3.What is the purpose of the description column in Table Design View?
Options: (A)To define the data type applied to each field within the table (B) To describe the data that should be entered in each field (C) To enter lookup data that the field should refer to. (D) None of the above 7
To configure the VLAN trunking protocol to communicate VLAN information between two switches, what two requirements must be met? Each end of the trunk link must be set to the IEEE 802.1e encapsulation. The VTP management domain name of both switches must be set the same. All ports on both the switches must be set as access ports. One of the two switches must be configured as a VTP server. A rollover cable is required to connect the two switches together. A router must be used to forward VTP traffic between VLANs.
Options: (A)someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime. (B) a person, usually not an expert in computer security, who breaks into computer systems by using prepackaged automated tools written by others. (C) hacker who utilizes technology to announce a political message. (D) None of these 2
Options: a. by holding Ctrl key, click on existing Guide Line and drag b. by holding Alt key, click on existing Guide Line and drag c. by holding Ctrl + Alt key, click on existing Guide Line and drag d. Additional Guide Lines cannot be created
Options: (A)The process of finding the right formal representation of a certain body of knowledge in order to represent it in a knowledge-based system (B) It automatically maps an external signal space into a systemâ€™s internal representational space. They are useful in the performance of classification tasks (C) A process where an individual learns how to carry out a certain task when making a transition from a situation in which the task cannot be carried out to a situation in which the same task under the same circumstances can be carried out. (D) None of these 5
. In a punched card system, data is processed by a
Options: A) Keypunch machine, sorter and posting machine
B) Accounting machine, posting machine, and billing machine
C) Sorter, posting machine, and billing machine
D) Accounting machine, keypunch machine and sorter
Options: indirect tax levied at each stage of production and distribution, from the primary produce to the retailer, tax calculated on the selling price, but in declaring the liability to the government, the seller is allowed to deduct any tax paid by him when he bought the goods, both (a) and (b), None of the above
Options: a single program is processed by two or more CPUs, two or more programs are stored concurrently in primary storage, only the active pages of a program are stored in primary storage, interprogram interference may occur
Which one of the following statements is true for the voltage in a parallel RL circuit?
Options: The voltage always has the same amplitude and phase for every part of the circuit, The total voltage is equal to the sum of the voltages across the resistance and inductance, The total voltage lags the total current by less than 90, The total voltages is less than the sum of the voltages across the resistance and inductance
To create primary key for a table when in design view
Options: a. Type PRIMARY in field type box when creating required field,
b. Mark the Primary check box in field name of required field,
c. Click the Primary Key button in Design ribbon when the cursor is in required field,
d. None of the above