16.A walkie talkie is an example of a device that communicate in A. Full duplex B. Half duplex

A+ Guide To It Technical Support
10th Edition
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:ANDREWS, Jean.
Chapter11: Windows Versions And Customer Service
Section: Chapter Questions
Problem 4TC
icon
Related questions
Question

Answer question 16 showing fully all the steps. Solution should be perfect(very correct), clear, brief and explicit enough!

9. Which one the following is a
specific address of a web page?
A. Web address
B. Email address
C. Uniform Resource Locator
D. Universal Resource Locator
10. The most secure password is
A. John
B. 2 johnll
C. *Johnll
D. Johnll
11.Reading back a number to the
customerbefoờre transferring
telephone credit is an example
1. ..
is where actual data
process
2. sing takes place
A. CPU
В. CU
C. Accumulator
D. ALU
3.
....are electrical
pathways found on the
motherboard
A. Slots
B. Ports
C. System buses
D. Cables
4. Technically a megabyte is made
up of
A. 103
В. 210
С. 220
D. 106
5. A software that targets the
activities of a particular
company is called....
A. Bespoke
B. Specialist
C. Generic
D. Tailor made
A. Vaidation
B. Venficatior
C. Proof reading
D. MTN service
12. In System Development Life
Cycle, documentation generally
takes place at.. phase.
A Design
B. Study
C. Implementation
D. Testing
13.Another name for a relation is a
number of bytes
......
B. Oval
C. Parallelogram
D Circle
7. It is a type of project analysis
charn that shows work
breakdown structure over a
given period.
Bubble chart
B. Gantt chart
C. Bar chart
D. Flow chart
8. It is used to convert different
layer of a network and to
forward data packets.
A. Bridge
B. Switch
C. Router
D. Hub
A. Table
B. Form
C. Query
D. Report
14.A driver which has been
incorporated in to the ROM of a
hardware is called a
A. Firmware
B. Device
C. BIOS
D. CMOS
15. Making a copy of your friends
licensed CD is an example of
A. Piracy
B. Stealing
C. Data theft
D. Copying
16.A walkie talkie is an example of
a device that communicate in
A. Full duplex
B. Half duplex
& Legiay
Transcribed Image Text:9. Which one the following is a specific address of a web page? A. Web address B. Email address C. Uniform Resource Locator D. Universal Resource Locator 10. The most secure password is A. John B. 2 johnll C. *Johnll D. Johnll 11.Reading back a number to the customerbefoờre transferring telephone credit is an example 1. .. is where actual data process 2. sing takes place A. CPU В. CU C. Accumulator D. ALU 3. ....are electrical pathways found on the motherboard A. Slots B. Ports C. System buses D. Cables 4. Technically a megabyte is made up of A. 103 В. 210 С. 220 D. 106 5. A software that targets the activities of a particular company is called.... A. Bespoke B. Specialist C. Generic D. Tailor made A. Vaidation B. Venficatior C. Proof reading D. MTN service 12. In System Development Life Cycle, documentation generally takes place at.. phase. A Design B. Study C. Implementation D. Testing 13.Another name for a relation is a number of bytes ...... B. Oval C. Parallelogram D Circle 7. It is a type of project analysis charn that shows work breakdown structure over a given period. Bubble chart B. Gantt chart C. Bar chart D. Flow chart 8. It is used to convert different layer of a network and to forward data packets. A. Bridge B. Switch C. Router D. Hub A. Table B. Form C. Query D. Report 14.A driver which has been incorporated in to the ROM of a hardware is called a A. Firmware B. Device C. BIOS D. CMOS 15. Making a copy of your friends licensed CD is an example of A. Piracy B. Stealing C. Data theft D. Copying 16.A walkie talkie is an example of a device that communicate in A. Full duplex B. Half duplex & Legiay
The diagram shows an
instruction cycle as carried out
in the microprocessor of a
computer. In questions (22-24)
choose the letter that most
C. Simplex
D. Simple duplex
17.An B in logic gates means
A. A AND B
B. A NAND B
C. A OR B
D. A NOR B
18..
exclusive command line
operating system
A. DOS
B. Ubuntu
C. Windows
appropriately completes or
corresponds to the statements
given.
23. Another name for instruction
cycle is
A. Pipelining
Is an example of an
A 81.
B. 72
C. 71
XINN 'a
