A customer attached an external drive to his notebook computer but the computer is not recognizing it. What should be considered?
Options: The cables are attached firmly, Â Â The external drive has been preÂ¬loaded with the appropriate software, Â Â The external drive was attached before the computer was on, Â Â The external drive is turned on
Options: (A)It is the process of modifying the state space of the system so that the effects of the fault are minimized and system can continue in operation in some degraded state. (B) Capacity of a system or component to continue normal operation despite the presence of hardware or software faults. | 103 (C) It is the widely used hazard technique (D) Incorrect step, process, or data definition in a computer program 20
Options: a program segment that has not been proved bug-free, a program segment that often causes unexpected system crashes, a program segment where shared resources are accessed, one which is enclosed by a pair of P and V operations on semaphores
Which of the following technique is used for encapsulation?
Options: a technique used in best-effort delivery systems to avoid endlessly looping packets., a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame., One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size, All of the above
The preamble enshrines certain ideals that were first spelt out in
Options: the speech by Jawaharlal Nehru on the banks of Ravi when he called for Purana Swaraj, the Nehru report, a resolution adopted at the Karachi session of the Indian National Congress, the Objectives Resolution adopted by the Constituent Assembly
Options: is a hardware memory device which denotes the location of the current instruction being executed., is a group of electrical circuits (hardware), that performs the intent of instructions fetched from memory., contains the address of the memory location that is to be read from or stored into., contains a copy of the designated memory location specified by the MAR after a "read" or the new contents of the memory prior to a "write".