Computer Fundamentals 1

1. Which of the following languages is more suited to a structured program?


Explanation:- PASCAL languages is more suited to a structured program. Pascal is an imperative and procedural programming language, which Niklaus Wirth designed in 1968–69 and published in 1970, as a small, efficient language intended to encourage good programming practices using structured programming and data structuring.

2. A computer assisted method for the recording and analyzing of existing or hypothetical systems is


Explanation:- A computer assisted method for the recording and analysing of existing or hypothetical systems is Data transmission.
Data is transferred in the form of bits between two or more digital devices. There are two methods used to transmit data between digital devices: serial transmission and parallel transmission. Serial data transmission sends data bits one after another over a single channel.
Data transmission is the process of sending digital or analog data over a communication medium to one or more computing, network, communication or electronic devices. It enables the transfer and communication of devices in a point-to-point, point-to-multipoint and multipoint-to-multipoint environment.

3. The brain of any computer system is


Explanation:- CPU (Central Processing Unit) is regarded as the “brain” of the computer. This is because most of the processing of a computer is performed by CPU. It consists of ALU and CU which performs arithmetic operations like addition, multiplication, subtraction, division and logical comparisons such as equal to, greater than, less than, etc.

4. What difference does the 5th generation computer have from other generation computers?


Explanation:- Technological advancement does the difference with 5th generation computer have from other generation computers.

Fifth Generation Computers (Present & Beyond) Scientists are working hard on the 5thgeneration computers with quite a few breakthroughs. It is based on the technique of Artificial Intelligence (AI). The advancement in modern technologies will revolutionize the computer in future.

Generation in computer terminology is a change in technology a computer is/was being used. Initially, the generation term was used to distinguish between varying hardware technologies. Nowadays, generation includes both hardware and software, which together make up an entire computer system.

The term ‘fifth generation’ was intended to convey the system as being a leap beyond existing machines. In the history of computing hardware, computers using vacuum tubes were called the first generation; transistors and diodes, the second; integrated circuits, the third; and those using microprocessors, the fourth.

Transcript of There are totally five computer generations known till date. The first computers used vacuum tubes for circuitry and magnetic drums for memory, and were often enormous, taking up entire rooms.

5. Which of the following computer language is used for artificial intelligence?


Explanation:- PROLOG is a computer language is used for artificial intelligence.

Prolog is a declarative language where programs are expressed in terms of relations, and execution occurs by running queries over these relations. Prolog is particularly useful for symbolic reasoning, database and language parsing applications. Prolog is widely used in AI today.

6. The tracks on a disk which can be accessed without repositioning the R/W heads is


Explanation:- Disk read/write (R/w) heads can be defined as the smallest parts of a disk drive which move along with disk platter and transform them into electrical current (read) or electrical current to magnetic field (write). These heads had gone through multiple changes.

The cylinder can be defined as a division of disk drive data and it is used in ‘Fixed block architecture’ of the disk. Here the ‘number of cylinders’ equals the ‘number of tracks’.

7. Which of the following is the 1's complement of 10?


Explanation:- 01 is the 1's complement of 10. The ones ‘complement of a binary number is defined as the value obtained by inverting all the bits in the binary representation of the number (swapping 0s for 1s and vice versa). In such a system, a number is negated (converted from positive to negative or vice versa) by computing its ones’ complement.

8. A section of code to which control is transferred when a processor is interrupted is known as


Explanation:- A section of code to which control is transferred when a processor is interrupted is known as M.

A field that represents the organizational unit responsible for collecting and remitting withholding tax, as identified by a tax account deduction number(TAN) in India . In Financial Accounting (FI), you identify an income tax reporting location with a section code.

In system programming, an interrupt is a signal to the processor emitted by hardware or software indicating an event that needs immediate attention. Hardware interrupts are used by devices to communicate that they require attention from the operating system.

9. Which part interprets program instructions and initiate control operations.


Explanation:- The control unit (CU) is a component of a computer's central processing unit (CPU) that directs the operation of the processor.

It tells the computer‘s memory, arithmetic/logic unit and input and output devices how to respond to a program’s instructions.

It directs the operation of the other units by providing timing and control signals. Most computer resources are managed by the CU.

It directs the flow of data between the CPU and the other devices.

John von Neumann included the control unit as part of the von Neumann architecture.

In modern computer designs, the control unit is typically an internal part of the CPU with its overall role and operation unchanged since its introduction.

10. The binary system uses powers of


Explanation:- The Binary System of numeration is the simplest of all positional number systems. The base - or the radix - of the binary system is 2, which means that only two digits - 0 and 1 - may appear in a binary representation of any number.

a binary number is a number expressed in the base-2 numeral system or binary numeral system, which uses only two symbols: typically 0 (zero) and 1 (one). The base-2 numeral system is a positional notation with a radix of 2. Each digit is referred to as a bit.

For most purposes, we use the decimal number system, which has ten unique digits, 0 through 9. All other numbers are then formed by combining these ten digits. Computers are based on the binary numbering system, which consists of just two unique numbers, 0 and 1.

11. A computer program that converts assembly language to machine language is


Explanation:- A computer program that converts assembly language to machine language is Assembler.

Assembler : An assembler is a type of computer program that interprets software programs written in assembly language into machine language, code and instructions that can be executed by a computer.

An assembler enables software and application developers to access, operate and manage a computer's hardware architecture and components.

12. The time required for the fetching and execution of one simple machine instruction is


Explanation:- The time required for the fetching and execution of one simple machine instruction is CPU cycle time.

The fundamental sequence of steps that a CPU performs is called CPU Cycle, it is also known as the "fetch-execute cycle,".

In simpler CPUs, the instruction cycle is executed sequentially, each instruction being processed before the next one is started.

In most modern CPUs, the instruction cycles are instead executed concurrently, and often in parallel, through an instruction pipeline.

A clock cycle, or simply a "cycle," is a single electronic pulse of a CPU.

During each cycle, a CPU can perform a basic operation such as fetching an instruction, accessing memory, or writing data.

13. The time for which a piece of equipment operates is called


Explanation:- The time for which a piece of equipment operates is called Seek time.

Refers to the time a program or device takes to locate a particular piece of data. For disk drives, the terms seek time and access time are often used interchangeably. Technically speaking, however, the access time is often longer the seek time because it includes a brief latency period.

Seek time is the time taken for a hard disk controller to locate a specific piece of stored data. Other delays include transfer time (data rate) and rotational delay (latency).

14. Binary numbers need more places for counting because


Explanation:- Binary numbers need more places for counting because Binary base is small.

Binary number. In mathematics and digital electronics, a binary number is a number expressed in the base-2 numeral system or binary numeral system, which uses only two symbols: typically 0 (zero) and 1 (one). The base-2 numeral system is a positional notation with a radix of 2.

15. Which access method is used for obtaining a record from a cassette tape?


Explanation:- Sequential is access method is used to access cassette tape.

In computer science, sequential access means that a group of elements (such as data in a memory array or a disk file or on magnetic tape data storage) is accessed in a predetermined, ordered sequence. Sequential access is sometimes the only way of accessing the data, for example if it is on a tape. It may also be the access method of choice, for example if all that is wanted is to process a sequence of data elements in order.

Sequential Access. The standard method for accessing files and devices is the sequential method. It can be like a cassette tape that rewinds itself after every use.

16. Any type of storage that is used for holding information between steps in its processing is


Explanation:- Any type of storage that is used for holding information between steps in its processing is Intermediate storage.

intermediate storage Any part or type of storage that is used for holding information between steps in its processing. "intermediate storage." Secondary storage (also known as external memory or auxiliary storage), differs from primary storage in that it is not directly accessible by the CPU. The computer usually uses its input/output channels to access secondary storage and transfers the desired data using intermediate area in primary storage.

17. A name applied by Intel corp. to high speed MOS technology is called


Explanation:- A name applied by Intel crop to high speed MOS technology is called HDLC.

High-Level Data Link Control (HDLC) is a bit-oriented code-transparent synchronous data link layer protocol developed by the International Organization for Standardization (ISO). The original ISO standards for HDLC are as follows: ISO 3309-1979 – Frame Structure. HDLC (High-level Data Link Control) is a group of protocols or rules for transmitting data between network points (sometimes called nodes).

In HDLC, data is organized into a unit (called a frame) and sent across a network to a destination that verifies its successful arrival.

18. A program component that allows structuring of a program in an unusual way is known as


Explanation:- A program component that allows structuring of a program in an unusual way is known as Correlation.

Correlation is a statistical measure that indicates the extent to which two or more variables fluctuate together. A positive correlation indicates the extent to which those variables increase or decrease in parallel; a negative correlation indicates the extent to which one variable increases as the other decreases.

Structured programming is a programming paradigm aimed at improving the clarity, quality, and development time of a computer program by making extensive use of the structured control flow constructs of selection (if/then/else) and repetition (while and for), block structures, and subroutines.

19. The radian of a number system


Explanation:- The radian of a number system equals the number of its distinct counting digits. For example suppose we have a no 155, the number have two distinct digit i.e. 1 and 5 so the radian of the number is two.

20. The section of the CPU that selects, interprets and sees to the execution of program instructions


Explanation:- The section of the CPU that selects, interprets and sees to the executive of program instructions Memory.

The instruction cycle is the basic operational process of a computer system. It is the process by which a computer retrieves a program instruction from its memory, determines what actions the instruction describes, and then carries out those actions. This cycle is repeated continuously by a computer's central processing unit (CPU), from boot-up until the computer has shut down.

Interpreter Vs Compiler : Difference Between Interpreter and Compiler. We generally write a computer program using a high-level language.Hence, a compiler or an interpreter is a program that converts program written in high-level language into machine code understood by the computer. What is the difference between interpreter and compiler? The Compiler scans whole program first and then translates it into machine code which will be executed by the computer processor. The Interpreters translates one statement into machine language, executes it, and proceeds to next statement.

21. Which type of system puts the user into direct conversation with the computer through a keyboard?


Explanation:- Real time processing is type of system puts the user into direct conversation with the computer through a keyboard.

The central processing unit consists of electronic circuits that interpret and execute program instructions, as well as communicate with the input, output, and storage devices. It is the central processing unit that actually transforms data into information. Data is the raw material to be processed by a computer.

Real-time data processing is the execution of data in a short time period, providing near-instantaneous output. Good examples of real-time data processing systems are bank ATMs, traffic control systems and modern computer systems such as the PC and mobile devices.

22. The term referring to evacuating the content of some part of the machine is known as


Explanation:- The term referring to evacuating the content of some part of the machine is known as Dump.

Dump refers to copying data from main memory to a display screen or a printer. Dumps are useful for diagnosing bugs. After a program fails, you can study the dump and analyze the contents of memory at the time of the failure. (v) To output an image of computer memory.

Dumping syndrome occurs when food, especially sugar, moves too fast from the stomach to the duodenum—the first part of the small intestine—in the upper gastrointestinal (GI) tract. This condition is also called rapid gastric emptying. It is mostly associated with conditions following gastric or esophageal surgery, though it can also arise secondary to diabetes or to the use of certain medications; it is caused by an absent or insufficiently functioning pyloric sphincter, the valve between the stomach and the duodenum.

23. A single packet on a data link is known as


Explanation:- A single packet on a data link is known as Frame.

A network packet is a formatted unit of data carried by a packet-switched network. Computer communications links that do not support packets, such as traditional point-to-point telecommunications links, simply transmit data as a bit stream.which is also known as the payload. Control information provides data for delivering the payload, for example: source and destination network addresses, error detection codes, and sequencing information. Typically, control information is found in packet headers and trailers.

In packet switching, the bandwidth of the communication medium is shared between multiple communication sessions, in contrast to circuit switching, in which circuits are preallocated for the duration of one session and data is typically transmitted as a continuous bit stream.

24. The process of communicating with a file from a terminal is


Explanation:- The process of communicating with a file from a terminal is Interrogation.

Computer Assisted Interrogation (CAINT) is a system of computer programs for use in man-machine communications. Its principal function is to enable a computer to elicit information from a man by interrogating him-asking him a program of questions where the program follows a logical course depending both on information available before the interrogation started and on that gained during the interrogation. The information acquired is intended to be put to immediate practical use, in updating a data base, generating reports, or driving other interrogations.

As pointed out earlier in Lesson 1, computers are dumb in that they only recognize zeros and ones. How can we communicate with such devices? The answer is that we use software to communicate with the computer. Software consists of programs which are sets of computer instructions that direct the computer to solve problems, perform tasks, etc. These programs are fed into the computer's memory through input devices, cause the CPU to perform certain operations and direct the results to output devices. Software can be divided into these general classes

25. A common boundary between two systems is called


Explanation:- A common boundary between two systems is called Interface.

An interface is a reference type in Java. It is similar to class. It is a collection of abstract methods. A class implements an interface, thereby inheriting the abstract methods of the interface. Along with abstract methods, an interface may also contain constants, default methods, static methods, and nested types.

