1 - ______ generation of computer started with using vacuum tubes as the basic components.
1st
2 - _________ are about storytelling and story meaning.
narratives
3 - ___________ is a step in which design is translated into machine-readable form.
Coding
4 - ______________ leads to concurrency.
Parallelism
5 - ______computers are lower to mainframe computers in terms of speed and storage capacity.
Mini
6 - A _______ can be recorded using a normal light source.
Photograph
7 - A ____________(invented by Paul Roget in 1828) is a simple mechanical toy which creates the illusion of movement.
Thaumatrope
8 - A hardware based system that has autonomy, social ability and reactivity.
Autonomous Agent
9 - A planned program if work that requires a definitive amount of time, effort and planning to complete.
Project
10 - A programming technique in which the focus is on doing things.
procedural
11 - A testing conducted at the developers site under validation testing.
alpha
12 - A type of analysis that attends to the repetition and frequency of features, their proportions within the text, and consequent assumptions about significance.
Content
13 - A type of VR environment in which subjects are visually isolated from the real environment.
Immersive
14 - An attack in which the site is not capable of answering valid request.
Denial of service
15 - An electronic document that establishes your credentials when you are performing transactions.
Digital certificate
16 - An encryption technique with 2 keys is ______________
Public key cryptography
17 - Face recognition system is based on _____________
applied AI
18 - In this generation Time sharing, Real time, Networks, Distributed Operating System was used.
4th
19 - Locating or identifying the bugs is known as ___________
Testing
20 - RMI uses stub and skeleton for communication with the ________ object.
remote
21 - Saas stands for?
Software as a service
22 - Several instructions execution simultaneously in ________________
parallel processing
23 - Several instructions execution simultaneously in?
parallel processing
24 - Technologies that allow the user to see the real world, with virtual objects composited in the real world.
AR
25 - The idea of _________is central to understanding the production of meaning through texts.
Represntation
26 - The information that gets transformed in encryption is ____________
Plain text
27 - These cloud services are of the form of utility computing i.e. the _________ uses these services pay-as-you-go model.
Cloud users
28 - This concept allows routines to use data again at different times.
Polymorphism
29 - Which of the following is not involved in working of IoT?
Server
30 - Which of these is a part of network identification?
UserID
31 - WTLS stands for?
Wireless Transport Security Layer
32 - _________ are the web-based interactive applications to express and share your ideas and thoughts with interested people.
Blog
33 - __________ analysis regards texts as collections of signs or paradigms and possible meanings, operating within the bounds of various codes.
Semiotic
34 - __________ describes the effect of involving the reader with the story, of constructing it as truth.
Identification
35 - __________ represents a particular instance of a class.
object
36 - ___________ animation is used to animate things that are smaller than life size.
Stop motion
37 - ___________ is an emerging branch in computer science, which interprets means and method of making computers think like human beings.
AI
38 - ___________ is done in the development phase by the debuggers.
Debugging
39 - _____________ enables the migration of the virtual image from one physical machine to another.
virtualization
40 - ______________ are used for solving complex application such as Global Weather Forecasting.
Super Computers
41 - ______________ keep track of position.
Motion Trackers
42 - ________________ is a paradigm of distributed computing to provide the customers on-demand, utility based computing service.
Cloud Computing
43 - ____________is basically a form of pictorial presentation.
Animations
44 - A ________ is tested to ensure that information properly flows into and out of the system.
module interface
45 - A ______________ represents the need of information in the program without the presenting the details.
abstraction
46 - A ______________________ is a display device, worn on head as a part of helmet that has a small display optic.
HMD
47 - A basic unit of object-oriented programming.
object
48 - A computer that operates on digital data.
digital
49 - A concept that combines data and functions into a single unit called class.
encapsulation
50 - A concern of authentication that deals with user rights.
Functional authorization
51 - A dedicated website for providing specialized information in a particular field.
Web directories
52 - A device produces an illusion of movement from a rapid succession of static pictures.
Zoetrope
53 - A field of technology that deals with a combination of real world and the data generated from computer.
AR
54 - A gateway for the server side object.
skeleton
55 - A layer which is the binary data protocol layer.
transport protocol
56 - A methodology used to develop behavior-based autonomous agents.
Behavior engineering
57 - A middleware layer between the stub skeleton and transport.
remote reference layer
58 - A model that is the demo implementation of the system.
prototype
59 - A network of physical objects or things embedded with electronics or softwares.
IOT
60 - A parallelism based on increasing processor word size.
Bit level
61 - A particular system that contains intelligent agents.
Agency
62 - A person who enjoys learning details about computers and how to enhance their capabilities.
Hacker
63 - A procedural programming follows ___________ approach.
top-down
64 - A process of making the encrypted text readable again.
Decryption
65 - A program created by Farmer and Venema for auditing capability.
SATAN
66 - A program that copies itself.
Worm
67 - A remote object is an object whose method can be invoked from another virtual environment.
TRUE
68 - A set of activities that ensure that software correctly implements a specific function.
verification
69 - A small program that changes the way a computer operates.
Virus
70 - A stage in which individual components are integrated and ensured that they are error-free to meet customer requirements.
Testing
71 - A step in waterfall model that involves a meeting with the customer to understand the requirements.
Requirement Gathering
72 - A system of interlinked documents, websites, portals etc. accessed through the Internet.
WWW
73 - A technique that enables light field which is generally the product of a light source scattered off objects.
Holography
74 - A term for Illusion of immersion by projecting stereo images on the walls and floor of a room.
CAVE
75 - A term for simultaneous access to a resource, physical or logical.
Concurrency
76 - A term in computer terminology is a change in technology a computer is/was being used.
generation
77 - A term to describe the extent to which a user can modify form and content of a mediated environment.
Interactivity
78 - A term used in the context of web design to suggest the path that user takes while browsing a website.
navigation
79 - A testing strategy that test the application as a whole.
System testing
80 - A testing strategy that tests the application in the context of an entire system.
System
81 - A tracking based on geo-location information.
Location based
82 - A type of cipher that uses multiple alphabetic strings.
Polyalphabetic substitution based
83 - A type of non-monotonic reasoning.
Default
84 - A type of parallelism that uses micro architectural techniques.
instructional
85 - A typical _________ program creates some remote objects, makes references to these objects accessible, and waits for clients to invoke methods on these objects.
Server
86 - A typical __________ program obtains a remote reference to one or more remote objects on a server and then invokes methods on them.
Client
87 - Abstraction combines the data and functions into a single unit called a class.
FALSE
88 - An algorithm in encryption is called _____________
Cipher
89 - An algorithm used in encryption is referred to as cipher.
TRUE
90 - An individual who plans and directs the work.
Project manager
91 - An international research effort to promote autonomous robots.
RoboCup
92 - An object acting as a gateway for the client side.
stub
93 - AR is interactive in real-time.
TRUE
94 - Batch processing was mainly used in this generation.
1st
95 - BOOM stands for?
Binocular Omni-Orientation Monitor
96 - CHAP stands for?
Challenge Handshake authentication protocol
97 - Cloud providers provide cloud services to the cloud users.
TRUE
98 - Collect->Communicate->__________->Act
Acknowledge
99 - DES stands for?
Data Encryption Standard
100 - Diagnostics service for Cars.
AutoBot
101 - Each one is called a bit.
remote
102 - Encryption is the study of creating and using decryption techniques.
FALSE
103 - Encryption standard that is selected by the US government to replace DES.
AES
104 - Execution of several activities at the same time.
parallel processing
105 - HLL stands for?
High Level Language
106 - HMD stands for?
Head Mounted Display
107 - Humorous Phases of Funny Faces was the first animation film.
Name of the first animation film.
108 - ICT stands for?
Information, Communication and Technology
109 - In image analysis, this part refers to objects represented within the image, which may signify to us because of, for example, their symbolic power or because of their composition in relation to each other.
Content
110 - In image analysis, this part refers to objects represented within the image, which may signify to us because of, for example, their symbolic power or because of their composition in relation to each other.
Content
111 - In public key cryptography, a key that decrypts the message.
private key
112 - In terms of image analysis, it is important to attend to primary level signs in visual codes, most obviously for examples of still photography.
TRUE
113 - In terms of image analysis, it is important to attend to primary level signs in visual codes, most obviously for examples of still photography.
TRUE
114 - In this type of cloud, an organization rents cloud services from cloud providers on-demand basis.
Public
115 - In this type of cloud, the cloud is composed of multiple internal or external cloud.
Hybrid
116 - In this type of VR environment, the subjects can perform both in the real and virtual environment.
Semi immersive
117 - In this type of VR environment, the three-dimensional scene is considered as a part of the physical environment.
Non immersive
118 - It is a mediated environment which creates the sensation in a user of being present in a (physical) surrounding.
VR
119 - It refers to simulated motion pictures showing movement of drawn objects.
Animation
120 - Maintenance is the final phase in waterfall model.
TRUE
121 - Making the smaller and smaller things have the ability to connect and interact.
Nano tech
122 - Methodology in which project management processes were step-by step.
Waterfall
123 - MIPS stands for?
Millions of Instructions/sec
124 - Most of the cloud architectures are built on this type of architecture.
grid
125 - Multiplane camera was introduced by Walt Disney.
TRUE
126 - Network Security provides authentication and access control for resources.
TRUE
127 - Parallel processing has single execution flow.
FALSE
128 - PDA stands for?
private digital applications
129 - PDAs are also called?
Handheld
130 - Remote computers work on continuous range of values.
FALSE
131 - RFID is a part of IoT.
TRUE
132 - RFID stands for?
Radio frequency identification
133 - RMI stands for?
Remote Method Invocation
134 - Security features that control that can access resources in the OS.
Access control
135 - SLAM stands for?
Simultaneous localization and mapping
136 - Technologies that completely involve a user inside a synthetic environment.
VR
137 - The media texts may throw up discourses and are called ____________
Binary oppositions
138 - The ___________ layer, which provides the interface that client and server application objects use to interact with each other.
Stub/skeleton
139 - The ____________ is a piece of equipment designed to make cartoons more realistic and enjoyable. It uses stacked panes of glass each with different elements of the animation.
Multiplane camera
140 - The ability for programmers to use the same written and debugged existing class.
Reusability
141 - The customer requirements are broken down into logical modules for ease of _______________
implementation
142 - The father of animation?
J. Stuart Blackton
143 - The father of ioT.
Kevin Ashton
144 - The field that covers a variety of computer networks, both public and private, that are used in everyday jobs.
Network Security
145 - The first neural network computer.
SNARC
146 - The fourth generation was based on integrated circuits.
FALSE
147 - The generation based on VLSI microprocessor.
4th
148 - The goal of AI is to build systems that exhibit intelligent behavior.
TRUE
149 - The invention of _______________ gave birth to the much cheaper micro computers.
Microprocessors
150 - The measure of the â€Å“effort†needed to maintain efficiency while adding processors.
Scalabilty
151 - The notion of __________ is one which is especially associated with semiotics and with genres.
codes
152 - The notion of norms also links to the idea that representations are given force through a process of:
naturalization
153 - The only language which the computer understands is ______________
Binary Language
154 - The performance of an agent can be improved based on this.
Learn
155 - The process of forming a new class from an existing class.
Inheritance
156 - The process of transforming plain text into unreadable text.
Encryption
157 - The process of verifying the identity of a user.
Authentication
158 - The protocol designed to make the security of wireless LAN as good as that of wired LAN.
WEP
159 - The rate at which the problem size need to be increased to maintain efficiency.
Isoeffciency
160 - The smallest unit of data in computer is ________________
Bit
161 - The technology that has the ability to interact with the world.
AI
162 - These ciphers replace a character or characters with a different character or characters, based on some key.
Mono alphabetic substitution based
163 - They can operate on batteries and hence are very popular with travelers.
Laptops
164 - This part of image analysis refers to those primary signs, often part of the technique of photography, which are about how the image is made.
Treatment
165 - Triple-DES has ______ keys.
2
166 - ULSI stands for?
Ultra Large Scale Integration
167 - Under DES, the data encryption standard took a 64-bit block of data and subjected it to ______ levels of encryption.
16
168 - Validation is computer based.
TRUE
169 - Wearable computing device in the form of computerized eyeglasses.
Smart Glasses
170 - What do you call a technical person who is capable of understanding the basic requirements?
analyst
171 - What do you call testing individual components?
unit testing
172 - Which defines the role of software?
System engineering
173 - Which is not an objective of network security?
Lock
174 - Which of the following is not a cloud stakeholder?
Clients
175 - Which of the following is not a type of cloud?
Protected
176 - Which of the following is not a type of computer on the basis of operation?
Remote
177 - Which unit is responsible for converting the data received from the user into a computer understandable format?
Input Unit
178 - Wi-Fi stands for?
Wireless fidelity
Pages
No comments:
Post a Comment
Your Valued Comments Help us to improve our site. Thanks