Options: (A)Extent to which a system or component performs a broad range of functions. (B) The objective of an organization to achieve. (C) Methods and techniques for converting data to or from graphic display via computers. (D) None of these 19
. What is the use of Referential Integrity in MS Access?
Options: a. It allow to enter a value in the foreign key field of a child table if that value exist in the primary key of the parent table
b. It does not allow to enter a value in the foreign key field of a child table if that value exist in the primary key of the parent table
c. It allow to enter a value in the Primary key field of a child table if that value exist in the Foreign key of the parent table
d. None of above
You are unsuccessful in telnetting into a remote device. What could the problem be? IP addresses are incorrect. Access control list is filtering Telnet. There is a defective serial cable. The VTY password is missing.
Options: 1 only, 3 only, 2 and 4 only, All of the above
Options: (A)Period in the software life cycle in which a software product is created from design documentation and debugged. (B) Period in the software life cycle in which a software product is integrated in its operational environment, and tested in this environment to ensure it performs as required. (C) Period in the software life cycle during which the basic version of a software product is adapted to a specified set of operational environments and is distributed to a customer base. (D) None of these 20
0.The demand paging and pre paging of virtual memory management are
Options: (A)Fetch policy for virtual memory management. (B) Placement policy for virtual memory management. (C) Replacement policy for virtual memory management. (D) None of these. (i) A- Fetch, B-Demand paging, C-Prepaging; 1-Determines when a page should be bought into main memory. 2A page is bought into main memory only when a reference is made to a location on that page. 3-Pages other than the one demanded by a page fault are bought in. (E) A â€“ 1, B â€“ 2, C â€“ 3 (F) A â€“ 3, B â€“ 2, C â€“ 1 (G) A â€“ 2, B â€“ 3, C â€“ 1 (H) A â€“ 3, B â€“ 1, C â€“ 2 10
Options: (A)It involves data sharing between more than two tasks, which are often specified as being members in a common group, or collective. (B) It involves two tasks with one task acting as the sender/producer of data, and the other acting as the receiver/consumer. (C) It allows tasks to transfer data independently from one another. (D) None of these 2
What information is displayed by the show hosts command? Temporary DNS entries The names of the routers created using the hostname command The IP addresses of workstations allowed to access the router Permanent name-to-address mappings created using the ip host command The length of time a host has been connected to the router via Telnet
Options: 1, 2 and 3, 1 and 4, 3, 4, and 5, All of the above