Question. The first widely-used high level language developed in 1957. |
1 | Which of the following is not a way of acquiring software? |
2 | This characteristic often draws the line between what is feasible and what is impossible. |
3 | The period of ________ generation was 1952-1964. |
4 | Secondary memory is the long term store for programs and data while main memory holds program and data currently in use. What kind of an organization is this? |
5 | The protocol designed to make the security of wireless LAN as good as that of wired LAN. |
6 | The operation that does not involves clock cycles is _________ |
7 | Examination of the program step by step is called ______________ |
8 | Components that operate at the network layer of the OSI model. |
9 | Which of the following is not a visible register? |
10 | Security features that control that can access resources in the OS. |
11 | MAR stands for ___________ |
12 | The process of verifying the identity of a user. |
13 | The maximum number of bits sufficient to represent a hexadecimal number in binary: |
14 | What do we call the point(decimal) in any hexadecimal number of the form 111.A3? |
15 | What do you call a specific instruction designed to do a task? |
16 | Which of the following is written for getting help in GDB? |
17 | A system wherein items are added from one and removed from the other end. |
18 | In this type of cloud, the cloud is composed of multiple internal or external cloud. |
19 | What does FORTRAN stands for? |
20 | Which of the following is a name of plotter as well as a printer? |