Question. An encryption technique with 2 keys is ______________ |
1 | DBMS is a set of __________ to access the data. |
2 | COW stands for? |
3 | New CPU whose instruction set includes the instruction set of its predecessor CPU is said to be ___________ with its predecessor. |
4 | The tracks are divided into sectors whose size _______ |
5 | A circuitry that processes that responds to and processes the basic instructions that are required to drive a computer system is ________ |
6 | __________________ is a straightforward method of representing positive and negative numbers. |
7 | The web works on this model. |
8 | The 10 s complement of 455 is _________ |
9 | Computer has a built-in system clock that emits millions of regularly spaced electric pulses per _____ called clock cycles. |
10 | This part of image analysis refers to those primary signs, often part of the technique of photography, which are about how the image is made. |
11 | Causing the CPU to step through a series of micro operations is called _________ |
12 | An international research effort to promote autonomous robots |
13 | A task carried out by the OS and hardware to accommodate multiple processes in main memory. |
14 | Which of the following devices provides the communication between a computer and the outer world? |
15 | A process is busy swapping pages in and out. |
16 | An easier way to set up complicated calculations. |
17 | Executables might be called ________ |
18 | A term in computer terminology is a change in technology a computer is/was being used. |
19 | The maximum number of bits sufficient to represent a hexadecimal number in binary: |
20 | Which of the following is not a cloud stakeholder? |