An application process is assigned a process identifier number (process ID), which is likely to
be _______ each time that process is started.
A. Similar
B. smaller
C. different
D. larger

1 Answer

Answer :

C. different

Related questions

Description : In process to process delivery, an application process is assigned a ………….., which is likely to be …………….each time that process is started A. process identifier number , different B. process identifier number, same C. source, mixed D. Source, similar

Last Answer : A. process identifier number , different

Description : Each item of the Work Breakdown Structure is assigned a unique identifier. What is the name  of this identifier? 1. Product ID number  2. Code of accounts  3. Quality inspection identifier  4. Project activity code

Last Answer : 2. Code of accounts

Description : In IPv6, the _______ field inthe baseheader and thesender IP address combineto indicate aunique path identifier for aspecific flow of data. A) flow label B) nextheader C) hoplimit D) destination IP address

Last Answer : flow label

Description : Processes on the remote systems are identified by ___________ a) host ID b) host name and identifier c) identifier d) process ID

Last Answer : host name and identifier

Description : A signal is measured at two different points. The power is P1 at the first point and P2 at the second point. The dB is 0. This means________. A) P2 is zero B) P2 equals P1 C) P2 is much larger than P1 D) P2 is much smaller than P1

Last Answer : P2 equals P1

Description : What is meant by a dedicated computer? a. Which is used by one person only b. Which is assigned one and only one task c. Which uses one kind of software d. Which is meant for application software

Last Answer : Which is assigned one and only one task

Description : Header of a frame generally contains a. synchronization bytes b. addresses c. frame identifier d. all of the mentioned

Last Answer : d. all of the mentioned

Description : Header of a Layer two frame usually contain ______________ A. synchronization bytes B. addresses C. frame identifier D. all of the mentioned

Last Answer : D. all of the mentioned

Description : Select the wrong statement. (a) In oomycetes, female gamete is smaller and motile, while male gamete is larger and non- motile. (b) Chlamydomonas exhibits both isogamy and anisogamy and ... in structure, function and behaviour. (d) Anisogametes differ either in structure, function or behaviour.

Last Answer : (a) In oomycetes, female gamete is smaller and motile, while male gamete is larger and non- motile.

Description : The Application layer offers _______ service. A. End to end B. Process to process C. Both End to end and Process to process D. None of the mentioned

Last Answer : A. End to end

Description : When buying a gift for a child's birthday party, are you more likely to err on the side of a smaller, cheaper gift or the side of a larger, more expensive gift?

Last Answer : I’m more likely to err on the side of a cheaper but useful toy – something developmental, gender-neutral and something my kids enjoyed.

Description : The optimum performance for reactors operating in parallel is obtained when the feed stream is distributed in such a way, that the (A) Space time for each parallel line is same (B) Space time for ... is different (C) Larger reactors have more space time compared to smaller ones (D) None of these

Last Answer : (A) Space time for each parallel line is same

Description : Which among the following definitions is correct: a) Address - The unique number ID assigned to one host or interface in a network b) Subnet - A portion of a network sharing a particular subnet address c) ... to the host d) Interface - A network connection e) None of These f) All of the Above

Last Answer : f) All of the Above

Description : Which among the following definitions is correct: a) Address - The unique number ID assigned to one host or interface in a network b) Subnet - A portion of a network sharing a particular subnet address c) ... to the host d) Interface - A network connection e) None of These f) All of the Above

Last Answer : f) All of the Above

Description : The master list of an indexed file A. is sortedin ascending order B. containsonly a list of keys and record numbers C. has a number assigned toeach record D. both (b)and (c) E. None of the above

Last Answer : has a number assigned toeach record

Description : A subnet has been assigned a subnet mask of 255.255.255.192. What is the maximum number of hosts that can belong to this subnet? a. 14 b. 30 c. 62 d. 126

Last Answer : c. 62

Description : In classless addressing, the _______ is the varying part (similar tothe hostid). A) suffix B) prefix C) hostid D) none of the above

Last Answer : suffix

Description : In ___________ methods, no station is superior to another station and none is assigned the controlover another. A) random access B) controlledaccess C) channelization D) none of the above

Last Answer : random access

Description : In the network 200.10.11.144/27, the fourth octet (in decimal) of the last IP address of the network which can be assigned to a host is ________ a. 158 b. 255 c. 222 d. 223

Last Answer : a. 158

Description : To avoid ambiguity, the names assigned to machines must be carefully selected from a ______ with complete control over the binding between the names and IP addresses A. Table B. look up table C. name space D. name table

Last Answer : C. name space

Description : An initial (first-time) audit requires more audit time to complete than a recurring audit. One of the reasons for this is that a. New auditors are usually assigned to an initial audit. b. A ... unfamiliar to the auditor and need to be carefully studied. d. Predecessor auditors need to be consulted.

