What is a scripting language
The first phase of software development is …..
On point-to-point networks, OSPF hello packets are addressed to which address
Which of the following provide network redundancy in a local network environment
Which of the following is best characterized by unauthorized modification of data before or during systems data entry
Data mining is used to aid in……
Of the three major types of off-site processing facilities, what type is often an acceptable solution for preparing for recovery of noncritical systems and data
Which OSI layer defines the standard for cabling and connectors
In the concept of object orientation,…………..
A thin, credit-card size device used principally on Laptop computers to expand its capabilities is ………
………… is a standard for security that is located at the network or packet processing layer of network communications, as opposed to the application layer.
Which of the following statement is false
Which of the following are effective controls for detecting duplicate transactions such as payments made or received
The simplest model in software development is …………
Who is more concerned about the conceptual level at DBMS
Which one is not a phase of the systems development life cycle
Online banking transactions are being posted to the database when processing suddenly comes to a hat. The integrity of the transaction processing is best ensured by ………
What is the main purpose of NCS software
Which of the following is not one of the elements that needs to be considered when constructing WebApp server side configuration hosts
What is a reliable technique for estimating the scope and cost of a software-development project
Which of the following accesses the database and data dictionary in a database as they exist on a storage device
Which of the following is a dynamic analysis tool for the purpose of testing software modules
Which script you must query in Oracle to display the code associated with RMAN stored scripts
A. RC_STORED_SCRIPT_LINE
B. RC_STORED_SCRIPT
C. RC_STORED_LINE_SCRIPT
D. RC_SCRIPTS
E. RC_SCRIPTS in RC_STORED_SCRIPT
Which of the following is a CASE SQL statement
Which method of database recovery involves frequent simultaneous copying of the database to maintain two or more to complete copies of the database
To define what columns should be displayed in an SQL, SELECT statement ………..
If you are connected to your internal network, what should you check if you cannot connect to with servers on the internet
What is the technical name of a wireless network
SQL security issues include which of the following
Which of the following can help to detect transmission errors by appending specially calculated bits into the each segment of data