Description : Are webpages presented in exactly the same way across different operating systems web browsers?
Last Answer : Need answer
Description : Operating system refers to the core software components of a computer system that manages internal operations and hardware. -Technology
Last Answer : TrueOperating system is a set of programs that control internal computer operations and make best use of hardware.
Description : The primary purpose of an operating system is.... 1) To make the most efficient use of the computer hardware 2) To allow people to use the computer 3) To keep systems programmers employed 4) To make computers easier to use
Last Answer : 1) To make the most efficient use of the computer hardware
Description : The primary purpose of an operating system is.... 1 To make the most efficient use of the computer hardware 2 To allow people to use the computer 3 To keep systems programmers employed 4 To make computers easier to use
Last Answer : 1 To make the most efficient use of the computer hardware
Description : Software, such as Explorer and Firefox,are referredto as _____. A) Systems software B) Utility software C) Browsers D) Internet tools
Last Answer : Browsers
Description : Distributed operating systems consist of: (1) Loosely coupled O.S. software on a loosely coupled hardware (2) Loosely coupled O.S. software on a tightly coupled hardware (3) Tightly coupled O.S. software on a loosely coupled hardware (4) Tightly coupled O.S. software on a tightly coupled hardware
Last Answer : Answer: 3
Description : 'Platform' in the computer world means: a) Computer Hardware used b) Operating System Used c) Computer Software Used d) All of The Above e) Both (a) and (b)
Last Answer : d) All of The Above
Description : Computer systems are comprised of: a) Hardware, Software, Procedures, Networks and People b) Hardware, Programs, Processors, Procedures and People c) Hardware Programs, Information, People and Networks d) None of These
Last Answer : a) Hardware, Software, Procedures, Networks and People
Description : Computer systems are comprised of a) hardware, programs, processors, procedures and people b) hardware, programs, information, people and procedures c) hardware, programs, information, people and networks d) hardware, software, procedures, networks and people e) None of these
Last Answer : d) hardware, software, procedures, networks and people
Description : 4. What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems
Last Answer : d. Open computer systems, communication systems, embedded systems
Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems
Description : What are the three general categories of computer systems that can contain digital evidence? A. Desktop, laptop, server B. Personal computer, Internet, mobile telephone C. Hardware, software, networks D. Open computer systems, communication systems, and embedded systems
Last Answer : D. Open computer systems, communication systems, and embedded systems
Description : Which of the following is not true about embedded systems? A. Built around specialized hardware B. Always contain an operating system C. Execution behavior may be deterministic D. None of these
Last Answer : D. None of these
Description : The physical devices of a computer: a) Software b) Package c) Hardware d) System Software
Last Answer : Answer: c Explanation: Hardware refers to the physical devices of a computer system. Software refers to a collection of programs. A program is a sequence of instructions
Description : Physical security is concerned with protecting computer hardware from human tampering and natural disasters and _____security is concerned with protecting software from unauthorized tampering or damage: a) Data b) Cyber c) Internet d) Meta Physical e) Publicity
Last Answer : b) Cyber
Description : Microsoft Power Point is a software designed to create (1) Internet browsers (2) Data bases (3) Text documents (4) Multimedia presentations
Last Answer : Multimedia presentations
Description : A kiosk a) is data organised and presented in a manner that has additional value beyond t he value of the data itself b) combines microscopic electronic components on a single integrated circuit that ... and service d) describes a computer's type, processor, and operating system e) None of these
Last Answer : c) is a computer station that provides the public with specific and useful information and service
Description : To navigate to a new web page for which you know the URL, type that URL in the browser's … and press Enter a) Address bar b) Domain bar c) Address button d) Name button e) None of these
Last Answer : a) Address bar
Description : It is the set of programs that enables your computers hardware device and application software to work together. A. Operating system B. Helper software C. System software D. Application software
Last Answer : C. System software
Description : _________ is the first program run on a computer when computer boots up 1) System Software 2) Operating Software 3) Systems Operations 4) None
Last Answer : 2) Operating Software
Description : _________ is the first program run on a computer when computer boots up 1 System Software 2 Operating Software 3 Systems Operations 4 None
Last Answer : 2 Operating Software
Description : Software refers to ____ A. firmware B. physical components that a computer is made of C. programs D. None of the above
Last Answer : C. programs
Description : Are popular web browsers too heavy for a 256mb ram computer?
Last Answer : I don’t think any currently supported browser can run with that little memory.
Description : Which is a hardware component or system of components that allows a human being to interact with a computer? A. Interface device (IDF) B. Graphical User Interface (GUI) C. Musical Digital Instrument Interface (MIDI) D. None of the Above
Last Answer : A. Interface device (IDF)
Description : An operating system of a computer serves as a software interface between the user and the (a) hardware (b) peripheral -Technology
Last Answer : (a) An operating system of a computer serves as a software interface between the user and the hardware.
Description : A project management information system consists of: 1. A project management software package operating on appropriate computer facilities 2. Hardware, software, documents, and procedures 3. Automated and ... of pertinent information for members of a project team 4. All of the above
Last Answer : 4. All of the above
Description : The set of computer programs that manage the hardware/software of a computer is called (A) Compiler system (B) Operation system (C) Operating system (D) None of these
Last Answer : (C) Operating system
Description : The statement the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer Hardware refers to (A) Information ... ICT) (C) Information and Data Technology (IDT) (D) Artificial Intelligence (AI)
Last Answer : (A) Information Technology (IT)
Description : Software Engineering is an engineering discipline that is concerned with: (1) how computer systems work. (2) theories and methods that underlie computers and software systems. (3) all ... (4) all aspects of computer-based systems development, including hardware, software and process engineering.
Description : Can 32 bit Operating Systems run on 64 bit hardware in a VM?
Last Answer : I don’t know about in virtualization, but 64 bit hardware can certainly run a 32 bit OS.
Description : Point out the wrong statement : A. Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through ... A process virtual machine instantiates when a command begins a process D. All of the above
Last Answer : Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host VM
Description : Point out the wrong statement. a) Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware ... A process virtual machine instantiates when a command begins a process d) All of the mentioned
Description : Which of the following is not true about embedded systems? A. Built around specialized hardware B. Always contain an operating system C. Execution behavior may be deterministic D. All of these E. None of these
Last Answer : E. None of these
Description : Information needed to develop, use or maintain computer hardware and software and to permit access and retrieval of data is known as: a) Software b) Documentation c) Operation of Hardware d) None of These
Last Answer : b) Documentation
Description : Role of security auditor is to ____________ a) secure the network b) probe for safety and security of organization’s security components and systems c) detects and prevents cyber attacks and threats to organization d) does penetration testing on different web applications
Last Answer : b) probe for safety and security of organization’s security components and systems
Description : Kernel is: a) Considered as the critical part of the operating system b) The software which monitors the operating system c) the set of primitive functions upon which the rest of operating systems functions are built up d) None of The Above
Last Answer : c) the set of primitive functions upon which the rest of operating systems functions are built up
Description : Operating Systems, editors and debuggers comes under: a) System Software b) Application Software c) Utilities d) None of The Above
Last Answer : a) System Software
Description : Point out the wrong statement. a) Load balancing virtualizes systems and resources by mapping a logical address to a physical address b) Multiple instances of various Google applications are running on different hosts c) Google uses hardware virtualization d) All of the mentioned
Last Answer : Google uses hardware virtualization
Description : "Homepage" word is associated with: a) Operating Systems b) Web Pages c) Word Processing d) None of These
Last Answer : b) Web Pages
Description : Does anybody remember an illustration about the web browsers clash?
Last Answer : Nope.
Description : How do I remove my username from my web browser's drop-down suggestions?
Last Answer : Have you tried deleting your browser history... I'm pretty sure that would work.
Description : Web browsers display images in the following format (a) XBM (b) JPEG -Technology
Last Answer : (d) All of these
Description : What is the purpose of a web browser? Give the name of any two popular web browsers. -Technology
Last Answer : A web browser is an application program used for exploring the information resources available on the World Wide Web to retrieve the required information. Two popular web browsers are Google Chrome and Mozilla Firefox.
Description : Operating system is a (a) application software (b) system software (c) hardware (d) language -Technology
Last Answer : (b) Operating system is a system software that acts as an interface between the user and the hardware.
Description : Software consists of (A) Set of instructions + operating procedures (B) Programs + documentation + operating procedures (C) Programs + hardware manuals (D) Set of programs
Last Answer : (B) Programs + documentation + operating procedures