Two computers that communicate with each other use a simple parity check to detect errors for ASCII transmissions. Which of the following events will always lead to an undeleted error?
Options: one bit or any odd number of bits inverted in a block of data during transmission, two bits or any even number of bits inverted in a block during transmission, one bit or any odd number of bits inverted in a byte during transmission, two bits or any even number of bits inverted in a byte during transmission
When a series RLC circuit is operating at its resonant frequency:
Options: capacitive reactance is greater than the inductive reactance, inductive reactance is greater than the capacitive reactance, inductive reactance is equal to the capacitive reactance, the difference between inductive and capacitive reactance is equal to the resistance
Each answer below shows example data from a table. Which answer is an example of the general-purpose remarks column problem?
Options: Three columns have the values 534-2435, 534-7867, and 546-2356 in the same row., Three rows have the values Brown Small Chair, Small Chair Brown, and Small Brown Chair in the same column., Three rows have the values Brown, NULL, and Blue in the same column., One row has the value "He is interested in a Silver Porsche from the years 1978-1988" in a column.
Options: One or more conductors that serve as a common connection for a related group of devices, a continuous frequency capable of being modulated or impressed with a second signal, the condition when two or more stations attempt to use the same channel at the same time, a collection of interconnected functional units that provides a data communications service among stations attached to the network
Options: is used to set upper and lower limits on numeric data, requires the use of passwords to prohibit unauthorized access to the file, has the data dictionary keep the date and time of last access last back-up, and most recent modification for all files, All of the above
. Which of the following parameters decided the performance of the memory?
B. Cycle time
C. Transfer rate
D. All of the above
Ans:– D ,
You configure the following access list: access-list 110 deny tcp 10.1.1.128 0.0.0.63 any eq smtp access-list 110 deny tcp any eq 23 int ethernet 0 ip access-group 110 out What will the result of this access list be?
Options: Email and Telnet will be allowed out E0., Email and Telnet will be allowed in E0., Everything but email and Telnet will be allowed out E0., No IP traffic will be allowed out E0.
Options: File Sharing
B. Easier access to Resources
C. Easier Backups
D. All of the Above
Ans:– D ,
In top down analyis and design
Options: each succeeding phase is more detailed than the phase before it, each succeeding phase is as detailed as the phase before it., each succeeding phase is less detailed than the phase before it, aLL of the above
Options: Entering the input items, then displaying the input items, and then processing the output items, Entering the input items, then processing the output items, and then displaying the output items, Entering the input items, then processing the input items, and then displaying the output items, Entering the output items, then displaying the output items, and then processing the output items