In Cisco's Unified Wireless Solution, what is the split-MAC architecture?
Options: The split-MAC architecture uses MAC addresses to create a forward/filter table and break up collision domains., The split-MAC architecture allows the splitting of 802.11 protocol packets between the AP and the controller to allow processing by both devices., The split-MAC architecture uses MAC addresses on the wireless network and IP addresses on the wired network., The split-MAC architecture uses MAC addresses to create a forward/filter table and break up broadcast domains.
Options: a. for relatively permanent collections of data
b. for the size of the structure and the data in the structure are constantly changing
c. for both of above situation
d. for none of above situation
The advantage of a command processor running only built-in commands is:
Options: flexibility to the users in running lists of commands by simply collecting them in named batch command files, the command set being common across different hardware configurations, users can create system programs and run them as commands, the processing is much faster than would other-wise be the case when user defined commands are used
. What happens when a user double-clicks an object in the Project pane of the Visual Basic Editor?
Options: a. The associated code is displayed in the Code pane.
b. The associated code is displayed in a new window.
c. The object is deleted from the Project pane.
d. The object’s property sheet opens.
In which addressing mode the effective address of the operand is the contents of a register specified in the instruction and after accessing the operand, the contents of this register is incremented to point to the next item in the list?
Options: index addressing, indirect addressing, auto increment, auto decrement
You're on your PC at midnight and an electric storm pops up. What's the best way to protect your PC.
Options: you don't worry; you have a lightning rod on your house, you don't worry; you've got a surge protector on your PC, you don't worry; you've got a surge protector on your PC and phone line to your modem, unplug the PC and remove phone line from the modem
Options: It sends back the protocol received from a router as a poison pill, which stops the regular updates., It is information received from a router that can't be sent back to the originating router., It prevents regular update messages from reinstating a route that has just come up., It describes when a router sets the metric for a downed link to infinity.
When you connect to an online information service, you are asked to provide some kind of identification such as your name, an account number and a password. What is the name given to this brief dialogue between you and the information system?