Sunday

What would you advise the school to do?

As a computer professional, you have just been contracted by a school to help them solve the problem they are…

3 years ago

Which of the following options is a biometric data?

A. Gender B. Password C. Date of birth D. Pattern of eye iris Correct Answer: Option C - Date of…

3 years ago

Given that X and Y are input variables while Z is the output. The truth table in figure 3 represents?

Use the logic truth table in figure 3 to answer question X Y Z 0 0 1 0 1 1…

3 years ago

A site engineer intends to acquire a computer system. What factors Will he consider if he must choose a notebook computer over a desktop computer?

A. Size, cost and battery life B. Cost, size and convenience C. Size, convenience and battery life D. Cost, convenience…

3 years ago

The number 28 in binary is?

A. 1001 B. 11001 C. 110011 D. 11100 Correct Answer: Option D - 11100

3 years ago

The MS-Windows shortcut keys to initiate warm booting is?

A. Alt+ f4 B. Ctrl+ Alt + Del C. Ctrl+Esc D. Ctn +Shift + Del Correct Answer: Option B =…

3 years ago

The process of testing the logic of programs to ensure they give correct result is known as?

A. algorithm B. desk checking C. flowcharting D. table checking Correct Answer: Option C - flowcharting

3 years ago

The command line prompt of MS-DOS operating system is represented as?

A. C:> B. C:\ C. C:\> D. C\:> Correct Answer: Option B = C:\

3 years ago

The algebraic equation for the AND gate with input variables A and B is?

A. X = A.B B. X =A/B C. X= A-B D. X = A+B Correct Answer: Option A - X…

3 years ago

The conversion of readable data to unreadable codes in order to prevent unauthorised access is known as?

A. authentication B. encryption C. encoding D. decryption Correct Answer: Option B - encryption

3 years ago