Options: (A)A set of activities and associated results that produce a software product. (B) It is concerned with re-implementing legacy system to make them more maintainable. (C) It is the official statement of what is required of the system developers; it includes uses requirements for a system and detailed specification of the system requirements (D) None of these. 25
Options: (A)the buyer and seller are concerned with the gathering of market intelligence. (B) a formal relationship is established between buyer and seller, including terms and conditions to be applied to transactions under the contract. (C) this involves the placement and processing of purchase orders (or, in contractual terms, an offer), and acknowledgement by the seller of its preparedness to deliver (in contractual terms, an acceptance). (D) deals with the delivery of goods and/or the performance of services. In addition, some post-delivery functions may be involved, in particular inspection, and acceptance or rejection. 1
5.With round-robin CPU scheduling in a time shared system
Options: (A)using very large time slices degenerates into First-Come First Served Algorithm (B) using extremely small time slices improves performance (C) using very small time slices degenerate into Last-In-First-Out algorithm (D) using medium sized time slices leades to Shortest Request Time First algorithm. 20
Which of the following system program forgoes the production of object code to generate absolute machine code and load it into the physical main storage location from which it will be executed immediately upon completion of the assembly?
Options: two pass assembler, load-and-go assembler, macroprocessor, compiler
You have a network ID of 22.214.171.124 and you need to divide it into multiple subnets in which at least 600 host IDs for each subnet are available. You desire to have the largest amount of subnets available. Which subnet mask should you assign?
Which of the following technique is used for encapsulation?
Options: a technique used in best-effort delivery systems to avoid endlessly looping packets., a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame., One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size, All of the above