Question. An algorithm in encryption is called _____________ |
1 | Which of the following is the first neural network computer? |
2 | A person who enjoys learning details about computers and how to enhance their capabilities. |
3 | STD stands for ____________ |
4 | ISP is? |
5 | A concern of authentication that deals with user rights. |
6 | In this generation Time sharing, Real time, Networks, Distributed Operating System was used |
7 | CPU has built-in ability to execute a particular set of machine instructions, called as __________ |
8 | What kind of a flag is the sign flag? |
9 | OSI stands for? |
10 | A technique of transmitting data or images or videos (information) using a continuous signal |
11 | Database is generally __________ |
12 | A technique that marked the beginning of computer communications. |
13 | Several instructions execution simultaneously in? |
14 | JVM stands for? |
15 | A stage in which individual components are integrated and ensured that they are error-free to meet customer requirements. |
16 | _______ is part of user documentation. |
17 | The range of access times of optical disks is generally ______ |
18 | ___________ is a step in which design is translated into machine-readable form. |
19 | Name the device that converts text information into spoken sentences. |
20 | Which of the following Printers have a speed in the range of 40-300 characters per second? |