Question. Which of the following is not a way of acquiring software? |
1 | Which is not an objective of network security? |
2 | The placement of information within a cell at the left edge, right edge, or centered is |
3 | A hardware based system that has autonomy, social ability and reactivity. |
4 | Several instructions execution simultaneously in _________ |
5 | Convert (22)8 into its corresponding decimal number. |
6 | RFID stands for? |
7 | What is correct instruction if you want the control to go to the location 2000h? |
8 | ______________ leads to concurrency. |
9 | Which of the following is a myth in testing? |
10 | Which of the following is not a type of browser? |
11 | Which of the following is the fastest means of memory access for CPU? |
12 | The probability of failure-free operation of a software application in a specified environment for a specified time. |
13 | ____________ is basically a form of pictorial presentation. |
14 | Which of the following invention gave birth to the much cheaper microcomputers? |
15 | TCP stands for? |
16 | It is a mediated environment which creates the sensation in a user of being present in a (physical) surrounding. |
17 | What does PC stand for? |
18 | The IEEE standard followed by almost all the computers for floating point arithmetic _____ |
19 | Prolog comes under ___________ |
20 | Allocated size of a file comes under? |