Which of the following best supports communication availability, acting as a countermeasure to the vulnerability of component failure
………..is an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the internet due to bombardment of fake traffic.
Which of the following ensures that only authorized users can use or apply specific software applications
Which spread spectrum technology does the 802.11 b standard define for operation
Which connectionless protocol is used for its low overhead
…………are used to refer to Java methods or variables that belongs to other classes.
A good example of an operating system that makes your computer function and controls the working environment is ………….
………..is a device that has been customized to perform few specialized computing tasks well with minimal effort.
Which of the following is a valid class declaration in C++
Which of the following forms is used specifically to identify the entity created when encapsulating data inside data link layer headers and trailers
A relational database model uses ……….. to contain and organize information.
Collecting personal information and effectively posting as another individual is a crime known as ……..
The concept of ‘zero administration’ is associated with
………is a special field value, distinct from 0, blank or any other value, that indicates that the value for the field is missing or otherwise unknown.
If there are no functional dependencies between two (or more) non-primary key attributes, this describes …………
A/an ……..can shield electronic equipment from power spikes.
Hierarchical databases do not use ………… as relational databases do for searching procedures
The foreign key is not necessarily the …….. in its current table.
The database management software creates and reads the data dictionary to ascertain what ……… exist and checks to see if specific users have the proper access right to view them.
………..is a computer with a Web server that serves the pages for one or more websites.
………is a communication medium where data are transformed into light pulses.
The network database model uses………..
What is the default maximum number of processes that can exist in Linux (with a 32-bit platform)
Which method of database recovery involves undoing unwanted changes to the database, such as undoing a partially completed transaction interrupted by a power failure
Which type of software is best used with specific questions to verify hypotheses
Which of the following is not a benefit of networks
Which shortcut will create a new folder in a Windows folder
Which of the following attributes makes TCP reliable
A named set of table rows stored in a contiguous section of secondary memory best describes a(n)……
AN IP protocol field of 0 × 06 indicates that IP is carrying what as its payload