Question. The user can load and execute a program but cannot copy it. This process is? |
1 | A ______________ is diagram that depicts the flow of a program. |
2 | These ciphers replace a character or characters with a different character or characters, based on some key. |
3 | What do you call a technical person who is capable of understanding the basic requirements? |
4 | h command gives ___________ |
5 | The first widely-used high level language developed in 1957. |
6 | Components used for interconnecting dissimilar networks that use different communication protocols. |
7 | Saas stands for? |
8 | Attack in which a user creates a packet that appears to be something else. |
9 | The EBCDIC code for the character A is ______________ |
10 | Maintenance and review add to the useful life of the system but can consume large amounts of __________ |
11 | Under DES, the data encryption standard took a 64-bit block of data and subjected it to ______ levels of encryption. |
12 | The rate at which the problem size need to be increased to maintain efficiency. |
13 | When an algorithm is written in the form of a programming language, it becomes a _________ |
14 | Processor which is complex and expensive to produce is ________ |
15 | The sign magnitude representation of -9 is ___________ |
16 | Which of the following is not a type of computer on the basis of operation? |
17 | Which of the following is not a part of the program division in COBOL? |
18 | Forms that do not require any programming. |
19 | The action performed by a ___________ structure must eventually cause the loop to terminate. |
20 | The process of verifying the identity of a user. |