Which of the following applies to Internal DOS commands?
Options: Internal commands can be run whenever the DOS prompt is displayed, Internal commands are reserved for DOS-level programming, Internal commands can only be executed from a batch file, Internal commands are stored on disk separately from COMMAND.COM
Options: (A)It is the process of modifying the state space of the system so that the effects of the fault are minimized and system can continue in operation in some degraded state. (B) Capacity of a system or component to continue normal operation despite the presence of hardware or software faults. | 103 (C) It is the widely used hazard technique (D) Incorrect step, process, or data definition in a computer program 20
What was the purpose of EFTA (European Free Trade Association)?
Options: To remove all tariffs on trade of industrial goods between the member countries, To aid the creation of a single west European market to help boost world trade, both (a) and (b), None of the above
Options: Laurissa in the north and Godwanaland in the south, Laurissa in the south and Godwanaland in the north, Laurissa in the east and Godwanaland in the west, Laurissa in the west and Godwanaland in the east
. Which of the following statements about tab order setting is NOT true?
Options: a. The actual tab order setting for a form can be used in the Form View.
b. The tab order setting determines the movement of the insertion point through a form.
c. The tab order setting is usually right-to-left and top-to-bottom.
d. The default tab order setting can be altered by moving the controls in the Design View.
What is the significance of the J and K terminals on the J-K flip-flop?
Options: There is no known significance in their designations., The J represents "jump," which is how the Q output reacts whenever the clock goes HIGH and the J input is also HIGH., The letters represent the initials of Johnson and King, the co-inventors of the J-K flip-flop., All of the other letters of the alphabet are already in use.
Options: (A)a prepared application that takes advantage of a known weakness. (B) a tool used to quickly check computers on a network for known weaknesses. (C) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. (D) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
An autonomous homogenous environment is which of the following?
Options: The same DBMS is at each node and each DBMS works independently., The same DBMS is at each node and a central DBMS coordinates database access., A different DBMS is at each node and each DBMS works independently., A different DBMS is at each node and a central DBMS coordinates database access.