Search
.Management Sciences
Category: Basic computer knowledge
The general method for to input text and numerical data in computer is by _____________________?
A. Keyboard
B. Scanner
C. Printer
D. Platter
Transport layer protocols deals with__________________?
A. application to application communication
B. process to process communication
C. node to node communication
D. all of these
The file transfer protocol is built on ____________________?
A. data centric architecture
B. service oriented architecture
C. client server architecture
D. all of the above
The two basic types of record-access methods are ____________________?
A. sequential and random
B. sequential and indexed
C. direct and immediate
D. on-line and realtime
A key that will erase information from the computer’s memory and characters on the screen ______________________?
A. Edit
B. Delete key
C. Dummy out
D. Trust key
Operating systems and utility programs are in a class of software known as_________________?
A. system software
B. BIOS software
C. software suites
D. sequential software
Application layer protocol defines_____________________?
A. types of messages exchanged
B. message format, syntax and semantics
C. rules for when and how processes send and respond to messages
D. all of these
The most widely used code that represents each character as a unique 8-bit code is____________________?
A. EBCDIC
B. Binary numbering system
C. Unicode
D. ASCII
Who invented the microprocessor ?
A. Marcian E. Hoff
B. Herman H. Goldstein
C. Joseph Jacquard
D. All of the above
For a browser to connect to other resources , the location or address of the resources must be specified. These addresses are called___________________?
A. Identities
B. URL
C. MSN
D. Packets
Recent Comments