Question. Which is not an objective of network security? |
1 | The number of sign bits in a 32-bit IEEE format __________ |
2 | Which of the following is not a magnetic disk? |
3 | ____________ creates an inferior process that runs your program. |
4 | The process of verifying the identity of a user. |
5 | A type of cipher that uses multiple alphabetic strings. |
6 | The functions of execution and sequencing are performed by using ______________ |
7 | Rotation of the disk must vary __________ with the radius of the disk. |
8 | ______________ is done in the development phase by the developers. |
9 | __________ describes the effect of involving the reader with the story, of constructing it as truth. |
10 | A testing conducted at the developer’s site under validation testing. |
11 | The zone of alphabetic characters from A to O in ASCII is _____________ |
12 | The web works on this model. |
13 | Which of the following is capable of recognizing a pre-specified type of mark by pencil or pen? |
14 | Collect->Communicate->__________->Act |
15 | A standardized language used for commercial applications. |
16 | Secondary memory is the long term store for programs and data while main memory holds program and data currently in use. What kind of an organization is this? |
17 | The IEEE standard followed by almost all the computers for floating point arithmetic _____ |
18 | Which of the following Techniques are used to optimize field services? |
19 | Which of the following device use positional notation to represent a decimal number? |
20 | A model that is the demo implementation of the system. |