Question. These ciphers replace a character or characters with a different character or characters, based on some key. |
1 | A planned program if work that requires a definitive amount of time, effort and planning to complete. |
2 | 1 zettabyte = ______________ |
3 | Files that maintain the hierarchical structure of the file system. |
4 | ____________ refer to renewing or changing components like increasing the main memory, or hard disk capacities, or adding speakers, or modems, etc. |
5 | Which of the following is not a part of the Identification division? |
6 | The result that is smaller than the smallest number obtained is referred to as ___________ |
7 | Which of the following unit is responsible for converting the data received from the user into a computer understandable format? |
8 | Rotation of the disk must vary __________ with the radius of the disk. |
9 | _______________ is the assembly language for an imaginary architecture. |
10 | A term that defines the direction of flow of information between devices. |
11 | A walkie-talkie operates in ____________ |
12 | Which of the following can access the server? |
13 | The memory unit is made up of _____ bytes. |
14 | The field that covers a variety of computer networks both public and private, that are used in everyday jobs. |
15 | Which of the following is the fastest means of memory access for CPU? |
16 | Allocated size of a file comes under? |
17 | A method that must be overridden while extending threads. |
18 | A _________ partitions a web browser window so that multiple web documents can be displayed simultaneously. |
19 | Which of these is a part of network identification? |
20 | Which of the following language does the computer understand? |