Which of the following technique is used for fragment?
Options: a technique used in best-effort delivery systems to avoid endlessly looping packets, a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame, one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size, All of the above
Which of the following would be good reasons to run NAT? You need to connect to the Internet and your hosts don't have globally unique IP addresses. You change to a new ISP that requires you to renumber your network. You don't want any hosts connecting to the Internet. You require two intranets with duplicate addresses to merge.
Options: 1, 2 and 4, 2 and 4, 3 only, All of the above
You have just installed a new internal PCI modem on you desktop. It will not dial out. what is the problem?
Options: The port speed is set too high, the modem has not been set up in control panel properties, the phone line is plugged into the line-in port on the modem card, the phone line out of the wall is plugged into the phone port on the modem card
To center worksheet titles across a range of cells, you must
Options: a. Select the cells containing the title text plus the range over which the title text is to be centered b. Widen the columns c. Select the cells containing the title text plus the range over which the title text is to be enfettered d. Format the cells with the comma style
Data transformation includes which of the following?
Options: A process to change data from a detailed level to a summary level, A process to change data from a summary level to a detailed level, Joining data from one source into various sources of data, Separating data from one source into various sources of data
Options: a. A wizard that creates a functional database structure based on the user’s selections
b. A widely recognized naming convention for database objects
c. A sort order for records, which is identified in the table design
d. A set of relationship rules that enforce defined database relationships
When a new trunk link is configured on an IOS-based switch, which VLANs are allowed over the link?
Options: By default, all VLANs are allowed on the trunk., No VLAN's are allowed, you must configure each VLAN by hand., Only configured VLAN's are allowed on the link., Only extended VLAN's are allowed by default.
Options: the embodiment of human intellectual capabilities within a computer., a set of computer programs that produce output that would be considered to reflect intelligence if it were generated by humans., the study of mental faculties through the use of mental models implemented on a computer., All of the above
If the transient response of a system is overdamped:
Options: the value of the output exceeds the value of the input at times during the transient period., the value of the output never exceeds the value of the input during the transient period., the value of the output never stabilizes., All of the above