SlideShare a Scribd company logo
1 of 22
Download to read offline
Subject: computer ASSEMBLY
Name: Muhammad Usman
Email: mu702823@gmail.com
Linkdin: https://www.linkedin.com/feed/?trk=eml-email_series_follow_newsletter_01-header-
8-home
Twitter: https://twitter.com/Muhamma09557892
Topic: 100 MCQ Of CA.
1.
Virtual machine concept was firstly introduced by __________:
A: Denis Ritchie
B: Tanenbaum
C: Bill Gates
D: Steve Jobs
ANSWER: B
2.
Each computer has a native __________that runs directly on its hardware:
A: Human Language
B: High Level Language
C: Machine language
D: NONE
ANSWER: C
3.
A more human-friendly language is usually constructed above machine language, called
__________:
A: Low Level Language
B: High Level Language
C: Machine language
D: NONE
ANSWER: B
4.
In Interpretation, L0 program interprets and executes L1 instructions one by one.
A: TRUE
B: FALSE
ANSWER: A
5.
In Interpretation, L1 program is completely translated into an L0 program, which then runs
on the computer hardware.
A: TRUE
B: FALSE
ANSWER: B
6.
What will following program did:
MOV eax, A
MUL B
ADD eax, C
A: A + B + C
B: A + B * C
C: A * B * C
D: A * B + C
ANSWER: D
7.
Which of the following is Application-oriented language:
A: JAVA
B: C++
C: Visual Basic
D: All of them
ANSWER: D
8.
In level 3 languages, Instruction mnemonics have a one-to-one correspondence to machine
language
A: TRUE
B: FALSE
ANSWER: A
9.
In level 3 languages, Programs are translated into Instruction Set Architecture Level
A: TRUE
B: FALSE
ANSWER: A
10.
ISA also known as conventional machine language
A: TRUE
B: FALSE
ANSWER: A
11.
Digital logic gates are Implemented using bipolar __________.
A: Capacitor
B: Transistors
C: Resistance
D: None of them
ANSWER: B
12.
Binary value 00001001 is equal to __________ in decimal.
A: 6
B: 7
C: 8
D: 9
ANSWER: D
13.
Binary value 00001001 take __________ bits in memory.
A: 6
B: 7
C: 8
D: 9
ANSWER: C
14.
Weighted positional notation shows how to calculate the decimal value of each binary bit.
A: TRUE
B: FALSE
ANSWER: A
15.
Unsigned byte have __________ range.
A: 0-255
B: 0-65525
C: 0-4294967295
D: None of them
ANSWER: A
16.
Unsigned word have __________ range.
A: 0-255
B: 0-65525
C: 0-4294967295
D: None of them
ANSWER: B
17.
Unsigned doubleword have __________ range.
A: 0-255
B: 0-65525
C: 0-4294967295
D: None of them
ANSWER: C
18.
Unsigned byte take __________ bits in memory.
A: 8
B: 16
C: 32
D: 64
ANSWER: A
19.
Unsigned word take __________ bits in memory.
A: 8
B: 16
C: 32
D: 64
ANSWER: B
20.
Unsigned doubleword take __________ bits in memory.
A: 8
B: 16
C: 32
D: 64
ANSWER: C
21.
Unsigned quadword take __________ bits in memory.
A: 8
B: 16
C: 32
D: 64
ANSWER: D
22.
Each hexadecimal digit corresponds to __________ binary bits.
A: 4
B: 8
C: 16
D: none of them
ANSWER: A
23.
In Signed Integers, the __________ bit indicates the sign.
A: lowest
B: highest
C: both of them
D: none of them
ANSWER: B
24.
In Signed Integers, if highest bit is 1 then it indicates that the number is __________.
A: positive
B: negative
C: does not matter
D: invalid
ANSWER: B
25.
In Signed Integers, if highest bit is 0 then it indicates that the number is __________.
A: positive
B: negative
C: does not matter
D: invalid
ANSWER: A
26.
If the highest digit of a hexadecimal integer is > 7, the value is __________.
A: positive
B: negative
C: does not matter
D: none
ANSWER: B
27.
If the highest digit of a hexadecimal integer is <= 7, the value is __________.
A: positive
B: negative
C: does not matter
D: none
ANSWER: A
28.
__________ numbers are stored in two's complement notation.
A: positive
B: negative
C: both of them
D: none of them
ANSWER: B
29.
Two's complement notation Represents the additive Inverse.
A: TRUE
B: FALSE
ANSWER: A
30.
Signed Byte have __________ range.
A: -2^7 to (2^7 -1)
B: -2^15 to (2^15 -1)
C: -2^31 to (2^31 -1)
D: -2^63 to (2^63 -1)
ANSWER: A
31.
Signed word have __________ range.
A: -2^7 to (2^7 -1)
B: -2^15 to (2^15 -1)
C: -2^31 to (2^31 -1)
D: -2^63 to (2^63 -1)
ANSWER: B
32.
Signed doubleword have __________ range.