A boundary across which two independent systems meet and act on or communicate with each other. In computer technology, there are several types of interfaces. user interface - the keyboard, mouse, menus of a computer system. The user interface allows the user to communicate with the operating system. Also see GUI. A particular advantage of using interface in Java is that it allows multiple inheritance. The full power of Interface is utilized when dependency injection techniques is used to inject required implementation on run time.

26. The examination and changing of single bits or small groups of his within a word is called


Explanation:- Bit manipulation : Bit manipulation is the act of algorithmically manipulating bits or other pieces of data shorter than a word. Computer programming tasks that require bit manipulation include low-level device control, error detection and correction algorithms, data compression, encryption algorithms, and optimization.

27. Which computer has been designed to be as compact as possible?


Explanation:- A microcomputer contains a microprocessor (a central processing unit on a microchip ), memory in the form of read-only memory and random access memory , I/O ports and a bus or system of interconnecting wires, housed in a unit that is usually called a motherboard.

A microcomputer is a computer with a central processing unit (CPU) as a microprocessor. Designed for individual use, a microcomputer is smaller than a mainframe or a minicomputer.

The term microcomputer is not as commonly used as it was during the 1970s-1980s. We now refer to microcomputers as, simply, computers, or personal computers (PC). A microcomputer's CPU includes random access memory (RAM), read-only memory (ROM) memory, input/output (I/O) ports, interconnecting wires and a motherboard.

In 1970, Hewlett-Packard (HP) manufactured and released a microcomputer as a calculator with varying levels of programmability, although the Datapoint 2200 by Computer Terminal Corporation (CTC) is credited as the first microcomputer. Intel’s x86 processor family can also be traced back to CTC’s release.

28. Which method is used to connect a remote computer?


Explanation:- Dialup method is used to connect a remote computer.

Dial-up Internet access is a form of Internet access that uses the facilities of the public switched telephone network (PSTN) to establish a connection to an Internet service provider (ISP) by dialing a telephone number on a conventional telephone line.

Remote access is the ability to communicate with a computer or network that is located some distance away over a dial-up connection. ... Virtual private network (VPN) protocols are usually used to secure these private connections. Dial-up remote access is still used today as a back-up to broadband connections.

According to a Pew survey from last August, 3% of Americans still use dial-up internet at home. That means that AOL actually only has a small chunk of the dial-up internet -- three percent of Americans translates to around 9 million people. It's easy to caricature dial-up users (they're old! they're forgetful!)

29. In laser printer technology, what happens during the conditioning stage?


Explanation:- 5 bit code is used by Murray code for TELEPRINTER machines.

They used the 5 bit ITA2 code and generally worked at 60 to 100 words per minute. Later teleprinters, specifically the Teletype Model 33, used ASCII code, an innovation that came into widespread use in the 1960s as computers became more widely available.

It was the predecessor to the International Telegraph Alphabet No. 2 (ITA2), the teleprinter code in use until the advent of ASCII. Each character in the alphabet is represented by a series of 5 bits, sent over a communication channel such as a telegraph wire or a radio signal.

30. The symbols used in an assembly language are


Explanation:- Each assembly language is specific to a particular computer architecture and operating system. In contrast, most high-level programming languages are generally portable across multiple architectures but require interpreting or compiling. Assembly language may also be called symbolic machine code.

Instructions (statements) in assembly language are generally very simple, unlike those in high-level languages. Generally, a mnemonic is a symbolic name for a single executable machine language instruction (an opcode), and there is at least one opcode mnemonic defined for each machine language instruction.

An assembly (or assembler) language, often abbreviated asm, is any low-level programming language in which there is a very strong correspondence between the program's statements and the architecture's machine code instructions.

Assembly language usually has one statement per machine instruction, but assembler directives, macros and symbolic labels of program and memory locations are often also supported.

31. The 2’s complement of a binary no. is obtained by adding_____to its 1’s complement.


Explanation:- The 2's complement of a binary no. is obtained by adding 0 to its 1's complement.

The ones' complement of a binary number is defined as the value obtained by inverting all the bits in the binary representation of the number (swapping 0s for 1s and vice versa). The ones' complement of the number then behaves like the negative of the original number in some arithmetic operations.

The two's complement of zero is zero: inverting gives all ones, and adding one changes the ones back to zeros (since the overflow is ignored). Furthermore, the two's complement of the most negative number representable (e.g. a one as the most-significant bit and all other bits zero) is itself.

