Which of the following is not the External Security Threats?
Options: Front-door Threats
B. Back-door Threats
C. Underground Threats
D. Denial of Service (DoS)
Ans:– C ,
The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer
Options: An additional token is added for every 1,000 nodes, The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500, The network becomes less efficient, After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device
In analyzing the compilation of PL/I program, the term "Syntax analysis" is associated with
Options: recognition of basic syntactic constructs through reductions, recognition of basic elements and creation of uniform symbols, creation of more optional matrix, use of macro processor to produce more optimal assembly code
Options: a. Use the only some parts of the monitor is called Custom Shows b. The Presentation which can present only on particular date c. Creating Presentations within a Presentation d. There is no option of Custom Shows
Performance analysis and tuning is which of the following?
Options: Undertaken one time at the time of a DBMS installation, Undertaken one time at the time of the implementation of a new application, Undertaken as an ongoing part of the backup of a database, Undertaken as an ongoing part of managing a database
. Why ABC is considered electro-mechanical computer?
Options: A) Because it was invented before electronic computers were developed
B) Because there are wheels, drums, bars to rotate and move to produce result
C) Because they use the flow of electrons in different component
D) None of above
. After entering all fields required for a table, if you realize that the third field is not needed, how will you remove?
Options: a. You need to delete the whole table. There is no method to remove a particular field only.
b. Delete all the fields from third downwards and reenter the required fields again.
c. Select the third column in datasheet view then delete
d. Select the third row in table design view then delete