Question. The media texts may throw up discourses and are called ____________ |
1 | Creating a computer or paper audit that can help detect wrong doings. |
2 | Which of the following is a common testing conducted by the developers? |
3 | ____________ provide the detailed, specific application being developed. |
4 | A software metric that provides a quantitative measure of the logical complexity of a program. |
5 | Which of the following part of a processor contains the hardware necessary to perform all the operations required by a computer? |
6 | An indirect form of surveillance. |
7 | A special request originated from some device to the CPU to acquire some of its time is called ___________ |
8 | _________________ defines the assigned ordering among the characters used by the computer. |
9 | The magnetic tape is generally a plastic ribbon coated with ______ |
10 | A malicious code hidden inside a seemingly harmless piece of code. |
11 | A parallelism based on increasing processor word size. |
12 | 1 yottabyte = ______________ |
13 | In this technique, there is no direct contact between users and their programs during execution. |
14 | Input Devices that use a special ink that is used for converting pictures, maps and drawings into digital format. |
15 | A communication between a computer and a keyboard involves ____________ duplex transmission |
16 | Which of the following is a data transfer instruction? |
17 | Attack in which a user creates a packet that appears to be something else. |
18 | The carrier wave is a _________ |
19 | The devices that work the best with contact management. |
20 | Express the decimal format of the signed binary number (101010)2 . |