32. A systems programming language for microcomputers in the Intel family is


Explanation:- The PL/M programming language (an acronym of Programming Language for Microcomputers) is a high-level language conceived and developed by Gary Kildall in 1973 for Hank Smith at Intel for its microprocessors.

33. A datum that indicates some important state in the content of input or output is


Explanation:- A datum that indicates some important state in the content of input or output is sentinel . The main concern of the Sentinel System is evaluating whether patients are having an unexpected adverse event from a medical product.

34. Which is a non-standard version of a computing language?


Explanation:- Army is non standard version of a computing language because it is first language to be used for encoding & decoding purposes.

35. Which of the following is still useful for adding numbers?


Explanation:- Abacus : An abacus is a manual aid to calculating that consists of beads or disks that can be moved up and down on a series of sticks or strings within a usually wooden frame. The abacus itself doesn't calculate; it's simply a device for helping a human being to calculate by remembering what has been counted.

36. The average time necessary for the correct sector of a disk to arrive at the read write head is _____


Explanation:- Rotational delay : A rotational delay is the amount of time between information requests and how long it takes the hard drive to move to the sector where the requested data is located. In other words, it is a time measurement, in milliseconds (ms), of how long before a rotating drive can transfer data.

37. A number that is used to control the form of another number is known as


Explanation:- A number that is used to control the form of another number is known as Mask.

In computer science, a mask is data that is used for bitwise operations, particularly in a bit field. Using a mask, multiple bits in a byte, nibble, word etc. can be set either on, off or inverted from on to off (or vice versa) in a single bitwise operation.

38. A general purpose single-user microcomputer designed to be operated by one person at a time is


Explanation:- A general purpose single-user microcomputer designed to be operated by one person at a time is PC.

A personal computer (PC) is a multi-purpose computer whose size, capabilities, and price make it feasible for individual use.[1] PCs are intended to be operated directly by an end user, rather than by a computer expert or technician. Computer time-sharing models that were typically used with larger, more expensive minicomputer and mainframe systems, to enable them be used by many people at the same time, are not used with PCs.

PC is short for personal computer or IBM PC. The first personal computer produced by IBM was called the PC, and increasingly the term PC came to mean IBM or IBM-compatible personal computers, to the exclusion of other types of personal computers, such as Macintoshes.

39. ASCII stands for


Explanation:- ASCII stands for American Standard Code for Interchange Information.

ASCII (American Standard Code for Information Interchange) is the most common format for text files in computers and on the Internet. In an ASCII file, each alphabetic, numeric, or special character is represented with a 7-bit binary number (a string of seven 0s or 1s). 128 possible characters are defined.

ASCII uses 7 bits to represent each character. For example, a capital "T" is represented by the number 84 and a lowercase "t" is represented by 116. Other keyboard keys are also mapped to standard ASCII values.

ASCII value. The numerical value, or order, of an ASCII character. There are 128 standard ASCII characters, numbered from 0 to 127. Extended ASCII adds another 128 values and goes to 255. The numbers are typically represented in decimal (see ASCII chart) or in hexadecimal (see hex chart).

40. Which device of computer operation dispenses with the use of the keyboard?


Explanation:- A computer mouse is a hand-held pointing device that detects two-dimensional motion relative to a surface.

In addition to moving a cursor, computer mice have one or more buttons to allow operations such as selection of a menu item on a display. In computing, an input device is a piece of computer hardware equipment used to provide data and control signals to an information processing system such as a computer or information appliance. Examples of input devices include keyboards, mouse, scanners, digital cameras and joysticks.

41. The microcomputer, Intel MCS-80 is based on the widely used Intel


Explanation:- Intel MCS-80 is based on the widely used Intel 8080 microprocessor The MCS-80 (Micro Computer Set-80) was a family of 8-bit microprocessor chipsets developed by Intel. Introduced on April, 1974, the MCS-80 featured the 8080 CPU, the forefather of all modern x86-based microprocessors.

42. Which is a machine-oriented high-level language for the GEC 4080 series machines.


Explanation:- Programming languages available included Babbage (a high-level assembly language) The GEC 4000 was a series of 16/32-bit minicomputers produced by GEC Computers Ltd.of the UK during the 1970s, 1980s and early 1990s.

43. A program that is employed in the development, repair or enhancement of other programs is known as


Explanation:- A programming tool or software development tool is a computer program that software developers use to create, repair, debug, maintain, or otherwise support other programs and applications

44. Any storage device added to a computer beyond the immediately usable main storage is known as


Explanation:- Any storage device added to a computer beyond the immediately usable main storage is known as Backing store.

Backing storage refers to any non-volatile data storage that will retain a computer's data even after the computer is powered off. Common types of backing storage devices are hard drives, SSD, external hard disk drives, optical media such as CD or DVD, and flash media such as thumbdrives and memory sticks. Older computer systems also typically used floppy disks and magnetic tapes as backing storage. On modern systems, especially computers like netbooks, cloud storage services may also be used as backing storage.

Without some type of backing storage the computer would not have access to its data after the computer is turned off. For example, volatile memory like RAM loses all information if the computer is turned off or rebooted. To prevent information you have been working on from being lost it is saved to a backing storage device like a hard drive.

45. Which output device is used for translating information from a computer into pictorial form on paper.


Explanation:- The plotter is a computer printer for printing vector graphics. In the past, plotters were used in applications such as computer-aided design, though they have generally been replaced with wide-format conventional printers. A plotter gives a hard copy of the output. It draws pictures on a paper using a pen.

A plotter is a computer hardware device much like a printer that is used for printing vector graphics. Instead of toner, plotters use a pen, pencil, marker, or another writing tool to draw multiple, continuous lines onto paper rather than a series of dots like a traditional printer.

The plotter is a computer printer for printing vector graphics. In the past, plotters were used in applications such as computer-aided design, though they have generally been replaced with wide-format conventional printers. A plotter gives a hard copy of the output. It draws pictures on a paper using a pen.

46. The list of coded instructions is called


Explanation:- Computer program : A computer program is a collection of instructions that performs a specific task when executed by a computer. A computer requires programs to function. A computer program is usually written by a computer programmer in a programming language.

47. A technique used by codes to convert an analog signal into a digital bit stream is known as


Explanation:- A technique used by codes to convert an analog signal into a digital bit stream is known as Pulse code modulation.

Pulse-code modulation (PCM) is a method used to digitally represent sampled analog signals. It is the standard form of digital audio in computers, compact discs, digital telephony and other digital audio applications. In a PCM stream, the amplitude of the analog signal is sampled regularly at uniform intervals, and each sample is quantized to the nearest value within a range of digital steps.

Modulation is the process of varying one or more parameters of a carrier signal in accordance with the instantaneous values of the message signal.The message signal is the signal which is being transmitted for communication and the carrier signal is a high frequency signal which has no data, but is used for long distance transmission.

There are many modulation techniques, which are classified according to the type of modulation employed. Of them all, the digital modulation technique used is Pulse Code Modulation (PCM).

48. An optical input device that interprets pencil marks on paper media is


Explanation:- O.M.R stands for Optical Mark Recognition. This popular recognition technology is used for collecting data from “fill-in-the-bubble” forms such as educational tests, surveys, assessments, evaluations, and many other multiple choice forms. OMR has been widely used in education since the 1960s and is still popular today.

49. Most important advantage of an IC is its


Explanation:- 1.More reliable because of elimination of soldered joints and need for fewer interconnections.

2. Thousands of times smaller than discrete circuits. It is because of fabrication of various circuit elements in a single chip of semiconductor material.

3. Very small weight owing to the miniaturized circuit.

4. Very low cost because of simultaneous production of hundreds of similar circuits on a small semiconductor wafer. Owing to mass production of an IC costs as much as an individual transistor.

5. Lower power consumption because of their smaller size.

50. Data division is the third division of a _____ program.


Explanation:- Data division in the third division of a COBOL program. The statements, entries, paragraphs, and sections of a COBOL source program are grouped into four divisions.
A COBOL program can either be a program definition or a program declaration. A program definition gives details of how a program is to operate and includes a Procedure Division with a set of procedures to follow. A program declaration gives details of how a program should be called; it is referred to in this document as a call prototype and will be used to validate corresponding calls made in any program definitions occurring later in the same program source file.

The Identi fication Division must be included in every standard conforming COBOL source program. It identifies the program. The basename, derived from the filename of the file containing the program source, also identifies the first program defined in that file.

Score:-

Getting Info...

Post a Comment

Oops!
It seems there is something wrong with your internet connection. Please connect to the internet and start browsing again.
AdBlock Detected!
We have detected that you are using adblocking plugin in your browser.
The revenue we earn by the advertisements is used to manage this website, we request you to whitelist our website in your adblocking plugin.
Site is Blocked
Sorry! This site is not available in your country.