Question. The information that gets transformed in encryption is ____________ |
1 | Which of the following is incorrect? |
2 | The probability of failure-free operation of a software application in a specified environment for a specified time. |
3 | Process of evaluating a system to verify whether or not it is meeting its objectives. |
4 | A tracking based on geo-location information. |
5 | ______________ leads to concurrency. |
6 | SQL is _______ |
7 | Spreadsheets cannot |
8 | How is the number 5 represented in non-positional number system? |
9 | HMD stands for? |
10 | If M denotes the number of memory locations and N denotes the word size, then an expression that denotes the storage capacity is ______________ |
11 | A testing strategy that test the application as a whole. |
12 | A system in which two channels are dedicated to transfer data |
13 | Components used for interconnecting dissimilar networks that use different communication protocols. |
14 | What does GUI stand for? |
15 | An internet service that allows the user to move a file. |
16 | Which of the following devices provides the communication between a computer and the outer world? |
17 | The delimiter in a FORTRAN code. |
18 | In 1969 AT&T laboratories developed ______ which supported and worked on different hardware platforms. |
19 | ___________________ is designed to solve a specific problem or to do a specific task. |
20 | FTP stands for? |