Description : ______ refers totwo characteristics: when data should be sent and how fast it can be sent. A) Semantics B) Syntax C) Timing D) none of the above
Last Answer : Timing
Description : _____defines how a particular pattern to be interpreted,and whataction is tobe taken based on that interpretation. A) Semantics B) Syntax C) Timing D) None of the abov
Last Answer : Semantics
Description : Application layer protocol defines ____ a.types of messages exchanged b.message format, syntax and semantics c.rules for when and how processes send and respond to messages d.all of the mentioned
Last Answer : d.all of the mentioned
Description : Data integrity control A. is used to set upper and lower limits on numeric data B. requires the use of passwords toprohibit unauthorized access tothe file C. has the data dictionary keep thedate and time ... back-up,and most recent modificationfor all files D. All of theabove E. None of the above
Last Answer : has the data dictionary keep thedate and time of lastaccess last back-up,and most recent modificationfor all files
Description : _______ refers to the structure or format of the data, meaning the order in which they are presented.
Description : Satellite-Switched Time-Division Multiple Access (SS/TDMA) is A. the method of determining whichdevice has access tothe transmission medium at any time. B. a medium access control technique for ... switching is used to dynamically changethechannel assignments D. All of theabove E. None of the above
Last Answer : a form of TDMA in which circuit switching is used to dynamically changethechannel assignments
Description : The Internet Control Message Protocol (ICMP) A. allows gateways to send error acontrol messages toother gateways or hosts B. provides communication between the Internet Protocol Software on one machine ... and takeaction to correct theproblem D. All of theabove E. None of the above
Last Answer : All of theabove
Description : The rules that give meaning to the instructions. a) Semantics b) Syntax c) Code d) Cases
Last Answer : Answer: a Explanation: The answer is semantics. They are the rules that give meaning to the instructions. Syntax is the formal rules that ensure validation of code
Description : Data aresent over pin _____ of the EIA-232 interface. A. 2 B. 3 C. 4 D. All of theabove
Last Answer : 2
Description : The formal grammar rules governing the construction of valid instruction. a) test case b) syntax c) program d) semantics
Last Answer : Answer: b Explanation: Syntax determines the grammatical rules in a code. Semantics give meaning to the instructions
Description : Which is used to mediate between syntax and semantics? a) Form b) Intermediate form c) Grammer d) All of the mentioned
Last Answer : b) Intermediate form
Description : Carrier is A. One or more conductors that serve as a common connection for a related group of devices B. a continuous frequency capableof being modulated or impressed witha second signal C. ... that provides a data communications service among stations attached tothe network E. None of the above
Last Answer : a continuous frequency capableof being modulated or impressed witha second signa
Description : Contention is A. One or more conductors that serve as a common connection for a related group of devices B. a continuous frequency capableof being modulated or impressed witha second signal C. ... that provides a data communications service among stations attached tothe network E. None of the above
Last Answer : the condition whentwo or more stations attempt to use the same channel at the same time
Description : Devices may bearrangedin a _____ topology. A) mesh B) ring C) bus D) all of theabove
Last Answer : all of theabove
Description : . In order to use arecord management system A. You needto understand thelow-level details of how informationin stored B. You needto understand the model the record management system uses. C. Both (a)and (b) D. All of theabove E. None of the above
Last Answer : You needto understand the model the record management system uses.
Description : A repeater is a connecting devicethat operates in the _______ layer of theInternet model. A) physical B) data link C) network D) all of theabove
Last Answer : physical
Description : In SQL, the CREATE TABLESPACE isused A. to createa place in the databasefor storageof scheme objects, rollback segments, andnaming the data files to comprise the tablespace B. to createa database trigger C. to add/rename data files, to change storage D. All of theabove E. None of the above
Last Answer : to createa place in the databasefor storageof scheme objects, rollback segments, andnaming the data files to comprise the tablespace
Description : A logical schema A. is the entire database B. is a standard wayof organizing information into accessible parts C. describes how data is actually stored on disk D. All of theabove E. None of the above
Last Answer : is a standard wayof organizing information into accessible parts
Description : Data encryption techniquesare particularly useful for A. reducingstorage space requirements B. improving data integrity C. protecting data indata communication systems D. All of theabove E. None of the above
Last Answer : protecting data indata communication systems
Description : Goals for the design of thelogical schema include A. avoiding data inconsistency B. being ableto construct queries easily C. being ableto access data efficiently D. All of theabove E. None of the above
Description : Data flow between two devices canoccur in a _______ way. A) simplex B) half-duplex C) full-duplex D) all of theabove
Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above
Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame
Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above
Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size
Description : Which of the following is not a disadvantage of wireless LAN? A. Slower data transmission B. higher error rate C. interference of transmissions from different computers D. All of theabove
Description : In Bluetooth, the_____layer is roughlyequivalent tothe MAC sublayer in LANs. A) radio B) baseband C) L2CAP D) none of the above
Last Answer : baseband
Description : In SONET, for each byte, the bitsare transmitted ____________. A) from least significant to the most significant B) from most significant tothe least significant C) two at atime D) three at atime
Last Answer : from least significant to the most significant
Description : In IPv6,a _______address is usedif aLAN uses the Internet protocols but isnot connected tothe Internet for security reasons. A) link local B) site local C) mapped D) none of the above
Last Answer : link local
Description : In classless addressing, the _______ is the varying part (similar tothe hostid). A) suffix B) prefix C) hostid D) none of the above
Last Answer : suffix
Description : _________ refers to the sounds of a language. a. Grammar b. Phonology c. Pragmatics d. Semantics
Last Answer : b. Phonology
Description : In the system conceps, term organization ? implies structure and order refers to the manner in which each component fuctions with other components of the system refers to the holism of system means that part of the computer system depend on one another
Last Answer : implies structure and order
Description : Which of the following layers of the OSI reference model is concerned with the syntax of data exchanged between application entities? a. Presentation layer b. Application layer c. Transportation layer d. Session layer
Last Answer : a. Presentation layer
Description : A _________ digital signal includes timing informationin the data beingtransmitted. A) self-synchronizing B) self-modulated C) self-transmitted D) none of the above
Last Answer : self-synchronizing
Description : Internal auditors review the adequacy of the company's internal control system primarily to a. Help determine the nature, timing, and extent of tests necessary to achieve audit objectives. b. ... and economically. d. Ensure that material weaknesses in the system of internal control are corrected
Last Answer : Determine whether the internal control system provides reasonable assurance that the company's objectives and goals are met efficiently and economically.
Description : A _____ contains specific rules and words that express the logical steps of an algorithm. 1) Syntax 2) Programming structure 3) Programming language 4) Logic chart 5) None of these
Last Answer : Answer :3
Description : If an Ethernet destination address is08:07:06:05:44:33, then this is a ______ address. A) unicast B) multicast C) broadcast D) any of theabove
Last Answer : unicast
Description : f an Ethernet destination address is07:01:02:03:04:05, then this is a ______ address. A) unicast B) multicast C) broadcast D) any of theabove
Last Answer : multicast
Description : Membership in a VLAN can be based on _________. A) port numbers B) MAC addresses C) IP addresses D) all of theabove
Description : In Go-Back-N ARQ, if frames 4,5, and 6 are received successfully, thereceiver may send an ACK _______ to thesender. A) 5 B) 6 C) 7 D) any of theabove
Last Answer : 7
Description : In______ schemes, the voltagesare on the both sidesof the time axis. Forexample, thevoltage level for 0 can bepositive and thevoltage level for 1 can be negative. A) polar B) bipolar C) unipolar D) all of theabove
Last Answer : polar
Description : Ina _____scheme,all the signal levels are onone sideof the time axis,either above or below. A) polar B) bipolar C) unipolar D) all of theabove
Last Answer : unipolar
Description : _________can impair a signal. A) Attenuation B) Distortion C) Noise D) All of theabove
Description : SONET network topologies can be__________. A) linear B) ring C) mesh D) all of theabove
Last Answer : ring
Description : A SONET system can use _________. A) STS multiplexers B) regenerators C) add/drop multiplexers D) all of theabove
Last Answer : add/drop multiplexers
Description : In ATM, connection between two endpoints is accomplishedthrough_______. A) TPs B) VPs C) VCs D) all of theabove
Description : ______ eliminates the varying delay times associated withdifferent-size packets. A) X.25 B) Frame Relay C) ATM D) all of theabove
Last Answer : ATM
Description : A command that lets youchange one or more fields in a record is A. Insert B. Modify C. Look-up D. All of theabove E. None of the above
Last Answer : Modify
Description : The database administration function includes A. application programming B. computer operations management C. databaseaccessplanning D. All of theabove E. None of the above
Last Answer : databaseaccessplanning
Description : Which commandis usedto selectdistinct subject (SUB) from thetable (BOOK)? A. SELECT ALL FROM BOOK B. SELECT DISTINCT SUB FROM BOOK C. SELECT SUB FROM BOOK D. All of theabove E. None of the above
Last Answer : SELECT DISTINCT SUB FROM BOOK
Description : In SQL, which commandis used to select only onecopy of each setof duplicablerows A. SELECT DISTINCT B. SELECT UNIQUE C. SELECT DIFFERENT D. All of theabove E. None of the above
Last Answer : SELECT DISTINCT
Description : Queries to a database A. are written in English B. can use aggregatefunctions like SUM and COUNT C. both (a)and (b) D. All of theabove E. None of the above
Last Answer : can use aggregatefunctions like SUM and COUNT