Question. Which of these is a part of network identification? |
1 | This determines the type of protocol to be used. |
2 | What is correct instruction if you want the control to go to the location 2000h? |
3 | Any computer that can access the server is called? |
4 | Technologies that completely involve a user inside a synthetic environment. |
5 | The ______level helps application programs hide the details of data types. |
6 | A glue between client and server parts of application. |
7 | What does RAID stand for? |
8 | The typical value of data transfer rate is __________ |
9 | Which of the following is not a valid representation in bits? |
10 | The length of a register is called _______ |
11 | Study of creating a d using encryption and decryption techniques. |
12 | If Booths Multiplication is performed on the numbers 22*3 then what is 3 referred to as __________ |
13 | Binary addition of 1 + 1 gives the result _____________ |
14 | Whenever the data is found in the cache memory it is called as _________ |
15 | ______________ leads to concurrency. |
16 | Multithreading is also called as ____________ |
17 | A printer that prints one line at a time and has a predefined set of characters is called _______ |
18 | A _________ partitions a web browser window so that multiple web documents can be displayed simultaneously. |
19 | Another notation for exponentiation. |
20 | Which is not involved in debugging? |