_____ refers tothe structure or format of the data, meaning the order in which they are presented.
A)
Semantics
B)
Syntax
C)
Timing
D)
All of theabove

1 Answer

Answer :

Syntax

Related questions

Description : ______ refers totwo characteristics: when data should be sent and how fast it can be sent. A) Semantics B) Syntax C) Timing D) none of the above

Last Answer : Timing

Description : _____defines how a particular pattern to be interpreted,and whataction is tobe taken based on that interpretation. A) Semantics B) Syntax C) Timing D) None of the abov

Last Answer : Semantics

Description : Application layer protocol defines ____ a.types of messages exchanged b.message format, syntax and semantics c.rules for when and how processes send and respond to messages d.all of the mentioned

Last Answer : d.all of the mentioned

Description : Data integrity control A. is used to set upper and lower limits on numeric data B. requires the use of passwords toprohibit unauthorized access tothe file C. has the data dictionary keep thedate and time ... back-up,and most recent modificationfor all files D. All of theabove E. None of the above

Last Answer : has the data dictionary keep thedate and time of lastaccess last back-up,and most recent modificationfor all files

Description : _______ refers to the structure or format of the data, meaning the order in which they are presented.

Last Answer : Semantics

Description : Satellite-Switched Time-Division Multiple Access (SS/TDMA) is A. the method of determining whichdevice has access tothe transmission medium at any time. B. a medium access control technique for ... switching is used to dynamically changethechannel assignments D. All of theabove E. None of the above

Last Answer : a form of TDMA in which circuit switching is used to dynamically changethechannel assignments

Description : The Internet Control Message Protocol (ICMP) A. allows gateways to send error acontrol messages toother gateways or hosts B. provides communication between the Internet Protocol Software on one machine ... and takeaction to correct theproblem D. All of theabove E. None of the above

Last Answer : All of theabove

Description : The rules that give meaning to the instructions. a) Semantics b) Syntax c) Code d) Cases

Last Answer : Answer: a Explanation: The answer is semantics. They are the rules that give meaning to the instructions. Syntax is the formal rules that ensure validation of code

Description : Data aresent over pin _____ of the EIA-232 interface. A. 2 B. 3 C. 4 D. All of theabove

Last Answer : 2

Description : The formal grammar rules governing the construction of valid instruction. a) test case b) syntax c) program d) semantics

Last Answer : Answer: b Explanation: Syntax determines the grammatical rules in a code. Semantics give meaning to the instructions

Description : Which is used to mediate between syntax and semantics? a) Form b) Intermediate form c) Grammer d) All of the mentioned

Last Answer : b) Intermediate form

Description : Carrier is A. One or more conductors that serve as a common connection for a related group of devices B. a continuous frequency capableof being modulated or impressed witha second signal C. ... that provides a data communications service among stations attached tothe network E. None of the above

Last Answer : a continuous frequency capableof being modulated or impressed witha second signa

Description : Contention is A. One or more conductors that serve as a common connection for a related group of devices B. a continuous frequency capableof being modulated or impressed witha second signal C. ... that provides a data communications service among stations attached tothe network E. None of the above

Last Answer : the condition whentwo or more stations attempt to use the same channel at the same time

Description : Devices may bearrangedin a _____ topology. A) mesh B) ring C) bus D) all of theabove

Last Answer : all of theabove

Description : . In order to use arecord management system A. You needto understand thelow-level details of how informationin stored B. You needto understand the model the record management system uses. C. Both (a)and (b) D. All of theabove E. None of the above

Last Answer : You needto understand the model the record management system uses.

Description : A repeater is a connecting devicethat operates in the _______ layer of theInternet model. A) physical B) data link C) network D) all of theabove

Last Answer : physical

Description : In SQL, the CREATE TABLESPACE isused A. to createa place in the databasefor storageof scheme objects, rollback segments, andnaming the data files to comprise the tablespace B. to createa database trigger C. to add/rename data files, to change storage D. All of theabove E. None of the above

Last Answer : to createa place in the databasefor storageof scheme objects, rollback segments, andnaming the data files to comprise the tablespace

Description : A logical schema A. is the entire database B. is a standard wayof organizing information into accessible parts C. describes how data is actually stored on disk D. All of theabove E. None of the above

Last Answer : is a standard wayof organizing information into accessible parts

Description : Data encryption techniquesare particularly useful for A. reducingstorage space requirements B. improving data integrity C. protecting data indata communication systems D. All of theabove E. None of the above

Last Answer : protecting data indata communication systems

Description : Goals for the design of thelogical schema include A. avoiding data inconsistency B. being ableto construct queries easily C. being ableto access data efficiently D. All of theabove E. None of the above

Last Answer : All of theabove

Description : Data flow between two devices canoccur in a _______ way. A) simplex B) half-duplex C) full-duplex D) all of theabove

Last Answer : all of theabove

Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame

Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size

Description : Which of the following is not a disadvantage of wireless LAN? A. Slower data transmission B. higher error rate C. interference of transmissions from different computers D. All of theabove

