Question
a.
Main memory
b.
Cache memory
c.
Auxiliary memory
d.
None of the above
Posted under IT Fundamentals
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Devices that provide backup storage are called
Similar Questions
Discover Related MCQs
Q. BCD can represent only __________distinct character.
View solution
Q. The heart and the brain of a computer is
View solution
Q. Which of the following refers to loading two or more programs in the computer main memory and executing them concurrently?
View solution
Q. UNIX was originally developed in 1969 by employees of
View solution
Q. Which of the following device is used in a real-time processing?
View solution
Q. The ability of the CPU to serve many users connected to it through network is called
View solution
Q. A computer connected to a network is called a ________.
View solution
Q. In ________ topology, each device connects to a central point through cables in a network.
View solution
Q. Which of the following is an example of Star topology?
View solution
Q. FDDI is an example of _______.
View solution
Q. ________ refers to a network used to connect different equipments from remote areas.
View solution
Q. _______refer to the LANs connected through high-speed, seamless inter-connection within a ‘metropolitan’ area.
View solution
Q. _________ is the lower part of TCP/IP whose function is to handle the address part of each packet to enable it to be delivered to the right destination.
View solution
Q. ________is the simplest and most commonly used protocol for downloading/uploading a file from/to a server.
View solution
Q. _________ is a unique number associated with each computer making it uniquely identifiable amongst all the computers connected to the Internet.
View solution
Q. ________is the language for publishing hypertext pages on WWW.
View solution
Q. Examples of meta-search engines are
View solution
Q. Human speech can be effectively reproduces at a rate of
View solution
Q. When multiple topologies are put into one large topology, it is called
View solution
Q. The process of altering the data for the purpose of disruption is called
View solution
Suggested Topics
Are you eager to expand your knowledge beyond IT Fundamentals? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!