Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) CAM stands for:

A. Computer Aided Motor
B. Computer Aided Machine
C. Computer Aided Manufacturing
D. Computer Aided Movement

problem 2) Application Software can be classified as:

A. Application and system
B. Ready-made and Tailor made
C. Standard and non-standard
D. None of the above

problem 3) What kind of software comes along with its source, which permit the user to make changes to it:

A. System Software
B. Application Software
C. Free Software
D. Open Source Software

problem 4) FLOPS stands for:

A. Floating point operation per second
B. Floating power occurrence per second
C. Floating point occurrence per second
D. Floating power operation per second

problem 5) Multitasking operating system:

A. Carries out a single task at a time
B. Is a computer which has more than one processor
C. executes more than one task at a time
D. None of the above

problem 6) The bootstrap loader resides in the:

A. RAM
B. ROM
C. Registry
D. Main Memory

problem 7) When computer boots up it performs the _____:

A. Power Online Self Test
B. Power On Security Test
C. Power Off Self Test
D. Power On Self Test

problem 8) Free space management, storage allocation and disk scheduling fall under which of the following OS function:

A. Process Management
B. Memory Management
C. Secondary Storage Management
D. Device Management

problem 9) ____ makes use of variety of software technologies to map pedagogical approaches using computer:

A. Productivity Software
B. Education Software
C. Entertainment Software
D. Web Based Software

problem 10) Which of the following software is loaded first for computer to operate:

A. System Software
B. Application Software
C. Open Source Software
D. End-User Software

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96061

Have any Question? 


Related Questions in Computer Engineering

Develop hardening checklist for windows 10one of the most

Develop Hardening Checklist for Windows 10 One of the most useful tools you will use in your role as an Information Security professional is a hardening checklist. Essentially, it is a document that serves as a guide to ...

1 determine the worst case time-complexity for each

1. Determine the worst case time-complexity for each operation defined in the TicketCounterSimulation class. 2. Hand execute the following code and show the contents of the resulting queue:

Overview of business casealive amp boating aampb is a small

Overview of business case: Alive & Boating (A&B) is a small start-up company that sells small boats in Wagga. A&B keeps its models in several showrooms across the city. At this stage customers cannot view the available m ...

1 using your security lab as your fictitious company

1. Using your security lab as your fictitious company, develop a disaster plan for the lab. 2. Study vendor tools in disaster recovery. Write about five of them, listing their merits and costs involved. 3. Study and deve ...

Grant artistic company sells artistic boutique works and

Grant Artistic Company sells artistic boutique works and related "arty" products to Joanne's Africa Arts Shop. Over the phone, representatives of the two companies negotiate of sale of seven African tribal masks as well ...

1 how many point-to-point wans are needed to connect n lans

1. How many point-to-point WANs are needed to connect n LANs if each LAN should be able to directly communicate with any other LAN? 2. When we use local telephones to talk to a friend, are we using a circuitswitched netw ...

1 handling forensic evidence in cyber crime situations must

1. Handling forensic evidence in cyber crime situations must be done very carefully. Discuss the many pitfalls that an investigator must be aware of. 2. One of the methods used in extracting computer forensics evidence i ...

Pop3 protocol has some optional commands that a

POP3 protocol has some optional commands (that a client/server can implement). Using the information in RFC 1939, find the meaning and the use of the following optional commands: a. UIDL b. TOP 1 15 c. USER d. PASS

1 define cir bc and be and explain how a frame relay

1. Define CIR, Bc, and Be and explain how a Frame Relay service provider uses them. 2. What are the most important criteria for selecting a WAN service provider? 3. Why are QoS features often necessary in WAN routers? 4. ...

1 distinguish between multicasting and multiple unicasting2

1. Distinguish between multicasting and multiple unicasting. 2. When we send an e-mail to multiple recipients, are we are using multicasting or multiple unicasting? Give the reason for your answer. 3. Define which of the ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro