Question. A concern of authentication that deals with user rights. |
1 | Which of the following is the first neural network computer? |
2 | The word ____________comes from the name of a Persian mathematician Abu Ja’far Mohammed ibn-i Musa al Khowarizmi. |
3 | Which is not an objective of network security? |
4 | Input Devices that use a special ink that is used for converting pictures, maps and drawings into digital format. |
5 | In this technique, there is no direct contact between users and their programs during execution. |
6 | A layer which is the binary data protocol layer |
7 | The 16’s complement of 74E will be __________ |
8 | A set of activities that ensure that software correctly implements a specific function. |
9 | They can operate on batteries and hence are very popular with travelers. |
10 | Which of the following is a name of plotter as well as a printer? |
11 | An image editor similar to Adobe Photoshop. |
12 | The generation based on VLSI microprocessor. |
13 | This is not a part of the signing on the procedure. |
14 | HLL stands for? |
15 | An electronic document that establishes your credentials when you are performing transactions. |
16 | A structure that is system- dependent. |
17 | What will be the value obtained after multiplication of (-2) * (-3) using Booth’s Algorithm? |
18 | What is the full form of CPU? |
19 | Octal subtraction of (232)8 from (417)8 will give ______________ |
20 | Processor which is complex and expensive to produce is ________ |