The technique where the controller is given complete access to main memory is called?
The technique where the controller is given complete access to main memory is called? (A) Cycle stealing (B) Memory stealing …
The technique where the controller is given complete access to main memory is called? (A) Cycle stealing (B) Memory stealing …
Which operations are implemented using a binary counter or combination circuit? (1) Arithmetic (2) Register transfer (3) Logical (4) All …
Terminal Node is also known as (1) Ended Node (2) Leaf Node (3) Last Node (4) All of these Ans. …
Process of Removing element from the stack is known as? (1) Delete (2) Create (3) Push (4) POP Ans. – …
Finding and Solving run time errors is called? (1) Assembling (2) Compiling (3) Debugging (Interpreting) (4) Translating Finding and Solving …
Who introduce C language and in which year? (1) 1962, Dennis Ritchie (2) 1970, Dennis Ritchie (3) 1972, Dennis Ritchie …
Set of Instructions is called? (1) Algorithm (2) Mnemonic Code (3) Flow Chart (4) Program Ans. – Program Set of …
Student name is a which type of attribute? (1) Single Value (2) Multi Value (3) Composite (4) All Student name …
Properties that describe the characteristics of entities are called? (1) Entities (2) Identifiers (3) Attributes (4) Relationships Ans. – Attributes …
In ER Diagram Relationship type is Represent by ? (A) Diamond (B) Ellipse (C) Rectangle (D) Dashed ellipse Ans. – …