A: -2^7 to (2^7 -1)
B: -2^15 to (2^15 -1)
C: -2^31 to (2^31 -1)
D: -2^63 to (2^63 -1)
ANSWER: C
33.
Signed quadword have __________ range.
A: -2^7 to (2^7 -1)
B: -2^15 to (2^15 -1)
C: -2^31 to (2^31 -1)
D: -2^63 to (2^63 -1)
ANSWER: D
34.
Signed byte take __________ bits in memory.
A: 8
B: 16
C: 32
D: 64
ANSWER: A
35.
Signed word take __________ bits in memory.
A: 8
B: 16
C: 32
D: 64
ANSWER: B
36.
Signed doubleword take __________ bits in memory.
A: 8
B: 16
C: 32
D: 64
ANSWER: C
37.
Signed quadword take __________ bits in memory.
A: 8
B: 16
C: 32
D: 64
ANSWER: D
38.
Standard ASCII character set have __________ range.
A: 0 to 127
B: 0 to 255
C: 0 to 65535
D: none of them
ANSWER: A
39.
Extended ASCII character set have __________ range.
A: 0 to 127
B: 0 to 255
C: 0 to 65535
D: none of them
ANSWER: B
40.
ANSI character set have __________ range.
A: 0 to 127
B: 0 to 255
C: 0 to 65535
D: none of them
ANSWER: B
41.
UNICODE character set have __________ range.
A: 0 to 127
B: 0 to 255
C: 0 to 65535
D: none of them
ANSWER: C
42.
A Character of Standard ASCII character set take __________ bits in memory.
A: 7
B: 8
C: 16
D: none of them
ANSWER: A
43.
A Character of Extended ASCII character set take __________ bits in memory.
A: 7
B: 8
C: 16
D: none of them
ANSWER: B
44.
A Character of ANSI character set take __________ bits in memory.
A: 7
B: 8
C: 16
D: none of them
ANSWER: B
45.
A Character of UNICODE character set take __________ bits in memory.
A: 7
B: 8
C: 16
D: none of them
ANSWER: C
46.
Boolean expressions created from:
A: OR Gate
B: AND Gate
C: NOT Gate
D: All of them
ANSWER: D
47.
Which of the following is common radix characters in Assembly:
A: h
B: b
C: r
D: All of them
ANSWER: D
48.
Which of the following is not common radix characters in Assembly:
A: h
B: t
C: r
D: d
ANSWER: B
49.
__________ Operator have highest Precedence in Assembly:
A: parenthesis ( )
B: multiply,divide * /
C: modulus MOD
D: add, subtract + -
ANSWER: A
50.
__________ Operator have lowest Precedence in Assembly:
A: parenthesis ( )
B: multiply,divide * /
C: modulus MOD
D: add, subtract + -
ANSWER: D
51.
In Assembly, We can Enclose character in single or double quotes:
A: TRUE
B: FALSE
ANSWER: A
52.
In Assembly, We can not Enclose character in single or double quotes:
A: TRUE
B: FALSE
ANSWER: B
53.
In Assembly, We can Enclose String in single or double quotes:
A: TRUE
B: FALSE
ANSWER: A
54.
In Assembly, We can not Enclose String in single or double quotes:
A: TRUE
B: FALSE
ANSWER: B
55.
In Assembly, Reserved words cannot be used as identifiers
A: TRUE
B: FALSE
ANSWER: A
56.
In Assembly, Reserved words can be used as identifiers
A: TRUE
B: FALSE
ANSWER: B
57.
In Assembly, Identifiers are case sensitive.
A: TRUE
B: FALSE
ANSWER: B
58.
In Assembly, Identifiers are not case sensitive.
A: TRUE
B: FALSE
ANSWER: A
59.
In Assembly, Identifiers can have maximum of__________ characters.
A: 127
B: 128
C: 247
D: 256
ANSWER: C
60.
In Assembly, first character of identifier must be a letter, _, @, ?, or $
A: TRUE
B: FALSE
ANSWER: A
61.
In Assembly, __________ are Commands that are recognized and acted upon by the
assembler.
A: Identifiers
B: Directives
C: Reserved words
D: Labels
ANSWER: B
62.
In Assembly, __________ Act as place markers.
A: Identifiers
B: Directives
C: Reserved words
D: Labels
ANSWER: D
63.
In Assembly, Directives are part of the Intel instruction set.
A: TRUE
B: FALSE
ANSWER: B
64.
In Assembly, Directives are not part of the Intel instruction set.
A: TRUE
B: FALSE
ANSWER: A
65.
In Assembly, Directives are Used to declare:
A: Code
B: Data
C: Memory Models
D: All of them.
ANSWER: D
66.
In Assembly, An instruction must contains:
A: Label
B: Mnemonic
C: Operand
D: Comment
ANSWER: B
67.
In Assembly, which type of label is not used:
A: data label
B: code label
C: logical label
D: none of them
ANSWER: C
68.
In Assembly, data labels followed by colon.
A: TRUE
B: FALSE
ANSWER: B
69.
In Assembly, data labels not followed by colon.
A: TRUE
B: FALSE
ANSWER: A
70.
In Assembly, code labels followed by colon.
A: TRUE
B: FALSE
ANSWER: A
71.
