Question. If you are given a word of size n bits the range of 2s complement of binary numbers is ________ |
1 | The sign magnitude representation of -9 is ___________ |
2 | ____________ operate at bottom two layers of the OSI model. |
3 | The forms that can be used for a variety of inventory applications. |
4 | Which of the following is often called the double precision format? |
5 | A person who enjoys learning details about computers and how to enhance their capabilities. |
6 | Which of the following is a loop statement? |
7 | The following box denotes? |
8 | A program that can execute high-level language programs. |
9 | Which of the following processor has a fixed length of instructions? |
10 | Which of the following is the correct abbreviation of COMPUTER? |
11 | A technique that allocates time slots dynamically. |
12 | CISC stands for ____________ |
13 | __________________ refers to the logical structuring of records. |
14 | Allows the user to create and maintain a personal list of favorite URL addresses. |
15 | A section in HTML that contains generic information about the document. |
16 | An example of FDM: |
17 | The ___________ layer, which provides the interface that client and server application objects use to interact with each other. |
18 | A parallelism based on increasing processor word size. |
19 | Attack in which a user creates a packet that appears to be something else. |
20 | ULSI stands for? |