Question. A type of cipher that uses multiple alphabetic strings. |
1 | Virtual Memory can be implemented via __________ |
2 | Keep the statement language ______________ while writing a pseudo code. |
3 | Which of the following is the fastest means of memory access for CPU? |
4 | ASCII stands for _____________________ |
5 | The result obtained on subtraction using 2s complement of 1111-0010 will be _________ |
6 | Anonymous FTP files are called ___________ accessible files. |
7 | A set of libraries that provide programmatically access to some kind of graphics 2D functions. |
8 | An approach that designs test cases by looking at the allowable data values. |
9 | Programming based on stepwise refinement process. |
10 | Which of the following is not a characteristic of a computer? |
11 | Each personal computer has a _________ that manages the computers arithmetical logical and control activities. |
12 | Allows the user to create and maintain a personal list of favorite URL addresses. |
13 | A typical _________ program creates some remote objects, makes references to these objects accessible, and waits for clients to invoke methods on these objects. |
14 | The rate at which the problem size need to be increased to maintain efficiency. |
15 | A technique that can be a solution to the problem of synchronizing data sources. |
16 | The actual content in the database at a particular point. |
17 | A network of physical objects or things embedded with electronics or softwares. |
18 | COBOL stands for _________ |
19 | Which of the following isn’t a part of a spreadsheet? |
20 | . A tag similar to that of the italic tag. |