You configure the following access list: access-list 110 deny tcp 10.1.1.128 0.0.0.63 any eq smtp access-list 110 deny tcp any eq 23 int ethernet 0 ip access-group 110 out What will the result of this access list be?
Options: Email and Telnet will be allowed out E0., Email and Telnet will be allowed in E0., Everything but email and Telnet will be allowed out E0., No IP traffic will be allowed out E0.
. The toolbars that are displayed by default in the PowerPoint window includes
Options: a. Menu bar, standard toolbar, formatting toolbar, drawing toolbar, status bar b. Menu bar, standard toolbar, formatting toolbar, drawing toolbar, status bar c. Standard toolbar, formatting toolbar, drawing toolbar, status bar d. Menu bar, standard toolbar, status bar, drawing toolbar
The preamble says that the state in India will assure the dignity of the individual. The constitution seeks to achieve this object by guaranteeing
Options: equal fundamental rights to each citizen, the right to adequate means of livelihood to each individual, just and humane conditions of work to each individual, equal wages for equal work to each individual irrespective of sex
Which of the following is not true of a magnetic disk?
Options: It is expensive relative to magnetic tape, It provides only sequential access to stored data, Users can easily update records by writing over the old data, It does not provide an automatic audit trail
Options: (A)Compiler will typically bind these symbolic addresses to relocatable addressees (B) Each binding is a mapping from one address space to another (C) The linkage editor or loader win in turn bind these relocatable addresses to absolute addresses (D) All of the above 26
You have a class A network address 10.0.0.0 with 40 subnets, but are required to add 60 new subnets very soon. You would like to still allow for the largest possible number of host IDs per subnet. Which subnet mask should you assign?
3.In system modeling : A-Complementary system model : B-Context model: CComposition model (1) Here entity-relation (E-R) diagram show how entities in the system are composed of other 90 | entities.2-Shows how the system being modeled is positioned, in an environment with other systems and process. 3-Present different information about the system.
4.The complexity of the average case of an algorithm is
Options: (A)Much more complicated to analyze than that of worst case (B) Much more simpler to analyze than that of worst case (C) Sometimes more complicated and some other times simpler than that of worst case (D) None of the above 1
After entering all fields required for a table, if you realize that the third field is not needed, how will you remove?
Options: a. You need to delete the whole tablThere is no method to remove a particular field only.
b. Delete all the fields from third downwards and reenter the required fields again.
c. Select the third column in datasheet view then Delete
d. Select the third row in table design view then Delete