Last Answer : All of theabove

Description : In Bluetooth, the_____layer is roughlyequivalent tothe MAC sublayer in LANs. A) radio B) baseband C) L2CAP D) none of the above

Last Answer : baseband

Description : In SONET, for each byte, the bitsare transmitted ____________. A) from least significant to the most significant B) from most significant tothe least significant C) two at atime D) three at atime

Last Answer : from least significant to the most significant

Description : In IPv6,a _______address is usedif aLAN uses the Internet protocols but isnot connected tothe Internet for security reasons. A) link local B) site local C) mapped D) none of the above

Last Answer : link local

Description : In classless addressing, the _______ is the varying part (similar tothe hostid). A) suffix B) prefix C) hostid D) none of the above

Last Answer : suffix

Description : _________ refers to the sounds of a language. a. Grammar b. Phonology c. Pragmatics d. Semantics

Last Answer : b. Phonology

Description : In the system conceps, term organization ? implies structure and order refers to the manner in which each component fuctions with other components of the system refers to the holism of system means that part of the computer system depend on one another

Last Answer : implies structure and order

Description : Which of the following layers of the OSI reference model is concerned with the syntax of data exchanged between application entities? a. Presentation layer b. Application layer c. Transportation layer d. Session layer

Last Answer : a. Presentation layer

Description : A _________ digital signal includes timing informationin the data beingtransmitted. A) self-synchronizing B) self-modulated C) self-transmitted D) none of the above

Last Answer : self-synchronizing

Description : Internal auditors review the adequacy of the company's internal control system primarily to a. Help determine the nature, timing, and extent of tests necessary to achieve audit objectives. b. ... and economically. d. Ensure that material weaknesses in the system of internal control are corrected

Last Answer : Determine whether the internal control system provides reasonable assurance that the company's objectives and goals are met efficiently and economically.

Description : A _____ contains specific rules and words that express the logical steps of an algorithm. 1) Syntax 2) Programming structure 3) Programming language 4) Logic chart 5) None of these

Last Answer : Answer :3

Description : If an Ethernet destination address is08:07:06:05:44:33, then this is a ______ address. A) unicast B) multicast C) broadcast D) any of theabove

Last Answer : unicast

Description : f an Ethernet destination address is07:01:02:03:04:05, then this is a ______ address. A) unicast B) multicast C) broadcast D) any of theabove

Last Answer : multicast

Description : Membership in a VLAN can be based on _________. A) port numbers B) MAC addresses C) IP addresses D) all of theabove

Last Answer : all of theabove

Description : In Go-Back-N ARQ, if frames 4,5, and 6 are received successfully, thereceiver may send an ACK _______ to thesender. A) 5 B) 6 C) 7 D) any of theabove

Last Answer : 7

Description : In______ schemes, the voltagesare on the both sidesof the time axis. Forexample, thevoltage level for 0 can bepositive and thevoltage level for 1 can be negative. A) polar B) bipolar C) unipolar D) all of theabove

Last Answer : polar

Description : Ina _____scheme,all the signal levels are onone sideof the time axis,either above or below. A) polar B) bipolar C) unipolar D) all of theabove

Last Answer : unipolar

Description : _________can impair a signal. A) Attenuation B) Distortion C) Noise D) All of theabove

Last Answer : All of theabove

Description : SONET network topologies can be__________. A) linear B) ring C) mesh D) all of theabove

Last Answer : ring

Description : A SONET system can use _________. A) STS multiplexers B) regenerators C) add/drop multiplexers D) all of theabove

Last Answer : add/drop multiplexers

Description : In ATM, connection between two endpoints is accomplishedthrough_______. A) TPs B) VPs C) VCs D) all of theabove

Last Answer : all of theabove

Description : ______ eliminates the varying delay times associated withdifferent-size packets. A) X.25 B) Frame Relay C) ATM D) all of theabove

Last Answer : ATM

Description : A command that lets youchange one or more fields in a record is A. Insert B. Modify C. Look-up D. All of theabove E. None of the above

Last Answer : Modify

Description : The database administration function includes A. application programming B. computer operations management C. databaseaccessplanning D. All of theabove E. None of the above

Last Answer : databaseaccessplanning

Description : Which commandis usedto selectdistinct subject (SUB) from thetable (BOOK)? A. SELECT ALL FROM BOOK B. SELECT DISTINCT SUB FROM BOOK C. SELECT SUB FROM BOOK D. All of theabove E. None of the above

Last Answer : SELECT DISTINCT SUB FROM BOOK

Description : In SQL, which commandis used to select only onecopy of each setof duplicablerows A. SELECT DISTINCT B. SELECT UNIQUE C. SELECT DIFFERENT D. All of theabove E. None of the above

Last Answer : SELECT DISTINCT

Description : Queries to a database A. are written in English B. can use aggregatefunctions like SUM and COUNT C. both (a)and (b) D. All of theabove E. None of the above

Last Answer : can use aggregatefunctions like SUM and COUNT