Computer Basic Information A wireless technology built in electronic gadgets used for exchanging data over short distances is ______ USB Modem None of these Wifi Bluetooth USB Modem None of these Wifi Bluetooth ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Primary storage is _____ as compared to secondary storage. Slow and expensive Slow and inexpensive None of these Fast and inexpensive Fast and expensive Slow and expensive Slow and inexpensive None of these Fast and inexpensive Fast and expensive ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information The process of writing computer instructions in a programming language is known as None of these Coding Programming Processing File None of these Coding Programming Processing File ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information The magnetic disks and drums are like recirculating shift registers because their storage is non volatile stored data is available for reading over and over again in the same order. None of these their access times are about the same they have about the same storage capacity their storage is non volatile stored data is available for reading over and over again in the same order. None of these their access times are about the same they have about the same storage capacity ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information In computer terminology a compiler means a person who computes source programs None of these the same thing as a programmer a program which translates source program into object program key punch operator a person who computes source programs None of these the same thing as a programmer a program which translates source program into object program key punch operator ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information The primary advantage of key-to-tape data-entry systems is: A large percentage of editing can be performed at the time of data entry Keying errors can be detected as they occur All of these Key verification is easily performed The tape is reusable A large percentage of editing can be performed at the time of data entry Keying errors can be detected as they occur All of these Key verification is easily performed The tape is reusable ANSWER DOWNLOAD EXAMIANS APP