19.It is a series of recorded steps
and keystrokes which can be
repeated
A. Query
B. Form
C. Procedure
D. Macro
20. The time taken for the
read/write head of a disk to
calculate a cluster is known as
5.
instruction
A. Fetch
B. Search
COperate
aud ut
senter
dass
...***
A Ga
B. S
C. S
D. pm
epoe
A. Seek time
B. Access time
C. Location time
D. Recognition time
21. This data type references an
element by adding an indexto
an identifier
A. Tree
B. List
CQueue
D Array
22. It ismade up of hardware,
software, people,
communication system systems
who process data into
information such as alert
messages or reports.
A. Computer Information
Systems (CIS)
B. Management Information
Systems (MIS)
C. Decision Support Systems
(DSS)
D. Office Automation Systems
(OAS)
25.After step 4 the machine writes
the result to memory. This is
called
A Printing
B. Storage
C. Writing
D. Processing
26. Which of the following is NOT a
component of a Von Neumann
architecture
A. Memory
B. Program counter
C. Registers
D. Hard disk
27. An HTML document is
A. A file that contains graphics
and text
B. A file stored in one computer
ON
effici
A. p
B. C
33. Whi
to be used in another
34.Wn
computer later.
C. A file that contains web page
content.
D. A file that contains pictures,
images, graphics and text all
combined.
28.A computer program that
converts an entire program into
machine language at one time
is called a/an
A. Interpreter
Transcribed Image Text:The diagram shows an instruction cycle as carried out in the microprocessor of a computer. In questions (22-24) choose the letter that most C. Simplex D. Simple duplex 17.An B in logic gates means A. A AND B B. A NAND B C. A OR B D. A NOR B 18.. exclusive command line operating system A. DOS B. Ubuntu C. Windows appropriately completes or corresponds to the statements given. 23. Another name for instruction cycle is A. Pipelining Is an example of an A 81. B. 72 C. 71 XINN 'a 19.It is a series of recorded steps and keystrokes which can be repeated A. Query B. Form C. Procedure D. Macro 20. The time taken for the read/write head of a disk to calculate a cluster is known as 5. instruction A. Fetch B. Search COperate aud ut senter dass ...*** A Ga B. S C. S D. pm epoe A. Seek time B. Access time C. Location time D. Recognition time 21. This data type references an element by adding an indexto an identifier A. Tree B. List CQueue D Array 22. It ismade up of hardware, software, people, communication system systems who process data into information such as alert messages or reports. A. Computer Information Systems (CIS) B. Management Information Systems (MIS) C. Decision Support Systems (DSS) D. Office Automation Systems (OAS) 25.After step 4 the machine writes the result to memory. This is called A Printing B. Storage C. Writing D. Processing 26. Which of the following is NOT a component of a Von Neumann architecture A. Memory B. Program counter C. Registers D. Hard disk 27. An HTML document is A. A file that contains graphics and text B. A file stored in one computer ON effici A. p B. C 33. Whi to be used in another 34.Wn computer later. C. A file that contains web page content. D. A file that contains pictures, images, graphics and text all combined. 28.A computer program that converts an entire program into machine language at one time is called a/an A. Interpreter
Expert Solution
steps

Step by step

Solved in 2 steps with 1 images

Blurred answer
Knowledge Booster
Development strategies
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
A+ Guide To It Technical Support
A+ Guide To It Technical Support
Computer Science
ISBN:
9780357108291
Author:
ANDREWS, Jean.
Publisher:
Cengage,
Microsoft Windows 10 Comprehensive 2019
Microsoft Windows 10 Comprehensive 2019
Computer Science
ISBN:
9780357392607
Author:
FREUND
Publisher:
Cengage
Comptia A+ Core 1 Exam: Guide To Computing Infras…
Comptia A+ Core 1 Exam: Guide To Computing Infras…
Computer Science
ISBN:
9780357108376
Author:
Jean Andrews, Joy Dark, Jill West
Publisher:
Cengage Learning
Principles of Information Security (MindTap Cours…
Principles of Information Security (MindTap Cours…
Computer Science
ISBN:
9781337102063
Author:
Michael E. Whitman, Herbert J. Mattord
Publisher:
Cengage Learning