Options: Use a protocol to ensure that the system will never enter a deadlock state.
B. Allow the system to enter the deadlock state and then recover.
C. Pretend that deadlocks never occur in the system.
D. All of the Above
Which of the following are valid ways to refer only to host 172.16.30.55 in an IP access list? 172.16.30.55 0.0.0.255 172.16.30.55 0.0.0.0 any 172.16.30.55 host 172.16.30.55 0.0.0.0 172.16.30.55 ip any 172.16.30.55
Options: (A)allows a process to select a replacement frame from the set of all frames (B) requires that each process selects from only its own set of allocated frames (C) Both (A)and (B) above (D) none of the above 27
Options: (A)Trustworthiness with which a system are transferred from one hardware environment to another (B) Here one sub system encapsulates a set of procedures, which can be called by other sub-systems. (C) It is concerned with studying existing process to understand the relationship between different parts of the process. (D) None of these 26
Options: cool, extremely dry wind that forms over the Sahara and blows westward or south-westward to the African coast, wind that blows during the dry season from December to February, tertiary wind that carry great quantities of fine dust from the Sahara, All of the above
Which fields are contained within an IEEE Ethernet frame header? Source and destination MAC address Source and destination network address Source and destination MAC address and source and destination network address FCS field
The oldest rocks in the earth's crust were once molten, and came from deep inside the earth. The molten rock, called magma, spewed out in volcanic eruptions during the earth;s early life and solidified into hard rock's called
Options: (A)This takes only two values. In general, these values will be 0 and 1 and they can be coded as one bit. (B) The natural environment of a certain species (C) Systems that can be used without knowledge of internal operations (D) None of these 1
Options: defines a source or destination of system data, identifies data flow, represents a process that transforms incoming data flow(s) into outgoing data flows, is a data store-data at rest, or a temporary repository of data