ENIAC (Electronic Numerical Integrator and Calculator) had huge advantage over Mark I because it used electronic valves in place of the electromagnetic switches. In the beginning, ENIAC was used for calculating the path of artillery shells. For which other was weapon design was it utilized?
Options: hydrogen bomb, atom bomb, agnimissile, fighter aircraft
Options: is a value that is incremented whenever a dirty read occurs., is incremented whenever a deadlock occurs., is a value that keeps track of explicit locks., is a value that is incremented whenever database changes are made.
Options: a. You can find deleted files in recycle bin
b. You can restore any files in recycle bin if you ever need
c. You can increase free spaceof disk by sending files in recycle bin
d. You can right click and choose Empty Recycle Bin to clean it at once
Which statement describes a spanning-tree network that has converged?
Options: All switch and bridge ports are in the forwarding state., All switch and bridge ports are assigned as either root or designated ports., All switch and bridge ports are in either the forwarding or blocking state., All switch and bridge ports are either blocking or looping.
Which of the following is true concerning personal computers?
Options: They decrease the demand for mainframe computers, They have been most successful in the home, The electronic spreadsheet has been a primary reason for their popularity, Their future is not so bright owning to the improved cost-performance ratio of minis and mainframes
Options: (A)someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime. (B) a person, usually not an expert in computer security, who breaks into computer systems by using prepackaged automated tools written by others. (C) hacker who utilizes technology to announce a political message. (D) None of these 2
Options: A) Input, output and processing
B) Control unit, primary storage, and secondary storage
C) Control unit, arithmetic-logic unit and primary storage
D) Control unit, processing, and primary storage