Find out who is not the inventor of transistors among following names

A. John Burdeen

B. William Shockley

C. Walter Brattain

D. Lee de Forest

You can do it
  1. What is required when more than one person uses a central computer at the same time?
  2. What is a light pen?
  3. EEPROM stands for
  4. Collecting personal information and effectively posing as another individual is known as the crime of:
  5. The two major types of computer chips are
  6. A modern electronic computer is a machine that is meant for
  7. A device designed to read information encoded into a small plastic card is
  8. ABC is a
  9. ________ is the key we use to run the selected command.
  10. Daisy wheel printer is a type of
  11. It was in 2028 BS the was brought in to calculate census datA.
  12. BCD is
  13. Nepal brought a computer for census of 2028 BS. This computer was of
  14. The ________ data mining technique derives rules from real-world case examples.
  15. A DVD is an example of a (n)-
  16. Which part of the computer is used for calculating and comparing?
  17. What was the first computer to perform all calculation using electronics rather than wheels, ratchets,…
  18. Mini computers and micro computers are from which generation of computers?
  19. Which of the following is the largest manufacturer of Hard Disk Drives?
  20. Which of the following generation computers had expensive operation cost?
  21. The first general purpose electronic computer in the world was
  22. A byte consists of
  23. Which of the following is a storage device?
  24. Which of the following storage device can store the largest amount of data?
  25. Who designed the first electronics computer ENIAC?
  26. EEPROM stands for
  27. A physical connection between the microprocessor memory and other parts of the microcomputer is known…
  28. Hardware or software designed to guard against unauthorized access to a computer network is known as…
  29. Which part of the computer is directly involved in executing the instructions of the computer program?
  30. Which of the following is a way to access secondary memory?