In Assembly, code labels not followed by colon.
A: TRUE
B: FALSE
ANSWER: B
72.
In Assembly, which of the following is valid Instruction Mnemonics.
A: MOV
B: ADD
C: INC
D: ALL of them
ANSWER: D
73.
In Assembly, Operands can be:
A: constant
B: register
C: memory
D: ALL of them
ANSWER: D
74.
In Assembly, __________ explain the program's purpose.
A: Identifiers
B: Directives
C: Comments
D: Labels
ANSWER: C
75.
In Assembly, Single-line comments begin with:
A: ;
B: :
C: //
D: none of them
ANSWER: A
76.
In Assembly, following instruction is example of __________ Instruction Format.
STC
A: NO OPERAND
B: ONE OPERAND
C: TWO OPERAND
D: none of them
ANSWER: A
77.
In Assembly, following instruction is example of __________ Instruction Format.
INC EAX
A: NO OPERAND
B: ONE OPERAND
C: TWO OPERAND
D: none of them
ANSWER: B
78.
In Assembly, following instruction is example of __________ Instruction Format.
ADD EAX, EBX
A: NO OPERAND
B: ONE OPERAND
C: TWO OPERAND
D: none of them
ANSWER: C
79.
In Assembly, __________ Used to see how your program is compiled.
A: code file
B: source file
C: listing file
D: map file
ANSWER: C
80.
In Assembly, __________ provide Information about each program segment:
A: code file
B: source file
C: listing file
D: map file
ANSWER: D
81.
In Assembly, listing file contains:
A: source code
B: addresses
C: object code
D: All of them
ANSWER: D
82.
In Assembly, map file contains:
A: starting address
B: ending address
C: segment type
D: All of them
ANSWER: D
83.
In Assembly, BYTE datatype is used for:
A: 8-bit unsigned integer
B: 8-bit signed integer
C: 16-bit unsigned integer
D: 16-bit signed integer
ANSWER: A
84.
In Assembly, SBYTE datatype is used for:
A: 8-bit unsigned integer
B: 8-bit signed integer
C: 16-bit unsigned integer
D: 16-bit signed integer
ANSWER: B
85.
In Assembly, WORD datatype is used for:
A: 8-bit unsigned integer
B: 8-bit signed integer
C: 16-bit unsigned integer
D: 16-bit signed integer
ANSWER: C
86.
In Assembly, SWORD datatype is used for:
A: 8-bit unsigned integer
B: 8-bit signed integer
C: 16-bit unsigned integer
D: 16-bit signed integer
ANSWER: D
87.
In Assembly, DWORD datatype is used for:
A: 32-bit unsigned integer
B: 32-bit signed integer
C: 64-bit integer
D: 80-bit integer
ANSWER: A
88.
In Assembly, SDWORD datatype is used for:
A: 32-bit unsigned integer
B: 32-bit signed integer
C: 64-bit integer
D: 80-bit integer
ANSWER: B
89.
In Assembly, QWORD datatype is used for:
A: 32-bit unsigned integer
B: 32-bit signed integer
C: 64-bit integer
D: 80-bit integer
ANSWER: C
90.
In Assembly, TBYTE datatype is used for:
A: 32-bit unsigned integer
B: 32-bit signed integer
C: 64-bit integer
D: 80-bit integer
ANSWER: D
91.
In Assembly, REAL4 datatype is used for:
A: short real
B: long real
C: extended real
D: none of these
ANSWER: A
92.
In Assembly, REAL8 datatype is used for:
A: short real
B: long real
C: extended real
D: none of these
ANSWER: B
93.
In Assembly, REAL10 datatype is used for:
A: short real
B: long real
C: extended real
D: none of these
ANSWER: C
94.
In Assembly, following instruction define __________ byte.
value BYTE 0
A: smallest unsigned
B: largest unsigned
C: smallest signed
D: largest signed
ANSWER: A
95.
In Assembly, following instruction define __________ byte.
value BYTE 255
A: smallest unsigned
B: largest unsigned
C: smallest signed
D: largest signed
ANSWER: B
96.
In Assembly, following instruction define __________ byte.
value SBYTE -128
A: smallest unsigned
B: largest unsigned
C: smallest signed
D: largest signed
ANSWER: C
97.
In Assembly, following instruction define __________ byte.
value SBYTE +127
A: smallest unsigned
B: largest unsigned
C: smallest signed
D: largest signed
ANSWER: D
98.
In Assembly, following instruction define __________ byte.
value BYTE ?
A: smallest unsigned
B: largest unsigned
C: initialized
D: uninitialized
ANSWER: D
99.
In Assembly,To continue a single string across multiple lines, end each line with a:
A: ;
B: :
C: ,
D: none of them
ANSWER: C
100.
In Assembly, Strings often will be null-terminated.
A: TRUE
B: FALSE
ANSWER: A

More Related Content

What's hot

History of Computer Programming Languages.pptx
History of Computer Programming Languages.pptxHistory of Computer Programming Languages.pptx
History of Computer Programming Languages.pptx
AliAbbas906043
 
Data Manipulation
Data ManipulationData Manipulation
Data Manipulation
Asfi Bhai
 
Tycs sem 5 asp.net notes unit 1 2 3 4 (2017)
Tycs sem 5 asp.net notes unit 1 2 3 4 (2017)Tycs sem 5 asp.net notes unit 1 2 3 4 (2017)
Tycs sem 5 asp.net notes unit 1 2 3 4 (2017)
WE-IT TUTORIALS
 

What's hot (20)

Hard disk drive components
Hard disk drive componentsHard disk drive components
Hard disk drive components
 
Introduction Programming Languages
Introduction Programming LanguagesIntroduction Programming Languages
Introduction Programming Languages
 
Introduction to C Programming
Introduction to C ProgrammingIntroduction to C Programming
Introduction to C Programming
 
Introduction to c programming
Introduction to c programmingIntroduction to c programming
Introduction to c programming
 
Presentation on computer software
Presentation on computer softwarePresentation on computer software
Presentation on computer software
 
Programming in c#
Programming in c#Programming in c#
Programming in c#
 
Programming Paradigm & Languages
Programming Paradigm & LanguagesProgramming Paradigm & Languages
Programming Paradigm & Languages
 
Processors
ProcessorsProcessors
Processors
 
Bece 2012
Bece 2012Bece 2012
Bece 2012
 
Computer repair and maintenance
Computer repair and maintenanceComputer repair and maintenance
Computer repair and maintenance
 
Pc assembly
Pc assemblyPc assembly
Pc assembly
 
Formating computer
Formating computerFormating computer
Formating computer
 
Bios ( Basic Input Output System )
Bios ( Basic Input Output System )Bios ( Basic Input Output System )
Bios ( Basic Input Output System )
 
Booting
BootingBooting
Booting
 
Computer system architecture mcq bank
Computer system architecture mcq bankComputer system architecture mcq bank
Computer system architecture mcq bank
 
History of Computer Programming Languages.pptx
History of Computer Programming Languages.pptxHistory of Computer Programming Languages.pptx
History of Computer Programming Languages.pptx
 
Data Manipulation
Data ManipulationData Manipulation
Data Manipulation
 
Solved Question Paper of Computer Operator Examination Conducted by EPF 2016
Solved Question Paper of Computer Operator Examination Conducted by EPF 2016Solved Question Paper of Computer Operator Examination Conducted by EPF 2016
Solved Question Paper of Computer Operator Examination Conducted by EPF 2016
 
Assignment on basic programming language
Assignment on  basic programming languageAssignment on  basic programming language
Assignment on basic programming language
 
Tycs sem 5 asp.net notes unit 1 2 3 4 (2017)
Tycs sem 5 asp.net notes unit 1 2 3 4 (2017)Tycs sem 5 asp.net notes unit 1 2 3 4 (2017)
Tycs sem 5 asp.net notes unit 1 2 3 4 (2017)
 

Similar to Computer Assembly MCQ

Mcq+questions+cxc+it
Mcq+questions+cxc+itMcq+questions+cxc+it
Mcq+questions+cxc+it
jimkana13
 
Discrete mathematics (1)
Discrete mathematics (1)Discrete mathematics (1)
Discrete mathematics (1)
Krishnan Ram
 

Similar to Computer Assembly MCQ (20)

Computer programming mcqs
Computer programming mcqsComputer programming mcqs
Computer programming mcqs
 
Technical questions
Technical questionsTechnical questions
Technical questions
 
Part - 3 Cpp programming Solved MCQ
Part - 3 Cpp programming Solved MCQ  Part - 3 Cpp programming Solved MCQ
Part - 3 Cpp programming Solved MCQ
 
Computer genral awareness
Computer genral awarenessComputer genral awareness
Computer genral awareness
 
BISH CS Modle Exit Exam.doc
BISH CS Modle Exit Exam.docBISH CS Modle Exit Exam.doc
BISH CS Modle Exit Exam.doc
 
C taw12 70
C taw12 70C taw12 70
C taw12 70
 
this pdf very much useful for embedded c programming students
this pdf very much useful for embedded c programming studentsthis pdf very much useful for embedded c programming students
this pdf very much useful for embedded c programming students
 
Computer_1000_Most_Repeated_MCQs_by_TestPoint.pk_.pdf
Computer_1000_Most_Repeated_MCQs_by_TestPoint.pk_.pdfComputer_1000_Most_Repeated_MCQs_by_TestPoint.pk_.pdf
Computer_1000_Most_Repeated_MCQs_by_TestPoint.pk_.pdf
 
Mcq+questions+cxc+it
Mcq+questions+cxc+itMcq+questions+cxc+it
Mcq+questions+cxc+it
 
Exam for c
Exam for cExam for c
Exam for c
 
NET_Solved ans
NET_Solved ansNET_Solved ans
NET_Solved ans
 
Electronic spreadsheet class 9 mcqs
Electronic spreadsheet class 9 mcqsElectronic spreadsheet class 9 mcqs
Electronic spreadsheet class 9 mcqs
 
C programming Basics
C programming BasicsC programming Basics
C programming Basics
 
Discrete mathematics (1)
Discrete mathematics (1)Discrete mathematics (1)
Discrete mathematics (1)
 
C MCQ
C MCQC MCQ
C MCQ
 
Plsql pdf
Plsql pdfPlsql pdf
Plsql pdf
 
CSC Millionaire
CSC MillionaireCSC Millionaire
CSC Millionaire
 
SQL MCQ
SQL MCQSQL MCQ
SQL MCQ
 
Digital conceptsv
Digital conceptsvDigital conceptsv
Digital conceptsv
 
C test
C testC test
C test
 

More from Islamia Univeristy Bahawalpur Bahawalnagar

Lec 01
Lec 01Lec 01

More from Islamia Univeristy Bahawalpur Bahawalnagar (15)

Lec 01
Lec 01Lec 01
Lec 01
 
Bridge
BridgeBridge
Bridge
 
Requirements Engineering
Requirements EngineeringRequirements Engineering
Requirements Engineering
 
Principles that Guide Practice
Principles that Guide PracticePrinciples that Guide Practice
Principles that Guide Practice
 
Scrum
ScrumScrum
Scrum
 
Spiral Model and other model
Spiral Model and other modelSpiral Model and other model
Spiral Model and other model
 
Lifecycle Model
Lifecycle ModelLifecycle Model
Lifecycle Model
 
Software Engineering II
Software Engineering IISoftware Engineering II
Software Engineering II
 
A.topic1. introductionandbriefhistoryofpsychology presentation-
A.topic1. introductionandbriefhistoryofpsychology presentation-A.topic1. introductionandbriefhistoryofpsychology presentation-
A.topic1. introductionandbriefhistoryofpsychology presentation-
 
3 .net framework class library
3 .net framework class library3 .net framework class library
3 .net framework class library
 
2 common language runtime
2 common language runtime2 common language runtime
2 common language runtime
 
1 what is microsoft .net framework
1 what is microsoft .net framework1 what is microsoft .net framework
1 what is microsoft .net framework
 
Foundation of Control
Foundation of ControlFoundation of Control
Foundation of Control
 
Freelancing
FreelancingFreelancing
Freelancing
 
Barriers of communication
Barriers of communicationBarriers of communication
Barriers of communication
 

Recently uploaded

If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
Kayode Fayemi
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
amilabibi1
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 

Recently uploaded (18)

If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptx
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verifiedSector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 

Computer Assembly MCQ

  • 1. Subject: computer ASSEMBLY Name: Muhammad Usman Email: mu702823@gmail.com Linkdin: https://www.linkedin.com/feed/?trk=eml-email_series_follow_newsletter_01-header- 8-home Twitter: https://twitter.com/Muhamma09557892 Topic: 100 MCQ Of CA.
  • 2. 1. Virtual machine concept was firstly introduced by __________: A: Denis Ritchie B: Tanenbaum C: Bill Gates D: Steve Jobs ANSWER: B 2. Each computer has a native __________that runs directly on its hardware: A: Human Language B: High Level Language C: Machine language D: NONE ANSWER: C 3. A more human-friendly language is usually constructed above machine language, called __________: A: Low Level Language B: High Level Language C: Machine language D: NONE ANSWER: B 4. In Interpretation, L0 program interprets and executes L1 instructions one by one. A: TRUE B: FALSE ANSWER: A 5. In Interpretation, L1 program is completely translated into an L0 program, which then runs on the computer hardware.
  • 3. A: TRUE B: FALSE ANSWER: B 6. What will following program did: MOV eax, A MUL B ADD eax, C A: A + B + C B: A + B * C C: A * B * C D: A * B + C ANSWER: D 7. Which of the following is Application-oriented language: A: JAVA B: C++ C: Visual Basic D: All of them ANSWER: D 8. In level 3 languages, Instruction mnemonics have a one-to-one correspondence to machine language A: TRUE B: FALSE ANSWER: A 9. In level 3 languages, Programs are translated into Instruction Set Architecture Level A: TRUE B: FALSE ANSWER: A 10. ISA also known as conventional machine language
  • 4. A: TRUE B: FALSE ANSWER: A 11. Digital logic gates are Implemented using bipolar __________. A: Capacitor B: Transistors C: Resistance D: None of them ANSWER: B 12. Binary value 00001001 is equal to __________ in decimal. A: 6 B: 7 C: 8 D: 9 ANSWER: D 13. Binary value 00001001 take __________ bits in memory. A: 6 B: 7 C: 8 D: 9 ANSWER: C 14. Weighted positional notation shows how to calculate the decimal value of each binary bit. A: TRUE B: FALSE ANSWER: A 15. Unsigned byte have __________ range. A: 0-255 B: 0-65525 C: 0-4294967295
  • 5. D: None of them ANSWER: A 16. Unsigned word have __________ range. A: 0-255 B: 0-65525 C: 0-4294967295 D: None of them ANSWER: B 17. Unsigned doubleword have __________ range. A: 0-255 B: 0-65525 C: 0-4294967295 D: None of them ANSWER: C 18. Unsigned byte take __________ bits in memory. A: 8 B: 16 C: 32 D: 64 ANSWER: A 19. Unsigned word take __________ bits in memory. A: 8 B: 16 C: 32 D: 64 ANSWER: B 20. Unsigned doubleword take __________ bits in memory. A: 8 B: 16
  • 6. C: 32 D: 64 ANSWER: C 21. Unsigned quadword take __________ bits in memory. A: 8 B: 16 C: 32 D: 64 ANSWER: D 22. Each hexadecimal digit corresponds to __________ binary bits. A: 4 B: 8 C: 16 D: none of them ANSWER: A 23. In Signed Integers, the __________ bit indicates the sign. A: lowest B: highest C: both of them D: none of them ANSWER: B 24. In Signed Integers, if highest bit is 1 then it indicates that the number is __________. A: positive B: negative C: does not matter D: invalid ANSWER: B 25. In Signed Integers, if highest bit is 0 then it indicates that the number is __________.
  • 7. A: positive B: negative C: does not matter D: invalid ANSWER: A 26. If the highest digit of a hexadecimal integer is > 7, the value is __________. A: positive B: negative C: does not matter D: none ANSWER: B 27. If the highest digit of a hexadecimal integer is <= 7, the value is __________. A: positive B: negative C: does not matter D: none ANSWER: A 28. __________ numbers are stored in two's complement notation. A: positive B: negative C: both of them D: none of them ANSWER: B 29. Two's complement notation Represents the additive Inverse. A: TRUE B: FALSE ANSWER: A 30. Signed Byte have __________ range. A: -2^7 to (2^7 -1)
  • 8. B: -2^15 to (2^15 -1) C: -2^31 to (2^31 -1) D: -2^63 to (2^63 -1) ANSWER: A 31. Signed word have __________ range. A: -2^7 to (2^7 -1) B: -2^15 to (2^15 -1) C: -2^31 to (2^31 -1) D: -2^63 to (2^63 -1) ANSWER: B 32. Signed doubleword have __________ range. A: -2^7 to (2^7 -1) B: -2^15 to (2^15 -1) C: -2^31 to (2^31 -1) D: -2^63 to (2^63 -1) ANSWER: C 33. Signed quadword have __________ range. A: -2^7 to (2^7 -1) B: -2^15 to (2^15 -1) C: -2^31 to (2^31 -1) D: -2^63 to (2^63 -1) ANSWER: D 34. Signed byte take __________ bits in memory. A: 8 B: 16 C: 32 D: 64 ANSWER: A 35. Signed word take __________ bits in memory.
  • 9. A: 8 B: 16 C: 32 D: 64 ANSWER: B 36. Signed doubleword take __________ bits in memory. A: 8 B: 16 C: 32 D: 64 ANSWER: C 37. Signed quadword take __________ bits in memory. A: 8 B: 16 C: 32 D: 64 ANSWER: D 38. Standard ASCII character set have __________ range. A: 0 to 127 B: 0 to 255 C: 0 to 65535 D: none of them ANSWER: A 39. Extended ASCII character set have __________ range. A: 0 to 127 B: 0 to 255 C: 0 to 65535 D: none of them ANSWER: B 40.
  • 10. ANSI character set have __________ range. A: 0 to 127 B: 0 to 255 C: 0 to 65535 D: none of them ANSWER: B 41. UNICODE character set have __________ range. A: 0 to 127 B: 0 to 255 C: 0 to 65535 D: none of them ANSWER: C 42. A Character of Standard ASCII character set take __________ bits in memory. A: 7 B: 8 C: 16 D: none of them ANSWER: A 43. A Character of Extended ASCII character set take __________ bits in memory. A: 7 B: 8 C: 16 D: none of them ANSWER: B 44. A Character of ANSI character set take __________ bits in memory. A: 7 B: 8 C: 16 D: none of them ANSWER: B
  • 11. 45. A Character of UNICODE character set take __________ bits in memory. A: 7 B: 8 C: 16 D: none of them ANSWER: C 46. Boolean expressions created from: A: OR Gate B: AND Gate C: NOT Gate D: All of them ANSWER: D 47. Which of the following is common radix characters in Assembly: A: h B: b C: r D: All of them ANSWER: D 48. Which of the following is not common radix characters in Assembly: A: h B: t C: r D: d ANSWER: B 49. __________ Operator have highest Precedence in Assembly: A: parenthesis ( ) B: multiply,divide * /
  • 12. C: modulus MOD D: add, subtract + - ANSWER: A 50. __________ Operator have lowest Precedence in Assembly: A: parenthesis ( ) B: multiply,divide * / C: modulus MOD D: add, subtract + - ANSWER: D 51. In Assembly, We can Enclose character in single or double quotes: A: TRUE B: FALSE ANSWER: A 52. In Assembly, We can not Enclose character in single or double quotes: A: TRUE B: FALSE ANSWER: B 53. In Assembly, We can Enclose String in single or double quotes: A: TRUE B: FALSE ANSWER: A 54. In Assembly, We can not Enclose String in single or double quotes: A: TRUE B: FALSE ANSWER: B 55. In Assembly, Reserved words cannot be used as identifiers
  • 13. A: TRUE B: FALSE ANSWER: A 56. In Assembly, Reserved words can be used as identifiers A: TRUE B: FALSE ANSWER: B 57. In Assembly, Identifiers are case sensitive. A: TRUE B: FALSE ANSWER: B 58. In Assembly, Identifiers are not case sensitive. A: TRUE B: FALSE ANSWER: A 59. In Assembly, Identifiers can have maximum of__________ characters. A: 127 B: 128 C: 247 D: 256 ANSWER: C 60. In Assembly, first character of identifier must be a letter, _, @, ?, or $ A: TRUE B: FALSE ANSWER: A 61.
  • 14. In Assembly, __________ are Commands that are recognized and acted upon by the assembler. A: Identifiers B: Directives C: Reserved words D: Labels ANSWER: B 62. In Assembly, __________ Act as place markers. A: Identifiers B: Directives C: Reserved words D: Labels ANSWER: D 63. In Assembly, Directives are part of the Intel instruction set. A: TRUE B: FALSE ANSWER: B 64. In Assembly, Directives are not part of the Intel instruction set. A: TRUE B: FALSE ANSWER: A 65. In Assembly, Directives are Used to declare: A: Code B: Data C: Memory Models D: All of them. ANSWER: D
  • 15. 66. In Assembly, An instruction must contains: A: Label B: Mnemonic C: Operand D: Comment ANSWER: B 67. In Assembly, which type of label is not used: A: data label B: code label C: logical label D: none of them ANSWER: C 68. In Assembly, data labels followed by colon. A: TRUE B: FALSE ANSWER: B 69. In Assembly, data labels not followed by colon. A: TRUE B: FALSE ANSWER: A 70. In Assembly, code labels followed by colon. A: TRUE B: FALSE ANSWER: A 71. In Assembly, code labels not followed by colon. A: TRUE B: FALSE ANSWER: B
