Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) A collection of _______ forms a byte:

A. 8 bytes
B. 8 bits
C. 18 bytes
D. 18 bits

problem 2) 1GB is equals to:

A. 1024 bytes
B. 1024x1024 bytes
C. 1024x1024x1024 bytes
D. 1024x1024x1024x1024 bytes

problem 3) ASCII stands for:

A. American Standard Code for Information Interconnect
B. American Standard Code for Information Interchange
C. American Standard Code for Instruction Interconnect
D. American Standard Code for Instruction Interchange

problem 4) What does SRAM stand for:

A. Standard Random Access Memory
B. Synchronous Random Access Memory
C. Static Random Access Memory
D. Static Read Access Memory

problem 5) Which of the following is the fastest type of RAM:

A. SRAM
B. DRAM
C. SDRAM
D. DDR SDRAM

problem 6) Which of the ROM can be written to only once:

A. PROM
B. EPROM
C. EEPROM
D. FLASH ROM

problem 7) Which of the following is not true about virtual memory:

A. It provides the basis for multi process operation
B. It supports that multiple programs are running concurrently
C. It is a physical memory
D. All of the above

problem 8) Which of the following standard text code systems can symbolize all text and symbols from all the writing systems of the world:

A. BCD
B. EBCDIC
C. ASCII
D. Unicode

problem 9) Which kind of keys on the keyboard is used to navigate the cursor on the screen:

A. Function keys
B. Numeric keys
C. Directional keys
D. Special keys

problem 10) Which of the following is not defined as the pointing device:

A. Mouse
B. Light pen
C. Joystick
D. Keyboard

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95814

Have any Question? 


Related Questions in Computer Engineering

Wvcc has decided to purchase a standalone firewall reread

WVCC has decided to purchase a standalone firewall. Reread the "Improved Performance and Security for the Edge of the Network" section of the chapter to understand WVCC's requirements for the firewall. Do some Internet r ...

1 modify the previous program to get its input from a file2

1. Modify the previous program to get its input from a file. 2. Heating and cooling degree-days are measures used by utility companies to estimate energy requirements. If the average temperature for a day is below 60, th ...

1 evaluate the worst case time-complexity of the sparse

1. Evaluate the worst case time-complexity of the Sparse Matrix ADT implemented in Programming Project 9.7. 2. Provide the code to implement the four basic operations - traversal, search, insertion, deletion - for an uns ...

1 rewrite the computer terms glossary application using the

1. Rewrite the computer terms glossary application using the customdesigned Hash class developed in this chapter. Experiment with different hash functions and collision-resolution strategies. 2. Using the Hashtable class ...

In chapter 1 we mentioned that the tcpip suite unlike the

In Chapter 1, we mentioned that the TCP/IP suite, unlike the OSI model, has no presentation layer. But an application-layer protocol can include some of the features defined in this layer if needed. Does SMTP have any pr ...

Analyze the hersheys enterprise system creates halloween

Analyze the Hershey's Enterprise System Creates Halloween Tricks caseNew Window. Prior to the Year 2000 transition, Hersey's Corporation planned a major systems project to implement a new ERP system. While the case is no ...

Stakeholders include everyone who are actively involved in

Stakeholders include everyone who are actively involved in the project or whose interests may be affected as a result of the project execution or completion. Why should they be involved in the creation of lessons learned ...

1 are the helo and mail from commands both necessary in

1. Are the HELO and MAIL FROM commands both necessary in SMTP? Why or why not? 2. In Figure 26.13 in the text, what is the difference between the MAIL FROM in the envelope and the FROM in the header?

1 what are the primary objectives of the internal

1. What are the primary objectives of the internal monitoring domain? 2. What is the objective of the planning and risk assessment domain of the maintenance model? Why is this important?

1 for each of the major types of information security job

1. For each of the major types of information security job titles covered in the chapter, list and describe the criteria used for selection. 2. What are some of the factors that influence an organization's information se ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen