Computer Science Quiz Questions With Answers - Multiple Choice 1- IC chips used in computers are usually made of 1. Lead 2. Silicon 3. Chromium 4. Gold Answer: Silicon 2- One kilobyte is equal to 1. 1000 bytes 2. 1024 bytes 3. 100 bytes 4. 1023 bytes Answer: 1024 3- Which of the following is not an example of Operating System? 1. Windows 98 2. BSD Unix 3. Microsoft Office XP 4. Red Hat Linux Answer: Microsoft Office XP 4- Which supercomputer is developed by
Premium Binary numeral system Computer
erUNIT 1 INTRODUCTION TO COMPUTERS Structure 1.1 1.2 1.3 Introduction Objectives Introduction to Computers Why Computer? Evolution of Computers 1.3.1 The First Computer 1.3.2 Some Well Known Early Computers 1.3.3 Computer Generations 1.4 1.5 1.6 1.7 1.8 1.9 Components of a Computer Hardware vs Software System vs Applications Software Bits and Bytes Input and Output Devices RAM/ROM 1.10 Secondary Storage Devices 1.11 Summary 1.12 Answers to SAQs 1.1 INTRODUCTION This unit aims
Premium Computer Computer data storage
distinguishing between the online and the offline” (Palfrey and Gasser 4).In this instance‚ “digital native” would be any individual who was “born after 1980” (Palfrey and Gasser 1). These individuals are typically completely comfortable with the computer technology that surrounds them in their daily lives. One of the most ancient forms of communication known as hand writing is being replaced by typing. Even with the invention of the typewriter‚ it was still not uncommon to handwrite memos‚ letters
Premium Digital Digital native
Computer Basics Ty Christian English Allied American University Short Response Discuss where a computer stores its basic hardware settings‚ why it does so‚ and what some of those settings are. A computer is a very complex and complicated piece of equipment that take teams of professional’s to manage. What people seem to forget is even this enigma of hardware also have a very basic system that fires it up. This is called the BIOS (Basic Input/Output System). As the name suggests
Premium Flash memory USB flash drive
David Gray November 16th‚ 2012 Professor Riede English 1101 The Risks and Dangers of Computer Hacking Computer hackers become more intelligent every day. Companies attempt to make technology hacker-free‚ which is not plausible. All this does is provide the hacker with more assentive to figure out how to get around it. The growth of technology causes new threats and new problems. The consequences hackers face can be extremely severe‚ or minimal if lucky. Many “elite” hackers get off with
Premium Black hat Hacker Grey hat
EINSTEIN COLLEGE OF ENGINEERING Computer Architecture and Organization Lecture Notes-EC53 SUJATHA.K & JASMINE MARY.S TEXTBOOKS: 1. John P. Hayes‚ ‘Computer architecture and Organisation’‚ Tata McGraw-Hill‚ Third edition‚ 1998. 2. V. Carl Hamacher‚ Zvonko G. Varanesic and Safat G. Zaky‚ “ Computer Organisation“‚ V edition‚ McGraw-Hill Inc‚ 1996. Einstein College of Engineering UNIT 1 INTRODUCTION FUNCTIONAL UNITS OF A COMPUTER SYSTEM Digital computer systems consist of three distinct
Premium Central processing unit Assembly language
HISTORY OF COMPUTERS The abacus was an early aid for mathematical computations. Its only value is that it aids the memory of the human performing the calculation. A skilled abacus operator can work on addition and subtraction problems at the speed of a person equipped with a hand calculator. The abacus is often wrongly attributed to China. In fact‚ the oldest surviving abacus was used in 300 B.C. by the Babylonians. The abacus is still in use today‚ principally in the far east. A modern abacus
Premium Computer Gottfried Leibniz Charles Babbage
LIMITATION OF COMPUTER Computer has done this and that. Actually this is not the computer which has done this but the user. Despite its various features‚ a computer does have the following limitations: a.No Self Intelligence Today‚ a computer is able to do a work which is impossible for man. Computers are used to do risky and dangerous work and where sharp actually is needed. But it does not have any intelligence of its own. It works according to the instruction only. b. No Decision-Making power
Premium
COMPUTER FORENSICS LECTURER/TUTOR: DR. TONY DE-SOUZA DAW Mahmud Khansur [Type the author name] Table of Contents Outline & Introduction 3 Researched Explanations 3 Application of Anti-Forensic Techniques : 5 Deleting Files (Student ID & Movie Name) 5 Encryption&Steganography 8 Deleting Files (Picture) 14 Evaluations‚ Recommendations& Conclusion 18 References 19 Outline & Introduction People who try to steal or seek other people ’s personal
Premium Computer file Cryptography Computer
Advanced data integration ensures that documents stay connected to important sources of business information. What do you want to do? Create professional-looking documents Share documents confidently Go beyond documents Recover from computer problems Create professional-looking documents Office Word 2007 provides editing and reviewing tools for creating polished documents more easily than ever before. Spend more time writing‚ less time formatting A new‚ results-oriented interface presents
Premium Microsoft Office Word processor Microsoft Word