4.A physical item is one which may be delivered or performed
Options: (A)entirely through a telecommunications network (B) involves logistical activities such as the transportation of goods, or of the person and/or facilities whereby the service will be performed 1
Options: (A)The software and hardware system architectures that provide explicit support for tolerance, which includes software redundancy and faulttolerance controller that detects problems and supports fault recovery* (B) It is an initial step for requirements engineering process, includes the outline description of system, its use in an organization and recommending the system feasibility. (C) Trustworthiness with which a system or component can be modified for use in applications or environments other than those for which it was specifically designed. (D) None of these 20
Options: (A)a prepared application that takes advantage of a known weakness. (B) a tool used to quickly check computers on a network for known weaknesses. (C) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. (D) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
Options: a. When you use multiplication, division or exponentiation in a formula b. When you use addition and subtraction in a formula c. Because Excel uses hidden decimal places in computation d. When you show the results of formulas with different decimal places than the calculated results
Which of the following technique is used for Time-To-Line (TTL)?
Options: a technique used in best-effort delivery system to avoid endlessly looping packets., a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame, One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size., All of the above
Options: (A)It uses machine-learning techniques. Here program can learn from past experience and adapt themselves to new situations (B) Computational procedure that takes some value as input and produces some value as output. (C) Science of making machines performs tasks that would require intelligence when performed by humans (D) None of these 1
. Where can you set the shedding color for a range of cells in Excel?
Options: a. Choose required color form Patterns tab of Format Cells dialog box
b. Choose required color on Fill Color tool in Formatting toolbar
c. Choose required color on Fill Color tool in Drawing toolbar
d. All of above
What should you do if you require pasting the same format in many places?
Options: A) Click the Format painter and go on pasting in many places holding Alt Key, B) Double click the format painter then go on pasting in many places, C) Click the format painter then go on pasting to many places holding Ctrl Key, D) All of above,