Question. The ______level helps application programs hide the details of data types. |
1 | These cloud services are of the form of utility computing i.e. the _________ uses these services pay-as-you-go model. |
2 | The BCD representation of (34)10 is _______________ |
3 | The number of sign bits in a 32-bit IEEE format __________ |
4 | The probability that a software application is operating according to requirements at a given point in time. |
5 | Which of the following processor has a fixed length of instructions? |
6 | CISC stands for ____________ |
7 | Which of the following is not involved in working of IoT? |
8 | The number of values a function can return at a time? |
9 | The participating computers in a network are referred to as: |
10 | The segment containing data values passed to functions and procedures within the program. |
11 | A modulation technique that improves channel bandwidth utilization. |
12 | The web works on this model. |
13 | A topology that involves Tokens. |
14 | The rules that give meaning to the instructions. |
15 | The restrictions placed on the data. |
16 | A serially connected system of all the hubs of networks. |
17 | Incorporating changes in an existing system to enhance update or upgrade its features. |
18 | Word length of a personal computer ___________ |
19 | They normally interact with the system via user interface provided by the application software. |
20 | URL stands for? |