Question. A cipher in which the order is not preserved. |
1 | The maximum number of bits sufficient to represent a hexadecimal number in binary: |
2 | The field that covers a variety of computer networks both public and private, that are used in everyday jobs. |
3 | Any system that uses the HTTP protocol is called _________ |
4 | A set of activities that ensure that software correctly implements a specific function. |
5 | Which of the following are the input devices that enable direct data entry into a computer system from source documents? |
6 | A parallelism based on increasing processor word size. |
7 | Which of the following uses multiple hard disk platters mounted on a single central shift? |
8 | ___________ animation is used to animate things that are smaller than life size. |
9 | Perfrom BCD addition: 2+3= _______________ |
10 | Which of the following computers are lower than mainframe computers in terms of speed and storage capacity? |
11 | . A tag similar to that of the italic tag. |
12 | The decimal representation for the character ‘!’ in ASCII is ____________ |
13 | A program that reads each of the instructions in mnemonic form and translates it into the machine-language equivalent. |
14 | __________________ is a straightforward method of representing positive and negative numbers. |
15 | Connecting two or more networks to form a single network is called : |
16 | WDM stands for? |
17 | A device used for video games, flight simulators, training simulators and for controlling industrial robots. |
18 | ______________ architecture provides a high-level overview of the anticipated system architecture. |
19 | To speed up the processor operations, the processor includes some internal memory storage locations, called ___________ |
20 | An encryption technique with 2 keys is ______________ |