A digital computer did not score over an analog computer in terms of

A. Speed

B. Accuracy

C. Reliability

D. Cost

You can do it
  1. Which of the following require large computers memory?
  2. Which access method is used to access cassette tape?
  3. hat produces useful information out of data?
  4. The technology that stores only the essential instructions on a microprocessor chip and thus enhances…
  5. ________ refers to electronic trespassing or criminal hacking.
  6. A program that performs a useful task while simultaneously allowing destructive acts is
  7. What is the name of the display feature that highlights are of the screen which requires operator attention?
  8. A stand-alone system which produces one page of printed output at a time is
  9. The full form of ALU is
  10. One computer that is not considered a portable computer is
  11. A group of magnetic tapes, videos or terminals usually under the control of one master is
  12. A pen shaped device which can sense light, and is used to point at spots on a video screen.
  13. Which of the following is not a binary number?
  14. Which is a unit representing the no bits of discrete.
  15. An application program that helps the user to change any number and immediately see the result of that…
  16. A common boundary between two systems is called
  17. The ALU of a computer responds to the commands coming from
  18. Which of the following registers is loaded with the contents of the memory location pointed by the PC?
  19. which of the following is problem oriented language?
  20. Which of the following is machine independence program?
  21. Which unit converts computer data into human readable form?
  22. Which of the following is valid statement?
  23. A device that connects to a network without the use of cables is said to be-
  24. After copying the content how many times can you paste?
  25. What was the main disadvantage of vacuum tubes?
  26. Personnel who design, program, operate and maintain computer equipment refers to
  27. The common name for the crime of stealing passwords is:
  28. Which programming languages are classified as low level languages?
  29. Which of the following machine was not invented by Charles Babbage?
  30. Compilers and interpreters are themselves