Question. An attack in which the site is not capable of answering valid request. |
1 | What does D in the D-flip flop stand for? |
2 | Many time slots are wasted in __________ |
3 | HLL stands for? |
4 | Name the device that converts text information into spoken sentences. |
5 | The Victorian internet is actually? |
6 | A graphics method in which one object is transformed into another. |
7 | Which of these is a part of network identification? |
8 | Which of the following is not a positional number system? |
9 | Collect->Communicate->__________->Act |
10 | What is the full form of TTS? |
11 | The Excess-3 representation of (0100)BCD is __________ |
12 | The ___________ contains the address of the next instruction to be executed. |
13 | A set of libraries that provide programmatically access to some kind of graphics 2D functions. |
14 | Winchester disks are a type of _______ |
15 | PDA stands for? |
16 | The hex representation for F is _______________ |
17 | DARPA stands for? |
18 | Brain of computer is ____________ |
19 | ___________ Conducted at customers site. |
20 | A standardized language used for commercial applications. |