Options: (A)Associated with the role of people involved in software process and the activities for which they are responsible (B) The most effective technique for demonstrating the safety of a system is proof by contradiction. (C) It is concerned with establishing a confidence level in the system that might vary from low to high (D) None of these 23
Options: defines a source or destination of system data, identifies data flow, represents a process that transforms incoming data flow(s) into outgoing data flows, is a data store-data at rest, or a temporary repository of data
If you need to double underline a word, how will you do that?
Options: a. Go to Format menu and then Font option. Open Underline Style and choose Double Underline
b. From Format menu choose Font option and then from Font tab open Underline Style and select Double Underline
c. Select the text then choose Format >> Font and on Font tab, open Underline Style and choose Double Underline
d. Click double underline tool on formatting toolbar
Options: (A)Contains data to be written into memory. (D) Contains data to be read from memory. (C) Specifies location in memory for next read/or writer. (D) Contains address of next instruction to be fetched.
5.In Microsoft PowerPoint the following is not a way to cut ext
Options: (A)Select the text and press the delete button (B) Select the text and select Edit, Cut from the menu (C) Select the text and click the Cut button on the toolbar (D) Select the text and press Ctrl + X 6
You copy a configuration from a network host to a router's RAM. The configuration looks correct, yet it is not working at all. What could the problem be?
Options: You copied the wrong configuration into RAM., You copied the configuration into flash memory instead., The copy did not override the shutdown command in running-config., The IOS became corrupted after the copy command was initiated.