Question. A method that must be overridden while extending threads. |
1 | Set of programs which consist of full documentation. |
2 | These ciphers replace a character or characters with a different character or characters, based on some key. |
3 | The probability of failure-free operation of a software application in a specified environment for a specified time. |
4 | JIT stands for? |
5 | Controlling the phase is referred as __________ |
6 | These cloud services are of the form of utility computing i.e. the _________ uses these services pay-as-you-go model. |
7 | What does GUI stand for? |
8 | Virtual Memory can be implemented via __________ |
9 | The devices that used to give single or multiple colored images and drawings are ____________ |
10 | Examination of the program step by step is called ______________ |
11 | The process of making digital information work for you is called ___________ |
12 | Which of the following is not a keyword? |
13 | The number of values a function can return at a time? |
14 | Set of a program which consists of full documentation. |
15 | A term that refers to the way in which the nodes of a network are linked together. |
16 | A term for simultaneous access to a resource, physical or logical. |
17 | CISC stands for ____________ |
18 | Incorporating changes in an existing system to enhance update or upgrade its features. |
19 | Which of the following is not a data type? |
20 | WDM stands for? |