Question. In public key cryptography, a key that decrypts the message. |
1 | Under DES, the data encryption standard took a 64-bit block of data and subjected it to ______ levels of encryption. |
2 | Which of the following are physical devices of a computer? |
3 | In both signed magnitude and 2’s complement , positive and negative numbers are separated using ______________ |
4 | JVM stands for? |
5 | A method that must be overridden while extending threads. |
6 | Technologies that allow the user to see the real world, with virtual objects composited in the real world. |
7 | Which of the following processor has a fixed length of instructions? |
8 | A type of non-monotonic reasoning. |
9 | To locate the exact location of data in memory, we need the starting address of the segment, which is found in the DS register and an offset value. This offset value is also called? |
10 | What does PC stand for? |
11 | Which of the following is not a type of computer on the basis of operation? |
12 | Which of the following is a loop statement? |
13 | Which of the following Printers have a speed in the range of 40-300 characters per second? |
14 | ___________________ is designed to solve a specific problem or to do a specific task. |
15 | In this type of VR environment, the subjects can perform both in the real and virtual environment. |
16 | Line Printers that print one line at a time are _________ |
17 | A concern of authentication that deals with user rights. |
18 | The decimal equivalent of (0.101)2 will be ____________ |
19 | The binary number 111 in its 2’s complement form is ____________ |
20 | ___________ is done in the development phase by the debuggers. |