Q ➤ 1. What is the Name of the Technique for Assigning a Memory Address to each Input/Output Device in the Security Account Manager System?


Q ➤ 2. How is Forward Reference Table (FRT) Arranged?


Q ➤ 3. Which Computer Program does Storage Mapping?


Q ➤ 4. What is the Binary Value of 100?


Q ➤ 5. Which Program is Available for Computer Users as a part of the Software Package?


Q ➤ 6. Which Type of Computer is found in a Digital Watch?


Q ➤ 7. Name of the Information in Memory that is no Longer Valid or Wanted?


Q ➤ 8. What is the Name of the First Computer Worm?


Q ➤ 9. Which Computer Programs Manage the Hardware/Software of a Computer?


Q ➤ 10. Who is the Co-Founder of Microsoft?