A name or number used to identify storage location devices?

A. A byte

B. A record

C. An address

D. All of above

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. Which of the following class of computers cannot support multiple users simultaneously?
  2. Which of the following is the 1's complement of 10?
  3. Which device is used to backup the data?
  4. CAD stands for
  5. The metal disks, which are permanently housed in, sealed and contamination free containers are called
  6. In 1999, the Melissa virus was a widely publicised:
  7. The most commonly used standard data code to represent alphabetical, numerical and punctuation characters…
  8. Which number system is usually followed in a typical 32-bit computer?
  9. What type of device is computer keyboard?
  10. A hybrid computer uses a _____ to convert digital signals from a computer into analog signals.
  11. Which of the following is associated with error detector?
  12. Storage capacity of magnetic disk depends on
  13. What was the first computer to perform all calculation using electronics rather than wheels, ratchets,…
  14. Which unit holds data temporarily?
  15. Bit stands for
  16. The ALU of a computer responds to the commands coming from
  17. Which statement is valid about interpreter?
  18. Which of the following disk is fixed disk?
  19. You organize files by storing them in
  20. The earliest calculating devices are
  21. What type of control pins are needed in a microprocessor to regulate traffic on the bus, in order to…
  22. The act of retrieving existing data from memory is called
  23. How many address lines are needed to address each machine location in a 2048 x 4 memory chip?
  24. The term gigabyte refers to
  25. Which is the largest computer?
  26. Microprocessors as switching devices are for which generation computers?
  27. Which of the following is not a form of data?
  28. A kind of scanner MICR is the short form of
  29. When a logic bomb is activated by a time-related event, it is known as a:
  30. All of the following are examples of real security and privacy risks EXCEPT