Computer Engineering Quiz 16

1. Computational activities are scheduled by operating systems to ensure _____of computer system.

 
 
 
 

2. Computational Intelligence is also called _________________.

 
 
 
 

3. Computer crimes are also called:

 
 
 
 

4. Computers manipulate and transform information in ___________ form.

 
 
 
 

5. Control of mechanical system are the example of ___________.

 
 
 
 

6. Sampling is best understood in the _________________.

 
 
 
 

7. CPU Time + ________ = Elapsed Time

 
 
 
 

8. Cross-platform development method is used for both the embedded system and:

 
 
 
 

9. Data checking process include various steps. Which of the following is NOT such a step?

 
 
 
 

10. Data Encryption and Data Compression is done by ______ layer in OSI Model.

 
 
 
 

11. Data entry encoder must have various skills, which of the following is NOT such a skill?

 
 
 
 

12. Data entry requirements are need to be maintained for _________?

 
 
 
 

13. Data is also handled in a 4-bit unit called a ____________

 
 
 
 

14. Data processing is also known as

 
 
 
 

15. Delay produced by the resistance and capacitance on a transistor is called:

 
 
 
 

16. Devices in a Distributed System are ___________ in nature.

 
 
 
 

17. D-flip flop is also known as __________ since it can store a single bit of data.

 
 
 
 

18. Different _________will have different epistemic requirements with respect to interaction with the technology.

 
 
 
 

19. Digital circuits that use memory elements for their operation are known as _________.

 
 
 
 

20. Directed graphs are suitable for modeling __________streets.

 
 
 
 

Question 1 of 20

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.