Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) The system unit houses the motherboard, CPU, Primary Storage, _______, ________.

A. Secondary Storage and Input devices
B. Secondary Storage and output devices
C. I/0 devices and ports
D. Secondary Storage and ports

problem 2) Which of the following devices is the ex of peripheral device:

A. The motherboard
B. The CPU
C. The Mouse
D. The sound card

problem 3) _____ is/are regarded as a fifth part of computer system:

A. Hardware
B. Software
C. Procedures
D. People

problem 4) Which of the following devices is not the ex of optical storage device:

A. DVD
B. CD –ROM
C. Hard disk
D. None of the above

problem 5) Harry bought computer from the company who imports the computer parts from various manufacturers and then assembles them locally. What kind of computer did Harry buy:

A. Brand computer
B. Clone computer
C. Alien computer
D. None of the above

problem 6) Which of the following devices is the ex of magnetic storage device:

A. Floppy disk
B. CD –ROM
C. DVD
D. None of the above

problem 7) Data is accessed sequentially on:

A. CD-ROM
B. Floppy disk
C. Magnetic tape
D. Magnetic disk

problem 8) Which of the following is the ex of system software:

A. MS Word
B. Windows Media Player
C. Windows Vista
D. Solitaire

problem 9) A tailor made software:

A. can be purchased off the shelf and used
B. is commercially available
C. is developed for specific use in organizations
D. All of the above

problem 10) _______ is the most significant part of the information system:

A. Procedures
B. People
C. Hardware
D. Software

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95810

Have any Question? 


Related Questions in Computer Engineering

Reorganize the bank account classes as follows in the bank

Reorganize the bank account classes as follows. In the Bank Account class, introduce an abstract method end Of Month with no implementation. Rename the add Interest and deduct Fees methods into end Of Month in the subcla ...

Discussion criminal background checksread the article

Discussion: Criminal Background Checks Read the article titled "Why Aren't Business Ethics Classes Making Businesses More Ethical?" located at http://crowell.biola.edu/blog/2013/feb/13/why-ethics-classes-rae/. The Wall S ...

Case description and content requirements for the final

Case Description and Content Requirements for the Final Project Case Description - Online Recruiting System (ORS) AppBeyondBorders (ABB) Inc. is a non-profit organization that is committed to well beings of people in the ...

We have talked a lot about designing models but we have

We have talked a lot about designing models, but we have assumed so far that you know what the level of complexity of your model will be. Is there always an appropriate level of complexity of an agent-based model? Discus ...

1 what are the inherent problems with iso 17799 and why

1. What are the inherent problems with ISO 17799, and why hasn't the United States adopted it? What are the recommended alternatives? 2. What documents are available from the NIST Computer Resource Center, and how can th ...

Implement a class quadraticequation whose constructor

Implement a class QuadraticEquation whose constructor receives the coefficients a, b, c of the quadratic equation ax 2 + bx + c = 0. Supply methods getSolution1 and getSolution2 that get the solutions, using the quadrati ...

Distinguish between a policy requirement and a mechanism

Distinguish between a policy requirement and a mechanism. Identify at least three specific security requirements for a system you know and describe at least two different mechanisms for implementing each one.

1 design and implement the iterator class setiterator for

1. Design and implement the iterator class SetIterator for use with the Set ADT implemented using a list. 2. Design and implement the iterator class MapIterator for use with the Map ADT implemented using a list. 3. Devel ...

1 in chapter 1 we mentioned that the tcpip suite unlike the

1. In Chapter 1, we mentioned that the TCP/IP suite, unlike the OSI model, has no presentation layer. But an application-layer protocol can include some of the features defined in this layer if needed. Does HTTP have any ...

In el farol extension 3 we now graph the actual award

In El Farol Extension 3, we now graph the actual award distribution using a histogram. Another common way of displaying wealth distributions like this is to use a cumulative distribution function, where the y-value at an ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro