Answer:
There is no table, so I can only comment on the statements:
The binary value of decimal 10 is A. ==> False, however A is a hexadecimal representation of 10.
The binary value of decimal 13 is 1001 ==> False, 13 would be 1101.
The binary value of decimal 15 is 1111. ==> True.
The binary value of decimal 14 is E. ==> Again E is a hexadecimal representation of 14.
The designer could use the measurements in pixels.
Answer:
1. B
2. D
3. C
4. A
5. B
Explanation:
1. To check the integrity of your hard disk and fix various file system errors, the Windows utility which should be implemented is Check disk (Chkdsk). This utility is always used with the command line interface (CLI) with the command "chkdsk."
2. An event or action took place and it caused damage to data, hardware, software and processing capability of the computer. From the statement given, security risks are being described. Any event or action that is capable of causing a problem to a computer system is considered to be a security risk and should be prevented through the use of an appropriate utility software.
3. Virus is a software program that can infect, damage and disrupts the whole computer system.
4. To protect the whole computer system, the software utility which is needed is an Anti-virus.
5. To avoid losing valuable data to your computer, the most important thing to do is to regularly back-up your files.
Answer:
An embedded system is a part of a larger system which has either one or a limited number of dedicated functions.
It doesn't require much power to run and is cheap to make and design.
Explanation:
Examples include: cars, microwaves, traffic lights, washing machines, phones etc
Answer: False
Explanation:
The statement that "Peacekeeper text is non-printing text that indicates where you can type" is false.
The non-printing text which shows where on exam type is referred to as the peaceholder text. It is usually an hint which can be used to fill in the actual text.