Home

A section of code to which control is transferred when a processor is interrupted is known as

A. M

B. SVC

C. IP

D. MDR

You can do it
  1. Codes consisting of lines of varying widths or lengths that are computer-readable are known as-
  2. Access time is
  3. One of a class of storage device devices that can access storage locations in any order is
  4. A Pixel is
  5. The value of each bead in earth is
  6. Computer is free from tiresome and boardroom. We call it
  7. A device for converting handwritten impressions into coded characters & positional coordinates for input…
  8. What type of device is computer keyboard?
  9. ________are specific to users' needs
  10. A number system that has eight different symbols to represent any quantity is known as
  11. The translator program used in assembly language is called
  12. The personnel who deals with the computer & its management put together are called
  13. By programmable machine we mean
  14. Which of the following are the best units of data on an external storage device?
  15. ENIAC uses
  16. Who invented punched cards?
  17. What type of control pins are needed in a microprocessor to regulate traffic on the bus, in order to…
  18. An error in computer data is called
  19. Who is the chief of Microsoft
  20. The first machine to successfully perform a long series of arithmetic and logical operations was:
  21. UNIVAC was a first generation computer. What is its full form?
  22. Integrated Circuits (ICs) are related to which generation of computers?
  23. Which unit holds data permanently?
  24. The proper definition of a modern digital computer is
  25. The word processing task associated with changing the appearance of a document is
  26. Algorithm and Flow chart help us to
  27. The qualitative or quantitative attribute of a variable or set of variables is termed as
  28. A storage area used to store data to a compensate for the difference in speed at which the different…
  29. ________is a combination of hardware and software that facilitates the sharing of information between…
  30. The ________ data mining technique derives rules from real-world case examples.