Computer Basic Information Any method for controlling access to or use of memory is known as Memory protection None of these Memory map Memory management Memory instruction Memory protection None of these Memory map Memory management Memory instruction ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Which programming language is based on Algol 60. ADA PILOT None of these SIMULA SNOBOL ADA PILOT None of these SIMULA SNOBOL ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Which of the following is Not a characteristic of a compluter? Intelligence Versatility Automation None of these Speed Intelligence Versatility Automation None of these Speed ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information Protocols are Sets of product Sets of maps Sets of computers Sets of rules Sets of product Sets of maps Sets of computers Sets of rules ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information What's considered the 'backbone' of the world wide web ? File transfer protocol (FTP) Hypertext mark-up language (HTML) Uniform resource locator (URL) Hypertext transfer protocol (HTTP) File transfer protocol (FTP) Hypertext mark-up language (HTML) Uniform resource locator (URL) Hypertext transfer protocol (HTTP) ANSWER DOWNLOAD EXAMIANS APP
Computer Basic Information The following is true about 2-out of-5 code: None of these it has odd parity it is weighted code All of these it is unweighted code None of these it has odd parity it is weighted code All of these it is unweighted code ANSWER DOWNLOAD EXAMIANS APP