Computer Basic Information The imitation of one device or system by another is Resilience Compaction Simulation None of these Emulation Resilience Compaction Simulation None of these Emulation ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information The bar code which is used on all types of items, is read by a scanning device directly into the computer.What is the name of this scanning device? Laser scanner None of these Wand MICR OCR Laser scanner None of these Wand MICR OCR ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Which of the following best describes a computer-based information system? Inputting data Data is put into the computer for processing Performing complex mathematical calculations A system in which a computer is used to turn data into information Processing data Inputting data Data is put into the computer for processing Performing complex mathematical calculations A system in which a computer is used to turn data into information Processing data ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Software programs that close potential security breaches in an operating system are known as: Security breach fixes Security repairs Refresh patches Security patches Security breach fixes Security repairs Refresh patches Security patches ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Regarding a VDU, which statement is more correct? It is a peripheral device It is a hardware item It is an output device None of these It is an input device It is a peripheral device It is a hardware item It is an output device None of these It is an input device ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Which memory is non volatile and may be written only once ? PROM EPROM EEPROM RAM PROM EPROM EEPROM RAM ANSWER DOWNLOAD EXAMIANS APP