Question. A technique in which a program attacks a network by exploiting IP broadcast addressing operations |
1 | A type of cipher that uses multiple alphabetic strings. |
2 | WDM stands for? |
3 | A system wherein items are added from one and removed from the other end. |
4 | The media texts may throw up discourses and are called ____________ |
5 | The architecture that uses a tighter coupling between the compiler and the processor is ____________ |
6 | h command gives ___________ |
7 | These ciphers replace a character or characters with a different character or characters, based on some key. |
8 | A testing conducted at the developer’s site under validation testing. |
9 | Computer has a built-in system clock that emits millions of regularly spaced electric pulses per _____ called clock cycles. |
10 | A ______________ is diagram that depicts the flow of a program. |
11 | Which of the following uses multiple hard disk platters mounted on a single central shift? |
12 | The binary equivalent of the decimal number 10 is __________ |
13 | Which of the following isn’t a type of transmission mode? |
14 | In 1969 AT&T laboratories developed ______ which supported and worked on different hardware platforms. |
15 | The process of producing useful information for the user is called ___________ |
16 | VDU stands for __________ |
17 | Which of the following is not a downside of OSS? |
18 | What does EBCDIC stand for? |
19 | Which of the following term is used when different forms of information like text, sound is converted to a binary code? |
20 | ___________ is a step in which design is translated into machine-readable form. |