Question. An attack in which the user receives unwanted amount of e-mails. |
1 | An easier way to set up complicated calculations. |
2 | The value of radix in binary number system is _____________ |
3 | Which of the following should describe the technical terms used in the document? |
4 | ____________ creates an inferior process that runs your program. |
5 | A set of hard disk drives with a controller mounted in a single box, forming a single large storage unit is ____________ |
6 | Which is interpreted language? |
7 | The process of making digital information work for you is called ___________ |
8 | A thread becomes non runnable when? |
9 | The memory implemented using the semiconductor chips is _________ |
10 | Configuration where many independent computer systems are connected. |
11 | Which of the following defines the assigned ordering among the characters used by the computer? |
12 | RFID stands for? |
13 | Which of the following isn’t a type of transmission mode? |
14 | The 2’s complement of 15 is ____________ |
15 | What do you call a program in execution? |
16 | A box that can represent two different conditions. |
17 | WDM stands for? |
18 | The ___________ layer, which provides the interface that client and server application objects use to interact with each other. |
19 | invention of _______________ gave birth to the much cheaper micro computers. |
20 | A standard for unit testing. |