Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.
Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
Questions | Answers | Discussions | Knowledge sharing | Communities & more.
The macro processor must perform
The macro processor executes the compiled %DO instructions and recognizes that the next item is text. The macro processor places the text on top of the input stack and waits for the word scanner to begin tokenization. The word scanner reads the generated text from the input stack, and tokenizes it.
The macro processor executes the compiled %DO instructions and recognizes that the next item is text. The macro processor places the text on top of the input stack and waits for the word scanner to begin tokenization. The word scanner reads the generated text from the input stack, and tokenizes it.
See lessThe details of all external symbols and relocation formation (relocation list or map) is provided to linker by
The details of all external symbols and relocation formation (relocation list or map) is provided to linker by Macro processor.
The details of all external symbols and relocation formation (relocation list or map) is provided to linker by Macro processor.
See lessWhich, of the following is not true about the description of a decision table?
Option e, 'They are used in place of hierarchy charts' is not a true statement about decision tables. Decision tables aid in determining a program's course of action based on different conditions, but they do not replace hierarchy charts, which show the overall system flow and module relationships.
Option e, ‘They are used in place of hierarchy charts’ is not a true statement about decision tables. Decision tables aid in determining a program’s course of action based on different conditions, but they do not replace hierarchy charts, which show the overall system flow and module relationships.
See lessThe process of transferring data intended for a peripheral device into a disk (or intermediate store) so that it can be transferred to peripheral at a more convenient time or in bulk, is known as
The process of transferring data intended for a peripheral device into a disk (or intermediate store) so that it can be transferred to peripheral at a more convenient time or in bulk, is known as 'spooling'.
The process of transferring data intended for a peripheral device into a disk (or intermediate store) so that it can be transferred to peripheral at a more convenient time or in bulk, is known as ‘spooling’.
See lessAn algorithm is best described as
An algorithm is a set of commands that must be followed for a computer to perform calculations or other problem-solving operations.According to its formal definition, an algorithm is a finite set of instructions carried out in a specific order to perform a particular task.
An algorithm is a set of commands that must be followed for a computer to perform calculations or other problem-solving operations.According to its formal definition, an algorithm is a finite set of instructions carried out in a specific order to perform a particular task.
See lessWhen did IBM release the first version of disk operating system DOS version 1.0?
Perhaps the first public mention of the operating system was in July 1981, when Byte discussed rumors of a forthcoming personal computer with "a CP/M-like DOS ... to be called, simply, 'IBM Personal Computer DOS'". 86-DOS was rebranded IBM PC DOS 1.0 for its August 1981 release with the IBM PC.
Perhaps the first public mention of the operating system was in July 1981, when Byte discussed rumors of a forthcoming personal computer with “a CP/M-like DOS … to be called, simply, ‘IBM Personal Computer DOS'”. 86-DOS was rebranded IBM PC DOS 1.0 for its August 1981 release with the IBM PC.
See lessTrojan-Horse programs
A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users' system access with their software.
A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users’ system access with their software.
See lessThe action of parsing the source program into the proper syntactic classes is known as
The action of parsing the source program into the proper syntactic classes is known as syntax analysis. A syntax analyzer or parser takes the input from a lexical analyzer in the form of token streams. The parser analyzes the source code (token stream) against the production rules to detect any erroRead more
The action of parsing the source program into the proper syntactic classes is known as syntax analysis. A syntax analyzer or parser takes the input from a lexical analyzer in the form of token streams. The parser analyzes the source code (token stream) against the production rules to detect any errors in the code.
See lessBlock caches or buffer caches are used
Block caches or buffer caches are used to improve disk performance to handle interrupts to increase the capacity of the main memory to speed up the main memory. Reading from a disk is very slow compared to accessing (real) memory.
Block caches or buffer caches are used to improve disk performance to handle interrupts to increase the capacity of the main memory to speed up the main memory. Reading from a disk is very slow compared to accessing (real) memory.
See lessA page fault
Block caches or buffer caches are used to improve disk performance to handle interrupts to increase the capacity of the main memory to speed up the main memory. Reading from a disk is very slow compared to accessing (real) memory.
Block caches or buffer caches are used to improve disk performance to handle interrupts to increase the capacity of the main memory to speed up the main memory. Reading from a disk is very slow compared to accessing (real) memory.
See less