1-Which input device is able to scan & interpret an entire page that is typed in a special font
A. Floppy disk
B. Page reader
C. Paper tape punch
D. Optical card readers
E. None of the above
2- A half byte is know is
A. Data
B. Bit
C. Half byte
D. Nibble
E. None of the above
Related Link
Computer Networking #9 -Questions and Answers
Computer Networking #8 -Questions and Answers
Computer Networking #7 -Questions and Answers
Computer Networking #6 -Questions and Answers
3-Which language is used in the areas of pattern recognition, artificial intelligence & for simulation of games.
A. APL
B. FORTH
C. LISP
D. CORAL
E. None of the above
4-Which company is the biggest player in the microprocessor industry?
A. Motorola
B. IBM
C. Intel
D. AMD
E. Cyrix
5-A medium for transferring data between two locations is called
A. Network
B. Communication channel
C. Modem
D. Bus
E. None of the above
6-A packet switching network that was sponsored by the Commission of the EEC and became operational in 1979 is
A. LAN
B. Broadband network
C. Star network
D. Euronet
E. None of the above
7-What is the standard code the computer industry created to represent characters?
A. DASI
B. ASSH
C. ASCII
D. BASCII
E. EPROM
Related Link
Computer Networking #9 -Questions and Answers
Computer Networking #8 -Questions and Answers
Computer Networking #7 -Questions and Answers
Computer Networking #6 -Questions and Answers
8-A sizeable geographical area with communication based on the telephone system is though as
A. Local area network
B. Wide area network
C. Modulator-Demodulator
D. All of the above
E. None of the above
9-A Winchester disk is a
A. Disk Stack
B. Removable disk
C. Flexible disk
D. All of the above
E. None of the above
10- Which one of the following is the first second-generation computer?
A. IBM 7090
B. IBM 801
C. IBM 7070
D. IBM 650
E. None of the above
Helpful Link , Visit once
SECURITY TOOLS -Cyber Security # 4
Security Tips – Cyber Security #3
Method Of Defence – Cyber Security #2
Computer Threats – Cyber Security #1
Cyber Security Introduction
Cyber Security
Science
>>> CONTACT US < <<
You must log in to post a comment.