Which of the following statements is the most accurate?
Options: The degree to which information needs to be summarized increases as one moves up through the management levels, Low-level managers made unstructured decisions, Upper managers make unstructured decisions, Low-level managers need general information about operating activities.
3.When performing a look-up operation using a form
Options: (A)You enter the search value into the form (B) You look at each form sequentially until you see the one you want (C) You type the key in an entry line, and the correct form is displayed (D) All of the above 9
Which two of the following are true regarding the distance-vector and link-state routing protocols? Link state sends its complete routing table out all active interfaces on periodic time intervals. Distance vector sends its complete routing table out all active interfaces on periodic time intervals. Link state sends updates containing the state of its own links to all routers in the internetwork. Distance vector sends updates containing the state of its own links to all routers in the internetwork.
Options: 1 only, 3 only, 2 and 3 only, None of the above
You need to gather the IP address of a remote switch that is located in Hawaii. What can you do to find the address?
Options: Issue the show ip arp command on the router connected to the switch., Issue the show ip route command on the router connected to the switch., Issue the show cdp neighbor command on the router connected to the switch., Issue the show cdp neighbors detail command on the router connected to the switch.
Options: (A)an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. (B) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. (C) a toolkit for hiding the fact that a computerâ€™s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. (D) None of these 1
. What happens when you press Ctrl + X after selecting some cells in Excel?
Options: a. Â The cell content of selected cells disappear from cell and stored in clipboard
b. Â The cells selected are marked for cutting
c. Â The selected cells are deleted and the cells are shifted left
d. Â The selected cells are deleted and cells are shifted up
Options: (A)A reference to the speed of an algorithm, which is quadratically dependent on the size of the data(B) Attributes of a database table that can take only numerical values. (C) Tools designed to query a database. (D) None of these 7