Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) Which of the following is not the activity carried out by an operating system during secondary storage management:

A. Free space management
B. File naming
C. Storage allocation
D. Disk scheduling

problem 2) POST stands for:

A. Power Off Self Test
B. Power On Self Test
C. Power Off Safe Test
D. Power On Safe Test

problem 3) Which of the following is not true about multitasking operating system:

A. There is more than one CPU involved
B. It gives the appearance that all programs are running at the same time
C. It can perform more than one task at the same time
D. All of the above

problem 4) GUI stands for:

A. Graphics User Interchange
B. Graphics User Interface
C. Graphical User Interchange
D. Graphical User Interface

problem 5) Which of the following can be characterised as entertainment software:

A. MS Word, a word processing software
B. Encarta, a digital encyclopaedia
C. Windows Media player, for playing multimedia files
D. All of the above

problem 6) The three major classification of computer networks are:

A. LAN, WAN, TAN
B. LAN,PAN,WAN
C. Ring, Bus, Star
D. None of the above

problem 7) Which of the following devices used in data transmission converts analogue signals to digital and vice versa:

A. Switch
B. Modem
C. Router
D. None of the above

problem 8) An ex of radiated media is:

A. Coaxial Cable
B. Optical Fibre
C. Microwave
D. Twisted Pair

problem 9) Which of the following is true about optical fibres:

A. They transmit data using light
B. They are less prone to electrical noise
C. They offer a higher bandwidth
D. All of the above

problem 10) In which of the following network topologies are the nodes connected in single line:

A. Star topology
B. Ring topology
C. Bus topology
D. Mesh topology

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95817

Have any Question? 


Related Questions in Computer Engineering

For the following we assume aes with 192-bit key length

For the following, we assume AES with 192-bit key length. Furthermore, let us assume an ASIC which can check 3 · 107 keys per second. 1. If we use 100,000 such ICs in parallel, how long does an average key search take? C ...

1 write findmin and findmax methods for the avltree class2

1. Write FindMin and FindMax methods for the AVLTree class. 2. Using the Timing class, compare the times for the methods implemented in Exercise 1 to the same methods in the BinarySearchTree class. Your test program shou ...

Design an algorithm that accepts as input a decimal number

Design an algorithm that accepts as input a decimal number and converts it to the binary-coded decimal (bcd) representation. In the bcd scheme each digit is represented by a 4-bit binary code.

Compare and contrast traditional outsourcing with the

Compare and contrast traditional outsourcing with the Software as a Service. Under what conditions do you think a company should choose SaaS over traditional outsourcing? Explain your views and discuss them with your pee ...

Implement the bankers algorithm- needed before the end of

Implement the Banker's algorithm- needed before the end of today Implement the Banker's algorithm for deadlock avoidance, that works on a given set of N processes and M resource types (N The input data and result is then ...

1 are idss similar to fi rewalls2 why are system intrusions

1. Are IDSs similar to fi rewalls? 2. Why are system intrusions dangerous? 3. Discuss the best approaches to implementing an effective IDS. 4. Can system intrusions be stopped? Support your response.

Consider the following problem descriptionemployees receive

Consider the following problem description: Employees receive their biweekly paychecks. They are paid their hourly rates for each hour worked; however, if they worked more than 40 hours per week, they are paid at 150 per ...

You have been called upon to put together some reference

You have been called upon to put together some reference materials for other groups to follow, since up until now they have not created any formal architectural documents. Create a System Reference Guide for your employe ...

An ip datagram has arrived with the following partial

An IP datagram has arrived with the following partial information in the header (in hexadecimal): 45000054 00030000 2006... a. What is the header size? b. Are there any options in the packet? c. What is the size of the d ...

1 indicate dependences and their type2 assume there is no

1. Indicate dependences and their type. 2. Assume there is no forwarding in this pipelined processor. Indicate hazards and add nop instructions to eliminate them. 3. Assume there is full forwarding. Indicate hazards and ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro