info@kbcambodia.com

Category: Advanced Operation System

A (n) ___________ converts and executes one statement at a time

A (n) ___________ converts and executes one statement at a time A. compiler B. interpreter C. converter D. instructions Answer: Option B

The human-readable version of a program is called

The human-readable version of a program is called A. source code B. program code C. human code D. system code Answer: Option A

A _____________________ is a computer attached to the Internet that runs special web server software and can send web

A _____________________ is a computer attached to the Internet that runs special web server software and can send web A. Web Client B. Web System C. Web page D. Web Server Answer: Option D

Which of the following is the reason for computer failure?

Which of the following is the reason for computer failure? A. Disk failure B. Power failure C. Wrong programming D. CD Failure Answer: Option A

Who invented Linux?

Who invented Linux? A. presper Eckert and John W. Mauchly B. Dennis M. Ritchine C. Linus Torvalds D. Seymour Papert Answer: Option C

Every computer has a(n) __________ many also have ______________________

Every computer has a(n) __________ many also have ______________________ A. operating system a client system B. application programs an operating system C. application programs ; a client system D. operating system, application programs Answer: Option D

The ___________ controls a client computer’s resources

The ___________ controls a client computer’s resources A. application program B. instruction set C. operating system D. server application Answer: Option D

What is an embedded system ?

What is an embedded system ? A. A program that comes wrapped in a box B. A program that is permanently part of a computer C. A computer that is part of a larger computer D. A computer and software…

Unauthorized copying of software to be used for personal gain instead of for personal backups is called

Unauthorized copying of software to be used for personal gain instead of for personal backups is called A. program thievery B. data snatching C. software piracy D. program looting Answer: Option C

The issues that deal with the collection and use of data about individuals is

The issues that deal with the collection and use of data about individuals is A. publicity B. accuracy C. property D. privacy Answer: Option D