Operating System (OS) You can move a window to a different position on your screen by dragging it by its Status bar Title bar Move handle Tail Status bar Title bar Move handle Tail ANSWER DOWNLOAD EXAMIANS APP
Operating System (OS) Which of the following statements is not true about the FORTRAN language? A FORTRAN program, written for the IBM-PC, is totally different from a FORTRAN program written for execution on the SUN machine FORTRAN is extensively used to write programs for performing scientific computations None of these FORTRAN is a high level language All of these A FORTRAN program, written for the IBM-PC, is totally different from a FORTRAN program written for execution on the SUN machine FORTRAN is extensively used to write programs for performing scientific computations None of these FORTRAN is a high level language All of these ANSWER DOWNLOAD EXAMIANS APP
Operating System (OS) A development strategy whereby the executive control modules of a system are coded and tested first, is known as Bottom-up development None of these Left-Right development Top-down development All of these Bottom-up development None of these Left-Right development Top-down development All of these ANSWER DOWNLOAD EXAMIANS APP
Operating System (OS) All of the following are TRUE regarding virtual memory EXCEPT This temporary storage is called the swap file or page file Virtual memory is the physical space o the hard drive The setting for the amount of hard disk drive space to allocate virtual memory can be manually change Any amount of RAM can be allocated to virtual memory This temporary storage is called the swap file or page file Virtual memory is the physical space o the hard drive The setting for the amount of hard disk drive space to allocate virtual memory can be manually change Any amount of RAM can be allocated to virtual memory ANSWER DOWNLOAD EXAMIANS APP
Operating System (OS) The most common security failure is too much emphasis on preventing physical access depending on passwords carelessness by users None of these insufficient technology used to prevent breaches too much emphasis on preventing physical access depending on passwords carelessness by users None of these insufficient technology used to prevent breaches ANSWER DOWNLOAD EXAMIANS APP
Operating System (OS) If there are multiple recycle bin for a hard disk You can choose which recycle bin to use to store your deleted files You can set different size for each recycle bin None of above You can make any one of them default recycle bin You can choose which recycle bin to use to store your deleted files You can set different size for each recycle bin None of above You can make any one of them default recycle bin ANSWER DOWNLOAD EXAMIANS APP