Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) Which of the following is not the activity carried out by an operating system during secondary storage management:

A. Free space management
B. File naming
C. Storage allocation
D. Disk scheduling

problem 2) POST stands for:

A. Power Off Self Test
B. Power On Self Test
C. Power Off Safe Test
D. Power On Safe Test

problem 3) Which of the following is not true about multitasking operating system:

A. There is more than one CPU involved
B. It gives the appearance that all programs are running at the same time
C. It can perform more than one task at the same time
D. All of the above

problem 4) GUI stands for:

A. Graphics User Interchange
B. Graphics User Interface
C. Graphical User Interchange
D. Graphical User Interface

problem 5) Which of the following can be characterised as entertainment software:

A. MS Word, a word processing software
B. Encarta, a digital encyclopaedia
C. Windows Media player, for playing multimedia files
D. All of the above

problem 6) The three major classification of computer networks are:

A. LAN, WAN, TAN
B. LAN,PAN,WAN
C. Ring, Bus, Star
D. None of the above

problem 7) Which of the following devices used in data transmission converts analogue signals to digital and vice versa:

A. Switch
B. Modem
C. Router
D. None of the above

problem 8) An ex of radiated media is:

A. Coaxial Cable
B. Optical Fibre
C. Microwave
D. Twisted Pair

problem 9) Which of the following is true about optical fibres:

A. They transmit data using light
B. They are less prone to electrical noise
C. They offer a higher bandwidth
D. All of the above

problem 10) In which of the following network topologies are the nodes connected in single line:

A. Star topology
B. Ring topology
C. Bus topology
D. Mesh topology

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95817

Have any Question? 


Related Questions in Computer Engineering

Adding new parameters when we added reproduction to the

Adding new parameters When we added reproduction to the Wolf Sheep Simple model, we set two constants in the code. First, reproduction can occur only if the animal has more than 100 units of energy, and second, reproduct ...

1 fill in the blanks the 835 mhz bandwidth in bluetooth is

1. Fill in the blanks. The 83.5 MHz bandwidth in Bluetooth is divided into_____ channels, each of ______ MHz. 2. What is the spread spectrum technique used by Bluetooth? 3. What is the modulation technique in the radio l ...

Change the implementation of the gettax method in the

Change the implementation of the getTax method in the TaxReturn class, by setting a variable rate1_limit, depending on the marital status. Then have a single formula that computes the tax, depending on the income and the ...

After the dhke alice and bob possess a mutual secret point

After the DHKE, Alice and Bob possess a mutual secret point R = (x,y). The modulus of the used elliptic curve is a 64-bit prime. Now, we want to derive a session key for a 128-bit block cipher. The session key is calcula ...

Create a class deck that represents a deck of cards your

Create a class Deck that represents a deck of cards. Your class should have the following methods: constructor Creates a new deck of 52 cards in a standard order. shuffle Randomizes the order of the cards. dealCard Retur ...

Keeping the iv secret in ofb mode does not make an

Keeping the IV secret in OFB mode does not make an exhaustive key search more complex. Describe how we can perform a brute-force attack with unknown IV. What are the requirements regarding plaintext and ciphertext  Descr ...

1 discuss the limitations of a kdc system in modern

1. Discuss the limitations of a KDC system in modern communication. 2. Discuss the future of PKI. 3. Discuss the differences between digital certificates and digital signatures in authentication. 4. Discuss the role and ...

1 investigate how netscape navigator and internet explorer

1. Investigate how Netscape Navigator and Internet Explorer implemented SSL technology. 2. Study both SSL and S-HTTP. Show that these two protocols have a lot in common. However, the two protocols have some differences. ...

We now show how an attack with chosen ciphertext can be

We now show how an attack with chosen ciphertext can be used to break an RSA encryption. 1. Show that the multiplicative property holds for RSA, i.e., show that the product of two ciphertexts is equal to the encryption o ...

Write a java program that allows to generate a random

Write a java program that allows to: Generate a random integer number between 20 and 100. Ask the user to find the number by giving propositions (or guessing). The program gives feedback to the user if the proposed numbe ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen