Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1)__________________is a program that reproduces itself:

a) Virus
b) Software
c) Both
d) None of the above

problem 2) _____________ Viruses which aim at a boot sector of hard drive are infecting a very crucial component of the boot process:

a) File infection virus
b) Boot virus
c) Network virus
d) E-mail virus

problem 3) ____________is a virus that they would attach themselves to EXE files, compressed files like ZIP files and driver files:

a) File infector virus
b) Boot virus
c) Network virus
d) E-mail virus

problem 4)__________ is a virus, that is uniquely created to quickly spread throughout local area network

a) File infector virus
b) Boot virus
c) Network virus
d) E-mail virus

problem 5) Which of the following are the main purposes of the operating system

a) To provide the environment for computer user to execute programs on computer hardware in a convenient and efficient manner
b) To allocate separate resources of the computer as needed to solve the problem given
c) Supervision of the executions of user programs to prevent errors and improper use of computer
d) All of the above

problem 6) Full form of acronym ‘spooling’

a) Simultaneous Peripheral Operation On-line
b) Simultaneous Peripheral Operation Off-line
c) Simultaneous Peripheral Organization On-line
d) System Peripheral Operation On-line

problem 7) Several programs are in memory concurrently; the system switches among the programs for efficient processing and minimal idle time is called _____________

a) Multi tasking
b) Multi programming
c) Multi functioning
d) None of the above

problem 8)  ____________  is the using scheduling and multiprogramming to provide the economical interactive system of two or more users

a) Time sharing
b) Time changing
c) Processing
d) None of the above

problem 9) _______________ is the system with two or more central processing units

a) No definition
b) Multi processor
c) Double processor
d) None of the above

problem 10) __________ Is a system where fast response is desirable, but not required

a) Real time systems
b) Time sharing systems
c) Both (a) and (b)
d) None of the above

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M94987

Have any Question? 


Related Questions in Computer Engineering

1 assume object x has two simple variables an integer and

1. Assume object x has two simple variables: an integer and an IP address. What is the identifier for each variable? 2. Assume object x has only one table with two columns. What is the identifier for each column? 3. Assu ...

Phoebes sandwich stop is one of the best-known and most

Phoebe's Sandwich Stop is one of the best-known and most loved sandwich concessions in town. In business for about five years, she sells sandwiches and other lunch items made from locally produced food from her mobile fo ...

Consider a scheme that allows a recipient to reply to a

Consider a scheme that allows a recipient to reply to a message from a chain of Cypherpunk remailers. Assume that encipherment is used throughout the chain. a. Bob selects a chain of remailers for the return path. He cre ...

Q 1 identify and explain the three major interrelated tasks

Q. 1 Identify and explain the three major interrelated tasks for creating 3-D animation. a. creating the objects and scenes b. defining motion c. rendering the final animation Q. 2 Identify and explain the advantages of ...

1 how does public-key infrastructure protect information

1. How does Public-Key Infrastructure protect information assets? 2. What are the six components of PKI? 3. What is the difference between digital signatures and digital certificates?

In el farol extension 3 we now graph the actual award

In El Farol Extension 3, we now graph the actual award distribution using a histogram. Another common way of displaying wealth distributions like this is to use a cumulative distribution function, where the y-value at an ...

One of the earlier applications of cryptographic hash

One of the earlier applications of cryptographic hash functions was the storage of passwords for user authentication in computer systems. With this method, a password is hashed after its input and is compared to the stor ...

1 on average how many requests are being processed at any

1. On average, how many requests are being processed at any given instant? 2. If move to an 8-core system, ideally, what will happen to the system throughput (i.e., how many queries/second will the computer process)? 3. ...

1 assuming that the l1 hit time determines the cycle times

1. Assuming that the L1 hit time determines the cycle times for P1 and P2, what are their respective clock rates? 2. What is the Average Memory Access Time for P1 and P2? 3. Assuming a base CPI of 1.0 without any memory ...

Anyone who is involved in many activities typically uses a

Anyone who is involved in many activities typically uses a calendar to keep track of the various activities. Colleges commonly maintain several calendars such as an academic calendar, a school events calendar, and a spor ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro