When was the first electro-mechanical computer developed?

A. 1880

B. 1990

C. 1944

D. None of above

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. A modern electronic computer is a machine that is meant for
  2. If in a computer, 16 bits are used to specify address in a RAM, the number of addresses will be
  3. MSI stands for
  4. A computer consists of
  5. Once you load the suitable program and provide required data, computer does not need human intervention.…
  6. Access time is
  7. MIS is designed to provide information needed for effective decision making by?
  8. A set of flip flops integrated together is called ____
  9. CD-ROM stands for
  10. The computer code for the interchange of information between terminals is
  11. Which was the world's first minicomputer and when was it introduced?
  12. Which of the following required large computer memory?
  13. A floppy disk contains
  14. Which of the following is not anti-viruses software?
  15. Which of the following computer implemented binary numbers, perform calculations using electronics and…
  16. The computer that can input analog signals and return result in digital form
  17. ________ is the key we use to run the selected command.
  18. Which of the following memories needs refresh?
  19. EEPROM stands for
  20. What is embedded system?
  21. Which of the following are (is) considered to be video component?
  22. How many address lines are needed to address each machine location in a 2048 x 4 memory chip?
  23. A state. is a bi-stable electronic circuit that has
  24. An application suitable for sequential processing is
  25. In what respect human beings are superior to computers?
  26. Storage capacity of magnetic disk depends on
  27. Current SIMMs have either or connectors (pins)
  28. Unwanted repetitious messages, such as unsolicited bulk e-mail is known as
  29. A set of information that defines the status of resources allocated to a process isA) Process control
  30. Coded entries which are used to gain access to a computer system are called