Operating System (OS) Dial up connection allows you to Server Internet Connect ISP All of above Server Internet Connect ISP All of above ANSWER DOWNLOAD EXAMIANS APP
Operating System (OS) Which of the following is a correct association between a vendor and an operating system Redhat Linux Microsoft Unix AT & T DOS Novell Linux Redhat Linux Microsoft Unix AT & T DOS Novell Linux ANSWER DOWNLOAD EXAMIANS APP
Operating System (OS) Use of icons and windows are characteristics of ....... interface Windows orientated Command driven Graphical user Menu driven Windows orientated Command driven Graphical user Menu driven ANSWER DOWNLOAD EXAMIANS APP
Operating System (OS) Which of the following statements is not true about the FORTRAN language? A FORTRAN program, written for the IBM-PC, is totally different from a FORTRAN program written for execution on the SUN machine FORTRAN is a high level language None of these All of these FORTRAN is extensively used to write programs for performing scientific computations A FORTRAN program, written for the IBM-PC, is totally different from a FORTRAN program written for execution on the SUN machine FORTRAN is a high level language None of these All of these FORTRAN is extensively used to write programs for performing scientific computations ANSWER DOWNLOAD EXAMIANS APP
Operating System (OS) Under virtual storage, a single program is processed by two or more CPUs interprogram interference may occur two or more programs are stored concurrently in primary storage None of these only the active pages of a program are stored in primary storage a single program is processed by two or more CPUs interprogram interference may occur two or more programs are stored concurrently in primary storage None of these only the active pages of a program are stored in primary storage ANSWER DOWNLOAD EXAMIANS APP
Operating System (OS) The most common security failure is None of these depending on passwords insufficient technology used to prevent breaches carelessness by users too much emphasis on preventing physical access None of these depending on passwords insufficient technology used to prevent breaches carelessness by users too much emphasis on preventing physical access ANSWER DOWNLOAD EXAMIANS APP