Ask Question, Ask an Expert


Ask Computer Engineering Expert

problem 1) Clone computers are computers whereby:

A. They are publicly distinguishable from other computers
B. The parts assembled are from different manufacturer
C. The parts assembled are from same manufacturer
D. None of the above

problem 2) ICT stands for:

1. Information and Community Technology
2. Informative and Communicative Technology
3. Information and Communication Technology
4. Information and Computer Technology

problem 3) Micro-computers are most commonly called as:

A. Personal Computers
B. Servers
C. Special Computers
D. Mini Computers

problem 4) The system unit houses motherboard, CPU, Primary Storage, secondary storage, and ________.

A. I/O Devices
B. Plug-in
C. Cards
D. Ports

problem 5) ______ is the necessary component of a computer as it is the part which executes instruction and controls the operation of all hardware.

A. Motherboard
C. System Unit
D. Chip

problem 6) There are two kinds of storage devices namely:

A. Magnetic and Electronic storage device
B. Electronic and Optical storage device
C. Magnetic and Optical storage device
D. Remote and Magnetic storage device

problem 7) A hard disk is considered as which category of storage device?

A. Dismountable
B. Fixed
C. Modular
D. None of the above

problem 8) The capacity of a floppy disk is:

A. 720MB
B. 1.44GB
C. 1.44MB
D. 80GB

problem 9) Which of the following is not the operating system:

A. Windows Vista
B. Linux
C. Macintosh OS
D. MS Office 2007

problem 10) Some common types of data files are: _____, Spreadsheets, Database Files, and Presentation files.

A. Documents
B. Word Documents
C. Output files
D. Input Files

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96049

Have any Question? 

Related Questions in Computer Engineering

1 some of the application programs can use the services of

1. Some of the application programs can use the services of two transport-layer protocols (UDP or TCP). When a packet arrives at the destination, how can the computer find which transport layer is involved? 2. A client r ...

Search and sort algorithmsobjectives - to test search and

Search and Sort Algorithms Objectives - To test search and sort algorithms As you add methods to the code given, add documentation similar to what is used on the other methods (comment boxes). Turn in IntegerList and Int ...

Design an algorithm that accepts as input a decimal number

Design an algorithm that accepts as input a decimal number and converts it to the binary-coded decimal (bcd) representation. In the bcd scheme each digit is represented by a 4-bit binary code.

Computer organizations and architecture i1consider a

Computer Organizations and Architecture I 1. Consider a hypothetical 32-bit microprocessor having 32-bit instructions composed oftwo fields: the first byte contains the opcode and the remainder the immediate operandor an ...

1 what are the five elements of a business impact analysis2

1. What are the five elements of a business impact analysis? 2. What are Pipkin's three categories of incident indicators? 3. What is containment, and why is it part of the planning process?

1 using the window method and a nonkaiser window design a

1. Using the window method and a nonKaiser window, design a digital highpass filter with Ω s = 0.45π, Ω p = 0.5π, and α s = 60 dB 2. Using the window method with a Blackman window, design a length Lh = 11 digital bandpas ...

Using the internet search for commercial idps systems what

Using the Internet, search for commercial IDPS systems. What classification systems and descriptions are used, and how can these be used to compare the features and components of each IDPS? Create a comparison spreadshee ...

In the sixth lab we analyze the behavior of the dns

In the sixth lab, we analyze the behavior of the DNS protocol. In addition to Wireshark, several network utilities are available for finding some information stored in the DNS servers. In this lab, we use the dig utiliti ...

Consider a game tree in which there are six marbles and

Consider a game tree in which there are six marbles, and players 1 and 2 take turns picking from one to three marbles. The player who takes the last marble loses the game. a. Draw the complete game tree for this game. b. ...

1 both acls and c-list entries use owners users rather than

1: Both ACLs and C-List entries use "owners" (users) rather than individual processes. Why? 2: Alice can read and write to the file x, can read the file y, and can execute the file z. Bob can read x, can read and write t ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro