Ask Question, Ask an Expert


Ask Computer Engineering Expert

problem 1) Clone computers are computers whereby:

A. They are publicly distinguishable from other computers
B. The parts assembled are from different manufacturer
C. The parts assembled are from same manufacturer
D. None of the above

problem 2) ICT stands for:

1. Information and Community Technology
2. Informative and Communicative Technology
3. Information and Communication Technology
4. Information and Computer Technology

problem 3) Micro-computers are most commonly called as:

A. Personal Computers
B. Servers
C. Special Computers
D. Mini Computers

problem 4) The system unit houses motherboard, CPU, Primary Storage, secondary storage, and ________.

A. I/O Devices
B. Plug-in
C. Cards
D. Ports

problem 5) ______ is the necessary component of a computer as it is the part which executes instruction and controls the operation of all hardware.

A. Motherboard
C. System Unit
D. Chip

problem 6) There are two kinds of storage devices namely:

A. Magnetic and Electronic storage device
B. Electronic and Optical storage device
C. Magnetic and Optical storage device
D. Remote and Magnetic storage device

problem 7) A hard disk is considered as which category of storage device?

A. Dismountable
B. Fixed
C. Modular
D. None of the above

problem 8) The capacity of a floppy disk is:

A. 720MB
B. 1.44GB
C. 1.44MB
D. 80GB

problem 9) Which of the following is not the operating system:

A. Windows Vista
B. Linux
C. Macintosh OS
D. MS Office 2007

problem 10) Some common types of data files are: _____, Spreadsheets, Database Files, and Presentation files.

A. Documents
B. Word Documents
C. Output files
D. Input Files

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96049

Have any Question? 

Related Questions in Computer Engineering

1 write a program that performs a simulation to estimate

1. Write a program that performs a simulation to estimate the probability of rolling five-of-a-kind in a single roll of five six-sided dice. 2. A random walk is a particular kind of probabilistic simulation that models c ...

Compare the selection sort and insertion sort for random

Compare the selection sort and insertion sort for random data. Use the number of moves and the number of comparisons to make the comparative study.

1 do you foresee a fusion between lan man and wan

1. Do you foresee a fusion between LAN, MAN, and WAN technologies in the future? Support your response. 2. Network technology is in transition. Discuss the direction of network technology

The baypoint group tbg needs your help with a presentation

The Baypoint Group (TBG) needs your help with a presentation for Academic Computing Services (ACS), a nationwide organization that assists colleges and universities with technology issues. ACS needs more information abou ...

1 what is social engineering why do security experts worry

1. What is social engineering? Why do security experts worry about social engineering? What is the best way to deal with social engineering? 2. Humanware is a cause of security threat. Discuss why this is so. 3. Discuss ...

In programming project 41 you implemented the sparse life

In Programming Project 4.1, you implemented the Sparse Life Grid ADT that creates a game grid of unlimited size for use with the game of Life. That implementation used a single Python list to store the individual live ce ...

1 what is security auditing why is it necessary for system

1. What is security auditing? Why is it necessary for system security? 2. What are the differences between security monitoring and auditing? Which is better? 3. What is risk? What is the purpose of calculating risk when ...

Assignmentnbspads and consumer promotionsthis assignment

Assignment:  Ads and Consumer Promotions This assignment will assess the competency 3. Explore Ethics, Corporate Social Responsibility and Customer Communication. It seems as if many times a year a business or organizati ...

Computer security system security assignment objectivesthe

COMPUTER SECURITY (SYSTEM SECURITY) ASSIGNMENT Objectives: The main objective of this assignment is for the students to understand the security mechanisms in Unix-like operating systems and their interplay with software ...

Given is a dhke algorithm the modulus p has 1024 bit and

Given is a DHKE algorithm. The modulus p has 1024 bit and α is a generator of a subgroup where ord(α) ≈ 2160. 1. What is the maximum value that the private keys should have? 2. How long does the computation of the sessio ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen