Q ➤ 1. What is the Name of the Technique for Assigning a Memory Address to each Input/Output Device in the Security Account Manager System?
Q ➤ 2. How is Forward Reference Table (FRT) Arranged?
Q ➤ 3. Which Computer Program does Storage Mapping?
Q ➤ 4. What is the Binary Value of 100?
Q ➤ 5. Which Program is Available for Computer Users as a part of the Software Package?
Q ➤ 6. Which Type of Computer is found in a Digital Watch?
Q ➤ 7. Name of the Information in Memory that is no Longer Valid or Wanted?
Q ➤ 8. What is the Name of the First Computer Worm?
Q ➤ 9. Which Computer Programs Manage the Hardware/Software of a Computer?
Q ➤ 10. Who is the Co-Founder of Microsoft?