Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) Disk’s content which is recorded at the time of manufacture and which can’t be changed or erased by the user is:

(A) read-only
(B) memory-only
(C) run-only
(D) prepare-only
(E) None of these

problem 2) In the information system, alphanumeric data normally takes the form of:

(A) Sentences and paragraphs
(B) Numbers and alphabetical characters
(C) Graphic shapes and figures
(D) Human voice and other sounds
(E) None of these

problem 3) Website’s main page is termed as its:

(A) home page
(B) browser page
(C) search place
(D) bookmark
(E) None of these

problem 4) When installing ………, the user should copy and usually decompress program files from CDROM or other medium to the hard disk.

(A) programming software
(B) system hardware
(C) applications hardware
(D) applications software
(E) None of these

problem 5) Collection of interrelated files in the computer is a:

(A) file manager
(B) field
(C) record
(D) database
(E) None of these

problem 6) _____________ computer is the large and expensive computer capable of concurrently processing data for hundreds or thousands of users.

(A) server
(B) mainframe
(C) desktop
(D) tablet
(E) None of these

problem 7) Different applications and documents are represented on Windows desktop by:

(A) Symbols
(B) Labels
(C) Graphs
(D) Icons
(E) None of these

problem 8) What is generally used for displaying information at public places?

(A) Monitors
(B) Overhead Projections
(C) Monitors and Overhead Projections
(D) Touch Screen Kiosks
(E) None of these

problem 9) Collecting personal information and effectively posing as another individual is termed as the crime of:

(A) spooling
(B) identity theft
(C) spoofing
(D) hacking
(E) None of these

problem 15) Full form of FORTRAN is:

(A) Formula translation
(B) Formula generation
(C) Format generation
(D) Format translation

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95000

Have any Question? 


Related Questions in Computer Engineering

1 write a function removeat that takes three parameters an

1. Write a function, removeAt, that takes three parameters: an array of integers, the number of elements in the array, and an integer (say, index). The function should delete the array element indicated by index. If inde ...

Discuss with your learning team the configurations needed

Discuss with your Learning Team the configurations needed to resolve the problems outlined in this lab exercise. The configurations that have been applied to the devices within this lab have a number of incorrect setting ...

Write a c program that fills random squares of 3 by 3 with

Write a C++ program that fills random squares of 3 by 3, with unique numbers from 1 to 9, and tests if the generated matrix forms a Magic Squares. Your program should loop until  three magic squares  are generated and  p ...

1 a network consists of n hosts assuming that cryptographic

1. A network consists of n hosts. Assuming that cryptographic keys are distributed on a per-hostpair basis, compute how many different keys are required. 2. One cryptographic checksum is computed by applying the DES in C ...

In an rsa digital signature scheme bob signs messages xi

In an RSA digital signature scheme, Bob signs messages xi and sends them together with the signatures si and her public key to Alice. Bob's public key is the pair (n,e); her private key is d. Oscar can perform man-in-the ...

A key feature of hybrid idps systems is event correlation

A key feature of hybrid IDPS systems is event correlation. After researching event correlation online, define the following terms as they are used in this process: compression, suppression, and generalization.

1 what is the most common form of violation of intellectual

1. What is the most common form of violation of intellectual property? How does an organization protect against it? What agencies fight it? 2. What are the various types of force majeure? Which type might be of greatest ...

The power of marketingmarketers cannot create demand or

The Power of Marketing Marketers cannot create demand or make people buy things that they don't want or need. However marketing is designed to persuade, inform, and remind people about the availability, choices, features ...

Predict two 2 trends that are likely to impact public

Predict two (2) trends that are likely to impact public service in the future. Next, choose two (2) skills that public personnel managers may seek in response to these trends. Provide a rationale and support your positio ...

1 list and describe the four classes of fire described in

1. List and describe the four classes of fire described in the text. Does the class of a fire dictate how to control the fire? 2. What is Halon, and why is its use restricted?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro