Question. Booths Algorithm is applied on _____________ |
1 | _______________ is the assembly language for an imaginary architecture. |
2 | Which of the following is incorrect? |
3 | Connecting two or more networks to form a single network is called : |
4 | A unique piece of information that is used in encryption. |
5 | What does PC stand for? |
6 | In this technique, there is a link between subscriber and network and a local loop. |
7 | GKS stands for? |
8 | Which is not an objective of network security? |
9 | MFD stands for? |
10 | A planned program if work that requires a definitive amount of time, effort and planning to complete. |
11 | In this type of VR environment, the subjects can perform both in the real and virtual environment. |
12 | A type of cipher that uses multiple alphabetic strings. |
13 | The number of characters/second that can be transmitted to the memory from the tape is denoted by the term. |
14 | A small data file in the browser. |
15 | Programming based on stepwise refinement process. |
16 | Allows the user to create and maintain a personal list of favorite URL addresses. |
17 | Process of evaluating a system to verify whether or not it is meeting its objectives. |
18 | In this technique, there is no direct contact between users and their programs during execution. |
19 | Which of the following is a common testing conducted by the developers? |
20 | Which of the following holds the last instruction fetched? |