Last Answer : The client's business, industry, and internal control are unfamiliar to the auditor and need to be carefully studied

Description : The TCP/IP _______ layer is equivalent to the combined session, presentation, and application layers of the OSI model. a.data link b.network c.physical d.application

Last Answer : d.application

Description : Application layer is implemented in _______ a. End system b. NIC c. Ethernet d. Packet transport

Last Answer : a. End system

Description : The _______ layer is the topmost layer in the subnet. A. Network B. application C. transport D. physical

Last Answer : A. Network

Description : To deliver a message to the correct application program running on a host, the _______ address must be consulted. A. IP B. MAC C. Port D. None of the mentioned

Last Answer : C. Port

Description : Pick out the wrong statement. (A) Alkylation produces a larger iso-paraffin (having higher octane number) from the reaction of an olefin with smaller iso-paraffin (B) Catalytic alkylation processes use HF ... (> 1000°C) (D) Gasoline having an octane number of 90 can be produced by alkylation process

Last Answer : (C) All the alkylation processes use very high temperature (> 1000°C)

Description : Which of the following statements accurately describe the differences between a hub and a switch? Check all that apply. A. A switch remembers which devices are connected on each interface, while a hub does not. B. A hub is a ... versions of switches. a. A,B b. A,B,C c. A,B,C,D d. A,C,D

Last Answer : b. A,B,C

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : In ________, we combine signals from different sources to fit into a larger bandwidth. A) spread spectrum B) line coding C) block coding D) none of the above

Last Answer : spread spectrum

Description : Consider different activities related to email: m1: Send an email from a mail client to a mail server m2: Download an email from mailbox server to a mail client m3: Checking email in a web browser Which is the application ... FTP m3: HTTP c. m1: SMTP m2: POP m3: HTTP d. m1: POP m2: SMTP m3: IMAP

Last Answer : c. m1: SMTP m2: POP m3: HTTP

Description : Two stones of different masses are dropped simultaneously from the top of a building – (1) Smaller stone reaches the ground earlier (2) Larger stone reaches the ground earlier (3) Both the stones reach the ground at the same time (4) Depends on the composition of the stone

Last Answer : (3) Both the stones reach the ground at the same time Explanation: Both stones at the same Lime. The initial speed is 0 for both stones, and the only acceleration working in that system would be g ... way across the air. The shape of the falling object will decide the force needed to open that way.

Description : Two stones of different masses are dropped simultaneously from the top of a building (1) Smaller stone reaches the ground earlier (2) Larger stone reaches the ground earlier (3) Both the stones reach the ground at the same time (4) Depends on the composition of the stone

Last Answer : Both the stones reach the ground at the same time

Description : What is the process in which larger creatures eat smaller creatures or plants?

Last Answer : molicules

Description : The process by which smaller nuclear joins and forms larger nucelus is called?

Last Answer : Fusion reaction

Description : Key field is a unique identifier for each record. It is defined in the form of (a) rows (b) columns -Technology

Last Answer : (b) Key is a data item that allows you to uniquely identify individual occurrences which is defined as the column or set of columns.

Description : You are working with a network thathas the network ID 192.168.10.0. What subnet should you use that supportsup to 25 hosts and a maximum number of subnets? A. 255.255.255.192 B. 255.255.255.224 C. 255.255.255.240 D. 255.255.255.248 E. 255.255.255.252

Last Answer : 255.255.255.224

Description : Gause's principle of competitive exclusion states that (a) no two species can occupy the same niche indefinitely for the same limiting resources (b) larger organisms exclude smaller ... through competition (d) competition for the same resources exclude species having different food preference

Last Answer : (c) more abundant species will exclude the less abundant species through competition

Description : Which of the following encoding methods does not provide for synchronization? A) NRZ-L B) RZ C) NRZ-I D) Manchester

Last Answer : NRZ-L

Description : _____ is an ideaor concept that isa precursor to an Internet standard. A) RCF B) RFC C) ID D) none of the above

Last Answer : RCF

Description : What partof 192.168.10.51 is the Network ID, assuming a default subnet mask? A. 192 B. 192.168.10 C. 0.0.0.5 D. 51 E. None of the above

Last Answer : 192.168.10

Description : In the MIME header field, ____describes how the object within the body was encoded in order that it be included in the message using a mail-safe form. a. content-type b. content-transfer-encoding c. content-description d. content-id

Last Answer : b. content-transfer-encoding

Description : In the MIME header field____describes how the object within the body is to be interpreted. a. content-type b. content-transfer-encoding c. content-description d. content-id

Last Answer : a. content-type

Description : The IETF standards documents that describe various protocols applicable to the working of the Internet are called ________ a) RFC b) RCF c) ID d) DFC

Last Answer : a) RFC

Description : A ________ is a 16-bit number used by the host-to-host protocol to identify to which higher- level protocol or application program (process) it must deliver incoming messages A. connection B. UDP C. port D. TCP

Last Answer : C. port

Description : Suppose there are n stations in a slotted LAN. Each station attempts to transmit with a probability P in each time slot. The probability that only one station transmits in a given slot is _______. a. nP(1 – P)n – 1 b. nP c. P(1 – P)n – 1 d. n P (1 – P)n – 1

Last Answer : a. nP(1 – P)n – 1

Description : When the center of a blind flange is raised, how much smaller in diameter shall the raised portion be in relation to the ID of the fitting? a) 1/2". b) 3/4". c) 1" d) 1.25"

Last Answer : c) 1"