Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) Which of the following is not the ex of system software?

A. Microsoft Windows
B. Linux
C. Both of the above
D. Microsoft Word 2007

problem 2) A supercomputer is most appropriate for:

A. Typing letters
B. Playing video games
C. Performing complex scientific calculations
D. None of the above

problem 3) The manager of small business wants to computerize his system. What kind of computer would you recommend him to buy?

A. A minicomputer
B. A supercomputer
C. A mainframe
D. A handheld computer

problem 4) Which of the following is not the component of the CPU?

A. RAM
B. Control Unit
C. ALU
D. Register

problem 5) ALU stands for:

A. Arithmetic and Logic Unit
B. Arithmetical and Logic Unit
C. Arithmetic and Logical Unit
D. Arithmetical and Logical Unit

problem 6) What is the function of Control Unit?

A. Perform arithmetic and logic operations
B. Store data
C. Direct the flow of instructions and data in the CPU
D. All of the above

problem 7) The Instructions inside the ROM is called as:

A. Software
B. Hardware
C. Firmware
D. Mediumware

problem 8) Which of the following would not be stored in RAM:

A. The Operating system
B. A program currently running
C. Data needed by the program
D. None of the above

problem 9) The time taken for the CPU to fetch, decode and execute an instruction is called as a:

A. Computer cycle
B. Clock cycle
C. Machine cycle
D. Execution time

problem 10) Which of the following transports electrical signals between electrical components on the motherboard?

A. Bus
B. Register
C. Connectors
D. Wires

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95812

Have any Question?


Related Questions in Computer Engineering

Question suppose you have to design a mobile application to

Question : Suppose you have to design a mobile application to control your microwave over internet. Define the objective, assumptions and Interface Metaphors of this application.

Anbspthe reaction of an aqueous monoprotic strong acid such

a: The reaction of an aqueous monoprotic strong acid (such as HBr (aq)) with an aqueous alkali strong base (such as LiOH (aq)) always has the same heat of reaction regardless of which strong acids and strong base were us ...

Question suppose users share a 1 280 kbps link also suppose

Question : Suppose users share a 1, 280 kbps link. Also suppose each user requires 64 kbps when transmitting, but each user transmits only 10% of the time. (See the discussion of statistical multiplexing in Section 1.3.) ...

Computer sciencewhat is required of an organization to

Computer Science What is required of an organization, to implement and maintain IT Governance? What outside resources are available to assist technology managers in the implementation and maintenance process?

Assume nebraska and virginia each have 100 acres of

Assume Nebraska and Virginia each have 100 acres of farmland. The following table gives hypothetical figures for yield per acre in the two states:                                  Nebraska               Virginia   Wheat  ...

Question suppose that you discover that ram addresses

Question : Suppose that you discover that RAM addresses 000C0000 to 000C7FFF are reserved for a PC's video adapter in a 32-bit computer. How many bytes of memory is this?

A real estate developer will build two different types of

A real estate developer will build two different types of apartments in a residential area: one- bedroom apartments and two-bedroom apartments. In addition, the developer will build either a swimming pool or a tennis cou ...

Understanding the digital revolution assignment - parchment

Understanding the Digital Revolution Assignment - Parchment Purgatory Overview - For this assignment, you will use skills acquired through practical laboratory exercises to automate a business process, and to visualize t ...

Penetration testing is a technique used to identify

Penetration testing is a technique used to identify security weaknesses in your network. Discuss a type of penetration testing and the different methods utilized to recognize vulnerabilities in your network.

What is the difference between accounting costs and

What is the difference between accounting costs and economic costs? Why do economic costs include both explicit (revealed and expressed) costs and implicit (present but not obvious) costs? What are the differences betwee ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As