Warning: Undefined variable $ext in /www/wwwroot/gkfeed.com/public_html/wp-content/plugins/show-hidecollapse-expand/bg_show_hide.php on line 281
Warning: Undefined variable $ext in /www/wwwroot/gkfeed.com/public_html/wp-content/plugins/show-hidecollapse-expand/bg_show_hide.php on line 281
Warning: Undefined variable $ext in /www/wwwroot/gkfeed.com/public_html/wp-content/plugins/show-hidecollapse-expand/bg_show_hide.php on line 281
Warning: Undefined variable $ext in /www/wwwroot/gkfeed.com/public_html/wp-content/plugins/show-hidecollapse-expand/bg_show_hide.php on line 281
Warning: Undefined variable $ext in /www/wwwroot/gkfeed.com/public_html/wp-content/plugins/show-hidecollapse-expand/bg_show_hide.php on line 281
26. The higher versions of the operating systems are so written that programs designed for earlier versions can still be run. What is it called?
A. Upgradability
B. Upward mobility
C. Universality
D. Upward compatibility
E. None of the above
27. If special forms are needed for printing the output, the programmer specifies these forms through?
A. JCL
B. JPL
C. Utility programs
D. Load modules
E. None of the above
28. Which policy replace a page if it is not in the favored subset of a process’s pages?
A. FIFO
B. LRU
C. LFU
D. Working set
E. None of the above
29. Which of the following can be accesses by transfer vector approach of linking?
A. External data segments
B. External subroutines
C. Data located in other procedures
D. All of the above
E. None of the above
30. Which of the following terms refers to the degree to which data in a database system are accurate and correct?
A. data security
B. data validity
C. data independence
D. data integrity
E. None of the above
Warning: Undefined variable $in_same_cat in /www/wwwroot/gkfeed.com/public_html/wp-content/plugins/EXP.GKFEED.COM/function.php on line 27
Warning: Undefined variable $excluded_categories in /www/wwwroot/gkfeed.com/public_html/wp-content/plugins/EXP.GKFEED.COM/function.php on line 27