Question. Security features that control that can access resources in the OS. |
1 | What does USB stand for? |
2 | A box that can represent two different conditions. |
3 | A small program that changes the way a computer operates. |
4 | A type of middleware that allows for between the built-in applications and the real-time OS? |
5 | In this type of multiplexing time slots are preassigned to sources and fixed. |
6 | A topology that is responsible for describing the geometric arrangement of components that make up the LAN. |
7 | A technique that enables light field which is generally the product of a light source scattered off objects. |
8 | __________ analysis regards texts as collections of signs or paradigms and possible meanings, operating within the bounds of various codes. |
9 | RMI stands for? |
10 | Which of the following monitor looks like a television and are normally used with non-portable computer systems? |
11 | Input Devices that use a special ink that contains magnetizable particles of iron oxide are ____ |
12 | The EBCDIC is mainly used in ___________ |
13 | Used to produce illustrations for reports or for generation of slides. |
14 | A transmission mode that can transmit data in both the directions but transmits in only one direction at a time. |
15 | ___________ is done in the development phase by the debuggers. |
16 | Perform BCD addition of (23)BCD + (20)BCD . |
17 | Which of the following is the correct representation for a storage capacity of a tape? |
18 | What does MBR stand for? |
19 | A guideline for the OSS licenses other than the GPL. |
20 | ________________ is also called auxiliary storage. |