6.Match the following : A- Error handling : BError proneness: C- Error tolerance:: 1Extent to which a system or component to continue normal operation despite the presence of erroneous inputs.: 2- Extent to which a system allowed the user, to intentionally or unintentionally introduce errors into or misuse the system.: 3- Function of a computer system/ component that identify and respond to user or system errors to maintain normal or at the very least degraded operations.
Options: (A)A-3,B-2,C-1 (B) A-1,B-2,C-3 (C) A-2,B-1,C-3 (D) None of these 18
The Acme Corporation is implementing dial-up services to enable remote-office employees to connect to the local network. The company uses multiple routed protocols, needs authentication of users connecting to the network, and since some calls will be long distance, needs callback support. Which of the following protocols is the best choice for these remote services?
Options: A) You can set different header footer for even and odd pages, B) You can set different page number formats for different sections, C) You can set different header footer for first page of a section, D) You can set different header and footer for last page of a section,
Which one of the following statements is true for the voltages in a series RC circuit?
Options: The total voltage is equal to the sum of the voltages across the resistance and capacitance, The voltage always has the same amplitude and phase for every part of the circuit, The total voltage is less than the sum of the voltages across the resistance and capacitance, The total voltage is greater than the sum of the voltages across the resistance and capacitance
Options: (A)Extent to which a software module can be used in more than one computing program (B) It involves regular monitoring of the risks identified and of new risks that develops. (C) It considers each of the key risks that are identified and identifies strategies to manage the risk. (D) None of these 24
Options: (A)One system is designed as the system controller and has responsibility for managing the execution of other subsystems. (B) Each system is named as in attributebased identification and associated with one or more change requests. (C) An object class inheritance diagram, how entities have common characteristics. (D) The objective is to develop zero-defect software. 14