1351 . Access time is--
- A. seek time + latency time
- B. seek time
- C. seek time - latency time
- D. latency time
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
1353 . A term used to describe interconnected computer configuration is---
- A. Multiprogramming
- B. Modulation
- C. Multiprocessing
- D. Micro program sequence
![]() |
![]() |
![]() |
![]() |
1354 . A technique used by codes to convert an analog signal into a digital bit stream is known as--
- A. Pulse code modulation
- B. Pluse stretcher
- C. Query processing
- D. Queue management
![]() |
![]() |
![]() |
![]() |
1355 . A standalone program that has been modified to work on a LAN by including concurrency controls such as file and record locking is an example of--
- A. LAN intrinsic software
- B. LAN aware software
- C. Groupware
- D. LAN ignorant software
![]() |
![]() |
![]() |
![]() |
1356 . A stack is also called-
- A. Last In First Out
- B. First Last Out
- C. Last In Last Out
- D. First In First Out
![]() |
![]() |
![]() |
![]() |
বিভিন্ন মন্ত্রণালয় | সহকারী ম্যানটেনেন্স প্রকৌশলী | 24-05-2022
More
1357 . A single communication system that transfers and connects the data between major components inside a computer is :
- A. Address Bus
- B. Data Bus
- C. System Bus
- D. Control Bus
![]() |
![]() |
![]() |
![]() |
Senior Officer (IT) - Sonali-Janata-BD Krishi-BD Development Bank Ltd - 30.11.2018
More
1358 . A record is a -
- A. Collection of bits
- B. Collection of fields
- C. Collection of bytes
- D. Collection of files
![]() |
![]() |
![]() |
![]() |
1359 . A record is a--
- A. Collection of bits
- B. Collection of fields
- C. Collection of bytes
- D. Collection of files
![]() |
![]() |
![]() |
![]() |
1360 . A RAM chip is labeled as ‘2Mx16’. What is the word-size of the RAM?
- A. 2 Bytes
- B. 16 Bytes
- C. 2x16 MB
- D. 8 Bits
![]() |
![]() |
![]() |
![]() |
1361 . A proxy server is used for which of the following?
- A. To provide security against unauthorized users
- B. To process client requests for web pages
- C. To process client requests for database access
- D. None
![]() |
![]() |
![]() |
![]() |
1362 . A Primary key must also be __
- A. Foreign key
- B. Unique
- C. Identical
- D. Case sensitive
![]() |
![]() |
![]() |
![]() |
Senior Officer (IT) - Sonali-Janata-BD Krishi-BD Development Bank Ltd - 30.11.2018
More
1363 . A nonstandard HTML extension that causes scrolling text to appear as part of a Web page is :
- A. DHCP
- B. mask off
- C. Dhrystone
- D. marquce
![]() |
![]() |
![]() |
![]() |
Senior Officer (IT) - Sonali-Janata-BD Krishi-BD Development Bank Ltd - 30.11.2018
More
![]() |
![]() |
![]() |
![]() |
1365 . A microsoft Windows is a/an -
- A. Graphic program
- B. Operating system
- C. word processing
- D. Database program
![]() |
![]() |
![]() |
![]() |
অফিসার (ক্যাশ ) - Sonali | Rupali | BD Krishi | Rajshahi Krishi Unnayn | Investment Corporation Of Bangladesh - ২৯. ০৩.২০১৯
More