Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) Disk’s content which is recorded at the time of manufacture and which can’t be changed or erased by the user is:

(A) read-only
(B) memory-only
(C) run-only
(D) prepare-only
(E) None of these

problem 2) In the information system, alphanumeric data normally takes the form of:

(A) Sentences and paragraphs
(B) Numbers and alphabetical characters
(C) Graphic shapes and figures
(D) Human voice and other sounds
(E) None of these

problem 3) Website’s main page is termed as its:

(A) home page
(B) browser page
(C) search place
(D) bookmark
(E) None of these

problem 4) When installing ………, the user should copy and usually decompress program files from CDROM or other medium to the hard disk.

(A) programming software
(B) system hardware
(C) applications hardware
(D) applications software
(E) None of these

problem 5) Collection of interrelated files in the computer is a:

(A) file manager
(B) field
(C) record
(D) database
(E) None of these

problem 6) _____________ computer is the large and expensive computer capable of concurrently processing data for hundreds or thousands of users.

(A) server
(B) mainframe
(C) desktop
(D) tablet
(E) None of these

problem 7) Different applications and documents are represented on Windows desktop by:

(A) Symbols
(B) Labels
(C) Graphs
(D) Icons
(E) None of these

problem 8) What is generally used for displaying information at public places?

(A) Monitors
(B) Overhead Projections
(C) Monitors and Overhead Projections
(D) Touch Screen Kiosks
(E) None of these

problem 9) Collecting personal information and effectively posing as another individual is termed as the crime of:

(A) spooling
(B) identity theft
(C) spoofing
(D) hacking
(E) None of these

problem 15) Full form of FORTRAN is:

(A) Formula translation
(B) Formula generation
(C) Format generation
(D) Format translation

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95000

Have any Question? 


Related Questions in Computer Engineering

A tlu with weight vector w and threshold b implements a

A TLU with weight vector W and threshold B implements a hyperplane boundary. Derive an expression for the Euclidean distance of the hyperplane from the origin. From an arbitrary point X. (Refer to Figure 3.1)

Design an algorithm that compares a random and sorted array

Design an algorithm that compares a random and sorted array and establishes the average distance that elements must travel in moving from random to sorted order.

Change the implementation of the gettax method in the

Change the implementation of the getTax method in the TaxReturn class, by setting a variable rate1_limit, depending on the marital status. Then have a single formula that computes the tax, depending on the income and the ...

1 what is the clock cycle time with and without this

1. What is the clock cycle time with and without this improvement? 2. What is the speedup achieved by adding this improvement? 3. Compare the cost/performance ratio with and without this improvement. 4. Problems in this ...

1 if network management does not replace a component whose

1. If network management does not replace a component whose lifetime has been expired, what area in network management has been ignored? 2. Distinguish between internal and external data traffic in an organization. 3. If ...

1 how is data transfer achieved using catv channels2

1. How is data transfer achieved using CATV channels? 2. Distinguish between CM and CMTS. 3. What is the relationship between SONET and SDH? 4. What is the relationship between STS and STM?

1 what are the various types of malware how do worms differ

1. What are the various types of malware? How do worms differ from viruses? Do Trojan horses carry viruses or worms? 2. Why does polymorphism cause greater concern than traditional malware? How does it affect detection?

In this problem we want to compare the computational

In this problem, we want to compare the computational performance of symmetric and asymmetric algorithms. Assume a fast public-key library such as OpenSSL [132] that can decrypt data at a rate of 100 Kbit/sec using the R ...

1 how is an sts multiplexer different from an adddrop

1. How is an STS multiplexer different from an add/drop multiplexer since both can add signals together? 2. What is the relationship between STS signals and OC signals? 3. What is the purpose of the pointer in the line o ...

Tchnical paper object-oriented programming oop

Technical Paper: Object-oriented Programming (OOP) / Event-Driven Programming (EDP) versus Procedural Programming (PP) Use the Internet or Strayer databases to research the advantages, features, and common examples of OO ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen