Options: EXISTS/NOT EXISTS is a form of a correlated subquery., The processing of the SELECT statements is nested., They can be used to verify functional dependencies., They are very similar to a regular subquery.
6.Lehmanâ€™s Fourth Law (Lehman and Belady 1985) is
Options: (A)Organizational stability: Over a programâ€™s lifetime, its rate of development is approximately constant and independent of the resources devoted to system development. (B) Increase complexity: As an evolving program change, its strictures tend to become more complex. Extra resources must be devoted to preserving and simplifying the structure. (C) Large program evolution: Program evolution is a self-regulating process. (D) None of these 20
. How do you change column width to fit the contents?
Options: a. Single-click the boundary to the left to the column heading b. Double click the boundary to the right of the column heading c. Press Alt and single click anywhere in the column d. All of above
Options: (A)A class of learning algorithm that tries to find an optimum classification of a set of examples using the probabilistic theory. (B) Any mechanism employed by a learning system to constrain the search space of a hypothesis. (C) An approach to the design of learning algorithms that is inspired by the fact that when people encounter new situations, they often explain them by reference to familiar experiences, adapting the explanations to fit the new situation. (D) None of these
9.Match the following: A- Formal mathematical transformation: B- Formal process model: C-Formal Specifications: D-Formal System development: 1- Here the formal mathematical representation of the system takes place. 2- It is a starting point for process analysis. It is abstract and only defines the principal process activities and deliverables. 3-Specifications expressed in a language whose vocabulary, syntax and semantics are formally defined. 4-It is more common to waterfall model, but here the development process is based on formal mathematical transformation of a system specification to an exactable program.
Options: a. Insert a text box and select Insert >> Page Number b. Insert a textbox and select Insert >> Number >> PageNumber c. Choose Insert >> Slide Number d. Insert a new text box and select Insert >> slide Number
What are reasons for creating OSPF in a hierarchical design? To decrease routing overhead To speed up convergence To confine network instability to single areas of the network To make configuring OSPF easier
Options: a. Allow you to view a different worksheet b. Allow you to view additional worksheet rows down c. Allow you to view additional worksheet columns to the right d. Allow you to view additional sheets tabs
Options: (A)a prepared application that takes advantage of a known weakness. (B) a tool used to quickly check computers on a network for known weaknesses. (C) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. (D) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. 1
Options: the time required to complete one full cycle, the number of cycles completed in one second, the time required for the voltage to rise from 10% to 90% of the peak amplitude, equal to 0.707 times the peak amplitude
Options: a method of determining which device has access to the transmission medium at any time, a method access control technique for multiple-access transmission media., a very common bit-oriented data link protocol issued by ISO., network access standard for connecting stations to a circuit-switched network
Options: is a device that performs a sequence of operations specified by instructions in memory., is the device where information is stored, is a sequence of instructions, is typically characterized by interactive processing and time of the CPU's time to allow quick response to each user.
2.Match the following access rights :A-Specific user, B-User group, C-All ; 1- Individual user who are designated by user I, 2-A set of users who are individually defined, 3-Every user has access to the system.
Options: (A)A â€“ 1, B â€“ 2, C â€“ 3 (B) A â€“ 2, B â€“ 1, C â€“ 3 (C) A â€“ 1, B â€“ 3, C â€“ 2 (D) A â€“ 3, B â€“ 2, C â€“ 1 18