Categories
Computer Science

software that is a available free for a limited period is called:

A:  Freeware 
B:  groupware
C:  shareware
D:  vertical

Categories
Computer Science

A string of 0’s and 1’s micro program is called

A:  Symbolic macroinstruction
B:  Bit microinstruction
C:  Symbolic mini micro program
D: Binery micro program

Categories
Computer Science

Making illegal copies of copyright software is called:

A:  software piracy 
B:  collaboration
C:  Browsing
D:  Electronic distribution

Categories
Computer Science

The address of instruction following the CALL instructions stored in/one the when a subroutine is called is

A:  Stack pointer
B:  Adder
C:  Program counter
D:  Stack

Categories
Computer Science

Security protection for personal computer includes:

A:  Internal components
B:  locks and cables
C:  software
D:  All of these

Categories
Computer Science

The code used in present day computing developed by IBM corporation is ?

A:  ASCll
B:  Hoffman Code
C:  NRZ code
D:  EBCDIC code

Categories
Computer Science

Pipline performs

A:  Fetch instruction
B:  decode instruction
C:  Fetch operand
D:  All of the above

Categories
Computer Science

CPU employs which type of technique most commonly?

A:  Immediate
B:  Direct
C:  Register
D: All of the above

Categories
Computer Science

What does “dedicated computer ” mean?

A:  Which is the used by one person at a time
B:  Which is assigned to one and only one task 
C:  Which does one kind of function
D:  Which is meant for application software

Categories
Computer Science

What is the function of control units of CPU?

A:  To transfer data
B:  To store data
C:  To perform logic operations
D:  To decode program instruction