Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) The system unit houses the motherboard, CPU, Primary Storage, _______, ________.

A. Secondary Storage and Input devices
B. Secondary Storage and output devices
C. I/0 devices and ports
D. Secondary Storage and ports

problem 2) Which of the following devices is the ex of peripheral device:

A. The motherboard
B. The CPU
C. The Mouse
D. The sound card

problem 3) _____ is/are regarded as a fifth part of computer system:

A. Hardware
B. Software
C. Procedures
D. People

problem 4) Which of the following devices is not the ex of optical storage device:

A. DVD
B. CD –ROM
C. Hard disk
D. None of the above

problem 5) Harry bought computer from the company who imports the computer parts from various manufacturers and then assembles them locally. What kind of computer did Harry buy:

A. Brand computer
B. Clone computer
C. Alien computer
D. None of the above

problem 6) Which of the following devices is the ex of magnetic storage device:

A. Floppy disk
B. CD –ROM
C. DVD
D. None of the above

problem 7) Data is accessed sequentially on:

A. CD-ROM
B. Floppy disk
C. Magnetic tape
D. Magnetic disk

problem 8) Which of the following is the ex of system software:

A. MS Word
B. Windows Media Player
C. Windows Vista
D. Solitaire

problem 9) A tailor made software:

A. can be purchased off the shelf and used
B. is commercially available
C. is developed for specific use in organizations
D. All of the above

problem 10) _______ is the most significant part of the information system:

A. Procedures
B. People
C. Hardware
D. Software

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95810

Have any Question? 


Related Questions in Computer Engineering

A system allows the user to choose a password with a length

A system allows the user to choose a password with a length of one to eight characters, inclusive. Assume that 10,000 passwords can be tested per second. The system administrators want to expire passwords once they have ...

1 you know that the domain name of a computer is

1. You know that the domain name of a computer is "aBusiness.com". Write a statement in Java to create an InetAddress object associated with that computer. 2. You know that the IP address of a computer is "23.14.76.44". ...

1 write a program to read a list of grade point averages 00

1. Write a program to read a list of grade point averages (0.0 - 4.0) from a text file and sort them in descending order. Select the most efficient sorting algorithm for your program. 2. Some algorithms are too complex t ...

1 what are the pros and cons of out-of-band network

1. What are the pros and cons of out-of-band network management versus in-band network management? 2. A network management system can communicate with a managed device using a request-response protocol or a trap mechanis ...

At 35degc and 1atm the degree of dissociation of n204 at

At 35°C and 1atm, the degree of dissociation of N204 at equilibrium is 0.27. (a) Calculate K. (b) Calculate €e at the same temperature when the pressure is 100mm Hg. (c) The equilibrium constant for the dissociation of N ...

Compare the complexity of printed character recognition

Compare the complexity of printed character recognition algorithms based on (a) template matching, (b) Fourier descriptors, and (c) moment matching. (Matched filtering) Write the matched filter output SNR as where G and ...

Write a program that experimentally demonstrates the

Write a program that experimentally demonstrates the comple-mentation property for DES. This program should take as input a key K and a plaintext P and demonstrate that the DES complementation property holds for this key ...

Consider the following rulesreachablex y - flightx

Consider the following rules: REACHABLE(X, Y) :- FLIGHT(X, Y) REACHABLE(X, Y) :- FLIGHT(X, Z), REACHABLE(Z, Y) where REACHABLE(X, Y) means that city Y can be reached from city X, and FLIGHT(X, Y) means that there is a fl ...

In 300 words or more plesae answer the followinginformation

In 300 words or more plesae answer the following: Information technology professionals face many ethical obligations, conflicts, and dilemmas. Discuss ethical issues an IT professional might face. Consider the new trends ...

Consider the vector adt from programming project 21a

Consider the Vector ADT from Programming Project 2.1: (a) Implement a new version of the ADT using an unsorted linked list. (b) Evaluate your new implementation to determine the worst case run time of each operation. (c) ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen