Search
.Management Sciences
Category: Software Engineering Mcqs
The two basic types of record-access methods are ____________________?
0
A. sequential and random
B. sequential and indexed
C. direct and immediate
D. on-line and realtime
A key that will erase information from the computer’s memory and characters on the screen ______________________?
A. Edit
B. Delete key
C. Dummy out
D. Trust key
Operating systems and utility programs are in a class of software known as_________________?
A. system software
B. BIOS software
C. software suites
D. sequential software
Application layer protocol defines_____________________?
A. types of messages exchanged
B. message format, syntax and semantics
C. rules for when and how processes send and respond to messages
D. all of these
The most widely used code that represents each character as a unique 8-bit code is____________________?
A. EBCDIC
B. Binary numbering system
C. Unicode
D. ASCII
Who invented the microprocessor ?
A. Marcian E. Hoff
B. Herman H. Goldstein
C. Joseph Jacquard
D. All of the above
For a browser to connect to other resources , the location or address of the resources must be specified. These addresses are called___________________?
A. Identities
B. URL
C. MSN
D. Packets
A memory that contains a fine pattern of data permanently defined is__________________?
A. EPROM
B. RAM
C. ROM
D. PROM
Surgeons can perform delicate operations by manipulating devices through computer instead of manually. This technology is known as___________________?
A. computer forensics
B. forecasting
C. robotics
D. simulation
A __________________ is a TCP name for a transport service access point?
A. port
B. pipe
C. node
D. none of these
Recent Comments