Any storage device added to a computer beyond the immediately usable main storage is known as

A. Floppy disk

B. Hard disk

C. Backing store

D. Punched card

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. An example of a digital device can be
  2. Which of the following is still useful for adding numbers?
  3. The output quality of a printer is measured by
  4. What was the first computer to perform all calculation using electronics rather than wheels, ratchets,…
  5. CD-ROM stands for
  6. Which of the following have low failure rate?
  7. Instructions and memory address are represented by
  8. An _________ Device is any device that provides information, which is sent to the CPU
  9. Which of the following is a programming language?
  10. Before a disk drive can access any sector record, a computer program has to provide the record's disk…
  11. Multi user systems provided cost savings for small business because they use a single processing unit…
  12. Where does most data go first with in a computer memory hierarchy?
  13. Computers built before the First Generation of computers were:
  14. Any storage device added to a computer beyond the immediately usable main storage is known as
  15. In analogue computer
  16. Registers, which are partially visible to users and used to hold conditional, are known as
  17. Which was the computer conceived by Babbage?
  18. A name or number used to identify a storage location is called
  19. What do you call the programs that are used to find out possible faults and their causes?
  20. A stand-alone system which produces one page of printed output at a time is
  21. ______ computers are also called personal computers
  22. Who invented Mark I?
  23. A Compiler is
  24. ENIAC uses
  25. An error in software or hardware is called a bug. What is the alternative computer jargon for it?
  26. When was Apple Macintosh II microcomputer introduced in the market?
  27. A digital computer did not score over an analog computer in terms of
  28. Collecting personal information and effectively posing as another individual is known as the crime of:
  29. Hardware or software designed to guard against unauthorized access to a computer network is known as…
  30. Which computers used operating systems by Microsoft?