Question. An attack in which the site is not capable of answering valid request. |
1 | The users must agree to the _______ terms and agreements when they use an open source software. |
2 | CISC stands for ____________ |
3 | ____________ storage is a system where a robotic arm will connect or disconnect off-line mass storage media according to the computer operating system demands. |
4 | The program written by the programmer in high level language is called _____________ |
5 | They normally interact with the system via user interface provided by the application software. |
6 | ________________ is a paradigm of distributed computing to provide the customers on-demand, utility based computing service. |
7 | Which of the following is not a part of a digitizer? |
8 | ____________ is one or more physically contiguous pages. |
9 | In the instruction ADD A, B, the answer gets stored in ___________ |
10 | What is the location of the internal registers of CPU? |
11 | This cycle, of going through __________ states of running and input/output, may be repeated over and over until the job is completed. |
12 | Which of the following isn’t a part of the file directory? |
13 | Attack in which a user creates a packet that appears to be something else. |
14 | A structure that is system- dependent. |
15 | The wait fraction is represented by __________ |
16 | A tracking based on geo-location information. |
17 | In both signed magnitude and 2’s complement , positive and negative numbers are separated using ______________ |
18 | Memory organization in which users write programs in modules with different characteristics. |
19 | The _____________ in a document and the order in which it is presented is referred to as the document’s logical structure. |
20 | ULSI stands for? |