315. Which of the following translate back from machine code something resembling the source language A. Interpreter B. Compiler C. Assembler D. Decompiler ✅ The correct answer is option D.
318. Any method for controlling access to or use of memory is known as A. Memory map B. Memory protection C. Memory management D. Memory instruction ✅ The correct answer is option B.
321. It is a small piece of text stored on a user’s computer by a web browser for maintaining the state. What we are talking about? A. Application B. Session C. Cookie D. QueryString ✅ The correct answer is option C.
324. A mechanism for arranging controlled access to a shared resource is A. Retrieving B. Sorting C. Balleting D. Lock-out ✅ The correct answer is option D.
327. Firewalls are used to protect against _____________ A. Unauthorized Access B. Virus Attacks C. Data Driven Attacks D. Fire Attacks ✅ The correct answer is option A.
329. Data systems for planning are often called A. decision analysis systems B. planning analysis systems C. decision support systems D. All of the above ✅ The correct answer is option C.
331. The term ‘Pentium’ is related to what? A. Mouse B. Hard Disk C. Microprocessor D. DVD ✅ The correct answer is option C.
333. The ______ cells involve creating a single cell by combining two or more selected cells. A. Formatting B. Merging C. Embedding D. Splitting ✅ The correct answer is option B.
335. Who launched IBM’s First PC in 1981? A. Dean Cline B. C.B. Rogers Jr. C. John F. Akers D. David Svenson ✅ The correct answer is option B.
337. Computer scientists are exploring the possibility of culturing bacteria to create living chips which have digital electronic properties. What are these chips called? A. bacterial chips B. biochips C. natural chips D. neural chips ✅ The correct answer is option B.