Question. Which of the following is created when a user opens an account in the computer system? |
1 | __________ analysis regards texts as collections of signs or paradigms and possible meanings, operating within the bounds of various codes. |
2 | A modulation technique that improves channel bandwidth utilization. |
3 | A process of making the encrypted text readable again. |
4 | Java extension used in threads? |
5 | The Excess-3 representation of (0100)BCD is __________ |
6 | A point not considered in system evaluation. |
7 | Execution of several activities at the same time. |
8 | Which of the following is not a point-and-draw device? |
9 | Which of the following processor has a fixed length of instructions? |
10 | _______ searches for smallest block. The fragment left behind is small as possible. |
11 | An OSS for communication purpose. |
12 | The _____________ in a document and the order in which it is presented is referred to as the document’s logical structure. |
13 | ____________ operate at bottom two layers of the OSI model. |
14 | A guideline for the OSS licenses other than the GPL. |
15 | What is the full form of FSM? |
16 | An attack in which the site is not capable of answering valid request. |
17 | TCP stands for? |
18 | The _______ calls certain procedures on remote systems and is used to perform synchronous or asynchronous interactions between systems |
19 | Programming based on stepwise refinement process. |
20 | The software substituted for hardware and stored in ROM. |