Question. The field that covers a variety of computer networks both public and private, that are used in everyday jobs. |
1 | An encryption technique with 2 keys is ______________ |
2 | The probability that a software application is operating according to requirements at a given point in time. |
3 | Which of the following invention gave birth to the much cheaper microcomputers? |
4 | What do we call the point(decimal) in any hexadecimal number of the form 111.A3? |
5 | ______________ is used to show hierarchy in a pseudo code. |
6 | A graphics method in which one object is transformed into another. |
7 | MS-Word comes under __________ |
8 | A model that is the demo implementation of the system. |
9 | OSS stands for: |
10 | The numbers used to represent numeric values in EBCDIC are _______ |
11 | Input Devices that use a special ink that is used for converting pictures, maps and drawings into digital format. |
12 | The period of ________ generation was 1952-1964. |
13 | A program that can execute high-level language programs. |
14 | Which of the following is not a part of the program division in COBOL? |
15 | How is the number 5 represented in non-positional number system? |
16 | run > outfile command is used to _________ |
17 | . The unattended interactive information systems such as automatic teller machine or ATM is called as _________ |
18 | HLDA stands for _______ |
19 | Which of the following is known as the language made up of binary-coded instructions? |
20 | The data size of a word is _________ |