Options: (A)Are statements, made in natural language to specify the system specification and constraints (B) An abstract description of software design, which is an extension of system requirement specification (C) Discusses the market policy of the system (D) None of these | 89 6
Options: (A)how the file system should look to the user (B) algorithm and data structure must be created to map the logical file system onto the secondary storage device (C) Both A and B above (D) none of the above 25
Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer:
Options: Network Server, Virtual Private Network, Network operating system, OSI
. What is the quickest way to select entire worksheet?
Options: Choose Edit -> Select all from the Menu
B. Click on the first column, press Ctrl, and then click on the last column
C. Click on the first column, press Shift, and then click on the last column
D. Click on the rectangle box on the upper left corner where column headings and row headings meet
Data link layer retransmits the damaged frames in most networks. If the probability of a frame's being damaged is p, what is the mean number of transmissions required to send a frame if acknowledgements are never lost.
Options: P I (K + 1), KIK (1 + F), 1/ (1 - F), K I (K - P)
When the RET instruction at the end of subroutine is executed,
Options: a . the information where the stack is iniatialized is transferred to the stack pointer b . the memory address of the RET instruction is transferred to the program counter c. two data bytes stored in the top two locations of the stack are transferred to the program counter d. two data bytes stored in the top two locations of the stack are transferred to the stack pointer
Which of the following statements are true regarding the command ip route 172.16.4.0 255.255.255.0 192.168.4.2? The command is used to establish a static route. The default administrative distance is used. The command is used to configure the default route. The subnet mask for the source address is 255.255.255.0.
Options: 1 and 2, 2 and 4, 3 and 4, All of the above