Question. The two types of ASCII are _____________ and ____________ |
1 | The memory implemented using the semiconductor chips is _________ |
2 | _____________ enables the migration of the virtual image from one physical machine to another |
3 | Connecting two or more networks to form a single network is called : |
4 | An algorithm in encryption is called _____________ |
5 | A set of overlapping divisions in the main memory are called _______ |
6 | Causing the CPU to step through a series of micro operations is called _________ |
7 | The word ____________comes from the name of a Persian mathematician Abu Ja’far Mohammed ibn-i Musa al Khowarizmi. |
8 | A programming technique in which the focus is on doing things. |
9 | The instructions that tell the assembler what to do. |
10 | What will be the value obtained after multiplication of (-2) * (-3) using Booth’s Algorithm? |
11 | The representation of the number 8 in binary in ASCII-8 format _________ |
12 | Which of the following is not a way of acquiring software? |
13 | Which of the following does not come under text analysis? |
14 | The language made up of binary coded instructions. |
15 | Memory organization in which users write programs in modules with different characteristics. |
16 | A collection of related data. |
17 | The process of producing useful information for the user is called ___________ |
18 | ______________ define how the locations can be used. |
19 | A valid variable declaration in FORTRAN is __________ |
20 | A transmission mode that can transmit data in both the directions but transmits in only one direction at a time. |