Question. Security features that control that can access resources in the OS. |
1 | What do you call testing individual components? |
2 | In ____________ mapping, the data can be mapped anywhere in the Cache Memory |
3 | A person who designs the programs in a software package is called |
4 | They normally interact with the system via user interface provided by the application software. |
5 | The decimal representation for the character ‘!’ in ASCII is ____________ |
6 | A communication between a computer and a keyboard involves ____________ duplex transmission |
7 | Which of the following is not a type of computer code? |
8 | Producing graphical representations for scientific, engineering, and medical data sets. |
9 | Which of the following is often called the double precision format? |
10 | A technique that allows more than one program to be ready for execution and provides the ability to switch from one process to another. |
11 | The probability that a software application is operating according to requirements at a given point in time. |
12 | A __________is a set of instructions which is prepared to perform a specific assignment if executed by a computer. |
13 | A program created by Farmer and Venema for auditing capability. |
14 | Components that operate at the network layer of the OSI model. |
15 | DBMS is a set of __________ to access the data. |
16 | A numeric data analysis tool that allows us to create a computerized ledger. |
17 | A filename without path information. |
18 | An electronic document that establishes your credentials when you are performing transactions. |
19 | The hexadecimal equivalent of the binary number (0010010100)2 is : |
20 | The placement of information within a cell at the left edge, right edge, or centered is |