Question. Another notation for exponentiation. |
1 | A term to describe the extent to which a user can modify form and content of a mediated environment. |
2 | Which is not an objective of network security? |
3 | ____________ storage is a system where a robotic arm will connect or disconnect off-line mass storage media according to the computer operating system demands. |
4 | A gateway for the server side object. |
5 | This is not a part of the signing on the procedure. |
6 | ______computers are lower to mainframe computers in terms of speed and storage capacity. |
7 | What are the entities whose values can be changed called? |
8 | Another notation for exponentiation. |
9 | Which of the following is not a point-and-draw device? |
10 | An encryption technique with 2 keys is ______________ |
11 | Which of the following processor has a fixed length of instructions? |
12 | The statement that tells the computer to get a value from an input device and store it in a memory location. |
13 | The software substituted for hardware and stored in ROM. |
14 | The length of a register is called _______ |
15 | The probability of failure-free operation of a software application in a specified environment for a specified time. |
16 | The EBCDIC value of the number 345 in zoned format is __________ |
17 | Causing the CPU to step through a series of micro operations is called _________ |
18 | Technologies that allow the user to see the real world, with virtual objects composited in the real world. |
19 | 7’s complement of 432 is _________________ |
20 | A set of activities that ensure that software correctly implements a specific function. |