Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) Which of the following is not the activity carried out by an operating system during secondary storage management:

A. Free space management
B. File naming
C. Storage allocation
D. Disk scheduling

problem 2) POST stands for:

A. Power Off Self Test
B. Power On Self Test
C. Power Off Safe Test
D. Power On Safe Test

problem 3) Which of the following is not true about multitasking operating system:

A. There is more than one CPU involved
B. It gives the appearance that all programs are running at the same time
C. It can perform more than one task at the same time
D. All of the above

problem 4) GUI stands for:

A. Graphics User Interchange
B. Graphics User Interface
C. Graphical User Interchange
D. Graphical User Interface

problem 5) Which of the following can be characterised as entertainment software:

A. MS Word, a word processing software
B. Encarta, a digital encyclopaedia
C. Windows Media player, for playing multimedia files
D. All of the above

problem 6) The three major classification of computer networks are:

A. LAN, WAN, TAN
B. LAN,PAN,WAN
C. Ring, Bus, Star
D. None of the above

problem 7) Which of the following devices used in data transmission converts analogue signals to digital and vice versa:

A. Switch
B. Modem
C. Router
D. None of the above

problem 8) An ex of radiated media is:

A. Coaxial Cable
B. Optical Fibre
C. Microwave
D. Twisted Pair

problem 9) Which of the following is true about optical fibres:

A. They transmit data using light
B. They are less prone to electrical noise
C. They offer a higher bandwidth
D. All of the above

problem 10) In which of the following network topologies are the nodes connected in single line:

A. Star topology
B. Ring topology
C. Bus topology
D. Mesh topology

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95817

Have any Question? 


Related Questions in Computer Engineering

1 what does cissp stand for use the internet to identify

1. What does CISSP stand for? Use the Internet to identify the ethical rules CISSP holders have agreed to follow. 2. For what kind of information security jobs does the NSA recruit? Use the Internet to visit its Web page ...

Q1 identify and provide definitions of the major components

Q1: Identify and provide definitions of the major components of object oriented database modeling? Q2: Identify tools used to develop object oriented data model? Q3: Define its differences between object oriented data mo ...

Assignmentscenario the newest gaming computer costs 5000

Assignment Scenario: The newest gaming computer costs $5000 for a 31-inch screen, two 1TB hard drive, a metallic case, and a blazing fast processor. Ten years ago, your grandmother gave you $2500. The money has been in a ...

1 what are the types of password attacks what can a systems

1. What are the types of password attacks? What can a systems administrator do to protect against them? 2. What is the difference between a denial-of-service attack and a distributed denial-of-service attack? Which is mo ...

After the dhke alice and bob possess a mutual secret point

After the DHKE, Alice and Bob possess a mutual secret point R = (x,y). The modulus of the used elliptic curve is a 64-bit prime. Now, we want to derive a session key for a 128-bit block cipher. The session key is calcula ...

1 the sequential search algorithm will always find the

1. The sequential search algorithm will always find the first occurrence of an item in a data set. Create a new sequential search method that takes a second integer argument indicating which occurrence of an item you wan ...

Assignment 1software system and applicationdirections -

Assignment 1 Software: System and Application Directions - Complete parts A, B, and C on one document and submit as an attachment to your instructor for grading. Part A Matching: Complete the Key Term Matching exercises ...

Using english text and patterns determine the average

Using English text and patterns determine the average behavior of the pattern searching algorithm in (Implement a version of the current pattern searching algorithm that counts the number of times a given pattern occurs ...

300 words each point pleaseexplain the origins of the us

300 words each point please. Explain the origins of the U.S. judicial system and how the judicial system impacts and affects businesses. Discuss the concept of judicial review. Describe the different forms of Alternative ...

A click counter is a small hand-held device that contains a

A click counter is a small hand-held device that contains a push button and a count display. To increment the counter, the button is pushed and the new count shows in the display. Clicker counters also contain a button t ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro