Computer Basic Information An adder in which the bits of the operands are added one after another is None of these Half-adder All of these Serial adder Full-adder None of these Half-adder All of these Serial adder Full-adder ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Hardware or software designed to guard against unauthorized access to a computer network is known as a(n): Hacker-resistant server Hacker-proof program Encryption safe wall Firewall Hacker-resistant server Hacker-proof program Encryption safe wall Firewall ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Those microcomputers which have the same operating characteristics as the IBM microcomputers are called IBM clones look alikes copies None of these duplicates clones look alikes copies None of these duplicates ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information A path by which communication is achieved between a central processor and other devices is called None of these Channel Network Bus Audit trail None of these Channel Network Bus Audit trail ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Memories in which any location can be reached in a fixed (and short) amount of time after specifying its address is called random-access memory None of these mass storage sequential-access memory secondary memory random-access memory None of these mass storage sequential-access memory secondary memory ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Which of the following is not true of future computers? All of these increased use of CAD/CAM techniques development of products more suitable for human use developments in artificial intelligence systems faster turnaround time All of these increased use of CAD/CAM techniques development of products more suitable for human use developments in artificial intelligence systems faster turnaround time ANSWER DOWNLOAD EXAMIANS APP