Question. The process of verifying the identity of a user. |
1 | The placement of information within a cell at the left edge, right edge, or centered is |
2 | A small program that changes the way a computer operates. |
3 | Which of the following isn’t a phase of digitization? |
4 | ______ generation of computer started with using vacuum tubes as the basic components. |
5 | A program should be ________ |
6 | A _______ is a connector showing the relationship between the representative shapes. |
7 | A term to describe the extent to which a user can modify form and content of a mediated environment. |
8 | Semicolon is used after |
9 | Computer has a built-in system clock that emits millions of regularly spaced electric pulses per _____ called clock cycles. |
10 | An encryption technique with 2 keys is ______________ |
11 | __________________ is the amount of data that can be stored on a given length of tape. |
12 | SGML stands for? |
13 | A graphics method in which one object is transformed into another. |
14 | What do we call the point(decimal) in any hexadecimal number of the form 111.A3? |
15 | DBMS is a set of __________ to access the data. |
16 | Which of the following is a common testing conducted by the developers? |
17 | What does GUI stand for? |
18 | IN stands for? |
19 | Which is not an objective of network security? |
20 | The length of a register is called _______ |