Question. A type of parallelism that uses micro architectural techniques. |
1 | In this type of VR environment, the subjects can perform both in the real and virtual environment. |
2 | Examination of the program step by step is called ______________ |
3 | A ________ is tested to ensure that information properly flows into and out of the system. |
4 | An algorithm in encryption is called _____________ |
5 | Which of the following is not a basic data type in C language? |
6 | A modulation technique that improves channel bandwidth utilization. |
7 | A thread becomes non runnable when? |
8 | Graphics composed of patterns of dots called pixels. |
9 | The ______level helps application programs hide the details of data types. |
10 | Which of these is a part of network identification? |
11 | If M denotes the number of memory locations and N denotes the word size, then an expression that denotes the storage capacity is ______________ |
12 | The action performed by a ___________ structure must eventually cause the loop to terminate. |
13 | What is NaN in IEEE standards? |
14 | Which of the following is often called the double precision format? |
15 | A serially connected system of all the hubs of networks. |
16 | The purpose of communication system is to transfer information from _______ to the destination |
17 | A technique that allocates time slots dynamically. |
18 | The process of drawing a flowchart for an algorithm is called __________ |
19 | ULSI stands for? |
20 | A technique that enables light field which is generally the product of a light source scattered off objects. |