Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) ____ receives data from user and sends them to computer:

A. Output device
B. Processor
C. Input device
D. Main Memory

problem 2) ___ are keyboards used in fast food restaurants and supermarkets:

A. Standard Keyboard
B. QWERTY Keyboard
C. Multimedia Keyboard
D. Non-standard Keyboard

problem 3) Keyboard consists of 5 major parts namely: typepreparer keyboard, function keys, numeric keypad, navigation keys and _________:

A. Soft keys
B. Special keys
C. Direct keys
D. Input Keys

problem 4) The optical mouse:

A. Has a rotating ball on its underside
B. Uses infra-red waves to communicate with the system unit
C. Senses and emits light to detect mouse movements
D. None of the above

problem 5) The ____ is like the upside down mouse, whereby the ball is rotated by the user:

A. Tracker ball
B. Joystick
C. Touchpad
D. Pointing stick

problem 6) Which reader can be used to read information from credit card?

A. Barcode Reader
B. EPOS
C. Magnetic Stripe Reader
D. Magnetic Ink Character Reader

problem 7) _____ is technology of recognising individual characters on printed page, so they can be edited as text:

A. OMR
B. OCR
C. MICR
D. MSR

problem 8) ____ contain holes in different position that mean something when they are read by a reader:

A. Kimball Tag
B. Perforated Card
C. Slot Card
D. Punched Card

problem 9) CRT stands for:

A. Common Ray Technology
B. Cathode Ray Tube
C. Common Relay Tube
D. Cathode Relay Tube

problem 10) Which of the following is the impact printer?

A. Dot Matrix Printer
B. Inkjet Printer
C. Laser Printer
D. All of the above

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96058

Have any Question? 


Related Questions in Computer Engineering

1 the issue of binding assurance requirements to functional

1: The issue of binding assurance requirements to functional requirements versus treating them as mutually exclusive sets has been debated over the years. Which approach do you think is preferable, and why? 2: What are t ...

1 intrusion detection hybrids are getting better research

1. Intrusion detection hybrids are getting better. Research the products on the market and comment on them as far as their interfaces are concerned. 2. Discuss how exploits can be used to penetrate a network. Research an ...

We can define the bandwidth-delay product in a network as

We can define the bandwidth-delay product in a network as the number of packets that can be in the pipe during the round-trip time (RTT). What is the bandwidth-delay product in each of the following situations? a. Bandwi ...

Consider the trace-based approach to anomaly-based

Consider the trace-based approach to anomaly-based intrusion detection. An intrusion detection analyst reports that a particular pattern of system usage results in processes with "low entropy," meaning that there is litt ...

Search the world wide web for job descriptions of project

Search the World Wide Web for job descriptions of project managers. You can use any number of Web sites, including www.monster.com or www.dice.com, to find at least ten IT-related job descriptions. What common elements d ...

What career paths would knowledge of excel worksheets

What career paths would knowledge of Excel worksheets benefit an individual? Would knowledge of Excel be beneficial for you in your current or future career? How could you use Excel in your personal life? (Please conside ...

1 describe two types of variables or methods that can be

1.) Describe two types of variables or methods that can be used to exchange data between web pages and give example code of both types. 2.) Discuss authorization and authentication and explain forms-based-authentication. ...

What is the relationship between hvac and physical security

What is the relationship between HVAC and physical security? What four physical characteristics of the indoor environment are controlled by a properly designed HVAC system? What are the optimal temperature and humidity r ...

1 implement a text-based version of the reversi game using

1. Implement a text-based version of the Reversi game using your game logic ADT from the previous question. 2. Define a game logic ADT, similar to that of the Reversi Game Logic ADT, for the game of checkers.

1 in the sandpile model the sand grains are distributed one

1. In the Sandpile model, the sand grains are distributed, one to each neighbor. Modify the model so that grains are distributed to neighbors randomly. How does this change the model behavior? 2. The Sandpile model exhib ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro