Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) ____ receives data from user and sends them to computer:

A. Output device
B. Processor
C. Input device
D. Main Memory

problem 2) ___ are keyboards used in fast food restaurants and supermarkets:

A. Standard Keyboard
B. QWERTY Keyboard
C. Multimedia Keyboard
D. Non-standard Keyboard

problem 3) Keyboard consists of 5 major parts namely: typepreparer keyboard, function keys, numeric keypad, navigation keys and _________:

A. Soft keys
B. Special keys
C. Direct keys
D. Input Keys

problem 4) The optical mouse:

A. Has a rotating ball on its underside
B. Uses infra-red waves to communicate with the system unit
C. Senses and emits light to detect mouse movements
D. None of the above

problem 5) The ____ is like the upside down mouse, whereby the ball is rotated by the user:

A. Tracker ball
B. Joystick
C. Touchpad
D. Pointing stick

problem 6) Which reader can be used to read information from credit card?

A. Barcode Reader
B. EPOS
C. Magnetic Stripe Reader
D. Magnetic Ink Character Reader

problem 7) _____ is technology of recognising individual characters on printed page, so they can be edited as text:

A. OMR
B. OCR
C. MICR
D. MSR

problem 8) ____ contain holes in different position that mean something when they are read by a reader:

A. Kimball Tag
B. Perforated Card
C. Slot Card
D. Punched Card

problem 9) CRT stands for:

A. Common Ray Technology
B. Cathode Ray Tube
C. Common Relay Tube
D. Cathode Relay Tube

problem 10) Which of the following is the impact printer?

A. Dot Matrix Printer
B. Inkjet Printer
C. Laser Printer
D. All of the above

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96058

Have any Question? 


Related Questions in Computer Engineering

1 design and implement a function to find all negative

1. Design and implement a function to find all negative values within a given list. Your function should return a new list containing the negative values. When does the worst case occur and what is the run time for that ...

1 assume a destination computer receives several packets

1. Assume a destination computer receives several packets from a source. How can it be sure that the fragments belonging to a datagram are not mixed with the fragments belonging to another datagram? 2. Explain why the In ...

1 what do you get if you add -14 to itself 4 times what is

1. What do you get if you add -1/4 to itself 4 times? What is -1/4 × 4? Are they the same? What should they be? 2. Write down the bit pattern in the fraction of value 1/3 assuming a floating point format that uses binary ...

Write a code segment that will analyze a numeric value

Write a code segment that will analyze a numeric value provided by the user to determine if he or she is a newborn, a child, a teenager, or an adult. Make sure to include the following in your code: · Display the message ...

In this course you will assume the role of a forensics

In this course, you will assume the role of a forensics investigation trainee at Two Way Communications, a telecommunications company. You will conclude your training period by completing projects supporting each of the ...

Oop for computer science assignment specificationa small

OOP for Computer Science Assignment Specification A small village infant school wishes to computerise its pupil records and you are to write a menu-driven application for this in C++. The data relating to pupils will be ...

Although most systems allow objects to have only one owner

Although most systems allow objects to have only one owner, it is possible for an object to have two (or more) owners. Consider ownership as a right that allows the changing of capabilities (or access control lists). How ...

Commercial matching service scenariowwwbuycomputercom is a

Commercial Matching Service Scenario www.buycomputer.com is a fictitious website to match consumers who wish to purchase computers with businesses who are able to supply them. It works as follows: 1- Consumers can visit ...

1 how many cycles does it take for all instructions in a

1. How many cycles does it take for all instructions in a single iteration of the above loop to execute? 2. When an instruction in a later iteration of a loop depends upon a data value produced in an earlier iteration of ...

1 authentication using certi fi cates although considered

1. Authentication using certi fi cates, although considered safe, suffers from weaknesses. Discuss these weaknesses using speci fi c examples. 2. Kerberos and SSL are additional layers to enhance authentication. Detail h ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen