Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) Which of the following is not the activity carried out by an operating system during secondary storage management:

A. Free space management
B. File naming
C. Storage allocation
D. Disk scheduling

problem 2) POST stands for:

A. Power Off Self Test
B. Power On Self Test
C. Power Off Safe Test
D. Power On Safe Test

problem 3) Which of the following is not true about multitasking operating system:

A. There is more than one CPU involved
B. It gives the appearance that all programs are running at the same time
C. It can perform more than one task at the same time
D. All of the above

problem 4) GUI stands for:

A. Graphics User Interchange
B. Graphics User Interface
C. Graphical User Interchange
D. Graphical User Interface

problem 5) Which of the following can be characterised as entertainment software:

A. MS Word, a word processing software
B. Encarta, a digital encyclopaedia
C. Windows Media player, for playing multimedia files
D. All of the above

problem 6) The three major classification of computer networks are:

A. LAN, WAN, TAN
B. LAN,PAN,WAN
C. Ring, Bus, Star
D. None of the above

problem 7) Which of the following devices used in data transmission converts analogue signals to digital and vice versa:

A. Switch
B. Modem
C. Router
D. None of the above

problem 8) An ex of radiated media is:

A. Coaxial Cable
B. Optical Fibre
C. Microwave
D. Twisted Pair

problem 9) Which of the following is true about optical fibres:

A. They transmit data using light
B. They are less prone to electrical noise
C. They offer a higher bandwidth
D. All of the above

problem 10) In which of the following network topologies are the nodes connected in single line:

A. Star topology
B. Ring topology
C. Bus topology
D. Mesh topology

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95817

Have any Question? 


Related Questions in Computer Engineering

The labor movement in a global economythe topics covered

The Labor Movement in a Global Economy The topics covered throughout the course will provide a starting point for further research. The final assignment must be supported by a solid foundation in labor relations concepts ...

Abm for education and understanding abm provides us with a

ABM for education and understanding ABM provides us with a new way of understanding the world around us. ABM has many uses in research. But ABM also has great potential as a tool for education. For instance, molecules in ...

1 compare the authorization model used by the network

1. Compare the authorization model used by the network operating systems (NOS) to that used by the old stand-alone operating systems. 2. List and discuss the most common access privileges in a computing system. 3. Discus ...

To avoid shutting down a website when changing the server

To avoid shutting down a website when changing the server of the website, redirecting traffic to an intermittent subdomain is required? List the steps of the redirection process?

1 who is ultimately responsible for managing a technology

1. Who is ultimately responsible for managing a technology? Who is responsible for enforcing policy that affects the use of a technology? 2. What is contingency planning? How is it different from routine management plann ...

Suppose a virtual machine monitor call it vmm-1 is running

Suppose a virtual machine monitor (call it VMM-1) is running another virtual machine monitor (VMM-2), which in turn is running a version of the Linux operating system. The user running the Linux system is editing a file. ...

First show the block organization of the 16-bit carry save

First, show the block organization of the 16-bit carry save adders to add these 16 terms, as shown in Figure B.14.1. Assume that the time delay through each 1-bit adder is 2T. Calculate the time of adding four 4-bit numb ...

Use the fdm to calculate the characteristic impedance of

Use the FDM to calculate the characteristic impedance of the high-frequency, air-filled rectangular transmission line

1 list and describe four vulnerability intelligence sources

1. List and describe four vulnerability intelligence sources. Of those that you listed, which seems the most effective? Why? 2. What does CERT stand for? Is there more than one CERT? What is the purpose of a CERT?

Explain the process of developing a service bundle using

Explain the process of developing a service bundle using the Open Service Gateway Intiative component?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen