A device that connects to a network without the use of cables is said to be-

A. Distributed

B. free

C. centralized

D. none of these

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. Which of the following code used in present day computing was developed by IBM Corporation?
  2. A computer program that converts an entire program into machine language at one time is called a/ an
  3. The process of transferring files from a computer on the Internet to your computer is called
  4. The terminal device that functions as a cash register, computer terminal, and OCR reader is the:
  5. ________ Store data or information temporarily and pass it on as directed by the control unit
  6. Which is valid statement?
  7. Slide Rules was invented in
  8. ________ computer is a medium sized computer
  9. Which computer support co-processors?
  10. ENIAC uses
  11. A group of magnetic tapes, videos or terminals usually under the control of one master is
  12. A directly accessible appointment calendar is feature of a __ resident package
  13. ASCII stands for
  14. Personnel who design, program, operates and maintains computer equipment refers to
  15. To access properties of an object, the mouse technique to use is-
  16. Which of the following is not an input device?
  17. Which of the following storage devices can store maximum amount of data?
  18. A paper printout of a document is known as
  19. Which of the following is a class of computers based on model?
  20. The two major types of computer chips are
  21. Before a disk drive can access any sector record, a computer program has to provide the record's disk…
  22. RJ45 UTP cable has ________ Cables.
  23. A number that is used to control the form of another number is known as
  24. Which of the following can store information in the form of microscopic pits on metal disks.
  25. Which of the following is used as a primary storage device?
  26. Which of the following computer language is used for artificial intelligence?
  27. Junk e-mail is also called
  28. The advantage of COM are its __ and __
  29. Hardware or software designed to guard against unauthorized access to a computer network is known as…
  30. An IBM system/38 represents the computer class of: