Question. Which is not an objective of network security? |
1 | Hexadecimal Addition of (3A5)16 and (1B2)16 will give : |
2 | COBOL stands for _________ |
3 | Which of the following is designed to control the operations of a computer? |
4 | Study of creating a d using encryption and decryption techniques. |
5 | A standardized language used for commercial applications. |
6 | The number of clock cycles per second is referred as ________ |
7 | Attack in which a user creates a packet that appears to be something else. |
8 | The cell that is in use. |
9 | To locate the exact location of data in memory, we need the starting address of the segment, which is found in the DS register and an offset value. This offset value is also called? |
10 | A level that describes data stored in a database and the relationships among the data. |
11 | The actual content in the database at a particular point. |
12 | The weights used in Binary coded decimal code are: |
13 | Execution of several activities at the same time. |
14 | Multithreading is also called as ____________ |
15 | PCI stands for _________ |
16 | The dots on the magnetic tape represent ________ |
17 | In text documents, a structure which stays the same no matter how the document is represented. |
18 | The length of a register is called _______ |
19 | A technique of transmitting data or images or videos (information) using a continuous signal |
20 | It refers to simulated motion pictures showing movement of drawn objects. |