Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) Clone computers are computers whereby:

A. They are publicly distinguishable from other computers
B. The parts assembled are from different manufacturer
C. The parts assembled are from same manufacturer
D. None of the above

problem 2) ICT stands for:

1. Information and Community Technology
2. Informative and Communicative Technology
3. Information and Communication Technology
4. Information and Computer Technology

problem 3) Micro-computers are most commonly called as:

A. Personal Computers
B. Servers
C. Special Computers
D. Mini Computers

problem 4) The system unit houses motherboard, CPU, Primary Storage, secondary storage, and ________.

A. I/O Devices
B. Plug-in
C. Cards
D. Ports

problem 5) ______ is the necessary component of a computer as it is the part which executes instruction and controls the operation of all hardware.

A. Motherboard
B. CPU
C. System Unit
D. Chip

problem 6) There are two kinds of storage devices namely:

A. Magnetic and Electronic storage device
B. Electronic and Optical storage device
C. Magnetic and Optical storage device
D. Remote and Magnetic storage device

problem 7) A hard disk is considered as which category of storage device?

A. Dismountable
B. Fixed
C. Modular
D. None of the above

problem 8) The capacity of a floppy disk is:

A. 720MB
B. 1.44GB
C. 1.44MB
D. 80GB

problem 9) Which of the following is not the operating system:

A. Windows Vista
B. Linux
C. Macintosh OS
D. MS Office 2007

problem 10) Some common types of data files are: _____, Spreadsheets, Database Files, and Presentation files.

A. Documents
B. Word Documents
C. Output files
D. Input Files

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96049

Have any Question? 


Related Questions in Computer Engineering

1what are the fundamental object oriented concepts2what is

1.What are the fundamental object oriented concepts? 2.What is inheritance? 3.What is abstraction? 4.What is polymorphism and what are its benefits? 5.What is encapsulation?

Consider a hash table of size 501 that contains 85 keysa

Consider a hash table of size 501 that contains 85 keys. (a) What is the load factor? (b) What is the average number of comparisons required to determine if the collection contains the key 73, if: i. linear probing is us ...

1 study and suggest the best ways to defend the national

1. Study and suggest the best ways to defend the national critical infrastructure from potential attackers. 2. We indicated in the text that the best ways to manage security threats is to do an extensive risk assessment ...

1 show why the table size must be a prime number in order

1. Show why the table size must be a prime number in order for double hashing to visit every entry during the probe. 2. Design a hash function that can be used to map the two-character state abbreviations (including the ...

The stream cipher described in definition 211 can easily be

The stream cipher described in Definition 2.1.1 can easily be generalized to work in alphabets other than the binary one. For manual encryption, an especially useful one is a stream cipher that operates on letters. 1. De ...

Write a program that reads a sequence of integers into an

Write a program that reads a sequence of integers into an array and that computes the alternating sum of all elements in the array. For example, if the program is executed with the input data 1 4 9 16 9 7 4 9 11 then it ...

1 create an array of 1000 integers sorted in numerical

1. Create an array of 1000 integers sorted in numerical order. Write a program that runs each sorting algorithm with this array, timing each algorithm, and compare the times. Compare these times to the times for sorting ...

When people describe client-server architecture they are

When people describe client-server architecture, they are usually referring to a system in which a large server is serving a client on a PC. With X Window, the reverse is frequently the case. Explain.

1 evaluate the worst case time-complexity of the sparse

1. Evaluate the worst case time-complexity of the Sparse Matrix ADT implemented in Programming Project 9.7. 2. Provide the code to implement the four basic operations - traversal, search, insertion, deletion - for an uns ...

The leadership of gti has chosen oracleregnbspfor their

The leadership of GTI has chosen Oracle ®  for their Enterprise Application System, but some members of the leadership team are skeptical of this solution. They have asked you to provide them with a report describing the ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro