for grouping of characteristics into tockens
Correct : D. lexical analyser
14. A bottom up parser generates
Correct : B. Right most derivations in reverse
15. .A top down parser generates
Correct : C. Leftmost derivations
16. which of the following grammer is LR(1)
Correct : B. A->aAa
A->aAb
A->c
17. which of the following parser is the most powerful
Correct : B. Canonical LR
18. Minimum hamming distance method is used for connection of
Correct : A. syntactic errors
19. .Pee hole optimization is a form of
Correct : A. loop optimization
20. The optimization which avoids test at every iteration is
Correct : A. loop unrolling
21. The value of k,in LR(k)cannot be
Correct : D. none of these
22. The cost of developing a compiler is proportional to
Correct : D. all of these
23. which of the following is the most general phase structured grammar
Correct : C. Context sensitive
24. Type checking is normally done during
Correct : C. syntax directed translation
25. which of the following grammars are not phase structured
Correct : D. None of these
26. csg can be recognized by
Correct : B. 2-way linear bounded automata
27. which of the following is not a source error
Correct : D. none of these
28. A parser with valid prefix property is advantageous because it
Correct : C. limits the amount of erroneous output passed to the next phase
29. ud-chaining is useful for
Correct : D. all of these
30. Back-patching is useful for handling
Correct : D. forward references
31. Ir stands for
Correct : D. left to right and right most derivations in reverse
32. An ideal compiler should
Correct : D. all of these
33. which of the following is used for grouping of characters into tockens
Correct : D. scanner
34. which of the following class of statements usually produces no executable code when compiled
Correct : D. structural statements
35. Access time of the symbol table will be logarithmic,if it is implemented by
Correct : B. search tree
36. A shift reduce parser carries out the actions specified within braces immediately after reducing,with the corresponding rule of the grammar
s->xxW{print “1”}
s->y{print “2”}
w->sz{print “3”}
what is the translation of “xxxxyzz”
Correct : C. 23131
37. The output of a lexical analyzer is
Correct : C. a stream of tockens
38. Synthesized attribute can be easily simulated by a
Correct : C. LR grammar
39. which of the following cannot be used an an intermediate code form
Correct : D. Quadraples
40. A Language L is defined by L={xn yn |n>1} which of the following definitions generates the same
language as L
Correct : A. E->xEy | xy
41. pass1
Correct : D. all of these
42. pass2
Correct : D. all of these
43. A compiler which allows only the modified section of the source code to be re-compiled is called
Correct : A. incremental compiler
44. In a two pass assembler pseudo code,equ is to be evaluated during
Correct : A. pass1
45. In a syntax directed translation scheme,if values of an attribute of a node is a function of the
attributes of its children,then attribute is called
Correct : B. synthesized attribute
46. Software that allows your computer to interact with the user, applications, and hardware is called
Correct : C. system software
47. Programs that coordinate computer resources, provide an interface between users and the computer, and run applications are called
Correct : B. operating systems
48. Specialized programs that allow particular input or output devices to communicate with the rest of
the computer system are called
Correct : C. device drivers
49. Also known as a service program, this type of program performs specific tasks related to managing
computer resources.
Correct : A. utility
50. In order for a computer to understand a program, it must be converted into machine language by
a(n)__________.
Correct : D. language translator
51. Which of the following is not a function of the operating system?
Correct : B. Internet access
52. The items that a computer can use in its functioning are collectively called its
Correct : A. resources
53. Programs that coordinate all of the computer’s resources including memory, processing, storage, and
devices such as printers are collectively referred to as
Correct : B. resources
54. __________ refers to a computer’s ability to run more than one application at the same time.
Correct : D. multitasking
55. “GUI” stands for
Correct : C. Graphical User Interface
56. Starting or restarting a computer is called
Correct : A. booting the system
57. This type of boot occurs when the computer is already on, and you restart it without turning off the power.
Correct : C. warm boot
58. In a computer system, data and programs are stored as
Correct : A. files
59. In a computer system, related files are generally stored in the same
Correct : C. folder
60. An embedded operating system would most likely be found in a
Correct : D. PDA
61. Which of the following is an operating system that would most likely be found on a handheld computer?
Correct : D. Windows CE
62. To connect several computers together, one generally needs to be running a(n) __________
operating system.
Correct : A. network
63. Popular network operating systems include all of the following except
Correct : D. Microsoft DOS
64. Windows and Macintosh are generally considered to be __________ operating systems.
Correct : B. stand-alone
65. Operating systems that are owned and licensed by a corporation are called
Correct : A. proprietary operating systems
66. The objective of these operating systems is to encourage individuals to use, improve, and
modify the programs.
Correct : D. non-proprietary
67. This operating system is an example of an open source program.
Correct : A. Linux
68. The most popular microcomputer operating system in use today is
Correct : A. Microsoft Windows
69. The latest version of Microsoft’s popular operating system is called
Correct : C. Windows XP
70. The first operating system developed that used GUI’s was by
Correct : C. Macintosh
71. The latest version of the Macintosh operating system is
Correct : D. Mac OS X
72. Apple computers use which operating system?
Correct : D. Macintosh
73. The Macintosh tool for organizing files is called
Correct : A. Dock
74. If you were trying to locate a lost file on your Macintosh, which application would you use?
Correct : B. Sherlock
75. This operating system was originally designed to run on minicomputers used in a network
environment.
Correct : B. UNIX
76. Which of the following is the latest “flavor” of the UNIX operating system?
Correct : D. Linux
77. Which of the following is an example of non-proprietary software?
Correct : C. Linux
78. This open source software is free and available from many sources.
Correct : C. Linux
79. Which of the following is NOT one of the alternatives to the Windows operating system?
Correct : C. NetWare
80. What is the name of a utility that protects your computer against downloading malicious code?
Correct : B. antivirus program
81. To safely remove a program from your computer, you might want to use what type of utility?
Correct : D. uninstall program
82. Which of the following is a type of utility used to reduce the size of files to increase the amount
of available disk space?
Correct : A. file compression program
83. A utility that makes copies of files in case the originals are lost or destroyed is called a(n)
Correct : C. backup program
84. Which of the following Windows utilities will erase unneeded files?
Correct : B. Disk Cleanup
85. A concentric ring on a disk is referred to as a
Correct : A. track
86. When files are broken up into small parts on a disk they are said to be
Correct : A. fragmented
87. A collection of utility programs bundled and sold together is called a(n)
Correct : C. utility suite
88. In order for a peripheral to operate correctly, its __________ must be installed.
Correct : A. device driver
89. Which one of the following would not be considered as a well-known utility suite?
Correct : A. Windows XP
90. You can use what utility to update all of your device drivers at the same time?