Options: a. Foreign key fields don't allow duplicate values
b. In primary key field you can enter duplicate value
c. In an indexed field you may or may not enter duplicate value depending upon setting
d. All statements are true
Options: a . an 8-bit register in the microprocessor b . a 16-bit register in the microprocessor c . a set of memory locations in R/WM reserved for storing information temporarily during the execution of computer d . a 16-bit memory address stored in the program counter
Options: (A)a prepared application that takes advantage of a known weakness. (B) a tool used to quickly check computers on a network for known weaknesses. (C) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. (D) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. 1
Options: the central processing unit of the computer only., the central processing unit of the computer and input/output units only, the central processing unit of the computer, input/output units, and data storage units only, All of the above
In Cisco's Unified Wireless Solution, what is the split-MAC architecture?
Options: The split-MAC architecture uses MAC addresses to create a forward/filter table and break up collision domains., The split-MAC architecture allows the splitting of 802.11 protocol packets between the AP and the controller to allow processing by both devices., The split-MAC architecture uses MAC addresses on the wireless network and IP addresses on the wired network., The split-MAC architecture uses MAC addresses to create a forward/filter table and break up broadcast domains.
Options: (A)where the process will reside in memory, then absolute code can be generated (B) where the process will reside in memory, then the compiler must generate relocatable memory (C) if the process can be moved during its execution from one memory segment to another, then binding must be delayed until run time (D) all of the above 27