Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) Clone computers are computers whereby:

A. They are publicly distinguishable from other computers
B. The parts assembled are from different manufacturer
C. The parts assembled are from same manufacturer
D. None of the above

problem 2) ICT stands for:

1. Information and Community Technology
2. Informative and Communicative Technology
3. Information and Communication Technology
4. Information and Computer Technology

problem 3) Micro-computers are most commonly called as:

A. Personal Computers
B. Servers
C. Special Computers
D. Mini Computers

problem 4) The system unit houses motherboard, CPU, Primary Storage, secondary storage, and ________.

A. I/O Devices
B. Plug-in
C. Cards
D. Ports

problem 5) ______ is the necessary component of a computer as it is the part which executes instruction and controls the operation of all hardware.

A. Motherboard
B. CPU
C. System Unit
D. Chip

problem 6) There are two kinds of storage devices namely:

A. Magnetic and Electronic storage device
B. Electronic and Optical storage device
C. Magnetic and Optical storage device
D. Remote and Magnetic storage device

problem 7) A hard disk is considered as which category of storage device?

A. Dismountable
B. Fixed
C. Modular
D. None of the above

problem 8) The capacity of a floppy disk is:

A. 720MB
B. 1.44GB
C. 1.44MB
D. 80GB

problem 9) Which of the following is not the operating system:

A. Windows Vista
B. Linux
C. Macintosh OS
D. MS Office 2007

problem 10) Some common types of data files are: _____, Spreadsheets, Database Files, and Presentation files.

A. Documents
B. Word Documents
C. Output files
D. Input Files

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96049

Have any Question? 


Related Questions in Computer Engineering

Assign state numbers to the states of the finite-state

Assign state numbers to the states of the finite-state machine you constructed for Exercise B.37 and write a set of logic equations for each of the outputs, including the next-state bits. Exercise B.37 A friend would lik ...

1 the binary search tree operations can also be implemented

1. The binary search tree operations can also be implemented iteratively. Design and implement an iterative solution for each operation: (a) search (b) find minimum (c) insert (d) delete 2. Design and implement the funct ...

Assignment preparationfor this assignment review the

Assignment Preparation For this assignment, review the organization and the industry before applying the strategic models below to Ford Motor Company. You will need at least five current, scholarly or professional resour ...

1 the difference between computer forensics and traditional

1. The difference between computer forensics and traditional forensics 2. Discuss the issues you deem important in computer forensics. 3. What is the main purpose of preserving digital evidence? and how is this accomplis ...

1 a stream of data is being carried by sts-1 frames if the

1. A stream of data is being carried by STS-1 frames. If the data rate of the stream is 49.540 Mbps, how many STS-1 frames per second must let their H3 bytes carry data? 2. A stream of data is being carried by STS-1 fram ...

A discrete elevator can sense the following information

A discrete elevator can sense the following information about its world: 1. What floor the elevator is stopped at. 2. What floors passengers in the elevator want to go to. 3. What floors passengers outside of the elevato ...

Design an algorithm that rearranges the elements of an

Design an algorithm that rearranges the elements of an array so that all those originally stored at odd suffixes are placed before those at even suffixes. For example, the set 1 2 3 4 5 6 7 8 Would be transformed to 1 3 ...

Taskin this assessment you are required to -- select a

Task In this assessment you are required to - - Select a topic from the list given below and conduct research (based on literature, at least three recent research papers) and prepare a summary report with brief supportiv ...

We consider known-plaintext attacks on block ciphers by

We consider known-plaintext attacks on block ciphers by means of an exhaustive key search where the key is k bits long. The block length counts n bits with n > k. 1. How many plaintexts and ciphertexts are needed to succ ...

Group members will build upon the work from the previous

Group members will build upon the work from the previous weeks, incorporating instructor feedback. Continue the paper by adding your marketing plan. Thissection should be high-level aspects of a basic plan for marketing ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro