Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) The system unit houses the motherboard, CPU, Primary Storage, _______, ________.

A. Secondary Storage and Input devices
B. Secondary Storage and output devices
C. I/0 devices and ports
D. Secondary Storage and ports

problem 2) Which of the following devices is the ex of peripheral device:

A. The motherboard
B. The CPU
C. The Mouse
D. The sound card

problem 3) _____ is/are regarded as a fifth part of computer system:

A. Hardware
B. Software
C. Procedures
D. People

problem 4) Which of the following devices is not the ex of optical storage device:

A. DVD
B. CD –ROM
C. Hard disk
D. None of the above

problem 5) Harry bought computer from the company who imports the computer parts from various manufacturers and then assembles them locally. What kind of computer did Harry buy:

A. Brand computer
B. Clone computer
C. Alien computer
D. None of the above

problem 6) Which of the following devices is the ex of magnetic storage device:

A. Floppy disk
B. CD –ROM
C. DVD
D. None of the above

problem 7) Data is accessed sequentially on:

A. CD-ROM
B. Floppy disk
C. Magnetic tape
D. Magnetic disk

problem 8) Which of the following is the ex of system software:

A. MS Word
B. Windows Media Player
C. Windows Vista
D. Solitaire

problem 9) A tailor made software:

A. can be purchased off the shelf and used
B. is commercially available
C. is developed for specific use in organizations
D. All of the above

problem 10) _______ is the most significant part of the information system:

A. Procedures
B. People
C. Hardware
D. Software

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95810

Have any Question? 


Related Questions in Computer Engineering

Your manager has tasked you with creating a remote employee

Your manager has tasked you with creating a Remote Employee Connection guide for IT. This guide will assist IT in setting up remote (work-from-home) employees to access the company's Intranet. These employees will use a ...

A different approach to fast text searching is to step

A different approach to fast text searching is to step through the text in skips equal to the word length. As soon as we get a mismatch in trying to match the word sought we skip to the start of the next word. To do this ...

Describe the dbas responsibilities how can the dba function

Describe the DBA's responsibilities. How can the DBA function be placed within the organization chart? What effect(s) will such placement have on the DBA function? What is Business Intelligence (BI)? Give some recent exa ...

1 we say that a router in dvmrp creates a shortest-path

1. We say that a router in DVMRP creates a shortest-path tree on demand. What is the meaning of this statement? What is the advantage of creating shortest path trees only on demand? 2. Does RPF actually create a shortest ...

Discussion questionpersonal factors such as anger revenge

Discussion Question Personal factors, such as anger, revenge, and lack of rewards and recognition, may increase the risk of someone stealing from or spying against employees. Organizations should apply adequate security ...

Abstract data types adts are very important as they serve

Abstract data types (ADTs) are very important as they serve as programming tools that enable component reuse and encapsulation. This assignment requires students to create, implement and apply ADTs in an application.The ...

A train traveling at 72 kmph crosses a platform in 30

A train traveling at 72 kmph crosses a platform in 30 seconds and a man standing on the platform in 18 seconds. What is the length of the platform in meters?

Nutty hospital wishes to advance-refund its existing 15

Nutty Hospital wishes to advance-refund its existing 15% long-term debt. The present $30,000,000 is not callable until 5 years from today. The payout on the issue over the next 5 years is as presented in table 21-14. At ...

We now show how an attack with chosen ciphertext can be

We now show how an attack with chosen ciphertext can be used to break an RSA encryption. 1. Show that the multiplicative property holds for RSA, i.e., show that the product of two ciphertexts is equal to the encryption o ...

A key feature of hybrid idps systems is event correlation

A key feature of hybrid IDPS systems is event correlation. After researching event correlation online, define the following terms as they are used in this process: compression, suppression, and generalization.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen