Which of the following statements are correct about 6 used in the program?
Options: In the first statement 6 specifies a particular element, whereas in the second statement it specifies a type., In the first statement 6 specifies a array size, whereas in the second statement it specifies a particular element of array., In the first statement 6 specifies a particular element, whereas in the second statement it specifies a array size., In both the statement 6 specifies array size.
Options: (A)Associated with the role of people involved in software process and the activities for which they are responsible (B) The most effective technique for demonstrating the safety of a system is proof by contradiction. (C) It is concerned with establishing a confidence level in the system that might vary from low to high (D) None of these 23
4.Lehmanâ€™s Second Law (Lehman and Belady 1985) is
Options: (A)Continuing change: A program used in real-world environment must change necessarily or become progressively less useful in that environment. (B) Increase complexity: As an evolving program change, its strictures tend to become more complex. Extra resources must be devoted to preserving and simplifying the structure. (C) Large program evolution: Program evolution is a self-regulating process. (D) None of these 19
The first industrial robot for commercial uses was installed in a Japanese plant at Toyota Automatic Loom Company, the parent company of the Toyota Automobile Group. When did this robot go into operation?
Options: June 1965, November 1966, December 1967, April 1970
Options: a. Location in memory that maintains the contents of documents until it prints out
b. Queue of print job that are waiting to print
c. Program that coordinates the print job that are waiting to process
d. Message sent from the printer to the operating system when a print job is completed
Which of the following technique is used for fragment?
Options: a technique used in best-effort delivery systems to avoid endlessly looping packets, a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame, one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size, All of the above