1.Servers are computers that provide resources to other computers connected to a:
[1] mainframe
[2]super computer
[3]. network
[4]. client
[5] none of these.
2.A ---------- contains specific rules and words that express the logical steps of an algorithm.
[1]programming language.
[2]syntax.
[3]logic chart.
[4]programming structure.
[5]None of these.
3.To move forward through the tabs
[1]. CTRL+TAB
[2]. CTRL+SHIFT+TAB
[3]. SHIFT+TAB
[4].ALT + TAB
[5] None of these
4.Reusable optical storage will typically have the acronym.-----------
[1]CD.
[2]DVD.
[3]ROM.
[4]RW.
[5]Nome of these
5.The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called:
[1]. simulation
[2]. animation
[3] robotics
[4]. computer forensics
[5 ]none of these
6.For security we should consider ---------- in internet.
[1]Local data reduction
[2]Event correction.
[3]Low resource utillisation.
[4]All the above.
[5]None of these.
7.The Operating System Manages
[1]. Processes
[2]. Memory
[3]. Disks and I/O devices
[4]. All of the above
[5]. None of these
8.Which of the following is not a peripheral of PC?
[1]CPU.
[2]OS.
[3]VDU.
[4]Touch screen.
[5]None of these
9.Multiprocessing supports more then one_____ at the same time
[1] User
[2]. Process
[3] Hardware
[4]Software
[5] None of these.
10.The third generation of computer were in
[1]1959 - 1954
[2]1965 - 1971.
[ 3]1971 - 1981.
[4]. All of the above
[5]. None of these
Answer
1.[3] 2.[1] 3.[1] 4.[4] 5.[4] 6.[4] 7.[4] 8.[2] 9.[2] 10[2]
.
[1] mainframe
[2]super computer
[3]. network
[4]. client
[5] none of these.
2.A ---------- contains specific rules and words that express the logical steps of an algorithm.
[1]programming language.
[2]syntax.
[3]logic chart.
[4]programming structure.
[5]None of these.
3.To move forward through the tabs
[1]. CTRL+TAB
[2]. CTRL+SHIFT+TAB
[3]. SHIFT+TAB
[4].ALT + TAB
[5] None of these
4.Reusable optical storage will typically have the acronym.-----------
[1]CD.
[2]DVD.
[3]ROM.
[4]RW.
[5]Nome of these
5.The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called:
[1]. simulation
[2]. animation
[3] robotics
[4]. computer forensics
[5 ]none of these
6.For security we should consider ---------- in internet.
[1]Local data reduction
[2]Event correction.
[3]Low resource utillisation.
[4]All the above.
[5]None of these.
7.The Operating System Manages
[1]. Processes
[2]. Memory
[3]. Disks and I/O devices
[4]. All of the above
[5]. None of these
8.Which of the following is not a peripheral of PC?
[1]CPU.
[2]OS.
[3]VDU.
[4]Touch screen.
[5]None of these
9.Multiprocessing supports more then one_____ at the same time
[1] User
[2]. Process
[3] Hardware
[4]Software
[5] None of these.
10.The third generation of computer were in
[1]1959 - 1954
[2]1965 - 1971.
[ 3]1971 - 1981.
[4]. All of the above
[5]. None of these
Answer
1.[3] 2.[1] 3.[1] 4.[4] 5.[4] 6.[4] 7.[4] 8.[2] 9.[2] 10[2]
.
0 comments
Post a Comment