Question. Controlling the phase is referred as __________ |
1 | The functions of execution and sequencing are performed by using ______________ |
2 | Which of the following should describe the technical terms used in the document? |
3 | A text file that contains our program is called as __________ |
4 | A level that describes how a record is stored. |
5 | A malicious code hidden inside a seemingly harmless piece of code. |
6 | A software that can be freely accessed and modified. |
7 | A direct reference of specific location. |
8 | The EBCDIC code for the character A is ______________ |
9 | An individual who plans and directs the work. |
10 | Which of the following is not an object-based logical model? |
11 | The 9’s complement of 6578 is ___________ |
12 | A ________ is a directed graph that describes the flow of execution control of the program |
13 | A technique in which a program attacks a network by exploiting IP broadcast addressing operations |
14 | Files that maintain the hierarchical structure of the file system. |
15 | Which of the following is not an example of system software? |
16 | A language supported by MS. Net platform. |
17 | Which of the following statements should be used to obtain a remainder after dividing 3.14 by 2.1 ? |
18 | Which of the following monitor looks like a television and are normally used with non-portable computer systems? |
19 | Which of the following computers are lower than mainframe computers in terms of speed and storage capacity? |
20 | Process of evaluating a system to verify whether or not it is meeting its objectives. |