Computer Basic Information Protocols are Sets of maps Sets of rules Sets of product Sets of computers Sets of maps Sets of rules Sets of product Sets of computers ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Software programs that close potential security breaches in an operating system are known as: Refresh patches Security patches Security repairs Security breach fixes Refresh patches Security patches Security repairs Security breach fixes ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information The equipment with which the computer talks to its users is called a peripheral word processor software None of these diskette peripheral word processor software None of these diskette ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information The minimum number of MOS transistors required to make a dynamic RAM cell is 4 1 2 3 None of these 4 1 2 3 None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Which selection below best describes the term data processing? None of these The storage of information or data The manipulation of information or data The collection of information or data The distribution of information or data None of these The storage of information or data The manipulation of information or data The collection of information or data The distribution of information or data ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information In which addressing mode, the effective address of the operand is generated by adding a constant value to the contents of a register? Immediate mode None of these Index mode Absolute mode Indirect mode Immediate mode None of these Index mode Absolute mode Indirect mode ANSWER DOWNLOAD EXAMIANS APP