A single packet on a data link is known as

A. Path

B. Frame

C. Block

D. Group

You can do it
  1. Second Generation computers were developed during
  2. Once you load the suitable program and provide required data, computer does not need human intervention.…
  3. The two major types of computer chips are
  4. Mark I is also known as
  5. Which of the following are the cheapest memory devices in terms of Cost/Bit?
  6. The personnel who deals with the computer & its management put together are called
  7. Which of the following have the fastest access time?
  8. Floppy disks typically in diameter
  9. Which of the following is/ are operating systems
  10. An application suitable for sequential processing is
  11. A paper printout of a document is known as
  12. When creating a computer program, the ________ designs the structure of the program
  13. A name or number used to identify storage location devices?
  14. Each set of Napiers bones consisted of ______ rods.
  15. Software in computer
  16. ________ Is the appearance of typed characters?
  17. To prevent the loss of data during power failures, use a(n):
  18. An example of a digital device can be
  19. Who used punched cards practically for the first time in the history of computers?
  20. The BIOS is the abbreviation of .
  21. In analog computer
  22. A computer program that translates one program instructions at a time into machine language is called…
  23. What is the name of the display feature that highlights are of the screen which requires operator attention?
  24. When was the world's first laptop computer introduced in the market and by whom?
  25. John Napier invented Logarithm in
  26. Word length of a Personal Computer is ___
  27. Which device is used as the standard pointing device in a Graphical User Environment?
  28. A stand-alone system which produces one page of printed output at a time is
  29. If in a computer, 16 bits are used to specify address in a RAM, the number of addresses will be
  30. Coded entries which are used to gain access to a computer system are called