A. MANIAC
B. ENIAC
C. UNIVAC
D. EDSAC
Submitted by: Malik Asghar Hussain
The UNIVAC I (UNIVersal Automatic Computer I) was the first commercial computer produced in the United States. It was designed principally by J. Presper Eckert and John Mauchly, the inventors of the ENIAC.
Related Mcqs:
- _____________is computer software designed to operate the computer hardware and to provide platform for running application software?
A. Application software
B. System software
C. Software
D. None of these - The process of transferring files from a computer on the Internet to your computer is called_____________?
A. Downloading
B. uploading
C. FTP
D. JPEG - Which part of the computer is directly involved in executing the instructions of the computer program?
A. The scanner
B. The main storage
C. The secondary storage
D. The processor - ____________computer is small general purpose micro computer, but larger than portable computer?
A. Hybrid
B. Digital
C. Desktop
D. Laptop - A(n)_____________is a set of programs designed to manage the resources of a computer, including starting the computer, managing programs, managing memory and coordinating tasks between input and output devices?
A. application suite
B.compiler
C. input/output system
D. Operating system
E. None of these - What computer virus holds the record for being the most widespread computer virus?
A. I Love You
B. Nimdad
C. Melissa
D. ChristmasSubmitted by: Tasneem Ahmad
- A program that acts as an intermediary between a user of a computer and the computer hardware:
A. Utility Software
B. Computer Software
C. Operating System
D. Application SoftwareSubmitted by: SUHAIL AHMED KALHORO
- Who is the father of Computer science?
A. Allen Turing
B. Charles Babbage
C. Simur Cray
D. Augusta Adaming - Process of loading and fixing or bypassing errors in computer program code is called___________?
A. Debugging
B. Defusing
C. Defragmenting
D. DefrostingSubmitted by: Sufian Suri
- What is the function of a firewall in computer networking?
A. Monitor website traffic
B. Block unwanted email
C. Protect against unauthorized access and threats
D. Increase internet speedSubmitted by: Zafar Ullah