Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) Disk’s content which is recorded at the time of manufacture and which can’t be changed or erased by the user is:

(A) read-only
(B) memory-only
(C) run-only
(D) prepare-only
(E) None of these

problem 2) In the information system, alphanumeric data normally takes the form of:

(A) Sentences and paragraphs
(B) Numbers and alphabetical characters
(C) Graphic shapes and figures
(D) Human voice and other sounds
(E) None of these

problem 3) Website’s main page is termed as its:

(A) home page
(B) browser page
(C) search place
(D) bookmark
(E) None of these

problem 4) When installing ………, the user should copy and usually decompress program files from CDROM or other medium to the hard disk.

(A) programming software
(B) system hardware
(C) applications hardware
(D) applications software
(E) None of these

problem 5) Collection of interrelated files in the computer is a:

(A) file manager
(B) field
(C) record
(D) database
(E) None of these

problem 6) _____________ computer is the large and expensive computer capable of concurrently processing data for hundreds or thousands of users.

(A) server
(B) mainframe
(C) desktop
(D) tablet
(E) None of these

problem 7) Different applications and documents are represented on Windows desktop by:

(A) Symbols
(B) Labels
(C) Graphs
(D) Icons
(E) None of these

problem 8) What is generally used for displaying information at public places?

(A) Monitors
(B) Overhead Projections
(C) Monitors and Overhead Projections
(D) Touch Screen Kiosks
(E) None of these

problem 9) Collecting personal information and effectively posing as another individual is termed as the crime of:

(A) spooling
(B) identity theft
(C) spoofing
(D) hacking
(E) None of these

problem 15) Full form of FORTRAN is:

(A) Formula translation
(B) Formula generation
(C) Format generation
(D) Format translation

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95000

Have any Question? 


Related Questions in Computer Engineering

The rookie chief information security officerthis

The Rookie Chief Information Security Officer This assignment consists of five parts: Part 1: Organization Chart Part 2: Request for Proposal (RFP) Plan Part 3: Physical Security Plan Part 4: Enterprise Information Secur ...

Write the c code for a function that receives five double

Write the C++ code for a function that receives five double numbers: four by value and one by reference. Name the formal parameters num1, num2, num3, num4, and avg. The function should calculate the average of the four n ...

The prediction cube is a good example of multidimensional

The prediction cube is a good example of multidimensional data mining in cube space. (a) Propose an efficient algorithm that computes prediction cubes in a given multidimensional database. (b) For what kind of classifica ...

Mr zimpfer was a victim of age discrimination according to

Mr. Zimpfer was a victim of age discrimination according to the ADEA and case law? Explain your position. Cite relevant court cases to justify your position. If you are undecided, explain why?

1 how has the internet and use of communication impacted

1. How has the Internet and use of communication impacted the outcome of war(s)? 2. In what ways can a personal homepage help people to construct and present a positive identity for themselves? What kinds of problems cou ...

Resourcenbspch 13 systems implementation from the

Resource:  Ch. 13, "Systems Implementation", from the "Documenting the System" section to end of the chapter. Write  a 3-page paper that explains the importance of training and support after software is implemented.  Des ...

1 if you were a malware designer would you rather use tcp

1. If you were a malware designer, would you rather use TCP or UDP to distribute a malicious payload and why? 2. Give an example of an Internet worm. What vulnerability does the worm you cited exploit? What were the atta ...

What are the strategic options for legacy system evolution

What are the strategic options for legacy system evolution? When would you normally replace all or part of a system rather than continue maintenance of the software?

You visit the disneyland from time to time what is the

You visit the Disneyland from time to time. What is the opportunity cost of going to Disneyland? How about the benefit? Think about ways to measure your benefit of going to Disneyland.

Summarize the system components of the national

Summarize the system components of the National Preparedness System (one paragraph per component should suffice)http://www.fema.gov/media-library-data/20130726-1855-25045-8110/national_preparedness_system_final.pdf Journ ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate