Question. Study of creating a d using encryption and decryption techniques. |
1 | The forms that can be used for a variety of inventory applications. |
2 | The process of drawing a flowchart for an algorithm is called __________ |
3 | The ability for programmers to use the same written and debugged existing class. |
4 | Which of the following is not a process state? |
5 | The 2’s complement of 15 is ____________ |
6 | The storage capacity of an optical disk is given by: |
7 | New CPU whose instruction set includes the instruction set of its predecessor CPU is said to be ___________ with its predecessor. |
8 | An encryption technique with 2 keys is ______________ |
9 | Line Printers that print one line at a time are _________ |
10 | Which of the following is a technique that marked the beginning of computer communications? |
11 | Forms that do not require any programming. |
12 | A topology is a modified version of the basic star topology. |
13 | Set of a program which consists of full documentation. |
14 | The binary equivalent of the decimal number 10 is __________ |
15 | A procedural programming follows ___________ approach. |
16 | In this type of VR environment, the three-dimensional scene is considered as a part of the physical environment. |
17 | ______________ help us to see patterns. |
18 | WTLS stands for? |
19 | When the data at a location in cache is different from the data located in the main memory, the cache is called _____________ |
20 | A type of cipher that uses multiple alphabetic strings. |