A method of providing virtual memory is called ___
1.Fragmentation
2.Segmentation
3.De-fragmentation
4.Paging
Fifth generation computer is also known as
1.Very Large Scale Integration (VLSI)
2.Knowledge information processing system
3.Both a and b
4.None of the above
Which is NOT a good Web security strategy ?
1.Remove unnecessary compilers and interpreters
2.Add demo programs, so users can test system without accessing production data
3.Limit the users who can load software, edit or add files
4.Restrict access to the Web server keep a minimum number of ports open
Which is the World's Fastest SUPERCOMPUTER and to which country it belongs ?
1.JAGUAR --- ENGLAND
2.PARAM YUVA 2 --- INDIA
3.CRAY-1 --- ENGLAND
4.TIANHE 2 --- CHINA
__________ cookies are also known as transient cookies.
1.Persistent
2.Second party
3.Session Correct
4.Third party
: Which of the following is NOT a Software?
1.Compiler
2.Adobe
3.Microsoft Office
4.Drivers
Q: Fifth generation computer is also known as
1.Very Large Scale Integration (VLSI)
2.Knowledge information processing system
3.Both a and b
4.None of the above
The intersection of a column and a row
1.cell
2.MENU
3.key
4.field
The popular Access Method for computer network is
1.Ethernet
2.Token Ring
3.Bus Token
4.None
Translator program used in assembly language
1.Assembler
2.interpreter
3.Compiler
4.Operating system
V-RAM is used for access of the following ?
1.Programs
2.Video & Graphics
3.Text & Images
4.All
Which Company is the biggest player in the microprocessor industry ?
1.AMD
2.IBM
3.Motorola
4.INTEL
Which motherboard form factor uses one 20 pin connector?
1.Baby AT
2.AT
3.ATX
4.ALL
Which of the following is not a function of the Control Unit?
1.Interpret instructions
2.Read instructions
3.Execute instructions
4.Direct operations
Which of the following is not an Output device?
1.Scanner
2.Moniter
3.printer
4.Speakers
Which of the following memories needs refresh ?
1.DRAM
2.ROM
3.SRAM
4.All of the above
Which of the following virus overtake computer system, when it boots and destroy information
1.System infectors
2.Trojan
3.Stealth virus
4.Boot infectors
Which type of memory is not directly addressable by the CPU and requires special software called EMS
1.Expanded
2.Base
3.Conventional
4.None