Telegram Recruitment Job

Computer Important Question

Category: Computer Quiz | View: 69

Question. Study of creating a d using encryption and decryption techniques.
(A) Cipher
(B) Cryptography
(C) Encryption
(D) Decryption
         
Answer : Cryptography

1 The forms that can be used for a variety of inventory applications.
2 The process of drawing a flowchart for an algorithm is called __________
3 The ability for programmers to use the same written and debugged existing class.
4 Which of the following is not a process state?
5 The 2’s complement of 15 is ____________
6 The storage capacity of an optical disk is given by:
7 New CPU whose instruction set includes the instruction set of its predecessor CPU is said to be ___________ with its predecessor.
8 An encryption technique with 2 keys is ______________
9 Line Printers that print one line at a time are _________
10 Which of the following is a technique that marked the beginning of computer communications?
11 Forms that do not require any programming.
12 A topology is a modified version of the basic star topology.
13 Set of a program which consists of full documentation.
14 The binary equivalent of the decimal number 10 is __________
15 A procedural programming follows ___________ approach.
16 In this type of VR environment, the three-dimensional scene is considered as a part of the physical environment.
17 ______________ help us to see patterns.
18 WTLS stands for?
19 When the data at a location in cache is different from the data located in the main memory, the cache is called _____________
20 A type of cipher that uses multiple alphabetic strings.
Privacy Policy
Copyright © 2024 GK-Hindi.ORG All Rights Reserved. GK-Hindi.ORG provides free job alert service to job seekers in India on latest government jobs, on study material and on video lessons with online test. To get free vacancy daily subscribe to our email sarkari nokari alert services.