Question. The analysis of _________ is a process of deconstruction that investigates the operations of texts, their constructions, the ways they produce meanings, what those meanings may be. |
1 | The data division is used to ________ |
2 | Numbers used in packed decimal format can be used for _____________ operations. |
3 | This determines the type of protocol to be used. |
4 | Which of the following is not a process state? |
5 | The process of verifying the identity of a user. |
6 | TCP stands for? |
7 | Public domain software is usually |
8 | Hexadecimal Addition of (3A5)16 and (1B2)16 will give : |
9 | Size of the ________ memory mainly depends on the size of the address bus. |
10 | Which of the following isn’t a type of transmission mode? |
11 | The father of ioT. |
12 | A ________ is a directed graph that describes the flow of execution control of the program |
13 | The program written by the programmer in high level language is called _____________ |
14 | Triple-DES has ______ keys. |
15 | A communication between a computer and a keyboard involves ____________ duplex transmission |
16 | The analysis of _________ is a process of deconstruction that investigates the operations of texts, their constructions, the ways they produce meanings, what those meanings may be. |
17 | To speed up the processor operations, the processor includes some internal memory storage locations, called ___________ |
18 | ___________ itself is a file owned by the operating system |
19 | A technique that allows more than one program to be ready for execution and provides the ability to switch from one process to another. |
20 | Security features that control that can access resources in the OS. |