The translator program used in assembly language is called

A. Compiler

B. Interpreter

C. Assembler

D. Translator

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. ________ is the key to close a selected drop -down list; cancel a command and close a dialog box.
  2. The value of each bead in earth is
  3. Find out who is not the inventor of transistors among following names
  4. If in a computer, 16 bits are used to specify address in a RAM, the number of addresses will be
  5. A device that connects to a network without the use of cables is said to be-
  6. Which of the following is not a primary storage device?
  7. A device designed to read information encoded into a small plastic card is
  8. What is meant by a dedicated computer?
  9. The Second Generation Computer was based on .
  10. VGA is
  11. The two kinds of main memory are:
  12. Todays computer giant IBM was earlier known by different name which was changes in 1924. What was that…
  13. Perforated paper used as input of output media is known as
  14. Which of the following have the fastest access time?
  15. The terminal device that functions as a cash register, computer terminal, and OCR reader is the:
  16. Who is the chief of Microsoft
  17. ________is a combination of hardware and software that facilitates the sharing of information between…
  18. Programs are executed on the basis of a priority number in a
  19. Which is valid statement?
  20. Integrated Circuits (Ics) are related to which generation of computers?
  21. The silicon chips used for data processing are called
  22. Signals can be analog or digital and a computer that processes the both type of signals is known as
  23. Which is another name for functional language?
  24. Which of the following is not anti-viruses software?
  25. Most of the first generation computers were
  26. Intel corporation produces chips for which computers?
  27. A byte consists of
  28. The two kinds of main memory are:
  29. SMPS stands for
  30. Collecting personal information and effectively posing as another individual is known as the crime of: