Question. _____________ Conducted at developers site. |
1 | Components that operate at the network layer of the OSI model. |
2 | MIPS stands for? |
3 | The 1 s complement of 0.101 is _________________ |
4 | These ciphers replace a character or characters with a different character or characters, based on some key. |
5 | They normally interact with the system via user interface provided by the application software. |
6 | Source program is compiled to an intermediate form called ___________ |
7 | The binary number obtained after applying RSC on 11010 will be ___________ |
8 | Technologies that completely involve a user inside a synthetic environment. |
9 | Express the decimal format of the signed binary number (10010)2 |
10 | A tracking based on geo-location information. |
11 | The operation that does not involves clock cycles is _________ |
12 | If Booths Multiplication is performed on the numbers 22*3 then what is 3 referred to as __________ |
13 | MAR stands for ___________ |
14 | What are the entities whose values can be changed called? |
15 | The cell that is in use. |
16 | Which of the following storage is a system where a robotic arm will connect or disconnect off-line mass storage media according to the computer operating system demands? |
17 | Executables might be called ________ |
18 | Which of the following is not a part of the Identification division? |
19 | Process of evaluating a system to verify whether or not it is meeting its objectives. |
20 | A characteristic of an entity. |