Computer Basic Information Protocols are Sets of rules Sets of maps Sets of computers Sets of product Sets of rules Sets of maps Sets of computers Sets of product ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Non-volatility is an important advantage of Both B and C None of these CCD Magnetic bubbles Magnetic tapes and disks Both B and C None of these CCD Magnetic bubbles Magnetic tapes and disks ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Which access method is used for obtaining a record from a cassette tape sequential All of these direct None of these random sequential All of these direct None of these random ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Where are silicon chips manufactured in India? Tamil Nadu None of these Punjab UP Chandigarh Tamil Nadu None of these Punjab UP Chandigarh ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information In computer terminology a compiler means None of these key punch operator a person who computes source programs the same thing as a programmer a program which translates source program into object program None of these key punch operator a person who computes source programs the same thing as a programmer a program which translates source program into object program ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Software programs that close potential security breaches in an operating system are known as: Refresh patches Security breach fixes Security patches Security repairs Refresh patches Security breach fixes Security patches Security repairs ANSWER DOWNLOAD EXAMIANS APP