Question. A technique in which a program attacks a network by exploiting IP broadcast addressing operations |
1 | A topology is a modified version of the basic star topology. |
2 | A gateway for the server side object. |
3 | invention of _______________ gave birth to the much cheaper micro computers. |
4 | The number of sign bits in a 32-bit IEEE format __________ |
5 | Express the ASCII equivalent of the signed binary number (00110010)2. |
6 | A type of technique in which dumb terminals are connected to a central computer system. |
7 | A type of testing that is conducted at the software interface. |
8 | A cipher in which the order is not preserved. |
9 | The value of base in a decimal number system is ____________ |
10 | What does the data transfer instruction STA stand for? |
11 | A digitizer converts __________ input into digital input. |
12 | What does EBCDIC stand for? |
13 | What is the location of the internal registers of CPU? |
14 | A level that describes how a record is stored. |
15 | Connecting two or more networks to form a single network is called : |
16 | Which of the following is a common testing conducted by the developers? |
17 | Apache is a type of ________ |
18 | Name of the first animation film. |
19 | The functions of execution and sequencing are performed by using ______________ |
20 | MS-Word comes under __________ |