Correct Answer : Whole
Disk encryption is a technology which protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people. Disk encryption uses disk encryption softwareor hardware to encrypt every bit of data that goes on.
Correct Answer : Micro-operation
The operations executed on data stored in registers are called Micro-operations. Micro operation is an elementary operation performed (during one clock pulse), on the information stored in one or more registers. Examples of microoperation include: shift, load, clear, increment, count, etc.
Correct Answer : Pervasive computing
Pervasive computing, also called ubiquitous computing, is the growing trend of embedding computational capability (generally in the form of microprocessors) into everyday objects to make them effectively communicate and perform useful tasks in a way that minimizes the end user's need to interact with computers as computers. Pervasive computing devices are network-connected and constantly available.
Correct Answer : Congestion
Network congestion in data networking and queueing theory is the reduced quality of service that occurs when a network node is carrying more data than it can handle. Typical effects include queueing delay, packet loss or the blocking of new connections. Congestion occurs when bandwidth is insufficient and network data traffic exceeds capacity.
Correct Answer : Motherboard
Correct Answer : Processor
ALU is a part of a computer is processors : An arithmetic-logic unit (ALU) is the part of a computer processor (CPU) that carries out arithmetic and logic operations on the operands in computer instruction words. In some processors, the ALU is divided into two units, an arithmetic unit (AU) and a logic unit (LU).
Correct Answer : Facebook
Correct Answer : RAM
Correct Answer : Search Engine Optimization
Correct Answer : F8