2.Match the following : A-Control metrics : BProcess metrics: C- Control: D-Correctness: 1- They are associated with software process. 2- They are associated with software products. 3- Protective measure that reduces system vulnerability. 4- Extent to which a system or component is free from faults in its specification, design, and implementation
Which of the following is true regarding access lists applied to an interface?
Options: You can place as many access lists as you want on any interface until you run out of memory., You can apply only one access list on any interface., One access list may be configured, per direction, for each layer 3 protocol configured on an interface., You can apply two access lists to any interface.
Specialization is which of the following processes?
Options: Defining one or more subtypes of the supertype and forming supertype/subtype relationships., Defining one or more supertypes of the subtype and forming supertype/subtype relationships., Defining one or more subtypes of the supertype and not forming supertype/subtype relationships., Defining one or more supertypes of the subtype and not forming supertype/subtype relationships.
Options: (A)The software and hardware system architectures that provide explicit support for tolerance, which includes software redundancy and faulttolerance controller that detects problems and supports fault recovery (B) It is an initial step for requirements engineering process, includes the outline description of system, its use in an organization and recommending the system feasibility. (C) Trustworthiness with which a system or component can be modified for use in applications or environments other than those for which it was specifically designed. (D) None of these 20
Eight stations are competing for the use of a shared channel using the 'Adaptive tree Walk Protocol'. If the stations 7 and 8 are suddenly become ready at once, how many bit slots are needed to resolve the contention?
Options: contains all constants in the program, a permanent table of decision rules in the form of patterns for matching with the uniform symbol table to discover syntactic structure., consists of a full or partial list of the token's as they appear in the program. Created by Lexical analysis and used for syntax analysis and interpretation, a permanent table which lists all key words and special symbols of the language in symbolic form.