Description : Which of the following is a way to access secondary memory? A) Random access memory B) Action method C) Transfer method D) Density method
Last Answer : Answer : A
Description : Which of the following is a way to access secondary memory? a. Random access memory b. Action method c. Transfer method d. Density method
Last Answer : a. Random access memory
Description : Which of the following is a way to access secondary memory? a. Random access memory b. Action method c. Transfer method
Description : The two kinds of main memory are: a. Primary and secondary b. Random and sequential c. ROM and RAM d. All of above
Last Answer : ROM and RAM
Description : ________is a multiple-access method in which the available bandwidthof a link is shared in time, frequency, or through code, between different stations. A) Random access B) Controlledaccess C) Channelization D) none of the above
Last Answer : Channelization
Description : Technique of using disk space to make programs believe that the system contains more Random Access Memory(RAM) than is actually available is called ______ A. Random Access Memory B. Primary Memory C. Secondary Memory D. Virtual Memory
Last Answer : D. Virtual Memory
Description : Storage device where time to retrieve stored information is independent of address where it is stored is called _______ A. Random Access Memory B. Secondary Memory C. System D. None of the above
Last Answer : A. Random Access Memory
Description : Random Access Memory (RAM), a form of computer storage, is a ............. memory. (A) Non-volatile (B) Volatile (C) Permanent (D) Secondary
Last Answer : Answer: B
Description : Any method for controlling access to or use of memory is known a. Memory map b. Memory protection c. Memory management d. Memory instruction
Last Answer : Memory protection
Description : A storage device whe3re the access time is depended upon the location of the data is a. Random access b. Serial access c. Sequential access d. Transaction access
Last Answer : Serial access
Description : The two basic types of record-access methods are a. Sequential and random b. Sequential and indexed c. Direct and immediate d. On-line and real time
Last Answer : Sequential and random
Description : In _______ methods,a stationcannot send unless it hasbeen authorized byother stations. A) random access B) controlledaccess C) channelization D) none of the above
Last Answer : controlledaccess
Description : In _______ methods, the stations consult one another tofind which station has the right to send. A) random access B) controlledaccess C) channelization D) none of the above
Description : In ___________ methods, no station is superior to another station and none is assigned the controlover another. A) random access B) controlledaccess C) channelization D) none of the above
Last Answer : random access
Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet
Last Answer : C) NFS
Description : Which of the following is an application layer service? A) Network virtual terminal B) File transfer, access and management C) Mail service D) All of the above
Last Answer : C) Mail service
Description : Which of the following is an application layer service? a. Remote log-in b. File transfer and access c. Mail service d. All of the above
Last Answer : d. All of the above
Description : As compared to the secondary memory, the primary memory of a computer is a. Large b. Cheap c. Fast d. Slow
Last Answer : Fast
Description : The process of starting a or restarting a computer system by loading instructions from a secondary storage device into the computer memory is called a. Duping b. Booting c. Padding d. CPS
Last Answer : Booting
Description : Which of the following is a secondary memory device? a. Keyboard b. Disk c. ALU d. All of the above
Last Answer : Disk
Description : What is MAC ? A computer made by Apple Memory address corruption Mediocre Apple Computer Media Access Control
Last Answer : Media Access Control
Description : A type of core store that has a lower access time than the devices used for working store in the same processor is known as a. Core memory b. Buffer c. Fast core d. Address register
Last Answer : Address register
Description : Which of the following memories has the shortest access times? a. Cache memory b. Magnetic bubble memory c. Magnetic core memory d. RAM
Last Answer : Cache memory
Description : The two kinds of main memory are: A) Primary and secondary B) Random and sequential C) ROM and RAM D) All of above
Last Answer : Answer : C
Last Answer : c. ROM and RAM
Description : In Random Access Memory if current will be interrupted, data will not lost. -Technology
Last Answer : FalseRandom Access Memory (RAM) is a volatile memory, if current is interrupted, data will lost.
Description : Random Access Memory and Read Only Memory are examples of ____________. -Technology
Last Answer : Random Access Memory and Read Only Memory are examples ofPrimary Memory.
Description : What is random access memory ?
Last Answer : Random Access Memory ( RAM) RAM is a type of medium that stores computer data. Any type of data can be "accessed" from RAM , hence it is called random access memory. The term random refers ... for backup. RAM is small in terms of its physical size and the amount of information it contains.
Description : The instructions for starting the computer are house on A) Random access memory B) CD-Rom C) Read only memory chip D) All of above
Description : The first practical form of Random Access Memory was the __________ a) SSEM b) Cathode Ray Tube c) William’s Tube d) Thomas’s Tube
Last Answer : Answer: c Explanation: The first practical form of RAM was the William’s Tube made in 1947. It stored data as electrically charged spots on the face of a Cathode Ray Tube
Description : Memories in which any location can be reached in a fixed amount of time after specifying its address is called ________ A. Sequential Access Memory B. Random Access Memory C. Quick Access Memory D. Mass storage
Last Answer : B. Random Access Memory
Description : SDRAM stands for. a. System dynamic random access memory b. Synchronous dynamic random access memory c. Both d. None
Last Answer : b. Synchronous dynamic random access memory
Description : RAM stands for: a) Read Access Memory b) Random Access Memory c) Rewritable Access Memory d) None of These
Last Answer : b) Random Access Memory
Description : What should be minimum requirement of random access memory (RAM) for internet access: a) 8 MB b) 16 MB c) 32 MB d) 64 MB
Last Answer : c) 32 MB
Description : Separate Read/Write heads are required in which of these memory access schemes. 1) Random Access 2) Sequential Access 3) Direct Access 4) None of these
Last Answer : 4) None of these
Description : Separate Read/Write heads are required in which of these memory access schemes. 1 Random Access 2 Sequential Access 3 Direct Access 4 None of these
Last Answer : 4 None of these
Description : What is another name for random-access memory (RAM)?
Last Answer : Read/write memory.
Description : The instructions for starting the computer are house on a. Random access memory b. CD-Rom c. Read only memory chip
Last Answer : c. Read only memory chip
Description : The instructions for starting the computer are house on a. Random access memory b. CD-Rom c. Read only memory chip d. All of above
Description : .............. is a type of memory circuitry that holds the computer’s start-up routine. (A) RIM (Read Initial Memory) (B) RAM (Random Access Memory) (C) ROM (Read Only Memory) (D) Cache Memory
Last Answer : (C) ROM (Read Only Memory)
Description : RAM means: (A) Random Access Memory (B) Rigid Access Memory (C) Rapid Access Memory (D) Revolving Access Memory
Last Answer : (A) Random Access Memory
Description : Which of the following is used for very high speed searching applications ? (1) Flash Memory (2) Content-addressable Memory (3) Dynamic Random Access Memory (4) Static Random Access Memory
Last Answer : Content-addressable Memory
Description : Which component is mainly responsible for doing calculation in computer ? (1) Random access memory (2) Control unit (3) Arithmetic logic unit (4) Hard disk
Last Answer : ALU (Arithmetic logic unit)
Description : In a computer, what does RAM stand for ? (1) Ready to Access Memory (2) Read At-a-time Memory (3) Random Access Memory (4) Readily Available Memory
Last Answer : Random Access Memory
Description : In the ______ method, all dataexchanges mustbe made throughthe primarydevice even when theultimate destinationis a secondary device. A) reservation B) polling C) token passing D) none of the above
Last Answer : polling
Description : The access method in Bluetooth is________. A) FDMA B) TDD-TDMA C) CDMA D) none of the above
Last Answer : TDD-TDMA
Description : In IEEE 802.11, the access method used in the PCF sublayer is ______. A) contention B) controlled C) polling D) none of the above
Description : In IEEE 802.11, the access method used in the DCF sublayer is _________. A) ALOHA B) CSMA/CA C) CSMA/CD D) none of the above
Last Answer : CSMA/CA
Description : The _____sublayer is responsible for the operation of the CSMA/CD access method and framing. A) LLC B) MII C) MAC D) none of the above
Last Answer : MAC