Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) Which of the following is not the activity carried out by an operating system during secondary storage management:

A. Free space management
B. File naming
C. Storage allocation
D. Disk scheduling

problem 2) POST stands for:

A. Power Off Self Test
B. Power On Self Test
C. Power Off Safe Test
D. Power On Safe Test

problem 3) Which of the following is not true about multitasking operating system:

A. There is more than one CPU involved
B. It gives the appearance that all programs are running at the same time
C. It can perform more than one task at the same time
D. All of the above

problem 4) GUI stands for:

A. Graphics User Interchange
B. Graphics User Interface
C. Graphical User Interchange
D. Graphical User Interface

problem 5) Which of the following can be characterised as entertainment software:

A. MS Word, a word processing software
B. Encarta, a digital encyclopaedia
C. Windows Media player, for playing multimedia files
D. All of the above

problem 6) The three major classification of computer networks are:

A. LAN, WAN, TAN
B. LAN,PAN,WAN
C. Ring, Bus, Star
D. None of the above

problem 7) Which of the following devices used in data transmission converts analogue signals to digital and vice versa:

A. Switch
B. Modem
C. Router
D. None of the above

problem 8) An ex of radiated media is:

A. Coaxial Cable
B. Optical Fibre
C. Microwave
D. Twisted Pair

problem 9) Which of the following is true about optical fibres:

A. They transmit data using light
B. They are less prone to electrical noise
C. They offer a higher bandwidth
D. All of the above

problem 10) In which of the following network topologies are the nodes connected in single line:

A. Star topology
B. Ring topology
C. Bus topology
D. Mesh topology

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95817

Have any Question? 


Related Questions in Computer Engineering

Analyze the manner in which a cirt plan fits into the

Analyze the manner in which a CIRT plan fits into the overall risk management approach of an organization and how it supports other risk management plans.

Develop a recursive implementation that incorporates the

Develop a recursive implementation that incorporates the ideas above for calculating the Fibonacci number. Compare the performance of the recursive method with the iterative solution.

From which two sources does a union get its power to

From which two sources does a union get its power to negotiate effectively with the management of a business? What is the significance of unions to managers?

Q1 suppose you have a digital signal with a period of 1500

Q1. Suppose you have a digital signal with a period of 1500 milliseconds. What is the period in microseconds? Q2. What is the 12-bit BCD binary code for 538 10 ? Q3. Convert the 8-bit unsigned binary value 01111010 2 to ...

In an ipv4 datagram the value of total-length field is

In an IPv4 datagram, the value of total-length field is (00A0) 16 and the value of the header-length (HLEN) is (5) 16 . How many bytes of payload are being carried by the datagram? What is the efficiency (ratio of the pa ...

Umldiscuss the balance between absolute truth and using

¨Discuss the balance between absolute truth and using data to reach a particular goal?

Balanced scorecard analysis and strategic

Balanced Scorecard Analysis and Strategic Plan Resources Balanced Scorecard Analysis and Strategic Plan Scoring Guide. iGuide: ePortfolio. APA Style and Format. This assignment is the culmination of your work in previous ...

1 what are kerberos authentication path how do they solve

1. What are Kerberos authentication path? How do they solve the problem of remote authentication? 2. The Kerberos system has several bugs that pose potential security risks. Study the Kerberos ticketing service and discu ...

An archery target consists of a central circle of yellow

An archery target consists of a central circle of yellow surrounded by concentric rings of red, blue, black and white. Each ring has the same "width," which is the same as the radius of the yellow circle. Write a program ...

1 write a deletion method for the redblack class that

1. Write a deletion method for the RedBlack class that adheres to the red-black rules. 2. Design and implement a program that compares AVL trees and red-black trees to skip lists. Which data structure performs the best?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro