1.It is an electronic commerce in services, i.e. the provision of services with the assistance of telecommunications and telecommunications-based tools. It excludes traffic in physical goods, and hence is concerned with applications of electronic business where, at least in principle, the entire activity can be performed electronically.
Options: (A)Electronic data interchange (EDI) (B) Electronic Publishing (C) Electronic Services Delivery (ES(D) (D) None of these 1
Options: (A)Changes in a memory location effected by one processor do not affect all other processors. (B) Changes in a memory location effected by one processor are visible to all other processors (C) Changes in a memory location effected by one processor are randomly visible to all other processors. (D) None of these 1
The "walk-through" method of programming a robot involves:
Options: walking through your suggested procedure with your supervisor prior to programming, physically moving the robot through all the motions it is to repeat, moving the robot from one location to another, All of the above.
Options: (A)Quality measures that address how easily a system can evolve or migrate (B) Piece of software that acts to accomplish tasks on behalf of its user (C) A quantitative option analysis that allows the cost of various options to be computed, and options can be compared on objective basis (D) Extent to which a software system or component allows for or supports anonymous transactions 11
The parliament can legislate on the subject in the state list
Options: if the President issues an order authorizing it to do so, if the Supreme Court of India gives authority to the Parliament of India in this regard, if the Rajya Sabha passes a resolution by two-third of its to legislate on a state matter in the national interest, None of the above
Options: hardware system used to create, maintain, and provide controlled access to a database., hardware system used to create, maintain, and provide uncontrolled access to a database., software system used to create, maintain, and provide controlled access to a database., software system used to create, maintain, and provide uncontrolled access to a database.
Which of the following is true regarding access lists applied to an interface?
Options: You can place as many access lists as you want on any interface until you run out of memory., You can apply only one access list on any interface., One access list may be configured, per direction, for each layer 3 protocol configured on an interface., You can apply two access lists to any interface.