Computer Basic Information What is the name given to the molecular-scale computer? None of these Femtocomputer Microcomputer Supercomputer Nanocomputer None of these Femtocomputer Microcomputer Supercomputer Nanocomputer ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information An intentionally disruptive program that spreads from program to program or from disk to disk is known as Time bomb Trojan horse Time related bomb sequence Virus Time bomb Trojan horse Time related bomb sequence Virus ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information The following are all computing devices, except ...... Cellular telephones None of these Personal digital assistants(PDA) Digital scanners Notebook computers Cellular telephones None of these Personal digital assistants(PDA) Digital scanners Notebook computers ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Full adder has 3 inputs 8 inputs 4 inputs None of these 10 inputs 3 inputs 8 inputs 4 inputs None of these 10 inputs ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information What is the function of Recycle Bin ? Store Document file Store corrupted file Store deleted file Store temporary file Store Document file Store corrupted file Store deleted file Store temporary file ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information The primary advantage of key-to-tape data-entry systems is: A large percentage of editing can be performed at the time of data entry Key verification is easily performed The tape is reusable Keying errors can be detected as they occur All of these A large percentage of editing can be performed at the time of data entry Key verification is easily performed The tape is reusable Keying errors can be detected as they occur All of these ANSWER DOWNLOAD EXAMIANS APP