Question. The process of verifying the identity of a user. |
1 | A system in which two channels are dedicated to transfer data |
2 | ___________ is an emerging branch in computer science, which interprets means and method of making computers think like human beings. |
3 | A person who enjoys learning details about computers and how to enhance their capabilities. |
4 | Which of the following Techniques are used to optimize field services? |
5 | Batch processing was mainly used in this generation. |
6 | When an algorithm is written in the form of a programming language, it becomes a _________ |
7 | CLV stands for, in terms of rotation of the optical disk ___ |
8 | FTP stands for? |
9 | MIPS stands for? |
10 | Word length of a personal computer ___________ |
11 | The architecture that uses a tighter coupling between the compiler and the processor is ____________ |
12 | Which of the following package allows individuals to use personal computers for storing and retrieving their personal information? |
13 | An indirect form of surveillance. |
14 | WDM stands for? |
15 | ______________ help us to see patterns. |
16 | A concept that contains rhythm of speech, stress patterns and intonation is ________ |
17 | A text file that contains our program is called as __________ |
18 | Any set of digits or alphabets are generally referred as ______________ |
19 | What do we call the point(decimal) in any hexadecimal number of the form 111.A3? |
20 | Telephone networks operate in this mode. |