1-The first mechanical calculating machine was made by
A. William Oughtred
B. Gottfried Leibnitz
C. Blaise Pascal
D. Charles Babbage
E. None of the above
2-Which programming language is much in vogue among users of micro computers
A. ALGOL
B. APL
C. LOGO
D. FORTH
E. None of the above
Related Link
Computer Networking #7 -Questions and Answers
Computer Networking #6 -Questions and Answers
Computer Networking #5 -Questions and Answers
Computer Networking #4 -Questions and Answers
3- Multiplication of 1112 by 1012 is
A. 1100112
B. 1000112
C. 1111002
D. 0001012
E. None of the above
4- Which of the following registers is used to keep track of address of the memory location where the next instruction is located?
A. Memory Address Register
B. Memory Data Register
C. Instruction Register
D. Program Counter
E. None of the above
5- Which is not a factor when categorizing a computer?
A. Speed of the output device
B. Amount of main memory the CPU can use
C. Cost of the system
D. Capacity of the hard disk
E. Where it was purchased
6- Conversion of an octal number 208 to its binary number is
A. 100002
B. 101112
C. 101102
D. 111102
E. None of the above
7-Which of the following is a system programming language for micro-computers in the Intel family.
A. LOGO
B. SNOBOL
C. PCM
D. PL/1
E. None of the above
8-Which of the following can be output by a computer?
A. graphics
B. voice
C. text
D. computer-usable data or information
E. All of the above
Related Link
Computer Networking #7 -Questions and Answers
Computer Networking #6 -Questions and Answers
Computer Networking #5 -Questions and Answers
Computer Networking #4 -Questions and Answers
9-Sequential file organization is most appropriate for which of the following applications?
A. grocery-store checkout
B. bank checking accounts
C. payroll
D. airline reservations
E. None of the above
10- Who is called the “grand father” of the computer?
A. Blaise Pascal
B. Charles Babbage
C. Joseph Jacquard
D. Dr. Herman Hollerith
E. None of the above
Usefull Link ,Visit once
SECURITY TOOLS -Cyber Security # 4
Security Tips – Cyber Security #3
Method Of Defence – Cyber Security #2
Computer Threats – Cyber Security #1
Cyber Security Introduction
Cyber Security
Science
>>> CONTACT US < <<
You must log in to post a comment.