Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) A collection of _______ forms a byte:

A. 8 bytes
B. 8 bits
C. 18 bytes
D. 18 bits

problem 2) 1GB is equals to:

A. 1024 bytes
B. 1024x1024 bytes
C. 1024x1024x1024 bytes
D. 1024x1024x1024x1024 bytes

problem 3) ASCII stands for:

A. American Standard Code for Information Interconnect
B. American Standard Code for Information Interchange
C. American Standard Code for Instruction Interconnect
D. American Standard Code for Instruction Interchange

problem 4) What does SRAM stand for:

A. Standard Random Access Memory
B. Synchronous Random Access Memory
C. Static Random Access Memory
D. Static Read Access Memory

problem 5) Which of the following is the fastest type of RAM:

A. SRAM
B. DRAM
C. SDRAM
D. DDR SDRAM

problem 6) Which of the ROM can be written to only once:

A. PROM
B. EPROM
C. EEPROM
D. FLASH ROM

problem 7) Which of the following is not true about virtual memory:

A. It provides the basis for multi process operation
B. It supports that multiple programs are running concurrently
C. It is a physical memory
D. All of the above

problem 8) Which of the following standard text code systems can symbolize all text and symbols from all the writing systems of the world:

A. BCD
B. EBCDIC
C. ASCII
D. Unicode

problem 9) Which kind of keys on the keyboard is used to navigate the cursor on the screen:

A. Function keys
B. Numeric keys
C. Directional keys
D. Special keys

problem 10) Which of the following is not defined as the pointing device:

A. Mouse
B. Light pen
C. Joystick
D. Keyboard

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95814

Have any Question? 


Related Questions in Computer Engineering

Set sorting searching and hashingoverviewquestions 1b and

Set: Sorting, Searching and Hashing Overview: Questions 1(b) and 2(a) of this assignment require a C++ compiler. As usual, you must submit the actual source code files (ending in .cpp) so that I can compile and run your ...

Sources must be cited in apa format your response should be

Sources must be cited in APA format. Your response should be four (4) double-spaced pages; refer to the "Assignment Format" page located on the Course Home page for specific format requirements. Part A: 1. Using your own ...

Computer class assignmentclass consider your current or

Computer Class Assignment Class, Consider your current or future career (nursing), clubs or volunteer activities or any other occupations where a PowerPoint presentation might be advantageous. Where might you use PowerPo ...

Rewrite exercise 1 so that it stores the words from a text

Rewrite Exercise 1 so that it stores the words from a text file. Display all the words in the file and the number of times they occur in the file. Exercise 1 Write a program that generates 10,000 random integers in the r ...

The next day at sls found everyone in technical support

The next day at SLS found everyone in technical support busy restoring computer systems to their former state and installing new virus and worm control software. Amy found herself learning how to install desktop computer ...

Purposedemonstrate the ability to implement and use

Purpose Demonstrate the ability to implement and use structured data types utilizing the facilities of the C programming language. Assignment Write a program that simulates a soft drink machine. Your program will consist ...

The cost to become a member of a fitness center is as

The cost to become a member of a fitness center is as follows: The senior citizens discount is 30% If the membership is bought and paid for 12 or more months, the discount is 15% If more than five personal training sessi ...

We now show how an attack with chosen ciphertext can be

We now show how an attack with chosen ciphertext can be used to break an RSA encryption. 1. Show that the multiplicative property holds for RSA, i.e., show that the product of two ciphertexts is equal to the encryption o ...

1 describe a physical firewall that is used in buildings

1. Describe a physical firewall that is used in buildings. List the reasons why an organization might need firewalls for physical security controls. 2. What is considered the most serious threat within the realm of physi ...

Programming assignment data structuresa college wants to

Programming Assignment: Data Structures A college wants to you to write a test program for tracking their course sections. Classroom capacities on campus range from a minimum of 1 student to a maximum of 30 students. Dat ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen