Options: (A)Extent to which a software module can be used in more than one computing program (B) It involves regular monitoring of the risks identified and of new risks that develops. (C) It considers each of the key risks that are identified and identifies strategies to manage the risk. (D) None of these 24
Which of the following technique is used for encapsulation?
Options: a technique used in best-effort delivery systems to avoid endlessly looping packets., a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame., One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size, All of the above
19. Word is preset to use standard 8.5-by-11-inch paper with _____ margins.
Options: a. 1-inch left, right, top, and bottom
b. 1.25-inch left, right, top, and bottom
c. 1.25-inch left and right margins and 1-inch top and bottom
d. 1-inch left and right margins and 1.25-inch top and bottom
Options: (A)Associated with production of software as per specification (B) Structured approach to software development, whose aim is to facilitate the production of high-quality software in a cost-effective way. (C) An engineering discipline, concern with software development. (D) None of these 22
Options: (A)displays text and can be clicked with the mouse or spacebar (B) a checkmark which the user can select (C) a list from which one item can be selected. (D) area in which text may be entered 1
Options: (A)dissimilar machines with minimum modification (B) similar machines with maximum modification (C) dissimilar machines with maximum modification (D) similar machines with maximum modification 11