Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) A collection of _______ forms a byte:

A. 8 bytes
B. 8 bits
C. 18 bytes
D. 18 bits

problem 2) 1GB is equals to:

A. 1024 bytes
B. 1024x1024 bytes
C. 1024x1024x1024 bytes
D. 1024x1024x1024x1024 bytes

problem 3) ASCII stands for:

A. American Standard Code for Information Interconnect
B. American Standard Code for Information Interchange
C. American Standard Code for Instruction Interconnect
D. American Standard Code for Instruction Interchange

problem 4) What does SRAM stand for:

A. Standard Random Access Memory
B. Synchronous Random Access Memory
C. Static Random Access Memory
D. Static Read Access Memory

problem 5) Which of the following is the fastest type of RAM:

A. SRAM
B. DRAM
C. SDRAM
D. DDR SDRAM

problem 6) Which of the ROM can be written to only once:

A. PROM
B. EPROM
C. EEPROM
D. FLASH ROM

problem 7) Which of the following is not true about virtual memory:

A. It provides the basis for multi process operation
B. It supports that multiple programs are running concurrently
C. It is a physical memory
D. All of the above

problem 8) Which of the following standard text code systems can symbolize all text and symbols from all the writing systems of the world:

A. BCD
B. EBCDIC
C. ASCII
D. Unicode

problem 9) Which kind of keys on the keyboard is used to navigate the cursor on the screen:

A. Function keys
B. Numeric keys
C. Directional keys
D. Special keys

problem 10) Which of the following is not defined as the pointing device:

A. Mouse
B. Light pen
C. Joystick
D. Keyboard

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95814

Have any Question? 


Related Questions in Computer Engineering

Using figure 2419 explain how flow control can be achieved

Using Figure 24.19, explain how flow control can be achieved at the sender site in TCP (from the sending TCP to the sending application). Draw a representation.

1 discuss the risks to the protected internal network as a

1. Discuss the risks to the protected internal network as a result of a DMZ. 2. What is a bastion router? How different is it from a firewall? 3. Search and discuss as many services and protocols as possible offered by a ...

1 consider proposed implementations of a systolic array you

1. Consider proposed implementations of a systolic array (you can find these in on the Internet or in technical publications). Then attempt to program the loop provided in Exercise 6.11 using this MISD model. Discuss any ...

We can design and build a postfix calculator that can be

We can design and build a postfix calculator that can be used to perform simple arithmetic operations. The calculator consists of a single storage component that consists of an operand stack. The operations performed by ...

1 design and implement a simulation of some other racquet

1. Design and implement a simulation of some other racquet sport (e.g., tennis or table tennis). 2. Craps is a dice game played at many casinos. A player rolls a pair of normal six-sided dice. If the initial roll is 2, 3 ...

Consider the trace-based approach to anomaly-based

Consider the trace-based approach to anomaly-based intrusion detection. An intrusion detection analyst reports that a particular pattern of system usage results in processes with "low entropy," meaning that there is litt ...

1 http version 11 defines the persistent connection as the

1. HTTP version 1.1 defines the persistent connection as the default connection. Using RFC 2616, find out how a client or server can change this default situation\ to nonpersistent. 2. In SMTP, a sender sends unformatted ...

Assignment 1information security within organizations has

Assignment 1 Information security within organizations has evolved and has become much more complex.  In a written paper, answer the following questions:  How has computer security evolved into modern information securit ...

Discussion questionsthe design discipline continues the

Discussion Questions The design discipline continues the modeling process by creating new models and expanding or refining business and requirements models. However, the purpose and nature of modeling changes. Though pro ...

Application jurisdictional aspects of cybercrimeyou are

Application: Jurisdictional Aspects of Cybercrime You are using your wireless device to locate a restaurant. Suddenly, a large flashing skull-and-crossbones appears on your screen and a menacing laugh plays. Seconds late ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen