Question. A system of interlinked documents, websites, portals etc. accessed through the Internet. |
1 | A unique piece of information that is used in encryption. |
2 | Which are the input devices that enable direct data entry into a computer system from source documents? |
3 | What kind of a flag is the sign flag? |
4 | A communication between a computer and a keyboard involves ____________ duplex transmission |
5 | __________________ is a straightforward method of representing positive and negative numbers. |
6 | The action performed by a ___________ structure must eventually cause the loop to terminate. |
7 | ___________ is done in the development phase by the debuggers. |
8 | A printer that prints one line at a time and has a predefined set of characters is called _______ |
9 | URL stands for? |
10 | Express the ASCII equivalent of the signed binary number (00110010)2. |
11 | Methodology in which project management processes were step-by step. |
12 | Which of the following isn’t a part of a spreadsheet? |
13 | Configuration where many independent computer systems are connected. |
14 | Causing the CPU to step through a series of micro operations is called _________ |
15 | Which is not an objective of network security? |
16 | A software metric that provides a quantitative measure of the logical complexity of a program. |
17 | Source program is compiled to an intermediate form called ___________ |
18 | A simple notation for the representation of control flow. |
19 | An expression for the calculation of cyclomatic complexity. |
20 | A ________ is tested to ensure that information properly flows into and out of the system. |