Question. A graphics method in which one object is transformed into another. |
1 | A parallelism based on increasing processor word size. |
2 | A testing conducted at the developer’s site under validation testing. |
3 | A type of cipher that uses multiple alphabetic strings. |
4 | The result obtained on subtraction using 2s complement of 1111-0010 will be _________ |
5 | An approach that designs test cases by looking at the allowable data values. |
6 | An attack in which the site is not capable of answering valid request. |
7 | Interpreter is used as a translator for __________ |
8 | Attack in which a user creates a packet that appears to be something else. |
9 | Connecting two or more networks to form a single network is called : |
10 | A methodology used to develop behavior-based autonomous agents. |
11 | The architecture that uses a tighter coupling between the compiler and the processor is ____________ |
12 | Any computer that can access the server is called? |
13 | DBMS is a set of __________ to access the data. |
14 | In this type of VR environment, the three-dimensional scene is considered as a part of the physical environment. |
15 | The representation of the number 8 in binary in ASCII-8 format _________ |
16 | In FORTRAN, the declarations of variables can be modified using the _____ parameter. |
17 | A guideline for the OSS licenses other than the GPL. |
18 | A standard for unit testing. |
19 | The EBCDIC code for the character A is ______________ |
20 | The process of verifying the identity of a user. |