  • 16. 72. In Assembly, which of the following is valid Instruction Mnemonics. A: MOV B: ADD C: INC D: ALL of them ANSWER: D 73. In Assembly, Operands can be: A: constant B: register C: memory D: ALL of them ANSWER: D 74. In Assembly, __________ explain the program's purpose. A: Identifiers B: Directives C: Comments D: Labels ANSWER: C 75. In Assembly, Single-line comments begin with: A: ; B: : C: // D: none of them ANSWER: A 76. In Assembly, following instruction is example of __________ Instruction Format. STC A: NO OPERAND B: ONE OPERAND
  • 17. C: TWO OPERAND D: none of them ANSWER: A 77. In Assembly, following instruction is example of __________ Instruction Format. INC EAX A: NO OPERAND B: ONE OPERAND C: TWO OPERAND D: none of them ANSWER: B 78. In Assembly, following instruction is example of __________ Instruction Format. ADD EAX, EBX A: NO OPERAND B: ONE OPERAND C: TWO OPERAND D: none of them ANSWER: C 79. In Assembly, __________ Used to see how your program is compiled. A: code file B: source file C: listing file D: map file ANSWER: C 80. In Assembly, __________ provide Information about each program segment: A: code file B: source file C: listing file
  • 18. D: map file ANSWER: D 81. In Assembly, listing file contains: A: source code B: addresses C: object code D: All of them ANSWER: D 82. In Assembly, map file contains: A: starting address B: ending address C: segment type D: All of them ANSWER: D 83. In Assembly, BYTE datatype is used for: A: 8-bit unsigned integer B: 8-bit signed integer C: 16-bit unsigned integer D: 16-bit signed integer ANSWER: A 84. In Assembly, SBYTE datatype is used for: A: 8-bit unsigned integer B: 8-bit signed integer C: 16-bit unsigned integer D: 16-bit signed integer ANSWER: B 85. In Assembly, WORD datatype is used for: A: 8-bit unsigned integer
  • 19. B: 8-bit signed integer C: 16-bit unsigned integer D: 16-bit signed integer ANSWER: C 86. In Assembly, SWORD datatype is used for: A: 8-bit unsigned integer B: 8-bit signed integer C: 16-bit unsigned integer D: 16-bit signed integer ANSWER: D 87. In Assembly, DWORD datatype is used for: A: 32-bit unsigned integer B: 32-bit signed integer C: 64-bit integer D: 80-bit integer ANSWER: A 88. In Assembly, SDWORD datatype is used for: A: 32-bit unsigned integer B: 32-bit signed integer C: 64-bit integer D: 80-bit integer ANSWER: B 89. In Assembly, QWORD datatype is used for: A: 32-bit unsigned integer B: 32-bit signed integer C: 64-bit integer D: 80-bit integer ANSWER: C
  • 20. 90. In Assembly, TBYTE datatype is used for: A: 32-bit unsigned integer B: 32-bit signed integer C: 64-bit integer D: 80-bit integer ANSWER: D 91. In Assembly, REAL4 datatype is used for: A: short real B: long real C: extended real D: none of these ANSWER: A 92. In Assembly, REAL8 datatype is used for: A: short real B: long real C: extended real D: none of these ANSWER: B 93. In Assembly, REAL10 datatype is used for: A: short real B: long real C: extended real D: none of these ANSWER: C 94. In Assembly, following instruction define __________ byte. value BYTE 0 A: smallest unsigned
  • 21. B: largest unsigned C: smallest signed D: largest signed ANSWER: A 95. In Assembly, following instruction define __________ byte. value BYTE 255 A: smallest unsigned B: largest unsigned C: smallest signed D: largest signed ANSWER: B 96. In Assembly, following instruction define __________ byte. value SBYTE -128 A: smallest unsigned B: largest unsigned C: smallest signed D: largest signed ANSWER: C 97. In Assembly, following instruction define __________ byte. value SBYTE +127 A: smallest unsigned B: largest unsigned C: smallest signed D: largest signed ANSWER: D 98. In Assembly, following instruction define __________ byte.
  • 22. value BYTE ? A: smallest unsigned B: largest unsigned C: initialized D: uninitialized ANSWER: D 99. In Assembly,To continue a single string across multiple lines, end each line with a: A: ; B: : C: , D: none of them ANSWER: C 100. In Assembly, Strings often will be null-terminated. A: TRUE B: FALSE ANSWER: A