To install a second IDE drive into a computer, you must:
Options: Set the master-slave jumper to slave on the second drive, Use the IDE configuration software to set the new drive as slave, Verify that you define the new drive as D: in the CMOS setup, Verify that you attach the drive to the connector at the end of the ribbon cable
Options: allows gateways to send error a control messages to other gateways or hosts, provides communication between the Internet Protocol Software on one machine and the Internet Protocol Software on another, reports error conditions to the original source, the source must relate errors to individual application programs and take action to correct the problem, All of the above
. If you need a text to show vertically in a cell. How will you achieve this?
Options: a. Choose Vertical on Text alignment in Format Cells dialog box b. Choose 90 Degrees in Orientation of Format Cells dialog box c. Choose Distributed from the Vertical drop down list of Format Cells dialog box d. Choose Center Across Selection from Horizontal combo box in Format Cells dialog box
A network administrator is connecting hosts A and B directly through their Ethernet interfaces, as shown in the illustration. Ping attempts between the hosts are unsuccessful. What can be done to provide connectivity between the hosts?
A crossover cable should be used in place of the straight-through cable. A rollover cable should be used in place of the straight-through cable. The subnet masks should be set to 255.255.255.192. A default gateway needs to be set on each host. The subnet masks should be set to 255.255.255.0.
Options: 1 only, 2 only, 3 and 4 only, 1 and 5 only
Options: A scripting language that states the rules for tagging elements., A programming language that states the rules for tagging elements., A programming language that allows the creation of customized tags., A scripting language that allows the creation of customized tags.
The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer
Options: An additional token is added for every 1,000 nodes, The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500, The network becomes less efficient, After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device
Options: Hard-coded SQL statements in a program language such as Java., The process of making an application capable of generating specific SQL code on the fly., Hard-coded SQL statements in a procedure., Hard-coded SQL statements in a trigger.
What does the port number in a TCP connection specify?
Options: It specifies the communication process on the two end systems
B. It specifies the quality of the data & connection
C. It specify the size of data
D. All of the above
Ans:– A ,
The ODBC Level 1 API contains which of the following functions?
Options: Browse possible connections and data sources only, Connect to data sources with driver-specific information only, Process a scrollable cursor only, Both 1 and 3 above are in the OBDC Level 1 API.