Options: (A)Trustworthiness with which a system or component can be modified to increase its storage or functional capacity (B) Pertaining to a system/component that automatically places itself in a safe operating mode in the event of a failure. (C) Pertaining to a system or component that continues to provide partial operational capability in the event of certain failures. (D) None of these 17
Options: (A)Time-period that begins when a software product is conceived and ends when the software is no longer available for use. (B) Adaptive maintenance, performed to make a computer program usable in a changed environment. (C) A simplified description of a software process that is presented from a particular perspective. (D) None of these 24
Options: (A)It is concern with modification of existing system to meet changing requirements. (B) It is a process of converting system specifications into an executable system. (C) It analyzes and checks system representation such as the requirements document, design diagrams and program source code. (D) None of these 25
You're on your PC at midnight and an electric storm pops up. What's the best way to protect your PC.
Options: you don't worry; you have a lightning rod on your house, you don't worry; you've got a surge protector on your PC, you don't worry; you've got a surge protector on your PC and phone line to your modem, unplug the PC and remove phone line from the modem
Options: a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address, a TCP/IP high level protocol for transferring files from one machine to another, a protocol used to monitor computers, a protocol that handles error and control messages