3483 Q? : pencillin is extracted from
Ans: fungus
3482 Q? : Information Technology act enacted on [ Sec . Asst 2013 ]
Ans: 9 June 2000
3481 Q? : The programs which are as permanent as hardware and stored in ROM [ Sec . Asst 2013 ]
Ans: Firmware
3480 Q? : Which access method is used for obtaining record from a cassette tape [ Sec . Asst 2013 ]
Ans: Sequential
3479 Q? : Software such as Explorer and Firefox are referred to as [ Sec . Asst 2013 ]
Ans: Browsers
3478 Q? : Alexander the Great was the king of
Ans: Macedonia
3477 Q? : which film won oscar 2013
Ans: Argo
3476 Q? : The practice and study of techniques for secure data communication in the presence of third parties: [ PSC , Computer , Housing Board Asst ]
Ans: Cryptography
3475 Q? : An artificial environment that is created with software and presented to the user in such a way that the user accepts it as a real environment [ PSC , Housing board , Computer ]
Ans: Virtual Reality
3474 Q? : The digital security system that uses some unique characteristic of human biology to identify authorized users: [ PSC , Computer , IT ]
Ans: Biometrics
More Questions >>
Ans: fungus
3482 Q? : Information Technology act enacted on [ Sec . Asst 2013 ]
Ans: 9 June 2000
3481 Q? : The programs which are as permanent as hardware and stored in ROM [ Sec . Asst 2013 ]
Ans: Firmware
3480 Q? : Which access method is used for obtaining record from a cassette tape [ Sec . Asst 2013 ]
Ans: Sequential
3479 Q? : Software such as Explorer and Firefox are referred to as [ Sec . Asst 2013 ]
Ans: Browsers
3478 Q? : Alexander the Great was the king of
Ans: Macedonia
3477 Q? : which film won oscar 2013
Ans: Argo
3476 Q? : The practice and study of techniques for secure data communication in the presence of third parties: [ PSC , Computer , Housing Board Asst ]
Ans: Cryptography
3475 Q? : An artificial environment that is created with software and presented to the user in such a way that the user accepts it as a real environment [ PSC , Housing board , Computer ]
Ans: Virtual Reality
3474 Q? : The digital security system that uses some unique characteristic of human biology to identify authorized users: [ PSC , Computer , IT ]
Ans: Biometrics
More Questions >>
1 comment:
http://zilzilakaladi.blogspot.in/
dear friends this is my blog.. pls join to read me..
Post a Comment