Which of the following is true concerning personal computers?
Options: They decrease the demand for mainframe computers, They have been most successful in the home, The electronic spreadsheet has been a primary reason for their popularity, Their future is not so bright owning to the improved cost-performance ratio of minis and mainframes
Options: (A)It require some type of handshaking between tasks that are sharing data . This can be explicitly structured in code by the programmer, or it may happen at a lower level unknown to the programmer. (B) It involves data sharing between more than two tasks, which are often specified as being members in a common group, or collective. (C) It involves two tasks with one task acting as the sender/producer of data, and the other acting as the receiver/consumer. (D) It allows tasks to transfer data independently from one another. 1
Options: (A)It is the process of modifying the state space of the system so that the effects of the fault are minimized and system can continue in operation in some degraded state. (B) Capacity of a system or component to continue normal operation despite the presence of hardware or software faults. | 103 (C) It is the widely used hazard technique (D) Incorrect step, process, or data definition in a computer program 20
The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer
Options: An additional token is added for every 1,000 nodes, The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500, The network becomes less efficient, After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device
Which of the following is not true about modifying table columns?
Options: You can drop a column at any time., You can add a column at any time as long as it is a NULL column., You can increase the number of characters in character columns or the number of digits in numeric columns, You cannot increase or decrease the number of decimal places.
Options: (A)is executed when a window is becoming visible or is being hidden (B) when a window is being disabled or enabled this event is executed (C) this event is executed when the user switches to another window of the same application (D) when a window receives the keyboard focus this event is executed 2
You have your laptop directly connected into a router's Ethernet port. Which of the following are among the requirements for the copy flash tftp command to be successful? TFTP server software must be running on the router. TFTP server software must be running on your laptop. The Ethernet cable connecting the laptop directly into the router's Ethernet port must be a straight-through cable. The laptop must be on the same subnet as the router's Ethernet interface. The copy flash tftp command must be supplied the IP address of the laptop.
Options: 1, 3 and 4, 2, 4 and 5, 3 and 5 only, 5 only