Ask Question, Ask an Expert


Ask Computer Engineering Expert

problem 1) The system unit houses the motherboard, CPU, Primary Storage, _______, ________.

A. Secondary Storage and Input devices
B. Secondary Storage and output devices
C. I/0 devices and ports
D. Secondary Storage and ports

problem 2) Which of the following devices is the ex of peripheral device:

A. The motherboard
B. The CPU
C. The Mouse
D. The sound card

problem 3) _____ is/are regarded as a fifth part of computer system:

A. Hardware
B. Software
C. Procedures
D. People

problem 4) Which of the following devices is not the ex of optical storage device:

C. Hard disk
D. None of the above

problem 5) Harry bought computer from the company who imports the computer parts from various manufacturers and then assembles them locally. What kind of computer did Harry buy:

A. Brand computer
B. Clone computer
C. Alien computer
D. None of the above

problem 6) Which of the following devices is the ex of magnetic storage device:

A. Floppy disk
D. None of the above

problem 7) Data is accessed sequentially on:

B. Floppy disk
C. Magnetic tape
D. Magnetic disk

problem 8) Which of the following is the ex of system software:

A. MS Word
B. Windows Media Player
C. Windows Vista
D. Solitaire

problem 9) A tailor made software:

A. can be purchased off the shelf and used
B. is commercially available
C. is developed for specific use in organizations
D. All of the above

problem 10) _______ is the most significant part of the information system:

A. Procedures
B. People
C. Hardware
D. Software

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95810

Have any Question? 

Related Questions in Computer Engineering

1 distinguish between multicasting and multiple unicasting2

1. Distinguish between multicasting and multiple unicasting. 2. When we send an e-mail to multiple recipients, are we are using multicasting or multiple unicasting? Give the reason for your answer. 3. Define which of the ...

Write a research paper about security privacy and trust

Write a research paper about Security, privacy and trust issues in internet. The research paper should contain the following abstract, introduction and refrences. The research paper should be Maximum pages 6.

1 why should salts be chosen at random2 does using

1. Why should salts be chosen at random? 2. Does using passwords with salts make attacking a specific account more difficult than using passwords without salts? Explain why or why not. 3. Show that a system using an EKE ...

Implement a class quadraticequation whose constructor

Implement a class QuadraticEquation whose constructor receives the coefficients a, b, c of the quadratic equation ax 2 + bx + c = 0. Supply methods getSolution1 and getSolution2 that get the solutions, using the quadrati ...

1 what is machine learning2 what is the relationship

1) What is machine learning? 2) What is the relationship between Machine Learning & Big Data? 3) Provide a few business cases where Machine Learning would help. (Extra credit) What are the different types of Machine Lear ...

Using english text and patterns determine the average

Using English text and patterns determine the average behavior of the pattern searching algorithm in (Implement a version of the current pattern searching algorithm that counts the number of times a given pattern occurs ...

1 an opaque urn contains three diamonds four rubies and two

1. An opaque urn contains three diamonds, four rubies, and two pearls. Construct a flowchart that describes the following events: Take a gem from the urn. If it is a diamond, lay it aside. If it is not a diamond, return ...

The syracuse also called collatz or hailstone sequence is

The Syracuse (also called Collatz or Hailstone) sequence is generated by starting with a natural number and repeatedly applying the following function until reaching 1: For example, the Syracuse sequence starting with 5 ...

1 a stream of data is being carried by sts-1 frames if the

1. A stream of data is being carried by STS-1 frames. If the data rate of the stream is 49.540 Mbps, how many STS-1 frames per second must let their H3 bytes carry data? 2. A stream of data is being carried by STS-1 fram ...

1 mention the three auxiliary protocols at the network

1. Mention the three auxiliary protocols at the network layer of the TCP/IP suite that are designed to help the IPv4 protocol. 2. In an IPv4 datagram, the value of the header-length (HLEN) field is (6)16. How many bytes ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro