You can do it
  1. Which of the following programming language started from second generation?
  2. Which generation of computer is still under development
  3. The value of each bead in heaven is
  4. How was the generation of computer classified?
  5. Which of the following is not anti- viruses' software?
  6. The 2's compliment of a binary no. is obtained by adding________to its 1's compliment.
  7. Which electronic component was made out of semiconductor material?
  8. Computers with 80286 microprocessor is
  9. When was the world's first laptop computer introduced in the market and by whom?
  10. LSI, VLSI & ULSI chips were used in which generation?
  11. The scrambling of code is known as:
  12. Before a disk can be used to store datA. It must be
  13. On a PC, how much memory is available to application software?
  14. The memory which is programmed at the time it is manufactured
  15. ________ refers to electronic trespassing or criminal hacking.
  16. What do you call the programs that are used to find out possible faults and their causes?
  17. Which of the following statement is valid?
  18. Collecting personal information and effectively posing as another individual is known as the crime of:
  19. The Width of a processor's data path is measured in bits. Which of the following are common data paths?
  20. Bit stands for
  21. The most commonly used standard data code to represent alphabetical, numerical and punctuation characters…
  22. The BIOS is the abbreviation of .
  23. A name or number used to identify a storage location is called
  24. Following IC chip integrates 100 thousands electronic components per chip
  25. The term ________ designates equipment that might be added to a computer system to Enhance its functionality.
  26. Operating system, editors, and debuggers comes under?
  27. Which of the following statements is true?
  28. What was the expected feature of fifth generation computers when Japan started FGCS?
  29. If in a computer, 16 bits are used to specify address in a RAM, the number of addresses will be
  30. Circular division of disks to store and retrieve data are known as